摘要:
Extensions to a database system provide linkage between data in the database system and files in a system for filing data which is external to the database system ("the filing system"). The linkage includes an external file reference (efr) data type which is defined in the database system for reference to files that are stored in the filing system. When entries are made in the database system that include efr data-type references to files in the filing system, control information is provided by the database system to the filing system. The control information causes the filing system to control processing of referenced files according to referential constraints established in the database system.
摘要:
Provided are a method, system, and article of manufacture for applying a policy criteria to files in a backup image. A backup image of files in a file system is maintained. A policy is applied to the files in the backup image to determine files satisfying a policy criteria. A list is prepared indicating the determined files. The determined files in the file system are accessed and a deferred operation indicated in the applied policy is applied to the accessed files in the file system.
摘要:
“A system and associated method restore a file system from incremental backups in the presence of deletion, without restoring deleted files. This is accomplished by logging deletions in a deletion log. Using the deletion log, the system re-deletes the deleted files upon a restore operation to an incremental backup epoch. The system the logs deletions so that the files that were deleted and survived a backup epoch have their records logged. The activity log enables an incremental backup from a prior snapshot, and represents a point-in-time version of the file system. The system can either not restore the deleted files, or, alternatively, it can restore the deleted files and then re-deletes them.”
摘要:
A data storage system randomly determines a start offset at which to write objects to a storage medium. For updated blocks of the object, e.g., for blocks written during copy-on-write as part of a point-in-time snapshot, the updated block is written in the region of the original file or as close thereto as possible to achieve “virtual contiguity”. Subsequent reads of the object read entire region containing both the object and, potentially, “chaff” data other than the object. The “chaff” data is discarded by the I/O system or file system using, e.g., a bit mask, subsequent to the read.
摘要:
In a distributed file system the distributed storage management is made useful to a variety of applications. Multiple quality of service options are provided through locking. Three locking systems are provided. The system offers a locking system designed for sequential consistency with write-back caching, typical of distributed file systems. A second locking system is provided for sequential consistency with no caching for applications that manage their own caches. Finally, a locking system that implements a weaker consistency model with write-back caching, designed for efficient replication and distribution of data is included. Locks for replication are suitable for serving dynamic data on the Internet and other highly-concurrent applications. The selection of the appropriate lock protocol for each file is set using the file metadata. Further, a novel locking system is provided for the lock system implementing a weak consistency model with write back caching. This system is implemented utilizing two whole file locks: a producer lock P and a consumer lock C. Any client can hold a consumer lock and when holding a consumer lock can read data and cache data for read. The producer lock is only held by a single writer and a writer holding a producer lock can write data, allocate and cache data for writing. When a writer performs a write, the write is performed as an out-of-place write. An out-of-place write writes the data to a different physical storage location than from which it was read. By performing an out-of-place write the old data still exists and is available to clients. Once the writer completes the write and releases the producer lock the previous data is invalidated and the clients are informed of the new location of the data. Clients can then read the new data from storage when needed and the server reclaims the old data blocks.
摘要:
A system and method for managing access to assets in a distributed data storage system includes requesting, from a client computer, a lock from a server computer. The lock is evaluated using a bitwise comparison of the protected access modes and restricted access modes defined by the lock with the protected and restricted modes defined by the currently outstanding locks using an algorithm, such that a potentially large compatibility table is not needed.
摘要:
A system and method for managing access to assets in a distributed data storage system includes requesting, from a client computer, a semi-preemptible access lock from a server computer. The semi-preemptible lock, if granted, is held by the client computer as long as the server does not demand it back, with the client computer granting open instances under non-preemptible file locks for the asset to which the locks pertain as long as the client computer holds the semi-preemptible lock. When another client computer requests the semi-preemptible lock, the server can demand the lock from the holding client, which relinquishes the lock if no open instances are protected by the lock. Otherwise, the holding client computer first attempts to downgrade its lock to meet the request, and if compatibility is not achieved thereby, the holding client refuses to relinquish the lock.
摘要:
Provided are a method, system, and article of manufacture for applying a policy criteria to files in a backup image. A backup image of files in a file system is maintained. A policy is applied to the files in the backup image to determine files satisfying a policy criteria. A list is prepared indicating the determined files. The determined files in the file system are accessed and a deferred operation indicated in the applied policy is applied to the accessed files in the file system.
摘要:
Digital data objects containing unused space are reconfigured to facilitate more efficient compression of the data objects. First, a determination is made whether the data object contains regions of unused storage space. Such space may represent deleted files, corrupted data, expired data, etc. If regions of unused storage space exist, they are replaced with a predetermined bit pattern. This bit pattern is specifically chosen so that, if provided as input to a predetermined digital data compression process, it would be compressed with a predetermined predicted compression efficiency. For example, the bit pattern may comprise a repeating sequence of binary zeros, which is optimally compressed by most known compression processes. After reconfiguration of the data object, the data object may be provided as input to the compression process and compressed.
摘要:
An apparatus, system, and method are disclosed for managing storage space allocation. The apparatus includes a recognizing module, a reserving module, and a managing module. The recognizing module recognizes a trigger event at a client of the data storage system. The reserving module reserves logical units of space for data storage. The management module manages the logical units of space at the client. Such an arrangement provides for distributed management of storage space allocation within a storage area network (SAN). Facilitating client management of the logical units of space in this manner may reduce the number of required metadata transactions between the client and a metadata server and may increase performance of the SAN file system. Reducing metadata transactions effectively lowers network overhead, while increasing data throughput.