A Threshold - based Strategy for DynamicRecon guration of RAID Systems *
نویسندگان
چکیده
Emerging applications make increasing use of shared and distributed data. Workload adaptive storage based on RAID (Redundant Arrays of Independent Disks) is currently the most suitable technology to fulll storage needs and to manage multi-source access with variable characteristics in terms of arrival frequency, mean size and access type (read/write). However, workload adaptive storage suuers from a high data migration cost. The Dynamic Redundancy method improves on workload adaptive storage by reducing data migration signiicantly, and even suppressing it in some cases. This document aids the practical realisation of Dynamic Redundancy by presenting a strategy for identifying the optimal storage layout for a given workload and the thresholds at which the current storage layout should be transformed. This strategy takes account of hardware parameters, as well as the global data access proole of currently executing applications. Simulation results reveal two kinds of Dynamic Reconnguration, one driven by the mean request size and one driven by the percentage of write requests. We present a table of lower bound thresholds showing when each kind of reconnguration should be employed.
منابع مشابه
No More Energy-Performance Trade-Off: A New Data Placement Strategy for RAID-Structured Storage Systems
Many real-world applications like Video-On-Demand (VOD) and Web servers require prompt responses to access requests. However, with an explosive increase of data volume and the emerging of faster disks with higher power requirements, energy consumption of disk based storage systems has become a salient issue. To achieve energy-conservation and prompt responses simultaneously, in this paper we pr...
متن کاملOn the design and security of a lattice-based threshold secret sharing scheme
In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...
متن کاملA Multi-Stage Single-Machine Replacement Strategy Using Stochastic Dynamic Programming
In this paper, the single machine replacement problem is being modeled into the frameworks of stochastic dynamic programming and control threshold policy, where some properties of the optimal values of the control thresholds are derived. Using these properties and by minimizing a cost function, the optimal values of two control thresholds for the time between productions of two successive nonco...
متن کاملRAIDs Performance evaluation based on Queuing Theory and Fuzzy Queue Theory
In today's computer architectures, the con guration of the storage system as well as the distribution of blocks within them have a big impact on the system's performance. Different RAIDs levels can have a signi cant in uence on cost, reliability, scalability as well as performance. In this paper, we propose a basic fuzzy queueing model (M/M/1) to evaluate the fuzzy arrival rate as well as the ...
متن کاملModeling the aging process of flash storage by leveraging semantic I/O
The major advantages of flash memory such as small physical size, no mechanical components, low power consumption, and high performance have made it likely to replace the magnetic disk drives in more and more systems. Many research efforts have been invested in employing flash memory to build high performance and large-scale storage systems for data-intensive applications. However, the enduranc...
متن کامل