Log-structured storage for data access

    公开(公告)号:US11210220B2

    公开(公告)日:2021-12-28

    申请号:US16226466

    申请日:2018-12-19

    Abstract: A data manager may include a data opaque interface configured to provide, to an arbitrarily selected page-oriented access method, interface access to page data storage that includes latch-free access to the page data storage. In another aspect, a swap operation may be initiated, of a portion of a first page in cache layer storage to a location in secondary storage, based on initiating a prepending of a partial swap delta record to a page state associated with the first page, the partial swap delta record including a main memory address indicating a storage location of a flush delta record that indicates a location in secondary storage of a missing part of the first page. In another aspect, a page manager may initiate a flush operation of a first page in cache layer storage to a location in secondary storage, based on atomic operations with flush delta records.

    Load aware resource allocation in wireless networks
    3.
    发明授权
    Load aware resource allocation in wireless networks 有权
    无线网络中负载感知资源分配

    公开(公告)号:US09072098B2

    公开(公告)日:2015-06-30

    申请号:US13773825

    申请日:2013-02-22

    Abstract: A technique for resource allocation in a wireless network (for example, an access point type wireless network), which supports concurrent communication on a band of channels, is provided. The technique includes accepting connectivity information for the network that supports concurrent communication on the band of channels. A conflict graph is generated from the connectivity information. The generated conflict graph models concurrent communication on the band of channels. A linear programming approach, which incorporates information form the conflict graph and rate requirements for nodes of the network, can be utilized to maximize throughput of the network.

    Abstract translation: 提供了一种支持在频带上并发通信的无线网络(例如,接入点型无线网络)中的资源分配技术。 该技术包括接收支持在频带上并发通信的网络的连接信息。 从连接信息生成冲突图。 生成的冲突图形模拟了频道上的并发通信。 可以利用线性规划方法,其中包含形成网络节点的冲突图和速率要求的信息,以最大化网络的吞吐量。

    Low RAM space, high-throughput persistent key value store using secondary memory

    公开(公告)号:US11036799B2

    公开(公告)日:2021-06-15

    申请号:US16785587

    申请日:2020-02-08

    Abstract: Described is using flash memory (or other secondary storage), RAM-based data structures and mechanisms to access key-value pairs stored in the flash memory using only a low RAM space footprint. A mapping (e.g. hash) function maps key-value pairs to a slot in a RAM-based index. The slot includes a pointer that points to a bucket of records on flash memory that each had keys that mapped to the slot. The bucket of records is arranged as a linear-chained linked list, e.g., with pointers from the most-recently written record to the earliest written record. Also described are compacting non-contiguous records of a bucket onto a single flash page, and garbage collection. Still further described is load balancing to reduce variation in bucket sizes, using a bloom filter per slot to avoid unnecessary searching, and splitting a slot into sub-slots.

    Chunk storage deduplication using graph structures

    公开(公告)号:US10210170B2

    公开(公告)日:2019-02-19

    申请号:US15418704

    申请日:2017-01-28

    Abstract: Deduplication is integrated with software building and chunk storing. A dedup module includes dedup software, a build graph interface, and a chunk store interface. A dedup graph includes a portion of the build graph, and a portion that represents build artifact file chunks. The dedup software queries whether chunks are present in the chunk store, submits a chunk for storage when the chunk is not already present, and avoids submitting the chunk when it is present. Queries may use hash comparisons, a hash tree dedup graph, chunk expiration dates, content addressable chunk store memory, inference of a child node's presence, recursion, and a local cache of node hashes and node expiration dates, for example. A change caused by the build impacts fewer dedup graph nodes than directory graph nodes, resulting in fewer storage operations to update the chunk storage with new or changed build artifacts.

    Congestion control for delay sensitive applications

    公开(公告)号:US09485184B2

    公开(公告)日:2016-11-01

    申请号:US13917441

    申请日:2013-06-13

    CPC classification number: H04L47/25 H04L47/22 H04L47/2416 H04L47/29 H04L47/30

    Abstract: In various embodiments, methods and systems are disclosed for a hybrid rate plus window based congestion protocol that controls the rate of packet transmission into the network and provides low queuing delay, practically zero packet loss, fair allocation of network resources amongst multiple flows, and full link utilization. In one embodiment, a congestion window may be used to control the maximum number of outstanding bits, a transmission rate may be used to control the rate of packets entering the network (packet pacing), a queuing delay based rate update may be used to control queuing delay within tolerated bounds and minimize packet loss, and aggressive ramp-up/graceful back-off may be used to fully utilize the link capacity and additive-increase, multiplicative-decrease (AIMD) rate control may be used to provide fairness amongst multiple flows.

    LOG-STRUCTURED STORAGE FOR DATA ACCESS
    7.
    发明申请

    公开(公告)号:US20190146917A1

    公开(公告)日:2019-05-16

    申请号:US16226466

    申请日:2018-12-19

    Abstract: A data manager may include a data opaque interface configured to provide, to an arbitrarily selected page-oriented access method, interface access to page data storage that includes latch-free access to the page data storage. In another aspect, a swap operation may be initiated, of a portion of a first page in cache layer storage to a location in secondary storage, based on initiating a prepending of a partial swap delta record to a page state associated with the first page, the partial swap delta record including a main memory address indicating a storage location of a flush delta record that indicates a location in secondary storage of a missing part of the first page. In another aspect, a page manager may initiate a flush operation of a first page in cache layer storage to a location in secondary storage, based on atomic operations with flush delta records.

    Log-structured storage for data access

    公开(公告)号:US10216629B2

    公开(公告)日:2019-02-26

    申请号:US15372381

    申请日:2016-12-07

    Abstract: A data manager may include a data opaque interface configured to provide, to an arbitrarily selected page-oriented access method, interface access to page data storage that includes latch-free access to the page data storage. In another aspect, a swap operation may be initiated, of a portion of a first page in cache layer storage to a location in secondary storage, based on initiating a prepending of a partial swap delta record to a page state associated with the first page, the partial swap delta record including a main memory address indicating a storage location of a flush delta record that indicates a location in secondary storage of a missing part of the first page. In another aspect, a page manager may initiate a flush operation of a first page in cache layer storage to a location in secondary storage, based on atomic operations with flush delta records.

    Integrated data deduplication and encryption
    10.
    发明授权
    Integrated data deduplication and encryption 有权
    集成重复数据删除和加密

    公开(公告)号:US09495552B2

    公开(公告)日:2016-11-15

    申请号:US13731746

    申请日:2012-12-31

    CPC classification number: G06F21/6218 G06F2221/2107 H04L63/0428

    Abstract: The subject disclosure is directed towards encryption and deduplication integration between computing devices and a network resource. Files are partitioned into data blocks and deduplicated via removal of duplicate data blocks. Using multiple cryptographic keys, each data block is encrypted and stored at the network resource but can only be decrypted by an authorized user, such as domain entity having an appropriate deduplication domain-based cryptographic key. Another cryptographic key referred to as a content-derived cryptographic key ensures that duplicate data blocks encrypt to substantially equivalent encrypted data.

    Abstract translation: 主题公开涉及计算设备和网络资源之间的加密和重复数据删除集成。 文件被分割成数据块,并通过删除重复的数据块进行重复数据删除。 使用多个加密密钥,每个数据块被加密并存储在网络资源中,但是只能由授权用户(例如具有适当的重复数据删除域密码密钥的域实体)进行解密。 被称为内容导出加密密钥的另一密码密钥确保重复的数据块加密到基本相等的加密数据。

Patent Agency Ranking