Fedorova, Alexandra, Kostas Magoutis, Salimah Addetia, and Margo Seltzer. 2003. “Making the Most out of Direct-Access Network Attached Storage.” USENIX.
Ellard, Daniel, Michael Mesnier, Eno Thereska, Gregory R. Ganger, and Margo Seltzer. 2003. “Attribute-Based Prediction of File Properties,” no. 14-03. Cambridge, Massachusetts. Publisher's Version Abstract
We present evidence that attributes that are known to the file system when a file is created, such as its name, permission mode, and owner, are often strongly related to future properties of the file such as its ultimate size, lifespan, and access pattern. More importantly, we show that we can exploit these relationships to automatically generate predictive models for these properties, and that these predictions are sufficiently accurate to enable optimizations.
Ellard, Daniel, and James Megquier. 2003. “DISP: Practical, Efficient, Secure and Fault Tolerant Data Storage for Distributed Systems,” no. 17-03. Cambridge, Massachusetts. Publisher's Version Abstract
We present DISP, a practical, efficient and secure client/server protocol for data storage and retrieval in a distributed environment and show how this protocol can tolerate Byzantine failure. We discuss variations on DISP that can be used as building blocks for different applications, and measure the performance of DISP on commodity hardware.
Ellard, Daniel. 2003. “The File System Interface is an Anachronism,” no. 15-03. Cambridge, Massachusetts. Publisher's Version Abstract
Contemporary file systems implement a set of abstractions and semantics that are suboptimal for many (if not most) purposes. The philosophy of using the simple mechanisms of the file system as the basis for a vast array of higher-level mechanisms leads to inefficient and incorrect implementations. We propose several extensions to the canonical file system model, including explicit support for lock files, indexed files, and resource forks, and the benefit of session semantics for write updates. We also discuss the desirability of application-level file system transactions and file system support for versioning.
Zhu, Ningning, Jiawu Chen, Tzi-cker Chiueh, and Daniel Ellard. 2003. “An NFS Trace Player for File System Evaluation,” no. 16-03. Cambridge, Massachusetts. Publisher's Version Abstract
File system traces have been used in simulation of specific design techniques such as disk scheduling, in workload characterization and modeling, and in identifying interesting file access patterns for performance optimizations. Suprisingly they are rarely used to test the correctness and to evaluate the performance of an actuaal file system or server. The main reason is that up until now there did not exist a flexible and easy-to-use trace player that, given an input trace, can properly initialize the test file system and replay the trace to the test system in such a way that respects dependency constraints among file access requests in the trace. This paper describes the design, implementation, and evaluation of an NFS trace play-back tool called FEUT (File system Evaluation Using Traces), which can automatically derive the initial file system image from a trace, speed up or slow down a trace play-back using temporal or spatial scaling, and features a highly efficient implementation that minimizes the CPU and disk I/O overhead during trace play-back. Experiments using a large NFS trace set show that trace-driven file system evaluation can indeed produce substantially different throughput and latency measurements than synthetic benchmarks such as SPECsfs, and FEUT’s trace player is actually more efficient than SPECsfs’s workload generator despite the fact that the former requires more CPU computation and disk I/O accesses.
Ellard, Daniel, Jonathan Ledlie, and Margo Seltzer. 2003. “The Utility of File Names,” no. 05-03. Cambridge, Massachusetts. Publisher's Version Abstract
For typical workloads and file naming conventions, the size, lifespan, read/write ratio, and access pattern of nearly all files in a file system are accurately predicted by the name given to the file when it is created. We discuss some name-related properties observed in three contemporary NFS workloads, and present a method for automatically creating name-based models to predict interesting file properties of new files, and analyze the accuracy of these models for our workloads. Finally, we show how these predictions can be used as hints to optimize the strategies used by the file system to manage new files when they are created.
Fedorova, Alexandra, Margo Seltzer, Kostas Magoutis, and Salimah Addetia. 2003. “Application Performance on the Direct Access File System,” no. 01-03. Cambridge, Massachusetts. Publisher's Version Abstract
The Direct Access File System (DAFS) is a distributed file system built on top of direct-access transports (DAT). Direct-access transports are characterized by using remote direct memory access (RDMA) for data transfer and user-level networking. The motivation behind the DAT-enabled distributed file system architecture is the reduction of the CPU overhead on the I/O data path. In collaboration with Duke University we have created and made available an open-source implementation of DAFS for the FreeBSD platform. In this paper we describe a performance evaluation study of DAFS that was performed with this software. The goal of this work is to determine whether the architecture of DAFS brings any fundamental performance benefits to applications compared to traditional distributed file systems. In our study we compare DAFS to a version of NFS optimized to reduce the I/O overhead. We conclude that DAFS can accomplish superior performance for latency-sensitive applications, outperforming NFS by up to a factor of 2. Bandwidth-sensitive applications do equally well on both systems, unless they are CPU-intensive, in which case they perform better on DAFS. We also found that RDMA is a less restrictive mechanism to achieve copy avoidance than that used by the optimized NFS.
Ellard, Daniel, and Margo Seltzer. 2003. “New NFS Tracing Tools and Techniques for System Analysis.” 2003 Large Installation Systems Administration Conference. Publisher's Version Abstract
Passive NFS traces provide an easy and unobtrusive way to measure, analyze, and gain an understanding of an NFS workload. Historically, such traces have been used primarily by file system researchers in an attempt to understand, categorize, and generalize file system workloads. However, because such traces provide a wealth of detailed information about how a specific system is actually used, they should also be of interest to system administrators. We introduce a new open-source toolkit for passively gathering and summarizing NFS traces and show how to use this toolkit to perform analyses that are difficult or impossible with existing tools.
Shneidman, Jeffrey, and David C. Parkes. 2003. “Rationality and Self-Interest in Peer to Peer Networks.” Second International Workshop on Peer-to-Peer Systems (IPTPS 2003). Publisher's Version Abstract
Much of the existing work in peer to peer networking assumes that users will follow prescribed protocols without deviation. This assumption ignores the user’s ability to modify the behavior of an algorithm for self-interested reasons. We advocate a different model in which peer to peer users are expected to be rational and self-interested. This model is found in the emergent fields of Algorithmic Mechanism Design (AMD) and Distributed Algorithmic Mechanism Design (DAMD), both of which introduce game-theoretic ideas into a computational system. We, as designers, must create systems (peer to peer search, routing, distributed auctions, resource allocation, etc.) that allow nodes to behave rationally while still achieving good overall system outcomes. This paper has three goals. The first is to convince the reader that rationality is a real issue in peer to peer networks. The second is to introduce mechanism design as a tool that can be used when designing networks with rational nodes. The third is to describe three open problems that are relevant in the peer to peer setting but are unsolved in existing AMD/DAMD work. In particular, we consider problems that arise when a networking infrastructure contains rational agents.
Ellard, Daniel, and Margo Seltzer. 2003. “NFS Tricks and Benchmarking Traps.” 2003 USENIX Technical Conference Freenix Track. Publisher's Version Abstract
We describe two modifications to the FreeBSD 4.6 NFS server to increase read throughput by improving the read-ahead heuristic to deal with reordered requests and stride access patterns. We show that for some stride access patterns, our new heuristics improve end-to-end NFS throughput by nearly a factor of two. We also show that benchmarking and experimenting with changes to an NFS server can be a subtle and challenging task, and that it is often difficult to distinguish the impact of a new algorithm or heuristic from the quirks of the underlying software and hardware with which they interact. We discuss these quirks and their potential effects.
Ellard, Daniel, Jonathan Ledlie, Pia Malkani, and Margo Seltzer. 2003. “Passive NFS Tracing of Email and Research Workloads.” 2003 USENIX Conference on File and Storage Technologies. Publisher's Version Abstract
We present an analysis of a pair of NFS traces of contemporary email and research workloads. We show that although the research workload resembles previously-studied workloads, the email workload is quite different. We also perform several new analyses that demonstrate the periodic nature of file system activity, the effect of out-of-order NFS calls, and the strong relationship between the name of a file and its size, lifetime, and access pattern.
Welsh, Matt. 2003. “Exposing Resource Tradeoffs in Region-Based Communication Abstractions for Sensor Networks.” Second ACM Workshop on Hot Topics in Networks (HotNets-II). Publisher's Version
Gay, David, Phil Levis, Rob von Behren, Matt Welsh, Eric Brewer, and David Culler. 2003. “The nesC Language: A Holistic Approach to Networked Embedded Systems.” Programming Language Design and Implementation (PLDI 2003). Publisher's Version
Levis, Philip, Nelson Lee, Matt Welsh, and David Culler. 2003. “TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications.” First ACM Conference on Embedded Networked Sensor Systems (SenSys’03). Publisher's Version
Stein, Christopher A, Michael J Tucker, and Margo I Seltzer. 2002. “Building a reliable mutable file system on peer-to-peer storage.” Reliable Distributed Systems, 2002. Proceedings. 21st IEEE Symposium on, 324–329. IEEE.
Stein, CA, Michael J Tucker, and Margo I Seltzer. 2002. “Reliable and fault-tolerant peer-to-peer block storage”.
Shneidman, Jeffrey, Bryan Choi, and Margo Seltzer. 2002. “Collecting data for one hundred years.” Harvard University.
LoVerso, Susan J, and Margo I Seltzer. 2002. “Tree Houses and Real Houses: Research and Commercial Software.” WIESS, 55–68.
Fischer, Robert, and Margo I Seltzer. 2002. “Clilets: Web Applications with Secure Client-Side Storage”.