Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Memory redundancy eliminating method

A redundancy elimination and memory technology, applied in the direction of memory address/allocation/relocation, etc., can solve the problem of data redundancy in memory, and achieve the effect of improving memory usage efficiency and improving usage efficiency.

Inactive Publication Date: 2012-10-10
NANJING UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing operating systems use technologies such as shared memory and copy-on-write (Copy-On-Write) when processes are created to save memory, but there are still quite a lot of memory areas that contain the same content, resulting in data in the memory. redundancy
These redundant contents come from different disk blocks or different applications, so it is a difficult problem that traditional computer system memory technology cannot solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Memory redundancy eliminating method
  • Memory redundancy eliminating method
  • Memory redundancy eliminating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] This embodiment discloses a method for eliminating memory redundancy in a cloud computing environment based on the division of physical page frames of memory area blocks, including the following steps:

[0055] Step 1, using virtualization technology to manage the memory block division method to divide the computer memory into different physical page frames, by scanning the page table managed by the computer virtual memory, selecting one of the physical page frames, and initializing the search data structure;

[0056] Step 2, using an encrypted hash function or a non-encrypted hash function to calculate the hash value of all or part of the content of the currently selected physical page frame as the hash value of the currently selected physical page frame;

[0057] Step 3, from the search data structure, find whether there is any other physical page frame whose hash value is the same as the hash value of the physical page frame in step 2;

[0058] Step 4, if yes, determ...

Embodiment 2

[0066] This embodiment discloses a method for eliminating memory redundancy in a cloud computing environment based on an operating system mapping memory block division method. Based on the characteristics of the platform, it is assumed that the implementer determines that the redundancy granularity of the memory is large, and the hardware provides special optimization for the encryption Hash function SHA1 (such as VIA's C7 processor chip).

[0067] Such as Figure 4 As shown, assuming that the existing process P in the system 1 ,P 2 、…P i etc., each of which has a different number of mapped memory area blocks, which are linked in their respective process control blocks (PCBs) in order of addresses.

Embodiment example

[0068] This implementation case includes the following steps:

[0069] Step 1. Divide the system memory into different memory blocks based on the operating system mapped memory block (the memory mapped block generated by the mmap system call), according to the double order of the process number in the system from large to small, and the process address from large to small The standard selects the first memory block. Initialize the search data structure as an empty red-black tree (contains 0 tree nodes);

[0070] Step 2, initialize the encryption engine used by the CPU (C7) to calculate the SHA1 hash value, fill all the contents of the selected memory area into the engine and execute the SHA1 calculation to obtain a 160-bit hash value H;

[0071] Step 3, from the search data structure, red-black tree, find whether there are other memory areas with the same hash value as the selected memory area in step 2;

[0072] Step 4, if yes, consider that the contents of the two memory a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a memory redundancy eliminating method. The method comprises the steps of: 1, dividing a computer memory into different areas and selecting; 2, calculating the Hash value of a current selected area block; 3, searching for whether the Hash value of other area blocks is identical to that in the area block in the step 2; 4, if so, judging that the two area blocks are probably same and switching to step 6; 5, adding the area block and the Hash value into a searching data structure and switching to step 10; 6, if an encrypted Hash function is adopted in the step 2 and all contents of the area block are calculated by the Hash function, switching to step 8; 7, comparing whether the contents of the two area blocks are completely same or not; 8, replacing the index of one of the area blocks by the index of the other; 9, releasing the area block with the replaced index; and 10, selecting an area block from the residual area blocks and returning to the step 2.

Description

technical field [0001] The invention relates to the field of computer system optimization, in particular to a method for eliminating memory redundancy of a computer using RAM (Random Access Memory). Background technique [0002] With the continuous development of memory chip technology, contemporary computer systems are equipped with more and more memory, and the content stored in the memory is becoming more and more abundant. However, with the rise of technologies such as cloud computing, memory in computer systems is still a scarce resource compared to hard disks. Existing operating systems use technologies such as shared memory and copy-on-write (Copy-On-Write) when processes are created to save memory, but there are still quite a lot of memory areas that contain the same content, resulting in data in the memory. redundancy. These redundant contents come from different disk blocks or different application programs, so it is a difficult problem that traditional computer ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/12G06F12/02
Inventor 夏耐
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products