Detection and exploitation of file working sets
- 10 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The work habits of most individuals yield file access patterns that are quite pronounced and can be regarded as defining working sets of files used for particular applications. This paper describes a client-side cache management technique for detecting these patterns and then exploiting them to successfully prefetch files from servers. Trace-driven simulations show the technique substantially increases the hit rate of a client file cache in an environment in which a client workstation is dedicated to a single user. Successful file prefetching carries three major advantages: (1) ap- plications run faster, (2) there is less ''burst'' load placed on the network, and (3) properly-loaded client caches can better survive network outages. Our technique re- quires little extra code, and — because it is simply an augmentation of the standard LRU client cache management algorithm — is easily incorporated into existing software.Keywords
This publication has 7 references indexed in Scilit:
- File system design using large memoriesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Intelligent caching for remote file servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Coda: a highly available file system for a distributed workstation environmentIEEE Transactions on Computers, 1990
- Directory reference patterns in hierarchical file systemsIEEE Transactions on Knowledge and Data Engineering, 1989
- Scale and performance in a distributed file systemACM Transactions on Computer Systems, 1988
- A trace-driven analysis of the UNIX 4.2 BSD file systemPublished by Association for Computing Machinery (ACM) ,1985
- Analysis of Long Term File Reference Patterns for Application to File Migration AlgorithmsIEEE Transactions on Software Engineering, 1981