-
公开(公告)号:US20180314570A1
公开(公告)日:2018-11-01
申请号:US15770845
申请日:2016-03-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Jonathan Stewart , Roopesh Kumar Tamma
Abstract: Examples include transaction management for a multi-node cluster. Some examples include generating a request log entry at an owner node that identifies a duplicate data location, tagging the duplicate data location with a requested tag, and issuing a zero-copy request that identifies the duplicate data location. In some such examples, a service node may generate a service log entry based on the zero-copy request that identifies the duplicate data location, process the zero-copy request, and tag the duplicate data location with a serviced tag. A determination may be made as to whether at least one of the owner node and the service node have failed and based on the determination that at least one has failed, the failed node may be recovered via at least one of the requested tag and the serviced tag of the duplicate data location.
-
公开(公告)号:US10929431B2
公开(公告)日:2021-02-23
申请号:US15547710
申请日:2015-08-28
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Mark Doherty , Siamak Nazari , Jin Wang , Srinivasa D. Murthy , Paul Kinnaird , Pierre Labat , Jonathan Stewart
IPC: G06F16/27 , G06F11/14 , G06F11/16 , G06F11/20 , G06F12/0875 , G06F3/06 , G06F12/0815
Abstract: Methods and systems for collision handling during an asynchronous replication are provided. A system includes a cache memory system comprising a number of cache memory pages. A collision detector detects when a host is attempting to overwrite a cache memory page that has not been completely replicated. A revision page tagger copies the cache memory page to a free page and tags the copied page as protected.
-
公开(公告)号:US10783021B2
公开(公告)日:2020-09-22
申请号:US15770845
申请日:2016-03-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Jonathan Stewart , Roopesh Kumar Tamma
Abstract: Examples include transaction management for a multi-node cluster. Some examples include generating a request log entry at an owner node that identifies a duplicate data location, tagging the duplicate data location with a requested tag, and issuing a zero-copy request that identifies the duplicate data location. In some such examples, a service node may generate a service log entry based on the zero-copy request that identifies the duplicate data location, process the zero-copy request, and tag the duplicate data location with a serviced tag. A determination may be made as to whether at least one of the owner node and the service node have failed and based on the determination that at least one has failed, the failed node may be recovered via at least one of the requested tag and the serviced tag of the duplicate data location.
-
公开(公告)号:US10417202B2
公开(公告)日:2019-09-17
申请号:US15387603
申请日:2016-12-21
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D. Murthy , Roopesh Kumar Tamma
IPC: G06F17/30 , G06F16/215 , G06F16/22 , G06F16/23 , G06F3/06
Abstract: An example storage system may include storage media and a storage controller. The storage controller may be to establish virtual volumes, private data stores, and a deduplication data store, each being a virtual storage space of the storage media, wherein each of the private data stores is associated with one of the virtual volumes and the deduplication data store is shared among the virtual volumes. The storage controller may, in response to receiving input data that is to be stored in a given one of the virtual volumes, determine a signature for the input data and select between storing the input data in the private data store associated with the given one of the virtual volumes and storing the input data in the deduplication data store. The storage controller may select where to store the input data based on whether a metadata storage location addressed by a first portion of the signature includes valid metadata, and, if so: whether the metadata includes a back-pointer to one of the virtual volumes, and whether a second portion of the signature matches a key included in the metadata.
-
公开(公告)号:US10140174B2
公开(公告)日:2018-11-27
申请号:US14914713
申请日:2013-08-29
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Siamak Nazari , Jin Wang , Srinivasa D Murthy , Ming Ma
Abstract: Disclosed herein are a system, non-transitory computer-readable medium, and method for maintaining storage unit transaction logs. Storage unit transaction logs received from controllers are separated.
-
公开(公告)号:US09946660B2
公开(公告)日:2018-04-17
申请号:US15223754
申请日:2016-07-29
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Shankar Iyer , Siamak Nazari , Srinivasa D Murthy , Jin Wang
IPC: G06F12/10 , G06F12/1009 , G06F12/1027 , G06F12/02
CPC classification number: G06F12/1009 , G06F12/023 , G06F12/0246 , G06F12/1027 , G06F2212/1044 , G06F2212/65 , G06F2212/68
Abstract: Examples include a device for memory space management. Some examples include receiving, from a host, a space management request that identifies a virtual page address. The virtual page address may be associated with a compressed page that includes a compression metadata having a reference count that indicates a number of virtual pages of data in the compressed page. The virtual page table entry associated with the virtual page address in a virtual page table may be looked up. The virtual page table entry may identify the compressed page. In such examples, the virtual page table entry may be marked as invalid without updating the reference count in the compressed page. A determination may be made as to whether each virtual page table entry that identifies the compressed page is marked invalid. Based on the determination that each virtual page table entry that identifies the compressed page is invalid, a free space bitmap entry for the compressed page may be updated to indicate that the compressed page is free.
-
公开(公告)号:US20170322878A1
公开(公告)日:2017-11-09
申请号:US15519921
申请日:2014-10-28
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Siamak Nazari , Srinivasa D. Murthy
CPC classification number: G06F12/0253 , G06F11/1004 , G06F11/1076
Abstract: Examples to determine an unreferenced page in a deduplication store are disclosed. In one example implementation according to aspects of the present disclosure, a cyclic redundancy check (CRC) value is calculated for a received garbage collection data request for data on a client volume. The CRC value is translated into a physical page location in a deduplication store for the client volume using a three-level table scheme. It is then determined whether a physical page in the deduplication store is unreferenced.
-
公开(公告)号:US10452274B2
公开(公告)日:2019-10-22
申请号:US15305156
申请日:2014-04-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Siamak Nazari , Srinivasa D Murthy , Jin Wang , Ming Ma
IPC: G06F3/00 , G06F3/06 , G06F12/0875 , G06F12/0866 , G06F11/34 , G06F13/38
Abstract: Example implementations relate to determining lengths of acknowledgment delays for input/output (I/O) commands. In example implementations, a length of an acknowledgment delay for a respective I/O command may be based on cache availability, and activity level of a drive at which the respective I/O command is directed, after the respective I/O command has been executed. Acknowledgments for respective I/O commands may be transmitted after respective periods of time equal to respective lengths of acknowledgment delays have elapsed.
-
公开(公告)号:US10241708B2
公开(公告)日:2019-03-26
申请号:US15514075
申请日:2014-09-25
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Siamak Nazari , Roopesh Kumar Tamma , Srinivasa D Murthy
Abstract: Example implementations relate to data chunk storage. For example, an implementation includes an apparatus that includes a processor. The processor is to receive a first data chunk from a source device and to generate a first fingerprint of the first data chunk. In response to a determination that the first fingerprint matches a second fingerprint of a second data chunk, the processor is to select a storage pool from a plurality of storage pools at a storage device to store the first data chunk based on the first data chunk and based on the second data chunk. The plurality of storage pools includes a first storage pool associated with first particular data chunks with non-colliding fingerprints and a second storage pool associated with second particular data chunks with colliding fingerprints.
-
公开(公告)号:US10168937B2
公开(公告)日:2019-01-01
申请号:US15513081
申请日:2014-09-25
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jin Wang , Roopesh Kumar Tamma , Siamak Nazari , Srinivasa D Murthy
IPC: G06F3/06
Abstract: Example implementations relate to storage space allocation. For example, an implementation includes an apparatus including a controller. The controller is to receive an allocation request from a host computing device. The controller is also to reserve a portion of storage space in the storage device via a reservation table based on the allocation request. The controller is further to determine a type of the allocation request. The type of the allocation request includes a space-optimized allocation request and a non-space-optimized allocation request. When the type of the allocation request corresponds to the non-space-optimized allocation request, the controller is to commit the portion of storage space via an allocation table. When the type of the allocation request corresponds to the space-optimized allocation request, the controller is to release the portion of storage space via the reservation table.
-
-
-
-
-
-
-
-
-