摘要:
A storage area network (SAN) controller and method for storing and replicating data between sites in a storage area network in which storage controllers at each site implement storage virtualization. A storage cell is implemented at each site comprising at least one storage controller and a pool of physical storage coupled to the controller. A copy set comprising a logical unit (LUN) of storage, referred to as a member, in each of the storage cells is defined. As operational data transactions are performed against one of the members of a copy set, they are replicated, immediately or after a delay, in each other member of the copy set. As changes are made to dependent attributes such as size of one member of the copy set, the change is replicated in each other member of the copy set automatically. Changes can be made in the independent attributes such as size of each member of the copy set independently of other members of the copy set.
摘要:
A system for communicating between two devices in a network in which a semi-persistent tunnel is established between the two devices in advance of data communication. The semi-persistent tunnel includes resources that are pre-allocated in a first device at a first end of the communication link by a second device at the second end of the communication link. The first and second devices implement a plurality of processes for handling data transfer operations. Preferably, the semi-persistent tunnel also includes resources that are pre-allocated in a device at the second end of the communication link by the device at the first end of the communication link to allow bi-directional communication. Data transfer operations transmitted through the tunnel include an identification of specific resources of the pre-allocated resources that are to handle the data transfer operation. Data transfer operations also include a vector identifying a particular process among the plurality of processes that implement the data transfer operation.
摘要:
A system in which data operations for a data replication group are received in-order, and buffered. When the operations are complete, they are stored in a non-volatile memory atomically with a group sequence number. The cache is preferably mirrored. This creates a persistent association between the data operation and the sequence number. After the atomic store is performed in at least one non-volatile cache, the data operation is propagated to another member of the data replication group along with the group sequence number. In the other member, the data operation is cached at least once in a non-volatile cache atomically with the group sequence number. In this manner, the set of group sequence numbers for a plurality of operations forms a continuous ordering of the data operations.
摘要:
Methods and systems for managing disk capacity allocated to a data log in a source data storage system during a merge process are disclosed. Data in the data log may be merged into corresponding data on a destination storage system connected to the source data storage system by at least one communication link. In one embodiment a method comprises maintaining a ratio of merge writes out of the data log to writes from a host computer into the data log within a desired range until the write process reaches a predetermined distance from the end of the data log, and quiescing writes from a host computer into the data log until the data log is fully written to the destination storage system.
摘要:
A data storage system adapted to maintain redundant data storage sets at a destination location(s) is disclosed. The data storage system establishes a copy set comprising a source volume and a destination volume. Data written to a source volume is automatically copied to the destination volume. The data storage system maintains a data log that may be activated when the destination volume is inaccessible due to, for example, a malfunction in the destination storage system or in the communication link between the source system and the destination system. I/O commands and the data associated with those commands are written to the data log, and after a destination system becomes available the information in the data log is merged into the destination volume to conform the data in the destination volume to the data in the source volume. The data log competes for disk capacity with other volumes on the system, and log memory is allocated as needed. Command entries and data entries are stored in distinct areas of the data log, and the command entries include information identifying the memory offset of the associated data entries.
摘要翻译:公开了一种适于在目的地位置维护冗余数据存储组的数据存储系统。 数据存储系统建立包括源卷和目的地卷的复制集。 写入源卷的数据将自动复制到目标卷。 数据存储系统维护数据记录,当由于例如目的地存储系统中的故障或源系统与目的地系统之间的通信链路而导致目的地卷不可访问时,可能会被激活。 I / O命令和与这些命令相关联的数据被写入数据日志,并且在目标系统变得可用之后,将数据日志中的信息合并到目标卷中,以使目的卷中的数据符合目标卷中的数据 源音量。 数据日志与系统上的其他卷竞争磁盘容量,并根据需要分配日志内存。 命令条目和数据条目存储在数据日志的不同区域中,命令条目包括标识关联数据条目的存储器偏移量的信息。
摘要:
A data storage system adapted to maintain redundant data storage sets at a destination location(s) is disclosed. The data storage system establishes a copy set comprising a source volume and a destination volume. Data written to a source volume is automatically copied to the destination volume. The data storage system maintains a data log that may be activated when the destination volume is inaccessible due to, for example, a malfunction in the destination storage system or in the communication link between the source system and the destination system. I/O commands and the data associated with those commands are written to the data log, and after a destination system becomes available the information in the data log is merged into the destination volume to conform the data in the destination volume to the data in the source volume. The data log competes for disk capacity with other volumes on the system, and log memory is allocated as needed. In operation, the array controllers monitor connection status between array controllers in a DRM group. When a connection failure is detected the controllers determine which of the remaining controllers determine whether the source controller remains online, and if not then which destination controller should assume the role of the source controller.
摘要:
A storage system permits virtual storage of user data by implementing a logical disk mapping structure that provides access to user data stored on physical storage media and methods for generating point-in-time copies, or snapshots, of logical disks. A snapshot logical disk is referred to as a predecessor logical disk and the original logical disk is referred to as a successor logical disk. Creating a snapshot involves creating predecessor logical disk mapping data structures and populating the data structures with metadata that maps the predecessor logical disk to the user data stored on physical media. Logical disks include metadata that indicates whether user information is shared between logical disks. Multiple generations of snapshots may be created, and user data may be shared between these generations. Methods are disclosed for maintaining data accuracy when write I/O operations are directed to a logical disk.
摘要:
Systems, methods and software for implementing a virtualized storage system. Physical storage is carved into units called physical segments. Logical storage is implemented in atomic logical units called RStores comprising a range of virtual address space that when allocated, is bound to a particular group of PSEGs. RStores preferably implement a selected of data protection. A pool of physical storage devices is carved into redundant storage sets. A plurality of RStores make up a logical disk that is presented to a user. Storage access requests expressed in terms of logical disk addresses are mapped to PSEGs containing data represented by the logical addresses through a split-directory representation of the logical unit.
摘要:
Methods of data leveling in a virtualized storage system are described. In one implementation, the method comprises detecting an event that changes the eligible storage capacity of a storage system, and, in response to the event: determining a disk critical ratio for each disk in a group of disks in the storage system; determining an RSS critical ratio for a plurality of RSSs in the storage system; and moving data in the storage system in accordance with at least one of the RSS critical ratio and the disk critical ratio.
摘要:
Methods of determining the maximum storage capacity in a storage system that implements RAID-5 redundancy are described. In one implementation the method comprises determining a chunk size of addressable physical storage segments available for allocation in a redundant storage set comprising a plurality of physical disk drives; determining a number of redundant storage units per disk using the chunk size; determining a disk contribution value for each disk in the storage set; and allocating physical storage segments on the plurality of physical drives in accordance with the disk contribution value.