摘要:
A network component useful in tracking write activity by writing logs containing write address information is described. The tracking component may be used in networked systems employing data mirrors to record data block addresses written to a primary storage volume during the time a data mirror is unavailable. The tracking component can be available to any network originating node, and may therefore track write activity on multiple volumes. At the time a data mirror is reconstructed, the log written may be used to construct a list of block addresses pointing to locations on a primary storage volume wherein data differs from a secondary storage volume member of the mirror. The locations maybe copied from the primary to secondary storage volume to reconstruct the data mirror. The performance impact of the tracking component is minimal and a shared network resource is offered that increases fault tolerance in the event of backup device failures.
摘要:
Disclosed are a system, a method, and a computer program product to provide for the optimization of the output transfer load balance between the peer computers transferring data to one or more storage devices. The peer computers receive, organize and transfer the data to storage devices. The data set is composed of a plurality of data transfers. After an initial division of the data transfers between the two peers, each peer will have assigned responsibility for a number of data transfers. If the one of the peer computers completes offloading transactions earlier than the other peer, then the peer that is still transferring data will employ the other peer to execute a portion of the remaining data transfers. The operation of the system is symmetrical in that either peer may assist the other peer depending upon which peer has idle time. In addition the operation is autonomous and self-adjusting resulting in the peer nodes optimizing the size of the portion of data transfers that are reassigned during the operation of the invention resulting in the minimization of idle time for either peer. The self-adjusting feature allows the system to react to changing conditions that affect data transfer rates to the storage devices.
摘要:
An enhanced mechanism for providing data protection for variable length records utilizes high performance block storage metadata. In an embodiment, an emulated record that emulates a variable length record, such as a Count-Key-Data (CKD) record or an Extended-Count-Key-Data (ECKD) record, is generated by a Host Bus Adapter (HBA) of a mainframe system. The emulated record comprises a sequence of extended fixed-length blocks, each of which includes a data block and a footer. A confluence of the footers defines a high performance block storage metadata unit associated with the emulated record and includes a checksum that covers all data blocks and all footers of the entire emulated record. In one embodiment, the checksum is checked during transit of the emulated record between a HBA and a storage subsystem (e.g., by the HBA when the emulated record is received from the storage subsystem, and/or by a switch in the data transfer path), during a hardening step when writing the emulated record to a disk, and/or during a verification step when reading the emulated record from the disk.
摘要:
Data and metadata are generated in a computational device, wherein the generated data is stored in a first physical storage device coupled to the computational device, and wherein the generated metadata is stored transiently in the computational device. The data and the metadata are replicated to a second physical storage device. The replicated data and the replicated metadata in the second physical storage device are used to recover from a failure of at least one of the computational device and the first physical storage device.
摘要:
Disclosed are a system, a method, and a computer program product to provide for the optimization of the output transfer load balance between the peer computers transferring data to one or more storage devices. The peer computers receive, organize and transfer the data to storage devices. The data set is composed of a plurality of data transfers. After an initial division of the data transfers between the two peers, each peer will have assigned responsibility for a number of data transfers. If the one of the peer computers completes offloading transactions earlier than the other peer, then the peer that is still transferring data will employ the other peer to execute a portion of the remaining data transfers. The operation of the system is symmetrical in that either peer may assist the other peer depending upon which peer has idle time. In addition the operation is autonomous and self-adjusting resulting in the peer nodes optimizing the size of the portion of data transfers that are reassigned during the operation of the invention resulting in the minimization of idle time for either peer. The self-adjusting feature allows the system to react to changing conditions that affect data transfer rates to the storage devices.
摘要:
A plurality of data units with associated timestamps is stored in a time based file system, wherein a timestamp corresponds to a time indicated by a system clock. A time indicated by the system clock is changed while the plurality of data units is being stored. A plurality of epochs is stored in a data structure, wherein an epoch is a period of time between a starting and an ending timestamp selected from the timestamps, and wherein successive epochs have overlapping time periods. The time based file system is reverted to an earlier point in time based on the plurality of epochs stored in the data structure.
摘要:
A network component useful in tracking write activity by writing logs containing write address information is described. The tracking component may be used in networked systems employing data mirrors to record data block addresses written to a primary storage volume during the time a data mirror is unavailable. The tracking component can be available to any network originating node, and may therefore track write activity on multiple volumes. At the time a data mirror is reconstructed, the log written may be used to construct a list of block addresses pointing to locations on a primary storage volume wherein data differs from a secondary storage volume member of the mirror. The locations may be copied from the primary to secondary storage volume to reconstruct the data mirror. The performance impact of the tracking component is minimal and a shared network resource is offered that increases fault tolerance in the event of backup device failures.
摘要:
Disclosed is a system, method, and article of manufacture for maintaining consistent copies of data between a primary site and a secondary site.One or more backup components receive backup messages from the primary site describing transactions. Transactions received from the primary site at the backup components are referred to as “inbound transactions.” The backup components associate these inbound transactions with an identifier such that all transactions associated with a certain identifier comprise all of the activity on the consistency group for a certain period of time. The backup captain periodically notifies the backup components to pause (i.e., stop receiving inbound transactions temporarily), and once all backup components indicate that they have paused, the backup components are notified to resume receiving transactions and associate the newly received transactions with a new identifier.At the same time, the backup components are sending transactions to the secondary storage devices. Transactions sent from caches at the backup components to the secondary site are referred to as “outbound transactions.” The backup components send all transactions from the current outbound consistent transactions set, temporarily stop sending outbound transactions, and notify the backup captain that they have completed sending the current outbound consistent transactions set. When all backup components have completed sending the current outbound consistent transactions set, the backup captain causes consistent copies to be made at secondary storage and notifies the backup components to send the next outbound consistent transactions set.
摘要:
Disclosed are a system, a method, and a computer program product to efficiently create consistent transaction sets to maintain one or more copies of data at different data storage sites. All transactions sent to a primary backup appliance during a consistent transaction set creation interval are formed into a consistent transaction set by efficiently adding new transactions as they are received and removing unnecessary transfers as newer versions arrive. When the creation interval has expired, the complete consistent transaction set is transferred to a secondary backup appliance to be used to update a consistent backup copy of the primary site data. For each consistent transaction set, there will be a tree data structure (a search tree) created that contains the addressing information for all of the blocks of data in the consistent transaction set. The tree data structure used is a modified splay tree, which is a specialization of a binary search tree such that accessed nodes are “percolated” to the top of the tree for faster subsequent access. Secondary data consistency is maintained because the consistent transaction sets are applied whole at the secondary site, and after application, the secondary volumes are exact copies of the primary volumes at the time the consistent transaction set was completed.
摘要:
A file system driver stored in a computational device receives a request to provide access to a snapshot of a rewritable file system at a selected point in time, wherein a plurality of tokens corresponding to a plurality of data units are stored in the rewritable file system, and wherein an ordering relationship is maintained among the plurality of tokens. The file system driver determines a token corresponding to the selected point in time based on the ordering relationship. A virtual subdirectory name is generated corresponding to the determined token. A virtual subdirectory is created with the generated virtual subdirectory name, wherein the virtual subdirectory is a subdirectory of a root directory. The snapshot is accessed via the subdirectory.