Data storage resource allocation list updating for data storage operations

Information

  • Patent Grant
  • 10768987
  • Patent Number
    10,768,987
  • Date Filed
    Thursday, June 14, 2018
    6 years ago
  • Date Issued
    Tuesday, September 8, 2020
    4 years ago
Abstract
A system and method to perform data management operations in a data management system assigns the data management request to one or more available data management resources. If the data management request fails, at least one data management resource at least partially responsible for the failure is determined, as is a category associated with the one data management resource at least partially responsible for the failure. Other data management requests are identified in a list of data management requests that request data management resources having the same category and the list of data management requests is updated to indicate that the data management system should not perform the other identified data management requests.
Description
BACKGROUND

Systems used to perform data storage operations of electronic data are growing in complexity. However, current systems may not be able to accommodate increased data storage demands or efficient and timely restore operations. Often, these systems are required to store large amounts of data (e.g. all of a company's data files) during a time period known as a “storage window.” The storage window defines a duration and actual time period when the system may perform storage operations. For example, a storage window may be for twelve hours, between 6 PM and 6 AM (that is, twelve non-business hours). Often, storage windows are rigid and unable to be modified. Therefore, when data storage systems attempt to store increasing data loads, they may need to do so without increasing the time in which they operate. Additionally, many systems perform daily stores, which may add further reliance on completing storage operations during allotted storage windows.


Moreover, each data storage operation requires multiple resources, such as access to a tape drive, allocation of a stream for that tape drive, an available tape on which to store data, a media agent computer to process and monitor the request, and so forth. Given multiple data storage requests and multiple resources, with each request requiring different resources for different periods of time, optimizing allocation of these resources can be a very complex operation as the number of requests and resources grow. Processor time can grow exponentially as the requests and resources grow.


Multidimensional resource allocation is an inherently complex problem to solve. As noted above, a number of disparate resources need to be available to satisfy a single request, such as available media, a compatible drive from a pool of drives, etc. Also, additional constraints must be satisfied, such as a load factor on a computer writing the data, a number of allowed agents or writers to a target media (e.g., disk or tape), etc.


Rules of resource allocation further complicate the problem. For example, rules may be established regarding failover such that when a given drive fails, the system can substitute in another drive. Likewise, rules may be established for load balancing so as not to overtax a given drive, but to spread the burden over a pool of drives. If a primary resource candidate is not available, then the system may allocate resources from an alternate resource pool, which may or may not be satisfactory. Time delay factors arise when alternatives are considered.


Furthermore, resource requests arrive in a random order; however, each incoming request has either a pre-assigned or dynamically changing priority. Furthermore, resources are freed up in a random order and may be associated with lower priority requests. A multiple set matching algorithm is not possible in such a complex environment.


In order to make a best match, a sorted list of requests is often maintained. This queue of requests is then walked and resources allocated to higher priority requests first before lower priority requests can be honored. The matching process for each request is very time consuming given the number of resources that must be made available for each job.


Prior systems have attempted to ameliorate these problems by reducing the number of variables and thereby reducing the complexity of such optimizations of resource allocations. Other systems have employed dedicated resources, often for higher priority requests. However, when those resources become freed up, they sit idle until other requests dedicated to those resources arrive. Other systems have solved this complexity problem by simply reducing the number of requests and creating smaller units of resources. This fragments a system, and can be inefficient.


Requests in a data management system often ultimately fail. For example, a required resource may be down or in short supply. Unfortunately, the data management system has often committed significant resources in the resource allocation process before the request fails. For example, the data management system may spend precious time gathering other resources or data only to discover that the tape drive to which the data should be copied is not available. This causes the data management system to waste time that reduces the amount of productive work that the system can perform during the storage window.


The foregoing examples of some existing limitations are intended to be illustrative and not exclusive. Other limitations will become apparent to those of skill in the art upon a reading of the Detailed Description below. These and other problems exist with respect to data storage management systems.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1A is a block diagram illustrating an example of components used in data storage operations.



FIG. 1B is a block diagram illustrating an alternative example of components used in data storage operations.



FIG. 1C is a block diagram illustrating an alternative example of components used in data storage operations.



FIG. 2 is a block diagram illustrating an example of a data storage system.



FIG. 3 is a block diagram illustrating an example of components of a server used in data storage operations.



FIG. 4 is a flow diagram illustrating an example optimize requests routine.



FIG. 5 is a flow diagram illustrating an example handle requests routine.



FIG. 6 is a flow diagram illustrating an example build grid routine.



FIG. 7 is a block diagram illustrating an example environment in which a grid store may be applied.





In the drawings, the same reference numbers and acronyms identify elements or acts with the same or similar functionality for ease of understanding and convenience. To easily identify the discussion of any particular element or act, the most significant digit or digits in a reference number refer to the Figure number in which that element is first introduced (e.g., element 420 is first introduced and discussed with respect to FIG. 4).


The headings provided herein are for convenience only and do not necessarily effect the scope or meaning of the claimed invention.


DETAILED DESCRIPTION

Described in detail herein is a resource allocation system that may employ one or more resource optimization subsystems or routines, which may be used individually or collectively to provide resource allocation in a data storage management environment. The system helps match resources in a multidimensional data storage management environment in a more efficient fashion, which permits highly scalable systems. As systems grow, a queue of jobs grows. For example, a queue may include thousands of data storage jobs, where each job is associated with multiple resource requests. Improving the allocation of resources enables more jobs to be performed within a particular time window, such as overnight or during off-peak hours for a business.


In some embodiments, the resource allocation system begins with an ordered plan for matching requests to resources that is sorted by priority. The initial priority scheme may be determined in a variety of ways. For example, an administrator may determine which items are most important and give those items a higher priority. As another example, the system may prioritize requests according to geographic or network routing, such as by establishing a preference for satisfying a request with the closest computer to a computer holding data for a request. The resource allocation system attempts to respect the input priority, and will prefer to complete higher priority requests before lower priority requests. The initial ordered plan forms a starting point that the system can refine by each of the methods described herein.


The resource allocation system uses three primary methods for matching resources to requests that are described in further detail in the following sections: Preordered/Intelligent Resource Checks, Category Blacklisting, and Resource Holding Area. The Dynamic Routing/Allocation section below describes additional techniques for matching requests to resources.


One resource optimization routine employs abbreviated pre-ordered matching where only a subset of resources are checked in a pre-ordered fashion. For example, physical resources such as drives are in short supply so checks of these resources are quick given their small numbers, and their tendency to more frequently fail. Thus, physical checks are done first, then logical checks performed later, so that when a physical resource fails, it saves the system time it may have spent checking longer lists of logical resources. If a request fails based on a check of this shortened list, then the system moves to the next request in a queue.


As the requests for individual resources grow into the thousands or tens of thousands, and the number of resources grows to the hundreds, even an abbreviated matching list can consume considerable processing cycles. Therefore, a second resource optimization routine, category blacklisting, provides further efficiencies and scale to a queue of potentially thousands of jobs with their associated resource requests by assigning requests with a category code, such as a storage policy. All resource requests having the same category code are associated with the same set of resource requests and rules that govern how to allocate those resources. Once a request is denied, the entire category is blacklisted or otherwise excluded from future resource allocation requests. Thus, subsequent requests in the same category may not even matched or analyzed by the system based on a blacklisting flag associated with that request.


A third resource optimization routine employs a temporary holding area for released resources to preserve priorities. Since resources are released back into a pool of available resources at random times, the problem arises that a request having a lower priority will receive that resource ahead of a request having a higher priority. To overcome this shortcoming, released resources are held in a temporary holding area. When the resource allocation system loops back to the top of the queue (i.e., to those unfulfilled requests having the highest priority), the newly available resources from the temporary holding area are added back to the general pool of available resources. This helps insure that requests having higher priority will have access to any released resources before lower priority requests.


Various examples of the system will now be described. The following description provides specific details for a thorough understanding and enabling description of these examples. One skilled in the art will understand, however, that the system may be practiced without many of these details. Additionally, some well-known structures or functions may not be shown or described in detail, so as to avoid unnecessarily obscuring the relevant description of the various examples.


The terminology used in the description presented below is intended to be interpreted in its broadest reasonable manner, even though it is being used in conjunction with a detailed description of certain specific examples of the system. Certain terms may even be emphasized below; however, any terminology intended to be interpreted in any restricted manner will be overtly and specifically defined as such in this Detailed Description section.


Suitable System


Referring to FIG. 1A, a block diagram illustrating components of a data stream is shown. The stream 110 may include a client 111, a media agent 112, and a secondary storage device 113. For example, in storage operations, the system may store, receive and/or prepare data to be stored, copied or backed up at a server or client 111. The system may then transfer the data to be stored to media agent 112, which may then refer to storage policies, schedule policies, and/retention policies (and other policies), and then choose a secondary storage device 113 for storage of the data. Secondary storage devices may be magnetic tapes, optical disks, USB and other similar media, disk and tape drives, and so on.


Referring to FIG. 1B, a block diagram illustrating components of multiple selectable data streams is shown. Client 111 and any one of multiple media agents 112 may form a stream 110. For example, one stream may contain client 111, media agent 121, and storage device 131, while a second stream may use media agent 125, storage device 133, and the same client 111. Additionally, media agents may contain additional subpaths 123, 124 that may increase the number of possible streams for client 111. Examples of subpaths 123, 124 include host bus adapter (HBA) cards, Fibre Channel cards, SCSI cards, and so on. Thus, the system is able to stream data from client 111 to multiple secondary storage devices 113 via multiple media agents 112 using multiple streams.


Referring to FIG. 1C, a block diagram illustrating components of alternative multiple selectable data streams is shown. In this example, the system may transfer data from multiple media agents 151, 152 to the same storage device 113. For example, one stream may be from client 141, to media agent 151, to secondary storage device 113, and a second stream may be from client 142, to media agent 152, to secondary storage device 113. Thus, the system is able to copy data to one secondary storage device 113 using multiple streams 110.


Additionally, the system may stream from one client to two media agents and to one storage device. Of course, the system may employ other configurations of stream components not shown in the Figures.


Referring to FIG. 2, a block diagram illustrating an example of a data storage system 200 is shown. Data storage systems may contain some or all of the following components, depending on the needs of the system.


For example, the data storage system 200 contains a storage manager 210, one or more clients 111, one or more media agents 112, and one or more storage devices 113. Storage manager 210 controls media agents 112, which may be responsible for transferring data to storage devices 113. Storage manager 210 includes a jobs agent 211, a management agent 212, a database 213, and/or an interface module 214. Storage manager 210 communicates with client(s) 111. One or more clients 111 may access data to be stored by the system from database 222 via a data agent 221. The system uses media agents 112, which contain databases 231, to transfer and store data into storage devices 113. Client databases 222 may contain data files and other information, while media agent databases may contain indices and other data structures that assist and implement the storage of data into secondary storage devices, for example.


The data storage system may include software and/or hardware components and modules used in data storage operations. The components may be storage resources that function to copy data during storage operations. The components may perform other storage operations (or storage management operations) other that operations used in data stores. For example, some resources may create, store, retrieve, and/or migrate primary or secondary data copies. The data copies may include snapshot copies, backup copies, HSM copies, archive copies, and so on. The resources may also perform storage management functions that may communicate information to higher level components, such as global management resources.


In some examples, the system performs storage operations based on storage policies, as mentioned above. For example, a storage policy includes a set of preferences or other criteria to be considered during storage operations. The storage policy may determine or define a storage location and/or set preferences about how the system transfers data to the location and what processes the system performs on the data before, during, or after the data transfer. Storage policies may be stored in storage manager 210, or may be stored in other resources, such as a global manager, a media agent, and so on. Further details regarding storage management and resources for storage management will now be discussed.


Referring to FIG. 3, a block diagram illustrating an example of components of a server used in data storage operations is shown. A server, such as storage manager 210, may communicate with clients 111 to determine data to be copied to primary or secondary storage. As described above, the storage manager 210 may contain a jobs agent 211, a management agent 212, a database 213, and/or an interface module. Jobs agent 211 may manage and control the scheduling of jobs (such as copying data files) from clients 111 to media agents 112. Management agent 212 may control the overall functionality and processes of the data storage system, or may communicate with global managers. Database 213 or another data structure may store storage policies, schedule policies, retention policies, or other information, such as historical storage statistics, storage trend statistics, and so on. Interface module 215 may interact with a user interface, enabling the system to present information to administrators and receive feedback or other input from the administrators or with other components of the system (such as via APIs).


The server 300 contains various components of the resource allocation system such as a receive requests component 310, an optimize requests component 320, a handle requests component 330, a request store component 340, a resource store component 350, and a build grid component 360. The receive requests component 310 provides input to the resource allocation system in the form of an initial priority ordered plan (e.g., a list or queue) that specifies requests to be performed by the system. The optimize requests component 320 modifies the initial plan by performing one or more optimization routines on the initial plan. For example, the resource allocation system may perform abbreviated checks to remove requests from the initial plan that would fail. The handle requests component 330 dispatches, performs or at least initializes each request and performs other optimizations based on the result of each request. For example, when a request fails, the handle requests component 330 may remove similar requests from the plan, such as by blacklisting categories of requests. The request store component 340 stores the request plan and supplemental information about each request, such as any associated storage policy or metadata. The resource store component 350 stores information about the resources available throughout the system, such as drives, networks, media, and so forth. The build grid component 360 builds a grid of resources and requests by subdividing resources and requests according to certain criteria, such as geographic location of resources. These components and their operation are described in further detail herein.


Storage operations cells may by organized in a hierarchical fashion to perform various storage operations within a network. Further details on such a hierarchical architecture may be found in U.S. patent application Ser. No. 11/120,662, entitled Hierarchical Systems and Methods for Providing a Unified View of Storage Information, filed May 2, 2005, which is hereby incorporated herein by reference.


Preordered/Intelligent Resource Checks


The resource allocation system or process matches pending requests to resources by performing abbreviated checks to determine if a request would succeed. If a check fails, then the resource allocation system can move on to the next request, having spent less time than if the system began performing the data storage operation specified by the request in full (e.g., not abbreviated) and the data storage operation failed. The resource allocation system performs the abbreviated checks in a preordered fashion. For example, physical checks (e.g., determining whether the necessary hardware is working) may be performed before logical checks (e.g., determining whether a device is in use). An underlying goal is to check requests that have the highest chance of failure to remove them from the plan first. In addition, since many requests have dependent requests, when the resource allocation system can eliminate a request from the plan, it can also remove each of the request's dependent requests. Requests that fail the checks would have failed anyway, so determining that before resources have been committed and time has been wasted allows the system to spend more time working on requests that are more likely to succeed.


In one example, since physical resources are often the most difficult to acquire or fulfill, the matching routine may analyze a current job in a queue and first recognize that one resource being requested is a tape drive. Typically, physical resources like disks or tape drives are in short supply. The matching routine may perform a physical check to see whether that physical resource (tape drive) is offline or malfunctioning (a physical check) before doing a logical check of that resource (e.g., whether it is busy with another job). Likewise, the matching process may look at the state of the network to determine whether a path or stream is possible to satisfy a currently analyzed job. Physical checks are often faster than logical checks as they operate on a smaller list of available resources and tend to fail more often. When a physical check fails, the resource allocation system saves time that might have been wasted if a longer logical check had been performed first.


The following is an example of physical checks that may be performed by the resource allocation system in the following order:

    • 1) availability of drives (e.g., tape, optical, or magnetic),
    • 2) availability of device streams that can be used on the storage policy,
    • 3) availability of a tape library, availability of a media agent,
    • 4) availability of a host bus adapter card, number of drives that can be used in parallel from a tape library (e.g., a drive allocation policy for a library),
    • 5) number of drives that can be used on a single media agent at a given time (e.g., a drive allocation policy for a drive pool),
    • 6) availability of tapes or other media, and so forth.


The resource allocation system next performs logical checks. For example, the system may determine whether a tape drive is busy or flagged do not use. Some devices may be reserved for other purposes outside of the resource allocation system such as an administrator indicating that the resource allocation system should not schedule requests to use those devices.


In some embodiments, the resource allocation system compares only a subset of resource requests for that job to available resources to determine whether that job can be satisfied. A resource allocation system or process may include an abbreviated pre-order matching routine that identifies a subset of resource requests and performs a matching or allocation based on only that subset, rather than the entire set of resources. Notably, if the matching routine determines, based on an ordered review of a subset of resource requests in a given job, that that job cannot be satisfied, then the matching routine may stop any further matching operations for that job and simply move to the next job in the queue. This saves valuable resources in determining how to optimize each job (with its associated resource requests) in the queue. Rather than try to satisfy requests, the matching routine looks to eliminate jobs that request resources that cannot currently be satisfied.


Thus, the matching routine in one example reviews each incoming job in the queue, in order, and determines whether that job can be skipped, ignored or excluded during a current cycle through the queue. The matching routine compares the various resource requests in the job to the resources above to see whether that current job can be ignored. For example, a current job analyzed by the matching routine may request the following resources: an available tape drive, a device stream for a storage policy, access to a tape library, a particular media agent, and an available tape. The matching routine first determines whether a tape drive is physically available, and if so, determines whether a device stream to that tape drive for the storage policy is available. If not, then the matching routine does not look to determine whether any other resources in the job are available, but simply moves to the next job in the queue.



FIG. 4 is a flow diagram that illustrates the processing of the optimize requests component, in one embodiment. The component is invoked when the resource allocation system receives an initial plan containing a prioritized list of data storage requests. The plan may come from a variety of sources. For example, an administrator may create the initial plan that is composed of each of the storage requests that the administrator wants a data storage system to perform. As another example, each computer in an organization may automatically register a nightly request to archive files or perform other data storage operations, and a data storage system may collect the requests. In block 410, the component receives the initial list of requests. The list of requests is in priority or other order, based on requirements of the data storage system for completing the requests. For example, an administrator may order requests based on the importance that each request be completed. In block 420, the component performs the abbreviated checks described above. For example, the component may perform a series of physical checks for each request followed by a series of logical checks (and the checks may only check a subset of the resources required by the request). When a request fails a particular check, the request is removed from the list or marked as not to be performed. In block 430, the component handles each request in turn by traversing the list as described in further detail with respect to FIG. 5.


Under the abbreviated or preordered/intelligent check of resources, the system performs one or more abbreviated checks by performing a selected subset of one or more checks for whether one or more selected data storage resources are available to satisfy a data storage request. As noted above, the selected one data storage resource may be a physical data storage resource, rather than a logical data storage resource. When the one or more abbreviated checks indicate that the data storage request would fail if performed, then the system updates the list of data storage requests to indicate that that data storage request should not be performed, without attempting to perform that data storage request and without performing a check of all data storage resources required for performing that data storage request. Thereafter, the system again performs one or more abbreviated checks on the next data storage request in the list of data storage requests, and updates the list when the newly performed abbreviated checks indicate that this next data storage request would fail if performed.


When the abbreviated pre-ordered checks are complete, the resource allocation system will have reduced the initial ordered plan by removing requests from the plan that would eventually fail if allowed to continue. The number of requests removed can be significant, leading to significant time savings and more time for the resource allocation system to spend on requests that will likely succeed.


Category Blacklisting


The second method the resource allocation system uses for matching resources to requests is called category blacklisting. As the request count and number of resources grow, even the abbreviated checks described above may take a long time. Category blacklisting attempts to make the process of matching resources to requests more efficient so that the system scales further. This process is described in further detail with reference to FIG. 5.


In some embodiments, each request has a category code. For example, the category code may be associated with a storage policy. All requests in the same category have similar resource requirements and rules governing how to allocate the resources. When the resource allocation system denies a request, either during abbreviated checking or by actually attempting to perform the request and reaching a point of failure, then the resource allocation system blacklists the entire category. If one request in the category fails then all of the requests in the category are likely to fail. By removing these other requests, the resource allocation system prevents wasting time on failed requests and has more time available to perform requests that will likely succeed.


In some embodiments, the resource allocation system determines a likeness factor that indicates a degree of similarity between requests assigned to a particular category. If the resource allocation system denies a request, then the resource allocation system removes other requests that have a high enough likeness factor from the plan. The likeness factor considers a subset of resources that the request needs, and may separate the resources into common and unique subsets. The resource allocation system may take two or three of the most common resources to compose the likeness factor. If a request is denied for a common resource, then the resource allocation system blacklists the category. However, if the request is denied based on a unique resource, then it is less likely that the entire category will suffer the same failure, and the resource allocation system may not blacklist the category.


When the category blacklisting process is complete, the resource allocation system will have further reduced the ordered plan by removing requests from the plan that would eventually fail if allowed to continue. The number of requests removed can be significant, leading to significant time savings and more time for the resource allocation system to spend on requests that will likely succeed.


Resource Holding Area


To preserve priorities in the job queue, the resource allocation system may employ a temporary holding area for released resources. As jobs are completed, resources are freed up to be available for subsequent job requests. However, as noted above, the freed up resources could be provided to lower priority jobs. Therefore, when resources are freed up, the resource allocation system places them into a logical holding area. They remain in the holding area until the resource allocation system has walked the queue and returns to the top of the queue. At that point, the resource allocation system starts afresh and may satisfy highest priority job requests with all available resources, including those that had been freed up while walking the queue and placed temporarily in the holding area.


In general, the resource allocation system operates in a loop repeatedly traversing the ordered plan of requests and initiating each request in turn as the resources required by the request are available. When the end of the plan is reached, the system starts again from the top. However, a problem arises when a request with lower priority attempts to grab a resource ahead of a request with higher priority. This can happen as the system is traversing the plan when a particular request completes that releases resources that caused a request earlier in the plan to be postponed. Thus, when resources are released by a request, the resource allocation system may place these resources into a temporary resource holding area so that they are not yet available to subsequent requests in the plan. When the resource allocation loop returns to the top of the plan, the resource allocation system makes these resources available to all requests. This ensures that requests with highest priority will have access to any released resources first.


In some embodiments, the resource allocation system receives configuration information from an administrator that alters the behavior of the resource holding area. For example, the configuration information may indicate that the resource holding area is not used until the resource allocation system is at a certain depth in the plan or queue. As an example, if the resource allocation system is at the third request in the plan and the second request released a resource that the third request needs, then the resource allocation system may go ahead and give the resource to the third request rather than waiting until the entire plan has been traversed. It is less likely that any of the prior higher priority requests in the plan need the resource or the resource may be available again by the time the resource allocation system has traversed the entire plan.


The resource allocation system may include an administrator interface (not shown) that allows a system administrator to configure the holding area. For example, if a resource is freed up while the system is analyzing the first quarter or tenth of the queue, then it may be immediately placed back into the pool of available resources, rather than waiting for the entire queue to be walked. As another example, if the resource allocation system is currently analyzing the third request in the queue, and that third request may be satisfied with a resource in the temporary holding area, then the system may allocate that resource from the temporary holding area. Alternatively or additionally, the user interface may permit the system administrator to otherwise allow a resource from the temporary holding area to be placed into the available resource pool based on wait times or otherwise override default operation.



FIG. 5 illustrates the processing of the handle requests component, in one embodiment. The component is invoked to traverse the list of requests and perform each request. In block 510, the component retrieves the first request from the list. In block 520, the component dispatches the request. Those of ordinary skill in the art will recognize that dispatching a request may include many steps, such as retrieving media from a media library, loading the library in a disk drive, gathering data from one or more computer systems, performing data management operations on the data (e.g., compression, encryption, copying, etc.), and so forth. In decision block 530, the component determines whether the requested resource has been blacklisted by comparing the request to the generated blacklist table. If it is, then the routine proceeds in getting the next request in block 580 and loops back to again dispatching the request in block 520.


If the requested resource is not blacklisted, then in block 535 a component performs one or more abbreviated checks, as described above with respect to FIG. 4. If the check fails, then the component continues at block 540, else the component continues at block 545. In block 540, the component determines the category of the failed request and adds the category to a blacklist so that other requests that belong to the category will be flagged as likely to fail and thus not be dispatched by the resource allocation system. In some embodiments the resource allocation system first determines if the resource that caused the request to fail is common (e.g., such that other similar resources are readily available) or unique, and only blacklist the category if the resource is a unique resource.


In decision block 545, the component performs a full check, and if that fails, the routine again loops back to adding the request to the blacklist category (block 540), getting the next request (block 580), and dispatching the request (block 520). If the full check succeeds, then the resource request is granted in block 550.


In decision block 555, if the request released resources, then the component continues at block 560, else the component continues at block 570. In block 560, the component places the released resources in a temporary resource holding area for release after the entire list has been traversed. This prevents lower priority requests at the end of the list from grabbing resources that higher priority requests at the beginning of the list are waiting for. In decision block 570, if there are more requests in the list, then the component continues at block 580, else the component continues at block 590. In block 580, the component retrieves the next request from the list and loops to block 520 to dispatch the request. Blocks 510-580 depict dispatching requests serially (e.g., one after the other) in order to simplify the illustration of the operation of the resource allocation system. Those of ordinary skill in the art will recognize that in practice many requests can be performed parallel. In block 590, the component has reached the end of the list and releases any temporarily held resources into a global resource pool for access by any request. The component then loops to block 510 to traverse the list again. Typically the resource allocation system will loop repeatedly performing each request remaining in the list until either the list of requests is exhausted or the end of the storage operation window is reached. For example, the system may stop performing requests at the end of a nightly storage window.


Dynamic Routing/Allocation


Often resources are far flung geographically and throughout a network. For example, a company may have multiple offices each with their own LAN and data management resources. The company may want to perform periodic data management operations at each of the offices. For example, the company may backup user workstations at every office on a weekly basis.


In some embodiments, the resource allocation system forms a set of resources needed by requests in a grid, table or other fashion to match up a set of resources that can best satisfy a request. For example, although any tape library accessible by a user workstation could be used to satisfy a request to backup the user workstation, it is likely desirable to use a tape library that is close to the user workstation (where close could include geographic or network proximity). The resource allocation system may group the data management operations based on a created logical table or grid allocation criteria. For example, the criteria may specify different subsets of data that are important to a particular user of the system. For example, a bank may divide data by branch location or other criteria, or a government office may divide data by the level of security clearance needed to access the network on which the data is originally stored.


In some embodiments, the grid indicates alternate data paths that the resource allocation system can use if a preferred resource fails or is unavailable. The data path may specify a particular network route, tape library, media agent, or other hardware or software to use if that data path is selected to satisfy a request. For example, if there is a failover or load issue during the completion of a request, then the resource allocation system can attempt to use one of the alternate data paths. The resource allocation system may determine if all of the elements of a particular data path are available before choosing the alternate data path.


In some embodiments, the resource allocation system receives rules that specify how alternate data paths are chosen. For example, an overflow rule may specify that when a particular data path or hardware resource is full, requests for the data path should failover to a second specified data path. Alternatively or additionally, a rule may specify that the resource allocation system should select data paths in an alternating or round robin fashion to spread the load of requests evenly across data paths, or among lesser used resources to evenly spread wear out among all components.



FIG. 6 is a flow diagram that illustrates the processing of the build grid component, in one embodiment. In block 610, the component receives an initial request plan as described above. In block 620, the component determines the grid dimensions. For example, the component may group the resources in columns according to common characteristics of the resources, such as geographic proximity, network topology, departments within an organization, and so forth. Then, rows of requests may be assigned to each column. In block 630, the component assigns requests to the appropriate cell within the grid. For each request, the component may assign the request based on the resources required by the request or other configured criteria. The component may also determine an alternate set of resources for a request to be used when a first set of resources is not available. The methods described above for optimizing the allocation of requests to resources may be used to optimize the entire grid or columns of resources within the grid. In block 640, the component dispatches the requests within the grid. Each column of the grid may operate independently on separate lists of requests, and the component may process each list in parallel as well as performing operations within each list in parallel.


Alternatively or additionally, the grid may include a row or column of priorities associated with each data management operation in a list of data management operations. The system may then perform data management operations along one dimension of the grid in priority order. Overall, the resource allocation system provides a highly scalable data storage system.


The resource allocation system can use the division of resources and requests into a grid to further subdivide the problem of matching requests to resources. Within each dimension of the grid, the resource allocation system may apply the techniques described above for reducing the number of requests to be performed or the resources used for completing those requests. Thus, the grid store provides additional scalability for performing data management operations.



FIG. 7 is a block diagram that illustrates an example environment in which the grid store may be applied. An organization may have three offices: Office A 710, Office B 740, and Office C 770. The offices are connected by one or more networks, such as LAN 730 and WAN 760 (e.g., the Internet). Each office has its own computer systems and data storage devices (e.g., tape libraries, media agents, disk drives, and so forth). For example, Office A 710 has one or more user workstations 715 and 720 and one or more data storage devices such as device 725, whereas Office B contains an E-Commerce server 745 (such as a website) and a database server 750. Office B also has one or more data storage devices, such as device 755. Office C has an ERP system 775 and email sever 780 and one or more data storage devices, such as device 785. Typically, it is desirable to allow the data storage devices at each location handle the data storage requests for that location. For example, the data storage device 725 is typically the preferred device for handling data storage requests related to workstation 715. However, because each office is connected by a network, it is also possible for data storage device 755 to handle data storage requests related to workstation 715. The resource allocation grid divides requests among the available resources, tracking the types of preferences described. In addition, the resource allocation grid may specify one or more alternate data paths to be used when the preferred data path or data storage device is not available.


Overall, this system receives data storage requests to be performed in, e.g., multiple, geographically separated locations, wherein each of the locations includes separate data storage resources. For each data storage request, and before receiving data storage requests to be executed, the system determines at least two different sets of data storage resources to handle the request. The first set of data storage resources is a preferred set of resources to handle the request, while the second set is an alternate set of data storage resources to handle the request. Before receiving data storage requests to be executed, the system establishes a data storage resource allocation based at least in part on one of the sets of data storage resources determined to handle each data storage request.


Likewise, the system receives a list of multiple data management resources for use in performing multiple data management operations and intelligently allocates those resources. For at least some of the multiple data management resources, the system determines characteristics of the data management resource (e.g. geographic proximity, network topology, departments within a business organization, type of hardware, etc.) and groups at least two of the resources based on a similar characteristic. For each data management operation in the list, the system then determines a location of one or more data objects affected by the data management operation, and creates a logical table for allocating the data management resources. This logical table for resource allocation selects one or more data management resources to perform each of the multiple data management operations in the list, based at least in part on the determined physical location of the one or more data objects affected by the data management operation, and on the grouping of at least two of the data management resources based on a similarity of determined characteristics. Thereafter the system may perform each data management operation based on the created logical table for resource allocation.


Conclusion


The resource allocation system described herein provides a tremendous amount of flexibility. It is applicable to heterogeneous networks and systems, as well as systems that grow in size and diversity. Thus, a data management system with only a few localized cells may grow 10 or 100 times larger with multiple geographically disbursed cells, without compromising on backup windows and resource allocation times. For example, prior systems could accommodate 300 resource allocations in an hour, but under the present system, could handle over 40,000.


Systems and modules described herein may comprise software, firmware, hardware, or any combination(s) of software, firmware, or hardware suitable for the purposes described herein. Software and other modules may reside on servers, workstations, personal computers, computerized tablets, PDAs, and other devices suitable for the purposes described herein. In other words, the software and other modules described herein may be executed by a general-purpose computer, e.g., a server computer, wireless device or personal computer. Those skilled in the relevant art will appreciate that aspects of the invention can be practiced with other communications, data processing, or computer system configurations, including: Internet appliances, hand-held devices (including personal digital assistants (PDAs)), wearable computers, all manner of cellular or mobile phones, multi-processor systems, microprocessor-based or programmable consumer electronics, set-top boxes, network PCs, mini-computers, mainframe computers, and the like. Indeed, the terms “computer,” “server,” “host,” “host system,” and the like are generally used interchangeably herein, and refer to any of the above devices and systems, as well as any data processor. Furthermore, aspects of the invention can be embodied in a special purpose computer or data processor that is specifically programmed, configured, or constructed to perform one or more of the computer-executable instructions explained in detail herein.


Software and other modules may be accessible via local memory, via a network, via a browser or other application in an ASP context, or via other means suitable for the purposes described herein. Examples of the technology can also be practiced in distributed computing environments where tasks or modules are performed by remote processing devices, which are linked through a communications network, such as a Local Area Network (LAN), Wide Area Network (WAN), or the Internet. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. Data structures described herein may comprise computer files, variables, programming arrays, programming structures, or any electronic information storage schemes or methods, or any combinations thereof, suitable for the purposes described herein. User interface elements described herein may comprise elements from graphical user interfaces, command line interfaces, and other interfaces suitable for the purposes described herein. Screenshots presented and described herein can be displayed differently as known in the art to input, access, change, manipulate, modify, alter, and work with information.


Examples of the technology may be stored or distributed on computer-readable media, including magnetically or optically readable computer discs, hard-wired or preprogrammed chips (e.g., EEPROM semiconductor chips), nanotechnology memory, biological memory, or other data storage media. Indeed, computer implemented instructions, data structures, screen displays, and other data under aspects of the invention may be distributed over the Internet or over other networks (including wireless networks), on a propagated signal on a propagation medium (e.g., an electromagnetic wave(s), a sound wave, etc.) over a period of time, or they may be provided on any analog or digital network (packet switched, circuit switched, or other scheme).


Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” As used herein, the terms “connected,” “coupled,” or any variant thereof, means any connection or coupling, either direct or indirect, between two or more elements; the coupling of connection between the elements can be physical, logical, or a combination thereof. Additionally, the words “herein,” “above,” “below,” and words of similar import, when used in this application, shall refer to this application as a whole and not to any particular portions of this application. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively. The word “or,” in reference to a list of two or more items, covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, and any combination of the items in the list.


While certain aspects of the technology are presented below in certain claim forms, the inventors contemplate the various aspects of the technology in any number of claim forms. For example, while only one aspect of the technology is recited as a means-plus-function claim under 35 U.S.C. § 112, other aspects may likewise be embodied as a means-plus-function claim. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects of the technology.


The above detailed description of examples of the technology is not intended to be exhaustive or to limit the invention to the precise form disclosed above. While specific embodiments of, and examples for, the invention are described above for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize. For example, while processes or blocks are presented in a given order, alternative embodiments may perform routines having steps, or employ systems having blocks, in a different order, and some processes or blocks may be deleted, moved, added, subdivided, combined, and/or modified to provide alternative or subcombinations. Each of these processes or blocks may be implemented in a variety of different ways. Also, while processes or blocks are at times shown as being performed in series, these processes or blocks may instead be performed in parallel, or may be performed at different times.


The teachings of the technology provided herein can be applied to other systems, not necessarily the system described above. The elements and acts of the various embodiments described above can be combined to provide further examples. Any patents and applications and other references noted above, including any that may be listed in accompanying filing papers, are incorporated herein by reference. Aspects of the invention can be modified, if necessary, to employ the systems, functions, and concepts of the various references described above to provide yet further examples of the technology.


These and other changes can be made to the invention in light of the above Detailed Description. While the above description describes certain embodiments of the invention, and describes the best mode contemplated, no matter how detailed the above appears in text, the invention can be practiced in many ways. Details of the system and method for classifying and transferring information may vary considerably in its implementation details, while still being encompassed by the invention disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the invention should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the invention with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the invention encompasses not only the disclosed embodiments, but also all equivalent ways of practicing or implementing the technology under the claims. While certain aspects of the technology are presented below in certain claim forms, the inventors contemplate the various aspects of the technology in any number of claim forms. For example, while only one aspect of the technology is recited as embodied in a computer-readable medium, other aspects may likewise be embodied in a computer-readable medium. Accordingly, the inventors reserve the right to add additional claims after filing the application to pursue such additional claim forms for other aspects of the technology.


From the foregoing, it will be appreciated that specific embodiments of the invention have been described herein for purposes of illustration, but that various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims.

Claims
  • 1. A non-transitory computer-readable medium storing instructions that, when executed by at least one computing device in a data management system, cause the computing device to perform operations comprising: assigning a category code to data management requests that have similar data management resource requirements for performing data management operations in the data management system;from a list of data management requests pending in the data management system, attempting to perform a first data management request by assigning the first data management request to one or more data management resources in the data management system; andif the first data management request fails, determining at least one data management resource that is at least partially responsible for the failure of the first data management request,identifying other data management requests having the category code of the failed first data management request, andupdating the list of data management requests to indicate that the data management system should not perform the identified other data management requests having the category code of the failed first data management request and wherein the updating of the list of data management requests comprises removing from the list the identified other data management requests having the category code of the failed first data management request.
  • 2. The computer-readable medium of claim 1, wherein the data management requests having the category code also have similar rules governing how to allocate the data management resources.
  • 3. The computer-readable medium of claim 1, wherein the associating of the category code with the data management requests that have similar data management resource requirements is also based on the data management requests having similar rules governing how to allocate the data management resources.
  • 4. The computer-readable medium of claim 1, wherein the category code corresponds to a storage policy.
  • 5. The computer-readable medium of claim 1, wherein the category code corresponds to a storage policy, which defines at least one of: a storage location for a secondary copy generated in a data management operation,preferences about how the data management system transfers data to the storage location in the data management operation, andwhat processes are performed on the data before, during, or after the data transfer.
  • 6. The computer-readable medium of claim 1, wherein each data management request in the list of data management requests is associated with a category code.
  • 7. The computer-readable medium of claim 1, wherein the operations further comprise: receiving the list of data management requests to be performed by the data management system.
  • 8. The computer-readable medium of claim 1, wherein the list of data management requests is updated to indicate that the data management system should not perform the identified other data management requests having the category code of the failed first data management request only when the first data management request failed because of a resource for which other similar resources are not available in the data management system.
  • 9. The computer-readable medium of claim 1, wherein the updating of the list of data management requests is not performed when the first data management request failed because of a resource for which other similar resources are available in the data management system.
  • 10. The computer-readable medium of claim 1, wherein the operations further comprise: receiving a data management request for performing one or more data management operation, wherein the data management request indicates one or more data management resources to assign for performing the one or more data management operations.
  • 11. A method performed in a data management system, the method comprising: assigning, by a computing device operating in the data management system, a category code to data management requests that have similar data management resource requirements for performing data management operations in the data management system,wherein the computing comprises one or more processors and computer memory;from a list of data management requests pending in the data management system, assigning by the computing device a first data management request to one or more data management resources in the data management system; andif the first data management request fails, determining by the computing device at least one data management resource that is at least partially responsible for the failure of the first data management request,identifying by the computing device other data management requests having the category code of the failed first data management request, andindicating by the computing device that the data management system should not perform the identified other data management requests having the category code of the failed first data management request and removing from the list of data management requests, by the computing device, the identified other data management requests having the category code of the failed first data management request.
  • 12. The method of claim 11, wherein the indicating comprises updating by the computing device the list of data management requests.
  • 13. The method of claim 11, wherein the data management requests having the category code also have similar rules governing how to allocate the data management resources.
  • 14. The method of claim 11, wherein the category code corresponds to a storage policy.
  • 15. The method of claim 11, wherein the category code corresponds to a storage policy, which defines at least one of: a storage location for a secondary copy generated in a data management operation,preferences about how the data management system transfers data to the storage location in the data management operation, andwhat processes are performed on the data before, during, or after the data transfer.
  • 16. The method of claim 11, wherein each data management request in the list of data management requests is associated with a category code.
  • 17. The method of claim 11, wherein the computing device indicates that the data management system should not perform the identified other data management requests having the category code of the failed first data management request only when the first data management request failed because of a resource for which other similar resources are not available in the data management system.
  • 18. The method of claim 11, wherein the computing device does not indicate that the data management system should not perform the identified other data management requests having the category code of the failed first data management request when the first data management request failed because of a resource for which other similar resources are available in the data management system.
CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation of U.S. patent application Ser. No. 15/476,828. filed Mar. 31, 2017 (now U.S. Pat. No. 10,162,677), which is a continuation of U.S. patent application Ser. No. 15/013,515, filed Feb. 2, 2016 (now U.S. Pat. No. 9,639,400), which is a continuation of U.S. patent application Ser. No. 13/736,318, filed Jan. 8, 2013 (now U.S. Pat. No. 9,262,226), which is a continuation of U.S. patent application Ser. No. 12/142,445, filed Jun. 19, 2008 (now U.S. Pat. No. 8,352,954), each of which is herein incorporated by reference in its entirety.

US Referenced Citations (482)
Number Name Date Kind
4394732 Swenson Jul 1983 A
4464122 Fuller et al. Aug 1984 A
4686620 Ng Aug 1987 A
4995035 Cole et al. Feb 1991 A
5005122 Griffin et al. Apr 1991 A
5093912 Dong et al. Mar 1992 A
5133065 Cheffetz et al. Jul 1992 A
5193154 Kitajima et al. Mar 1993 A
5212772 Masters May 1993 A
5212784 Sparks May 1993 A
5226157 Nakano et al. Jul 1993 A
5239647 Anglin et al. Aug 1993 A
5241668 Eastridge et al. Aug 1993 A
5241670 Eastridge et al. Aug 1993 A
5276860 Fortier et al. Jan 1994 A
5276867 Kenley et al. Jan 1994 A
5287500 Stoppani, Jr. Feb 1994 A
5321816 Rogan et al. Jun 1994 A
5333315 Saether et al. Jul 1994 A
5347653 Flynn et al. Sep 1994 A
5386545 Gombos, Jr. et al. Jan 1995 A
5410700 Fecteau et al. Apr 1995 A
5448718 Cohn et al. Sep 1995 A
5448724 Hayashi Sep 1995 A
5450592 McLeod Sep 1995 A
5491810 Allen Feb 1996 A
5495607 Pisello et al. Feb 1996 A
5504873 Martin et al. Apr 1996 A
5517405 McAndrew et al. May 1996 A
5485606 Midgdey et al. Jun 1996 A
5537568 Yanai et al. Jul 1996 A
5544345 Carpenter et al. Aug 1996 A
5544347 Venal et al. Aug 1996 A
5555371 Duyanovich et al. Sep 1996 A
5559957 Balk Sep 1996 A
5564037 Lam Oct 1996 A
5608865 Midgely et al. Mar 1997 A
5613134 Lucus et al. Mar 1997 A
5619644 Crockett et al. Apr 1997 A
5634052 Morris May 1997 A
5638509 Dunphy et al. Jun 1997 A
5659614 Bailey, III Aug 1997 A
5666501 Jones et al. Sep 1997 A
5673381 Huai et al. Sep 1997 A
5673382 Cannon et al. Sep 1997 A
5699361 Ding et al. Dec 1997 A
5711010 Naddell et al. Jan 1998 A
5729743 Squibb Mar 1998 A
5740405 DeGraaf Apr 1998 A
5751997 Kullick et al. May 1998 A
5758359 Saxon May 1998 A
5758649 Iwashita et al. Jun 1998 A
5761677 Senator et al. Jun 1998 A
5764972 Crouse et al. Jun 1998 A
5778165 Saxon Jul 1998 A
5778395 Whiting et al. Jul 1998 A
5812398 Nielsen Sep 1998 A
5813009 Johnson et al. Sep 1998 A
5813017 Morris Sep 1998 A
5860073 Ferrel et al. Jan 1999 A
5864846 Vorhees et al. Jan 1999 A
5872905 Ono et al. Feb 1999 A
5875478 Blumenau Feb 1999 A
5887134 Ebrahim Mar 1999 A
5894585 Inoue et al. Apr 1999 A
5896531 Curtis et al. Apr 1999 A
5901327 Ofek May 1999 A
5924102 Perks Jul 1999 A
5950205 Aviani, Jr. Sep 1999 A
5974563 Beeler, Jr. Oct 1999 A
5983239 Cannon Nov 1999 A
5991753 Wilde Nov 1999 A
6009275 Dekoning et al. Dec 1999 A
6012053 Pant et al. Jan 2000 A
6021415 Cannon et al. Feb 2000 A
6026414 Anglin Feb 2000 A
6052735 Ulrich et al. Apr 2000 A
6064821 Shough et al. May 2000 A
6073128 Pongracz et al. Jun 2000 A
6076148 Kedem Jun 2000 A
6091518 Anabuki Jul 2000 A
6094416 Ying Jul 2000 A
6105098 Ninose et al. Aug 2000 A
6112304 Clawson Aug 2000 A
6131095 Low et al. Oct 2000 A
6131190 Sidwell Oct 2000 A
6148412 Cannon et al. Nov 2000 A
6154787 Urevig et al. Nov 2000 A
6161111 Mutalik et al. Dec 2000 A
6167402 Yeager Dec 2000 A
6182198 Hubis et al. Jan 2001 B1
6212512 Barney et al. Apr 2001 B1
6226759 Miller et al. May 2001 B1
6239800 Mayhew May 2001 B1
6253217 Dourish et al. Jun 2001 B1
6260069 Anglin Jul 2001 B1
6266676 Szalwinski et al. Jul 2001 B1
6266784 Hsiao et al. Jul 2001 B1
6269431 Dunham Jul 2001 B1
6275953 Vahalia et al. Aug 2001 B1
6298439 Beglin Oct 2001 B1
6301592 Aoyama et al. Oct 2001 B1
6308175 Lang et al. Oct 2001 B1
6324581 Xu et al. Nov 2001 B1
6327590 Chidlovskii et al. Dec 2001 B1
6327612 Watanabe Dec 2001 B1
6328766 Long Dec 2001 B1
6330570 Crighton Dec 2001 B1
6330642 Carteau Dec 2001 B1
6341287 Sziklai et al. Jan 2002 B1
6343287 Kumar et al. Jan 2002 B1
6343324 Hubis et al. Jan 2002 B1
6345288 Reed et al. Feb 2002 B1
RE37601 Eastridge et al. Mar 2002 E
6356801 Goodman et al. Mar 2002 B1
6363462 Bergsten Mar 2002 B1
6367073 Elledge Apr 2002 B2
6374363 Wu et al. Apr 2002 B1
6389432 Pothapragada et al. May 2002 B1
6418478 Ignatius et al. Jul 2002 B1
6421678 Smiga et al. Jul 2002 B2
6421711 Blumenau et al. Jul 2002 B1
6442706 Wahl et al. Aug 2002 B1
6470332 Weschler Oct 2002 B1
6484162 Edlund et al. Nov 2002 B1
6487561 Ofek et al. Nov 2002 B1
6487644 Huebsch et al. Nov 2002 B1
6502205 Yanai et al. Dec 2002 B1
6519679 Devireddy et al. Feb 2003 B2
6538669 Lagueux, Jr. et al. Mar 2003 B1
6539388 Hattori et al. Mar 2003 B1
6540623 Jackson Apr 2003 B2
6549918 Probert, Jr. et al. Apr 2003 B1
6557039 Leong et al. Apr 2003 B1
6564228 O'Connor May 2003 B1
6593656 Ahn et al. Jul 2003 B2
6618771 Leja et al. Sep 2003 B1
6629110 Cane et al. Sep 2003 B2
6647399 Zaremba Nov 2003 B2
6658526 Nguyen et al. Dec 2003 B2
6662218 Mighdoll et al. Dec 2003 B2
6675177 Webb Jan 2004 B1
6675299 Porter et al. Jan 2004 B2
6691232 Wood et al. Feb 2004 B1
6721767 De Meno et al. Apr 2004 B2
6732088 Glance May 2004 B1
6732231 Don et al. May 2004 B1
6732244 Ashton et al. May 2004 B2
6745178 Emens et al. Jun 2004 B1
6795828 Ricketts Sep 2004 B2
6816941 Carlson et al. Nov 2004 B1
6820070 Goldman et al. Nov 2004 B2
6839741 Tsai Jan 2005 B1
6839803 Loh et al. Jan 2005 B1
6850994 Gabryjelski Feb 2005 B2
6860422 Hull et al. Mar 2005 B2
6865568 Chau Mar 2005 B2
6871182 Winnard et al. Mar 2005 B1
6892221 Ricart et al. May 2005 B2
6898650 Gao et al. May 2005 B1
6948038 Berkowitz et al. Sep 2005 B2
6948039 Biessener et al. Sep 2005 B2
6957186 Guheen et al. Oct 2005 B1
6970997 Shibayama et al. Nov 2005 B2
6976039 Chefalas et al. Dec 2005 B2
6995675 Curkendall et al. Feb 2006 B2
6996616 Leighton et al. Feb 2006 B1
7003641 Prahlad et al. Feb 2006 B2
7028076 Mastrianni et al. Apr 2006 B2
7035880 Crescenti et al. Apr 2006 B1
7039860 Gautestad et al. May 2006 B1
7054960 Bezbaruah et al. May 2006 B1
7058661 Ciaramitaro Jun 2006 B2
7099901 Sutoh et al. Aug 2006 B2
7107298 Prahlad et al. Sep 2006 B2
7107416 Stuart et al. Sep 2006 B2
7133870 Tripp et al. Nov 2006 B1
7139826 Watanabe et al. Nov 2006 B2
7139846 Rossi Nov 2006 B1
7146387 Russo et al. Dec 2006 B1
7155421 Haldar Dec 2006 B1
7155481 Prahlad et al. Dec 2006 B2
7159081 Suzuki Jan 2007 B2
7171468 Yeung et al. Jan 2007 B2
7171585 Gail et al. Jan 2007 B2
7185152 Takahashi et al. Feb 2007 B2
7188141 Novaes Mar 2007 B2
7240100 Wein et al. Jul 2007 B1
7246207 Kottomtharayil et al. Jul 2007 B2
7269664 Hutsch et al. Sep 2007 B2
7284033 Jhanji Oct 2007 B2
7287047 Kavuri Oct 2007 B2
7290017 Wang et al. Oct 2007 B1
7313659 Suzuki Dec 2007 B2
7315923 Retnamma et al. Jan 2008 B2
7328325 Solis et al. Feb 2008 B1
7343453 Prahlad et al. Mar 2008 B2
7346623 Prahlad et al. Mar 2008 B2
7346676 Swildens et al. Mar 2008 B1
7346751 Prahlad et al. Mar 2008 B2
7376947 Evers May 2008 B2
7379978 Anderson et al. May 2008 B2
7383379 Patterson et al. Jun 2008 B2
7386535 Kalucha et al. Jun 2008 B1
7395282 Crescenti et al. Jul 2008 B1
7421460 Chigusa et al. Sep 2008 B2
7424543 Rice, III Sep 2008 B2
7434219 De Meno et al. Oct 2008 B2
7457790 Kochunni et al. Nov 2008 B2
7472142 Prahlad et al. Dec 2008 B2
7496841 Hadfield et al. Feb 2009 B2
7529782 Prahlad et al. May 2009 B2
7543125 Gokhale Jun 2009 B2
7565484 Ghosal et al. Jul 2009 B2
7577689 Masinter et al. Aug 2009 B1
7577694 Nakano et al. Aug 2009 B2
7584469 Mitekura et al. Sep 2009 B2
7587715 Barrett et al. Sep 2009 B1
7593935 Sullivan Sep 2009 B2
7596713 Mani-Meitav et al. Sep 2009 B2
7603626 Williams et al. Oct 2009 B2
7606844 Kottomtharayil Oct 2009 B2
7610285 Zoellner et al. Oct 2009 B1
7617262 Prahlad et al. Nov 2009 B2
7656849 Evans Feb 2010 B1
7668884 Prahlad et al. Feb 2010 B2
7673175 More et al. Mar 2010 B2
7676542 Moser et al. Mar 2010 B2
7689899 Leymaster et al. Mar 2010 B2
7698520 Minami et al. Apr 2010 B2
7730031 Forster Jun 2010 B2
7734593 Prahlad et al. Jun 2010 B2
7734669 Kottomtharayil et al. Jun 2010 B2
7747579 Prahlad et al. Jun 2010 B2
7751628 Reismen Jul 2010 B1
7761409 Stefik et al. Jul 2010 B2
7792789 Prahlad et al. Sep 2010 B2
7801871 Gosnell Sep 2010 B2
7814118 Kottomtharayil et al. Oct 2010 B2
7827266 Gupta Nov 2010 B2
7831793 Chakravarty et al. Nov 2010 B2
7840537 Gokhale et al. Nov 2010 B2
7844676 Prahlad et al. Nov 2010 B2
7865517 Prahlad et al. Jan 2011 B2
7882077 Gokhale et al. Feb 2011 B2
7882093 Kottomtharayil et al. Feb 2011 B2
7882097 Ogilvie Feb 2011 B1
7937393 Prahlad et al. May 2011 B2
7937420 Tabellion et al. May 2011 B2
7937702 De Meno et al. May 2011 B2
7984063 Kottomtharayil et al. Jul 2011 B2
7984435 Kokkinen Jul 2011 B2
8037028 Prahlad et al. Oct 2011 B2
8055627 Prahlad et al. Nov 2011 B2
8060514 Arrouye et al. Nov 2011 B2
8078607 Oztekin et al. Dec 2011 B2
8099428 Kottomtharayil et al. Jan 2012 B2
8108427 Prahlad et al. Jan 2012 B2
8126854 Sreedharan Feb 2012 B1
8131784 Zhuge et al. Mar 2012 B1
8140786 Bunte et al. Mar 2012 B2
8145742 Parker et al. Mar 2012 B1
8156086 Lu et al. Apr 2012 B2
8161003 Kavuri Apr 2012 B2
8170995 Prahlad et al. May 2012 B2
8200638 Zheng et al. Jun 2012 B1
8219524 Gokhale Jul 2012 B2
8229954 Kottomtharayil et al. Jul 2012 B2
8230054 Mutnuru et al. Jul 2012 B2
8230195 Amatendran et al. Jul 2012 B2
RE43678 Major et al. Sep 2012 E
8285681 Prahlad et al. Oct 2012 B2
8307177 Prahlad et al. Nov 2012 B2
8316446 Campbell Nov 2012 B1
8347088 Moore et al. Jan 2013 B2
8352954 Gokhale et al. Jan 2013 B2
8356209 Gunabalasubramaniam et al. Jan 2013 B2
8364652 Vijayan et al. Jan 2013 B2
8370166 Ronnewinkel Feb 2013 B2
8396838 Brockway et al. Mar 2013 B2
8468538 Attarde et al. Jun 2013 B2
8477618 Martin Jul 2013 B2
8505010 De Meno et al. Aug 2013 B2
8510573 Muller et al. Aug 2013 B2
8578120 Attarde et al. Nov 2013 B2
8612394 Prahlad et al. Dec 2013 B2
8706867 Vijayan Apr 2014 B2
8725688 Lad May 2014 B2
8769048 Kottomtharayil Jul 2014 B2
8775823 Gokhale et al. Jul 2014 B2
8782064 Kottomtharayil et al. Jul 2014 B2
8826284 Fuller Sep 2014 B1
8832706 Gokhale et al. Sep 2014 B2
8849762 Kumarasamy et al. Sep 2014 B2
8959299 Ngo et al. Feb 2015 B2
9092378 Kumarasamy et al. Jul 2015 B2
9122692 Dalal et al. Sep 2015 B1
9128883 Gokhale et al. Sep 2015 B2
9262226 Gokhale et al. Feb 2016 B2
9274803 De Meno et al. Mar 2016 B2
9348827 Patwardhan et al. May 2016 B1
9444811 Nara et al. Sep 2016 B2
9459968 Vijayan Oct 2016 B2
9612916 Gokhale et al. Apr 2017 B2
9766825 Bhagi Sep 2017 B2
9823979 Gokhale et al. Nov 2017 B2
10162677 Gokhale et al. Dec 2018 B2
10613942 Gokhale et al. Apr 2020 B2
20010012986 Conan et al. Aug 2001 A1
20010034771 Hutsch et al. Oct 2001 A1
20010047381 Meno et al. Nov 2001 A1
20020032878 Karpf Mar 2002 A1
20020049883 Schneider et al. Apr 2002 A1
20020119830 Jackson Aug 2002 A1
20020120858 Porter et al. Aug 2002 A1
20020138462 Ricketts Sep 2002 A1
20030028592 Ooho et al. Feb 2003 A1
20030046313 Leung et al. Mar 2003 A1
20030050979 Takahashi Mar 2003 A1
20030065897 Sadowsky et al. Apr 2003 A1
20030101086 San Miguel May 2003 A1
20030126250 Jhanii Jul 2003 A1
20030172343 Levmaster et al. Sep 2003 A1
20040039689 Penney et al. Feb 2004 A1
20040068713 Yannakoyorgos et al. Apr 2004 A1
20040098383 Tabellion et al. May 2004 A1
20040220980 Forster Nov 2004 A1
20040267815 De Mes Dec 2004 A1
20050039069 Prahlad et al. Feb 2005 A1
20050097070 Enis et al. May 2005 A1
20050216788 Mani-Meitav et al. Sep 2005 A1
20050246510 Retnannna et al. Nov 2005 A1
20050251786 Citron et al. Nov 2005 A1
20050278207 Ronnewinkel Dec 2005 A1
20060036619 Fuerst et al. Feb 2006 A1
20060070061 Cox et al. Mar 2006 A1
20060110286 Boukas May 2006 A1
20060115802 Reynolds Jun 2006 A1
20060116999 Dettinger et al. Jun 2006 A1
20060149604 Miller Jul 2006 A1
20060149724 Ritter et al. Jul 2006 A1
20060177114 Tongdee et al. Aug 2006 A1
20060195678 Jalobeanu Aug 2006 A1
20060195838 Epstein Aug 2006 A1
20060224846 Amarendran et al. Oct 2006 A1
20060224852 Kottomtharayil et al. Oct 2006 A1
20060265396 Raman et al. Nov 2006 A1
20060271935 Cox et al. Nov 2006 A1
20060282900 Johnson et al. Dec 2006 A1
20070014347 Prechtl et al. Jan 2007 A1
20070016750 Suzuki Jan 2007 A1
20070022122 Bahar et al. Jan 2007 A1
20070022145 Kavuri Jan 2007 A1
20070028229 Knatcher Feb 2007 A1
20070043715 Kaushik et al. Feb 2007 A1
20070061266 Moore et al. Mar 2007 A1
20070061298 Wilson et al. Mar 2007 A1
20070067595 Ghose Mar 2007 A1
20070136541 Herz et al. Jun 2007 A1
20070143238 Kochunni et al. Jun 2007 A1
20070143497 Kottomtharayil et al. Jun 2007 A1
20070156783 Zbogar-Smith et al. Jul 2007 A1
20070166674 Kochunni et al. Jul 2007 A1
20070174246 Sigurdsson et al. Jul 2007 A1
20070185915 Prahlad et al. Aug 2007 A1
20070208788 Chakravarty et al. Sep 2007 A1
20070214330 Minami et al. Sep 2007 A1
20070226320 Hager et al. Sep 2007 A1
20070226535 Gokhale Sep 2007 A1
20070244894 St. Jacques Oct 2007 A1
20070250810 Tittizer et al. Oct 2007 A1
20070288861 Tabellion et al. Dec 2007 A1
20070296258 Calvert et al. Dec 2007 A1
20080016310 Ghosal et al. Jan 2008 A1
20080022003 Alve Jan 2008 A1
20080033903 Carol et al. Feb 2008 A1
20080091655 Gokhale et al. Apr 2008 A1
20080126302 Mora et al. May 2008 A1
20080229037 Bunte et al. Sep 2008 A1
20080243855 Prahlad et al. Oct 2008 A1
20080243958 Prahlad et al. Oct 2008 A1
20080263565 Luther Oct 2008 A1
20080282048 Miura Nov 2008 A1
20080288947 Gokhale et al. Nov 2008 A1
20080288948 Attarde et al. Nov 2008 A1
20080320319 Muller et al. Dec 2008 A1
20090171883 Kochunni et al. Jul 2009 A1
20090177719 Kavuri Jul 2009 A1
20090187908 He et al. Jul 2009 A1
20090228531 Baumann et al. Sep 2009 A1
20090319534 Gokhale Dec 2009 A1
20090319585 Gokhale Dec 2009 A1
20090320029 Kottomtharavil Dec 2009 A1
20090320037 Gokhale et al. Dec 2009 A1
20100005259 Prahlad et al. Jan 2010 A1
20100031017 Gokhale et al. Feb 2010 A1
20100036772 Arceneaux Feb 2010 A1
20100070466 Prahlad et al. Mar 2010 A1
20100070474 Lad Mar 2010 A1
20100070725 Prahlad et al. Mar 2010 A1
20100070726 Nao et al. Mar 2010 A1
20100076932 Lad Mar 2010 A1
20100114837 Prahlad et al. May 2010 A1
20100125477 Mousseau et al. May 2010 A1
20100180332 Ben-Yochanan et al. Jul 2010 A1
20100205582 Liu Aug 2010 A1
20100262911 Kaplan et al. Oct 2010 A1
20100306283 Johnson et al. Dec 2010 A1
20100306643 Chabot et al. Dec 2010 A1
20100332401 Prahlad et al. Dec 2010 A1
20100332456 Prahlad et al. Dec 2010 A1
20110016091 Prahlad et al. Jan 2011 A1
20110069179 Bathiche et al. Mar 2011 A1
20110093471 Brockway et al. Apr 2011 A1
20110138225 Gunabalasubramaniam et al. Jun 2011 A1
20110161299 Prahlad et al. Jun 2011 A1
20110173171 De Meno et al. Jul 2011 A1
20110173207 Kottomtharavil et al. Jul 2011 A1
20110302141 Nadathur et al. Dec 2011 A1
20120011515 Jolfaei et al. Jan 2012 A1
20120084782 Chou et al. Apr 2012 A1
20120150818 Vijayan Retnanuna et al. Jun 2012 A1
20120150826 Vijayan Retnanuna et al. Jun 2012 A1
20120254116 Thereska et al. Oct 2012 A1
20120254824 Bansod Oct 2012 A1
20120263191 Baron Oct 2012 A1
20120265754 Kottomtharayil et al. Oct 2012 A1
20120272205 Fox et al. Oct 2012 A1
20120275598 Vimpari et al. Nov 2012 A1
20120317085 Green et al. Dec 2012 A1
20130006625 Gunatilake et al. Jan 2013 A1
20130007710 Vedula et al. Jan 2013 A1
20130024429 Raas Jan 2013 A1
20130024568 Popczynski et al. Jan 2013 A1
20130104027 Bennett et al. Apr 2013 A1
20130110854 Lockhart et al. May 2013 A1
20130136253 Liberman Ben-Ami et al. May 2013 A1
20130145376 Gokhale et al. Jun 2013 A1
20130219458 Ramanathan Aug 2013 A1
20130232184 Grube et al. Sep 2013 A1
20130238562 Kumarasarny et al. Sep 2013 A1
20130238969 Smith et al. Sep 2013 A1
20130262387 Varadharajan et al. Oct 2013 A1
20130262410 Liu et al. Oct 2013 A1
20130262706 Stahlberg et al. Oct 2013 A1
20140007109 De Meno et al. Jan 2014 A1
20140026000 Ma et al. Jan 2014 A1
20140040210 Avery et al. Feb 2014 A1
20140046900 Kumarasarny et al. Feb 2014 A1
20140086127 Kim et al. Mar 2014 A1
20140108351 Nallatharnbi et al. Apr 2014 A1
20140108355 Prahlad et al. Apr 2014 A1
20140108470 Lad Apr 2014 A1
20140188804 Gokhale et al. Jul 2014 A1
20140250076 Lad Sep 2014 A1
20140258236 Vijayan Sep 2014 A1
20140279922 Kottomtharayil Sep 2014 A1
20140281214 Rehm et al. Sep 2014 A1
20140365443 Goel et al. Dec 2014 A1
20150081948 Thereska et al. Mar 2015 A1
20150193229 Bansod Jul 2015 A1
20150227355 Tripoli et al. Aug 2015 A1
20150234879 Baldwin et al. Aug 2015 A1
20150244775 Vibhor et al. Aug 2015 A1
20150256617 Klose et al. Sep 2015 A1
20150278024 Barman et al. Oct 2015 A1
20150301903 Mutha et al. Oct 2015 A1
20150324226 Gokhale et al. Nov 2015 A1
20150324233 Gokhale et al. Nov 2015 A1
20150324255 Kochunni et al. Nov 2015 A1
20150331899 Gokhale et al. Nov 2015 A1
20150347238 Kumarasamy et al. Dec 2015 A1
20160110266 Nara et al. Apr 2016 A1
20160112407 Nara et al. Apr 2016 A1
20160224384 Gokhale et al. Aug 2016 A1
20160350029 Nara et al. Dec 2016 A1
20170024152 Bhagi et al. Jan 2017 A1
20170024286 Vijayan Jan 2017 A1
20170160970 Gokhale et al. Jun 2017 A1
20170160971 Gokhale et al. Jun 2017 A1
20170206112 Gokhale et al. Jul 2017 A1
20180039550 Gokhale et al. Feb 2018 A1
Foreign Referenced Citations (22)
Number Date Country
0405926 Jan 1991 EP
0467546 Jan 1992 EP
0774715 May 1997 EP
0809184 Nov 1997 EP
0259912 Mar 1998 EP
0899662 Mar 1999 EP
0910019 Apr 1999 EP
0981090 Feb 2000 EP
0986011 Mar 2000 EP
1035690 Sep 2000 EP
2216368 Oct 1989 GB
07-046271 Feb 1995 JP
7073080 Mar 1995 JP
8044598 Feb 1996 JP
2000035969 Feb 2000 JP
2003531435 Oct 2003 JP
WO 9513580 May 1995 WO
WO 9912098 Mar 1999 WO
WO 0058865 Oct 2000 WO
WO 0106368 Jan 2001 WO
WO 0116693 Mar 2001 WO
WO 0180005 Oct 2001 WO
Non-Patent Literature Citations (23)
Entry
U.S. Appl. No. 09/609,977, filed Jul. 5, 2000, Prahlad.
“Multi Instancing,” retrieved from http://documentation.commvault.com/hds/release_8_0_0/books_online_I/english_us/deployment/install/misc/multi_instancing.htm[Feb. 18, 2014 11:57:19 AM] on Feb. 18, 2014, 3 pages.
Armstead et al., “Implementation of a Carnpwide Distributed Mass Storage Service: The Dream vs. Reality,” IEEE, Sep. 11-14, 1995, pp. 190-199.
Arneson, “Mass Storage Archiving in Network Environments,” Digest of Papers, Ninth IEEE Symposium on Mass Storage Systems, Oct. 31, 1988-Nov. 3, 1988, pp. 45-50, Monterey, CA.
Cabrera et al., “ADSM: A Multi-Platform, Scalable, Backup and Archive Mass Storage System,” Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Conference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA.
Eitel, “Backup and Storage Management in Distributed Heterogeneous Environments,” IEEE, Jun. 12-16, 1994, pp. 124-126.
Extended European Search Report for Application No. EP 09767119, dated Feb. 11, 2013, 12 pages.
Gait, J., “The Optical File Cabinet: A Random-Access File System for Write-Once Optical Disks,” IEEE Computer, vol. 21, No. 6, pp. 11-22 (Jun. 1988).
Hennessy et al., “Computer Architecture—A Quantitative Approach”, 2nd Edition, 1996, pp. 246-250.
Hutchinson, Norman C., et al. “Logical vs. physical file system backup.” OSDI. vol. 99. 1999, 12 pages.
Jander, M., “Launching Storage-Area Net,” Data Communications, US, McGraw Hill, NY, vol. 27, No. 4 (Mar. 21, 1998), pp. 64-72.
Matthews, Jeanna, et al. “Data protection and rapid recovery from attack with a virtual private file server and virtual machine appliances.” Proceedings of the lasted International Conference on Communication, Network and Information Security (CNIS 2005). 2005, 14 pages.
Microsoft Press Computer Dictionary Third Edition, “Data Compression,” Microsoft Press, 1997, p. 130.
PCT International Search Report for International Application No. PCT/US09/32325, dated Mar. 17, 2009, 11 pages.
Pitoura et al., “Locating Objects in Mobile Computing”, IEEE Transactions on Knowledge and Data Engineering, vol. 13, No. 4, Jul./Aug. 2001, pp. 571-592.
Prigge, “Review: ExaGrid aces disk-to-disk backup,” Jan. 3, 2013, InfoWorld, 12 pages.
Quinlan, Sean. “A cached worm file system.” Software: Practice and Experience 21.12 (1991 ): 1289-1299.
Rosenblum et al., “The Design and Implementation of a Log Structured File System,” Operating Systems Review SIGOPS, vol. 25, No. 5, New York, US, pp. 1-15 (May 1991).
Rowe et al., “Indexes for User Access to Large Video Databases”, Storage and Retrieval for Image and Video Databases II, IS,& T/SPIE Symp. On Elec. Imaging Sci. & Tech., Feb. 1994, pp. 1-12.
Veeravalli, B., “Network Caching Strategies for a Shared Data Distribution for a Predefined Service Demand Sequence,” IEEE Transactions on Knowledge and Data Engineering, vol. 15, No. 6, Nov./Dec. 2003, pp. 1487-1497.
Wu, Chin-Hsien, Tei-Wei Kuo, and Li-Pin Chang. “Efficient initialization and crash recovery for log-based file systems over flash memory.” Proceedings of the 2006 ACM symposium on Applied Computing. ACM, 2006, 5 pages.
Hsiao, David K., “Federated databases and systems: part i-a tutorial on tehri data sharing.” The VLDB Journal 1.1 (1992): 127-179.
Pollack, et al., “Quota enforcement for high-performance distributed storage systems,” 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), Sep. 24-27, 2007, pp. 72-86.
Related Publications (1)
Number Date Country
20180357103 A1 Dec 2018 US
Continuations (4)
Number Date Country
Parent 15476828 Mar 2017 US
Child 16009135 US
Parent 15013515 Feb 2016 US
Child 15476828 US
Parent 13736318 Jan 2013 US
Child 15013515 US
Parent 12142445 Jun 2008 US
Child 13736318 US