File type and access pattern aware buffer cache management for rendering systems

Kyungwoon Cho, Hyokyung Bahn

Research output: Contribution to journalArticlepeer-review

6 Scopus citations


Rendering is the process of generating high-resolution images by software, which is widely used in animation, video games and visual effects in movies. Although rendering is a computation-intensive job, we observe that storage accesses may become another performance bottleneck in desktop-rendering systems. In this article, we present a new buffer cache management scheme specialized for rendering systems. Unlike general-purpose computing systems, rendering systems exhibit specific file access patterns, and we show that this results in significant performance degradation in the buffer cache system. To cope with this situation, we collect various file input/output (I/O) traces of rendering workloads and analyze their access patterns. The results of this analysis show that file I/Os in rendering processes consist of long loops for configuration, short loops for texture input, random reads for input, and single-writes for output. Based on this observation, we propose a new buffer cache management scheme for improving the storage performance of rendering systems. Experimental results show that the proposed scheme improves the storage I/O performance by an average of 19% and a maximum of 55% compared to the conventional buffer cache system.

Original languageEnglish
Article number164
JournalElectronics (Switzerland)
Issue number1
StatePublished - Jan 2020

Bibliographical note

Funding Information:
Funding: This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2016R1A6A3A11930295 and IITP 2018-0-00549).

Publisher Copyright:
© 2020 by the authors. Licensee MDPI, Basel, Switzerland.


  • Buffer cache
  • File I/O
  • Loop
  • Random access
  • Rendering


Dive into the research topics of 'File type and access pattern aware buffer cache management for rendering systems'. Together they form a unique fingerprint.

Cite this