-
公开(公告)号:US20180196834A1
公开(公告)日:2018-07-12
申请号:US15741961
申请日:2015-07-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D. Murthy
CPC classification number: G06F16/215 , G06F9/45558 , G06F11/00 , G06F11/14 , G06F16/2255 , G06F21/32 , G06F2009/45583
Abstract: Techniques are provided for storing data in a deduplication store. A method includes calculating a fingerprint for data stored in a client data store. The fingerprint is compared to each of a plurality of fingerprints in a deduplication store. If the data fingerprint matches one of the plurality of fingerprints in the deduplication store, the data is moved to the deduplication store, and a back reference to the data in the deduplication store is placed in the client data store.
-
公开(公告)号:US20180173731A1
公开(公告)日:2018-06-21
申请号:US15387603
申请日:2016-12-21
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D. Murthy , Roopesh Kumar Tamma
IPC: G06F17/30
CPC classification number: G06F16/215 , G06F3/0608 , G06F3/0641 , G06F3/067 , G06F16/2255 , G06F16/2365
Abstract: An example storage system may include storage media and a storage controller. The storage controller may be to establish virtual volumes, private data stores, and a deduplication data store, each being a virtual storage space of the storage media, wherein each of the private data stores is associated with one of the virtual volumes and the deduplication data store is shared among the virtual volumes. The storage controller may, in response to receiving input data that is to be stored in a given one of the virtual volumes, determine a signature for the input data and select between storing the input data in the private data store associated with the given one of the virtual volumes and storing the input data in the deduplication data store. The storage controller may select where to store the input data based on whether a metadata storage location addressed by a first portion of the signature includes valid metadata, and, if so: whether the metadata includes a back-pointer to one of the virtual volumes, and whether a second portion of the signature matches a key included in the metadata.
-
公开(公告)号:US20180032412A1
公开(公告)日:2018-02-01
申请号:US15219613
申请日:2016-07-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Feng Zhou , Jin Wang , Srinivasa D. Murthy , Wei Wang
CPC classification number: G06F11/1474 , G06F11/1471 , G06F11/203 , G06F11/2033 , G06F11/2035 , G06F11/2048 , G06F11/2097 , G06F16/182 , G06F16/1865 , G06F2201/805
Abstract: Examples disclosed herein relate to processing transaction logs for storage nodes. Multiple nodes manage transactions for storage units including transaction logs. A node assumes control over a set of storage units and blocks host access requests to the storage units. Transaction logs are processed to determine a subset of the set to perform recovery for. In this example, the subset of storage units are locked. Host access requests are resumed.
-
公开(公告)号:US20170300266A1
公开(公告)日:2017-10-19
申请号:US15514075
申请日:2014-09-25
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Siamak Nazari , Roopesh Kumar Tamma , Srinivasa D Murthy
CPC classification number: G06F3/0641 , G06F3/0608 , G06F3/0644 , G06F3/0673 , G06F11/08 , G06F11/14 , G06F11/1453 , G06F17/30156 , G06F17/30371 , G06F17/30377
Abstract: Example implementations relate to data chunk storage. For example, an implementation includes an apparatus that includes a processor. The processor is to receive a first data chunk from a source device and to generate a first fingerprint of the first data chunk. In response to a determination that the first fingerprint matches a second fingerprint of a second data chunk, the processor is to select a storage pool from a plurality of storage pools at a storage device to store the first data chunk based on the first data chunk and based on the second data chunk. The plurality of storage pools includes a first storage pool associated with first particular data chunks with non-colliding fingerprints and a second storage pool associated with second particular data chunks with colliding fingerprints.
-
公开(公告)号:US20160350175A1
公开(公告)日:2016-12-01
申请号:US15117670
申请日:2014-04-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D Murthy
CPC classification number: G06F11/1004 , G06F3/0619 , G06F3/0641 , G06F3/0673
Abstract: In one example implementation according to aspects of the present disclosure, a method may include calculating, by a computing system, a cyclic redundancy check (CRC) value for a received data request. The method may further include translating, by the computing system, the CRC value into a physical page location using a three-level table walk. The method may also include detecting, by the computing system, whether the received data request represents duplicate data by comparing the received data request with a data stored at the physical page location.
Abstract translation: 在根据本公开的方面的一个示例实现中,方法可以包括由计算系统计算用于接收的数据请求的循环冗余校验(CRC)值。 该方法还可以包括通过计算系统将CRC值转换为使用三级表走路的物理页面位置。 该方法还可以包括通过将接收到的数据请求与存储在物理页面位置处的数据进行比较来检测计算系统接收到的数据请求是否表示重复数据。
-
公开(公告)号:US10430802B2
公开(公告)日:2019-10-01
申请号:US15329806
申请日:2014-09-03
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Jun Lu , Lingyan Meng , Bing Gu , Keke Qi
Abstract: Role based assessment for an IT management system, includes maintaining a plurality of roles, each role attributable to a user type within an IT management system. Mappings are defined between the plurality of user roles and assets of the IT management system. An assessment for the IT management system is then assembled from the perspective of a selected one of the plurality of roles based on mappings between the selected user role and the assets.
-
公开(公告)号:US10387275B2
公开(公告)日:2019-08-20
申请号:US15219613
申请日:2016-07-26
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Feng Zhou , Jin Wang , Srinivasa D. Murthy , Wei Wang
IPC: G06F11/14 , G06F16/182 , G06F16/18 , G06F11/20
Abstract: Examples disclosed herein relate to processing transaction logs for storage nodes. Multiple nodes manage transactions for storage units including transaction logs. A node assumes control over a set of storage units and blocks host access requests to the storage units. Transaction logs are processed to determine a subset of the set to perform recovery for. In this example, the subset of storage units are locked. Host access requests are resumed.
-
公开(公告)号:US20180011914A1
公开(公告)日:2018-01-11
申请号:US15547710
申请日:2015-08-28
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Mark Doherty , Siamak Nazari , Jin Wang , Srinivasa D. Murthy , Paul Kinnaird , Pierre Labat , Jonathan Stewart
CPC classification number: G06F16/273 , G06F3/0619 , G06F3/065 , G06F3/0665 , G06F3/0689 , G06F11/14 , G06F11/1666 , G06F11/20 , G06F11/2007 , G06F11/2094 , G06F11/2097 , G06F12/0815 , G06F12/0875 , G06F2212/1032 , G06F2212/621
Abstract: Methods and systems for collision handling during an asynchronous replication are provided. A system includes a cache memory system comprising a number of cache memory pages. A collision detector detects when a host is attempting to overwrite a cache memory page that has not been completely replicated. A revision page tagger copies the cache memory page to a free page and tags the copied page as protected.
-
公开(公告)号:US09817599B2
公开(公告)日:2017-11-14
申请号:US14709132
申请日:2015-05-11
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D Murthy
CPC classification number: G06F3/0631 , G06F3/0608 , G06F3/0665 , G06F3/0685 , G06F11/2071 , G06F11/2074 , G06F11/2076 , G06F11/2079
Abstract: In example implementations, unreferenced memory addresses in a segment of a storage volume may be identified. Access to the segment of the storage volume may be controlled by one of a plurality of storage volume controllers (SVCs). The plurality of SVCs may control access to respective segments of the storage volume. Indicators of the identified unreferenced memory addresses may be stored in a volatile memory in the one of the plurality of SVCs. In response to an input/output (I/O) command from a host, data may be written to one of the identified unreferenced memory addresses corresponding to one of the indicators stored in the volatile memory. After the data has been written, the one of the indicators may be deleted from the volatile memory. The one of the identified unreferenced memory addresses may not have been made available to other SVCs after being identified.
-
公开(公告)号:US20170168756A1
公开(公告)日:2017-06-15
申请号:US15325774
申请日:2014-07-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Kouei Yamada , Siamak Nazari , Brian Rutledge , Jianding Luo , Jin Wang , Mark Doherty , Richard Dalzell , Peter Hynes
IPC: G06F3/06
CPC classification number: G06F3/0659 , G06F3/0619 , G06F3/065 , G06F3/067 , G06F3/0689 , G06F9/5061 , G06F9/5066 , G06F9/5083 , G06F11/2094 , G06F12/00 , G06F13/14
Abstract: A system that includes a plurality of nodes configured to execute storage transactions. The nodes include a first node and a plurality of other nodes. The storage transactions are grouped into transaction sets that are to be executed in a predetermined order that ensures that dependencies between the transactions are observed. A cluster sequencer that resides on the first node is configured to increment a sequence number that identifies an active transaction set of the transaction sets and send the sequence number from the first node to the plurality of other nodes. Upon receipt of the sequence number, each one of the plurality of other nodes begins executing the transactions of the active transaction set without waiting for confirmation that all of the plurality of other nodes have the same sequence number.
-
-
-
-
-
-
-
-
-