Using machine learning techniques to enhance the performance of an automatic backup and recovery system

  • Authors:
  • Avichai Giat;Dan Pelleg;Eran Raichstein;Amir Ronen

  • Affiliations:
  • IBM, Haifa Research Lab, Haifa University Campus, Mount Carmel, Haifa, Israel;Haifa Research Lab, Haifa University Campus, Mount Carmel, Haifa, Israel;IBM Software Group, Matam, Haifa, Israel;Haifa Research Lab, Haifa University Campus, Mount Carmel, Haifa, Israel

  • Venue:
  • Proceedings of the 3rd Annual Haifa Experimental Systems Conference
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

A typical disaster recovery system will have mirrored storage at a site that is geographically separate from the main operational site. In many cases, communication between the local site and the backup repository site is performed over a network which is inherently slow, such as a WAN, or is highly strained, for example due to a whole-site disaster recovery operation. The goal of this work is to alleviate the performance impact of the network in such a scenario, and to do so using machine learning techniques. We focus on two main areas, prefetching and read-ahead size determination. In both cases we significantly improve the performance of the system. Our main contributions are as follows: We introduce a theoretical model of the system and the problem we are trying to solve and bound the gain from prefetching techniques. We construct two frequent pattern mining algorithms and use them for prefetching. A framework for controlling and combining multiple prefetch algorithms is presented as well. These algorithms, as well as various simple prefetch algorithms, are compared on a simulation environment. We introduce a novel algorithm for determining the amount of read ahead on such a system that is based on intuition from online competitive analysis and on regression techniques. The significant positive impact of this algorithm is demonstrated on IBM's FastBack system. Much of our improvements have been applied with little or no modification of the current implementation's internals. We therefore feel confident in stating that the techniques are general and are likely to have applications elsewhere.