摘要:
A storage cloud enabled platform includes storage nodes and application nodes which are the part of the same operating environment. The storage nodes and computation nodes are interconnected inside platform via an interface to provide improved response time and high bandwidth paths for storage applications. The computation nodes may include virtual or non-virtual machines. The interface may support various protocols depending on desired ease of use and response time. For example, a standardized protocol such as SCSI could be used for ease of use and data safety, or a direct data placement protocol could be used to help maximize response rate.
摘要:
Providing access to a host for requested data in a data storage array includes transferring the requested data from a cache memory of the data storage array to either the host or a host adaptor if the requested data is in the cache memory, transferring the requested data from a relatively slow non-volatile memory of the data storage array to the cache memory and subsequently transferring the requested data from the cache memory to either the host or the host adaptor if the requested data is in the relatively slow non-volatile memory and transferring the requested data simultaneously to the cache and to either the host and the host adaptor if the requested data is stored in relatively fast non-volatile memory. Data may be transferred directly from the relatively fast non-volatile memory to the host. The relatively fast non-volatile memory may be controlled by the host adaptor.
摘要:
Described are techniques for processing data operations. A request is sent from an application to perform a data operation on a key-value data store. The request is in accordance with a first application-level protocol for performing the data operation on the key-value data store and includes a first key of a first key-value pair used by a data storage system to perform the data operation. The request is received at the data storage system such as by a key-value server that processes requests in accordance with the first application-level protocol for the key-value data store. In response to receiving the request at the data storage system, first processing is performed on the data storage system for the data operation and a response is returned to the application.
摘要:
Transferring data to an initiator includes providing a first target that exchanges commands and status with the initiator, providing a second target that exchanges commands and data with the first target and exchanges data with the initiator, the initiator providing a transfer command to the first target, the first target providing a transfer command to the second target, and in response to the transfer command received from the first target, the second target transferring data to the initiator. Data may be transferred to the initiator using RDMA. The second target may provide a status message to the first target indicating a result of transferring data. The first target may provide the status message to the initiator. The first target may be a host adaptor of a data storage array. The second target may be a flash memory. The initiator may be a host coupled to the data storage array.