摘要:
A system and method provides a remote direct memory access over a transport medium that does not natively support remote direct memory access operations. An emulated VI module of a storage operating system emulates RDMA operations over such a medium, e.g., conventional Ethernet, thereby enabling storage. Storage appliances in a cluster configuration utilize the non-RDMA compatible transport medium as a cluster interconnect.
摘要:
A system and method enabling transparent access to blocks, such as virtual disks, stored on a storage system using a file-based protocol. The system and method traps in-coming file-based protocol open commands to check for a predetermined modification to the file name. If the system and method detects the predetermined modification, then the virtual disk associated with the file name is exported to the client issuing the open command and the client receives a response from the storage system. The client, in response to receiving the response to the open command, creates a new device instantiation for reading and writing raw data to the virtual disk.
摘要:
A mechanism for reprioritizing high-latency input/output operations in a file system is provided. The mechanism expands a file access protocol, such as the direct access file system protocol, by including a hurry up command that adjusts the latency of a given input/output operation. The hurry up command can be employed in the Direct Access File System.
摘要:
A mechanism for reprioritizing high-latency input/output operations in a file system is provided. The mechanism expands a file access protocol, such as the direct access file system protocol, by including a hurry up command that adjusts the latency of a given input/output operation. The hurry up command can be employed in the Direct Access File System.
摘要:
A system and method enabling transparent access to blocks, such as virtual disks, stored on a storage system using a file-based protocol. The system and method traps incoming file-based protocol open commands to check for a predetermined modification to the file name. If the system and method detects the predetermined modification, then the virtual disk associated with the file name is exported to the client issuing the open command and the client receives a response from the storage system. The client, in response to receiving the response to the open command, creates a new device instantiation for reading and writing raw data to the virtual disk.
摘要:
Various systems and methods are described for configuring a data storage system. In one embodiment, a plurality of actual capacities of a plurality of storage devices of the data storage system are identified and divided into a plurality of capacity slices. The plurality of capacity slices are combined into a plurality of chunks of capacity slices, each having a combination of characteristics of the underlying physical storage devices. The chunks of capacity slices are then mapped to a plurality of logical storage devices. A group of the plurality of logical storage devices is then organized into a redundant array of logical storage devices.
摘要:
Techniques for opportunistic data storage are described. In one embodiment, for example, an apparatus may comprise a data storage device and a storage management module, and the storage management module may be operative to receive a request to store a set of data in the data storage device, the request indicating that the set of data is to be stored with opportunistic retention, the storage management module to select, based on allocation information, storage locations of the data storage device for opportunistic storage of the set of data and write the set of data to the selected storage locations. Other embodiments are described and claimed.
摘要:
The data path in a network storage system is streamlined by sharing a memory among multiple functional modules (e.g., N-module and D-module) of a storage server that facilitates symmetric access to data from multiple clients. The shared memory stores data from clients or storage devices to facilitate communication of data between clients and storage devices and/or between functional modules, and reduces redundant copies necessary for data transport. It reduces latency and improves throughput efficiencies by minimizing data copies and using hardware assisted mechanisms such as DMA directly from host bus adapters over an interconnection, e.g. switched PCI-e “network”. This scheme is well suited for a “SAN array” architecture, but also can be applied to NAS protocols or in a unified protocol-agnostic storage system. The storage system can provide a range of configurations ranging from dual module to many modules with redundant switched fabrics for I/O, CPU, memory, and disk connectivity.
摘要:
A system and method efficiently generates a set of parallel persistent consistency point images (PCPIs) of volumes configured as a SVS and served by a plurality of nodes interconnected as a cluster. A volume operations daemon (VOD) executing on a node of the cluster is configured to manage generation of the volume PCPIs. Notably, the set of PCPIs is generated substantially in parallel to thereby obtain a consistent and accurate point in time reference of the entire SVS.
摘要:
A network storage system includes “raw” flash memory, and storage of data in that flash memory is controlled by an external, log structured, write out-of-place data layout engine of a storage server. By avoiding a separate, onboard data layout engine on the flash devices, the latency associated with operation of such a data layout engine is also avoided. The flash memory can be used as the main persistent storage of a storage server and/or as buffer cache of a storage server, or both. The flash memory can be accessible to multiple storage servers in a storage cluster. To reduce variability in read latency, each flash device provides its status (“busy” or not) to the data layout engine. The data layout engine uses RAID data reconstruction to avoid having to read from a busy flash device.