On the Relationship of Server Disk Workloads and Client File Requests

Similar documents
Visualization of Internet Traffic Features

A Simulation: Improving Throughput and Reducing PCI Bus Traffic by. Caching Server Requests using a Network Processor with Memory

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Enterprise Intranet Collaboration Environment

Supplementary File: Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

Southern Polytechnic State University Spring Semester 2009

File Size Distribution on UNIX Systems Then and Now

Passive NFS Tracing of and Research Workloads. Daniel Ellard, Jonathan Ledlie, Pia Malkani, Margo Seltzer FAST April 1, 2003

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

Disk Drive Workload Captured in Logs Collected During the Field Return Incoming Test

Measuring the Processing Performance of NetSniff

10 MONITORING AND OPTIMIZING

RECORD LEVEL CACHING: THEORY AND PRACTICE 1

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

NET0183 Networks and Communications

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Lesson 2: Using the Performance Console

On characterizing BGP routing table growth

A Firewall Architecture to Enhance Performance of Enterprise Network

Evaluation of OpenROUTE Networks Bandwidth Reservation System and Priority Queueing

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement Schemes *

Multicast Transport Protocol Analysis: Self-Similar Sources *

A trace-driven analysis of disk working set sizes

SharePoint 2010 Technical Case Study: Microsoft SharePoint Server 2010 Social Environment

Using Low-power Modes for Energy Conservation in Ethernet LANs

SUMMERY, CONCLUSIONS AND FUTURE WORK

Implications of Proxy Caching for Provisioning Networks and Servers

Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN applications via Content-Centric Networking

Lesson 1: Network Communications

Evaluation of the Effect of Wireshark-based Laboratories on Increasing Student Understanding of Learning Outcomes in a Data Communications Course

PCnet-FAST Buffer Performance White Paper

Trace Traffic Integration into Model-Driven Simulations

3. Evaluation of Selected Tree and Mesh based Routing Protocols

The Impact of Parallel Loop Scheduling Strategies on Prefetching in a Shared-Memory Multiprocessor

File Server Comparison: Executive Summary. Microsoft Windows NT Server 4.0 and Novell NetWare 5. Contents

Analysis of wireless information locality and association patterns in a campus

Network protocols and. network systems INTRODUCTION CHAPTER

Frequency-based NCQ-aware disk cache algorithm

Interface The exit interface a packet will take when destined for a specific network.

IB Chemistry IA Checklist Design (D)

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Ch. 13: Measuring Performance

Dynamic Broadcast Scheduling in DDBMS

IBM MQ Appliance HA and DR Performance Report Model: M2001 Version 3.0 September 2018

Machine Learning for Pre-emptive Identification of Performance Problems in UNIX Servers Helen Cunningham

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

I/O CHARACTERIZATION AND ATTRIBUTE CACHE DATA FOR ELEVEN MEASURED WORKLOADS

Chapter 5. Track Geometry Data Analysis

White paper ETERNUS Extreme Cache Performance and Use

More on Conjunctive Selection Condition and Branch Prediction

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS APRIL 2015 EXAMINERS REPORT

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS.

Measuring KSA Broadband

Demand fetching is commonly employed to bring the data

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

Combining In-Transit Buffers with Optimized Routing Schemes to Boost the Performance of Networks with Source Routing?

COSC 6377 Mid-Term #2 Fall 2000

Finding a needle in Haystack: Facebook's photo storage

The Performance of MANET Routing Protocols for Scalable Video Communication

SF-LRU Cache Replacement Algorithm

An evaluation tool for Wireless Digital Audio applications

NetWare Protocols. Background CHAPTER

VERITAS Foundation Suite TM 2.0 for Linux PERFORMANCE COMPARISON BRIEF - FOUNDATION SUITE, EXT3, AND REISERFS WHITE PAPER

Burst-mode Transceivers and Differentiated Classes of Service for PON. Dr. Monir Hossen ECE, KUET

Simulation of Cache-based Parallel Processing Systems using Spreadsheets*

An Evaluation of Alternative Designs for a Grid Information Service

On Topology and Bisection Bandwidth of Hierarchical-ring Networks for Shared-memory Multiprocessors

Determining the Number of CPUs for Query Processing

On the Interdependence of Congestion and Contention in Wireless Sensor Networks

ENSC 835: HIGH-PERFORMANCE NETWORKS CMPT 885: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS. Scalability and Robustness of the Gnutella Protocol

Tradeoff between coverage of a Markov prefetcher and memory bandwidth usage

REAL-TIME ANALYSIS OF A MULTI-CLIENT MULTI-SERVER ARCHITECTURE FOR NETWORKED CONTROL SYSTEMS

Experimental Extensions to RSVP Remote Client and One-Pass Signalling

TCPIP Protocol Suite & Utilities. Revision no.: PPT/2K403/02

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Characterizing Home Pages 1

EFFICIENCY NETWORK ANALYSIS FOR IP INVESTIGATE AND IMPROVE NETWORK PERFORMANCE

On the 95-percentile billing method

Maintaining Mutual Consistency for Cached Web Objects

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT

On Improving the Performance of Cache Invalidation in Mobile Environments

Correlating Internet Performance Changes and Route Changes to Assist in Trouble-shooting from an End-user Perspective

BLIND QUALITY ASSESSMENT OF JPEG2000 COMPRESSED IMAGES USING NATURAL SCENE STATISTICS. Hamid R. Sheikh, Alan C. Bovik and Lawrence Cormack

iscsi Technology: A Convergence of Networking and Storage

Chapter 6: Network Communications and Protocols

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

A model for the evaluation of storage hierarchies

Chapter 4 NETWORK HARDWARE

Dynamic Load balancing for I/O- and Memory- Intensive workload in Clusters using a Feedback Control Mechanism

DBMS (FYCS) Unit - 1. A database management system stores data in such a way that it becomes easier to retrieve, manipulate, and produce information.

Some popular Operating Systems include Linux Operating System, Windows Operating System, VMS, OS/400, AIX, z/os, etc.

Network Gateway Services John Enck

Dell EMC Service Levels for PowerMaxOS

Shaking Service Requests in Peer-to-Peer Video Systems

Transcription:

On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies University of Southern Maine Portland, Maine 43 In this study, we consider the relationship of client IO requests submitted to a file server and the server's disk subsystem IO traffic. We collected traces of client-server IOs and, during each trace period, we also traced server storage subsystem workloads. We analyze and compare trace pairs collected in each trace period. We evaluate file server performance and investigate the relationship between client file requests and server disk workloads. Introduction file servers provide global file systems that are shared by client workstations. To provide acceptable performance levels, servers employ a large file cache and, using a variety of algorithms, attempt to anticipate future client requests and store, in file cache, data that are likely to be accessed. In an earlier study [HEAT9], the authors analyzed server disk workload traces and characterized server disk subsystem performance. In this study, we traced client IO requests made to network file servers, and, during the same period, we also traced server disk workloads. We then analyzed and compared the traces for the purpose of acquiring a better understanding of the relationship between client IO requests and server storage system workloads. Understanding the relationship between client-server traffic and server disk workloads is useful in predicting server storage requirements and planning for future growth of server storage subsystems. Our results are also useful for parameterizing simulation and queueing network models. In the next section, we describe the systems traced and our trace methodology. In section 3, we compare client IO request mix with the IO mix of server subsystem workloads. We then, in section 4, investigate the relationship between client-server throughput and server disk subsystem throughput. In section, we evaluate the effectiveness of the server file cache by analyzing client IO response times. In the last section we provide concluding remarks. 2 Trace Environment and Methodology workload traces analyzed in this study were collected in April 994 over a period of several days from This work was supported in part by Digital Equipment Corporation, Shrewsbury, MA. two file servers on different LANs. One server provided the file system for seventy diskless workstations connected to a general access LAN used primarily by university students from all academic disciplines. The most frequently used server application was word processing, accounting for 6% of all connect time. Other applications included spreadsheet programs, communications services, programming, MS-DOS, database, and courseware. The LAN is a hub-configured Ethernet with workstations interconnected by twisted-pair cable. The LAN's single file server runs Novell NetWare and uses two SCSI disk drives to support its file system. The second set of traces was obtained from a network file server used by administrative staff in several university departments. Client workstations have local file systems and use the server for shared applications, primarily word processing, and access to shared data. During working hours, the number of workstations connected to the server varies from to 7. The administration LAN is also hub-configured Ethernet and the file server has essentially the same configuration as the student file server. Traces of client IO requests were collected by a network traffic monitor. The monitor, which ran on a dedicated workstation, collected transmissions to and from the server. Frame headers, containing the requested file operation, and the time each frame was received were stored in the trace file. Table gives, for each trace, the total number of NetWare Core Protocol (NCP) operations observed, the number of NCP file operations observed, and the percentage of file operations to total NCP operations. In addition to file commands, the NCP count includes such non-file operations as server advertising, queue and system maintenance, and authentication services. The monitor was able to collect packets for about a two-hour period on the student network without exceeding its storage limits and for four hours on the more lightly loaded administration network.

Total NCP NCP File % File Trace Time Period Operations Operations Operations Student Access File Server MON 9: am -: am 63833 62274 94.3% WED 9: am -: am 99233 882269 96.% FRI 9: am -: am 22397 4894 93.9% Totals 38276 3633483 9.% MON 8: am -2: noon 9282 8297 89.2% WED 8: am -2: noon 92397 83667 88.% THU 8: am -2: noon 72327 64689 86.% FRI 8: am -2: noon 699 8264 82.% Totals 3762 2787 86.8% Table : Trace Summary Trace Read% Write% Open% Close% Other% Student Access File Server MON 8.4% 8.% 3.3% 2.8%.% WED 78.7% 2.2% 2.6% 2.4% 4.% FRI 76.7%.8% 3.7% 3.4%.4% Overall 78.4%.2% 3.% 2.8% 4.6% MON 7.% 3.4% 3.7% 3.4% 9.% WED 68.8% 4.8%.9% 4.4% 6.% THU 7.6% 4.9% 6.8% 4.8% 3.% FRI 6.4%.%.3% 4.8% 9.3% Overall 69.% 4.%.3% 4.2% 6.9% Table 2: NCP File Operation Statistics A SCSI bus monitor [PEER93], installed in an MS- DOS PC, was used to trace server disk storage workloads. The monitor attached directly to the server's SCSI bus and recorded all commands transmitted on the bus. Traces were collected during what were generally believed to be the busiest periods, from 9:am to :am on the student network and from 8:am to 2:n on the administration network. Trace data were interpreted and analyzed after the tracing was completed. Both monitors were passive and did not affect system performance. 3 IO Request Mix In this section, we consider the mix of file operations submitted by network clients to the servers and compare the mix with that of IO requests submitted by the servers to their disk storage subsystems. Table 2 shows the percentage of each NCP file operation type sent to the two servers. In both networks, the great majority of file requests were read operations, 78% in the student network, 69% in the administration network. We note that the mean number of IOs for each file open is 3 in the student network and only half that in the administration network. A possible explanation for this difference is that workstations in the student network are diskless, and rely on the file server for all file operations, whereas the administration network workstations have local disks that can be used for paging, storing temporary files and system binaries. File write operations are a small percentage of all file requests, % in the student network and only 4.% in the administration network. NCP file operations other than read, write, open, and close are classified as Other in Table 2. These include NCP operations such as Create File, Erase File, Rename File, Get File Size, File Search, Set Attributes, to name a few. We note that in contrast to the student network, the percentage of Other file operations on the administration network is rather high, 7%. The cause of this difference is not clear; possibly it is because workstations with local disks handle many reads and writes locally, once a file is opened and initially read from the server. Therefore they exhibit a lower percentage of read and write NCP operations. If we consider read and write operations only, ignoring all other file operations, the mean read-to-write ratio is 7: for the student network and 6: for the administration network. However, NCP file operations cate-

Trace Client Request Server R/W Ratio R/W Ratio MON 7.63.33 WED.73.3 FRI 6.89.24 Mean 6.7.29 MON 3.2.7 WED 9.6.8 THU 9.7.87 FRI 8.78.8 Mean.9.96 Table 3: Client and Server s gorized as Other also require file IOs to execute. If we include read and write operations required by all NCP operations, the mean read-to-write ratio for the student network remains about 7:, but is reduced to : for the administration network. In Table 3, we compare the read-to-write ratio of client file operations with the read-to-write ratio of server disk subsystem IOs. The significant difference in these two ratios demonstrates the servers' effectiveness in processing client read requests without accessing the disk subsystem. In the student network, the read-to-write ratio of client file requests is about 7:, but the read-to-write ratio of the server disk subsystem trace is :3. In the administration network, client file requests have a : read-towrite ratio, whereas the disk subsystem workload has a : read-to-write ratio. 2/ 2/ / / / / / 9:3am :am :3am :am Figure :, MON Read-to-write ratios for the past 3 minutes, computed at minute intervals, are plotted in Figs. -7. Each figure shows read-to-write ratios for both client file requests and for server disk IOs during a trace period. Figs. -3 show, for the three trace periods, read-towrite ratios for student network. We observe that network and disk read-to-write ratios display little fluctua- 2/ 2/ / / / / / 9:3am :am :3am :am Figure 2:, WED 2/ 2/ / / / / / 9:3am :am :3am :am Figure 3:, FRI tion throughout the trace periods. In all three traces, client file request ratios remain between : and :, while read-to-write ratios of server disk traces remain generally between :2 and :, the exception being the end of the Friday trace which has a read-to-write ratio of :9, Fig. 3. Graphs shown in Figs. 4-7 depict read-to-write ratios for administration network traces. Although there is much fluctuation in client trace read-to-write ratios, ranging from : to 2:, disk workload read-to-write ratios remain relatively uniform at about :. Examination of the ratios indicates there is not a strong correlation between server disk subsystem read-to-write ratios and client file request ratios. Furthermore, although client file requests are predominantly read requests, server disk workloads consists of as many or more writes than reads. Clearly, server disk workloads have a very different IO mix than local file systems workloads reported in the literature [BISW9, OUST8, RAMA92, SMIT8] which have ratios more similar to those observed in the client-server traces. Our results also indicate that the file servers, through their file caches and read-ahead algorithms, service a large percentage of read operations directly from file cache without accessing the disk subsystem.

2/ 2/ 2/ 2/ / / / / / / / / / 9:am :am :am 2:pm / 9:am :am :am 2:pm Figure 4:, MON Figure 6:, THU 2/ 2/ 2/ 2/ / / / / / / / / / 9:am :am :am 2:pm / 9:am :am :am 2:pm Figure :, WED 4 Throughput In this section, we compare client IO throughput (measured IO rate) with server disk subsystem throughput during the same trace period. In our throughput analysis, the output unit is IOs. The reader should be aware that the amount of data transferred per IO is different for the two streams, client IO and server disk IO. Client file IOs are limited in length by the underlying network protocols. Specifically, the network packet payload limits IOs to no more than one kilobyte, regardless of the length of the client application's original request. Furthermore, any request that is routed through the internetwork router is segmented into requests of no more than 2 bytes. Consequently, the distribution of client IO request lengths, particularly reads, have a high percentage of 24 and 2-byte sizes; see Figs. 8 and 9. Write IO lengths, in addition to 2 and 24 byte sizes, which are common, also include many smaller lengths; on the administration network, client write request lengths of 64, 28, and 92 bytes account for about % each of all client writes. See Figs. and. Servers read ahead of the requested data in antici- Figure 7:, FRI pation of future client read requests. Consequently, the length of read requests submitted by a server to its storage system are larger than the client's request. Novell NetWare, the network operating system that runs on the servers studied, issues disk read requests that are multiples of 4 kilobytes, regardless of the size of the client request. In fact, all file reads submitted by the administration server were for 4 kilobytes. In the student network, ninety percent of the reads submitted by the server were for 2 kilobytes and all other read requests were for either 4 or 8 kilobytes. Also, disk write request lengths are for at least 2 bytes, the disk block size, and, in fact, three-fourths of write operations submitted by both servers were for 2 bytes. In the remainder of this section, we compare client-server IO throughput with server disk subsystem throughput. Table 4 lists throughput, during each trace period, of both network interface and server subsystem. The rows labeled mean list the average trace throughputs for the two systems. From the Table 4, we see that, on average, on the student network, 2 client reads/sec resulted in only 2. disk reads/sec and that 24 client writes/sec resulted in 8 disk writes/sec. In the adminis-

Trace Read Write Overall disk IOs/s NCP IOs/s disk IOs/s NCP IOs/s disk IOs/s NCP IOs/s MON 2.4 74.4 7. 9.7 9.9 83.7 WED 3.64 222.83.67 38.88 4.3 26.7 FRI.44 9.79.9 23.2 7.39 9.79 Mean 2. 2.22 8.4 23.93. 68.42 MON.7 38..63 2.88 3.38 4.3 WED 2.7 37.28.92 3.86 3.99 4.3 THU.28 28.8.47 3.8 2.7 32.3 FRI.7 2.6.32 2.4 2.4 23.6 Mean.4 3.36.9 3.8 3.3 34.44 Table 4: Client and Throughput 4 4 4 4 3 3 2 2 3 3 2 2 28 26 384 2 64 768 896 24 Request Size (bytes) 28 26 384 2 64 768 896 24 Request Size (bytes) Figure 8: Server NCP Read Size Distribution, Student File Figure 9: NCP Read Size Distribution, Administration File Server tration network, we observe that 3 client reads/sec resulted in disk throughput of. disk reads/sec; 3 client writes/sec resulted in. disk writes/sec. Clearly, the server file cache significantly reduces disk reads and, although to a lesser degree, also reduces disk writes. Measured throughputs for 3 minute periods, computed at minute intervals, are graphed in Figs. 2-8. Each figure has two curves, one shows client-server IO throughput, the other shows server disk subsystem IO throughput. There is one figure for each trace period. Note, the vertical axis (throughput) scale is logarithmic. We observe in all figures that network interface throughput is an order of magnitude greater than server disk subsystem throughput. Examination of the figures suggests a strong correlation between client file IO and server subsystem IO. To quantify these apparent correlations, we computed correlation coefficients of network interface throughputs and disk subsystem throughputs for each trace period. The results are given in Table, column 2. We also computed correlation coefficients for read and write throughputs, columns 3 and 4. All traces, with the exception of the MON trace on the ad- ministration server, show a strong correlation between client-server IO and server disk IO with write output being more strongly correlated than read output. Response Time To be effective, a file server must respond to client requests in times comparable to that of local file systems. Recall, adequate response time levels are achieved by storing recently accessed files or parts of recently accessed files in a region of the server's memory, called the file cache. Read IO requests for records stored in the cache are serviced directly from the file cache without accessing the server's disk storage, thereby substantially reducing response time. write requests are also stored in the file cache, and the actual write to disk is delayed. The purpose is to reduce disk writes by processing multiple writes to cached data without writing to disk, and by collecting writes to consecutive blocks into a single disk write. In this section, we present distributions of response time measurements of client requests and use these measurements to assess the effectiveness of the

4 Percentage of Writes 4 3 3 2 2 28 26 384 2 64 768 896 24 Request Size (bytes) 9:3am :am :3am :am Figure : NCP Write Size Distribution, Student File Server Figure 2: Throughput, MON Percentage of Writes 4 4 3 3 2 2 28 26 384 2 64 768 896 24 Request Size (bytes) Figure : NCP Write Size Distribution, Administration File Server 9:3am :am :3am :am Figure 3: Throughput, WED servers' file caches in reducing response times. Response times of client IOs were measured in the following manner. The network monitor recorded the time each frame was received. From these time stamps, we computed time from the start of each operation until the start of the server reply packet, as seen by the monitor. In the discussion that follows, we refer to these times as response times. By examining the distribution of these times, we can estimate the percentage of file cache hits and assess the effectiveness of the server in quickly processing client IOs. We first consider read response times. Client read requests may be handled in one of several ways. If the requested data are stored in the server's file cache, the server can send the data immediately without disk access. If the data are not found in the file cache, the disk subsystem is accessed. The data may be in the disk controller cache, or if it is not, the disk is accessed and the data read. Measurements of the server disk subsystems' response times, reported in [HEAT9], show the disk subsystem's minimum response time is between 3 and 4ms, a response time that results when the requested data are stored in the disk controller cache. Consequently, we can assume that client read requests with response time less than 3ms were serviced from the server file cache. In the student network, 97% of client read requests had response times less than 3ms. In the administration network, 9% of client read requests had response times less than 3ms. Histograms of read response times under ms for the student and administration networks are shown in Figs. 9 and 2, respectively. Each bar represents a.ms interval. For example, the bar labeled. represents the percentage of requests with response times between. and.9 9ms. Read request response times for all traces, of the specified network, are included in the histograms. We estimate that with the additional delays imposed by transmission times, server processing time, and queueing time included, response times under ms result from a file cache hit. The cache hit percentage for each network increases by one percent when we include response times between 3 and ms.

9:3am :am :3am :am 9:am :am :am 2:pm Figure 4: Throughput, FRI Figure 6: Throughput, WED 9:am :am :am 2:pm 9:am :am :am 2:pm Figure 7: Throughput, THU Figure : Throughput, MON.8.7.6.8.7.6..4.3.2. 2 3 4 6 7 8 9 >= Figure 2: Read Request Response Time Histogram,..4.3.2. 2 3 4 6 7 8 9 >= Figure 22: Read Request Response Time Histogram, A histogram of student network client read response times up to ms is shown in Fig. 2. Each bar represents a ms interval. Response times greater than or equal to ms are collected in a single bar. The histogram is intended to emphasize the distribution of response times greater than ms; hence, the vertical axis is scaled in such a way that many per-

2 9:am :am :am 2:pm.. 2 2. 3 3. 4 4. Figure 8: Throughput, FRI Figure 9: Read Request Response Time Histogram, <=ms, Correlation Coefficients Trace Overall Read Write MON.964.898.97 WED.82.64.977 FRI.94.74.92 MON.883.798.924 WED.2.342.924 THU.97.898.762 FRI.776.682.7 Table : Correlation Coefficients of Client and Subsystem Throughput 2.. 2 2. 3 3. 4 4. Figure 2: Read Request Response Time Histogram, <=ms, centages associated with response times less than ms are not shown in the figure. In Fig. 2, we observe a secondary response time peak between 7 and ms intervals. Based on service time measurements of similar disks [HEAT93], as well as measured disk response times [HEAT9], we attribute these response times to accesses serviced by controller cache or disk accesses that do not require a seek. This region contains.3% of all requests. We observe an even more pronounced secondary peak in the administration network histogram, Fig. 22. The percentage of read response times contained in this region, which we attribute to controller cache accesses and disk accesses requiring no seek or, possibly, a very short seek, is 2% of client reads. The percentage of requests requiring a disk seek appears to be only.3% in the student network and.9% in the administration network. Percentage of Writes 2.. 2 2. 3 3. 4 4. Figure 23: Write Request Response Time Histogram,

Percentage of Writes 2.. 2 2. 3 3. 4 4. Figure 24: Write Request Response Time Histogram, Response time histograms for client write requests are shown in Figs. 23 and 24. The server employs a write-back policy, referred to above, in which write data is delayed in the server cache before being written to disk. The server sends a response acknowledgment to the source client when the write data is cached, before it is written to disk. Therefore, write response times do not include disk write delays and, consequently, as we observe in the figures, nearly all write request response times are relatively short. In the student network, 99.4% of write response times are less than 2ms; in the administration network, 98.7% are less than 3ms. [HEAT93] John R. Heath Measurement and Performance Evaluation of Seagate's Elite 3 Drive Technical Report TR 93-, Dept. of Computer Science, University of Southern Maine, May 993. [HEAT9] John R. Heath and Stephen A. R. Houser. Analysis of Workloads in File Server Environments Proc. CMG9, pages 33 322, Dec. 99. [OUST8] John K. Ousterhout and et.al. A trace driven analysis of the UNIX 4.2 BSD file system. Proc. Tenth Sympos. on Op. Sys. Princ., pages 24, Dec. 98. [PEER93] Peer Protocols Inc. Peer Protocol SCSI Analyzer, 993. [RAMA92] K.K. Ramakrishnan, P. Biswas, and R. Karedla. Analysis of File I/O Traces in Commercial Computing Enviroments. In Proc. 992 ACM Sigmetrics & Performance, pages 78 9, June 992. [SMIT8] Alan J. Smith. -cache miss ratio analysis and design considerations. ACM Trans. on Comp. Sys., pages 6 23, August 98. 6 Concluding Remarks We have analyzed and compared client IO workload traces and server disk workload traces. We observed that client IOs are predominantly file reads, while server disk workloads had an equal or greater number of writes than reads. There appeared to be no clear correlation between client traffic read-to-write ratios and disk subsystem read-to-write ratios. We found client IO throughput to be an order of magnitude greater than server disk throughput. Client request response times indicated that nearly all reads are serviced by the server from its file cache. Further study of additional client IO and server disk traces is needed to determine whether or not network trace data can be used to accurately predict server disk subsystem workloads. However, our analysis suggests that only a small percentage of client reads, less than %, require disk access. Also, there is, generally, a strong correlation between client IO demand and server disk throughput. References [BISW9] P. Biswas and K.K. Ramakrishnan. File Characterizations of VAX/VMS Enviroments. In Proc. th International Conference on Distributed Computing Systems, pages 227 234, May 99.