Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AN APPARATUS FOR MANAGING POWER-CONSUMPTION
Document Type and Number:
WIPO Patent Application WO/2008/009510
Kind Code:
A1
Abstract:
An apparatus for managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices. The apparatus comprises a receiver for receiving a policy comprising a power-management parameter, a first parameter and a rule associated with the policy; an analyser, responsive to receipt of a policy, for analysing second data associated with the rule; and a determiner, responsive to the analysis, for determining third data in accordance with the second data, wherein the third data is associated with migration of the first data.

Inventors:
COOPER ALASTAIR (GB)
NICHOLSON ROBERT BRUCE (GB)
Application Number:
PCT/EP2007/055361
Publication Date:
January 24, 2008
Filing Date:
May 31, 2007
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
IBM (US)
COOPER ALASTAIR (GB)
NICHOLSON ROBERT BRUCE (GB)
International Classes:
G06F3/06; G06F1/32
Foreign References:
US20050268121A12005-12-01
US20050066206A12005-03-24
US6892313B12005-05-10
Other References:
EDUARDO PINHEIRO ET AL.: "Energy Conservation Techniques for Disk Array-Based Servers", INTERNATIONAL CONFERENCE ON SUPERCOMPUTING - PROCEEDINGS OF THE 18TH ANNUAL INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, 26 June 2004 (2004-06-26) - 1 July 2004 (2004-07-01), Malo, France, pages 68 - 78, XP002449715, ISBN: 1-58113-839-3, Retrieved from the Internet [retrieved on 20070906]
Attorney, Agent or Firm:
SEKAR, Anita (Intellectual Property LawHursley Park,Winchester, Hampshire SO21 2JN, GB)
Download PDF:
Claims:

CLAIMS

1. An apparatus for managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices, the apparatus comprising:

a receiver for receiving a policy comprising a power-management parameter, a first parameter and a rule associated with the policy;

an analyser, responsive to receipt of a policy, for analysing second data associated with the rule; and

a determiner, responsive to the analysis, for determining third data in accordance with the second data, wherein the third data is associated with migration of the first data.

2. An apparatus as claimed in claim 1 , further comprising a generator for generating the policy and the associated rule.

3. An apparatus as claimed in claim 1 or claim 2, further comprising a selector for selecting inputs associated with at least one of: the policy and a subset of the one or more storage devices.

4. An apparatus as claimed in claim 3, wherein the third data is associated with migration of the first data stored on the selected subset of the one or more storage devices.

5. An apparatus as claimed in claim 3 or claim 4, wherein the selector is operable by a user.

6. An apparatus as claimed in any preceding claim, further comprising a monitor for gathering the second data.

7. An apparatus as claimed in any preceding claim, wherein the second data comprises fourth data associated with usage of the first data and fifth data associated with storage state of the one or more storage devices.

8. An apparatus as claimed in any preceding claim, wherein the second data comprises historical data.

9. An apparatus as claimed in claim 8, wherein the generator is operable to use the historical data to generate at least one of: the policy and an input associated with the policy.

10. An apparatus as claimed in any preceding claim, wherein the generator is operable to use control point data supplied by a user to generate at least one of: the policy and an input associated with the policy.

11. An apparatus as claimed in any preceding claim, further comprising a instruction generator, responsive to the determiner determining the third data, for generating a first instruction associated with the third data.

12. An apparatus as claimed in claim 11 , further comprising a transmitter for transmitting the first instruction to a storage controller in the storage system and wherein the storage controller is operable to use the first instruction to implement the policy.

13. An apparatus as claimed in claim 12, wherein the storage controller is operable to use the first instruction to at least one of: migrate the first data; retain the first data; power up a storage device and power down a storage device in order to implement the policy.

14. An apparatus as claimed in claim 11 or claim 12, further comprising a feedback mechanism for feeding back sixth data associated with implementation of the policy to the generator.

15. An apparatus as claimed in any preceding claim, wherein the third data is associated with migration of the first data from a first storage device to a second storage device.

16. An apparatus as claimed in any preceding claim, wherein the third data further comprises a migration time period associated with migration of the first data from a first storage device to a second storage device.

17. An apparatus as claimed in any preceding claim, wherein the policy comprises an associated time period parameter.

18. An apparatus as claimed in any preceding claim, wherein the first parameter comprises at least one of: a performance parameter and a security parameter.

19. A method for managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices, the method comprising the steps of:

receiving a policy comprising a power-management parameter, a first parameter and a rule associated with the policy;

analysing, in response to the receiving step, second data associated with the rule; and

determining, in response to the analysing step, third data in accordance with the second data, wherein the third data is associated with migration of the first data.

20. A method as claimed in claim 19, further comprising the step of generating the policy and the associated rule.

21. A method as claimed in claim 19 or claim 20, further comprising the step of selecting inputs associated with at least one of: the policy and a subset of the one or more storage devices.

22. A method as claimed in claim 21 , wherein the third data is associated with migration of the first data stored on the selected subset of the one or more storage devices.

23. A method as claimed in any of claims 19 to 22, further comprising the step of gathering the second data.

24. A method as claimed in any of claims 19 to 23, wherein the second data comprises fourth data associated with usage of the first data and fifth data associated with storage state of the one or more storage devices.

25. A method as claimed in any of claims 19 to 24, wherein the second data comprises historical data.

26. A method as claimed in claim 25, further comprising the step of using the historical data to generate at least one of: the policy and an input associated with the policy.

27. A method as claimed in any of claims 19 to 26, further comprising the step of using control point data supplied by a user to generate at least one of: the policy and an input associated with the policy.

28. A method as claimed in any of claims 19 to 27, further comprising the step of generating, in response to determination of the third data, a first instruction associated with the third data.

29. A method as claimed in claim 28, further comprising the step of transmitting the first instruction to a storage controller in the storage system and wherein the storage controller is operable to use the first instruction to implement the policy.

30. A method as claimed in claim 29, wherein the storage controller is operable to use the first instruction to at least one of: migrate the first data; retain the first data; power up a storage device and power down a storage device in order to implement the policy.

31. A method as claimed in claim 29 or claim 30, further comprising the step of feeding back sixth data associated with implementation of the policy.

32. A method as claimed in any of claims 19 to 31, wherein the third data is associated with migration of the first data from a first storage device to a second storage device.

33. A method as claimed in any of claims 19 to 32, wherein the third data further comprises a migration time period associated with migration of the first data from a first storage device to a second storage device.

34. A method as claimed in any of claims 19 to 33, wherein the policy comprises an associated time period parameter.

35. A method as claimed in any of claims 19 to 34, wherein the first parameter comprises at least one of: a performance parameter and a security parameter.

36. A computer program comprising program code means adapted to perform all the steps of any of claims 19 to 35 when said program is run on a computer.

Description:

AN APPARATUS FOR MANAGING POWER-CONSUMPTION

FIELD OF THE INVENTION

The present invention relates to an apparatus for managing power-consumption.

BACKGROUND OF THE INVENTION

Large computing systems are very power-intensive, consuming electricity in huge quantities as disks, servers etc. remain powered on. This is because customers often want a high-availability, high-performance and high-reliability service.

It is desirable for owners of these systems to conserve power, thereby minimising the impact on energy sources and also minimising running costs.

In the prior art, an algorithm for power management can be executed in a computing system. The algorithm places frequently used data on a subset of available disks, such that the remaining disks hold less frequently used data. The algorithm achieves power savings because the disks that hold less frequently used data can be operated in power saving modes. For example, these disks can be spun down and only spun up occasionally in order to service an infrequent data access.

Disadvantageously, by concentrating frequently used data on a subset of available disks, the useable I/O processing capacity of the computing system is reduced. As the I/O workload increases, the disks that hold frequently used data will reach the limit of their I/O processing capacity. As this limit is approached, a user will experience increasingly longer I/O wait times and thus, performance will degrade.

A solution to this problem is to distribute frequently used data over several available disks in order to maximise the effective I/O processing capacity of the computing system.

Thus, the skilled person is faced with a conflict: in order to minimise power consumption, frequently used data should by concentrated on a minimum number of disks and in order to maximise performance, frequently used data should by distributed over a maximum amount of disks.

There is a need for an improved power management mechanism that can be implemented whilst minimising impact on customer service levels.

DISCLOSURE OF THE INVENTION

According to a first aspect, the present invention provides an apparatus for managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices, the apparatus comprising: a receiver for receiving a policy comprising a power-management parameter, a first parameter and a rule associated with the policy; an analyser, responsive to receipt of a policy, for analysing second data associated with the rule; and a determiner, responsive to the analysis, for determining third data in accordance with the second data, wherein the third data is associated with migration of the first data.

According to a second aspect, the present invention provides a method for managing power-consumption, for use in a storage system comprising first data stored on one or more storage devices, the method comprising the steps of: receiving a policy comprising a power-management parameter, a first parameter and a rule associated with the policy; analysing, in response to the receiving step, second data associated with the rule; and determining, in response to the analysing step, third data in accordance with the second data, wherein the third data is associated with migration of the first data.

According to a third aspect, the present invention provides a computer program comprising program code means adapted to perform all the steps of the method above when said program is run on a computer.

It should be understood that the apparatus (200) can be embodied in a Storage Virtualization Controller (SVC) e.g. IBM TotalStorage SAN Volume Controller (IBM and TotalStorage are registered trademarks of International Business Machines Corporation).

It should be understood that although data associated with a virtual disk has been described herein in terms of logical blocks, any number of types of data can be associated e.g. files.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will now be described, by way of example only, with reference to preferred embodiments thereof, as illustrated in the following drawings:

FIG. IA is a block diagram of a computer system comprising a SAN; FIG. IB is a representation of a virtual disk;

FIG. 1C is a representation of a physical disk;

FIG. 2 is a schematic diagram of an apparatus according to the preferred embodiment, for use with the computer system of FIG. 1;

FIG. 3 is a flow chart showing the operational steps involved in a power-management process according to a preferred embodiment;

FIG. 4 is a flow chart showing the operational steps involved in a power-management process according to another preferred embodiment; and

FIG. 5 is a graphical representation of historical data.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The preferred embodiment is described herein in the context of storage systems in a storage area network with access to storage by host computers being controlled by a controller component. Also, the preferred embodiment can be applied in storage architectures with communication between two storage controllers.

A storage area network (SAN) is a network whose primary purpose is the transfer of data between computer systems and storage elements, hi a SAN, storage devices are

centralised and interconnected. A SAN is a high-speed network that allows the establishment of direct communications between storage devices and host computers within the distance supported by the communication infrastructure. A SAN can be shared between servers or dedicated to one server. It can be local or geographically distributed.

SANs enable storage to be externalised from the servers and centralised elsewhere. This allows data to be shared among multiple servers. Data sharing enables access of common data for processing by multiple computer platforms or servers.

The host server infrastructure of a SAN can include a mixture of server platforms. The storage infrastructure includes storage devices which are attached directly to the SAN network. SANs can interconnect storage interfaces together into many network configurations.

Virtualization is the separation of the logical view of storage from its physical implementation enabling physical changes to be made without changing the logical view.

Referring to FIG. IA, a computer system (100) is shown wherein one or more client computers (105) access one or more virtual disks (i.e. Virtual Disk 1, Virtual Disk 2 and Virtual Disk 3) via a computer network (110). The computer network (110) can be in the form of a Local Area Network (LAN), a Wide Area Network (WAN) and can be, for example, via the Internet.

The one or more virtual disks are mapped to one or more physical disks (i.e. Physical Disk 1, Physical Disk 2, Physical Disk 3 and Physical Disk 4) using a SVC (115). The one or more physical disks can include various different forms such as shared storage arrays, tape libraries, disk storage (all referred to generally as storage devices).

A representation of a virtual disk, namely Virtual Disk 1 is shown in FIG. IB. A representation of a physical disk, namely Physical Disk 1 is shown in FIG. 1C.

In the exemplary description herein, each virtual disk comprises 800 logical blocks of data. Each physical disk comprises 400 sectors and provides two extents, each of which comprises 200 sectors. 200 logical blocks on a virtual disk are mapped to one 200 sector extent on a physical disk. It will be clear to one of ordinary skill in the art that the sizings are merely exemplary.

In the description herein, disk data associated with storage state of the virtual disks and physical disks is as follows.

A first 200 logical blocks of Virtual Disk 1 are mapped to a first extent comprising a first 200 sectors on Physical Disk 1. A second 200 logical blocks of Virtual Disk 1 are mapped to a second extent comprising a second 200 sectors on Physical Disk 1. A third 200 logical blocks of Virtual Disk 1 are mapped to a third extent comprising a first 200 sectors on Physical Disk 2. A fourth 200 logical blocks of Virtual Disk 1 are mapped to a fourth extent comprising a second 200 sectors on Physical Disk 2.

A first 200 logical blocks of Virtual Disk 2 are mapped to a fifth extent comprising a first 200 sectors on Physical Disk 3. A second 200 logical blocks of Virtual Disk 2 are mapped to a sixth extent comprising a second 200 sectors on Physical Disk 3. A third 200 logical blocks of Virtual Disk 2 are mapped to a seventh extent comprising a first 200 sectors on Physical Disk 4. A fourth 200 logical blocks of Virtual Disk 2 are mapped to an eighth extent comprising a second 200 sectors on Physical Disk 4.

It should be understood that when a storage device is virtualised but under-utilised, large numbers of arrays may not be allocated as extents or extents that are allocated may not be used regularly. Similarly, even if a storage pool is fully allocated, certain parts of it may not be required from an application point of view at any particular time.

With reference to FIG. 2 and FIG. 3, a first preferred embodiment will now be described.

The apparatus (200) comprises a generator (205) for generating (step 300) a power-management policy. Preferably, the generator (205) comprises storing means for storing a generated power-management policy in a policy base (240). The generator (205) also generates (step 300) a rule associated with a power-management policy and stores the generated rule in a rule base (245).

A user is operable to interact with a client computer (250) comprising a selector (255). The selector (255) is operable to select (step 305) a set of the one or more virtual disks and to select (step 310) inputs associated with a power-management policy. The selector (255) is operable to access the policy base (240).

The client computer (250) also comprises a second transmitter (260) for transmitting a selected power-management policy to a first receiver (210) residing on the apparatus (200). The first receiver (210) is operable to communicate with an analyser (215) and in response to receiving the selected power-management policy, the first receiver (210) passes the selected power-management policy to the analyser (215). The client computer (250) also comprises a second receiver (265) for receiving a notification generated by a notification generator (235).

The analyser (215) is operable to analyse (step 315) the received selected power-management policy and associated one or more rules. In response to the analysis, the analyser (215) is operable to invoke a monitor (220).

The monitor (220) is operable to gather (step 320) data associated with the one or more rules. The monitor (220) is operable to pass the gathered data to the analyser (215). The analyser (215) is operable to analyse the gathered data and the selected power-management policy and associated one or more rules.

A determiner (217) is operable to determine (step 325), in response to the analysis, migration data. Preferably, the determiner (217) is operable to store the migration data. The determiner (217) is operable to pass the migration data to a instruction generator

(225). The instruction generator (225) is operable to use the migration data to generate (step

330) an instruction. Preferably, the instruction generator (225) is operable to store the instruction.

The instruction generator (225) is operable to pass the instruction to a first transmitter (230) residing on the apparatus (200).

The first transmitter (230) sends (step 335) a generated instruction to a SVC (270). In response to receiving a generated instruction the SVC (270) can execute (step 340) an action. Preferably, the action implements the selected power-management policy.

In a first example, the generator (205) generates (step 300) a plurality of power-management policies and stores the power-management policies in the policy base (240). Preferably, a power-management policy represents a balance between a power-management parameter and any number of other parameters (e.g. a security parameter, a reliability parameter etc.). In the first example, the power-management policies comprise a power-management parameter and a performance parameter.

An example of a power-management policy is shown below, wherein "(x)" indicates a value associated with the power-management parameter and "(y)" indicates a value associated with the performance parameter. In the first example, a sum of the values is 100. For a parameter, a value of 100 denotes maximum weight and a value of 0 denotes minimum weight.

Power-management policy:

Power management (x); Performance (y)

It should be understood that a power-management policy can be represented in any number of other ways.

At step 300, the generator (205) generates at least one rule associated with each power-management policy and stores the generated at least one rule in the rule base (245). An

example of a rule is shown below, wherein nl ' (i.e. a second number) is associated with nl (i.e. a first number) and nl is associated with values of parameters of a particular power-management policy:

Rule:

Select nl physical disks to which selected logical blocks can be migrated; select nl' logical blocks to be migrated

It should be understood that a rule can be represented in any number of other ways.

At step 305, the user interacts with a selector (255) to select a set of the one or more virtual disks (e.g. wherein the selector (255) is provided in the form of a menu). In the first example, the selector (255) selects Virtual Disk 1 and Virtual Disk 2.

Furthermore, the selector (255) selects (step 310) inputs associated with a power-management policy. Preferably, the selector (255) is provided to the user in the form of a "slider" bar residing between an icon (or any other object) representing the power-management parameter and an icon representing the performance parameter, such that the user can move the slider bar between positions located between the icons. For example, movement of the slider bar to a middle position between the icons represents a power-management parameter value of "50" and a performance parameter value of "50". It will be clear to one of ordinary skill in the art that the implementation of the selector is merely exemplary.

hi the first example, the selector (255) selects the following inputs:

Policy 1: Power management (75); Performance (25)

The second transmitter (260) transmits virtual disk identifiers associated with the selected virtual disks (i.e. Virtual Disk 1 and Virtual Disk 2) and transmits Policy 1 (or a policy identifier associated with Policy 1) to the first receiver (210). hi response to receiving

the virtual disk identifiers and Policy 1, the first receiver (210) passes the virtual disk identifiers and Policy 1 to the analyser (215). If the first receiver (210) receives a policy identifier associated with Policy 1, the first receiver (210) uses the policy identifier to obtain Policy 1 from the policy base (240) and then passes Policy 1 to the analyser (215).

The analyser (215) analyses (step 315) the virtual disk identifiers by parsing the identifiers. The analyser (215) analyses (step 315) Policy 1 by parsing Policy 1 to obtain a policy identifier associated with Policy 1 (e.g. wherein the identifier is "Policy 1"). In response to obtaining the identifier associated with Policy 1, the analyser (215) accesses the rule base (245) and uses the identifier in order to obtain at least one rule associated with

Policy 1.

In the first example, the analyser (215) obtains Rule 1 shown below. In Rule 1, nl ' is associated with nl such that nl' (i.e. 400) logical blocks can reside on n (i.e. 1) physical disk. Furthermore, nl is associated with the power-management and performance parameters.

Rule 1: Select 1 physical disk to which selected logical blocks can be migrated; select 400 logical blocks to be migrated

In response to the analysis, the analyser (215) is operable to invoke the monitor (220).

The analyser (215) passes the virtual disk identifiers to the monitor (220). The monitor (220) is operable to use the virtual disk identifiers to gather (step 320) data associated with Rule 1. In the first example, the monitor (220) gathers usage data (in operations per second) associated with the selected set of the one or more virtual disks (i.e. Virtual Disk 1 and Virtual Disk 2) in order to determine frequently accessed logical blocks. Alternatively, an external component can determine frequently accessed logical blocks.

hi the first example, the monitor (220) gathers data associated with frequently accessed logical blocks:

• A first 200 logical blocks of Virtual Disk 1 that is mapped to a first extent comprising a first 200 sectors on Physical Disk 1;

• a third 200 logical blocks of Virtual Disk 1 that is mapped to a third extent comprising a first 200 sectors on Physical Disk 2;

• a second 200 logical blocks of Virtual Disk 2 that is mapped to a sixth extent comprising a second 200 sectors on Physical Disk 3; and • a third 200 logical blocks of Virtual Disk 2 that is mapped to a seventh extent comprising a first 200 sectors on Physical Disk 4.

Thus, the frequently accessed logical blocks comprise 800 logical blocks.

It should be understood that the 800 frequently accessed logical blocks could be migrated amongst two of the physical disks (e.g. Physical Disk 1 and Physical Disk 2) (wherein each physical disk comprises 400 sectors), if the remaining 800 logical blocks on the two physical disks (i.e. logical blocks that are not frequently accessed) are migrated elsewhere (e.g. to the other two of the physical disks: Physical Disk 3 and Physical Disk 4).

However, as Rule 1 provides that the selected logical blocks should reside on one physical disk, the monitor (220) determines further data comprising a subset of the 800 frequently accessed logical blocks, wherein the subset can reside on one physical disk. In the first example, the monitor (220) determines a subset comprising 400 of the most frequently accessed logical blocks (the remaining 400 logical blocks of the 800 frequently accessed logical blocks are termed herein as "less frequently accessed logical blocks"):

• A first 200 logical blocks of Virtual Disk 1 that are mapped to a first extent comprising a first 200 sectors on Physical Disk 1; and • a third 200 logical blocks of Virtual Disk 2 that are mapped to a seventh extent comprising a first 200 sectors on Physical Disk 4.

The monitor (220) passes the data associated with the most frequently accessed logical blocks to the analyser (215).

Furthermore, in accordance with Rule 1, the analyser (215) selects one physical disk to which migration occurs. In the first example, the selection is made randomly. In another

example, the selection is made in accordance with user input (e.g. input associated with storage categorisation etc.).

In the first example, the analyser (215) selects Physical Disk 4.

In response, the monitor (220) gathers physical disk data (i.e. data associated with Rule 1 - data associated with storage state) associated with the selected Physical Disk 4. Physical Disk 4 comprises a third 200 logical blocks of Virtual Disk 2 that is mapped to a seventh extent comprising a first 200 sectors on Physical Disk 4 - these logical blocks have been identified in the first subset. Physical Disk 4 also comprises a fourth 200 logical blocks of Virtual Disk 2 are mapped to an eighth extent comprising a second 200 sectors on Physical Disk 4.

The monitor (220) sends the physical disk data associated with the selected Physical Disk 4 to the analyser (215). The analyser (215) analyses the further data associated with the first subset and the physical disk data associated with the selected Physical Disk 4. For example, the analyser compares a size of the first subset with a size available on a selected physical disk etc.

hi the first example, the analyser compares a size of the first subset (i.e. 400 logical blocks comprising 200 sectors on Physical Disk 1 and 200 sectors on Physical Disk 4) to a size available on a Physical Disk 4 (i.e. 0 sectors due to Physical Disk 4 having a seventh extent comprising a first 200 sectors and an eighth extent comprising a second 200 sectors). The analyser analyses a size available on temporary storage (i.e. in the first example, 600 sectors).

In response to the analysis, the determiner (217) determines (step 325) migration data.

hi the first example, the migration data is shown below:

• Migrate the fourth 200 logical blocks of Virtual Disk 2 (mapped to the second 200 sectors on Physical Disk 4) to temporary storage.

• Migrate the first 200 logical blocks of Virtual Disk 1 to the second 200 sectors on Physical Disk 4.

• Migrate the fourth 200 logical blocks of Virtual Disk 2 from the temporary storage to the first 200 sectors on Physical Disk 1.

Preferably, in accordance with a pre-configurable setting, the determiner (217) determines that logical blocks identified in the first subset that are already mapped to sectors on the selected physical disk, do not have to be migrated. Thus, in the first example, the determiner (217) determines that since the third 200 logical blocks of Virtual Disk 2 (i.e. wherein these logical blocks are identified in the first subset comprising most frequently accessed logical blocks) are already mapped to the first 200 sectors on the selected disk i.e. Physical Disk 4, migration associated with the third 200 logical blocks of Virtual Disk 2 is not required.

In response to determining the migration data, the determiner (217) passes the migration data to the instruction generator (225). The instruction generator (225) uses the migration data in order to generate (step 330) one or more instructions that are understandable by the SVC (270). In the first example, the instruction generator (225) formats the migration data to generate three instructions:

<Instruction_l> migrate "fourth 200 logical blocks of Virtual Disk 2" to "temporary storage" </Instruction_l>

<Instruction_2> migrate "first 200 logical blocks of Virtual Disk 1" to "second 200 sectors on Physical Disk 4" </Instruction_2>

<Instruction_3> migrate "fourth 200 logical blocks of Virtual Disk 2" from "temporary storage" to "first 200 sectors on Physical Disk 1" </Instruction_3>

The first transmitter (230) sends (step 335) the instructions to the SVC (270).

Preferably, the notification generator (235) generates a notification indicating that instructions

have been sent to the SVC (270). The first transmitter (230) sends the notification to the second receiver (265) residing on the client computer (250).

It should be understood that in response to receiving the instructions, the SVC (270) may execute (step 340) one or more actions. For example, the SVC (270) may migrate data to the selected physical disks in accordance with the instructions. Furthermore, the remaining physical disks (i.e. Physical Disk 1, Physical Disk 2 and Physical Disk 3) maybe powered down (e.g. using an active command from a component, or using power-management functionality associated with the physical disks (e.g. wherein the power-management functionality resides in a physical disk or resides in an external component)).

Advantageously, this allows for a balance to be achieved between power management and performance.

Thus, it should be understood that the apparatus of the present invention provides instructions that can create an environment to allow for power-management functionality to be implemented.

Preferably, the determiner (217) also determines migration data associated with an optimised migration of the remaining less frequently or non-frequently accessed logical blocks (e.g. such that migration would allow for ease of access to the remaining logical blocks). For example, in the first example, the determiner (217) determines migration data such that the remaining 400 less frequently accessed logical blocks can be migrated to the same physical disk; the remaining 800 non-frequently accessed logical blocks can be migrated to two physical disks.

Although in the preferred embodiment, the physical disk selected by the analyser (215) is a physical disk on which some of the selected logical blocks are already mapped, it should be understood that the physical disk selected by the analyser (215) can be any other form of storage and need not be storage on which some of the selected logical blocks are already mapped.

With reference to FIG. 2, FIG. 4 and FIG. 5, a second preferred embodiment will now be described.

In a second example, the physical disk data is as described in the description with reference to FIG. IA and FIG. IB.

At step 400, the user interacts with a selector (255) to select a set of the one or more virtual disks (e.g. wherein the selector (255) is provided in the form of a menu). In the second example, the selector (255) selects Virtual Disk 1 and Virtual Disk 2. Furthermore, the selector (255) selects (step 405) an icon representing an "automatic mode".

The second transmitter (260) transmits virtual disk identifiers associated with the selected virtual disks and an identifier representing an "automatic mode" to the first receiver (210). The first receiver (210) passes the virtual disk identifiers and the identifier representing an "automatic mode" to the monitor (220).

In response to receiving the identifier representing an "automatic mode", the monitor (220) is operable to use the virtual disk identifiers to gather (step 410) historical data. In the second example, the monitor (220) gathers usage data (in operations per second) associated with the selected virtual disks (i.e. Virtual Disk 1 and Virtual Disk 2) wherein the usage data has an associated time period (e.g. usage data associated with the last month).

In an alternative embodiment, an external component can determine the usage data.

In a further alternative embodiment, a user can provide the usage data.

A graphical representation of the usage data against a time period of one week is shown in FIG. 5.

The monitor (220) gathers data associated with a pattern of usage and a time period associated with the pattern. In the second example, a pattern of usage and an associated time period marked "A" is shown in FIG. 5.

In the second example, a value "A" represents Monday 9am to Monday 6pm. However, it should be understood that a value of a time period can be represented in a number of ways (e.g. wherein a value comprises a date). It should be understood that a time period associated with a policy need not be a regularly occurring time period.

The monitor (220) passes the value of "A" to the generator (205).

The monitor (220) also determines a percentage value of a total usage capacity at a peak usage, hi the second example, the monitor (220) determines that a percentage value at a peak usage (shown at 500 in FIG. 5) represents 75% of a total usage capacity.

Alternatively, the percentage value may be a percentage value of a user defined threshold.

The monitor (220) passes the percentage value to the generator (205).

The generator (205) uses the value of "A" and the percentage value (i.e. historical data) to generate (step 415) a power-management policy. Preferably, the generator (205) stores the power-management policy in the policy base (240).

hi the second example, the power-management policy comprises a power-management parameter, a performance parameter and an associated time period.

The generator (205) associates the value of the performance parameter with the percentage value (i.e. historical data).

An example of a power-management policy is shown below, wherein "(x)" indicates a value associated with the power-management parameter; "(y)" indicates a value associated with the performance parameter and "(z)" indicates a value associated with the time period, hi the second example, a sum of the values of (x) and (y) is 100. For a parameter, a value of 100 denotes maximum weight and a value of 0 denotes minimum weight.

Power-management policy:

Power management (x); Performance (y) Time period = (z)

In the second example, a power-management policy and associated inputs are shown below:

Policy 2:

Power management (25); Performance (75) Time period = Monday 9am to Monday 6pm

The generator (205) also generates at least one rule associated with the power-management policy and stores the generated at least one rule in the rule base (245). An example of a rule is shown below, wherein nl ' (i.e. a second number) is associated with nl (i.e. a first number) and nl is associated with values of parameters of a particular power-management policy:

Rule:

Select nl physical disks to which selected logical blocks can be migrated; select nl' logical blocks to be migrated

In the second example, the generator (205) generates Rule 2 shown below, wherein nl ' is associated with nl such that nl ' (i.e. 1150) logical blocks can reside on n (i.e. 3) physical disks. Furthermore, nl is associated with the power-management and performance parameters.

Rule 2: Select 3 physical disks to which selected logical blocks can be migrated; select up to 1200 logical blocks to be migrated

Furthermore, the monitor (220) is operable to use the virtual disk identifiers to gather (step 410) data associated with Rule 2. In the second example, the monitor (220) gathers usage data (in operations per second) associated with the selected set of the one or more virtual disks (i.e. Virtual Disk 1 and Virtual Disk 2) in order to determine frequently accessed logical blocks.

• A first 200 logical blocks of Virtual Disk 1 that is mapped to a first extent comprising a first 200 sectors on Physical Disk 1;

• A fourth 200 logical blocks of Virtual Disk 1 that is mapped to a fourth extent comprising a second 200 sectors on Physical Disk 2;

• 100 logical blocks of Virtual Disk 2 that are mapped to a first half of a fifth extent comprising 100 sectors on Physical Disk 3;

• 100 logical blocks of Virtual Disk 2 that are mapped to a second half of an eighth extent comprising 100 sectors on Physical Disk 4.

Thus, the frequently accessed logical blocks comprise 600 logical blocks.

It should be understood that the 600 frequently accessed logical blocks could be migrated amongst two of the physical disks (e.g. Physical Disk 1 and Physical Disk 2). However, Rule 2 provides that the selected logical blocks should reside on three physical disks.

The monitor (220) passes the data associated with the frequently accessed logical blocks to the analyser (215).

hi accordance with Rule 2, the analyser (215) selects three physical disks to which migration occurs. In the second example, the selection is made randomly and the analyser (215) selects Physical Disk 1, 2 and 4.

hi response, the monitor (220) gathers physical disk data (i.e. data associated with

Rule 2 - data associated with storage state) associated with the selected physical disks.

It should be noted that Physical Disk 1 comprises 200 frequently accessed logical blocks and 200 non-frequently accessed logical blocks; Physical Disk 2 comprises 200 frequently accessed logical blocks and 200 non-frequently accessed logical blocks; and Physical Disk 4 comprises 100 frequently accessed logical blocks and 300 non-frequently accessed logical blocks.

The monitor (220) sends the physical disk data associated with the selected physical disks to the analyser (215). The analyser (215) analyses the data associated with the frequently accessed logical blocks and the physical disk data. The analyser (215) also analyses data associated with temporary storage.

In response to the analysis, the determiner (217) determines (step 420) migration data. In the second example, the migration data is shown below:

• Migrate 100 logical blocks of Virtual Disk 2 that are mapped to a first half of an eighth extent comprising 100 sectors on Physical Disk 4 to temporary storage.

• Migrate 100 logical blocks of Virtual Disk 2 that are mapped to a first half of a fifth extent comprising 100 sectors on Physical Disk 3 to a first half of an eighth extent comprising 100 sectors on Physical Disk 4.

• Migrate the 100 logical blocks of Virtual Disk 2 from the temporary storage to the first half of the fifth extent comprising 100 sectors on Physical Disk 3.

In response to determining the migration data, the determiner (217) passes the migration data to the instruction generator (225). The instruction generator (225) uses the migration data in order to generate (step 425) one or more instructions that are understandable by the SVC (270). In the second example, the instruction generator (225) formats the migration data to generate three instructions:

<Instruction_4> migrate "100 logical blocks in first half of an eighth extent comprising 100 sectors on Physical Disk 4" to "temporary storage" </Instruction_4>

<Instruction_5> migrate "100 logical blocks in first half of a fifth extent comprising 100 sectors on Physical Disk 3" to "a first half of an eighth extent comprising 100 sectors on Physical Disk 4" </Instruction_5>

<Instruction_6> migrate "100 logical blocks from temporary storage" to "first half of the fifth extent comprising 100 sectors on Physical Disk 3" </Instruction_6>

The first transmitter (230) sends (step 430) the instructions to the SVC (270). Preferably, the notification generator (235) generates a notification indicating that instructions have been sent to the SVC (270). The first transmitter (230) sends the notification to the second receiver (265) residing on the client computer (250).

It should be understood that in response to receiving the instructions, the SVC (270) may execute (step 435) one or more actions. For example, when time period "A" begins, the SVC (270) may power up Physical Disks 1, 2, 3 and 4; migrate data to the selected physical disks in accordance with the instructions and furthermore, the remaining physical disk (i.e.

Physical Disk 3) may be powered down. Advantageously, this allows for a balance to be achieved between power management and performance.

Preferably, the determiner (217) analyses a number of parameters e.g. size of data to be migrated, in order to determine a migration period (shown as A' in FIG. 5). The migration period represents a time period during which migration of data to selected physical disks should occur so as to enable provision of an environment that is optimised to handle usage at a start of time period A.

Preferably, in response to determination of the migration period, the determiner (217) passes data associated with the migration period to the instruction generator (225). The instruction generator (225) uses the data associated with the migration period in order to generate one or more instructions that are understandable by the SVC (270). The first transmitter (230) sends the instructions to the SVC (270). In response to receiving the instructions, the SVC (270) can determine when to begin data migration.

Advantageously, determination of a migration period, provides for an environment wherein pre-emptive action can be take by the SVC (270).

Thus, it should be understood that the apparatus of the present invention provides instructions that can create an environment to allow for power-management functionality to be implemented.

In the second example, the monitor (220) also gathers further data associated with a pattern of usage and a time period associated with the pattern, hi the second example, a pattern of usage and an associated time period marked "B" (i.e. wherein a value "B" represents Monday 6pm to Monday 9am) is shown in FIG. 5. The monitor (220) passes the value of "B" to the generator (205).

The monitor (220) also determines a percentage value of a total usage capacity at a peak usage, hi the second example, the monitor (220) determines that a percentage value at a peak usage (shown at 505 in FIG. 5) represents 25% of a total usage capacity. The monitor (220) passes the percentage value to the generator (205).

The generator (205) uses the value of "B" and the percentage value (i.e. historical data) to generate (step 415) a power-management policy. Preferably, the generator (205) stores the power-management policy in the policy base (240).

In the second example, the power-management policy comprises a power-management parameter, a performance parameter and an associated time period.

The generator (205) associates the value of the performance parameter with the percentage value (i.e. historical data), hi the second example, the power-management policy and associated inputs are shown below:

Policy 3:

Power management (75); Performance (25)

Time period = Monday 6pm to Monday 9am

The generator (205) also generates at least one rule associated with the power-management policy and stores the generated at least one rule in the rule base (245). In the second example, the generator (205) generates Rule 3, wherein nl ' is associated with nl such that nl' (i.e. 400) logical blocks can reside on n (i.e. 1) physical disk. Furthermore, nl is associated with the power-management and performance parameters.

Rule 3: Select 1 physical disk to which selected logical blocks can be migrated; select 400 logical blocks to be migrated

Furthermore, the monitor (220) is operable to use the virtual disk identifiers to gather (step 410) data associated with Rule 2. In the second example, the monitor (220) gathers usage data (in operations per second) associated with the selected set of the one or more virtual disks (i.e. Virtual Disk 1 and Virtual Disk 2) in order to determine frequently accessed logical blocks.

• A first 200 logical blocks of Virtual Disk 1 that is mapped to a first extent comprising a first 200 sectors on Physical Disk 1; • A fourth 200 logical blocks of Virtual Disk 1 that is mapped to a fourth extent comprising a 100 sectors on Physical Disk 2;

• 100 logical blocks of Virtual Disk 2 that are mapped to a second half of an eighth extent comprising 100 sectors on Physical Disk 4.

Thus, the frequently accessed logical blocks comprise 500 logical blocks.

It should be understood that the 500 frequently accessed logical blocks could be migrated amongst two of the physical disks (e.g. Physical Disk 1 and Physical Disk 2). However, since Rule 3 provides that the selected logical blocks should reside on one physical disk, the monitor (220) determines further data comprising a subset of the 500 frequently accessed logical blocks, wherein the subset can reside on one physical disk. In the second

example, the monitor (220) determines a second subset comprising 400 of the most frequently accessed logical blocks:

• A first 200 logical blocks of Virtual Disk 1 that are mapped to a first extent comprising a first 200 sectors on Physical Disk 1 ;

• 100 logical blocks of Virtual Disk 1 that are mapped to a first half of a fourth extent comprising a second 200 sectors on Physical Disk 2;

• 100 logical blocks of Virtual Disk 2 that are mapped to a second half of an eighth extent comprising 100 sectors on Physical Disk 4.

The monitor (220) passes the data associated with the most frequently accessed logical blocks to the analyser (215).

In accordance with Rule 3, the analyser (215) selects one physical disk to which migration occurs. In the second example, the selection is made randomly and the analyser

(215) selects Physical Disk 1.

In response, the monitor (220) gathers physical disk data associated with the selected physical disk (i.e. data associated with Rule 2 - data associated with storage state).

It should be noted that Physical Disk 1 comprises a first 200 logical blocks of Virtual Disk 1 that are mapped to a first extent comprising a first 200 sectors on Physical Disk 1 - these logical blocks have been identified in the second subset and a second 200 logical blocks of Virtual Disk 1 that are mapped to a second extent comprising a second 200 sectors on Physical Disk 1.

The monitor (220) sends the physical disk data associated with the selected Physical Disk 1 to the analyser (215). The analyser (215) analyses the further data associated with the second subset and the physical disk data. The analyser (215) also analyses data associated with a further physical disk (i.e. Physical Disk 5 (not shown).

In response to the analysis, the determiner (217) determines (step 420) migration data. In the second example, the migration data is shown below:

• Migrate second 200 logical blocks of Virtual Disk 1 that are mapped to a second extent comprising a second 200 sectors on Physical Disk 1 to Physical

Disk 5

• Migrate 100 logical blocks of Virtual Disk 1 that are mapped to a first half of a fourth extent comprising 100 sectors on Physical Disk 2 to 100 sectors of a first half of a second extent on Physical Disk 1; • Migrate 100 logical blocks of Virtual Disk 2 that are mapped to a second half of an eighth extent comprising 100 sectors on Physical Disk 4 to 100 sectors of a second half of a second extent on Physical Disk 1.

In response to determining the migration data, the determiner (217) passes the migration data to the instruction generator (225). The instruction generator (225) uses the migration data in order to generate (step 425) one or more instructions that are understandable by the SVC (270). In the second example, the instruction generator (225) formats the migration data to generate three instructions:

<Instruction_7> migrate "200 logical blocks in second extent comprising a second 200 sectors on Physical Disk 1" to "Physical Disk 5" </Instruction_7>

<Instruction_8> migrate "100 logical blocks of a first half of a fourth extent comprising 100 sectors on Physical Disk 2" to "100 sectors of a first half of a second extent on Physical Disk 1" </Instruction_8>

<Instruction_9> migrate "100 logical blocks of a second half of an eighth extent comprising 100 sectors on Physical Disk 4" to "100 sectors of a second half of a second extent on Physical Disk 1" </Instruction_9>

The first transmitter (230) sends (step 430) the instructions to the SVC (270). Preferably, the notification generator (235) generates a notification indicating that instructions

have been sent to the SVC (270). The first transmitter (230) sends the notification to the second receiver (265) residing on the client computer (250).

It should be understood that in response to receiving the instructions, the SVC (270) may execute (step 435) one or more actions.

For example, if the SVC (270) executed actions associated with Policy 2 during time period "A", when time period "B" begins, the SVC (270) can execute actions associated with Policy 3.

For example, Physical Disk 5 is powered up; data is migrated to the selected physical disk in accordance with the instructions and furthermore, the remaining physical disks (i.e. Physical Disk 2, Physical Disk 4 and Physical Disk 5) maybe powered down. Advantageously, this allows for a balance to be achieved between power management and performance.

Preferably, the determiner (217) analyses a number of parameters e.g. size of data to be migrated, in order to determine a migration period (shown as B' in FIG. 5). The migration period represents a time period during which migration of data to selected physical disks should occur so as to enable provision of an environment that is optimised to handle the decreased usage at a start of time period B.

Preferably, in response to determination of the migration period, the determiner (217) passes data associated with the migration period to the instruction generator (225). The instruction generator (225) uses the data associated with the migration period in order to generate one or more instructions that are understandable by the SVC (270). The first transmitter (230) sends the instructions to the SVC (270). In response to receiving the instructions, the SVC (270) can to determine when to begin data migration.

Advantageously, in the second embodiment, the generation of instructions to create an environment to allow for power-management functionality is implemented automatically with minimal user input.

Furthermore, by analysis of historical data, a prediction associated with a pattern of usage and an associated time period can be made. This prediction aids to generate a policy and associated instructions that can be used to implement power-management functionality. Thus, for example, during one time period (e.g. with an associated increased usage) a power-management policy biased towards a performance parameter can be implemented and during another time period (e.g. with an associated decreased usage) a power-management policy biased towards a power-management parameter can be implemented.

Preferably, differences between historical data (e.g. the pattern of usage, the associated time period etc.) and actual data are used in a feedback mechanism to update generated policies, such that accuracy of a policy improves.

Preferably, further user input can be utilised by the apparatus of the present invention e.g. a manually inserted control point specifying values selected by a user for a particular predicted pattern of usage, a particular percentage value of a total usage capacity at a peak usage etc. over a particular period. The control point is preferably used by the generator (205) to generate at least one of: a policy and input associated with a policy. Advantageously, a manually inserted control point can provide the apparatus with data to improve the accuracy of a generated policy.

It will be clear to one of ordinary skill in the art that all or part of the method of the preferred embodiments of the present invention may suitably and usefully be embodied in a logic apparatus, or a plurality of logic apparatus, comprising logic elements arranged to perform the steps of the method and that such logic elements may comprise hardware components, firmware components or a combination thereof.

It will be equally clear to one of skill in the art that all or part of a logic arrangement according to the preferred embodiments of the present invention may suitably be embodied in a logic apparatus comprising logic elements to perform the steps of the method, and that such logic elements may comprise components such as logic gates in, for example a programmable logic array or application-specific integrated circuit. Such a logic arrangement may further be embodied in enabling elements for temporarily or permanently establishing logic structures in

such an array or circuit using, for example, a virtual hardware descriptor language, which may be stored and transmitted using fixed or transmittable carrier media.

It will be appreciated that the method and arrangement described above may also suitably be carried out fully or partially in software running on one or more processors (not shown in the figures), and that the software may be provided in the form of one or more computer program elements carried on any suitable data-carrier (also not shown in the figures) such as a magnetic or optical disk or the like. Channels for the transmission of data may likewise comprise storage media of all descriptions as well as signal-carrying media, such as wired or wireless signal-carrying media.

The present invention may further suitably be embodied as a computer program product for use with a computer system. Such an implementation may comprise a series of computer-readable instructions either fixed on a tangible medium, such as a computer readable medium, for example, diskette, CD-ROM, ROM, or hard disk, or transmittable to a computer system, via a modem or other interface device, over either a tangible medium, including but not limited to optical or analogue communications lines, or intangibly using wireless techniques, including but not limited to microwave, infrared or other transmission techniques. The series of computer readable instructions embodies all or part of the functionality previously described herein.

Those skilled in the art will appreciate that such computer readable instructions can be written in a number of programming languages for use with many computer architectures or operating systems. Further, such instructions may be stored using any memory technology, present or future, including but not limited to, semiconductor, magnetic, or optical, or transmitted using any communications technology, present or future, including but not limited to optical, infrared, or microwave. It is contemplated that such a computer program product may be distributed as a removable medium with accompanying printed or electronic documentation, for example, shrink-wrapped software, pre-loaded with a computer system, for example, on a system ROM or fixed disk, or distributed from a server or electronic bulletin board over a network, for example, the Internet or World Wide Web.

In an alternative, the preferred embodiment of the present invention may be realized in the form of computer implemented method of deploying a service comprising steps of deploying computer program code operable to, when deployed into a computer infrastructure and executed thereon, cause said computer system to perform all the steps of the described method.

It will be clear to one skilled in the art that many improvements and modifications can be made to the foregoing exemplary embodiment without departing from the scope of the present invention.




 
Previous Patent: AIR BELLOWS FOR AN AIR SPRING

Next Patent: FUEL INJECTOR