• No results found

A closed network model for I/O subsystems

N/A
N/A
Protected

Academic year: 2021

Share "A closed network model for I/O subsystems"

Copied!
14
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

A closed network model for I/O subsystems

Citation for published version (APA):

Wijbrands, R. J., & Wessels, J. (1984). A closed network model for I/O subsystems. (Memorandum COSOR; Vol. 8403). Technische Hogeschool Eindhoven.

Document status and date: Published: 01/01/1984 Document Version:

Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication:

• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website.

• The final author version and the galley proof are versions of the publication after peer review.

• The final published version features the final layout of the paper including the volume, issue and page numbers.

Link to publication

General rights

Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain

• You may freely distribute the URL identifying the publication in the public portal.

If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the “Taverne” license above, please follow below link for the End User Agreement:

www.tue.nl/taverne Take down policy

If you believe that this document breaches copyright please contact us at: openaccess@tue.nl

providing details and we will investigate your claim.

(2)

Department of Mathematics and Computing Science

Memorandum COSOR 84 - 03

A closed network model for I/O subsystems by

R. Wijbrands and J. Wessels

Eindhoven, the Netherlands January 1984

(3)

A CLOSED NETWORK MODEL FOR I/O SUBSYSTEMS by

R. Wijbrands and J. Wessels

Abstract

In this paper we look at the problem of modelling and analysing an I/O sub-system. There are two conventional ways to look at this problem. Tqe first is to model the I/O subsystem as an MIGII queue, thus neglecting the CPU influence on the arrival stream. The second way is to use the central server model, treating the nonexponentially distributed I/O service times .as expo-nentially distributed.

Here we t:J to combine the benefits of both methods. We use a closed network model and analyse this by using an adjusted mean-value scheme. In this scheme service times depend on the number of clients in system. We make use of the residual lifetime distribution of the client in disk service. Some ~xperi­

ments show that the model yields accurate results.

1. Introduction

In this paper we look at the problem of modelling and analysing I/O. sub-systems. The modelling of these systems has been extensively dealt ¥ith in literature ([4J). Many of the models proposed there, try to compare the al-ternative configurations by looking at them as MIGI 1 queues. Then the

Pollaczek-Khintchine formula for response time, gives a comparison measure for the different alternatives. A major disadvantage of these methods is that they cannot tell you the system throughput, but ~n fact need t~is

(4)

in-formation as input for the model. Further the input stream cannot be ex-pected to be a Poisson stream. In Section 3 we will show that this may lead to a considerable overestimation of the I/O response times.

A second way to look at the problem is to model the CPU-disk system as a central server model. In this case the disk units are treated as exponential servers. This model does give you a system throughput. but it is obvious that this throughput cannot be very accurate.

In this paper we try to combine the two methods. We look at a closed net-work and analyse it by using a mean-value scheme. which is adjusted in a Pollaczek-Khintchine way. This method proofs to be very accurate.

In Section 2 we will look at the system configuration underlying our models. In Section 3 we will discuss an example and give some results for the

MIGll

model. In Section 4 we will discuss our approximation using the same example. Finally in Section 5 we will make some concluding remarks •.

2. The CPU-disk system

In this section we describe the basic components of the system under consi-deration and their interconnections.

The system consists of a CPU and several strings of disk units interconnec-ted by paths. These paths are made up by a channel, a control unit (CU) and a head of string controller (HSe). Each channel may be connected to several HSC's and vice versa, and each HSC may be connected to several disk units. Each disk unit however, can be connected to only one HSC. This configuration encloses the possibility that the CPU and a selected disk unit are

(5)

intercon 3 intercon

-nected through more than one path (multipathing).

An example (a slight modification of an example use by Brandwajn [2]) of the system is represented in Figur~ 1.

Figure 1. An example of the system configuration.

A job enters the system at the CPU. After being processed for a while, the job either leaves the system (ready), or it proposed an I/O request. When-ever a job leaves the system, it is immediately replaced by a new job; we assume that the number of jobs in the system is constant and equals the multiprogramming level.

The processing in the CPU is assumed to follow a PS discipline. The CPU service time distribution may take any form. In the example of Section 3 and 4 it is taken to be exponential.

The process controlling the I/O requests is less straight (see e.g. [6] or [7]). In this paper we only consider disk units that have the RPS feature

(rotational position sensing). For these disk units the disk access process can be described as follows.

When the CPU has an I/O request, it has to submit a Start I/O command. It therefore needs a free path to the disk, causing a possible delay. The trans-fertime of the SIO command can and will be neglected. Now the disk unit,

(6)

which is not considered in the path, can be busy, causing a second possible delay for the request. After this possible wait, the disk service will start. The disk service time can be split up in several phases (we assume them to be independent), here described for a read operation:

The seek; The read lwrite head has to move to the proper cylinder. We assume that the time being considered with this seek, is uniformly distributed between 0 and T lana. Note that this assumption is only

see x

needed for expository reasons and is, like all distribution assumptions in this section, unessential to the methods described in Section 3 and 4.

The latency; The read / write head has to wait until the rotating disk has brought the proper sector in the right position to be read. Assuming the latency to be uniformly distributed, this causes an expected latency of half a disk revolution: O.S.T

ROT•

The extra latency; Now the disk is ready for transfer of the requested information, but, as with the SIO command, the path has to be free. When the disk finds the path to be busy, this causes a delay of one full revolution before a second reconnect attempt can be made. When p is the probability that a disk unit finds the path busy (note that p is to be estimated), the number of misses thus caused can be approximated by a geometric distribution with parameter p. Here implicitely the assumption is made that the probability of a reconnect miss is independent of the past, which is obviously not true. Some adjustments on the geometric approach are proposed bye. g. Bard [1 ] and Brandwaj n [3J, who take the probability of a second miss to be somewhat higher than the probability of the first miss.

(7)

5

-Data transfer; When the disk is ready for transfer and it finds the path to be free, the information is read and transferred immediately. We assume the message length to be exponentially distributed with mean

l/~TR·

The write operations do not differ essentially from the read operation. For the sake of simplicity of presentation we will consider all I/O requests to be read operations.

In the multipathing case, we have to distinguish between two types of I/O systems with a different lever of intelligence. In the first system a disk has to use that path for the data transfer that initially was used for the corresponding SIO command. In the second system there is some more intelli-gence; the disk can choose any free path for data transfer. In the next we will only consider the first of these systems, but the methods are easily extended to the second case.

In some cases the disk units cannot store the SIO commandst a job has to wait at the CPU for the disk to become free. In such a case the channel wait has to be included in the disk service time. The methods described in the next two sections are easily modified to this case.

3. The open network solution

When we replace the CPU in the Section 2 network by a source, submitting a Poisson stream of I/O requests, the system can rather easily be analysed. However, this method may lead to a considerable overestimation of the response time, as we will show in an example in this section.

(8)

Suppose we know the size of the input stream. Then, given the routing of the jobs, the utilization of the channels, CU's, are known and thus the path uti-lization. The probability of a disk finding the path busy is then easily es-timated by taking the conditional probability on a disk being ready for data transfer (e.g. [2J, [3J). Then, using the detailed description of the disk service time distribution, one can estimate the variation coefficient of this distribution. With the Pollaczek-Khintchine formula for

MIGll

waitinglines, one has the response time of the disk unit. In this way we can compare diffe-rent I/O configurations.

A disadvantage of the method, however, is that the throughput has to be known in advance. When we campare two I/O configurations using this method we can tell whetqer the one performs much better then the other or not, given a certain throughput. But the question whether the alternative configuration

indee4 greatly improves the total system throughput, or not, remains unanswered.

Now let us examine the results of this method, by comparing it with a discrete event simulation of the original system (containing a CPU with exponential distributed service times). We will look at the response time as a function of the throughput and CPU utilization. To get a certain combination of through-put and utilization we estimate the number of clients in system and the CPU service time in the simulation experiment by means of trial and error.

• '.0

Let us use the example represented in Figure 1 due to Brandwajn [2J. In this example the two channels (and CU's) are used equally. A job passing CU on its way to a disk unit, contains with probability

1

a SIO command for a string 1 disk unit and with probability

j

a SID command for one of the other disk

(9)

7

-units. For all disk units the average transfertime is 8 ms, a revolution period equals 16.7 ms, and the average seektimes are set to 25 ms. When we use these data combined with Brandwajn's approximation for extra latency [3J, we'll get the following picture.

When the CPU is in full utilization, causing a Poissonstream of I/O requests, the open network solution gives a fairly good approximation of disk unit response "time. Lowering the CPU utilization to 85% or 50%, as shown in Figures 2 and 3, leads to a considerable overestimation of the response time by the open network approximation, especially for the highly utilized string 2 disk units. Apparently the

MIGtl

method overestimates the variance of the inter-arrival time distribution.

IIESPOllSE TIllE IN MS. IIESPONS& TIllE IN MS. 60 80 120 100 50 25 40

+---r---,-

40...==""-_ _-r- -r- r---15 0 25 50 15 "'I/O'S I;I/O'S

PER SEC. PER SEC.

45 55

50 60

Figure 2. Response time for string 1 disk units

Figure 3. Response time for string 2 disk units

MIGII

result ~ simulation with a 100% CPU utilization simulation with a 85% CPU utilization

(10)

4. The closed network solution

From the example in Section 3 one can conclude that the CPU utilization has a certain influence on the response time which can not be neglected. It is therefore that we propose in this section a solution including this CPU in-fluence.

We use the closed network model as represented in Figure 4.

Figure 4. The closed network.

A job is served with Processor Sharing (PS) by the CPU. Then it has to wait until a path becomes free to be used for the SIO command. Given the zero service time assumption for SIO transfer, the only time to consider here is waiting time. We model this as an Infinite Server station (IS) with an esti-mation of the waiting time as its service time. Next the job will arrive at the disk, working with a First Come First Served discipline (FCFS). Finally, the job returns to the CPU, where the story starts again.

When the FCFS stations had exponentially distributed service times, the per-formance characteristics could be solved exactly by using e.g. the mean value algorithm (MVA). Unfortunately this is not true. But let us assume that the

(11)

9

-basic idea of the MVA~ a client finding the system in equilibrium~ still

holds. Then we can solve an adjusted mean-value scheme.

Let us denote the response time of the CPU, the channels i and the disks j as a function of the number of clients K in system by RCPU[K], RCH.[K] and

~

~.[K]. Following the same convention let

Q

denote the length of the

waiting-J

line,

A

denote th~station's throughput (in the case of the channel we only

count the throughput caused by the data transfer), and let p denote the uti~

lization. The expected disk-i-service time depending on the number of clients K in system (because of the path blocking included) we denote by I/~D.[KJ.

2 ~

With aD.[K] we denote the variance of the service time.

~

Further, let l/VD.[K] be the average residual service time of the client in

~

service at disk i upon arrival of a new client~ in the situation of K clients

in system. Let eCHo denote the probability channel i is used for an I/O

~

request and let ~. denote the probability disk j is used for an I/O request.

J

Finally, let us denote the probability of disk i finding its path busy~ K clients in system~ by p [K].

Pi

Now we can estimate the system performance characteristics by initiating K = 1 and Q. [0] ='p.[0] = 0 and solving the following recursive scheme:

2 2 llD. [K-l] • (aD.[K-l] + ~ ~ p [K-l] p. ~

=

0.5 Tseekmax + 0.5 TROT + 1 - p [K-I]

p. 2 ~ l/11D.[K-l]) ~ l/v [K]

=

D •. ~

=

(1 + Q [K-IJ)._I-CPU llCPU

(12)

~.[KJ J ~. [K}~ ~. K/sum J J PD. [KJ = J

The residual service time approximation needs some further explanation. Because we know that there are at least two clients at the disk, we use the formula for the average residual service time ([5J) for the equivalent system with one job less.

The way in which to calculate p [KJ varies with the I/O configuration.

Pi

Again let us use Brandwajnts example to demonstrate this way of modelling. Here the string 1 disks have one path to the CPU, which is to be shared with the second string. We can estimate the probability of a path busy for a s,tring 1 disk unit by:

(13)

11 -P [K]

=

PD. 1. D. E: string 1. 1.

Note that a busy channel of 1/3.

is handling a string 1 disk with a probability

A string 2 disk has two paths. With probability 0.4 the disk has chosen for channell, with probability 0.6 for channel 2. This leads to the

£0110-wing expression for the path 2 busy probability

p [K]

=

0.4{P CH2[KJ PD. 1. + 2/ 3PCH [K] + (I-PCH [K] - 2/3PDH [KJ) 1 2 1 • 1/3PCH [KJ} +

O.6{P

CHCKJ +- 2/3PCH [KJ} 1 " 2 I D. E: string 2. 1.

The results of this method fit very well the results of the simulation expe-riments we ran for this example. In Table I we give the system throughput of Brandwajn's example under varying conditions.

uU u

I

II

ADJUSTED MVA RESULTS

u SIMULATION RESULTS u

u R

9 II

U U

A

Rstring 2

"

ACPU Rstring I Rstring 2

;;- clients IIIlCPU PCPU ACPU Rstring 1

"

PCPU u u II II U 42.8 45.8 u 0.51 30.1 42.6 43.7 2 17 uu 0.50 29.7 u u u u u 78.4 u 0.48 69.2 48.4 76.2 6 7 uu 0.49 69.6 48.9 II U u u u 43.3 48.1 u 0.83 27.8 43.5 48.0 3 30 uII 0.85 28.1 II U U U u 100.4 II 0.82 74.8 49.8 98.7 10 11

"

0.85 76.4 50.7

"

u u u U II 51.9 u 1.00 30.0 44.3 52.3 ~ 33.3 u 1.00 30.0 44.9

"

u II II U u 119.5 u 1.00 75.0 50.2 120.6 ~ 13.3 II 1.00 75.0 51.2 u n u

(14)

5. Conclusions

Although the solution method presented in the preceding section is based on an assumption about the behaviour in equilibrium, which is clearly not met, ,the method seems to yield very accurate results. The method is easy to apply

and can be extended to solve more complicated situations. The method seems to be an appropriate tool to use in the comparison of the performance charac-teristics of alternative I/O corifigurations.

References

[ I ] Bard, _Y.: "A model of Shared DASD and Multipathing", Comm. ACM 23 (1980), 564-572.

[2J Brandwajn, A.: "DASD Subsystem Modelling", Computer Performance 3 (1982), 40-44.

[3] Brandwajn, A.: "A Capacity Planning Model of a DASD Subsystem", Kylstra, F.J. (editor), "Performance 81", 401-413, Nortb-Holland Publishing Company, Amsterdam, 1981.

[4] Hunter, D.: "Modelling Real DASD Configurations",

Disney, R.L. and Ott, J.O.: "Applied Probability-Computer Science", 451-468, Birkhauser, Boston, 1982.

[5J Kleinrock, L.: "Queueing Systems Vol. 1", J. Wiley &Sons, New York, 1975.

[6] Paans, R.: "An Accurate Model for MVS Disk

r/o"

ECOMA-I0, Conference Proceedings (1982), 225-234.

[7] Wilhelm, N.C.: "A General Model for the Performance of Disk Systems", J. ACM 24 (1977), 14-31.

Referenties

GERELATEERDE DOCUMENTEN

De Vrije Hogeschool gaat uit van het principe van Liberal Arts als Bildung en geeft het onderwijs vorm door Liberal Education (Bildung) als voorbereiding of als aanvulling

Mindmap van een nieuw verhaal door Dirk Coenen | geweldigewebsite.nl

 … het systeem leidend laten zijn als u met deze kennis het systeem snel kunt omvormen tot een mentaal krachtig besturingssysteem waarin mensen met elkaar door grenzen heen

door geen van beide organismen alleen door organisme I alleen door organisme 2I. zowel door organisme I als door organisme

In de verordening wordt verwezen naar de voorgestelde wijziging van de Wabo, ook wel de wet VTH genoemd, die ter vaststelling aan de Tweede Kamer is aangeboden en waarin

In this section, we describe our long-term sleep scheduling scheme proposed to reduce the energy consumption of home- embedded devices connected to a Wi-Fi-based M2M network

[r]

With the use of correlation analysis on historical data of the outpatient clinics and the diagnostics department a model has been built to forecast the arrival of patients for up