Movatterモバイル変換


[0]ホーム

URL:


CN108268215A - A kind of sudden access recognition methods of disk - Google Patents

A kind of sudden access recognition methods of disk
Download PDF

Info

Publication number
CN108268215A
CN108268215ACN201711500044.0ACN201711500044ACN108268215ACN 108268215 ACN108268215 ACN 108268215ACN 201711500044 ACN201711500044 ACN 201711500044ACN 108268215 ACN108268215 ACN 108268215A
Authority
CN
China
Prior art keywords
behavior
access
sudden
mathematical model
disk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711500044.0A
Other languages
Chinese (zh)
Inventor
魏文国
谢桂园
戴青云
蔡君
赵慧民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Polytechnic Normal University
Original Assignee
Guangdong Polytechnic Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Polytechnic Normal UniversityfiledCriticalGuangdong Polytechnic Normal University
Priority to CN201711500044.0ApriorityCriticalpatent/CN108268215A/en
Publication of CN108268215ApublicationCriticalpatent/CN108268215A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种磁盘的突发性访问识别方法,包括先获取块数据的历史系统行为,构建行为分析数学模型,再监测磁盘I/O口中的第一访问行为,并通过行为分析数学模型,判断第一访问行为是否为突发性访问行为。若是,则根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型;否则,根据第一访问行为,执行相应的操作。采用本发明实施例,能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。

The invention discloses a sudden access identification method of a disk, which includes firstly obtaining the historical system behavior of block data, constructing a behavior analysis mathematical model, and then monitoring the first access behavior in the I/O port of the disk, and analyzing the mathematical model through the behavior , judging whether the first access behavior is a sudden access behavior. If so, track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model; otherwise, perform corresponding operations according to the first access behavior. By adopting the embodiment of the present invention, it is possible to efficiently track and predict sudden access in the system, and improve the response speed of the system.

Description

Translated fromChinese
一种磁盘的突发性访问识别方法A method for identifying sudden disk access

技术领域technical field

本发明涉及计算机技术领域,尤其涉及一种磁盘的突发性访问识别方法。The invention relates to the technical field of computers, in particular to a sudden access identification method of a disk.

背景技术Background technique

磁盘是用于存储计算机数据的一种载体,存储在磁盘中的数据可以反复使用。而随着计算机的运算速度和数据处理速度的增长,人们在操作磁盘存储/读取文件的同时,也会执行其他的操作。这些操作对于磁盘来说属于突发性访问,传统的磁盘在面对突发性访问时,其感知方面存在不足,不能及时的进行处理,造成不必要的磁盘能耗。A disk is a carrier used to store computer data, and the data stored on the disk can be used repeatedly. With the increase of computing speed and data processing speed of computers, people will also perform other operations while operating disk storage/reading files. These operations are sudden accesses for disks. Traditional disks have insufficient perception in the face of sudden accesses and cannot process them in a timely manner, resulting in unnecessary disk energy consumption.

发明内容Contents of the invention

本发明实施例提出一种磁盘的突发性访问识别方法,能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。The embodiment of the present invention proposes a sudden access identification method of a disk, which can efficiently track and predict the sudden access in the system and improve the response speed of the system.

本发明实施例提供一种磁盘的突发性访问识别方法,包括:An embodiment of the present invention provides a sudden access identification method of a disk, including:

获取块数据的历史系统行为,构建所述块数据的行为分析数学模型;所述行为分析数学模型记录了若干个突发性访问行为的描述信息和评估机制;所述行为分析数学模型用于跟踪和预测系统中的突发性访问行为;Obtain the historical system behavior of the block data, and construct the behavior analysis mathematical model of the block data; the behavior analysis mathematical model records the description information and evaluation mechanism of several unexpected access behaviors; the behavior analysis mathematical model is used to track and predict sudden access behavior in the system;

根据所述行为分析数学模型,监测磁盘I/O口中的第一访问行为,判断所述第一访问行为是否为突发性访问行为;According to the behavior analysis mathematical model, monitor the first access behavior in the disk I/O port, and judge whether the first access behavior is a sudden access behavior;

若是,则根据所述行为分析数据模型的评估机制,跟踪和预测所述第一访问行为,并记录整个过程的数据,用于更新所述行为分析数学模型;If yes, then track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model;

否则,根据所述第一访问行为,执行相应的操作。Otherwise, perform a corresponding operation according to the first access behavior.

进一步的,所述获取块数据的历史系统行为,具体为:Further, the historical system behavior of acquiring block data is specifically:

通过Trace日志文件,获取块数据的历史系统行为。Obtain the historical system behavior of block data through the Trace log file.

进一步的,所述行为分析数学模型还用于为非突发性访问行为提供识别依据。Further, the behavior analysis mathematical model is also used to provide identification basis for non-emergency access behaviors.

实施本发明实施例,具有如下有益效果:Implementing the embodiment of the present invention has the following beneficial effects:

本发明实施例提供的磁盘的突发性访问识别方法,包括先获取块数据的历史系统行为,构建行为分析数学模型,再监测磁盘I/O口中的第一访问行为,并通过行为分析数学模型,判断第一访问行为是否为突发性访问行为。若是,则根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型;否则,根据第一访问行为,执行相应的操作。相比于现有技术的感知力不足,本发明技术方案能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。The sudden access identification method of the disk provided by the embodiment of the present invention includes first obtaining the historical system behavior of the block data, constructing a behavior analysis mathematical model, and then monitoring the first access behavior in the disk I/O port, and analyzing the mathematical model through the behavior , judging whether the first access behavior is a sudden access behavior. If so, track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model; otherwise, perform corresponding operations according to the first access behavior. Compared with the lack of perception in the prior art, the technical solution of the present invention can efficiently track and predict sudden access in the system, and improve the system response speed.

附图说明Description of drawings

图1是本发明提供的磁盘的突发性访问识别方法的一种实施例的流程示意图。FIG. 1 is a schematic flowchart of an embodiment of a method for identifying sudden access to a disk provided by the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

参见图1,是本发明提供的磁盘的突发性访问识别方法的一种实施例的流程示意图,该方法包括步骤101至步骤104,各步骤具体如下:Referring to Fig. 1, it is a schematic flow chart of an embodiment of a sudden access identification method of a disk provided by the present invention, the method includes steps 101 to 104, and each step is specifically as follows:

步骤101:获取块数据的历史系统行为,构建块数据的行为分析数学模型;该行为分析数学模型记录了若干个突发性访问行为的描述信息和评估机制;该行为分析数学模型用于跟踪和预测系统中的突发性访问行为。Step 101: Obtain the historical system behavior of the block data, and build a behavior analysis mathematical model of the block data; the behavior analysis mathematical model records the description information and evaluation mechanism of several unexpected access behaviors; the behavior analysis mathematical model is used for tracking and Predict sudden access behavior in the system.

步骤102:根据行为分析数学模型,监测磁盘I/O口中的第一访问行为,判断第一访问行为是否为突发性访问行为。若是,则执行步骤103,否则,执行步骤104。Step 102: According to the behavior analysis mathematical model, monitor the first access behavior in the disk I/O port, and determine whether the first access behavior is a sudden access behavior. If yes, execute step 103; otherwise, execute step 104.

步骤103:根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型。Step 103: According to the evaluation mechanism of the behavior analysis data model, track and predict the first access behavior, and record the data of the whole process for updating the behavior analysis mathematical model.

步骤104:根据第一访问行为,执行相应的操作。Step 104: Perform corresponding operations according to the first access behavior.

在本实施例中,步骤101中,获取块数据的历史系统行为,具体为:通过Trace日志文件,获取块数据的历史系统行为。Trace是记录系统行为的一种日志文件,它能够准确、真实、离线地再现系统中曾经发生的某些事件。In this embodiment, in step 101, the historical system behavior of the block data is obtained, specifically: the historical system behavior of the block data is obtained through a Trace log file. Trace is a log file that records system behavior. It can accurately, truly and offline reproduce certain events that have occurred in the system.

在本实施例中,行为分析数学模型还用于为非突发性访问行为提供识别依据。In this embodiment, the behavior analysis mathematical model is also used to provide identification basis for non-emergency access behaviors.

由上可见,本发明实施例提供的磁盘的突发性访问识别方法,先获取块数据的历史系统行为,构建行为分析数学模型,再监测磁盘I/O口中的第一访问行为,并通过行为分析数学模型,判断第一访问行为是否为突发性访问行为。若是,则根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型;否则,根据第一访问行为,执行相应的操作。相比于现有技术的感知力不足,本发明技术方案能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。It can be seen from the above that the sudden access identification method of the disk provided by the embodiment of the present invention first obtains the historical system behavior of the block data, builds a behavior analysis mathematical model, and then monitors the first access behavior in the disk I/O port, and through the behavior Analyze the mathematical model to determine whether the first access behavior is a sudden access behavior. If so, track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model; otherwise, perform corresponding operations according to the first access behavior. Compared with the lack of perception in the prior art, the technical solution of the present invention can efficiently track and predict sudden access in the system, and improve the system response speed.

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random AccessMemory,RAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented through computer programs to instruct related hardware, and the programs can be stored in a computer-readable storage medium. During execution, it may include the processes of the embodiments of the above-mentioned methods. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM) and the like.

以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也视为本发明的保护范围。The above description is a preferred embodiment of the present invention, and it should be pointed out that for those skilled in the art, without departing from the principle of the present invention, some improvements and modifications can also be made, and these improvements and modifications are also considered Be the protection scope of the present invention.

Claims (3)

CN201711500044.0A2017-12-302017-12-30A kind of sudden access recognition methods of diskPendingCN108268215A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201711500044.0ACN108268215A (en)2017-12-302017-12-30A kind of sudden access recognition methods of disk

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201711500044.0ACN108268215A (en)2017-12-302017-12-30A kind of sudden access recognition methods of disk

Publications (1)

Publication NumberPublication Date
CN108268215Atrue CN108268215A (en)2018-07-10

Family

ID=62773200

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201711500044.0APendingCN108268215A (en)2017-12-302017-12-30A kind of sudden access recognition methods of disk

Country Status (1)

CountryLink
CN (1)CN108268215A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104965674A (en)*2015-06-082015-10-07暨南大学Low-energy-consumption disk scheduling method and system based on block association
CN105094986A (en)*2015-07-202015-11-25暨南大学Prediction method and device for burst access behaviors oriented to storage system
CN107241384A (en)*2017-05-032017-10-10复旦大学A kind of content distribution service priority scheduling of resource method based on many cloud frameworks
CN107341267A (en)*2017-07-242017-11-10郑州云海信息技术有限公司A kind of distributed file system access method and platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104965674A (en)*2015-06-082015-10-07暨南大学Low-energy-consumption disk scheduling method and system based on block association
CN105094986A (en)*2015-07-202015-11-25暨南大学Prediction method and device for burst access behaviors oriented to storage system
CN107241384A (en)*2017-05-032017-10-10复旦大学A kind of content distribution service priority scheduling of resource method based on many cloud frameworks
CN107341267A (en)*2017-07-242017-11-10郑州云海信息技术有限公司A kind of distributed file system access method and platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄立锋等: ""可时间局部性感知的块I/O关联挖掘算法"", 《小型微型计算机系统》*

Similar Documents

PublicationPublication DateTitle
CN109978379B (en) Time series data anomaly detection method, device, computer equipment and storage medium
CN105071983B (en)Abnormal load detection method for cloud calculation on-line business
TWI510916B (en)Storage device lifetime monitoring system and storage device lifetime monitoring method thereof
CN119179598B (en)Solid state disk fault prediction method and system based on artificial intelligence
CN114169604A (en)Performance index abnormality detection method, abnormality detection device, electronic apparatus, and storage medium
CN107392320A (en)A kind of method that hard disk failure is predicted using machine learning
US12353961B2 (en)Method and apparatus for determining storage load of application
US20180210802A1 (en)Generation of end-user sessions from end-user events identified from computer system logs
CN106502861A (en)A kind of method for penetrating RAID card reading hard disk SMART information
CN111813585A (en) Prediction and processing of slow disk
CN109344017A (en) A method, device and readable storage medium for predicting memory failure based on machine learning
CN115439928A (en) A method and device for operating behavior recognition
CN111784301A (en) User portrait construction method and device, storage medium and electronic device
US20160259849A1 (en)System and method for reducing size of raw data by performing time-frequency data analysis
CN113656228A (en)Disk fault detection method and device, computer equipment and storage medium
CN119149321A (en)Real-time performance detection method and system for solid state disk
CN113221352A (en)Complex equipment health management method and system based on digital twins
CN110704508B (en)Intelligent production line abnormal data processing method and device
CN105138447A (en)Method for monitoring hard disk and memory in Reboot test process
CN119107194B (en) Income and expenditure declaration data processing method and system based on multi-heterogeneous models
CN111091863A (en)Storage equipment fault detection method and related device
CN108268215A (en)A kind of sudden access recognition methods of disk
CN118535369A (en)System fault processing method and device, storage medium and electronic equipment
JP7222344B2 (en) Determination device, determination method, determination program, learning device, learning method, and learning program
CN117632610A (en)Disk fault detection method and storage medium applied to HCI platform

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
CB02Change of applicant information

Address after:510000 No. 293 Shipai Zhongshan Avenue, Tianhe District, Guangzhou City, Guangdong Province

Applicant after:Guangdong Normal University of Technology

Address before:510665 293 Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong.

Applicant before:Guangdong Technical Normal College

CB02Change of applicant information
RJ01Rejection of invention patent application after publication

Application publication date:20180710

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp