Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 505-510.

• Software Engineering & Database Technology • Previous Articles     Next Articles

In-page Wear-leveling Memory Management Based on Non-volatile Memory

SUN Qiang1, ZHUGE Qing-feng2, CHEN Xian-zhang1,3, Edwin H.-M.SHA1,2, WU Lin1   

  1. College of Computer Science,Chongqing University,Chongqing 400044,China1
    School of Computer Science and Software Engineering,East China Normal University,Shanghai 200062,China2
    College of Communication Engineering,Chongqing University,Chongqing 400044,China3
  • Online:2019-02-26 Published:2019-02-26

Abstract: Emerging non-volatile memory(NVM) is the promising next-generation storage for its advanced characteristics.However,the low endurance of NVM cells makes them vulnerable to frequent fine-grained data updates.This paper proposed a novel in-page wear-leveling memory management (IWMM) for NVM-based storage.IWMM divides pages into basic memory units to support fine-grained updates.IWMM alternatively allocates the memory units of a page with directional order allocation algorithm to distribute fine-grained updates evenly on memory cells.Experimental results show that the wear counts of IWMM can achieve 52.6% reduction over that of NVMalloc,a wear-conscious allocator.Meanwhile,the preformance of IWMM is 27.6% betterthan glibc malloc when the ratio of memory deallocation is less than 50%.

Key words: Non-volatile memory, Fine-grained, Memory management, Wear leveling

CLC Number: 

  • TP316.89
[1]BEZ R,PIROVANO A.Non-volatile memory technologies:emerging concepts and new materials[J].Materials Science in Semiconductor Processing,2004,7(4-6):349-355.
[2]HUANG F,FENG D,HUA Y,et al.A wear-leveling-aware counter mode for data encryption in non-volatile memories[C]∥Proceedings of the Conference on Design,Automation & Test in Europe. European Design and Automation Association,2017:910-913.
[3]CHEN T Y,CHANG Y H,CHEN S H,et al.Enabling write-reduction strategy for journaling file systems over byte-addressable NVRAM[C]∥2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC).IEEE,2017:1-6.
[4]SHA E H M,CHEN X,ZHUGE Q,et al.A new design of in-memory file system based on file virtual address framework[J].IEEE Transactions on Computers,2016,65(10):2959-2972.
[7]EILERT S,LEINWANDER M, MCRISENZA G.Phase Change Memory (PCM):A New Memory Technology to Enable New Memory Usage Models[C]∥IEEE International Memory Workshop.2009:1-2.
[8]CONDIT J,NIGHTINGALE E B,FROST C,et al.Better i/o through byte-addressable,persistent memory[C]∥ACM SOSP.2009:133-146.
[9]DULLOOR S R,KUMAR S,KESHAVAMURTHY A,et al. System software for persistent memory[C]∥EuroSys.2014:1-15.
[10]ARULRAJ J,PAVLO A,DULLOOR S R.Let’s talk about storage & recovery methods for non-volatile memory database systems[C]∥Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data.ACM,2015:707-722.
[11]RODEH O.B-trees,shadowing,and clones[J].ACM Transac-tions on Storage,2008,3(4):1-27.
[12]MOHAN C.Repeating history beyond aries[C]∥VLDB.1999:1-17.
[14]SCHWALB D,BERNING T,FAUST M,et al.Nvmalloc:Me-mory allocation for nvram[C]∥AWMDS@VLDB.2015:61-72.
[15]YU S,XIAO N,DENG M,et al.Redesign the memory allocator for non-volatile main memory[J].ACM Journal on Emerging Technologies in Computing Systems(JETC),2017,13(3):49.
[16]BARKER S,MISHRA A,IRWIN D,et al.Smart*:An open data set and tools for enabling research in sustainable homes[C]∥SustKDD.2012.
[17]Umass trace* data set for sustainability [OL].
[18]CHEN T Y,CHANG Y H,CHEN S H,et al.Enabling write-reduction strategy for journaling file systems over byte-addressable nvram[C]∥DAC.2017:1-6.
[19]DULLOOR S R,KUMAR S,KESHAVAMURTHY A,et al. System software for persistent memory[C]∥EuroSys.2014:1-15.
[20]SHA E H M,CHEN X,ZHUGE Q,et al.A new design of in-memory file system based on file virtual address framework[J].IEEE Transactions on Computers,2016,65(10):2959-2972.
[21]DULLOOR S R,KUMAR S,KESHAVAMURTHY A,et al. System software for persistent memory[C]∥Proceedings of the Ninth European Conference on Computer Systems.ACM,2014:15.
[22]EVANS J.A scalable concurrent glibcmalloc(3) implementation for freebsd[OL].
[23]BERGER E D,MCKINLEY K S,BLUMOFE R D,et al.Hoard:A scalable memory allocator for multithreaded applications[C]∥ASPLOS IX.2000:117-128.
[24]BHANDARI K,CHAKRABARTI D R,BOEHM H J.Makalu:Fastrecoverable allocation of non-volatile memory[C]∥ACM OOP-SLA.2016:677-694.
[1] LIU Yang, JIN Zhong. Fine-grained Image Recognition Method Combining with Non-local and Multi-region Attention Mechanism [J]. Computer Science, 2021, 48(1): 197-203.
[2] WANG Xin-xin, ZHUGE Qing-feng, WU Lin. Method for Simulating and Verifying NVM-based In-memory File Systems [J]. Computer Science, 2020, 47(9): 74-80.
[3] DENG Yi-jiao, ZHANG Feng-li, CHEN Xue-qin, AI Qing, YU Su-zhe. Collaborative Attention Network Model for Cross-modal Retrieval [J]. Computer Science, 2020, 47(4): 54-59.
[4] YAO Lin-li, CHEN Shi-zhe, JIN Qin. Fine-grained Facial Makeup Image Ordering via Language [J]. Computer Science, 2020, 47(12): 161-168.
[5] WANG Tao, LIANG Xiao, WU Qian-qian, WANG Peng, CAO Wei, SUN Jian-ling. Logless Hash Table Based on NVM [J]. Computer Science, 2019, 46(9): 66-72.
[6] LI Hong-mei, DIAO Xing-chun, CAO Jian-jun, FENG Qin, ZHANG Lei. Tag-aware Recommendation Method with Implicit Feedback [J]. Computer Science, 2019, 46(4): 36-43.
[7] DENG Yao, JI Wen-li, LI Yong-jun, GAO Xing. Fine-grained Geolocalisation of User Generated Short Text Based on LBSN [J]. Computer Science, 2019, 46(10): 316-321.
[8] LI Yue,WANG Fang. Survey on Storage Security of Emerging Non-volatile Memory [J]. Computer Science, 2018, 45(7): 53-60.
[9] HOU Ze-yi, WAN Hu, XU Yuan-chao. NMST:A Persistent Memory Management Optimization Approach Based on Segment Tree [J]. Computer Science, 2018, 45(7): 78-83.
[10] LI Xiao-rong, SONG Zi-ye, REN Jing-yi, XU Lei and XU Chun-gen. Attribute-based Searchable Encryption of Electronic Medical Records in Cloud Computing [J]. Computer Science, 2017, 44(Z11): 342-347.
[11] MENG Hong-tao, YU Song-ping, LIU Fang and XIAO Nong. Research on Memory Management and Cache Replacement Policies in Spark [J]. Computer Science, 2017, 44(6): 31-35.
[12] JING Jing, JIANG Lie-hui, HE Hong-qi and ZHANG Yuan-yuan. Fine-grained Variable Entity Identification Algorithm Based on Memory Access Model [J]. Computer Science, 2015, 42(9): 171-176.
[13] YU Kuan-long,CHEN Yu,MAO Jun-jie and ZHANG Lei. ARM-MuxOS:A System Architecture to Support Multiple Operating Systems on Single Mobile Device [J]. Computer Science, 2014, 41(10): 7-11.
[14] FANG Zhong-jin,XIA Zhi-hua and ZHOU Shu. Research on Access Control Policy of Meteorological Cloud Data with Attribute-based Encryption [J]. Computer Science, 2013, 40(12): 205-207.
[15] SHI Jie,ZHU Hong,FEND Yu-cai. Dynamical Query Modification Algorithm for Fine-grained Access Control in Databases [J]. Computer Science, 2010, 37(12): 130-133.
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .