Speculative reads
First Claim
1. A computer-implemented method, comprising:
- receiving, from a source, a plurality of read requests for data stored in a data store, the plurality of read requests having been received over a period of time;
analyzing information describing the plurality of read requests to identify at least one pattern of accessing data stored in the data store;
determining that a level of certainty for the at least one pattern of accessing data satisfies a threshold certainty; and
associating the at least one pattern of accessing data and at least one network or resource constraint with the source, wherein the at least one network or resource constraint is to be satisfied before the at least one pattern is able to be applied to at least one subsequent read request that is received from the source.
0 Assignments
0 Petitions
Accused Products
Abstract
Patterns of access and/or behavior can be analyzed and persisted for use in pre-fetching data from a physical storage device. In at least some embodiments, data can be aggregated across volumes, instances, users, applications, or other such entities, and that data can be analyzed to attempt to determine patterns for any of those entities. The patterns and/or analysis can be persisted such that the information is not lost in the event of a reboot or other such occurrence. Further, aspects such as load and availability across the network can be analyzed to determine where to send and/or store data that is pre-fetched from disk or other such storage in order to reduce latency while preventing bottlenecks or other such issues with resource availability.
16 Citations
19 Claims
-
1. A computer-implemented method, comprising:
-
receiving, from a source, a plurality of read requests for data stored in a data store, the plurality of read requests having been received over a period of time; analyzing information describing the plurality of read requests to identify at least one pattern of accessing data stored in the data store; determining that a level of certainty for the at least one pattern of accessing data satisfies a threshold certainty; and associating the at least one pattern of accessing data and at least one network or resource constraint with the source, wherein the at least one network or resource constraint is to be satisfied before the at least one pattern is able to be applied to at least one subsequent read request that is received from the source. - View Dependent Claims (2, 3)
-
-
4. A computer-implemented method, comprising:
-
receiving a read request for data from a computing device; obtaining the data to satisfy the read request; determining that a data access pattern corresponding to the read request matches at least one known access pattern associated with the computing device; determining that a status of at least one performance criterion is verified before the at least one known pattern is able to be applied to the read request; and performing at least one speculative read to pre-fetch additional data based at least in part on the at least one known access pattern. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
at least one processor; and memory including instructions that, when executed by the at least one processor, cause the system to perform the operations of; obtaining data to satisfy a read request received from a source; determining that information associated with the read request matches at least one access pattern associated with the source, the at least one access pattern having been determined based at least in part on evaluating previously received read requests; determining that a status of at least one performance condition associated with the at least one access pattern satisfies a threshold before the at least one access pattern is able to be applied to the read request; and obtaining, based at least in part on the at least one access pattern, additional data that is likely to be requested by the source in a subsequent read request. - View Dependent Claims (16, 17, 18, 19)
-
Specification