Method and System for Assigning Storage Access Priorities to Input/output Intensive Host Applications in a Cloud Storage Network
Publication Date: 2014-May-02
The IP.com Prior Art Database
A method and system is disclosed for automatically managing input/output (IO) access to a cloud storage subsystem based on one or more access priorities.
Page 01 of 6
Method and System for Assigning Storage Access Priorities to Input/output Intensive Host Applications in a Cloud Storage
In prior art storage systems the host access is managed via a controller. An average bandwidth for input/output (IO) processing is defined by at least one of an amount of disk-spindles, performance capabilities of the controller, arrangement of the disk arrays of disk spindles, a kind and type of interface between a host and the storage systems. Depending on how many data streams are delivering data simultaneously to a dedicated storage, the system fills the storage bandwidth up to the system's physical boundaries. In case a well performing host delivers many small data IO, the storage maximum bandwidth is reached fast. In case midrange storage products are used, the system's physical boundaries are reached early. Often in today's architecture of data processing, a single hardware server can contain multiple virtual servers which can share the same hardware. This can easily result in storage bandwidth utilization problems seen as access time outs at host software. An additional problem seen in
real scenarios is that the different applications on different virtual servers process data IO independently from each other to the
same hardware. This results in overload of shared storage hardware.
Disclosed is a method and system for automatically managing IO access to a storage subsystem based on one or more access priorities. The one or more access priorities can be defined by at least one of a host application and a storage configuration policy.
In an embodiment, the method and system manages one or more disk-Logical Unit Number (LUN) access from a host-level during the creation process of each disk-LUN of the one or more disk-LUN. During the initial setup, the method and system associates a host-network-identifier (ID) with a priority bit value. The host-network-ID can be a network-hardware address or a
worldwide node name within at least one of a storage area network and a cloud storage environment.
FIG. 1 is a flowchart illustrating the steps executed by the method and system disclosed herein.
Page 02 of 6
In accordance with FIG. 1, the priority to access a disk-LUN at a storage-subsystem is managed by a disk-controller only.
Page 03 of 6
In another embodiment, the method and system manages the disk-LUN access from an application-level with priority using a Small Computer System Interface (SCSI)-write command.
FIGs. 2 and 3 illustrate the management of the disk-LUN access from an application-level based on priority using the SCSI-write
Page 04 of 6
With reference to FI...