会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Logical block replication with deduplication
    • 具有重复数据删除的逻辑块复制
    • US08099571B1
    • 2012-01-17
    • US12187305
    • 2008-08-06
    • Alan S. DriscollDamarugendra MallaiahGaurav MakkarBalaji Rao
    • Alan S. DriscollDamarugendra MallaiahGaurav MakkarBalaji Rao
    • G06F12/00
    • G06F3/0613G06F3/0641G06F3/065G06F3/0689G06F11/2066G06F11/2074
    • Bandwidth consumption between a data replication source and destination and storage consumption at the destination are reduced, when logical block mirroring is used with source deduplication, by eliminating repeated transmission of data blocks from source to destination. A reference is created for each data block at the source, the reference being unique within a storage aggregate of the source. During a mirror update, the source initially sends only the references of modified data blocks to the destination. The destination compares those references against a data structure to determine whether the destination already has any of those data blocks stored. If the destination determines that it already has a data block stored, it does not request or receive that data block again from the source. Only if the destination determines that it has not yet received the referenced data block does it request and receive that data block from the source.
    • 当逻辑块镜像与源重复数据删除一起使用时,通过消除数据块从源到目的地的重复传输,减少了数据复制源和目的地之间的带宽消耗以及目的地的存储消耗。 为源中的每个数据块创建引用,引用在源的存储集合中是唯一的。 在镜像更新期间,源最初只将修改的数据块的引用发送到目的地。 目的地将这些引用与数据结构进行比较,以确定目的地是否已经存储了这些数据块中的任何一个。 如果目的地确定它已经存储了数据块,则它不再从源中请求或接收该数据块。 只有当目的地确定尚未接收到引用的数据块时,它才从源头请求并接收该数据块。
    • 3. 发明授权
    • System and method for hijacking inodes based on replication operations received in an arbitrary order
    • 基于以任意顺序接收的复制操作来劫持inode的系统和方法
    • US08671072B1
    • 2014-03-11
    • US12559483
    • 2009-09-14
    • Devang K. ShahAlan S. Driscoll
    • Devang K. ShahAlan S. Driscoll
    • G06F17/30
    • G06F3/0619G06F3/065G06F3/067G06F17/30174G06F17/30371G06F17/30575
    • A system and method for hijacking inodes based on replication operations received in an arbitrary order is used to assist a data replication operation from a source storage system to a destination storage system. The source storage system generates a set of replication operations as part of a replication process and transmits the replication operations in an arbitrary order. After receiving a replication operation, the system determines whether the operation is inconsistent with a corresponding destination inode. If an inconsistency exists, the system hijacks the destination inode by replacing the destination inode's metadata with data determined based on the replication operation. The system may also delete metadata from the inode and/or initialize metadata to default values if the metadata was not replaced based on the replication operation. The system then waits for a second replication operation that contains the remaining metadata and replaces the metadata based on the second replication operation. In addition, data blocks associated with the previous version of the inode are freed.
    • 使用基于以任意顺序接收的复制操作来劫持inode的系统和方法来辅助从源存储系统到目的地存储系统的数据复制操作。 源存储系统作为复制过程的一部分生成一组复制操作,并以任意顺序发送复制操作。 收到复制操作后,系统确定该操作是否与相应的目的地inode不一致。 如果存在不一致,则系统通过使用基于复制操作确定的数据替换目的地inode的元数据来劫持目的地inode。 如果没有基于复制操作替换元数据,系统还可以从inode中删除元数据和/或将元数据初始化为默认值。 然后,系统等待包含剩余元数据的第二个复制操作,并根据第二次复制操作替换元数据。 此外,与先前版本的inode相关联的数据块将被释放。