摘要:
Checksums for internet protocol transmissions of certain transport layer messages are generated using IPv6 pseudo-headers for both IPv4 and IPv6 internet protocol transmissions. For IPv4 transmissions, IPv4 information is mapped into an IPv6 pseudo-header, and the checksum is computed using the IPv6 pseudo-header. Among other things, embodiments of the present invention allow checksums for both IPv4 and IPv6 internet protocol transmissions such transport layer messages to be computed using a common checksum computer.
摘要:
A hardware-based file system includes multiple linked sub-modules that perform functions ancillary to client data handling. Each sub-module is associated with a metadata cache. A doubly-rooted structure is used to store each file system object at successive checkpoints. Metadata is stored within an object and/or as a separate object. Provisions are made for allocating sparse objects. A delayed write feature is used for writing certain objects into non-volatile storage. Checkpoints can be retained as read-only versions of the file system. Modifications to the file system are accomplished without affecting the contents of retained checkpoints. The file system can be reverted to a retained checkpoint. Multiple file servers can be interconnected as a cluster, and each file server stores requests from another file server. Interconnections between file servers can be dynamically modified. A distributed locking mechanism is used to control access to file system objects stored by the file servers.
摘要:
A hardware-based file system includes multiple linked sub-modules that perform functions ancillary to client data handling. Each sub-module is associated with a metadata cache. A doubly-rooted structure is used to store each file system object at successive checkpoints. Metadata is stored within an object and/or as a separate object. Provisions are made for allocating sparse objects. A delayed write feature is used for writing certain objects into non-volatile storage. Checkpoints can be retained as read-only versions of the file system. Modifications to the file system are accomplished without affecting the contents of retained checkpoints. The file system can be reverted to a retained checkpoint. Multiple file servers can be interconnected as a cluster, and each file server stores requests from another file server. Interconnections between file servers can be dynamically modified. A distributed locking mechanism is used to control access to file system objects stored by the file servers.
摘要:
A high tier storage area stores a stub file and a lower tier cloud storage area stores the file corresponding to the stub file. When a client apparatus requests segments of the file from the high tier storage area, reference is made to the stub file to determine a predicted non-sequential pattern of requests to the segments by the client apparatus. The high tier storage area follows the predicted non-sequential pattern of requests to retrieve the segments of the file from the cloud prior to the client apparatus actually requesting the segments. As such, the file may be efficiently provided to the client apparatus while also efficiently storing the file on the lower tier cloud storage area.
摘要:
A hardware-based file system includes multiple linked sub-modules that perform functions ancillary to client data handling. Each sub-module is associated with a metadata cache. A doubly-rooted structure is used to store each file system object at successive checkpoints. Metadata is stored within an object and/or as a separate object. Provisions are made for allocating sparse objects. A delayed write feature is used for writing certain objects into non-volatile storage. Checkpoints can be retained as read-only versions of the file system. Modifications to the file system are accomplished without affecting the contents of retained checkpoints. The file system can be reverted to a retained checkpoint. Multiple file servers can be interconnected as a cluster, and each file server stores requests from another file server. Interconnections between file servers can be dynamically modified. A distributed locking mechanism is used to control access to file system objects stored by the file servers.
摘要:
A file system adapter card that may be plugged into a host computer system for providing hardware-based file system accesses outside the purview of a host operating system running on the host computer system. The file system adapter card includes a hardware-implemented or hardware-accelerated file service subsystem and a computer bus that permits a host computer system to communicate directly with the file service subsystem for providing file service requests and receiving file service responses. The file service subsystem includes dedicated hardware that operates outside the immediate control of a host operating system, including specialized circuitry for performing at least one major subsystem function.
摘要:
Validating a data structure includes (a) maintaining a tracking structure in a memory, the tracking structure including a corresponding status field for each table entry, the status fields having an unmarked state and a marked state; (b) processing the table entries sequentially and tracking the used and free table entries using the tracking structure, such tracking including marking the status fields corresponding to used table entries and marking the status fields corresponding to the next free table entries referenced in the pointer fields of free table entries; and (c) determining validity of the data structure based on the tracking structure.
摘要:
A network-attached system, device, and method supports multiple storage tiers. Data may be migrated between storage tiers, for example, based on a data migration policy. A plurality of dedicated storage devices that provide a plurality of storage tiers having different characteristics are managed using a disk control protocol and data is migrated between storage tiers based on predetermined storage criteria.
摘要:
A system, device, and method for managing file security attributes in a computer file storage system generates a set of Windows file security attributes from a set of UNIX file security attributes. The set of Windows file security attributes includes a UNIX-specific SID for a UNIX name that could not be translated into a Windows name. The set of Windows file security attributes also includes a set of Windows file permissions derived from a set of UNIX file permissions.
摘要:
A network-attached system, device, and method supports multiple storage tiers. Data may be migrated between storage tiers, for example, based on a data migration policy.