End-to-end checksumming for read operations

    公开(公告)号:US07003702B2

    公开(公告)日:2006-02-21

    申请号:US10229685

    申请日:2002-08-28

    IPC分类号: G06F11/00

    CPC分类号: H03M13/096 G06F11/1076

    摘要: Described are techniques used in detection of a data corruption in a computer system in connection with read and write operations. For a write operation, a host issues a write request that includes a checksum value determined in accordance with data associated with the write request. The write request is received by a data storage system that performs data validation using the checksum. The host issues a vendor-defined write request operation that includes the checksum as a data field in the request packet sent to the data storage system. For a read operation, a host issues a read request and the data storage system determines a checksum value before servicing the read request. The checksum is validated at the top of the I/O stack on the host by the file system filter driver.

    Techniques for adjusting priorities associated with servicing requests
    2.
    发明授权
    Techniques for adjusting priorities associated with servicing requests 有权
    调整与服务请求相关联的优先级的技术

    公开(公告)号:US08584128B1

    公开(公告)日:2013-11-12

    申请号:US11900062

    申请日:2007-09-10

    IPC分类号: G06F9/46

    摘要: Described are techniques for servicing data requests in a data storage system. One or more data requests from an application executing on the host are received. The data storage system allocates a first amount of resources for use in servicing data requests from the application. Behavior of the host is monitored for occurrences of I/O failure. In accordance with criteria and the occurrences of I/O failure, it is determined whether at least one of the host or the application is in a state of pending failure. If it is determined that at least one of the host or the application is in a state of pending failure, a second amount of resources larger than the first amount are allocated for a time period when servicing data requests from the application. After the time period, data requests from the application are serviced in accordance with the first amount of resources.

    摘要翻译: 描述了用于维护数据存储系统中的数据请求的技术。 接收来自在主机上执行的应用程序的一个或多个数据请求。 数据存储系统分配用于服务来自应用的数据请求的第一数量的资源。 主机监视I / O故障的发生。 根据标准和I / O故障的发生,确定主机或应用程序中的至少一个是否处于等待故障的状态。 如果确定主机或应用程序中的至少一个处于等待故障的状态,则在服务来自应用的数据请求的时间段内分配大于第一数量的第二数量的资源。 在该时间段之后,根据第一资源量来服务来自应用的数据请求。

    Restricted access devices
    3.
    发明授权
    Restricted access devices 有权
    受限访问设备

    公开(公告)号:US06842810B1

    公开(公告)日:2005-01-11

    申请号:US09982492

    申请日:2001-10-18

    摘要: Described are techniques in connection with restricting access to devices within a computer system. Access to a device may be restricted to one or more particular hosts within the computer system, and also further restricted to a particular software program executing within the particular hosts. The restricted access device (RAD) may be recognized by one or more hosts only having access to specific portions of the RAD unless special RAD I/O opcodes are used in connection with performing I/O operations. Access to a device may be obtained by enabling a particular use of the special RAD I/O opcodes. Subsequently, access to the same device may be disabled by stopping use of the special RAD I/O opcodes by a particular host and/or software executing in the host. RADs may be used in a variety of applications including, for example, restricting access to shared logs or journals and protecting a database.

    摘要翻译: 描述了与限制对计算机系统内的设备的访问有关的技术。 对设备的访问可以限于计算机系统内的一个或多个特定主机,并且还进一步限于在特定主机内执行的特定软件程序。 受限访问设备(RAD)可以被一个或多个仅能访问RAD的特定部分的主机识别,除非在执行I / O操作时使用特殊的RAD I / O操作码。 可以通过使用特殊的RAD I / O操作码来获得对设备的访问。 随后,可以通过由主机中执行的特定主机和/或软件停止使用特殊的RAD I / O操作码来禁用对同一设备的访问。 RAD可以用于各种应用,包括例如限制对共享日志或日志的访问和保护数据库。