1. 程式人生 > >ISM 資訊儲存與管理第二版 and 大話儲存2 讀書筆記 (1): Host, Connectivity, Disk Drive

ISM 資訊儲存與管理第二版 and 大話儲存2 讀書筆記 (1): Host, Connectivity, Disk Drive

Host (Compute) 

1. Memory VirtualizationIt creates virtual memory with an address space larger than the physical memory space  

virtual memory manager(VMM). The VMM manages thevirtual-to-physical memory mapping 

A process known aspagingmoves inactive physical memory pages onto the swap file and brings them back to the physical memory when required.  

moves the least used pages into the swap file so that enough RAM is available for processes that are more active 

2. Device Driversoftware that permits the operating system to interact with a specific device, such as a printer, a mouse, or a disk drive. 

3. Volume Manager = 

In the early days, 

disk drives appeared to the OS as a number of continuous disk blocks. 

no easy way to scale in or out of the file system’s size.

Logical Volume Managers(LVM)  = layer between the file system and the physical disk.  partition large disk or aggregate small disks


The basic LVM components are

physical volumes, volume groups, and logical volumes.  

logical volume can be thought of as adisk partition, whereas the volume group itself can bethought of as adisk.  

logical volume is made up of noncontiguous physical extents and mayspan multiple physical volumes.  

4. File System 

A fileis a collection of related records or data stored as a unit with a name. 

file systemis a hierarchical structure of files.  

directories, are containers for storing pointers to multiple files.  

the metadata in a UNIX environment consists of thesuperblock, theinodes, and the list ofdata blocks free and in use.  

inode is associated with every file and directory and contains information such as thefile length, ownership, access privileges, time of last access/modification,number of links, and the address of the data. 

Each file system blockis a contiguous area on the physical disk. The block size of a file system isfixed at the time of its creation.  

A file can span multiple file system blocks.



Non journaling file systemscause a potential loss of files because they use separate writes to update their data and metadata.  

system crashes during the write process, the metadata or data might be lost or corrupted. 

system reboots, the file system attempts to update the metadata structures by examining and repairing them.  

A journaling file systemuses a separate area called alog orjournal.  

enough information in the log to “replay” the log record and complete the operation.  

quick file system check because it looks only at the active, most recently accessed parts of a large filesystem. 

5. Compute Virtualization 

It enables multiple operating systems to run concurrently on single or clustered physical machines.  

achieved by a virtualization layer that resides between thehardware and virtual machines. This layer is also called thehypervisor.  


Connectivity 

1. Physical Components of Connectivity 

A host interface deviceor host adapter connects a host to otherhosts and storage devices. Examples of host interface devices are host bus adapter (HBA) and network interface card (NIC). Host bus adaptoris anapplication-specific integrated circuit(ASIC) board that performs I/O interface functions between the host and storage, relieving the CPU from additional I/O processing workload. A host typically contains multiple HBAs. 

2. Interface Protocols 

between the host and storage. 

The popular interface protocols used for host to storage communications areIntegrated Device Electronics/Advanced Technology Attachment(IDE/ATA),Small Computer System Interface(SCSI),Fibre Channel(FC) andInternet Protocol (IP). 

SATA( master&slave device  6 Gb/s )

SCSI supports up to16 devices on a single bus and provides data transfer rates up to 640 MB/s (for the Ultra-640 version). 

Serial attached SCSI (SAS) is a point-to-point serial protocol  (6 Gb/s )

FC 16 Gb/s 

These protocols are implemented on the disk interface controllers.  therefore, disk drivesare known by the protocol interface they support, for example SATA disk, FCdisk, and so on. 


Disk Drive Performance 



Zoned bit recordinguses the disk efficiently. 

On older disk drives, the outer tracks had the same number of sectors as the inner tracks, so data density was low on the outer tracks. This was an inefficient use of the available space, as shown in Figure 2-9 (a). 



Earlier drives used physical addresses consisting of thecylinder, head,and sector(CHS) number to refer to specific locations on the disk, 

Logical block addressing(LBA) 

simplifies addressing by using alinear address to access physical blocks of data. The disk controller translates LBA to a CHSaddress, and the host needs to know only the size of the disk drive in terms of the number of blocks. The logical blocks are mapped to physical sectors on a 1:1 basis. 


Seek Time = 

Full Stroke:The time taken by the R/W head to move across the entire width of the disk, from theinnermost track to the outermost track.

Average:The average time taken by the R/W head to move fromone random track to another, normally listed as the time for one-third of a full stroke.

Track-to-Track:The time taken by the R/W head to movebetween adjacent tracks


Rotational Latency = the time needed to find the sector in one track, average travelling half round of the track

Average rotational latency for a 15,000 rpm (or 250 rps)drive = 0.5/250 = 2 milliseconds. 


Disk I/O Controller Utilization 



Average response time (TR) = Service time (TS) / (1 – Utilization) 

TSis the time taken by the controller to serve an I/O.


The graph indicates that the response time changes arenonlinear as the utilization increases. When the average queue sizes are low, the response timeremains low. The response time increases slowly with added load on the queue and increases exponentially when the utilization exceeds 70 percent. 



相關推薦

ISM 資訊儲存管理第二 and 大話儲存2 讀書筆記 (1): Host, Connectivity, Disk Drive

Host (Compute)  1. Memory Virtualization= It creates virtual memory with an address spac

分享《組織管理研究的實證方法(第2)》中文PDF

shadow alt avr log 經典書籍 mage 方式 書籍 roc 下載:https://pan.baidu.com/s/1WTJt0XqrSoo5AvRibkXMQQ 其他資料請見:http://blog.51cto.com/3215120 《組織與管理研究的實

Docker學習筆記 ---儲存管理

儲存管理 為了適應不同平臺不同場景的儲存需求,Docker提供了各種基於不同檔案系統實現的儲存驅動來管理實際的映象檔案   元資料管理 映象在設計上將元資料和檔案儲存完全隔離。Docker管理元資料採用的也正是從上至下repository、image、layer是3個層次。 所以reposi

《Hadoop權威指南大資料的儲存分析第修訂版升級》pdf附網盤下載連結+(附一個菜鳥的java學習之路)

技術書閱讀方法論 一.速讀一遍(最好在1~2天內完成) 人的大腦記憶力有限,在一天內快速看完一本書會在大腦裡留下深刻印象,對於之後複習以及總結都會有特別好的作用。 對於每一章的知識,先閱讀標題,弄懂大概講的是什麼主題,再去快速看一遍,不懂也沒有關係,但是一定要在不懂的

探討Web開發中的Session儲存管理-動力節點Java學院

我們都知道,由於HTTP協議是無狀態的協議,一次瀏覽器和伺服器的互動過程就是: 瀏覽器:你好嗎? 伺服器:很好! 這就是一次會話,對話完成後,這次會話就結束了,伺服器端並不能記住這個人,下次再對話時,伺服器端並不知道是上一次的這個人,所以服務端需要記錄使用者的狀態時,就需要用某種機制

Docker技術入門實戰 第二-學習筆記-9-Docker Compose 專案-1-舉例說明

Docker Compose 是 Docker 官方編排(Orchestration)專案之一,負責快速在叢集中部署分散式應用 Compose 通過一個配置檔案來管理多個Docker容器,在配置檔案中,所有的容器通過services來定義,然後使用docker-compose

Docker技術入門實戰 第二-學習筆記-8-網路功能network-1-單個host上的容器網路

Docker 中的網路功能介紹 Docker 允許通過外部訪問容器或容器互聯的方式來提供網路服務   1) 外部訪問容器

Docker技術入門實戰 第二-學習筆記-8-網路功能network-2-相應配置

1) 快速配置指南(詳細使用下面會講) 其中有些命令選項只有在 Docker 服務啟動的時候才能配置,而且不能馬上生效 下面2個命令選項既可以在啟動服務時指定,也可以 Docker 容器啟動(doc

Docker技術入門實戰 第二-學習筆記-8-網路功能network-3-容器訪問控制和自定義網橋

1)容器訪問控制 容器的訪問控制,主要通過 Linux 上的 iptables防火牆來進行管理和實現。 iptables是 Linux 上預設的防火牆軟體,在大部分發行版中都自帶。   容器訪問外部網路 容器要想訪問

Docker技術入門實戰 第二-學習筆記-10-Docker Machine 專案-1-cli

Docker Machine 是 Docker 官方編排(Orchestration)專案之一,負責在多種平臺上快速安裝 Docker 環境 Docker Machine是一種工具,它允許你在虛擬主機上安裝Docker引擎,並使用docker-machine命令管理主機。

《Python3程式開發指南(第二)》第2章 資料型別 練習

1.修改程式print_unicode.py,以便使用者可以在命令列上輸入幾個單獨的單詞,並且只有在Unicode字元名包含使用者所指定的所有單詞時才打印相應列。 __author__ = 'Ibuki Suika' import sys import unicoded

《Speech and Language Processing》讀書筆記資訊抽取IE

Information Extraction 資訊抽取 一、概述 1.1 IE 資訊抽取就是從文字中抽取有限的幾種語義內容,是將非結構化的文字轉換為結構化資料的過程,有限的幾種語義內容主要包括:實體抽取、關係抽取、事件抽取、時序表達、模板填充等。 1.2命名實體識別(na

Android第一行程式碼第二:5.3.2傳送有序廣播,在安卓8上無法接收廣播我個人的處理方法

希望有大佬能教我別的方法,我明前只能想到這個方法啦。多謝! 書上的原始碼是 Intent intent = new Intent("com.example.weiru.broadcasttest.MY_BROADCAST") ; sendOrderedBroadcast

AjaxComet-JavaScript高級程序設計第21章讀書筆記(1)

set activex .html 規範 sta php 協議 num 刷新 Ajax(Asynchronous Javascript + XML)技術的核心是XMLHttpRequest對象,即: XHR。雖然名字中包含XML,但它所指的僅僅是這種無須刷新頁面即可從服務器

數據結構算法(刺猬書)讀書筆記----目錄

更新 rip javascrip tar 結構 順序 耗時 梳理 讀書筆記 最近在抓底層的語言基礎,以前對數據結構和算法並沒有太大感覺,但越往深處學就越覺得這些基礎真的是要牢牢掌握住。一個簡簡單單的數組,深究起來都有很多學問。所以打算寫個一系列的讀書筆記,好好梳理一下這一塊

數據結構算法(刺猬書)讀書筆記1)----數組

split() ring 此外 結果 shift 即使 cnblogs 操作符 main 在JavaScript中,數組其實是一種特殊的對象,用來表示偏移量的索引是該對象的屬性,所以JavaScript的數組本質上是對象。同時這些數字索引在內部會被轉換成為字符串類型,因為J

《黑客攻防技術寶典Web實戰篇@第2讀書筆記1:了解Web應用程序

金融 主機 border ket 邊界 輕量 在線 讀書 目的 讀書筆記第一部分對應原書的第一章,主要介紹了Web應用程序的發展,功能,安全狀況。 Web應用程序的發展歷程 早期的萬維網僅由Web站點構成,只是包含靜態文檔的信息庫,隨後人們發明了Web瀏覽器用來檢索和

《進化:運維技術變革實踐探索》讀書筆記1 —— 以應用為核心

應用 運維 規範 服務 第一章介紹的是運維的本質,開頭以Netflix 公司(業界微服務架構的最佳實踐者)為例,介紹了在其內部"運維工程師"的角色。在Netflix 內部沒有運維工程師這一角色,取而代之的是SRE(site Reliability Engineer)

資料結構(C語言讀書筆記1(基本概念和術語)

資料: 所有輸入到計算機中,並被計算機程式處理的符號的總稱。 資料元素: 資料的基本單位,在計算機程式中經常被當做一個整體進行考慮和處理 資料物件: 性質相同的資料元素的集合,是資料的一個子集。 資料結構: 相互之間存在一種或多種特定關係的資料元素的集合。這種資料元素之間

《從 PAXOS 到 ZOOKEEPER:分散式一致性原理實踐》讀書筆記[1]——一致性協議

1 分散式 1.1 定義 分散式系統是一個硬體或軟體元件分佈在不同的網路計算機上,彼此之間僅僅通過訊息傳遞進行通訊和協調的系統 1.2 特點 分佈性、對等性、併發性、缺乏全域性時鐘、故障總是會發生 2 CAP 和 BASE 2.1 CAP CAP 理論:一個分散式系統不可