1998
DOI: 10.1145/290274.290317
|View full text |Cite
|
Sign up to set email alerts
|

Automatic modeling of file system workloads using two-level arrival processes

Abstract: This article describes a method for analyzing, modeling, and simulating a two-level arrivalcounting process. This method is particularly appropriate when the number of independent processes is large, as is the case in our motivating application which requires analyzing and representing computer file system trace data for activity on nearly 8,000 files. The method is also applicable to network trace data characterizing communication patterns between pairs of computers. We apply cluster analysis to separate the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…This motivates the idea of adjusting the thresholds and using a customized value for each individual user. The idea of using user-specific thresholds has been proposed before by Murray et al [18] (and essentially the same idea was suggested even earlier by Ware et al in the context of file-access patterns [26]). Given data about a single user's intervals between queries, they suggested the following algorithm to find a threshold to distinguish between short and long intervals.…”
Section: Finding Sessions Using Per-user Thresholdsmentioning
confidence: 90%
“…This motivates the idea of adjusting the thresholds and using a customized value for each individual user. The idea of using user-specific thresholds has been proposed before by Murray et al [18] (and essentially the same idea was suggested even earlier by Ware et al in the context of file-access patterns [26]). Given data about a single user's intervals between queries, they suggested the following algorithm to find a threshold to distinguish between short and long intervals.…”
Section: Finding Sessions Using Per-user Thresholdsmentioning
confidence: 90%
“…The I/O operations on a file have also been shown to be bursty, and are well modeled by a two-level process [721]. The top level defines the arrivals of bursts and their durations.…”
Section: File System Activitymentioning
confidence: 99%
“…A completely different approach is to use clustering, in which jobs that are adjacent to each other form clusters that represent sessions [721,74,508]. This technique also has the advantage of tailoring the threshold for each user separately, rather than assuming that a single threshold is suitable for all users [482].…”
Section: End Boxmentioning
confidence: 99%
“…With regard to application model, some works have been proposed in characterizations and modeling of I/O access pattern [9][10][11][12][13][14]. Most of these studies were made at the file system level.…”
Section: Related Workmentioning
confidence: 99%