SYSTEM AND METHODS OF AN EFFICIENT CACHE ALGORITHM IN A HIERARCHICAL STORAGE SYSTEM

    公开(公告)号:US20170293570A1

    公开(公告)日:2017-10-12

    申请号:US15097159

    申请日:2016-04-12

    Applicant: VMware, Inc.

    Abstract: An in-memory cache for a computer system having a first storage and a second storage where the first storage is a cache for the second storage, tracks priority levels of block attributes stored therein. If a data item is cached in the first storage, the block attribute corresponding to the data item is stored in the in-memory cache as a high priority block attribute. If a data item evicted from the first storage, the block attribute corresponding to the data item is stored in the in-memory cache as a low priority block attribute. When the cache becomes full, the low priority block attributes are evicted before the high priority block attributes.

    FAST FILE CLONE USING COPY-ON-WRITE B-TREE
    53.
    发明申请
    FAST FILE CLONE USING COPY-ON-WRITE B-TREE 有权
    使用COPY-ON-B B-TREE的快速文件

    公开(公告)号:US20170060898A1

    公开(公告)日:2017-03-02

    申请号:US14837166

    申请日:2015-08-27

    Applicant: VMware, Inc.

    CPC classification number: G06F17/30327 G06F3/06 G06F17/30091

    Abstract: A file system uses a B-tree data structure to organize file data. The file system may maintain an index node (mode) representing a file and having entries that map to extents of the file. When the file system detects an index node, through updates, has exceeded a threshold number of extents, the file system converts the file to a copy-on-write (COW) B-tree data structure containing the entries representing the extents of the file. To clone the file, the file system uses copies of the index node and the root node of the COW B-tree data structure.

    Abstract translation: 文件系统使用B树数据结构来组织文件数据。 文件系统可以维护表示文件的索引节点(模式),并具有映射到文件的范围的条目。 当文件系统检测到索引节点时,通过更新,已经超过阈值数量级,文件系统将该文件转换为包含表示文件扩展区的条目的写入时复制(COW)B树数据结构 。 要克隆文件,文件系统使用索引节点和COW B树数据结构的根节点的副本。

    LOG-STRUCTURED B-TREE FOR HANDLING RANDOM WRITES
    54.
    发明申请
    LOG-STRUCTURED B-TREE FOR HANDLING RANDOM WRITES 有权
    用于处理随机写入的结构化B-TREE

    公开(公告)号:US20160378653A1

    公开(公告)日:2016-12-29

    申请号:US14750554

    申请日:2015-06-25

    Applicant: VMware, Inc.

    CPC classification number: G06F12/0866 G06F12/0804 G06F2212/463 G06F2212/466

    Abstract: A sorted key-value store is implemented using a write-back cache maintained in memory, a B-tree data structured maintained in disk, and a logical and physical log for providing transactions. The logical log and write-back cache are used to answer client requests, while dirty blocks in the write-back cache are periodically flushed to disk using the physical log.

    Abstract translation: 使用在存储器中保存的回写高速缓存,结构化维护在磁盘中的B树数据以及用于提供事务的逻辑和物理日志来实现排序的键值存储。 逻辑日志和回写缓存用于回答客户端请求,而回写缓存中的脏块会使用物理日志定期刷新到磁盘。

    PROVIDING END-TO-END CHECKSUM WITHIN A DISTRIBUTED VIRTUAL STORAGE AREA NETWORK MODULE
    55.
    发明申请
    PROVIDING END-TO-END CHECKSUM WITHIN A DISTRIBUTED VIRTUAL STORAGE AREA NETWORK MODULE 审中-公开
    在分布式虚拟存储区域网络模块中提供端到端检查

    公开(公告)号:US20160342462A1

    公开(公告)日:2016-11-24

    申请号:US14716756

    申请日:2015-05-19

    Applicant: VMware, Inc.

    Abstract: Exemplary methods, apparatuses, and systems include a first layer of a virtual storage area network (VSAN) module receiving a write request from a data compute node. The write request includes data to be written and the VSAN module is distributed across a plurality of computers to provide an aggregate object store using storage attached to each of the plurality of computers. The first layer of the VSAN module calculates a checksum for the data to be written and passes the data to be written and the checksum to a second layer of the VSAN module. The second layer of the VSAN module calculates a first verification checksum for the data to be written. The data and the checksum are written to persistent storage in response to determining the first verification checksum matches the checksum passed by the first layer of the VSAN module.

    Abstract translation: 示例性方法,装置和系统包括从数据计算节点接收写入请求的虚拟存储区域网络(VSAN)模块的第一层。 写请求包括要写入的数据,并且VSAN模块分布在多个计算机上,以使用附加到多个计算机中的每一个的存储器提供聚合对象存储。 VSAN模块的第一层计算待写入数据的校验和,并将要写入的数据和校验和传递给VSAN模块的第二层。 VSAN模块的第二层为要写入的数据计算第一个验证校验和。 响应于确定第一验证校验和与VSAN模块的第一层传递的校验和匹配,将数据和校验和写入持久存储器。

    CHUNKING AND DEDUPLICATION OF DATA USING ERROR CHECKING VALUES

    公开(公告)号:US20240419350A1

    公开(公告)日:2024-12-19

    申请号:US18334231

    申请日:2023-06-13

    Applicant: VMware, Inc.

    Abstract: Chunks of data are identified and deduplication is performed on the chunks of data using associated cyclic redundancy check (CRC) values. A plurality of CRC values is obtained that is associated with consecutive data blocks stored in a payload data store. Cut point CRC values are identified in the plurality of CRC values and CRC chunks are identified based on those cut point CRC values, wherein each CRC chunk is bounded by two consecutive cut point CRC values. A CRC chunk hash value is generated for each CRC chunk. A pair of duplicate CRC chunks is identified using the CRC chunk hash values and a deduplication operation is performed in association with the identified pair of duplicate CRC chunks. Using existing CRC values during the identification of chunk cut points reduces the computing resource costs associated with performing that process using the data blocks.

    SECURE METERING FOR HYPERCONVERGED INFRASTRUCTURES

    公开(公告)号:US20240250821A1

    公开(公告)日:2024-07-25

    申请号:US18298657

    申请日:2023-04-11

    Applicant: VMware, Inc.

    Abstract: Solutions for secure metering of hyperconverged infrastructures are disclosed. Examples include: receiving a security token; accessing a secondary storage (e.g., cold storage, backups) using the security token; determining usage data for the secondary storage; generating a first message digest for a combination of the usage data and the security token; and transmitting, to a metering server, the usage data and the first message digest. In some examples, the combination of the usage data and the security token comprises a concatenation of the usage data and the security token. In some examples, the metering server requests verification usage data from the secondary storage, generates a second message digest for a combination of the verification usage data and the security token, and compares the first message digest with the second message digest. Examples do not persist the security token on customer premises. Examples leverage the usage data to optimize the secondary storage.

    MICRO-BATCHING METADATA UPDATES TO REDUCE TRANSACTION JOURNAL OVERHEAD DURING SNAPSHOT DELETION

    公开(公告)号:US20230214146A1

    公开(公告)日:2023-07-06

    申请号:US17646993

    申请日:2022-01-04

    Applicant: VMware, Inc.

    CPC classification number: G06F3/0652 G06F3/064 G06F3/0604 G06F3/0679

    Abstract: A method for deleting one or more snapshots using micro-batch processing is provided. The method includes receiving a request to delete the one or more snapshots, identifying one or more middle map extents exclusively owned by the one or more snapshots requested to be deleted, wherein metadata for the one or more snapshots is stored in one or more logical maps having logical map extents mapping logical block addresses (LBAs) to middle block addresses (MBAs) and a middle map having middle map extents mapping MBAs to physical block addresses (PBAs) of physical locations where data blocks are written, adding MBAs of the identified one or more middle map extents in a batch, determining a first micro-batch including a first subset of the MBAs in the batch, the first subset of MBAs being MBAs less than a first upper bound MBA, and using a first transaction to delete the middle map extents corresponding to the first subset of MBAs included in the first micro-batch.

Patent Agency Ranking