Understanding Data Access Patterns for dCache System

被引:0
|
作者
Bellavita, Julian [1 ]
Sim, Caitlin [1 ]
Wu, Kesheng [2 ]
Sim, Alex [2 ]
Yoo, Shinjae [3 ]
Ito, Hiro [3 ]
Garonne, Vincent [3 ]
Lancon, Eric
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Lawrence Berkeley Natl Lab, Berkeley, CA USA
[3] Brookhaven Natl Lab, Upton, NY USA
来源
26TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS, CHEP 2023 | 2024年 / 295卷
关键词
D O I
10.1051/epjconf/202429501053
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The storage management system dCache acts as a disk cache for high-energy physics (HEP) data from the US ATLAS community. Since its disk capacity is considerably smaller than the total volume of ATLAS data, a heuristic is needed to determine what data should be kept on disks. An effective heuristic would be to keep the data files that are expected to be heavily accessed in the near future. Through a careful study of access statistics, we find a few most popular datasets are accessed much more frequently than others, even though these popular datasets change over time. If we could predict the near-term popularity of datasets, we could pin the most popular ones in the disk cache to prevent their accidental removal and guarantee their availability. To predict a dataset popularity, we present several methods for forecasting the number of times a dataset will be accessed in the next day. Test results show that these methods could predict the next-day access counts of popular datasets reliably. This observation is confirmed with dCache logs from two separate time ranges.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Understanding the Use of Narrative Patterns by Novice Data Storytellers
    Blount, Tom
    Koesten, Laura
    Zhao, Yuchen
    Simperl, Elena
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON COMPUTER-HUMAN INTERACTION RESEARCH AND APPLICATIONS (CHIRA), 2020, : 128 - 138
  • [42] Distributed Storage Algorithm for Geospatial Image Data Based on Data Access Patterns
    Pan, Shaoming
    Li, Yongkai
    Xu, Zhengquan
    Chong, Yanwen
    PLOS ONE, 2015, 10 (07):
  • [43] Data access control in virtual organisations - Role-Based Access Control patterns
    Bertok, P
    Kodituwakku, SR
    DIGITAL ENTERPRISE CHALLENGES: LIFE-CYCLE APPROACH TO MANAGEMENT AND PRODUCTION, 2002, 77 : 394 - 405
  • [44] Fertility patients' patterns of treatment seeking: understanding delays in presentation and barriers to access
    Wiweko, B.
    Shafira, N.
    Bennett, L. R.
    HUMAN REPRODUCTION, 2012, 27
  • [45] Understanding the Influence of Ghanaian Women's Migration Patterns on Access to Health Care
    Rizwan, Laiba
    Malagon, Michelle
    Richter, Solina
    WOMEN, 2022, 2 (01): : 30 - 43
  • [46] Trajectory Data Analysis in Support of Understanding Movement Patterns: A Data Mining Approach
    Rizk, Aya
    Elragal, Ahmed
    AMCIS 2012 PROCEEDINGS, 2012,
  • [47] A study on the mining access patterns from web log data
    Ahn, Jeong Yong
    IEICE Transactions on Information and Systems, 2002, E85-D (04) : 782 - 785
  • [48] Systematic data reuse exploration methodology for irregular access patterns
    Van Achteren, T
    Lauwereins, R
    Catthoor, F
    13TH INTERNATIONAL SYMPOSIUM ON SYSTEM SYNTHESIS, PROCEEDINGS, 2000, : 115 - 121
  • [49] An efficient data mining algorithm for discovering web access patterns
    Yen, SJ
    Lee, YS
    WEB TECHNOLOGIES AND APPLICATIONS, 2003, 2642 : 187 - 192
  • [50] A Tool for Characterizing and Succinctly Representing the Data Access Patterns of Applications
    Mills, Catherine
    Snavely, Allan
    Carrington, Laura
    2011 IEEE INTERNATIONAL SYMPOSIUM ON WORKLOAD CHARACTERIZATION (IISWC), 2011, : 126 - 135