技术领域technical field
本发明涉及计算机技术领域,尤其涉及一种磁盘的突发性访问识别方法。The invention relates to the technical field of computers, in particular to a sudden access identification method of a disk.
背景技术Background technique
磁盘是用于存储计算机数据的一种载体,存储在磁盘中的数据可以反复使用。而随着计算机的运算速度和数据处理速度的增长,人们在操作磁盘存储/读取文件的同时,也会执行其他的操作。这些操作对于磁盘来说属于突发性访问,传统的磁盘在面对突发性访问时,其感知方面存在不足,不能及时的进行处理,造成不必要的磁盘能耗。A disk is a carrier used to store computer data, and the data stored on the disk can be used repeatedly. With the increase of computing speed and data processing speed of computers, people will also perform other operations while operating disk storage/reading files. These operations are sudden accesses for disks. Traditional disks have insufficient perception in the face of sudden accesses and cannot process them in a timely manner, resulting in unnecessary disk energy consumption.
发明内容Contents of the invention
本发明实施例提出一种磁盘的突发性访问识别方法,能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。The embodiment of the present invention proposes a sudden access identification method of a disk, which can efficiently track and predict the sudden access in the system and improve the response speed of the system.
本发明实施例提供一种磁盘的突发性访问识别方法,包括:An embodiment of the present invention provides a sudden access identification method of a disk, including:
获取块数据的历史系统行为,构建所述块数据的行为分析数学模型;所述行为分析数学模型记录了若干个突发性访问行为的描述信息和评估机制;所述行为分析数学模型用于跟踪和预测系统中的突发性访问行为;Obtain the historical system behavior of the block data, and construct the behavior analysis mathematical model of the block data; the behavior analysis mathematical model records the description information and evaluation mechanism of several unexpected access behaviors; the behavior analysis mathematical model is used to track and predict sudden access behavior in the system;
根据所述行为分析数学模型,监测磁盘I/O口中的第一访问行为,判断所述第一访问行为是否为突发性访问行为;According to the behavior analysis mathematical model, monitor the first access behavior in the disk I/O port, and judge whether the first access behavior is a sudden access behavior;
若是,则根据所述行为分析数据模型的评估机制,跟踪和预测所述第一访问行为,并记录整个过程的数据,用于更新所述行为分析数学模型;If yes, then track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model;
否则,根据所述第一访问行为,执行相应的操作。Otherwise, perform a corresponding operation according to the first access behavior.
进一步的,所述获取块数据的历史系统行为,具体为:Further, the historical system behavior of acquiring block data is specifically:
通过Trace日志文件,获取块数据的历史系统行为。Obtain the historical system behavior of block data through the Trace log file.
进一步的,所述行为分析数学模型还用于为非突发性访问行为提供识别依据。Further, the behavior analysis mathematical model is also used to provide identification basis for non-emergency access behaviors.
实施本发明实施例,具有如下有益效果:Implementing the embodiment of the present invention has the following beneficial effects:
本发明实施例提供的磁盘的突发性访问识别方法,包括先获取块数据的历史系统行为,构建行为分析数学模型,再监测磁盘I/O口中的第一访问行为,并通过行为分析数学模型,判断第一访问行为是否为突发性访问行为。若是,则根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型;否则,根据第一访问行为,执行相应的操作。相比于现有技术的感知力不足,本发明技术方案能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。The sudden access identification method of the disk provided by the embodiment of the present invention includes first obtaining the historical system behavior of the block data, constructing a behavior analysis mathematical model, and then monitoring the first access behavior in the disk I/O port, and analyzing the mathematical model through the behavior , judging whether the first access behavior is a sudden access behavior. If so, track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model; otherwise, perform corresponding operations according to the first access behavior. Compared with the lack of perception in the prior art, the technical solution of the present invention can efficiently track and predict sudden access in the system, and improve the system response speed.
附图说明Description of drawings
图1是本发明提供的磁盘的突发性访问识别方法的一种实施例的流程示意图。FIG. 1 is a schematic flowchart of an embodiment of a method for identifying sudden access to a disk provided by the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
参见图1,是本发明提供的磁盘的突发性访问识别方法的一种实施例的流程示意图,该方法包括步骤101至步骤104,各步骤具体如下:Referring to Fig. 1, it is a schematic flow chart of an embodiment of a sudden access identification method of a disk provided by the present invention, the method includes steps 101 to 104, and each step is specifically as follows:
步骤101:获取块数据的历史系统行为,构建块数据的行为分析数学模型;该行为分析数学模型记录了若干个突发性访问行为的描述信息和评估机制;该行为分析数学模型用于跟踪和预测系统中的突发性访问行为。Step 101: Obtain the historical system behavior of the block data, and build a behavior analysis mathematical model of the block data; the behavior analysis mathematical model records the description information and evaluation mechanism of several unexpected access behaviors; the behavior analysis mathematical model is used for tracking and Predict sudden access behavior in the system.
步骤102:根据行为分析数学模型,监测磁盘I/O口中的第一访问行为,判断第一访问行为是否为突发性访问行为。若是,则执行步骤103,否则,执行步骤104。Step 102: According to the behavior analysis mathematical model, monitor the first access behavior in the disk I/O port, and determine whether the first access behavior is a sudden access behavior. If yes, execute step 103; otherwise, execute step 104.
步骤103:根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型。Step 103: According to the evaluation mechanism of the behavior analysis data model, track and predict the first access behavior, and record the data of the whole process for updating the behavior analysis mathematical model.
步骤104:根据第一访问行为,执行相应的操作。Step 104: Perform corresponding operations according to the first access behavior.
在本实施例中,步骤101中,获取块数据的历史系统行为,具体为:通过Trace日志文件,获取块数据的历史系统行为。Trace是记录系统行为的一种日志文件,它能够准确、真实、离线地再现系统中曾经发生的某些事件。In this embodiment, in step 101, the historical system behavior of the block data is obtained, specifically: the historical system behavior of the block data is obtained through a Trace log file. Trace is a log file that records system behavior. It can accurately, truly and offline reproduce certain events that have occurred in the system.
在本实施例中,行为分析数学模型还用于为非突发性访问行为提供识别依据。In this embodiment, the behavior analysis mathematical model is also used to provide identification basis for non-emergency access behaviors.
由上可见,本发明实施例提供的磁盘的突发性访问识别方法,先获取块数据的历史系统行为,构建行为分析数学模型,再监测磁盘I/O口中的第一访问行为,并通过行为分析数学模型,判断第一访问行为是否为突发性访问行为。若是,则根据行为分析数据模型的评估机制,跟踪和预测第一访问行为,并记录整个过程的数据,用于更新行为分析数学模型;否则,根据第一访问行为,执行相应的操作。相比于现有技术的感知力不足,本发明技术方案能高效地跟踪和预测系统中的突发性访问,提高系统响应速度。It can be seen from the above that the sudden access identification method of the disk provided by the embodiment of the present invention first obtains the historical system behavior of the block data, builds a behavior analysis mathematical model, and then monitors the first access behavior in the disk I/O port, and through the behavior Analyze the mathematical model to determine whether the first access behavior is a sudden access behavior. If so, track and predict the first access behavior according to the evaluation mechanism of the behavior analysis data model, and record the data of the whole process for updating the behavior analysis mathematical model; otherwise, perform corresponding operations according to the first access behavior. Compared with the lack of perception in the prior art, the technical solution of the present invention can efficiently track and predict sudden access in the system, and improve the system response speed.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random AccessMemory,RAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented through computer programs to instruct related hardware, and the programs can be stored in a computer-readable storage medium. During execution, it may include the processes of the embodiments of the above-mentioned methods. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM) and the like.
以上所述是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也视为本发明的保护范围。The above description is a preferred embodiment of the present invention, and it should be pointed out that for those skilled in the art, without departing from the principle of the present invention, some improvements and modifications can also be made, and these improvements and modifications are also considered Be the protection scope of the present invention.
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711500044.0ACN108268215A (en) | 2017-12-30 | 2017-12-30 | A kind of sudden access recognition methods of disk |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711500044.0ACN108268215A (en) | 2017-12-30 | 2017-12-30 | A kind of sudden access recognition methods of disk |
| Publication Number | Publication Date |
|---|---|
| CN108268215Atrue CN108268215A (en) | 2018-07-10 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711500044.0APendingCN108268215A (en) | 2017-12-30 | 2017-12-30 | A kind of sudden access recognition methods of disk |
| Country | Link |
|---|---|
| CN (1) | CN108268215A (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104965674A (en)* | 2015-06-08 | 2015-10-07 | 暨南大学 | Low-energy-consumption disk scheduling method and system based on block association |
| CN105094986A (en)* | 2015-07-20 | 2015-11-25 | 暨南大学 | Prediction method and device for burst access behaviors oriented to storage system |
| CN107241384A (en)* | 2017-05-03 | 2017-10-10 | 复旦大学 | A kind of content distribution service priority scheduling of resource method based on many cloud frameworks |
| CN107341267A (en)* | 2017-07-24 | 2017-11-10 | 郑州云海信息技术有限公司 | A kind of distributed file system access method and platform |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104965674A (en)* | 2015-06-08 | 2015-10-07 | 暨南大学 | Low-energy-consumption disk scheduling method and system based on block association |
| CN105094986A (en)* | 2015-07-20 | 2015-11-25 | 暨南大学 | Prediction method and device for burst access behaviors oriented to storage system |
| CN107241384A (en)* | 2017-05-03 | 2017-10-10 | 复旦大学 | A kind of content distribution service priority scheduling of resource method based on many cloud frameworks |
| CN107341267A (en)* | 2017-07-24 | 2017-11-10 | 郑州云海信息技术有限公司 | A kind of distributed file system access method and platform |
| Title |
|---|
| 黄立锋等: ""可时间局部性感知的块I/O关联挖掘算法"", 《小型微型计算机系统》* |
| Publication | Publication Date | Title |
|---|---|---|
| CN109978379B (en) | Time series data anomaly detection method, device, computer equipment and storage medium | |
| CN105071983B (en) | Abnormal load detection method for cloud calculation on-line business | |
| TWI510916B (en) | Storage device lifetime monitoring system and storage device lifetime monitoring method thereof | |
| CN119179598B (en) | Solid state disk fault prediction method and system based on artificial intelligence | |
| CN114169604A (en) | Performance index abnormality detection method, abnormality detection device, electronic apparatus, and storage medium | |
| CN107392320A (en) | A kind of method that hard disk failure is predicted using machine learning | |
| US12353961B2 (en) | Method and apparatus for determining storage load of application | |
| US20180210802A1 (en) | Generation of end-user sessions from end-user events identified from computer system logs | |
| CN106502861A (en) | A kind of method for penetrating RAID card reading hard disk SMART information | |
| CN111813585A (en) | Prediction and processing of slow disk | |
| CN109344017A (en) | A method, device and readable storage medium for predicting memory failure based on machine learning | |
| CN115439928A (en) | A method and device for operating behavior recognition | |
| CN111784301A (en) | User portrait construction method and device, storage medium and electronic device | |
| US20160259849A1 (en) | System and method for reducing size of raw data by performing time-frequency data analysis | |
| CN113656228A (en) | Disk fault detection method and device, computer equipment and storage medium | |
| CN119149321A (en) | Real-time performance detection method and system for solid state disk | |
| CN113221352A (en) | Complex equipment health management method and system based on digital twins | |
| CN110704508B (en) | Intelligent production line abnormal data processing method and device | |
| CN105138447A (en) | Method for monitoring hard disk and memory in Reboot test process | |
| CN119107194B (en) | Income and expenditure declaration data processing method and system based on multi-heterogeneous models | |
| CN111091863A (en) | Storage equipment fault detection method and related device | |
| CN108268215A (en) | A kind of sudden access recognition methods of disk | |
| CN118535369A (en) | System fault processing method and device, storage medium and electronic equipment | |
| JP7222344B2 (en) | Determination device, determination method, determination program, learning device, learning method, and learning program | |
| CN117632610A (en) | Disk fault detection method and storage medium applied to HCI platform |
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information | Address after:510000 No. 293 Shipai Zhongshan Avenue, Tianhe District, Guangzhou City, Guangdong Province Applicant after:Guangdong Normal University of Technology Address before:510665 293 Zhongshan Avenue, Tianhe District, Guangzhou, Guangdong. Applicant before:Guangdong Technical Normal College | |
| CB02 | Change of applicant information | ||
| RJ01 | Rejection of invention patent application after publication | Application publication date:20180710 | |
| RJ01 | Rejection of invention patent application after publication |