摘要:
A method for detecting that a vector matches a pattern compares a checksum for the vector to a precomputed checksum that acts as a signature for the pattern. Other systems and methods are disclosed.
摘要:
Provided are, among other things, systems, methods and techniques for controlling data synchronization. Local data-writing operations, made across a number of logical storage units on different data-storage devices, are divided into batches, the batches corresponding to different time segments. The data-writing operations, together with an indication of boundaries between the batches, are transmitted to a remote data-storage location. The boundaries between the batches are determined by at least one of: (1) identifying a period of time of sufficient duration during which no data-writing operations were performed and declaring a point during said period of time as one of the boundaries, (2) obtaining agreement from a plurality of entities, and (3) declaring the boundaries at pre-scheduled points in time.
摘要:
An embodiment of a method of cooperative caching for a distributed storage system begins with a step of requesting data from storage devices which hold the data. The method continues with a step of receiving any cached blocks and expected response times for providing non-cached blocks from the storage devices. The method concludes with a step of requesting a sufficient number of the non-cached blocks from one or more particular storage devices which provides an expectation of optimal performance.
摘要:
A self-disentangling data storage technique. Machine-readable data is stored by a data storage media, such as a magnetic tape or floppy drive. A software program for interpreting the data and requests for access to the data is also stored on the data storage media. The program allows the data to be retrieved using multiple different request types and interpreted in accordance with multiple different data formats. The invention overcomes disadvantages of prior storage techniques since the data can be completely or partially reconstructed, as needed. Further, the invention isolates the data storage format from the application used to generate the data so as to minimize problems caused by outdated data storage formats.
摘要:
A configuration method includes selecting a design configuration, and modeling the solution configuration having a failure event for the selected solution configuration to determine an amount of down time associated with the failure event. A first penalty cost function is applied the amount of down time to determine a first penalty cost associated with the failure event of the selected solution configuration.
摘要:
According to one embodiment, a method comprises intercepting, at an interposition agent, requests for accessing a data storage device. The method further comprises determining, by the interposition agent, at least one of the requests to impact, and selectively simulating, by the interposition agent, a fault for the selected at least one of the requests. According to another embodiment, a system comprises at least one data storage device, and at least one requester operable to request access to the at least one data storage device. The system further comprises at least one interposition agent communicatively interposed between the requestor(s) and the data storage device(s) to intercept requests for access from the requestor(s) to the data storage device(s), wherein the interposition agent is operable to selectively determine ones of the intercepted requests to impact and selectively simulate a fault for the selected at least one of the requests.
摘要:
A primary copy of data is held at a primary storage facility, while data that is redundant of the primary copy is held at a secondary storage facility. To inhibit propagation of errors from the primary copy to the redundant data, write transactions to the redundant data are queued at the second storage facility, until a specified time elapses or until a specified event occurs (or until combination hereof occurs). Write transactions may be collected in groups at the primary facility prior to forwarding to the secondary facility and may also be batched at the secondary facility prior to being applied to the redundant data. Overwrites may be allowed within a group at the primary facility to conserve communication bandwidth between the primary and secondary storage facilities. Overwrites may be allowed within a batch at the secondary facility to conserve space occupied by the transactions at the secondary facility.
摘要:
A technique and user interface for the assignment of computer system resources and, particularly, for the assignment of storage system resources. The invention allows a user to make design selections through a user interface and, then, automatically provides an indication to the user as the effect of the selections. For example, various performance parameters for each of several applications may be displayed graphically as a chart. In response to the user adjusting a parameter for one application, the invention determines what effect this change will have on the other displayed parameters. A design for the computer system is developed. Levels of performance parameters for the design are predicted. The predicted levels of performance parameters are compared to the desired levels of performance parameters. When the predicted levels are lower than the desired levels, the design is modified. The design may be modified by reducing the desired levels of performance parameters based on utility functions. The results may then be displayed graphically on the chart. The invention is particularly useful for allocating data storage system resources among several different applications.
摘要:
According to one embodiment, a method comprises intercepting, at an interposition agent, requests for accessing a data storage device. The method further comprises determining, by the interposition agent, at least one of the requests to impact, and selectively simulating, by the interposition agent, a fault for the selected at least one of the requests. According to another embodiment, a system comprises at least one data storage device, and at least one requester operable to request access to the at least one data storage device. The system further comprises at least one interposition agent communicatively interposed between the requestor(s) and the data storage device(s) to intercept requests for access from the requestor(s) to the data storage device(s), wherein the interposition agent is operable to selectively determine ones of the intercepted requests to impact and selectively simulate a fault for the selected at least one of the requests.
摘要:
Techniques for performing data redundancy operations in a fault-tolerant manner. In one aspect, a primary data storage facility stores a primary copy of data and a secondary facility stores data that is redundant of the primary copy of the data. The primary facility includes a first redundancy appliance that receives a sequence of write requests and stores data for the sequence of write requests in storage associated with the primary storage facility. A second redundancy appliance shadows the first redundancy appliance and assumes the role of the first redundancy appliance in the event of a fault at the first redundancy appliance. In this way, fault tolerance is increased by the presence of the second, shadow appliance.