MASCOTS '99. Proceedings of the Seventh International Symposium on Modeling, Analysis and Simulation of Computer and Telecommun
DOI: 10.1109/mascot.1999.805060
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of self-similarity in I/O workload using structural modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
21
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(24 citation statements)
references
References 8 publications
3
21
0
Order By: Relevance
“…As shown in the figure, the on periods appear to be heavy-tailed but not the off periods. This is consistent with results reported in [13] where the lack of heavy-tailed behavior for the off periods is attributed to periodic activity such as the sync daemon traffic. Having heavy-tailed on periods is sufficient, however, to result in self-similar aggregate traffic.…”
Section: Underpinnings Of Self-similar I/o Trafficsupporting
confidence: 92%
See 2 more Smart Citations
“…As shown in the figure, the on periods appear to be heavy-tailed but not the off periods. This is consistent with results reported in [13] where the lack of heavy-tailed behavior for the off periods is attributed to periodic activity such as the sync daemon traffic. Having heavy-tailed on periods is sufficient, however, to result in self-similar aggregate traffic.…”
Section: Underpinnings Of Self-similar I/o Trafficsupporting
confidence: 92%
“…Recently, file system activities [15] and I/O traffic [13] have been found to exhibit scale-invariant burstiness. Local and wide-area network traffic may also be more accurately modeled using statistically self-similar processes than the Poisson model(e.g., [27]).…”
Section: I/o Traffic Be Characterized By a Three-tuple Consisting Of mentioning
confidence: 99%
See 1 more Smart Citation
“…• Self-similarity in access patterns [303,292,293,396]. A possible model for file access patterns is based on a hidden Markov model (HMM) [556].…”
Section: File System Access Patternsmentioning
confidence: 99%
“…However, over the last decade, there have been many studies of storage system I/O traces (e.g. [16][17][18][19][20][21]) which consistently show that real-life arrivals to storage systems exhibit burstiness and a variety of request size distributions. Consequently, we have extended the simulator to support bulk arrivals of I/O requests at the RAID controller, making use of JINQS 's in-built support for arrivals that consist of a number of requests defined by a chosen probability distribution.…”
Section: Bulk Arrivalsmentioning
confidence: 99%