Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Storage Workload Identification

View through CrossRef
Storage workload identification is the task of characterizing a workload in a storage system (more specifically, network storage system—NAS or SAN) and matching it with the previously known workloads. We refer to storage workload identification as “workload identification” in the rest of this article. Workload identification is an important problem for cloud providers to solve because (1) providers can leverage this information to colocate similar workloads to make the system more predictable and (2) providers can identify workloads and subsequently give guidance to the subscribers as to associated best practices (with respect to configuration) for provisioning those workloads. Historically, people have identified workloads by looking at their read/write ratios, random/sequential ratios, block size, and interarrival frequency. Researchers are well aware that workload characteristics change over time and that one cannot just take a point in time view of a workload, as that will incorrectly characterize workload behavior. Increasingly, manual detection of workload signature is becoming harder because (1) it is difficult for a human to detect a pattern and (2) representing a workload signature by a tuple consisting of average values for each of the signature components leads to a large error. In this article, we present workload signature detection and a matching algorithm that is able to correctly identify workload signatures and match them with other similar workload signatures. We have tested our algorithm on nine different workloads generated using publicly available traces and on real customer workloads running in the field to show the robustness of our approach.
Title: Storage Workload Identification
Description:
Storage workload identification is the task of characterizing a workload in a storage system (more specifically, network storage system—NAS or SAN) and matching it with the previously known workloads.
We refer to storage workload identification as “workload identification” in the rest of this article.
Workload identification is an important problem for cloud providers to solve because (1) providers can leverage this information to colocate similar workloads to make the system more predictable and (2) providers can identify workloads and subsequently give guidance to the subscribers as to associated best practices (with respect to configuration) for provisioning those workloads.
Historically, people have identified workloads by looking at their read/write ratios, random/sequential ratios, block size, and interarrival frequency.
Researchers are well aware that workload characteristics change over time and that one cannot just take a point in time view of a workload, as that will incorrectly characterize workload behavior.
Increasingly, manual detection of workload signature is becoming harder because (1) it is difficult for a human to detect a pattern and (2) representing a workload signature by a tuple consisting of average values for each of the signature components leads to a large error.
In this article, we present workload signature detection and a matching algorithm that is able to correctly identify workload signatures and match them with other similar workload signatures.
We have tested our algorithm on nine different workloads generated using publicly available traces and on real customer workloads running in the field to show the robustness of our approach.

Related Results

COMPREHENSIVE METHOD OF ENERGY-EFFICIENT WORKLOAD PROCESSING IN THE INFORMATION AND COMMUNICATION NETWORK
COMPREHENSIVE METHOD OF ENERGY-EFFICIENT WORKLOAD PROCESSING IN THE INFORMATION AND COMMUNICATION NETWORK
Background. Peculiarities of the workload in a modern information and communication network (ICN) determine specific requirements for energy efficiency, performance and availabilit...
Maintaining Inter-Layer Equilibrium in Hierarchical-Storage-based KV Store
Maintaining Inter-Layer Equilibrium in Hierarchical-Storage-based KV Store
Modern storage technologies aim to enhance performance and lower costs. With advances in storage devices, numerous studies propose key-value store designs for heterogeneous storage...
Relationship between nurses knowledge level and workload about implementation of patient identification
Relationship between nurses knowledge level and workload about implementation of patient identification
Patient safety incidents can originate from patient identification errors. From the preliminary study, it was found that there were 3 cases of patient identification errors in the ...
Staffing and Workload in Primary Care Facilities of Selected Geographically Isolated and Disadvantaged Communities in the Philippines
Staffing and Workload in Primary Care Facilities of Selected Geographically Isolated and Disadvantaged Communities in the Philippines
Background and Objective. Staffing shortages and health inequities are persistent barriers in the Philippines toward achieving universal health care. To ensure an adequate and resp...
Switching control strategy for an energy storage system based on multi-level logic judgment
Switching control strategy for an energy storage system based on multi-level logic judgment
Energy storage is a new, flexibly adjusting resource with prospects for broad application in power systems with high proportions of renewable energy integration. However, energy st...
THE WORKLOAD ANALYSIS OF EMPLOYEE BY USING NATIONAL AERONAUTICS AND SPACE ADMINISTRATION-TASK LOAD INDEX METHOD (NASA-TLX)
THE WORKLOAD ANALYSIS OF EMPLOYEE BY USING NATIONAL AERONAUTICS AND SPACE ADMINISTRATION-TASK LOAD INDEX METHOD (NASA-TLX)
Development of manufacturing and service institutions can not be separated from the role of human resources. Human resources have an important role in fulfilling vision and mission...
Optimizing Multimodal Alarm Design for Attention Allocation in Discrete Monitoring Tasks
Optimizing Multimodal Alarm Design for Attention Allocation in Discrete Monitoring Tasks
Discrete monitoring tasks are common in scenarios such as flight missions, air traffic control, nuclear power plant monitoring, and clinical healthcare. In these tasks, operators p...

Back to Top