FAWN - Fast Array of Wimpy Nodes
David G. Andersen et al.
Presented by: Ravi Kiran Boggavarapu 1001541261
FAWN - Fast Array of Wimpy Nodes David G. Andersen et al. - - PowerPoint PPT Presentation
FAWN - Fast Array of Wimpy Nodes David G. Andersen et al. Presented by: Ravi Kiran Boggavarapu 1001541261 A cluster architecture for low-power and data-intensive computing. Wimpy nodes = A combination of low-power CPUs and small
Presented by: Ravi Kiran Boggavarapu 1001541261
○ design centers around log-structured datastores that provide high performance on flash.
○ Increase performance while minimizing power consumption -- Save the electricity bills of the Data Centers!
○ This paper uses queries per Joule as metric. FAWN handles roughly 350 k-v qpJ.
2
The above photo is taken from: http://www.cs.cmu.edu/~fawnproj/
3
○ Fast random reads. ○ Efficient power consumption for I/O
○ Small writes on flash are very expensive. ○ Updating a single page requires first erasing the entire block of pages and writing the entire modified block.
4
Trade-offs of using Flash:
5
Log-structured datastore
Q1) “The workloads these systems support share several characteristics, they are:
Why workloads of these characteristics represent a challenge to the system design?
6
Ans - Q1)
bottleneck often cause low CPU utilization."
7
Q2) “The key design choice in FAWN-KV is the use of a log structured per-node datastore called FAWN-DS that provides high performance reads and writes using flash memory.” “These performance problems motivate log-structured techniques for flash filesystems and data structures” What key benefit does a log structured data organization bring to the KV store design?
8
Ans - Q2)
disk.
9
Q3) “To provide this property, FAWN-DS maintains an in-DRAM hash table (Hash Index) that maps keys to an offset in the append-only Data Log on flash.”
10
Ans - Q3)
node(Linked List).
11
Q4) “It stores only a fragment of the actual key in memory to find a location in the log;” Is there concern on correctness of this design?
12
Ans - Q4)
○ Reads the full key from the log and verifies it with the key it read. ○ Therefore, no worries about the correctness.
13
Q5) Explain "Basic functions:" Store, Lookup, Delete
14
Ans - Q5)
○ appends entry log updates the corresponding hash table entry.
○ gets offset from hash entry and indexes into Data log, and returns the data blob
○ invalidates the hash entry by clearing the valid flag. ○ appends Delete entry to the log.
Figure copied from http://vijay.vasu.org/static/talks/fawn-sosp2009-slides.pdf
15
Q6) “As an optimization, FAWN-DS periodically checkpoints the index by writing the Hash Index and a pointer to the last log entry to flash.” Why does this checkpointing help with the recovery efficiency? Why is a Delete entry needed in the log for a correct recovery?
16
Ans - Q6)
○ After a failure only the contents starting from the checkpoint are necessary to create the Hash Index.
○ Fault tolerance. ○ Avoid random writes to disks.
17
18