Storage managment in a multi-tiered storage architecture

ABSTRACT

Resource management processes are implemented by a computer processor and logic executable by the computer processor. The logic is configured to calculate a performance weight for each end user of an application executing on the computer processor. The performance weight is calculated as a function of an activity level determined for each end user and a type of the application. The logic is also configured to calculate an input/output weight for each end user from a combination of an input/output requirement and the performance weight. The input/output requirement is indicative of an amount of storage resources of a multi-tiered storage system associated with anticipated activities of the end user. The logic is further configured to assign an amount of the storage resources for each end user based on the input/output weight.

BACKGROUND

The present invention relates to storage management and, morespecifically, to storage management in a multi-tiered storagearchitecture.

Multi-tiered storage is a strategic networked storage method where datais stored on various types of storage devices based primarily onvariables such as, criteria of access, frequency of use, security, anddata recovery requirements. For space and performance optimization, thedata is then moved between high-cost and low-cost storage media. Suchsystems are typically implemented due to the high costs (per byte ofstorage) associated with high-speed storage devices, such as Solid Statedevices (SSD) and Hard Disk Drive Arrays, as compared with slowerstorage devices, such as optical discs and magnetic tape drives.

While it would be ideal for system users to have all stored dataavailable on high-speed devices at all times, this can be prohibitivelyexpensive for many organizations or enterprises. Thus, multi-tieredstorage systems have been developed to store the bulk of theenterprise's data on slower devices, which data is then copied to fastermedia when needed. One advantage of these tiered systems is that thetotal amount of stored data can be much larger than the capacity of theactive storage media available. In effect, tiered storage systems turnfast storage devices into caches for slower mass storage devices.

SUMMARY

According to one embodiment of the present invention, a system isprovided. The system includes a computer processor and logic executableby the computer processor. The logic is configured to implement amethod. The method includes calculating a performance weight for eachend user of an application executing on the computer processor. Theperformance weight is calculated as a function of an activity leveldetermined for each end user and a type of the application. The methodalso includes calculating an input/output weight for each end user froma combination of an input/output requirement and the performance weight.The input/output requirement is indicative of an amount of storageresources of a multi-tiered storage system associated with anticipatedactivities of the end user. The method further includes assigning anamount of the storage resources for each end user based on theinput/output weight.

According to another embodiment of the present invention, a method isprovided. The method includes calculating a performance weight for eachend user of an application executing on a computer processor. Theperformance weight is calculated as a function of an activity leveldetermined for each end user and a type of the application. The methodalso includes calculating an input/output weight for each end user froma combination of an input/output requirement and the performance weight.The input/output requirement is indicative of an amount of storageresources of a multi-tiered storage system associated with anticipatedactivities of the end user. The method further includes assigning anamount of the storage resources for each end user based on theinput/output weight.

According to a further embodiment of the present invention, a computerprogram product is provided. The computer program product includes acomputer-readable storage medium having instructions embodied thereon,which when executed by a computer, causes the computer to implement amethod. The method includes calculating a performance weight for eachend user of an application executing on a computer processor. Theperformance weight is calculated as a function of an activity leveldetermined for each end user and a type of the application. The methodalso includes calculating an input/output weight for each end user froma combination of an input/output requirement and the performance weight.The input/output requirement is indicative of an amount of storageresources of a multi-tiered storage system associated with anticipatedactivities of the end user. The method further includes assigning anamount of the storage resources for each end user based on theinput/output weight.

Additional features and advantages are realized through the techniquesof the present invention. Other embodiments and aspects of the inventionare described in detail herein and are considered a part of the claimedinvention. For a better understanding of the invention with theadvantages and the features, refer to the description and to thedrawings.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

The subject matter which is regarded as the invention is particularlypointed out and distinctly claimed in the claims at the conclusion ofthe specification. The forgoing and other features, and advantages ofthe invention are apparent from the following detailed description takenin conjunction with the accompanying drawings in which:

FIG. 1 depicts a cloud computing node according to an embodiment of thepresent invention;

FIG. 2 depicts a cloud computing environment according to an embodimentof the present invention;

FIG. 3 depicts abstraction model layers according to an embodiment ofthe present invention;

FIG. 4 depicts a client-server system according to an embodiment of thepresent invention;

FIG. 5 depicts a flow diagram according to an embodiment of the presentinvention;

FIG. 6A and FIG. 6B each depict a table according to an embodiment ofthe present invention; and

FIG. 7 depicts a flow diagram according to an embodiment of the presentinvention.

DETAILED DESCRIPTION

In a multi-tiered storage system, resource management processes areprovided. The resource management processes provide intelligentallocation of resources to client devices that access one or moreapplications hosted by a host computer, whereby the allocation is basedon variables, such as client profile information, end user activitylevels, and dynamically-changing input/output requirements of each ofthe end users. The resource management processes monitor activitiesconducted by the end users and use values provided by theabove-referenced variables to calculate a proportionate, weighteddistribution of resources to the end users.

It is understood in advance that although this disclosure includes adetailed description on cloud computing, implementation of the teachingsrecited herein are not limited to a cloud computing environment. Rather,embodiments of the present invention are capable of being implemented inconjunction with any other type of computing environment now known orlater developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as Follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Service Models are as Follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface such as a web browser (e.g., web-based e-mail).The consumer does not manage or control the underlying cloudinfrastructure including network, servers, operating systems, storage,or even individual application capabilities, with the possible exceptionof limited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as Follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

Referring now to FIG. 1, a schematic of an example of a cloud computingnode is shown. Cloud computing node 10 is only one example of a suitablecloud computing node and is not intended to suggest any limitation as tothe scope of use or functionality of embodiments of the inventiondescribed herein. Regardless, cloud computing node 10 is capable ofbeing implemented and/or performing any of the functionality set forthherein.

In cloud computing node 10 there is a computer system/server 12, whichis operational with numerous other general purpose or special purposecomputing system environments or configurations. Examples of well-knowncomputing systems, environments, and/or configurations that may besuitable for use with computer system/server 12 include, but are notlimited to, personal computer systems, server computer systems, thinclients, thick clients, hand-held or laptop devices, multiprocessorsystems, microprocessor-based systems, set top boxes, programmableconsumer electronics, network PCs, minicomputer systems, mainframecomputer systems, and distributed cloud computing environments thatinclude any of the above systems or devices, and the like.

Computer system/server 12 may be described in the general context ofcomputer system-executable instructions, such as program modules, beingexecuted by a computer system. Generally, program modules may includeroutines, programs, objects, components, logic, data structures, and soon that perform particular tasks or implement particular abstract datatypes. Computer system/server 12 may be practiced in distributed cloudcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed cloud computing environment, program modules may be locatedin both local and remote computer system storage media including memorystorage devices.

As shown in FIG. 1, computer system/server 12 in cloud computing node 10is shown in the form of a general-purpose computing device. Thecomponents of computer system/server 12 may include, but are not limitedto, one or more processors or processing units 16, a system memory 28,and a bus 18 that couples various system components including systemmemory 28 to processor 16.

Bus 18 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. By way of example, and not limitation,such architectures include Industry Standard Architecture (ISA) bus,Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, VideoElectronics Standards Association (VESA) local bus, and PeripheralComponent Interconnects (PCI) bus.

Computer system/server 12 typically includes a variety of computersystem readable media. Such media may be any available media that isaccessible by computer system/server 12, and it includes both volatileand non-volatile media, removable and non-removable media.

System memory 28 can include computer system readable media in the formof volatile memory, such as random access memory (RAM) 30 and/or cachememory 32. Computer system/server 12 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 34 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, DVD-ROM or other optical media can be provided.In such instances, each can be connected to bus 18 by one or more datamedia interfaces. As will be further depicted and described below,memory 28 may include at least one program product having a set (e.g.,at least one) of program modules that are configured to carry out thefunctions of embodiments of the invention.

Program/utility 40, having a set (at least one) of program modules 42,may be stored in memory 28 by way of example, and not limitation, aswell as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, may include an implementation of a networkingenvironment. Program modules 42 generally carry out the functions and/ormethodologies of embodiments of the invention as described herein.

Computer system/server 12 may also communicate with one or more externaldevices 14 such as a keyboard, a pointing device, a display 24, etc.;one or more devices that enable a user to interact with computersystem/server 12; and/or any devices (e.g., network card, modem, etc.)that enable computer system/server 12 to communicate with one or moreother computing devices. Such communication can occur via input/output(I/O) interfaces 22. Still yet, computer system/server 12 cancommunicate with one or more networks such as a local area network(LAN), a general wide area network (WAN), and/or a public network (e.g.,the Internet) via network adapter 20. As depicted, network adapter 20communicates with the other components of computer system/server 12 viabus 18. It should be understood that although not shown, other hardwareand/or software components could be used in conjunction with computersystem/server 12. Examples, include, but are not limited to: microcode,device drivers, redundant processing units, external disk drive arrays,RAID systems, tape drives, and data archival storage systems, etc.

Referring now to FIG. 2, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 comprises one or morecloud computing nodes 10 with which local computing devices used bycloud consumers, such as, for example, personal digital assistant (PDA)or cellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. Nodes 10 maycommunicate with one another. They may be grouped (not shown) physicallyor virtually, in one or more networks, such as Private, Community,Public, or Hybrid clouds as described hereinabove, or a combinationthereof. This allows cloud computing environment 50 to offerinfrastructure, platforms and/or software as services for which a cloudconsumer does not need to maintain resources on a local computingdevice. It is understood that the types of computing devices 54A-N shownin FIG. 2 are intended to be illustrative only and that computing nodes10 and cloud computing environment 50 can communicate with any type ofcomputerized device over any type of network and/or network addressableconnection (e.g., using a web browser).

Referring now to FIG. 3, a set of functional abstraction layers providedby cloud computing environment 50 (FIG. 2) is shown. It should beunderstood in advance that the components, layers, and functions shownin FIG. 3 are intended to be illustrative only and embodiments of theinvention are not limited thereto. As depicted, the following layers andcorresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include mainframes, in oneexample IBM® zSeries® systems; RISC (Reduced Instruction Set Computer)architecture based servers, in one example IBM pSeries® systems; IBMxSeries® systems; IBM BladeCenter® systems; storage devices; networksand networking components. Examples of software components includenetwork application server software, in one example IBM WebSphere®application server software; and database software, in one example IBMDB2C® database software. (IBM, zSeries, pSeries, xSeries, BladeCenter,WebSphere, and DB2 are trademarks of International Business MachinesCorporation registered in many jurisdictions worldwide)

Virtualization layer 62 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers;virtual storage; virtual networks, including virtual private networks;virtual applications and operating systems; and virtual clients.

In one embodiment, one or both of the hardware and software layer 60 andthe virtualization layer 62 may include edge components, such as a webserver front end and image cache, as well as an image library store,e.g., in a high-performance RAID storage area network (SAN).

In one example, management layer 64 may provide the functions describedbelow. Resource provisioning provides dynamic procurement of computingresources and other resources that are utilized to perform tasks withinthe cloud computing environment. Metering and Pricing provide costtracking as resources are utilized within the cloud computingenvironment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security (not shown) provides identity verificationfor cloud consumers and tasks, as well as protection for data and otherresources. User portal provides access to the cloud computingenvironment for consumers and system administrators. Service levelmanagement provides cloud computing resource allocation and managementsuch that required service levels are met. Service Level Agreement (SLA)planning and fulfillment provide pre-arrangement for, and procurementof, cloud computing resources for which a future requirement isanticipated in accordance with an SLA. In an exemplary embodiment, logic70 in the management layer 64 implements the exemplary resourcemanagement processes described herein. Alternatively, the logic 70 maybe implemented as part of the Resource Provisioning functions of themanagement layer 64.

Workloads layer 66 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation; software development and lifecycle management; virtualclassroom education delivery; data analytics processing; transactionprocessing; and a mobile desktop for mobile devices (e.g., 54A, 54C, and54N, as well as mobile nodes 10 in cloud computing environment 50)accessing the cloud computing services.

The logic 70 includes algorithms to implement embodiments describedherein to provide resource management processes. In an embodiment, thelogic 70 is coupled to and/or resides in the memory 28 shown in FIG. 1.In addition, embodiments of the logic 70 include one or more programmodules 42 of the program/utility 40 shown in FIG. 1. In a furtherembodiment, the logic 70 is part of the management layer 64 and may beexecuted on hardware located in the hardware and software layer 60.However, it is understood that virtualized instances running on thesystem may be implemented in the virtualization layer 62.

As indicated above, the resource management processes consider the stateof an end user implementing an application in the management of storage(e.g., reservation of resources). In conventional systems, resourcereservation typically involves allocating an equal percentage ofavailable resources to each end user (e.g., if RAM storage is 100 MB andthere are 10 active end users, the system reserves 10 MB of storage toeach end user). However, due to various reasons, the resources needed byeach end user may differ. For example, suppose one end user is veryactive and the end user's device is prefetching data at a very fastrate. In conventional systems, the speed at which the prefetching occursis limited to the amount of reserved RAM space allocated by the system.This principle also applies in reverse to instances where a user is veryinactive. However, by factoring in several variables when determiningallocation of resources among the end users, the exemplary resourcemanagement processes are capable of adjusting resource allocation foreach end user based on real-time data.

The resource management processes build a high performance computingenvironment by effectively managing storage at a host system or serverside of a network based on the state of the end users devices (e.g.,client systems) implementing an application, such that it determinesactiveness of end users based on information acquired from theapplication logic and determine future I/O requirements for the endusers.

A storage management process involves changing user resourcereservations in each storage tier, migrating data required for activeend users from lower tiers to higher tiers, and migrating data requiredfor less active end users from high performance tiers to lowerperformance tiers. In a gaming embodiment, for example, if players areplaying within a group or playing with dependent gamers (e.g., teamplayers), the status of the group and/or dependent players is alsoconsidered. In addition, if the same server is used for hosting multipleapplications, based on the overall performance of end users in eachapplication, the storage resources for those applications can bemanaged.

A detailed embodiment of a system 400 upon which the resource managementprocesses may be implemented will now be described with reference toFIG. 4. The system 400 of FIG. 4 includes a host system computer 402 andend user devices 404 communicatively coupled to one or more network(s)406. The host system computer 402 may be implemented as one or morehigh-speed computer processing devices, such as one or more mainframecomputers or servers capable of handling a high volume of computingactivities conducted by end users of the exemplary resource managementprocesses. The host system computer 402 may operate as a database serverand coordinate access to application data including data stored onstorage devices 410. The host system computer 402 may be implementedusing one or more servers operating in response to a computer programstored in a storage medium accessible by the server. The host systemcomputer 402 may operate as a network server (e.g., a web server) tocommunicate with the end user devices 404A-404 n, as well as any othernetwork entities. In an embodiment, the host system computer 402 mayrepresent a node 10 in the cloud computing environment 50 (FIGS. 1-2) ormay be configured to operate in a client/server architecture.

The end user devices 404A-404 n may be any type of device with computerprocessing capabilities. For example, the end user systems 404A-404 nmay include a combination of general-purpose computers (e.g., desktop,lap top), host-attached terminals (e.g., thin clients), portablecommunication devices (e.g., smart phones, personal digital assistants,and tablet PCs). The end user devices 404A-404 n may be wired orwireless devices. In an embodiment, the end user devices 404A-404 n mayrepresent cloud consumers 54A-54 n (FIGS. 1-2).

In an embodiment, the end user devices 404A-404 n may be implemented byend users of an entity, such as an organization or enterprise operatingthe host system computer 402. The end user devices 404A-404 n may eachexecute a web browser for accessing network entities, such as the hostsystem computer 402. In an embodiment, the end user devices 404A-404 naccess a web site of the host system computer 102 for browsing andaccessing applications 408A-408 n. In one embodiment, the applications408A-408 n may include business-directed applications, such as wordprocessing, spreadsheet applications, and communications applications,etc. In this embodiment, the end user devices 404A-404 n may beemployees of an enterprise or organization or authorized users ofsystems of the enterprise. In another embodiment, the applications404A-408 n may include gaming applications and the end user devices404A-404 n are operated by consumers of gaming services provided by thehost system computer 402.

In an embodiment, the logic 412 identifies each application 408A-408 nby type. This identification may be implemented using varioustechniques. For example, applications that typically utilize fewerresources (e.g., perform few or predictable operations) may beidentified as one type, while applications that typically utilizegreater resources (e.g., many gaming applications in which high-speedgraphics and dynamically changing scenes) may be identified as anothertype. The types assigned to the applications may be implemented as astatic numerical value, for example, on a scale spanning the leastresource intensive applications to the most resource intensiveapplications. In an embodiment, the logic 412 utilizes the applicationtype in determining resource allocation as will be described herein.

The network(s) 106 may be any type of known networks including, but notlimited to, a wide area network (WAN), a local area network (LAN), aglobal network (e.g. Internet), a virtual private network (VPN), and anintranet. The network(s) 106 may be implemented using a wireless networkor any kind of physical network implementation known in the art, e.g.,using cellular, satellite, and/or terrestrial network technologies.

The host system computer 402 executes logic 412 for implementing theresource management processes described herein. The logic 412 includesan end user watch component 414 and a storage management component 416,as will be described further herein. In an embodiment, the logic 412represents the logic 70 described in FIG. 1, and the end user watchcomponent 414 and storage management component 416 represent the programmodules 42 of FIG. 1.

The system 400 also includes storage devices 410 communicatively coupledto the host system computer 402 in a multi-tiered storage architecture.At least one of the storage devices 410 may be implemented using memorycontained in the host system computer 402 (e.g., tier 0 storage), oreach of the storage devices 410 may be a separate physical device. Thestorage devices 410 may be logically addressable as consolidated datasources across a distributed environment that includes a network (e.g.,network(s) 406). In an embodiment, one or more of the storage devicesstores tables used by the resource management processes describedherein.

In one embodiment, the storage devices 410 are configured with tier 1storage (e.g., solid state drive or disks (SSDs)), tier 2 storage (e.g.,SATA RAID), and tier 3 storage (e.g., tape), while the host system 402includes tier 0 storage (e.g., RAM). Each tier in the storage devices410 may include heterogeneous devices of similar storage class, such asdevices from different vendors, devices with different QoS parameters(e.g., durability, mean time between failures, etc.) Typically, the tier1 devices are costlier than the tier 2 devices, and the tier 2 devicesare costlier than the tier 3 devices, and a converse relationshipapplies to data performance in these tiers. The exemplary resourcemanagement processes is configured to store information for more activeend users within the top tiers of the storage system.

Turning now to FIG. 5, a flow diagram of a process for implementing theresource management processes will now be described in an embodiment.The logic 412 builds tables for active applications 408A-408 n, as wellas active end users, and uses these tables to document activities, data,and results of calculations performed, as described in FIGS. 5-7. Two ofthe tables are illustrated in FIGS. 6A-6B. As described herein, activeapplications refer to those that are currently accessed and executed byend users. Likewise, active end users refer to those ends user devices404A-404 n that are executing one or more applications 408A-408 n. Asshown in FIG. 6A, a table 600A includes a column 602 for identifyingeach active application and a column 604 for identifying each end userthat is executing the application. If the application is a gamingapplication with multiple players, e.g., the table 600A includes acolumn 606 to identify each dependent player, and a column 608 toidentify each opponent player. It is understood that the table 600A isdynamic, such that rows may be added or deleted whenever a newapplication is hosted, a new end user accesses a currently activeapplication, or an end user finishes or quits an application.

While the processes of FIG. 5 is described as a sequence of steps, itwill be understood that at least a portion of the processing performedwith respect to each of the selected applications and end users may beperformed simultaneously. In addition, the processes of FIG. 5 may berepeated on an intermittent basis or as often as desired by the hostsystem computer 402.

At step 502, the end user watch component 414 of the logic 412 selectsan active application (e.g., one of applications 408A-408 n identifiedas “1” or “2” in the table 600A) and identifies the application type. Asindicated above, the application type is assigned a value that indicatesthe level of resources typically required for, or otherwise associatedwith, the application. This application type value is represented inFIG. 6B as past and current percentages in respective columns 624 and626.

At step 504, the end user watch component 414 selects an end user of theapplication (e.g., one of the end user devices 404A-404 n identified as“1,” “2,” or “3”) and monitors end user activities. The activitiesconducted by the end user and monitored by the end user watch component414 include any key strokes, inputs, commands, etc., attributed to theend user device.

At step 506, the end user watch component 414 calculates an activitylevel of the end user. The activity level represents a value indicativeof end user-specific activity that is unrelated to the applicationexecuted by the end user. For example, one end user who is new to agaming application may be relatively slow in working through the scenesof the game, thereby requiring fewer resources, as compared to a moreexperienced gamer. The activity level may be manifested as a numericvalue on a scale of values, e.g., 0-10, whereby ‘0’ represents a leastamount of activity and ‘10’ represents a greatest amount of activity.The activity level, once calculated, is entered in a column 610 in thetable 600A of FIG. 6.

At step 508, the end user watch component 414 calculates a performanceweight for the end user as a function of the activity level and the typeof application. The performance weight may be calculated using aformula:

Variable x*activity level, where ‘x’ represents a system-defined valuebased on the type of application.

Alternatively, if the application is a multi-player gaming application,the performance weight considers other players in the calculation. Inthis embodiment, the performance weight may be calculated using aformula:

A*performance weight of player+B*performance weight of dependentplayer−C*performance weight of opponent player, where ‘A,’ ‘B,’ and ‘C’are system-defined values based on the type of game. Thesesystem-defined values may vary from game to game or among various gametypes.

In a multi-player game, e.g., it is understood that dependent players(e.g., teammates) may assist in increasing activities of the end user(e.g., in a cooperative team environment), while opponent players mayserve to deter or decrease activities of the end user. This is reflectedin the above-referenced formula.

At step 510, the end user watch component 414 determines input/output(I/O) requirements for the end user and calculates a relative I/O weightas a function of the I/O requirements and the performance weight. TheI/O requirements may be calculated using application data including anapplication state that is analyzed by the logic 412. For example, if theend user is proceeding through an application and is near the end, thelogic 412 identifies this ‘application state’ which indicates that theend user will require fewer resources or is otherwise ‘winding down.’ Ina gaming environment, the logic 412 may determine from the applicationstate that the end user is nearing the end of the game. Alternatively,in a gaming environment, the logic 412 determines from the applicationstate that the end user is engaged in high intensity activities ormultiple scene change events that require greater system resources.Thus, the logic 412 is configured to acquire not only end user-specificactivity, but also application state information in determining I/Orequirements for the end user. The I/O weight for an end user may becalculated using a formula:

I/O requirement of end user*performance weight of end user.

The I/O weight is entered in the table 600A in column 614 as a currentpercentage. Also, as shown in FIG. 6, a previously calculated I/O weightis provided in a column 612 of the table 600A, which is describedfurther herein.

At step 512, the end user watch component 414 determines whether otherend users are active with respect to the application. If so, the enduser watch component 414 accesses the next end user and monitors the enduser activities at step 514, and the process returns to step 506. Asindicated above, at least a portion of the steps associated with the endusers for an active application may be processed in a simultaneousfashion.

Otherwise, if no other end users are active, the end user watchcomponent 414 calculates an input/output weight of the application and apercentage of each of the end users at step 516. The input/output weightof the application may be used in calculating an amount of resources toallocate for each application when multiple applications are active. Theinput/output weight of the application may be calculated using aformula:

Sum of I/O weight of all active end users.

The percentage of the end user may be calculated using a formula:

I/O weight of end user/input/output weight of the application.

At step 518, the end user watch component 414 determines whether anyother applications are active. If so, the end user watch component 414accesses the next application and identifies the application type atstep 520, and the process returns to step 504. As indicated above, atleast a portion of the steps associated with the active applications maybe processed in a simultaneous fashion.

Otherwise, if no other applications are active, the end user watchcomponent 414 calculates a percentage of each application and assigns orre-arranges storage allocation for the end users based on the weights atstep 522. The percentage of each application may be calculated using aformula:

Input/output weight of application/sum of input/output weights of allapplications active on computer (e.g., host system computer 402).

As shown in FIG. 6B, table 600B illustrates application-levelinformation for each application hosted by the host system computer 402.An application name is stored in a column 620 and an applicationidentification is stored in a column 622. Storage resources are assignedor re-adjusted for end users of an application, as well as amongapplications, based on the calculated percentage values.

The storage management component 416 manages storage resources for theend users as per the I/O weight value for each storage resource. Forexample at the SSD tier, if the storage management component 416 isallocating 20 GB of SSD space out of 40 GB for an application, based onthe calculated I/O weight value of the end users, 20 GB of SSD space isdistributed among the active end users. A detailed process for assigningand/or re-arranging storage allocation (step 522) will now be describedin FIG. 7.

The process begins whereby the storage management component 416 of thelogic 412 accesses a list of applications and end users with apercentage value for each at step 702.

At step 704, the storage management component 416 selects one of theapplications.

At step 706, the storage management component 416 determines ifpercentage values for the application has changed between past andcurrent values. This determination is implemented by comparing valuesbetween columns 624 and 626 of table 600B. If the percentage values havechanged, the storage management component 416 selects an end user atstep 710, and recalculates the overall percentage for the end user,followed by setting a flag at step 712. The end user is added to achange user list. The flag and the change user list may be temporaryconstructs of the logic 412 that are used during processing and deletedonce the processing has completed. For example, the flag is set wherethe logic 412 determines there is some change in user activity levels.The change user list may include a list of users whose activity levelshave changed.

At step 714, the storage management component 416 determines whetherthere are any other end users. If so, the process returns to step 710and another end user is selected.

Otherwise, if no other end user is identified, the storage managementcomponent 416 determines whether any other applications are present inthe list (from step 702) at step 716. If other applications are presentin the list, the storage management component 416 returns to step 704.

Turning back to step 708, if the end user watch component 414 determinesthat the percentage values ‘past’ and ‘current’ in columns 624 and 626,respectively, have not changed, the storage management component 416selects the end user at step 718.

At step 720, the storage management component 416 determines whether thepercentage values for the end user have changed between past and current(from respective columns 612 and 614 of table 600A).

At step 722, if the values have changed, the storage managementcomponent 416 recalculates the overall percentage for the end user andsets the flag at step 724. The storage management component 416 adds theend user to the change user list at step 724. If the values have notchanged at step 722, the storage management component 416 determineswhether there are any other end users at step 726. If so, the processreturns to step 718 and the storage management component 416 selects thenext end user.

If however, there are no other end users at step 726, or alternativelythere are no other end users from step 714, the storage managementcomponent 416 checks to see if the flag has been set at step 730. If so,the storage management component 416 re-adjusts the storage resourcesfor each of the end users based on the new overall percentage value atstep 732, and the process ends. If however, the flag has not been set,the process ends as no resource changes are needed.

As will be appreciated by one skilled in the art, aspects of the presentinvention may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present invention may take the formof an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”Furthermore, aspects of the present invention may take the form of acomputer program product embodied in one or more computer readablemedium(s) having computer readable program code embodied thereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a computer readable storage medium. A computer readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer readable storagemedium may be any tangible medium that can contain, or store a programfor use by or in connection with an instruction execution system,apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a computer readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thepresent invention may be written in any combination of one or moreprogramming languages, including an object oriented programming languagesuch as Java, Smalltalk, C++ or the like and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer or server. In the latterscenario, the remote computer may be connected to the user's computerthrough any type of network, including a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

Aspects of the present invention are described below with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer,other programmable data processing apparatus, or other devices to causea series of operational steps to be performed on the computer, otherprogrammable apparatus or other devices to produce a computerimplemented process such that the instructions which execute on thecomputer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of onemore other features, integers, steps, operations, element components,and/or groups thereof.

The corresponding structures, materials, acts, and equivalents of allmeans or step plus function elements in the claims below are intended toinclude any structure, material, or act for performing the function incombination with other claimed elements as specifically claimed. Thedescription of the present invention has been presented for purposes ofillustration and description, but is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the artwithout departing from the scope and spirit of the invention. Theembodiment was chosen and described in order to best explain theprinciples of the invention and the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated

The flow diagrams depicted herein are just one example. There may bemany variations to this diagram or the steps (or operations) describedtherein without departing from the spirit of the invention. Forinstance, the steps may be performed in a differing order or steps maybe added, deleted or modified. All of these variations are considered apart of the claimed invention.

While the preferred embodiment to the invention had been described, itwill be understood that those skilled in the art, both now and in thefuture, may make various improvements and enhancements which fall withinthe scope of the claims which follow. These claims should be construedto maintain the proper protection for the invention first described.

1. A system, comprising: a computer processor; and logic executable bythe computer processor, the logic configured to implement a method, themethod comprising: calculating a performance weight for each end user ofan application executing on the computer processor, the performanceweight calculated as a function of an activity level determined for eachend user and a type of the application; calculating an input/outputweight for each end user from a combination of an input/outputrequirement and the performance weight, the input/output requirementindicative of an amount of storage resources of a multi-tiered storagesystem associated with anticipated activities of the end user; andassigning an amount of the storage resources for each end user based onthe input/output weight.
 2. The system of claim 1, wherein the methodfurther comprises: determining the activity level from inputs receivedby the end user with respect to executing the application.
 3. The systemof claim 1, wherein the application is a game, the method furthercomprising: adjusting the performance weight when the end user iscooperatively engaged in the game with a second end user and when theend user is engaged in the game with a third end user operating as anopponent of the end user.
 4. The system of claim 1, wherein the type ofapplication is represented as a static value that is determined as afunction of a level of the storage resources associated with theapplication.
 5. The system of claim 1, wherein the computer processorexecutes a second application simultaneously with the application, themethod further comprises: calculating an input/output weight of theapplication, the input/output weight of the application calculated as asummation of the input/output weight of each end user of theapplication; and calculating an input/output weight of the secondapplication, the input/output weight of the second applicationcalculated as a summation of input/output weights of each end user ofthe second application; wherein the assigning an amount of the storageresources for each end user based on the input/output weight furtherincludes assigning an amount of the storage resources to each of theapplication and the second application based on the input/output weightof the application and the input/output weight of the secondapplication.
 6. The system of claim 1, wherein assigning an amount ofthe storage resources includes assigning a proportionately greateramount of the storage resources to the end user determined to have aninput/output weight that is greater than an input/output weight ofanother end user.
 7. The system of claim 1, wherein the logic isprovided as a service in a cloud computing environment. 8.-20.(canceled)