期刊文献+

面向云计算的多核处理器存储和网络子系统优化设计 被引量:6

Optimization of memory and network subsystems in multi-core processors for cloud computing
下载PDF
导出
摘要 针对传统多核处理器设计缺乏对虚拟机和典型云服务的支持的问题,分析了云计算数据中心和虚拟机的基本架构和特点,指出数据传输、网络性能、I/O虚拟化是一直未被关注的影响系统性能的关键因素,进而提出了一种改进的多核处理器设计方案。该方案通过采用片上内存拷贝引擎、改进直接内存访问(DMA)设计、改进直接缓存访问(DCA)设计和采用快速地址转换和远程内存访问(RDMA)技术,来较大地提高存储系统、网络、I/O的性能和系统的并行性。实验表明,该方案实现的单核800MHz处理器千兆以太网络TCP传输带宽较传统方案提高48.2%并达到峰值800Mbps,内存拷贝操作加速比达到14倍以上,快速傅立叶变换(FFT)和矩阵乘法加速比达到2倍以上,同时系统高速缓存效率显著提高。 To solve the problem that traditional multi-core processer designs rarely consider to give support to virtual ma- chines and typical cloud services, the paper analyzes the typical architecture and characteristics of data-centers for cloud computing and virtual machines and points out that data transfer, network performance and I/O virtualization are the key but neglected factors affecting system performance, and based on the analysis, proposes an improved multi-core processor design scheme. The scheme uses the innovative technologies of on-chip memory copy engine, improved direct memory access (DMA), improved direct cache access (DCA), fast address translation and remote DMA (RDMA) to increase the performance of memory system, network, I/O and parallelism. The experimental results show that when the scheme is used, the TCP bandwidth can be increased by 48.2%, a peak bandwidth 800Mbps can be achieved in a Gigabit Ethernet, the memory copy can reach a speed up of 14 times compared with the traditional methods, the speeds of fast fourier transform (FFT) and matrix multiplication can be doubled, while the cache efficiency is significantly improved.
出处 《高技术通讯》 CAS CSCD 北大核心 2013年第4期360-367,共8页 Chinese High Technology Letters
基金 国家"核高基"科技重大专项(2010ZX01036-001-002 2009ZX01028-002-003 2009ZX01029-001-003) 国家自然科学基金(61100163 61133004)资助项目
关键词 云计算 多核处理器 网络优化 虚拟机 计算机体系结构 cloud computing, multi-core processor, networking optimization, virtual machine, computer architecture
  • 相关文献

参考文献27

  • 1Amazon ec2. http :Haws. amazon, com/ec2/. 被引量:1
  • 2Barroso L, Dean J, HSlzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003, 23 (2) : 22-28. 被引量:1
  • 3Armbrust M, Fox A. Above the Clouds: A berkeley view of cloud computing, technical Report No. UCB/EECS- 2009-28, University of California at Berkley, USA, Feb. 10, 2009. 被引量:1
  • 4Menon A, Cox A, Zwaenepoel W. Optimizing network virtualization in Xen. In: Proceedings of the ACM/USE- NIX Annual Technical Conference, Boston, USA, 2006. 被引量:1
  • 5Menon A, Santos J, Turner Y, et al. Diagnosing perform- ance overheads in the Xen virtual machine environment. In : Proceedings of the ACM/USENIX Conference on Vir- tual Execution Environments, Chicago, USA, 2005. 被引量:1
  • 6Regnier G, Makineni S, Illikkal R, et al. TCP onloading for data center servers. IEEE Transactions On Computer, 2004, 37(11):48-58. 被引量:1
  • 7Zhao L, Bhuyan L, Iyer R, et al. Hardware support for accelerating data movement in server platform. IEEE Transactions On Computer, 2007, 56(6) :740-753. 被引量:1
  • 8Conway P, Kalyanasundharam N, Donley G, et al. Cache hierarchy and memory subsystem of the AMD Opteron processor. IEEE Micro, 2010, 30(2) : 16-29. 被引量:1
  • 9Ghemawat S, Gobioff H, Leung S. The Google file sys- tem. In: Procedings of the 19th ACM Symposium on Op- erating Systems Principles, New York : ACM Press, 2003. 29-43. 被引量:1
  • 10Gogrid. http ://www. gogrid, com/. 被引量:1

二级参考文献8

  • 1Wei-WuHu Fu-XinZhang Zu-SongLi.Microarchitecture of the Godson-2 Processor[J].Journal of Computer Science & Technology,2005,20(2):243-249. 被引量:52
  • 2Hu W, Wang J, Gao X, et al. Micro-architecture of Godson 3 multi-core processor [EB/OL]//Proc of the 20th Hot Chips. 2008 [ 2008-11-20]. http://www. hotehips. org/he20/main page. htm. 被引量:1
  • 3HyperTransport Technology Consortium. HyperTransport ^TMI/O I.ink Specification Revision 1. 03[M/OL]. 2001 [2008-11- 20]. http://www. hypertransprot. org/default. elm? page = HyperTransportSpecifieationslx. 被引量:1
  • 4ARM. AMBA AXI Protocol vl. 0 Specification [M/OL]. 2004[2007-05-10]. http://www. arm. com/products/solutions/ axi_spec. html. 被引量:1
  • 5Lamport L. Time, clocks, and the ordering of events in a distributed system [J]. Cornmunnieations of the ACM, 1978, 21(7): 558-565. 被引量:1
  • 6Gharachorloo K, Lenoski D, Laudon J, et al. Memory consistency and event ordering in scalable shared-memory multi processors [C] //Proc of the 17th Int Syrup on Computer Architecture (ISCA'90), Los Alamitos: IEEE Computer SOciety, 1990: 28-31. 被引量:1
  • 7Culler D, Singh J, Gupta A. Parallel Computer Architecture [M]. San Francisco: Morgan Kaufmann, 1996. 被引量:1
  • 8胡伟武,water.chpc.ict.ac.cn,施巍松,water.chpc.ict.ac.cn,唐志敏,water.chpc.ict.ac.cn.A Framework of Memory Consistency Models[J].Journal of Computer Science & Technology,1998,13(2):110-124. 被引量:1

共引文献21

同被引文献41

  • 1Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58. 被引量:1
  • 2Buyya R,Yeo C S,Venugopal S,et al.Cloud computing and emerging IT platforms:vision,hype,and reality for delivering computing as the 5th utility[J].Future Generation Computer Systems,2009,25(6):599-616. 被引量:1
  • 3Zissis D,Lekkas D.Addressing cloud computing security issues[J].Future Generation Computer Systems,2012,28(3):583-592. 被引量:1
  • 4Fusco F,Deri L.High speed network traffic analysis with commodity multi-core systems[C]//Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement.[S.l.]:ACM,2010:218-224. 被引量:1
  • 5Teuton J,Peterson E,Nordwall D,et al.LINEBACkER:Bio-inspired data reduction toward real time network traffic analysis[C]//Proceedings of the 6th International Symposium on Resilient Control Systems(ISRCS).[S.l.]:IEEE,2013:170-174. 被引量:1
  • 6Sommer R,Paxson V.Outside the closed world:On using machine learning for network intrusion detection[C]//Proceedings of the IEEE Symposium on Security and Privacy(SP).[S.l.]:IEEE,2010:305-316. 被引量:1
  • 7Corchado E,Herreroá.Neural visualization of network traffic data for intrusion detection[J].Applied Soft Computing,2011,11(2):2042-2056. 被引量:1
  • 8Deri L,Suin S.Effective traffic measurement using ntop[J].Communications Magazine,2000,38(5):138-143. 被引量:1
  • 9Li W,Canini M,Moore A W,et al.Efficient application identification and the temporal and spatial stability of classification schema[J].Computer Networks,2009,53(6):790-809. 被引量:1
  • 10Orebaugh A,Ramirez G,Beale J.Wireshark&Ethereal network protocol analyzer toolkit[M].[S.l.]:Syngress,2006. 被引量:1

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部