2014 IEEE International Conference on Cluster Computing (CLUSTER) 2014
DOI: 10.1109/cluster.2014.6968743
|View full text |Cite
|
Sign up to set email alerts
|

How file access patterns influence interference among cluster applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…Performance observed when accessing a PFS is highly dependent on the way this access is performed, i.e. on the application's access pattern [3], [4]. For instance, higher performance is achieved when accessing sequentially positioned portions of a file in large requests as opposed to accessing small sparse portions.…”
Section: Introductionmentioning
confidence: 99%
“…Performance observed when accessing a PFS is highly dependent on the way this access is performed, i.e. on the application's access pattern [3], [4]. For instance, higher performance is achieved when accessing sequentially positioned portions of a file in large requests as opposed to accessing small sparse portions.…”
Section: Introductionmentioning
confidence: 99%
“…In our previous work, we analyzed write access patterns and their effect on interference [6]. In this work, we expand on the topic with a more realistic checkpointing pattern, evaluate how the interference potential depends on the number of processes the application runs with, and confirm our findings with a larger set of production codes.…”
Section: Introductionmentioning
confidence: 54%
“…On systems with limited metadata resources such patterns can quickly create a bottleneck at scale. Compared to our previous work [6], we have updated the open-write-close pattern to create a new file in each iteration, mimicking the checkpointing pattern in a more realistic fashion.…”
Section: File Access Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although PFSs provide a high I/O parallelism, some workloads face low performance because of their access patterns. Some optimization approaches exist, for instance, for workloads with small() and non‐contiguous() I/O requests, which are well‐known examples of problematic access patterns.…”
Section: Introductionmentioning
confidence: 70%