摘要:
Doors are implemented in an existing operating system by using a novel adaptation of existing data structures and procedures which represent and control data files of the operating system. A door is represented by a file descriptor and is managed by existing mechanisms of an operating system, such as the Unix operating system, which are also used to manage files. A door is represented by a door node, which is a novel extension of the conventional vnode structure which in turn is used in conventional operating systems to represent the state of a computer resource, e.g., a data file. A door node is adapted such that most conventional file access and control procedures, e.g., procedures open( ) and close( ), can be used to access and control door with minimal adaptation. A door node is formed by appending fields which are specific to a door node's representation of the state of a door to fields of the door node which are analogous to the fields of a vnode, which represents the state of a resource and which has a conventional structure. Thus, the fields of a door node which precede the fields specific to the representation of the state of a door are of the size, location, and format of analogous fields in a conventional vnode. A client process obtains a file descriptor which identifies a door by supplying the name of the door to the operating system.
摘要:
A devtmp device driver provides the functionality of temporary files by representing a virtual device and including the virtual device among several devices within which a file system can store files. Rather than storing data in and retrieving data from a physical device, the devtmp device driver stores data in and retrieves data from anonymous storage through a swap file system which manages anonymous storage for a virtual memory system. A file system uses the devtmp device driver in the same manner the file system uses conventional device drivers which store data in and retrieve data from secondary storage devices. Since the devtmp device driver represents a virtual device whose data are stored in anonymous storage managed by the swap file system, the total amount of storage available for storing data of temporary files is shared among the various components of a computer process to successfully satisfy various needs of various computer processes. Temporary files can be accessed through a main file system, e.g., the UNIX file system, using a delayed-write-mode. In the delayed-write mode, the file system does not write metadata of a device to secondary storage and writes substantive data of files stored on the device only when insufficient primary storage is available to store the substantive data. Accordingly, temporary files are stored in primary storage so long as primary storage is available for such temporary files and are stored in, or moved to, secondary storage when primary storage is unavailable.
摘要:
A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.
摘要:
Methods and systems for mapping data-management requirements to the provisioning of a data storage system to conform to a set of user-defined data-management policies. A conformance engine with storage system awareness translates the set of data-management policies to a corresponding set of storage-provisioning policies and provisions the resources of the storage system thereby to conform the storage system to the data-management policies. A conformance checker continuously and automatically compares the provisioning of the storage system resources to the provisioning required to meet the data-management policies. When nonconformance is detected, the conformance engine automatically re-provisions the available resources of the storage system to conform the storage system to the data management policies.
摘要:
A system for managing configuration of a storage network having multiple storage resources is disclosed. The system uses a storage management policy to set parameters for detecting storage resource problems in the storage network. The system monitors the storage resources in the storage network based on the storage management policy. Based on the monitoring, the system detects limited storage resource conditions, and identifies one or more potential solutions to the condition. After identifying potential solutions, the system simulates effects on the storage resources of implementing individual solutions. Based on the simulations, the system then implements one or more selected solutions. These solutions may be selected automatically or by a user.
摘要:
In a technique for compressing data, a data storage server receives a set of data, which includes a first number of subsets. The storage server defines a number of compression groups for the set of data, each compression group including multiple entries, each entry containing a pointer to a different subset of the set of data. At least part of the set of data is then compressed into a smaller number of subsets. For each of the subsets which does not contain compressed data after the compression, a predetermined value is stored in the corresponding entry of the corresponding compression group, to indicate that corresponding data is compressed and represented elsewhere in the compression group. The predetermined value may also indicate which compression algorithm was used to compress the data.