摘要:
A system for calibrating the video camera of motion detection equipment based on movement of a lighter than air motion object within the camera view of the video camera, the lighter than air object including at least one balloon filled with helium or other lighter than air gas.
摘要:
A system and method for parallel file system traversal using multiple job executors is disclosed. The system includes a pool of job executors, a job queue, and a trigger tracker. An object, representative of a node in the filesystem, is added (i.e., pushed) to the job queue for processing by an job executor. The job queue assigns (i.e., pops) objects to job executors in accordance to a LIFO (Last In First Out) ordering. Then the job executor performs an action such as copy. In one embodiment, the trigger tracker follows the processing of a child nodes to a particular child node. Thus, the filesystem is being traversed by several job executors at the same time.
摘要:
Systems and methods to customize a namespace using a synthetic namespace. A NAS switch provides file migrations in a NAS storage network that are transparent to the clients. The NAS switch file handles are used to customize a namespace. More specifically, a synthetic namespace is generated from one or more file location tables that map the switch file handles to NAS file handles. The NAS file handles are independent of a physical export containing the objects referred to by the NAS file handles. In one example, the synthetic namespace presents a home directory corresponding to a location of a user.
摘要:
A system and method for performing policy-based storage management using data related to access frequency and file attribute accumulation. A switch device provides transparency for transactions between a client and a storage network. The transparency allows objects (e.g., files or directories) to be moved (e.g., migrated) on the storage network without affecting a reference to the object used by the client (e.g., a file handle). A monitoring module generates accumulation data associated with the transactions for use in policy-based management. The accumulation data can describe uses of the file such as how often certain files are accessed, modifications to files such as creations of new directories or files, and other uses.
摘要:
A non-distruptive migration of a native volume from a source server to a destination server performed by a file switch involves converting the source native volume to a native with metadata volume. The native with metadata volume is converted to a mirrored native with metadata volume including the source server and the destination server. The destination server includes a mirror copy of the native with metadata volume. The source server is removed from the mirrored native with metadata volume. The mirror copy of the native with metadata volume on the destination server is converted to a destination native volume on the destination server.
摘要:
A NAS switch, in the data path of a client and a NAS file server on the storage network, provides a centralized point of reconfiguration after a network change that alleviates the need for reconfiguration of each connected client. The client uses a NAS request to access a storage object to the NAS switch using a switch file handle that is independent of object location and that can be used to locate the primary and its replica storage objects if the object is subsequently replicated. A replication module replicates a namespace separately from data contained therein. Afterwards, synchronicity module looks-up the switch file handle in a file handle replication table to determine if the object has been replicated and, if so, sends one of the replica NAS file handles. The synchronicity module also maintains synchronicity between the primary and replica file servers through critical NAS requests that modify objects such as create, delete, and the like.
摘要:
A method and apparatus for removing duplicated data in a file system utilizing copy-on-write storage tiers. A synthetic namespace is created via file virtualization, and is comprised of one or more file systems. Deduplication is applied at the namespace level and on all of the file systems comprising the synthetic namespace. A set of storage policies selects a set of files from the namespace that become the candidates for deduplication. The entire chosen set is migrated to a Copy-On-Write (COW) storage tier. This Copy-On-Write storage tier may be a virtual storage tier that resides within another physical storage tier (such as tier-1 or tier-2 storage). Each file stored in a Copy-On-Write storage tier is deduped, regardless of whether there is any file with identical contents in the set or in the COW storage tier. After deduplication, the deduped file becomes a sparse file where all the files storage space is reclaimed while all the file's attributes, including size, remain. A copy of each file that is deduped is left as a mirror copy and is stored in a mirror server. If two mirror copies have identical contents, only one mirror copy will be stored in the mirror server. Read access to a file in the COW storage tier (COW file) is redirected to its mirror copy if the file is deduped. When the first write to a COW file is received, the mirror copy stored in the mirror server is copied as the contents of the COW file, and the association from the COW file to its mirror copy is discarded. Thereafter, access to the “un-deduped” file will resume normally from the COW file.
摘要:
A transparent proxy server is implemented by directing particular client packets to a proxy server that handles communications between the client and an origin server. When a client sends a packet to an origin server, a router transparently redirects the packet to the proxy server by storing the proxy server address in the destination field and the origin server address in the record route options field. The proxy server sends connection setup requests to the origin server and forwards acknowledgement packets to the client. For other requests, the proxy server determines whether the requested information is stored in the proxy server cache. If so, the information is retrieved from the cache; if not, the information is retrieved from the origin server. All acknowledgement and information packets are sent to the client with the origin server address in the source field, making it appear that the origin server sent the packets.
摘要:
A NAS switch provides extended storage capacity to a file server in a decentralized storage network such as a NAS (Network Attached Storage) storage network. The NAS switch sits in the data path of a client on the front end and a directory file server and shadow file servers on the back end. A segregation module in the NAS switch replicates data from the directory file server to a shadow file server, and then replaces the data in the directory file server with holey files. Holey files, which store a range of consecutive values such as zero with negligible storage space, retain the attributes of the data without retaining its storage consumption. Thus, the directory file server can server as a single directory hierarchy for several shadow file servers containing data beyond a capacity of the directory file server. When the NAS switch receives operations from the client, an association module forwards directory operations to the directory file server and data operations to the shadow file server. The NAS switch also provides services to several shadow file servers from a single directory file server.
摘要:
A preferred embodiment of the present invention includes a method and apparatus for allocating and using IP addresses in a network of client systems. More specifically, the present invention includes a router which monitors the assignments of IP addresses by a DHCP server. As each IP address is assigned, the router associates the assigned IP address with an trusted identifier which identifies the client system. Subsequently, if the router received a packet directed at the assigned IP address, the router forwards the packet to the client system having an trusted identifier associated with the destination address of the IP packet. Additionally, if the router receives a packet from a client system, it uses the trusted identifier of the client system to find IP addresses associated with the client system. If the source address of the IP packet is not included in the IP addresses associated with the client system, the packet is discarded.