Unformatted text preview:

MM File ManagementAnnouncementsPhysical Disk StructureMeasures of PerformanceZoned Bit RecordingFile SystemAllocation MethodsContinuousLinkedConstrainedStriping (RAID-0)MM File System RequirementsMeeting the RequirementsZipfs LawApply to File AllocationScheduling AlgorithmsFCFSSSTFSCAN and C-SCANEDFSCAN-EDFAdmission ControlMathematical SetupSetup (cont.)Number of Disk BlocksLatencyMaximum LatencyTransfer TimeAdmission for Real-Time ClientsAdmission for Non RT ClientsSlide 31ExampleMM File ManagementKarrie Karahlaios and Brian P. BaileySpring 2007AnnouncementsPhysical Disk Structure•Sector•Track•Platter•Cylinder•R/W head•Example–16 heads x 1400 cyls x 16 sectors/track x 512 bytes/sector = 183.5MBMeasures of Performance•Seek time (ms)–time to move disk arm to a specific track•Latency (ms)–time for sector to rotate under disk arm•Transfer rate (Mbps)–data that can be read in one time unitZoned Bit Recording•Utilize larger, outer tracks–early disks could not handle varying number of sectors / track–reduce density of outer sectors•Each zone (set of tracks) has variable number of sectors–outer part can hold more data and support higher transfer ratesFile System•Mapped onto physical disk structure–want to match user’s conceptual model•Collection of files and directories–file is logical storage unit–directories contain information about files (names, type, location, size, protection, etc.)•Basic operations–create, write, read, reposition, delete–sequential and random accessAllocation Methods•Contiguous•Linked•Constrained•Striping•… and many othersContinuous•Occupy contiguous set of blocks•Strengths–minimizes seek time–supports sequential and random access•Weaknesses–suffers external fragmentationLinked•Stored as a linked list of blocks•Strengths–eliminates external fragmentation–supports files of arbitrary length•Weaknesses–random access slow, overhead of pointers–susceptible to block errorsConstrained•Linked structure, but allocate next block based on “distance” from previous one–distance = predicted seek and latency •Strengths–improves sequential access–minimizes seek time•Weaknesses–increases algorithm complexityStriping (RAID-0)•Stripe file across an array of N disks–divide file into stripes, dive stripe into units, assign each unit to different disk•Strengths–reduces disk access time by N•Weaknesses–susceptible to failure of any one disk –p(failure) = N * p(any one disk failing)MM File System Requirements•Storing/retrieving multimedia files –large size; continuous periodic requests•Maintain high throughput•Support RT and non RT requests•Guarantee a sustained level of serviceMeeting the Requirements•Methods of placing data on disk•Scheduling algorithms•Admission control policies•Maximize transfer timeZipfs Law•Probability of occurrence of the kth most common word is proportional to 1/k–applies to many observable events•More generallyPi = k / iα where–i is the ith most popular item; k is a constant; alpha is close to 1Apply to File Allocation•For multimedia, assume that–alpha=1–Sum(Pi)=1•Compute the probability of each multimedia file being accessed–use for layout and prefetchingScheduling Algorithms•FCFS•SSTF•SCAN and C-SCAN•EDF•SCAN-EDF•Understand each algorithm and weigh advantages and disadvantagesFCFS•Serve requests based on incoming order•Inherently fair•Does not consider location of requests–can lead to high overheadSSTF•Select request closest to current position–minimizes seek time/overhead•May cause starvation of some requestsSCAN and C-SCAN•Serves all requests in current direction–reverses when no more requests–serves middle tracks better than edges•C-SCAN scans across disk in cycles–more fair to the edge tracksEDF•Attach deadlines to each request–select request with earliest deadline–can have high overheadSCAN-EDF•SCAN-EDF selects –earliest deadline, or if same deadline–select request closest to the disk’s center•Use EDF, but perturb deadlines–Di = Di + f(Ni); where f(Ni) = Ni / Nmax–Consider direction?Admission Control•Based on the admission control policy discussed in the paper:–C. Martin, P.S. Narayan, B. Ozden, R. Rastogi, and A. Silberschatz. The Fellini Multimedia Storage System, Journal of Digital Libraries, 1997.Mathematical Setup•Client requests received in cycles of duration T–T is referred to as the common period of the system–assumes circular (C-SCAN) scan of the disk–consumption rate of each real-time client is ri•Retrieval rate for each client must be > T*ri•Ensure that the file system in each period T can retrieve T*ri bits for each clientSetup (cont.)•Serve both real and non-real time clients•Serve real-time clients using fraction of T–Use to serve real-time clients–Use to serve non real-time clients•To retrieve T*ri bits for each client, the controller must ensure time to retrieveT*r1, …, T*rn bits does not exceed TT )1(TNumber of Disk Blocks•If b is block size, then maximum number of disk blocks to be retrieved for ri isbrTiLatency•Retrieval of a disk block involves a seek to the track containing the block, a settle time delay, and a rotational delay•Let tseek, trot, and tsettle be the worst case times for each measureMaximum Latency•Thus, the maximum latency for servicing clients r1, r2, …, rq isqisettlerotise ekttbrTt1)()(2Transfer Time•If the transfer rate from the innermost track of the disk is rdisk, then the time to transfer T*ri bits of data for request ri is diskirrT Admission for Real-Time Clients•Thus, the total time to retrieve T*r1, …, T*rq bits for requests R1, …, Rq is the sum of the latency and transfer times•Admit new client, if on adding it, this equation is still satisfiedTrrTttbrTtqidiskiqisettlerotiseek11)()(2Admission for Non RT Clients•Remainder of the period is for requests from non real-time clients•Let di be the data requested from Ci•Number of blocks isT )1(bdiAdmission for Non RT Clients•For each request, latency plus transfer time is•Over all requests p, this becomes•Admit new non RT client, if on adding it, above equation is still


View Full Document

U of I CS 414 - MM File Management

Documents in this Course
Lecture 1

Lecture 1

32 pages

LECTURE

LECTURE

30 pages

Load more
Download MM File Management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view MM File Management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view MM File Management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?