Most recently, an important metric called energy proportional is presented as a guideline for energy efficiency systems (Barroso and Holzle, 2007), which advocates that energy consumption should be in proportion to system performance/utilization. However, this tradeoff metric is only defined for normal mode where the system is functioning normally without node failures. When node failure occurs, the system enters degradation mode during which node reconstruction is initiated. This very process needs to wake/spin up a number of disks and takes a substantial amount of I/O bandwidth, which will not only compromise energy efficiency but also performance. Moreover, as in replication-based storage such as Google File System (Sanjay Ghemawat, Go...
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that le...
Context : Big Data and Cloud Computing nowadays require large amounts of storage that are accessible...
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that le...
Most recently, an important metric called energy proportional is presented as a guideline for ener...
With the increasing size of the clusters as well as the increasing capacity of each storage node, cu...
Trends in Internet infrastructure are driving towards using data centers to provide services such as...
Extreme-scale computing is set to provide the infrastructure for the advances and breakthroughs that...
Electrical energy is an essential resource for the modern world. Unfortunately, its price has almost...
[[abstract]]The concept of green storage in cluster computing has recently attracted enormous intere...
With the increasing popularity of cloud computing and Big data applications, current data centers ...
Energy saving has become a crucial concern in datacenters as several reports predict that the antici...
The invention of better fabrication materials and processes in solid-state devices has led to unprec...
[[abstract]]The concept of green storage in cluster computing has generated a great deal of interest...
The invention of better fabrication materials and processes in solid-state devices has led to unprec...
In modern replication storage systems where data carries two or more multiple copies, a primary grou...
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that le...
Context : Big Data and Cloud Computing nowadays require large amounts of storage that are accessible...
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that le...
Most recently, an important metric called energy proportional is presented as a guideline for ener...
With the increasing size of the clusters as well as the increasing capacity of each storage node, cu...
Trends in Internet infrastructure are driving towards using data centers to provide services such as...
Extreme-scale computing is set to provide the infrastructure for the advances and breakthroughs that...
Electrical energy is an essential resource for the modern world. Unfortunately, its price has almost...
[[abstract]]The concept of green storage in cluster computing has recently attracted enormous intere...
With the increasing popularity of cloud computing and Big data applications, current data centers ...
Energy saving has become a crucial concern in datacenters as several reports predict that the antici...
The invention of better fabrication materials and processes in solid-state devices has led to unprec...
[[abstract]]The concept of green storage in cluster computing has generated a great deal of interest...
The invention of better fabrication materials and processes in solid-state devices has led to unprec...
In modern replication storage systems where data carries two or more multiple copies, a primary grou...
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that le...
Context : Big Data and Cloud Computing nowadays require large amounts of storage that are accessible...
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that le...