IO Workload Characterization Revisited: A Data-Mining Approach

被引:26
|
作者
Seo, Bumjoon [1 ,2 ]
Kang, Sooyong [3 ]
Choi, Jongmoo [4 ]
Cha, Jaehyuk [3 ]
Won, Youjip [3 ]
Yoon, Sungroh [1 ]
机构
[1] Seoul Natl Univ, Dept Elect & Comp Engn, Seoul 151744, South Korea
[2] Samsung SDS Co LTD, Emerging Technol Lab, Seoul 135280, South Korea
[3] Hanyang Univ, Dept Comp Sci & Engn, Seoul 133791, South Korea
[4] Dankook Univ, Dept Software, Yongin 448701, South Korea
基金
新加坡国家研究基金会;
关键词
IO workload characterization; storage and operating systems; SSD; clustering; classification; FLASH TRANSLATION LAYER;
D O I
10.1109/TC.2013.187
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past few decades, IO workload characterization has been a critical issue for operating system and storage community. Even so, the issue still deserves investigation because of the continued introduction of novel storage devices such as solid-state drives (SSDs), which have different characteristics from traditional hard disks. We propose novel IO workload characterization and classification schemes, aiming at addressing three major issues: (i) deciding right mining algorithms for IO traffic analysis, (ii) determining a feature set to properly characterize IO workloads, and (iii) defining essential IO traffic classes state-of-the-art storage devices can exploit in their internal management. The proposed characterization scheme extracts basic attributes that can effectively represent the characteristics of IO workloads and, based on the attributes, finds representative access patterns in general workloads using various clustering algorithms. The proposed classification scheme finds a small number of representative patterns of a given workload that can be exploited for optimization either in the storage stack of the operating system or inside the storage device.
引用
收藏
页码:3026 / 3038
页数:13
相关论文
共 50 条
  • [21] DATA-MINING DYNAMITE
    KRIVDA, CD
    BYTE, 1995, 20 (10): : 97 - &
  • [22] Elucidation of drivers for cancer initiation and metastasis: a data-mining approach
    Xu, Ying
    2013 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE (BIBM), 2013,
  • [23] A New Data-Mining Based Approach for Network Intrusion Detection
    Dartigue, Christine
    Jang, Hyun Ik
    Zeng, Wenjun
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 372 - 377
  • [24] Safety analysis on a vibrating prismatic body: A data-mining approach
    Sugumaran, V.
    Kumar, R. Ajith
    Gowda, B. H. L.
    Sohn, C. H.
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) : 6605 - 6612
  • [25] Predicting customer demand for remanufactured products: A data-mining approach
    Truong Van Nguyen
    Zhou, Li
    Chong, Alain Yee Loong
    Li, Boying
    Pu, Xiaodie
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2020, 281 (03) : 543 - 558
  • [26] Prediction of Status Patterns of Wind Turbines: A Data-Mining Approach
    Kusiak, Andrew
    Verma, Anoop
    JOURNAL OF SOLAR ENERGY ENGINEERING-TRANSACTIONS OF THE ASME, 2011, 133 (01):
  • [27] Combustion efficiency optimization and virtual testing: A data-mining approach
    Kusiak, Andrew
    Song, Zhe
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2006, 2 (03) : 176 - 184
  • [28] Analyzing bearing faults in wind turbines: A data-mining approach
    Kusiak, Andrew
    Verma, Anoop
    RENEWABLE ENERGY, 2012, 48 : 110 - 116
  • [29] Data-mining approach evaluates production performance in the Permian Basin
    1600, Society of Petroleum Engineers (SPE) (73):
  • [30] Factory cycle-time prediction with a data-mining approach
    Backus, Phillip
    Janakiram, Mani
    Mowzoon, Shahin
    Runger, George C.
    Bhargava, Arnit
    IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, 2006, 19 (02) : 252 - 258