-
1.
公开(公告)号:US20200293196A1
公开(公告)日:2020-09-17
申请号:US16298553
申请日:2019-03-11
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Roopesh Kumar Tamma , Srinivasa D. Murthy
IPC: G06F3/06
Abstract: A page of data blocks and data integrity fields (DIFs) for the data blocks to write to corresponding sectors of a storage device equal in number to the data blocks within the page is received. The data blocks and the DIFs are compressed, yielding compressed sector data. In response to a determination that a size of the compressed sector data is not greater than a size of the corresponding sectors, the compressed sector data is written to the sectors.
-
公开(公告)号:US10310811B2
公开(公告)日:2019-06-04
申请号:US15476697
申请日:2017-03-31
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Gurinder Shergill , Roopesh Kumar Tamma , Thomas H. Marlette
Abstract: Example method includes: negotiating, with a client device, a number of simultaneous I/O commands allowed in a single session between a storage device and the client device; pre-allocating a number of immediate data buffers for the single session based on the negotiated number of simultaneous I/O commands; receiving a write I/O command with immediate data, wherein the immediate data is transmitted within a single PDU as the I/O command; transitioning the pre-allocated buffers from a network interface state to a driver state in an atomic operation, the driver state enabling the pre-allocated buffers to be accessed by a driver layer of the storage device exclusively, and the atomic operation preventing other I/O commands from transitioning the network interface state of the pre-allocated buffers until the atomic operation is completed; and writing the immediate data to the pre-allocated buffers that are in the driver state.
-
公开(公告)号:US20180314570A1
公开(公告)日:2018-11-01
申请号:US15770845
申请日:2016-03-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Jonathan Stewart , Roopesh Kumar Tamma
Abstract: Examples include transaction management for a multi-node cluster. Some examples include generating a request log entry at an owner node that identifies a duplicate data location, tagging the duplicate data location with a requested tag, and issuing a zero-copy request that identifies the duplicate data location. In some such examples, a service node may generate a service log entry based on the zero-copy request that identifies the duplicate data location, process the zero-copy request, and tag the duplicate data location with a serviced tag. A determination may be made as to whether at least one of the owner node and the service node have failed and based on the determination that at least one has failed, the failed node may be recovered via at least one of the requested tag and the serviced tag of the duplicate data location.
-
公开(公告)号:US09830239B2
公开(公告)日:2017-11-28
申请号:US14438624
申请日:2013-01-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Roopesh Kumar Tamma , Nigel Kerr
IPC: G06F11/00 , G06F11/20 , H04L12/24 , H04L12/939 , H04L12/935 , G06F3/06 , H04L29/08
CPC classification number: G06F11/2094 , G06F3/0619 , G06F3/0653 , G06F3/0683 , H04L41/0668 , H04L49/30 , H04L49/555 , H04L49/557 , H04L67/1097
Abstract: A failure at a first port of the controller node is detected, where the first port is initially assigned a first port identifier and is associated with a logical path through a communications fabric between the first port and a port at a host device. In response to detecting the failure, the first port identifier is assigned to a second port to cause the logical path to be associated with the second port. In response to detecting resolution of the failure, a probe identifier is assigned to the first port. Using the probe identifier, a health of network infrastructure between the first port and the host device is checked. In response to the checking, the first port identifier is assigned to the first port to cause failback of the logical path to the first port.
-
公开(公告)号:US10783021B2
公开(公告)日:2020-09-22
申请号:US15770845
申请日:2016-03-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Jonathan Stewart , Roopesh Kumar Tamma
Abstract: Examples include transaction management for a multi-node cluster. Some examples include generating a request log entry at an owner node that identifies a duplicate data location, tagging the duplicate data location with a requested tag, and issuing a zero-copy request that identifies the duplicate data location. In some such examples, a service node may generate a service log entry based on the zero-copy request that identifies the duplicate data location, process the zero-copy request, and tag the duplicate data location with a serviced tag. A determination may be made as to whether at least one of the owner node and the service node have failed and based on the determination that at least one has failed, the failed node may be recovered via at least one of the requested tag and the serviced tag of the duplicate data location.
-
公开(公告)号:US10417202B2
公开(公告)日:2019-09-17
申请号:US15387603
申请日:2016-12-21
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D. Murthy , Roopesh Kumar Tamma
IPC: G06F17/30 , G06F16/215 , G06F16/22 , G06F16/23 , G06F3/06
Abstract: An example storage system may include storage media and a storage controller. The storage controller may be to establish virtual volumes, private data stores, and a deduplication data store, each being a virtual storage space of the storage media, wherein each of the private data stores is associated with one of the virtual volumes and the deduplication data store is shared among the virtual volumes. The storage controller may, in response to receiving input data that is to be stored in a given one of the virtual volumes, determine a signature for the input data and select between storing the input data in the private data store associated with the given one of the virtual volumes and storing the input data in the deduplication data store. The storage controller may select where to store the input data based on whether a metadata storage location addressed by a first portion of the signature includes valid metadata, and, if so: whether the metadata includes a back-pointer to one of the virtual volumes, and whether a second portion of the signature matches a key included in the metadata.
-
公开(公告)号:US11321002B2
公开(公告)日:2022-05-03
申请号:US16215962
申请日:2018-12-11
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Roopesh Kumar Tamma , Marcel Furtado Almeida
Abstract: In some examples, a system converts a virtual volume from a first volume type to a second volume type without modifying the virtual volume, the converting comprising accessing a source metadata associated with the virtual volume, the source metadata including information for the first volume type, and generating a destination metadata associated with the virtual volume, the destination metadata including information for the second volume type. While the virtual volume is being converted from the first volume type to the second volume type, the system processes a write operation that accesses a portion of the virtual volume and changes data in the accessed portion of the virtual volume.
-
公开(公告)号:US10776033B2
公开(公告)日:2020-09-15
申请号:US15120826
申请日:2014-02-24
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Roopesh Kumar Tamma , Ajitkumar A Natarajan
Abstract: A port processor to receive a read command in a target port. In response, use the target to process a data transfer that includes use of memory for the read transfer allocated by a storage array controller prior to receipt of the read command by the target port or while processing the data transfer and selectively mark such memory as repurposable. The port processor to receive a write command in the target port. In response to receipt of the write command, use the target to process a data transfer for the initiator associated with the write operation, wherein the process includes use of memory that the storage array controller pre-allocated or allocated based on receipt of the read command by the target port for the transfer to the storage array controller and marked as repurposable.
-
公开(公告)号:US10241708B2
公开(公告)日:2019-03-26
申请号:US15514075
申请日:2014-09-25
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Siamak Nazari , Roopesh Kumar Tamma , Srinivasa D Murthy
Abstract: Example implementations relate to data chunk storage. For example, an implementation includes an apparatus that includes a processor. The processor is to receive a first data chunk from a source device and to generate a first fingerprint of the first data chunk. In response to a determination that the first fingerprint matches a second fingerprint of a second data chunk, the processor is to select a storage pool from a plurality of storage pools at a storage device to store the first data chunk based on the first data chunk and based on the second data chunk. The plurality of storage pools includes a first storage pool associated with first particular data chunks with non-colliding fingerprints and a second storage pool associated with second particular data chunks with colliding fingerprints.
-
公开(公告)号:US10168937B2
公开(公告)日:2019-01-01
申请号:US15513081
申请日:2014-09-25
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Roopesh Kumar Tamma , Siamak Nazari , Srinivasa D Murthy
IPC: G06F3/06
Abstract: Example implementations relate to storage space allocation. For example, an implementation includes an apparatus including a controller. The controller is to receive an allocation request from a host computing device. The controller is also to reserve a portion of storage space in the storage device via a reservation table based on the allocation request. The controller is further to determine a type of the allocation request. The type of the allocation request includes a space-optimized allocation request and a non-space-optimized allocation request. When the type of the allocation request corresponds to the non-space-optimized allocation request, the controller is to commit the portion of storage space via an allocation table. When the type of the allocation request corresponds to the space-optimized allocation request, the controller is to release the portion of storage space via the reservation table.
-
-
-
-
-
-
-
-
-