Distributed deduplicated storage system

Information

  • Patent Grant
  • 11422976
  • Patent Number
    11,422,976
  • Date Filed
    Monday, July 6, 2020
    4 years ago
  • Date Issued
    Tuesday, August 23, 2022
    2 years ago
Abstract
A distributed, deduplicated storage system according to certain embodiments is arranged in a parallel configuration including multiple deduplication nodes. Deduplicated data is distributed across the deduplication nodes. The deduplication nodes can be networked together and communicate with one another according using a light-weight, customized communication scheme (e.g., a scheme based on FTP or HTTP). In some cases, deduplication management information including deduplication signatures and/or other metadata is stored separately from the deduplicated data in deduplication management nodes, improving performance and scalability.
Description
BACKGROUND

Computers have become an integral part of business operations such that many banks, insurance companies, brokerage firms, financial service providers, and a variety of other businesses rely on computer networks to store, manipulate, and display information that is constantly subject to change. Oftentimes, the success or failure of an important transaction may turn on the availability of information that is both accurate and current. Accordingly, businesses worldwide recognize the commercial value of their data and seek reliable, cost-effective ways to protect the information stored on their computer networks.


In corporate environments, protecting information is generally part of a routine process that is performed for many computer systems within an organization. For example, a company might back up critical computing systems related to e-commerce such as databases, file servers, web servers, and so on as part of a daily, weekly, or monthly maintenance schedule. The company may also protect computing systems used by each of its employees, such as those used by an accounting department, marketing department, engineering department, and so forth.


As such, enterprises are generating ever increasing volumes of data and corresponding storage requirements. Moreover, enterprise storage systems are typically distributed over one or more networks, such as where backup storage is remote from client computers. In such situations, backup storage operations place heavy demands on available network bandwidth.


SUMMARY

In response to these challenges, one technique developed by storage system providers is data deduplication. Deduplication typically involves eliminating or reducing the amount of redundant data stored and communicated within a storage system, improving storage utilization. For example, data can be divided into units of a chosen granularity (e.g., files or data blocks). As new data enters the system, the data units can be checked to see if they already exist in the storage system. If the data unit already exists, instead of storing and/or communicating a duplicate copy, the storage system stores and/or communicates a reference to the existing data segment.


Thus, deduplication can improve storage utilization, system traffic (e.g., over a networked storage system), or both. Deduplication techniques designed to reduce the demands on storage systems during storage operations such as backup and/or replication operations can be found in the following U.S. patent applications, each of which is incorporated by reference in its entirety. One or more embodiments of the present disclosure may be used with systems and methods disclosed therein:

    • U.S. patent application Ser. No. 12/982,086, entitled “Content Aligned Block-Based Deduplication,” filed Dec. 30, 2010;
    • U.S. patent application Ser. No. 12/982,100, entitled “Systems and Methods for Retaining and Using Block Signatures in Data Protection Operations,” filed Dec. 30, 2010
    • U.S. patent application Ser. No. 13/324,817, entitled “Client-Side Repository in a Networked, Deduplicated Storage System” filed Dec. 13, 2011;
    • U.S. patent application Ser. No. 12/145,347, entitled “Application-Aware and Remote Single Instance Data Management,” filed Jun. 24, 2008;
    • U.S. patent application Ser. No. 12/145,342, entitled “Application-Aware and Remote Single Instance Data Management,” filed Jun. 24, 2008; and
    • U.S. patent application Ser. No. 12/725,288, entitled “Extensible Data Deduplication System and Method,” filed Mar. 16, 2010.


In addition, one or more embodiments of the present disclosure may also be used with systems and methods disclosed in the following patents, each of which is hereby incorporated herein by reference in its entirety:

    • U.S. Pat. No. 7,389,311, entitled “Hierarchical Backup and Retrieval System,” issued Jun. 17, 2008;
    • U.S. Pat. No. 6,418,478, entitled “Pipelined High Speed Data Transfer Mechanism,” issued Jul. 9, 2002;
    • U.S. Pat. No. 7,035,880, entitled “Modular Backup and Retrieval System Used in Conjunction with a Storage Area Network,” issued Apr. 25, 2006;
    • U.S. Pat. No. 6,542,972, entitled “Logical View and Access to Physical Storage in Modular Data and Storage Management System,” issued Apr. 1, 2003;
    • U.S. Pat. No. 6,658,436, entitled “Logical View and Access to Data Manage by a Modular Data and Storage Management System,” issued Dec. 2, 2003;
    • U.S. Pat. No. 7,130,970, entitled “Dynamic Storage Device Pooling in a Computer System,” issued Oct. 10, 2006;
    • U.S. Pat. No. 7,246,207, entitled “System and Method for Dynamically Performing Storage Operations in a Computer Network,” issued Jul. 17, 2007;
    • U.S. Pat. No. 7,454,569, entitled “Hierarchical System and Method for Performing Storage Operations in a Computer Network,” issued Nov. 18, 2008;
    • U.S. Pat. No. 7,613,748, entitled “System and Method for Containerized Data Storage and Tracking,” issued Nov. 3, 2009; and
    • U.S. Pat. No. 7,620,710, entitled “Systems and Methods for Performing Multi-Path Storage Operations,” issued Nov. 17, 2009.


In those systems employing deduplication, as the amount of data increases, the amount of computational and storage overhead involved in managing the deduplication process can become quite significant. For example, as the amount of data increases, there is a corresponding increase in the number of deduplication data blocks (or other deduplication data units) to maintain. Moreover, such systems often calculate and store signatures (e.g., hashes of the data blocks) associated with each data block which are used to identify and remove redundant data blocks, presenting further capacity and maintenance challenges.


In order to address such challenges, a deduplicated storage system is provided according to certain embodiments that distributes deduplicated data across multiple, networked deduplication nodes. As will be described in greater detail, the deduplication nodes can communicate with one another using a light-weight, customized communication scheme. Using multiple, distributed deduplication nodes will generally be referred to as “parallel deduplication” throughout the disclosure. And, in some cases, deduplication management information is stored separately from the deduplicated data, in separate, special purpose networked storage nodes, for example. Management information can include, without limitation, data block signatures and associated metadata, and mappings of deduplicated files including pointers to data blocks making up the respective files and/or data block location information. The management information can also be distributed across multiple management nodes in a manner similar to the deduplicated data. The distributed nature of the deduplicated data and/or management information enhances scalability, among providing other benefits.


Importantly, because the data blocks are stored and managed separately from the deduplication management information, system designers can tailor the system components according to their specialized purposes. For example, management information generally requires relatively less storage capacity than the data blocks, but is accessed relatively more frequently, for lookup purposes and the like. Thus, the management information can be stored in components having relatively faster access speeds and/or relatively less storage capacity than the storage used to store the data blocks. On the other hand, because the data blocks generally require more storage capacity and are accessed with relatively low frequency, they can be maintained in storage having relatively higher capacity and/or lower access speeds than the storage used to store the management information.


Additionally, because the management and data functionality in parallel deduplication systems are separated from one another, such systems are generally modular, and readily adaptable to increased data requirements than typical systems.


Moreover, the data blocks and management information in parallel deduplication systems described herein can be distributed amongst multiple, networked components. For example, multiple networked computers (deduplication nodes) each having associated storage can be used in such systems to increase storage capacity. Thus, data blocks making up a single file (or other data unit) may be distributed across multiple deduplication nodes. This can present further challenges, however, as the networked deduplication nodes are then called on to efficiently communicate across the network with one another in carrying out data storage operations. As one example, such communication may be employed to restore a requested file comprised of data blocks that are spread across multiple deduplication nodes.


In order to facilitate such communication, one approach is to mount a networked file system across the deduplication nodes. For example, a shared static mount path may be shared across multiple deduplication nodes via network sharing using a sharing protocol such as Network File System protocol (NFS), Common Internet File System Protocol (CIFS), Universal Naming Convention Shares (UNC Shares), and the like. Such an approach can provide the advantage that data stored on remote deduplication nodes is accessible to a requesting node generally as if it were locally stored. However, there can be significant overhead in maintaining operating system (OS) specific information, file structure information, username and password information, etc., associated with such techniques.


In accordance with certain aspects of the disclosure, another technique developed to address these challenges includes utilizing an ad-hoc communication scheme for communication between deduplication nodes, without mounting a networked file system, for example. Using such a scheme, one deduplication node can retrieve a requested data block from another deduplication node storing the requested data block without using network shares, for example. In this manner, the overhead associated with maintaining a mounted networked file system is avoided, and the burden on the system administrator is greatly reduced.


In certain embodiments, the ad-hoc communication scheme utilizes a client-server based protocol such as file transfer protocol (FTP), although other types of communication protocols can be used, such as hyper-text transfer protocol (HTTP), for example. For example, a suite of customized service routines built on such protocols can be provided for performing data access operations between the deduplication nodes. Such techniques can advantageously provide a light-weight, low maintenance networked file system tailored for deduplication purposes.


In certain embodiments, a method of performing a storage operation in a distributed deduplicated storage system is provided. The method includes receiving a request for a file comprised of a plurality of data blocks, the request received at a first data deduplication node of a plurality of data deduplication nodes in communication with one another via a network, data blocks corresponding to a plurality of deduplicated files distributed across the data deduplication nodes. The method can further include, using one or more processors and in response to the request, for each of the plurality of data blocks in the received file, accessing the data block from the first data deduplication node if a copy of the data block already exists at the first data deduplication node. If the data block does not already exist at the first data deduplication node, the method can further include requesting the data block from another data deduplication node storing a copy of the data block. The requesting may be performed using a data block server executing on the first data deduplication node.


In certain embodiments, a distributed deduplicated storage system is provided, including a plurality of data deduplication nodes in communication with one another via a network, data blocks corresponding to a plurality of deduplicated files distributed across the data deduplication nodes. The system may further include a storage manager module executing in one or more processors and configured to receive a request for a file comprised of a plurality of data blocks, the request received at a first data deduplication node of the plurality of deduplication nodes. The storage manager module may further be configured to, in response to the request and for each of the plurality of data blocks in the received file, access the data block from the first data deduplication node if a copy of the data block already exists at the first data deduplication node. If the data block does not already exist at the first data deduplication node, the storage manager module may request the data block from another data deduplication node storing a copy of the data block, the request performed using a data block server executing on the first data deduplication node.





DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram that illustrates components of an example storage system configured to implement deduplication techniques compatible with embodiments of the invention.



FIG. 2 illustrates a block diagram of an example network storage architecture.



FIGS. 3A-3B are data flow diagrams illustrative of the interaction between the various components of an example parallel deduplicated storage system with respect to example backup and restore operations, respectively.



FIG. 4 is a flow diagram illustrative of one embodiment of a routine implemented by a parallel deduplicated storage system for processing a storage request and storing a file to the backup storage system.



FIG. 5 is a flow diagram illustrative of one embodiment of a routine implemented by a parallel deduplicated storage system for processing a restore request and restoring data to a client.





DETAILED DESCRIPTION

Overview


Generally described, the present disclosure is directed to a system, method, and computer-readable non-transitory storage medium for storing data to and restoring data from a storage system including a deduplication database. Although various aspects of the disclosure will be described with regard to examples and embodiments, one skilled in the art will appreciate that the disclosed embodiments and examples should not be construed as limiting.


In accordance with aspects described herein, data is broken up into data blocks, or data segments for processing. For example, the data blocks can be used for the purposes of removing duplicate data blocks and replacing them with references to the data blocks during data deduplication. Thus, a data block refers to a portion of data. The data blocks can vary in size based on system preferences. While other compatible data reduction techniques are possible, the embodiments described herein are described primarily in relation to data deduplication for clarity. Moreover, certain aspects described herein are compatible with systems that do not incorporate data reduction techniques.


In order to identify data blocks, various functions can be performed on individual data blocks to generate a unique or substantially unique signature corresponding to the data block. For example, signature functions, such as hash functions, and the like can be used, as described in greater detail in the applications incorporated by reference herein, such as, for example, the application entitled “Content-Aligned Block-Based Deduplication.” Any number of different hash functions or other functions can be performed on the data blocks, such as SHA-512, for example. The hash, or signatures, can be used for a variety of purposes. For example, the signature can be used to determine if two data blocks contain the same data for the purposes of deduplication. In this way, the signature can be used to efficiently determine whether a data block exists in the storage system. Furthermore, the signature can be calculated using any of the components described below including, but not limited to, a client, a storage manager, a data media agent, a deduplication database media agent (DDBMA), and the like.


As described in further detail below with respect to FIGS. 3-5, the description further describes certain embodiments for storing data from a client to a destination storage system (e.g., for backup or replication), and where the deduplicated storage system is advantageously arranged in a parallel configuration. For example, the data is broken up into data blocks and stored in one or more data media agents (DMA) and/or storage devices. On the other hand, management information such as the signatures of the data blocks and location information related to the data blocks is stored separately in one or more deduplication database media agents (DDBMA). Moreover, as described according to yet other aspects, multiple data media agents are networked together and communicate with one another according using a light-weight, customized communication scheme.


Initially, an overview of a deduplication system and a networked file system compatible with embodiments described herein is provided with respect to FIGS. 1 and 2, respectively.


As used herein, it is to be understood that the term file can refer to multiple files or an entire storage media. Thus, the term file is to be understood as data generally. Illustrative explanations of several terms used throughout the disclosure are provided herein. While these meanings apply to the respective terms as used with respect to certain embodiments, it will be appreciated that the meanings can vary depending on the embodiment. Additionally, the meanings of these and other terms used herein will be understood in view of their usage throughout the entirety of the disclosure.


Deduplication Overview



FIG. 1 is a block diagram that illustrates components of an example storage system 100 configured to implement deduplication techniques compatible with embodiments of the invention. The deduplication system 100 contains a block generation module 110, a signature generation module 120, a signature comparison module 130, a deduplication database (DDB) component 140, a storage manager module 150, a remote synchronization module 160, and a data packaging module 170.


The block generation module 110 generally operates on incoming data to break the data up into blocks which are then processed for deduplication. In various embodiments, the block generation module 110 can create blocks according to a number of policies. In some embodiments, for example, the blocks comprise fixed length segments of data. In other embodiments, blocks have variable lengths. According to certain embodiments, the block generation module 110 aligns the blocks intelligently based on the data content. Such techniques can increase the likelihood that generated blocks will contain duplicate data, thereby improving the amount of data reduction achieved via deduplication. Whether variable or fixed, a variety of block lengths are possible. For example, blocks can be 32 kilobytes (kB), 64 kB, 128 kB, 512 kB, or some other value.


The signature generation module 120 generates a substantially unique signature or identifier of a block. The signature, which is used to determine if another block is already stored at the relevant storage system location matches the block used to generate the signature. The signature comparison module 130 performs comparisons of the generated signatures of previously received and/or stored blocks to determine if they contain the same data (or, in some other embodiments, substantially similar data) as existing blocks. The results of the comparison indicate whether the previously received blocks are candidates for deduplication.


The signature generation module 120 may generate, and the signature comparison module 130 may thus compare, a variety of substantially unique signature types. In one embodiment, for example, the signature is a hash value. In other embodiments, the signature can be a message digest, checksum, digital fingerprint, digital signature or other sequence of bytes that substantially uniquely identifies the relevant data block. The term “substantially” is used to modify the term “unique identifier” because algorithms used to produce hash values may result in collisions, where two different files or data objects result in the same hash value. However, depending upon the algorithm or cryptographic hash function used, collisions should be suitably rare and thus the signature generated for block should be unique throughout the storage system 100.


The deduplication database 140 (DDB) is a data store that contains entries identifying data managed by the deduplication system 100, and may also contain supplemental information associated with files and/or blocks, such as signatures, paths, locations, reference counts, file sizes, or other information.


The storage operation manager module 150 coordinates storage operations and invokes the other modules of the storage system 100 as needed to perform requested storage operations. For example, the storage manager module 150 may include an application used by an administrator to manage the system 100. The storage operation manager module 150 may also maintain indexes of the data objects and each of the references to those data objects through the system 100, as well as pending operations on the data objects that are part of a data management plan of an organization implementing the storage system 100.


The storage system 100 can be a networked storage system configured to perform deduplication at one or more nodes in the system 100, and one or more of the components of the system 100 may be distributed across or instantiated at multiple nodes in the system.


Additionally, the system 100 can reduce the amount of data communicated across the network using deduplication techniques. For example, the synchronization module 160 performs deduplication between locations that are remote from one another, such as between a backup storage system and a secondary backup storage system, between a backup storage system and secondary backup storage, between a client system and a backup storage system, between an enterprise or organization having a headquarters or central office and one or more satellite or remote offices, and the like.


The synchronization module 160 can use the techniques described in further detail herein to determine whether a block should be communicated between the remote locations, or whether only a reference to the block should be communicated instead. As used in this context, the term “remote” can mean the modules are at different locations on the network, are physically or logically removed from one another, etc.


The data packaging module 170 can be generally configured to format data in the storage system 100 in an intelligent manner. For example, the data packaging module 170 according to certain embodiments generally associates and writes signature values along with the corresponding data blocks and/or block references. As is described in greater detail herein, associating and storing the signatures and/or references along with the data blocks can improve system performance.


As described in greater detail herein, redundant data may be detected and reduced at several locations throughout the system and/or times throughout the operation of the system. The embodiments provided herein only as examples, and are not intended to be an exhaustive list of the way in which the system can be implemented. In general, the systems and methods described with respect to any FIGS. 2, 3A, and 3B may include or be performed by the modules included in the system 100 of FIG. 1.


Networked Storage System Overview



FIG. 2 illustrates a block diagram of an example network storage architecture compatible with embodiments described herein. For example, in certain embodiments, one or more of the components of the storage system 100 shown in FIG. 1 are implemented on a networked storage system such as the one shown in FIG. 2. The system 200 is configured to perform storage operations on electronic data in a computer network. As shown, the system includes a storage manager 200 and one or more of the following: a client 285, an information store 290, a data agent 295, a media agent 205, an index cache 210, and a storage device 215. In addition, the storage system can also include one or more index caches as part of the media agent 205 and/or the storage manager 200. The index caches can indicate logical associations between components of the system, user preferences, management tasks, and other useful data, as described in greater detail in application Ser. No. 10/818,749, now U.S. Pat. No. 7,246,207, issued Jul. 17, 1007, herein incorporated by reference in its entirety.


As illustrated, the client computer 285 can be communicatively coupled with the information store 290, and/or the storage manager 200. The information store contains data associated with the client 285. Although not illustrated in FIG. 2, the client 285 can also be in direct communication with the media agent 205 and/or the backup storage device 215. For simplicity, and not to be construed as limiting, the components of storage system 100 are illustrated as communicating indirectly via the storage manager 200. However, all components of the storage system 100 can be in direct communication with each other or communicate indirectly via the client 285, the storage manager 200, the media agent 205, or the like.


With further reference to FIG. 1, the client computer 285 (also generally referred to as a client) contains data in the information store 290 that can be backed up in and then restored from the backup storage device 215. In an illustrative embodiment, the client 285 can correspond to a wide variety of computing devices including personal computing devices, laptop computing devices, hand-held computing devices, terminal computing devices, mobile devices, wireless devices, various electronic devices, appliances and the like. In an illustrative embodiment, the client 285 includes necessary hardware and software components for establishing communication with the other components of storage system 100. For example, the client 285 can be equipped with networking equipment and browser software applications that facilitate communication with the rest of the components from storage system 100. Although not illustrated in FIG. 1, each client 285, can also display a user interface. The user interface can include various menus and fields for entering storage and restore options. The user interface can further present the results of any processing performed by the storage manager 200 in an easy to understand format.


A data agent 295 can be a software module that is generally responsible for archiving, migrating, and recovering data of a client computer 285 stored in an information store 290 or other memory location. Each client computer 285 has at least one data agent 295 and the storage system can support many client computers 285. The storage system provides a plurality of data agents 295 each of which is intended to backup, migrate, and recover data associated with a different application. For example, different individual data agents 295 may be designed to handle Microsoft Exchange™ data, Microsoft Windows file system data, and other types of data known in the art. If a client computer 285 has two or more types of data, one data agent 295 may be implemented for each data type to archive, migrate, and restore the client computer 285 data.


The storage manager 200 is generally a software module or application that coordinates and controls the system. The storage manager 200 communicates with all elements of the storage system 100 including the client computers 102, data agents 295, the media agents 205, and the backup storage devices 215, to initiate and manage system backups, migrations, recoveries, and the like. The storage manager 200 can be located within the client 285, the media agent 205, or can be a software module within a separate computing device. In other words, the media agent 205 and/or the client 285 can include a storage manager module. In one embodiment, the storage manager 200 is located in close proximity to the client 285 and communicates with the client 285 via a LAN. In another embodiment, the storage manager 200 communicates with the client 285 via a WAN. Similarly, in one embodiment, the storage manager 200 communicates with the media agent 205 via a LAN, and in another embodiment communicates with the media agent 205 via a WAN.


The storage manager 200 can also deduplicate the data that is being backed up in storage device 215. For example, the storage manager 200 can analyze individual data blocks being backed up, and replace duplicate data blocks with pointers to other data blocks already stored in the backup storage device 215. To identify duplicate data blocks, the storage manager 200 can perform hash functions, on each data block. The hash functions of the different data blocks can be compared. Matching hashes of different data blocks can indicate duplicate data, which can be replaced with a pointer to previously stored data. Additional detail regarding deduplicating data is provided in the applications incorporated by reference herein. Other components of storage system 100 can perform the deduplication techniques on the data blocks, such as the media agent 205, the client 285, and/or the storage device 215.


A media agent 205 is generally a software module that conducts data, as directed by the storage manager 200, between locations in the storage system 100. For example, the media agent 205 may conduct data between the client computer 285 and one or more backup storage devices 215, between two or more backup storage devices 215, etc. Although not shown in FIG. 1, one or more of the media agents 205 can also be communicatively coupled to one another. In some embodiments, the media agent communicates with the storage manager 200 via a LAN or SAN. In other embodiments, the media agent 205 communicates with the storage manager 200 via a WAN. The media agent 205 generally communicates with the backup storage devices 215 via a local bus. In some embodiments, the backup storage device 215 is communicatively coupled to the media agent(s) 112 via a Storage Area Network (“SAN”).


The backup storage devices 215 can include a tape library, a magnetic media backup storage device, an optical media backup storage device, or other backup storage device. The backup storage devices 215 can further store the data according to a deduplication schema as discussed above. The storage devices 215 can also include a signature block corresponding to each stored data block.


Further embodiments of storage systems such as the one shown in FIG. 2 are described in application Ser. No. 10/818,749, now U.S. Pat. No. 7,246,207, issued Jul. 17, 2007, which is hereby incorporated by reference in its entirety. In various embodiments, components of the storage system may be distributed amongst multiple computers, or one or more of the components may reside and execute on the same computer.


Furthermore, components of the storage system of FIG. 2 can also communicate with each other via a computer network. For example, the network may comprise a public network such as the Internet, virtual private network (VPN), token ring or TCP/IP based network, wide area network (WAN), local area network (LAN), an intranet network, point-to-point link, a wireless network, cellular network, wireless data transmission system, two-way cable system, interactive kiosk network, satellite network, broadband network, baseband network, combinations of the same or the like.


Additionally, the various components of FIG. 2 may be configured for deduplication. For example, one or more of the clients 285 can include a deduplicated database (DDB). The data stored in the storage devices 215 may also be deduplicated. For example, one or more of the media agents 205 associated with the respective storage devices 215 can manage the deduplication of data in the storage devices 215.


Example Parallel Deduplicated Storage System



FIGS. 3A-3B are data flow diagrams illustrative of the interaction between the various components of an example parallel storage system with respect to example backup and restore operations, respectively. While described with respect to backup for the purposes of illustration, the techniques described herein are compatible with other types of storage operations, such as, for example, replication, snapshots, archiving and the like. A description of some storage operations compatible with embodiments described herein is provided near the end of this disclosure.


As illustrated, the example storage environment includes a client 302 with a local storage device 303, deduplication database media agents 304A, 304B (one or both may be referred to generically as “DDBMA 304”), deduplication databases 306A, 306B each associated with one of the DDBMAs (one or both may be referred to generically as “DDB 306”), and data media agents 310A-310C (one or more may be referred to generically as “DMA 308”) each with its own local storage device(s) 310A-310C (one or more may be referred to generically as “local storage 310”), respectively. Client 302 can be similar to client 285 and local storage 303 can be similar to information store 290, both of which are described in greater detail above with reference to FIG. 2. While a single client 302 is shown for the purpose of illustration, there may be more than one client in other embodiments. Similarly, there can be other numbers of DDBMAs (e.g., one, three or more) and DMAs (e.g., one, four or more). Additionally, in certain other embodiments, some of the components shown in FIGS. 3A-3B shown as separate components can reside on a single computing device. In one embodiment, for example, the functionality of the DDBMA 306A and the DMA 308A are implemented on a first computing device, and the functionality of the DDBMA 306B and the DMA 306B are implemented on another computing device.


Each component of the backup storage environment can be in direct communication with one or more of the other components or, alternatively, can communicate indirectly with one or more of the other components (e.g., via the client 302, the DDBMA 304, or DMA 308). Alternatively, the various components can communicate via a storage manager, which is not illustrated.


The deduplicated data blocks (or other units) of the illustrated example are stored separately from the deduplication management information according to the parallel deduplication architecture, providing a number of advantages, such as those touched on above. The DDBMAs 304 store deduplication management information such as data block signatures (e.g., hashes) and storage location information for the data blocks stored in the backup storage system, which is also referred to throughout the disclosure as a link. The DMA 308, on the other hand, store the data blocks themselves.


Generally, deduplication management information can include any appropriate information used to manage the deduplication process. As an example, in addition to deduplication signatures, the management information can further include metadata related to the deduplicated blocks. For instance, a count value may be maintained for each deduplicated block that indicates the number of times the particular block is being used. As one example, if two files each include three instances of a particular block, and a third file includes one instance of the block, the count for that block would be seven. The management information can further include addresses or other location information related to the data blocks. As yet another example, the management information can include mappings of the individual deduplicated files including pointers to the data blocks making up the files and an indication as to the ordering of the data blocks.


As described above, the signature is generated using a hash function or some other function, and is used by the backup storage system to determine whether the data block already exists in the storage system, the location of data blocks within the backup storage system, and the like. As described, associated with each signature is location information, which is used by the backup storage system to locate and retrieve specific data blocks. In one embodiment, the link includes a media agent ID indicating which DMA 308 the data block is stored on, and a path ID, address and offset indicating where the data block stored on the particular DMA 308, The location information or link can generally include various types of DMA identifiers, directory names, filenames, address locations, pointers, offsets, and the like, which can aid the backup storage system in locating individual data blocks. The DMA identifiers can include a MAC addresses, IP addresses, router information, directory information, filenames and/or other alphanumeric identifiers capable of uniquely identifying the different DMA 308. Thus, the DDBMA 304 stores signatures and links to data blocks stored within the backup storage system. The links can include, without limitation, a signature associated with the block and identifiers indicative of the location of the data block. The locational identifiers can include positional information such as the relevant host, mount point, file identifier, offset and size of the block, etc.


As will be described in greater detail below, the DMA 308 use the links during storage operations to reference data blocks already stored in the backup storage system (i.e. redundant data blocks). The DMA 308 also use the links during restore operations to locate and retrieve data blocks stored in the backup storage system.


In the illustrated embodiment, the DMA 308 store files received from the client as a plurality of individual data blocks, such as when a file is transmitted to the DMA 308 for backup purposes. According to the parallel deduplication architecture, the data blocks associated with a specific file may be distributed across multiple DMAs 308.


As mentioned previously, the backup storage system can use various storage policies to determine which DMAs 308 store which data block. In one embodiment, the storage manager (not shown) selects a DMA 308 for backing up a particular file (or block(s) in a file) based on a predetermined storage policy, and sends the file to the selected DMA 308 for backup. For instance, the system may perform a modulo or other appropriate operation on the signature (e.g., hash) of the file (or block(s) in the file) and select the appropriate DMA based on the output of the operation.


Similarly, the storage system can use similar storage policies to identify a DMA 308 storing a file for the purposes of a restore operation. In one embodiment, the storage manager or other appropriate entity keeps track of which DMA 308 the file was written to during backup, and sends the restore request to that DMA 308.


With further reference to FIG. 3A, the interaction between the various components of the storage environment during a storage operation will now be described in greater detail with respect to data flow steps indicated by the numbered arrows.


The client 302 initiates a backup of a file stored in the local storage device 303 at data flow step 1. In the example, the DMA2 308B is selected as the backup location. For example, the DMA2 may be selected by a storage manager module (not shown) according to a particular predetermined policy. The file is broken up into data blocks, and the DMA2 performs a signature function on each data block.


In the example, each data block is sent to the DMA2 308B for storage, based on the predefined storage policy. Alternatively, only the signature is initially sent to the DMA2 308B. If it is determined that the data block is not stored in the backup storage system, the data block is sent as well.


Before storing a copy of each data block, the DMA2 308B first determines whether the data block is redundant and thus already stored in one of the DMAs 308 by consulting one of the DDBMAs 304. When a data block is stored in the storage system, the DDBMA 304 in which the link information is stored is selected according to a predetermined policy. Having knowledge of this policy, the DMA 308 can advantageously identify the appropriate DDBMA 304 to consult as to the presence of the data block, without having to unnecessarily consult any of the other DDBMA 304. In the example, the storage policy dictates that a modulo of the data block hash to select the appropriate DDBMA 304. Thus, the DMA2 308B performs a modulo operation on the hash of the data block and, based on the output of the modulo operation, selects the appropriate DDBMA 304 to consult. In the illustrated example there are two DDBMA, so the output of the modulo is in the set {0,1}. As indicated by data flow step 2, the output of the modulo directs the DMA2 308B to send the hash or other signature value to the DDBMA 306A. The DMA2 308B sends the signature of the data block to the DDBMA 304A. The DDBMA 304A compares the received signature with the signatures stored in the DDB 306A, and responds accordingly.


Alternatively, prior to sending the signature to the DDBMA 304A, the DMA2 308B checks a local signature repository, which includes the signatures of all the hashes stored in the local storage 310B, to determine if the data block is already stored locally.


A variety of other implementations are possible for determining which DDBMA to query regarding a data block. In another embodiment, the system includes ten DDBMA and uses modulo ten on the hash of the data block to determine which DDBMA to query regarding the data block. The outcome of the modulo operation will be {0,1,2,3,4,5,6,7,8,9}. Assuming the outcome of the modulo operation is 7, DDBMA 7 is queried. The modulo 10 of a subsequent hash may be 0, in which case DDBMA 0 is queried. Other functions other than a modulo may be used. Moreover, the backup storage system can divide the data blocks based on a modulo of the data block itself, based on frequency of use of the data blocks, pseudo-randomly, file type, client source, etc.


As indicated by data flow step 3, if the DDBMA 304A finds the signature in the DDB 306A, the DDBMA 304A responds to the DMA2 308B with a link indicating the location of the data block, which may be in the DMA2 308B itself, or another DMA 308A, 308C. Upon receiving the link, the DMA2 308B stores the link or other metadata representative to the data block in local storage 310B instead of storing the redundant data block itself, as indicated by data flow step 4.


Also as indicated by data flow step 3, in the event that the DDBMA 304A does not find the signature, the DDBMA 304A responds to the DMA2 308B indicating that the data block is not stored in the backup storage system. In turn, the DMA 306A proceeds to store the data block in the local storage 310B, as indicated by data flow step 4. The DMA2 308B may also send the signature of the data block as well as location information indicating where the data block is stored in the local storage 310B to the DDBMA 304A. Upon receiving the signature and the location information, the DDBMA 304A uses the location information to generate a link for the data block and stores the link and/or signature in DDB 306A for future reference.


Alternatively, once the DDBMA 304A determines that the data block is not stored in the backup storage system, it stores the signature in the DDB 306A before alerting the DMA2 308B that the data block is not stored in the backup storage device. In response, the DMA2 308B stores the data block, as discussed above, and sends the DDBMA 304A the location information. In turn, the DDBMA 304A generates the link and stores the link in the DDB 306A along with the already-stored signature. In addition to the examples provided, it will be appreciated that a variety of other handshaking mechanisms are possible between the DMA 308 and the DDBMA 304.


The remaining data blocks of the file are backed up to the DMA2 308B in a similar fashion, wherein the data blocks themselves are stored for new data blocks and links to redundant data blocks are stored in the local storage 310B, as appropriate.


Although the above-embodiment is described in terms of the client 302 sending files to the DMA2 308B and the DMA2 308B only interacting with the DDB 304A, it is to be understood that the client 302 can use any DMA 308 to store data blocks and that any DMA 308 can interact with any DDBMA 304 in determining where and when to store data blocks. Furthermore, a storage policy can be implemented to determine which files are sent to which DMA 308 for backup and which DDBMA 304 are used to lookup which data block signatures. The storage policy may use a modulo operand as discussed previously, or some other method to determine which DMA 308 to use for data block storage and which DDBMA 304 to use for signature lookups. The storage policy can also include information regarding how files should be retrieved and what DMA 308 to use during restore.


Referring now to FIG. 3B, an example restore operation will now be described. In an embodiment, the client 302 initiates a restore of a file stored in the backup storage system, as indicated by data flow step 8.


The restore request and/or data block is received by DMA2 308B based on a predetermined storage policy. For each data block, DMA2 308B determines if it is stored locally in local storage 310B or in another DMA 308A, 310C. As indicated by data flow step 9, the DMA2 308B retrieves each locally stored data block from local storage 310B, and aggregates it with other data blocks to restore the file to the client 302. Alternatively, the DMA2 308B sends the client each data block as it is retrieved.


Inter-Deduplication Node Communication


Referring still to FIG. 3B and as described earlier, for each data block that is part of the file to restore and not stored in the local storage 310B, the local storage 310B contains a link. The link contains information that allows the DMA2 308B to locate and request the data block from the DMA 308 storing the data block. The DMA2 308B retrieves the link and uses the information to dynamically request the data block from the appropriate DMA 308. In this case, the DMA3 308C contains the data block.


As touched on above, the DMAs 308 can advantageously communicate with one another according to a specialized, light-weight communication scheme. For example, in requesting the data block from the DMA3 308C (data flow step 10), the DMA2 308B uses a client-server protocol to communicate with the DMA3 308C. Moreover, a suite of specialized service routines can be provided to the DMAs 308 which can be utilized for inter-DMA 308 communication on an ad-hoc or as-needed basis. For example, in one embodiment, a suite of custom services built on the file-transfer protocol (FTP) are used. Thus, the DMA2 308B calls an FTP-based read routine or other routine used to request data blocks from another DMA from the suite of provided services. The DMA2 308B may provide as inputs to the routine an identifier for the DMA3 308C and location information derived from the data block link information, such as path and or offset information. In one embodiment, the signature is provided to the read routine.


In response, the DMA3 308C retrieves the data block from the local storage 310C and sends the data block to the DMA2 308B. For example, the DMA3 308C selects an FTP-based write routine or other appropriate routine from the suite of services to send the data block to the DMA2 308B. For example, the DMA3 308C may provide an identifier from the DMA2 308B to the write routine along with the requested data block.


A wide variety of implementations are possible for the light-weight, inter-DMA 308 communication. For example, other types of networking protocols can be used, such as other types of client-server based protocols, including hyper-text transfer protocol (HTTP), secure shell (SSH), and the like, some other internet protocol (IP) or TCP/IP based network protocol, etc. Moreover, the communication scheme can include an entire suite of services including services to write, read, query, or provide other appropriate functions. Generally, the service suite according to certain embodiments includes a number and variety of services sufficient to enable the DMA 308 to serve as a stream-lined, clustered file system. In other embodiments, only one or two types of service routines are provided. Port numbers for inter-DMA communication can be found using a lookup service of the communication service running on the DMAs 308. Headers can also be used to facilitate inter-DMA communication, and can include, without limitation, a hostname of the target DMA, mount path location, chunk identifier, file identifier, block offset, etc. For instance, the DMAs 308 may store headers associated with each of the data blocks. In some embodiments, for instance, the requesting DMAB 308 receives the header from the DDBMA 304A along with or embedded in the link to the requested block. The header can then be used in the communication between the requesting DMA 308B and the target DMA 308C. As one example, the requesting DMA 308B may include some or all of the information in the header in the request for the data block from the target DMA 308C, or may otherwise use information in the header to construct the request. The requesting DMA 308B constructs an FTP-based request or an HTTP-based request, for instance. Moreover, the target DMA 308C may receive some or all of the header information (e.g., the chunk identifier, file identifier and block offset) and use that information to retrieve the requested block.


Other components in the storage system may communicate with one another over similar communication schemes, or may have their own suite of communication services. In one embodiment, for example, the DDBMAs 304 communicate with one another and/or the DMAs 308 in such a manner. In one embodiment, the media DMAs 308 communicate with the DDBMAs using remote procedure call (RPC) over network sockets, although other inter-process communication flows could be used. Inter-DMA communication can be achieved using RPC over sockets in some cases as well.


The DMA2 308B aggregates the received block with any other blocks in preparation of restoring the file to the client 302. Alternatively, the DMA2 308B sends the client each block as it is retrieved, or requests the DMA3 308C to send the client each data block as it is received.


Thus, for each data block, the DMA2 308B dynamically requests the data block from DMA3 308C (or other DMA 308) using a specialized, light-weight service. By dynamically requesting the data block, the DMA2 308B avoids accessing the local storage 310C of the DMA3 308C directly, or through a shared static mount path configuration such as in NFS, CIFS or UNC shares based environment. Thus, inter-DMA communication generally does not involve integration, development or maintenance of the DMA 308 (or other type of deduplication node) at the file-system or operating system (O/S) level. For example, there are no O/S based services involved in inter-DMA 308 communication. Moreover, management overhead associated with other implementations (e.g., NFS, CIFS or UNC shares) is reduced, such as overhead associated with maintaining username & passwords or other authentication information for each of the DMA 308. As such, inter-DMA 308 communication in some such embodiments is achieved in a manner that involves little or no user interaction, from IT administrators or other personnel, for example. In this manner, the file-system structure and O/S of the DMA3 308C is generally irrelevant to DMA2 308B. The DMA2 308B simply requests the data from the DMA3 308C, and the DMA3 308C retrieves the data block from the local storage 310C and sends the local storage to the DMA2 308B for processing. Additionally, because the above-described specialized inter-DMA 308 communication scheme does not rely on a predefined networked-file sharing protocol such as NFS or UNC shares, customized authentication protocols can be implemented, improving security. Moreover, additional deduplication nodes can be added or removed in a modular fashion to scale the storage system in a stream-lined fashion, without overly burdensome administrative effort.


Although the above-embodiment is described in terms of the client 302 requesting a restore from the DMA2 308B, and the DMA2 308B only interacting with the DMA3 308C, it is to be understood that the client 302 can use any DMA 308 to restore data blocks and that any DMA 308 can interact with any other DMA 308 in requesting and retrieving data blocks. For example, the DMA 308A can receive the restore request and then request data blocks from the DMA2 308B and the DMA3 308C.


Furthermore, the DDBMA 304 can be used to locate blocks during a restore operation. For example, the link stored in the local storage 310 can include only information regarding which DDBMA 304 contains the location information of the data block. Thus, a DMA 308 can query the DDBMA 304 for the location information and use the location information received from the DDBMA 304 to request the data block. Alternatively, upon receiving the query, the DDBMA 304 can request the data block from the appropriate DMA 308 and have the DMA 308 transmit the data block directly to the requesting DMA 308, to the client 302 or back to the DDBMA 304. In this manner, the DDBMA 304 can be more actively involved in the restore operation. As mentioned previously, a storage manager can also coordinate the restore operation, including the requesting and collection of data blocks, and aggregating the data blocks for the client 302.



FIGS. 4 and 5 are flow diagrams illustrative of various processes or routines that the storage system can carry out. FIG. 4 is a flow diagram of a routine implemented by the storage system for processing a store operation and storing data blocks to the backup storage system. FIG. 5 is a flow diagram of a routine implemented by the backup storage system for processing a restore operation and restoring data blocks to a client. Although described in relation to backup operations for the purposes of illustration, the processes described herein including those described with respect to FIGS. 4 and 5 are compatible with other storage operations, such as, for example, replication operations.



FIG. 4 is a flow diagram illustrative of one embodiment of a routine 400 implemented by a backup storage system for processing a storage request and storing a file to the backup storage system. For example, routine 400 can apply to embodiments described in reference to FIGS. 1, 2, 3A and 3B. One skilled in the relevant art will appreciate that the elements outlined for routine 400 may be implemented by one or many computing devices/components that are associated with the backup storage system, described in greater detail above with reference to FIG. 3. For example, routine 400 can be implemented by any one, or a combination, of the client 302, a storage manager, deduplication database media agent (DDBMA) 304 (i.e. any one of the DDBMA 304A-304B), the data media agent (DMA) 308 (i.e. any one of the DMA 308A-308C) and the like. Accordingly, routine 400 has been logically associated as being generally performed by the storage system, and thus the following illustrative embodiments should not be construed as limiting. Furthermore, the functions performed at each block are described in greater detail above with reference to FIG. 3A.


At block 402, the backup storage system receives a data block for storage. The request can be received from the client, a new client, one client on behalf of another, a storage manager, DMA, DDBMA, or the like. Alternatively, the backup storage system can receive a signature of a data block or a file, as described above.


At block 404, the backup storage system queries a deduplication database media agent (DDBMA) for the data block location, as described previously with reference to FIG. 3. The backup storage system then determines if the data block exists in the backup storage system using information found in the DDBMA, as illustrated in block 406. If the backup storage system determines that the data block is already stored in the system, the backup storage system stores a link to the data block, as illustrated in block 408. Upon storing the link, the backup storage system awaits another data block for storage. Upon receiving another data block for storage the routine 400 repeats.


On the other hand, if the backup storage system determines that the data block is not stored in the system, the backup storage system stores the data block, as illustrated in block 410, and updates the DDBMA with the data block information, as illustrated in block 412. The data block information including information regarding how to locate and retrieve the data block.


As noted earlier, the routine 400 can be implemented by any component of the backup storage system, such as a storage manager DDBMA and/or a DMA. The routine 400 can further be implemented by the client. For example a DMA, can receive a data block, query the DDBMA, receive a response from the DDBMA and determine whether or not the data block exists in the backup storage system. Accordingly, the DMA can store a link to the data block or store the data block and send the appropriate information to update the DDBMA. Similarly, a storage manager can receive the data block query the DDBMA and based on the determination, either store the link to the data block in a DMA or store the data block in the DMA and send the appropriation information to update the DDBMA. Thus, many variations exist for implementing routine 400.


One skilled in the art will appreciate that routine 400 can include fewer, more, or different blocks than those illustrated in FIG. 4 without departing from the spirit and scope of the description. For example, prior to querying the DDBMA, the backup storage system can query the local storage of a DMA for the data block. If the data block is not located in the local storage of the DMA, the backup storage system can query the DDBMA. If the data block is found in the local storage of the DMA, the backup storage system can store a link to the data block in the DMA. In addition, the backup storage device can aggregate a number of queries to the DDBMA, and transmit all the queries together as a bundle.



FIG. 5 is a flow diagram illustrative of one embodiment of a routine 500 implemented by a storage system for processing a restore request and restoring data to a client. For example, routine 500 can apply to embodiments described in reference to FIGS. 1, 2, 3A and 3B. One skilled in the relevant art will appreciate that the elements outlined for routine 500 may be implemented by one or many computing devices/components that are associated with the backup storage system, described in greater detail above with reference to FIG. 3. For example, routine 500 can be implemented by any one, or a combination, of the client 302, a storage manager, deduplication database media agent (DDBMA) 304 (i.e. any one of the DDBMA 304A-304B), the data media agent (DMA) 308 (i.e. any one of the DMA 308A-308C) and the like. Accordingly, routine 500 has been logically associated as being generally performed by the backup storage system, and thus the following illustrative embodiments should not be construed as limiting. Furthermore, the functions performed at each block are described in greater detail above with reference to FIG. 3B.


At block 502, the storage system receives a restore request for a data block. As mentioned previously, the backup storage system can also receive a request for a file, and breakup the file into one or more data blocks. The request can be received from or by a client 408, a new client, one client on behalf of another, a storage manager, a DMA, a DDBMA, or the like. The request can occur automatically upon a reboot, local storage error, lost data, predetermined time interval, user selection, addition of a new client, or the like.


At block 504, the backup storage system checks a data media agent (DMA) for the data block. If the data block is found in the DMA, the backup storage system restores the data block to the client, as illustrated in block 506. Alternatively, the backup storage system awaits the retrieval of all the data blocks associated with a request and restores all the data blocks together to the client. Upon restoring the data block to the client, the backup storage device awaits another request to restore a data block, or continues restoring the data blocks already requested.


On the other hand, if the data block is not found in the DMA, the backup storage system retrieves a link to the data block, as illustrated in block 508. As mentioned above, with reference to FIGS. 3A, 3B, and 4, links are stored in the place of redundant data blocks. As mentioned previously, the link includes information that allows the backup storage to locate and retrieve the data block. Specifically, the link provides the backup storage device with the information to request and receive the data block from a specific DMA. Thus, as illustrated in block 510, using the link information, the backup storage device requests the data block from the DMA storing the data block. The DMA storing the data block uses the information received from the backup storage system to locate, retrieve and transmit the data block to the backup storage system. The information received from the backup storage system can include the link information, a signature of the data block, file location information, offset information, an address location, or any other information that allows the DMA storing the data block to locate and retrieve the data block. In some embodiments, a header such as one of the headers described above is used to facilitate inter-DMA communication of the data blocks. For instance, the header can include metadata (e.g., target DMA host name, mount path location, chunk identifier, file identifier, block offset, etc.) that the requesting DMA can embed in or otherwise use to create the request for the block. In one embodiment, the requesting DMA receives the header from the DDBMA 304A along with or embedded in the link. The requesting DMA can then employ the header in the request, e.g., by including some or all of the header information in the request (e.g., an FTP or HTTP-based request). For instance, the DMA host name may be used to properly direct the request to the target DMA. Moreover, the request may pass some or all of the header information (e.g., the chunk identifier, file identifier and block offset) along to the target DMA, which can use that information to retrieve the requested block. Using the header information, link and/or other appropriate information, the target DMA retrieves the requested block and transmits the block to the requesting DMA.


The requesting DMA receives the data block from the target DMA at block 512, and at block 514 the backup storage device restores the data block to the client. Upon restoring the data block to the client, the backup storage device awaits another request to restore a data block, or continues restoring the data blocks already requested. As indicated, the data blocks may be requested and/or retrieved in groups or bundles in certain embodiments.


As noted earlier, the routine 500 can be implemented by any component of the backup storage system, such as a storage manager DDBMA and/or a DMA. The routine 500 can further be implemented by the client. For example a DMA, can receive the restore request, query itself for the data block, and restore the data block if found. If not found the DMA can retrieve the link stored in its local storage, request and receive the data block from the DMA storing the block and restore the data block to the client. Alternatively, a storage manager can receive the restore request and query a DMA for the block. If found the storage manager can restore the data block from the DMA. If not found in the first DMA, the storage manager can use a link from the first DMA to request and receive the data block from a second DMA. The storage manager can then restore the data block. Alternatively, a storage manager can query a DDBMA for each data block. Using the information in the DDBMA, the storage manager can request and receive the data block from the appropriate DMA. The storage manager can then restore the data block. A DDBMA can also be used to locate and restore each data block. Upon receiving the restore request, the DDBMA can check its database for the link information for each data block. The DDBMA can then request the data block from the appropriate DMA and restore it accordingly.


The routine 500 can include fewer, more, or different blocks than those illustrated in FIG. 5 without departing from the spirit and scope of the description. For example, the data block can be aggregated together before being restored to the client, and/or the backup storage system can request the DMA to send the data block to the client directly. Furthermore, link information stored in the DMA can only include information regarding which DDBMA has the location information of the data block. The DDBMA can then be consulted to locate the data block. In addition, the DMA can bundle a number of requests for data and transmit all the requests the DMA storing the data blocks associated with the requests at the same time.


It will be appreciated by those skilled in the art and others that all of the functions described in this disclosure may be embodied in software executed by one or more processors of the disclosed components and mobile communication devices. The software may be persistently stored in any type of non-volatile storage.


Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.


In certain embodiments of the invention, operations disclosed herein can be used to copy or otherwise retrieve data of one or more applications residing on and/or being executed by a computing device. For instance, the applications may comprise software applications that interact with a user to process data and may include, for example, database applications (e.g., SQL applications), word processors, spreadsheets, financial applications, management applications, e-commerce applications, browsers, combinations of the same or the like. For example, in certain embodiments, the applications may comprise one or more of the following: MICROSOFT EXCHANGE, MICROSOFT SHAREPOINT, MICROSOFT SQL SERVER, ORACLE, MICROSOFT WORD and LOTUS NOTES.


Moreover, in certain embodiments of the invention, data backup systems and methods may be used in a modular storage management system, embodiments of which are described in more detail in U.S. Pat. No. 7,035,880, issued Apr. 5, 2006, and U.S. Pat. No. 6,542,972, issued Jan. 30, 2001, each of which is hereby incorporated herein by reference in its entirety. For example, the disclosed backup systems may be part of one or more storage operation cells that includes combinations of hardware and software components directed to performing storage operations on electronic data. Exemplary storage operation cells usable with embodiments of the invention include CommCells as embodied in the QNet storage management system and the QiNetix storage management system by CommVault Systems, Inc., and as further described in U.S. Pat. No. 7,454,569, issued Nov. 18, 2008, which is hereby incorporated herein by reference in its entirety.


Storage operations compatible with embodiments described herein will now be described. For example, data can be stored in primary storage as a primary copy or in secondary storage as various types of secondary copies including, as a backup copy, a snapshot copy, a hierarchical storage management copy (“HSM”), an archive copy, and other types of copies. Certain embodiments described herein with respect to backup operations are similarly compatible with each of these types of operations.


A primary copy of data is generally a production copy or other “live” version of the data which is used by a software application and is generally in the native format of that application. Such primary copy data is typically intended for short term retention (e.g., several hours or days) before some or all of the data is stored as one or more secondary copies, such as, for example, to prevent loss of data in the event a problem occurred with the data stored in primary storage.


Secondary copies include point-in-time data and are typically intended for long-term retention (e.g., weeks, months or years) before some or all of the data is moved to other storage or is discarded. Secondary copies may be indexed so users can browse and restore the data at another point in time. After certain primary copy data is backed up, a pointer or other location indicia such as a stub may be placed in the primary copy to indicate the current location of that data.


One type of secondary copy is a backup copy. A backup copy is generally a point-in-time copy of the primary copy data stored in a backup format, as opposed to a native application format. For example, a backup copy may be stored in a backup format that facilitates compression and/or efficient long-term storage. Backup copies generally have relatively long retention periods and may be stored on media with slower retrieval times than other types of secondary copies and media. In some cases, backup copies may be stored at on offsite location.


Another form of secondary copy is a snapshot copy. From an end-user viewpoint, a snapshot may be thought of as an instant image of the primary copy data at a given point in time. A snapshot generally captures the directory structure of a primary copy volume at a particular moment in time and may also preserve file attributes and contents. In some embodiments, a snapshot may exist as a virtual file system, parallel to the actual file system. Users typically gain read-only access to the record of files and directories of the snapshot. By electing to restore primary copy data from a snapshot taken at a given point in time, users may also return the current file system to the state of the file system that existed when the snapshot was taken.


A snapshot may be created instantly, using a minimum amount of file space, but may still function as a conventional file system backup. A snapshot may not actually create another physical copy of all the data, but may simply create pointers that are able to map files and directories to specific disk blocks.


In some embodiments, once a snapshot has been taken, subsequent changes to the file system typically do not overwrite the blocks in use at the time of the snapshot. Therefore, the initial snapshot may use only a small amount of disk space needed to record a mapping or other data structure representing or otherwise tracking the blocks that correspond to the current state of the file system. Additional disk space is usually required only when files and directories are actually modified later. Furthermore, when files are modified, typically only the pointers which map to blocks are copied, not the blocks themselves. In some embodiments, for example in the case of copy-on-write snapshots, when a block changes in primary storage, the block is copied to secondary storage before the block is overwritten in primary storage. The snapshot mapping of file system data is also updated to reflect the changed block(s) at that particular point in time.


An HSM copy is generally a copy of the primary copy data but typically includes only a subset of the primary copy data that meets a certain criteria and is usually stored in a format other than the native application format. For example, an HSM copy may include data from the primary copy that is larger than a given size threshold or older than a given age threshold and that is stored in a backup format. Often, HSM data is removed from the primary copy, and a stub is stored in the primary copy to indicate the new location of the HSM data. When a user requests access to the HSM data that has been removed or migrated, systems use the stub to locate the data and often make recovery of the data appear transparent, even though the HSM data may be stored at a location different from the remaining primary copy data.


An archive copy is generally similar to an HSM copy. However, the data satisfying criteria for removal from the primary copy is generally completely removed with no stub left in the primary copy to indicate the new location (i.e., where the archive copy data has been moved to). Archive copies of data are generally stored in a backup format or other non-native application format. In addition, archive copies are generally retained for very long periods of time (e.g., years) and, in some cases, are never deleted. In certain embodiments, such archive copies may be made and kept for extended periods in order to meet compliance regulations or for other permanent storage applications.


In some embodiments, application data over its lifetime moves from more expensive quick access storage to less expensive slower access storage. This process of moving data through these various tiers of storage is sometimes referred to as information lifecycle management (“ILM”). This is the process by which data is “aged” from forms of primary storage with faster access/restore times down through less expensive secondary storage with slower access/restore times. For example, such aging may occur as data becomes less important or mission critical over time.


Similar data transfers associated with location-specific criteria are performed when restoring data from secondary storage to primary storage. For example, to restore data a user or system process generally must specify a particular secondary storage device, piece of media, or archive file. Thus, the precision with which conventional storage management systems perform storage operations on electronic data is generally limited by the ability to define or specify storage operations based on data location.


Systems and modules described herein may comprise software, firmware, hardware, or any combination(s) of software, firmware, or hardware suitable for the purposes described herein. Software and other modules may reside on servers, workstations, personal computers, computerized tablets, PDAs, and other devices suitable for the purposes described herein. Software and other modules may be accessible via local memory, via a network, via a browser, or via other means suitable for the purposes described herein. Data structures described herein may comprise computer files, variables, programming arrays, programming structures, or any electronic information storage schemes or methods, or any combinations thereof, suitable for the purposes described herein. User interface elements described herein may comprise elements from graphical user interfaces, command line interfaces, and other interfaces suitable for the purposes described herein.


Embodiments of the invention are also described above with reference to flow chart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products. It will be understood that each block of the flow chart illustrations and/or block diagrams, and combinations of blocks in the flow chart illustrations and/or block diagrams, may be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the acts specified in the flow chart and/or block diagram block or blocks.


These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the acts specified in the flow chart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the acts specified in the flow chart and/or block diagram block or blocks.


While certain embodiments of the inventions have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the disclosure. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions and changes in the form of the methods and systems described herein may be made without departing from the spirit of the disclosure. The accompanying claims and their equivalents are intended to cover such forms or modifications as would fall within the scope and spirit of the disclosure.

Claims
  • 1. A distributed deduplicated storage system comprising one or more hardware processors configured with software instructions, the distributed deduplicated storage system comprising: a data media agent, wherein the data media agent is configured to: identify source data from a client device for storage,split the source data into at least a first and a second data blocks,transmit in parallel the first data block to a first deduplication database media agent and the second data block to a second deduplication database media agent;the first deduplication database media agent having first deduplication management information associated therewith, wherein the first deduplication management information is stored separately from deduplicated data stored in secondary storage devices, the first deduplication database media agent configured to: determine whether the first data block is stored in a secondary storage device by querying the first deduplication management information; andthe second deduplication database media agent having second deduplication management information associated therewith, wherein the second deduplication management information is stored separately from the deduplicated data stored in the secondary storage devices, the second deduplication database media agent configured to: determine whether the second data block is stored in a secondary storage device by querying the second deduplication management information.
  • 2. The distributed deduplicated storage system of claim 1 further comprising the client device, wherein the client device is separate from the data media agent, wherein the client device is configured to transmit data for storage to the data media agent.
  • 3. The distributed deduplicated storage system of claim 2, wherein the data transmitted to the data media agent is a data block of a file.
  • 4. The distributed deduplicated storage system of claim 2, wherein the data transmitted to the data media agent includes two or more files.
  • 5. The distributed deduplicated storage system of claim 1, wherein the first deduplication database media agent generates a first hash signature of the first data block, the second deduplication database media agent generates a second hash signature of the second data block.
  • 6. The distributed deduplicated storage system of claim 1, wherein the data media agent is a software module executing on the client device.
  • 7. The distributed deduplicated storage system of claim 1, wherein the client device generates a first hash signature of the first data block and a second hash signature of the second data block.
  • 8. The distributed deduplicated storage system of claim 1, further including a plurality of data media agents, wherein the plurality of data media agents are in communication with one another and in communication with a plurality of deduplication database media agents.
  • 9. The distributed deduplicated storage system of claim 8, wherein a first data media agent of the plurality of data media agents provides a path identifier associated with the second data block to a second data media agent in the plurality of data media agents.
  • 10. The distributed deduplicated storage system of claim 8, wherein a first data media agent of the plurality of data media agents provides block offset information associated with the second data block to a second data media agent in the plurality of data media agents.
  • 11. The distributed deduplicated storage system of claim 7, wherein the first deduplication database media agent stores a copy of the second hash signature.
  • 12. At least one non-transitory computer-readable medium carrying instructions, which when executed by at least one data processor, executes operations to store data blocks in a distributed deduplicated storage system, the operations comprising: identifying source data from a client device for storage,splitting the source data into at least a first and a second data blocks,transmitting in parallel the first data block to a first deduplication database media agent and the second data block to a second deduplication database media agent, the first deduplication database media agent having first deduplication management information associated therewith,wherein the first deduplication management information is stored separately from deduplicated data stored in secondary storage devices;determining whether the first data block is stored in a secondary storage device by querying the first deduplication management information, the second deduplication database media agent having second deduplication management information associated therewith,wherein the second deduplication management information is stored separately from the deduplicated data stored in the secondary storage devices; anddetermining whether the second data block is stored in a secondary storage device by querying the second deduplication management information.
  • 13. The non-transitory medium of claim 12, the operations further comprising transmitting data for backup to a data media agent from the client device, wherein the client device is separate from the data media agent.
  • 14. The non-transitory medium of claim 12, wherein the first deduplication database media agent generates a first hash signature of the first data block, the second deduplication database media agent generates a second hash signature of the second data block.
  • 15. The non-transitory medium of claim 12, wherein the client device generates a first hash signature of the first data block and a second hash signature of the second data block.
  • 16. The non-transitory medium of claim 12, the distributed deduplicated storage system comprises a plurality of data media agents, wherein the plurality of data media agents are in communication with one another and in communication with a plurality of deduplication database media agents.
  • 17. The non-transitory medium of claim 16, wherein at least one media agent of the plurality of data media agents is a software module executing on the client device.
  • 18. The non-transitory medium of claim 16, wherein a first data media agent of the plurality of data media agents provides a path identifier associated with the second data block to a second data media agent in the plurality of data media agents.
  • 19. The non-transitory medium of claim 16, wherein a first data media agent of the plurality of data media agents provides block offset information associated with the second data block to a second data media agent in the plurality of data media agents.
  • 20. The non-transitory medium of claim 15, wherein the first deduplication database media agent stores a copy of the second hash signature.
  • 21. The non-transitory medium of claim 16, wherein the plurality of data media agents communicate hash signatures and headers and links between one another without having a shared static mount path configuration.
  • 22. The non-transitory medium of claim 16, wherein the plurality of data media agents communicate hash signatures and headers without using network shares.
INCORPORATION BY REFERENCE TO ANY PRIORITY APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/875,896, filed Jan. 19, 2018, which is a continuation of U.S. patent application Ser. No. 14/673,586, filed Mar. 30, 2015, which is a continuation of U.S. patent application Ser. No. 13/324,613, filed Dec. 13, 2011, which claims benefit of U.S. Provisional Patent Application No. 61/423,040, filed Dec. 14, 2010, which are hereby incorporated by reference herein in their entireties. Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet, or any correction thereto, are hereby incorporated by reference into this application under 37 CFR 1.57.

US Referenced Citations (613)
Number Name Date Kind
4084231 Capozzi et al. Apr 1978 A
4267568 Dechant et al. May 1981 A
4283787 Chambers Aug 1981 A
4417321 Chang et al. Nov 1983 A
4641274 Swank Feb 1987 A
4654819 Stiffler et al. Mar 1987 A
4686620 Ng Aug 1987 A
4912637 Sheedy et al. Mar 1990 A
4995035 Cole et al. Feb 1991 A
5005122 Griffin et al. Apr 1991 A
5093912 Dong et al. Mar 1992 A
5133065 Cheffetz et al. Jul 1992 A
5193154 Kitajima et al. Mar 1993 A
5212772 Masters May 1993 A
5226157 Nakano et al. Jul 1993 A
5239647 Anglin et al. Aug 1993 A
5241668 Eastridge et al. Aug 1993 A
5241670 Eastridge et al. Aug 1993 A
5276860 Fortier et al. Jan 1994 A
5276867 Kenley et al. Jan 1994 A
5287500 Stoppani, Jr. Feb 1994 A
5301286 Rajani Apr 1994 A
5321816 Rogan et al. Jun 1994 A
5333315 Saether et al. Jul 1994 A
5347653 Flynn et al. Sep 1994 A
5403639 Belsan Apr 1995 A
5410700 Fecteau et al. Apr 1995 A
5420996 Aoyagi May 1995 A
5448724 Hayashi et al. Sep 1995 A
5454099 Myers et al. Sep 1995 A
5491810 Allen Feb 1996 A
5495607 Pisello et al. Feb 1996 A
5499367 Bamford et al. Mar 1996 A
5504873 Martin et al. Apr 1996 A
5544345 Carpenter et al. Aug 1996 A
5544347 Yanai et al. Aug 1996 A
5559957 Balk Sep 1996 A
5559991 Kanfi Sep 1996 A
5619644 Crockett et al. Apr 1997 A
5625793 Mirza Apr 1997 A
5638509 Dunphy et al. Jun 1997 A
5642496 Kanfi Jun 1997 A
5673381 Huai et al. Sep 1997 A
5699361 Ding et al. Dec 1997 A
5720026 Uemura Feb 1998 A
5729743 Squibb Mar 1998 A
5732240 Caccavale Mar 1998 A
5751997 Kullick et al. May 1998 A
5758359 Saxon May 1998 A
5761677 Senator et al. Jun 1998 A
5764972 Crouse et al. Jun 1998 A
5765173 Cane et al. Jun 1998 A
5778395 Whiting et al. Jul 1998 A
5790828 Jost Aug 1998 A
5812398 Nielsen Sep 1998 A
5813008 Benson et al. Sep 1998 A
5813009 Johnson et al. Sep 1998 A
5813017 Morris Sep 1998 A
5875478 Blumenau Feb 1999 A
5875481 Ashton Feb 1999 A
5878408 Van Huben Mar 1999 A
5887134 Ebrahim Mar 1999 A
5901327 Ofek May 1999 A
5907672 Matze May 1999 A
5924102 Perks Jul 1999 A
5930831 Marsh et al. Jul 1999 A
5940833 Benson Aug 1999 A
5950205 Aviani, Jr. Sep 1999 A
5956519 Wise Sep 1999 A
5974563 Beeler, Jr. Oct 1999 A
5990810 Williams Nov 1999 A
6021415 Cannon et al. Feb 2000 A
6026414 Anglin Feb 2000 A
6038379 Fletcher et al. Mar 2000 A
6044437 Reinders Mar 2000 A
6052735 Ulrich et al. Apr 2000 A
6076148 Kedem et al. Jun 2000 A
6094416 Ying Jul 2000 A
6131095 Low et al. Oct 2000 A
6131190 Sidwell Oct 2000 A
6148412 Cannon et al. Nov 2000 A
6154787 Urevig et al. Nov 2000 A
6161111 Mutalik et al. Dec 2000 A
6163856 Dion Dec 2000 A
6167402 Yeager Dec 2000 A
6212512 Barney et al. Apr 2001 B1
6260069 Anglin Jul 2001 B1
6269431 Dunham Jul 2001 B1
6275953 Vahalia et al. Aug 2001 B1
6286084 Wexler et al. Sep 2001 B1
6289432 Ault et al. Sep 2001 B1
6301592 Aoyama et al. Oct 2001 B1
6324581 Xu et al. Nov 2001 B1
6328766 Long Dec 2001 B1
6330570 Crighton Dec 2001 B1
6330642 Carteau Dec 2001 B1
6343324 Hubis et al. Jan 2002 B1
RE37601 Eastridge et al. Mar 2002 E
6353878 Dunham Mar 2002 B1
6356801 Goodman et al. Mar 2002 B1
6366986 St. Pierre Apr 2002 B1
6366988 Skiba Apr 2002 B1
6374336 Peters Apr 2002 B1
6389432 Pothapragada et al. May 2002 B1
6389433 Bolosky et al. May 2002 B1
6397308 Ofek May 2002 B1
6418478 Ignatius et al. Jul 2002 B1
6421711 Blumenau et al. Jul 2002 B1
6425057 Cherkasova et al. Jul 2002 B1
6438368 Phillips Aug 2002 B1
6487561 Ofek et al. Nov 2002 B1
6496850 Bowman-Amuah Dec 2002 B1
6519679 Devireddy et al. Feb 2003 B2
6538669 Lagueux, Jr. et al. Mar 2003 B1
6542972 Ignatius et al. Apr 2003 B2
6557030 Hoang Apr 2003 B1
6557089 Reed Apr 2003 B1
6564228 O'Connor May 2003 B1
6625623 Midgley et al. Sep 2003 B1
6658436 Oshinsky et al. Dec 2003 B2
6658526 Nguyen et al. Dec 2003 B2
6662198 Satyanarayanan Dec 2003 B2
6665815 Goldstein Dec 2003 B1
6704730 Moulton et al. Mar 2004 B2
6721767 De Meno et al. Apr 2004 B2
6732125 Autry May 2004 B1
6757794 Cabrera et al. Jun 2004 B2
6760723 Oshinsky et al. Jul 2004 B2
6760812 Degenaro et al. Jul 2004 B1
6779093 Gupta Aug 2004 B1
6789161 Blendermann Sep 2004 B1
6799258 Linde Sep 2004 B1
6810398 Moulton Oct 2004 B2
6823377 Wu et al. Nov 2004 B1
6865655 Andersen Mar 2005 B1
6886020 Zahavi Apr 2005 B1
6912629 West et al. Jun 2005 B1
6952758 Chron et al. Oct 2005 B2
6983351 Gibble Jan 2006 B2
7003641 Prahlad et al. Feb 2006 B2
7028096 Lee Apr 2006 B1
7035880 Crescenti et al. Apr 2006 B1
7065619 Zhu et al. Jun 2006 B1
7082441 Zahavi Jul 2006 B1
7085904 Mizuno et al. Aug 2006 B2
7100089 Phelps Aug 2006 B1
7103617 Phatak Sep 2006 B2
7107298 Prahlad et al. Sep 2006 B2
7107395 Ofek Sep 2006 B1
7117246 Christenson et al. Oct 2006 B2
7130860 Pachet Oct 2006 B2
7130970 Devassy et al. Oct 2006 B2
7143091 Charnock Nov 2006 B2
7155465 Lee Dec 2006 B2
7155633 Tuma Dec 2006 B2
7162496 Amarendran et al. Jan 2007 B2
7174433 Kottomtharayil et al. Feb 2007 B2
7194454 Hansen Mar 2007 B2
7197665 Goldstein Mar 2007 B2
7225210 Guthrie, II May 2007 B2
7243163 Friend et al. Jul 2007 B1
7246207 Kottomtharayil et al. Jul 2007 B2
7246272 Cabezas et al. Jul 2007 B2
7272606 Borthakur et al. Sep 2007 B2
7284030 Ackaouy et al. Oct 2007 B2
7287252 Bussiere et al. Oct 2007 B2
7315923 Retnamma et al. Jan 2008 B2
7343356 Prahlad Mar 2008 B2
7343453 Prahlad et al. Mar 2008 B2
7343459 Prahlad Mar 2008 B2
7346751 Prahlad Mar 2008 B2
7383462 Osaki et al. Jun 2008 B2
7389311 Crescenti et al. Jun 2008 B1
7395282 Crescenti et al. Jul 2008 B1
7412583 Burton Aug 2008 B2
7437388 DeVos Oct 2008 B1
7440982 Lu et al. Oct 2008 B2
7454569 Kavuri et al. Nov 2008 B2
7472238 Gokhale et al. Dec 2008 B1
7472242 Deshmukh et al. Dec 2008 B1
7490207 Amarendran et al. Feb 2009 B2
7500053 Kavuri et al. Mar 2009 B1
7512595 McBride et al. Mar 2009 B1
7516186 Borghetti et al. Apr 2009 B1
7519726 Palliyll et al. Apr 2009 B2
7529782 Prahlad et al. May 2009 B2
7536291 Vijayan Retnamma et al. May 2009 B1
7539710 Haustein et al. May 2009 B1
7543125 Gokhale Jun 2009 B2
7546324 Prahlad et al. Jun 2009 B2
7552358 Asgar-Deen et al. Jun 2009 B1
7567188 Anglin et al. Jul 2009 B1
7568080 Prahlad et al. Jul 2009 B2
7574692 Herscu Aug 2009 B2
7577806 Rowan Aug 2009 B2
7581077 Ignatius et al. Aug 2009 B2
7584338 Bricker et al. Sep 2009 B1
7603386 Amarendran et al. Oct 2009 B2
7606844 Kottomtharayil Oct 2009 B2
7613748 Brockway et al. Nov 2009 B2
7613752 Prahlad et al. Nov 2009 B2
7617253 Prahlad et al. Nov 2009 B2
7617262 Prahlad et al. Nov 2009 B2
7620710 Kottomtharayil et al. Nov 2009 B2
7631194 Wahlert et al. Dec 2009 B2
7636743 Erofeev Dec 2009 B2
7651593 Prahlad et al. Jan 2010 B2
7657550 Prahlad et al. Feb 2010 B2
7660807 Prahlad et al. Feb 2010 B2
7661028 Prahlad et al. Feb 2010 B2
7664771 Kusters Feb 2010 B2
7685126 Patel et al. Mar 2010 B2
7702782 Pai Apr 2010 B1
7720841 Gu et al. May 2010 B2
7730113 Payette et al. Jun 2010 B1
7734669 Kottomtharayil et al. Jun 2010 B2
7734820 Ranade et al. Jun 2010 B1
7739235 Rousseau Jun 2010 B2
7743051 Kashyap et al. Jun 2010 B1
7747577 Cannon et al. Jun 2010 B2
7747579 Prahlad et al. Jun 2010 B2
7761425 Erickson et al. Jul 2010 B1
7779032 Garfinkel Aug 2010 B1
7797279 Starling et al. Sep 2010 B1
7801864 Prahlad et al. Sep 2010 B2
7809914 Kottomtharayil et al. Oct 2010 B2
7814074 Anglin et al. Oct 2010 B2
7814149 Stringham Oct 2010 B1
7822939 Veprinsky et al. Oct 2010 B1
7827150 Wu et al. Nov 2010 B1
7831795 Prahlad et al. Nov 2010 B2
7840533 Prahlad et al. Nov 2010 B2
7899871 Kumar et al. Mar 2011 B1
7962452 Anglin et al. Jun 2011 B2
8041907 Wu et al. Oct 2011 B1
8074043 Zeis Dec 2011 B1
8095756 Somavarapu Jan 2012 B1
8108446 Christiaens Jan 2012 B1
8108638 Kishi Jan 2012 B2
8131669 Cannon et al. Mar 2012 B2
8145614 Zimran et al. Mar 2012 B1
8156086 Lu et al. Apr 2012 B2
8170995 Prahlad et al. May 2012 B2
8199911 Tsaur et al. Jun 2012 B1
8200638 Zheng et al. Jun 2012 B1
8200923 Healey et al. Jun 2012 B1
8204862 Paulzagade et al. Jun 2012 B1
8209334 Doerner Jun 2012 B1
8224875 Christiaens et al. Jul 2012 B1
8229954 Kottomtharayil et al. Jul 2012 B2
8230195 Amarendran et al. Jul 2012 B2
8261240 Hoban Sep 2012 B2
8280854 Emmert Oct 2012 B1
8285681 Prahlad et al. Oct 2012 B2
8307177 Prahlad et al. Nov 2012 B2
8352422 Prahlad et al. Jan 2013 B2
8364652 Vijayan Retnamma et al. Jan 2013 B2
8370315 Efstathopoulos et al. Feb 2013 B1
8370542 Lu et al. Feb 2013 B2
8375008 Gomes Feb 2013 B1
8375181 Kekre et al. Feb 2013 B1
8407190 Prahlad et al. Mar 2013 B2
8468320 Stringham Jun 2013 B1
8479304 Clifford Jul 2013 B1
8484162 Prahlad et al. Jul 2013 B2
8510573 Muller et al. Aug 2013 B2
8527469 Hwang et al. Sep 2013 B2
8549350 Dutch et al. Oct 2013 B1
8572055 Wu et al. Oct 2013 B1
8572340 Vijayan Retnamma et al. Oct 2013 B2
8577851 Vijayan Retnamma et al. Nov 2013 B2
8578109 Vijayan Retnamma et al. Nov 2013 B2
8578120 Attarde et al. Nov 2013 B2
8595191 Prahlad et al. Nov 2013 B2
8621240 Auchmoody et al. Dec 2013 B1
8645320 Prahlad et al. Feb 2014 B2
8719264 Varadharajan May 2014 B2
8725688 Lad May 2014 B2
8726242 Ngo May 2014 B2
8745105 Erofeev Jun 2014 B2
8775823 Gokhale et al. Jul 2014 B2
8825720 Xie et al. Sep 2014 B1
8849762 Kumarasamy et al. Sep 2014 B2
8909980 Lewis et al. Dec 2014 B1
8930306 Ngo et al. Jan 2015 B1
8938481 Kumarasamy et al. Jan 2015 B2
8954446 Vijayan Retnamma et al. Feb 2015 B2
9015181 Kottomtharayil et al. Apr 2015 B2
9020900 Vijayan Retnamma et al. Apr 2015 B2
9092441 Patiejunas et al. Jul 2015 B1
9098495 Gokhale Aug 2015 B2
9104623 Vijayan Retnamma et al. Aug 2015 B2
9110602 Vijayan Retnamma et al. Aug 2015 B2
9116850 Vijayan Retnamma et al. Aug 2015 B2
9128901 Nickurak Sep 2015 B1
9171008 Prahlad et al. Oct 2015 B2
9208160 Prahlad et al. Dec 2015 B2
9218374 Muller et al. Dec 2015 B2
9218375 Muller et al. Dec 2015 B2
9218376 Muller et al. Dec 2015 B2
9239687 Vijayan Retnamma et al. Jan 2016 B2
9244779 Littlefield et al. Jan 2016 B2
9251186 Muller et al. Feb 2016 B2
9298386 Baldwin et al. Mar 2016 B2
9298715 Kumarasamy et al. Mar 2016 B2
9298724 Patil et al. Mar 2016 B1
9323820 Lauinger et al. Apr 2016 B1
9336076 Baldwin et al. May 2016 B2
9342537 Kumarasamy et al. May 2016 B2
9405631 Prahlad et al. Aug 2016 B2
9405763 Prahlad et al. Aug 2016 B2
9442806 Bardale Sep 2016 B1
9483486 Christiaens et al. Nov 2016 B1
9575673 Mitkar et al. Feb 2017 B2
9619480 Vijayan et al. Apr 2017 B2
9633033 Vijayan et al. Apr 2017 B2
9633056 Attarde et al. Apr 2017 B2
9639289 Vijayan Retnamma et al. May 2017 B2
9665591 Vijayan et al. May 2017 B2
9678968 Taylor et al. Jun 2017 B1
9858156 Muller et al. Jan 2018 B2
9898225 Vijayan et al. Feb 2018 B2
9898478 Vijayan et al. Feb 2018 B2
9934238 Mitkar et al. Apr 2018 B2
9990253 Rajimwale et al. Jun 2018 B1
10061663 Vijayan et al. Aug 2018 B2
10126973 Vijayan et al. Nov 2018 B2
10176053 Muller et al. Jan 2019 B2
10191816 Vijayan et al. Jan 2019 B2
10229133 Vijayan et al. Mar 2019 B2
10255143 Vijayan et al. Apr 2019 B2
10310953 Vijayan et al. Jun 2019 B2
10339106 Vijayan et al. Jul 2019 B2
10380072 Attarde et al. Aug 2019 B2
10387269 Muller et al. Aug 2019 B2
10445293 Attarde et al. Oct 2019 B2
10474638 Mitkar et al. Nov 2019 B2
10481824 Vijayan et al. Nov 2019 B2
10481825 Vijayan et al. Nov 2019 B2
10481826 Vijayan et al. Nov 2019 B2
10540327 Ngo et al. Jan 2020 B2
10592357 Vijayan et al. Mar 2020 B2
10740295 Vijayan et al. Aug 2020 B2
11169888 Vijayan et al. Nov 2021 B2
20010052015 Lin et al. Dec 2001 A1
20020062439 Cotugno et al. May 2002 A1
20020065892 Malik May 2002 A1
20020083055 Pachet Jun 2002 A1
20020107877 Whiting et al. Aug 2002 A1
20020133601 Kennamer et al. Sep 2002 A1
20020143892 Mogul Oct 2002 A1
20020144250 Yen Oct 2002 A1
20020169934 Krapp et al. Nov 2002 A1
20030033308 Patel et al. Feb 2003 A1
20030084076 Sekiguchi et al. May 2003 A1
20030105716 Lorin, Jr. et al. Jun 2003 A1
20030115346 McHenry et al. Jun 2003 A1
20030149750 Franzenburg Aug 2003 A1
20030172130 Fruchtman et al. Sep 2003 A1
20030174648 Wang et al. Sep 2003 A1
20030182310 Charnock et al. Sep 2003 A1
20030187917 Cohen Oct 2003 A1
20030188106 Cohen Oct 2003 A1
20040010562 Itonaga Jan 2004 A1
20040128442 Hinshaw et al. Jul 2004 A1
20040148306 Moulton et al. Jul 2004 A1
20040181519 Anwar Sep 2004 A1
20040215746 McCanne et al. Oct 2004 A1
20040230753 Amiri et al. Nov 2004 A1
20050033756 Kottomtharayil et al. Feb 2005 A1
20050060643 Glass et al. Mar 2005 A1
20050066118 Perry Mar 2005 A1
20050066225 Rowan Mar 2005 A1
20050108292 Burton May 2005 A1
20050114450 DeVos May 2005 A1
20050117558 Angermann et al. Jun 2005 A1
20050144202 Chen Jun 2005 A1
20050204108 Ofek et al. Sep 2005 A1
20050216659 Ogawa et al. Sep 2005 A1
20050243609 Yang et al. Nov 2005 A1
20050246393 Coates et al. Nov 2005 A1
20050268068 Ignatius et al. Dec 2005 A1
20050273654 Chen et al. Dec 2005 A1
20060004808 Hsu et al. Jan 2006 A1
20060005048 Osaki Jan 2006 A1
20060010227 Atluri Jan 2006 A1
20060020660 Prasad et al. Jan 2006 A1
20060064456 Kalthoff et al. Mar 2006 A1
20060074957 Yamamoto et al. Apr 2006 A1
20060089954 Anschutz Apr 2006 A1
20060095527 Malik May 2006 A1
20060101096 Fuerst May 2006 A1
20060129537 Torii Jun 2006 A1
20060136685 Griv Jun 2006 A1
20060167900 Pingte et al. Jul 2006 A1
20060168318 Twiss Jul 2006 A1
20060179261 Twiss Aug 2006 A1
20060179405 Chao et al. Aug 2006 A1
20060224846 Amarendran et al. Oct 2006 A1
20060277154 Lunt et al. Dec 2006 A1
20070006018 Thompson Jan 2007 A1
20070038714 Sell Feb 2007 A1
20070043757 Benton et al. Feb 2007 A1
20070050526 Abe et al. Mar 2007 A1
20070067263 Syed Mar 2007 A1
20070073814 Kamat et al. Mar 2007 A1
20070156966 Sundarrajan et al. Jul 2007 A1
20070162462 Zhang et al. Jul 2007 A1
20070179990 Zimran et al. Aug 2007 A1
20070179995 Prahlad et al. Aug 2007 A1
20070192444 Ackaouy et al. Aug 2007 A1
20070192542 Frolund et al. Aug 2007 A1
20070192544 Frolund et al. Aug 2007 A1
20070203937 Prahlad et al. Aug 2007 A1
20070250670 Fineberg et al. Oct 2007 A1
20070255758 Zheng et al. Nov 2007 A1
20080005141 Zheng et al. Jan 2008 A1
20080005509 Smith et al. Jan 2008 A1
20080016131 Sandorfi et al. Jan 2008 A1
20080028149 Pardikar et al. Jan 2008 A1
20080089342 Lansing et al. Apr 2008 A1
20080091655 Gokhale et al. Apr 2008 A1
20080091725 Hwang et al. Apr 2008 A1
20080098041 Chidambaran et al. Apr 2008 A1
20080098083 Shergill et al. Apr 2008 A1
20080133561 Dubnicki et al. Jun 2008 A1
20080140630 Sato et al. Jun 2008 A1
20080159331 Mace et al. Jul 2008 A1
20080229037 Bunte et al. Sep 2008 A1
20080243769 Arbour et al. Oct 2008 A1
20080243879 Gokhale et al. Oct 2008 A1
20080243914 Prahlad et al. Oct 2008 A1
20080243953 Wu et al. Oct 2008 A1
20080243957 Prahlad et al. Oct 2008 A1
20080243958 Prahlad et al. Oct 2008 A1
20080244172 Kano Oct 2008 A1
20080244199 Nakamura et al. Oct 2008 A1
20080244204 Cremelie Oct 2008 A1
20080244205 Amano Oct 2008 A1
20080250204 Kavuri et al. Oct 2008 A1
20080256326 Patterson et al. Oct 2008 A1
20080256431 Hornberger Oct 2008 A1
20080281908 McCanne et al. Nov 2008 A1
20080294660 Patterson et al. Nov 2008 A1
20080294696 Frandzel Nov 2008 A1
20080313236 Vijayakumar et al. Dec 2008 A1
20080320151 McCanne et al. Dec 2008 A1
20090013129 Bondurant Jan 2009 A1
20090013258 Hintermeister et al. Jan 2009 A1
20090043767 Joshi et al. Feb 2009 A1
20090055425 Evans et al. Feb 2009 A1
20090055471 Kozat et al. Feb 2009 A1
20090077140 Anglin et al. Mar 2009 A1
20090138481 Chatley et al. May 2009 A1
20090144416 Chatley et al. Jun 2009 A1
20090144422 Chatley et al. Jun 2009 A1
20090171888 Anglin Jul 2009 A1
20090172139 Wong Jul 2009 A1
20090182789 Sandorfi et al. Jul 2009 A1
20090183162 Kindel et al. Jul 2009 A1
20090204636 Li et al. Aug 2009 A1
20090204649 Wong et al. Aug 2009 A1
20090210431 Marinkovic et al. Aug 2009 A1
20090228599 Anglin et al. Sep 2009 A1
20090243846 Yuuki Oct 2009 A1
20090254507 Hosoya et al. Oct 2009 A1
20090268903 Bojinov et al. Oct 2009 A1
20090271454 Anglin et al. Oct 2009 A1
20090276454 Smith Nov 2009 A1
20090307251 Heller et al. Dec 2009 A1
20090319534 Gokhale Dec 2009 A1
20090319585 Gokhale Dec 2009 A1
20090327625 Jaquette et al. Dec 2009 A1
20100005259 Prahlad Jan 2010 A1
20100011178 Feathergill Jan 2010 A1
20100031086 Leppard Feb 2010 A1
20100036887 Anglin et al. Feb 2010 A1
20100042790 Mondal et al. Feb 2010 A1
20100049926 Fuente et al. Feb 2010 A1
20100049927 Fuente et al. Feb 2010 A1
20100070478 Anglin Mar 2010 A1
20100077161 Stoakes et al. Mar 2010 A1
20100082558 Anglin et al. Apr 2010 A1
20100082672 Kottomtharayil et al. Apr 2010 A1
20100088296 Periyagaram et al. Apr 2010 A1
20100094817 Ben-Shaul et al. Apr 2010 A1
20100100529 Erofeev Apr 2010 A1
20100114833 Mu May 2010 A1
20100153511 Lin et al. Jun 2010 A1
20100169287 Klose Jul 2010 A1
20100180075 McCloskey et al. Jul 2010 A1
20100198864 Ravid et al. Aug 2010 A1
20100223495 Leppard Sep 2010 A1
20100250501 Mandagere et al. Sep 2010 A1
20100250549 Muller et al. Sep 2010 A1
20100250896 Matze Sep 2010 A1
20100257142 Murphy et al. Oct 2010 A1
20100257346 Sosnosky et al. Oct 2010 A1
20100257403 Virk Oct 2010 A1
20100306283 Johnson et al. Dec 2010 A1
20100306586 Hanaoka et al. Dec 2010 A1
20100312752 Zeis et al. Dec 2010 A1
20100318759 Hamilton et al. Dec 2010 A1
20100332401 Prahlad et al. Dec 2010 A1
20100332454 Prahlad et al. Dec 2010 A1
20110010498 Lay et al. Jan 2011 A1
20110060940 Taylor et al. Mar 2011 A1
20110072291 Murase Mar 2011 A1
20110113012 Gruhl et al. May 2011 A1
20110113013 Reddy et al. May 2011 A1
20110113016 Gruhl et al. May 2011 A1
20110119741 Kelly et al. May 2011 A1
20110153570 Kim et al. Jun 2011 A1
20110161723 Taleck et al. Jun 2011 A1
20110167221 Pangal et al. Jul 2011 A1
20110258161 Constantinescu et al. Oct 2011 A1
20110276543 Matze Nov 2011 A1
20110289281 Spackman Nov 2011 A1
20110302140 Gokhale et al. Dec 2011 A1
20110314070 Brown et al. Dec 2011 A1
20110314400 Mital et al. Dec 2011 A1
20120011101 Fang et al. Jan 2012 A1
20120016839 Yueh Jan 2012 A1
20120016845 Bates Jan 2012 A1
20120078881 Crump et al. Mar 2012 A1
20120084272 Garces-Erice et al. Apr 2012 A1
20120089574 Doerner Apr 2012 A1
20120150818 Vijayan Retnamma et al. Jun 2012 A1
20120166403 Kim et al. Jun 2012 A1
20120185437 Pavlov et al. Jul 2012 A1
20120221817 Yueh Aug 2012 A1
20120233417 Kalach Sep 2012 A1
20120303622 Dean et al. Nov 2012 A1
20130006943 Chavda et al. Jan 2013 A1
20130219470 Chintala et al. Aug 2013 A1
20130238562 Kumarasamy et al. Sep 2013 A1
20130238572 Prahlad et al. Sep 2013 A1
20130262396 Kripalani et al. Oct 2013 A1
20130339298 Muller et al. Dec 2013 A1
20130339310 Muller et al. Dec 2013 A1
20140032940 Sartirana et al. Jan 2014 A1
20140115287 Schnapp et al. Apr 2014 A1
20140181028 Prahlad et al. Jun 2014 A1
20140195749 Colgrove et al. Jul 2014 A1
20140196037 Gopalan et al. Jul 2014 A1
20140201142 Varadharajan et al. Jul 2014 A1
20140201150 Kumarasamy et al. Jul 2014 A1
20140201153 Vijayan et al. Jul 2014 A1
20140229451 Venkatesh et al. Aug 2014 A1
20140250076 Lad Sep 2014 A1
20140258245 Estes Sep 2014 A1
20140281758 Klein et al. Sep 2014 A1
20140289225 Chan et al. Sep 2014 A1
20140337285 Gokhale et al. Nov 2014 A1
20140337664 Gokhale et al. Nov 2014 A1
20150012698 Bolla et al. Jan 2015 A1
20150088821 Blea et al. Mar 2015 A1
20150089185 Brandyberry et al. Mar 2015 A1
20150134611 Avati et al. May 2015 A1
20150154220 Ngo et al. Jun 2015 A1
20150161015 Kumarasamy et al. Jun 2015 A1
20150212893 Pawar et al. Jul 2015 A1
20150212894 Pawar et al. Jul 2015 A1
20150212895 Pawar et al. Jul 2015 A1
20150212896 Pawar et al. Jul 2015 A1
20150212897 Pawar et al. Jul 2015 A1
20150248466 Jernigan, IV et al. Sep 2015 A1
20150269032 Muthyala et al. Sep 2015 A1
20150269212 Kramer et al. Sep 2015 A1
20150278104 Moon et al. Oct 2015 A1
20150347306 Gschwind Dec 2015 A1
20150378839 Langouev et al. Dec 2015 A1
20160026405 Dhuse Jan 2016 A1
20160041880 Mitkar et al. Feb 2016 A1
20160042090 Mitkar et al. Feb 2016 A1
20160062846 Nallathambi et al. Mar 2016 A1
20160065671 Nallathambi et al. Mar 2016 A1
20160139836 Nallathambi et al. May 2016 A1
20160142483 Nallathambi et al. May 2016 A1
20160154709 Mitkar et al. Jun 2016 A1
20160170657 Suehr et al. Jun 2016 A1
20160188416 Muller et al. Jun 2016 A1
20160196070 Vijayan Retnamma et al. Jul 2016 A1
20160306707 Vijayan Retnamma et al. Oct 2016 A1
20160306708 Prahlad et al. Oct 2016 A1
20160306818 Vijayan Retnamma et al. Oct 2016 A1
20160350391 Vijayan Retnamma et al. Dec 2016 A1
20170031768 Sarab Feb 2017 A1
20170090786 Parab et al. Mar 2017 A1
20170168903 Dornemann et al. May 2017 A1
20170185488 Kumarasamy et al. Jun 2017 A1
20170192868 Vijayan et al. Jul 2017 A1
20170193003 Vijayan et al. Jul 2017 A1
20170235647 Kilaru et al. Aug 2017 A1
20170242871 Kilaru et al. Aug 2017 A1
20170262217 Pradhan et al. Sep 2017 A1
20170315876 Dornquast et al. Nov 2017 A1
20190012237 Prahlad et al. Jan 2019 A1
20190026305 Vijayan et al. Jan 2019 A1
20190179805 Prahlad Jun 2019 A1
20190188088 Muller et al. Jun 2019 A1
20190205290 Vijayan et al. Jul 2019 A1
20190227879 Vijayan et al. Jul 2019 A1
20190272220 Vijayan et al. Sep 2019 A1
20190272221 Vijayan et al. Sep 2019 A1
20190310968 Attarde et al. Oct 2019 A1
20200104052 Vijayan et al. Apr 2020 A1
20200104213 Muller et al. Apr 2020 A1
20200117641 Mitkar et al. Apr 2020 A1
20200167091 Haridas et al. May 2020 A1
20200167240 Haridas et al. May 2020 A1
20200250145 Ngo et al. Aug 2020 A1
20200327017 Vijayan et al. Oct 2020 A1
Foreign Referenced Citations (18)
Number Date Country
0259912 Mar 1988 EP
0405926 Jan 1991 EP
0467546 Jan 1992 EP
0541281 May 1993 EP
0774715 May 1997 EP
0809184 Nov 1997 EP
0899662 Mar 1999 EP
0981090 Feb 2000 EP
WO 1995013580 May 1995 WO
WO 99009480 Feb 1999 WO
WO 1999012098 Mar 1999 WO
WO 2002005466 Jan 2002 WO
WO 2006052872 May 2006 WO
WO 2010013292 Feb 2010 WO
WO 2010140264 Dec 2010 WO
WO 2012044366 Apr 2012 WO
WO 2012044367 Apr 2012 WO
WO 2013188550 Dec 2013 WO
Non-Patent Literature Citations (34)
Entry
Armstead et al., “Implementation of a Campus-Wide Distributed Mass Storage Service: The Dream vs. Reality,” IEEE, 1995, pp. 190-199.
Arneson, “Mass Storage Archiving in Network Environments,” Digest of Papers, Ninth IEEE Symposium on Mass Storage Systems, Oct. 31, 1988-Nov. 3, 1988, pp. 45-50, Monterey, CA.
Ashton, et al., “Two Decades of policy-based storage management for the IBM mainframe computer”, www.research.ibm.com, 19 pages, published Apr. 10, 2003, printed Jan. 3, 2009., www.research.ibm.com, Apr. 10, 2003, pp. 19.
Bhagwat, Extreme Binning: Scalable, Parallel Deduplication for Chunk-based File Backup. IEEE 2009, 9 pages.
Cabrera, et al. “ADSM: A Multi-Platform, Scalable, Back-up and Archive Mass Storage System,” Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Conference, Mar. 5, 1995-Mar. 9, 1995, pp. 420-427, San Francisco, CA.
Cohen, Edith, et al.,. “The Age Penalty and Its Effect on Cache Performance.” In USITS, pp. 73-84. 2001.
Cohen, Edith, et al.,.“Aging through cascaded caches: Performance issues in the distribution of web content.” In ACM SIGCOMM Computer Communication Review, vol. 31, No. 4, pp. 41-53. ACM, 2001.
Cohen, Edith, et al.,. “Refreshment policies for web content caches.” Computer Networks 38.6 (2002): 795-808.
CommVault Systems, Inc. “Continuous Data Replicator 7.0,” Product Data Sheet, 2007.
CommVault Systems, Inc., “Deduplication—HowTo,” http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_US/features/single_instance/single_instance_how_to.htm, internet accessed on Jan. 26, 2009, 7 pages.
CommVault Systems, Inc., “Deduplication,” http://documentation.commvault.com/commvault/release_8_0_0/books_online_1/english_US/features/single_instance/single_instance.htm, internet accessed on Jan. 26, 2009, 9 pages.
Diligent Technologies HyperFactor, http://www.dilligent.com/products:protecTIER-1:HyperFactor-1, Internet accessed on Dec. 5, 2008, 2 pages.
Dubnicki, et al. “HYDRAstor: A Scalable Secondary Storage.” Fast. vol. 9.2009, 74 pages.
Eitel, “Backup and Storage Management in Distributed Heterogeneous Environments,” IEEE, 1994, pp. 124-126.
Gait, “The Optical File Cabinet: A Random-Access File system for Write-Once Optical Disks,” IEEE Computer, vol. 21, No. 6, pp. 11-22 (1988).
Gray (#2 of 2, pp. 604-609), Jim; Reuter Andreas, Transaction Processing Concepts and Techniques, Morgan Kaufmann Publisher, USA 1994, pp. 604-609.
Guo et al., Building a High-performance Deduplication System, Jun. 15, 2011, retrieved from the Internet at <U RL: http://dl.acm.org/citation.cfm?id=2002206>, pp. 1-14.
Huff, KL, “Data Set Usage Sequence Number,” IBM Technical Disclosure Bulletin, vol. 24, No. 5, Oct. 1981 New York, US, pp. 2404-2406.
Jander, “Launching Storage-Area Net,” Data Communications, US, McGraw Hill, NY, vol. 27, No. 4(Mar. 21, 1998), pp. 64-72.
Kashyap, et al., “Professional Services Automation: A knowledge Management approach using LSI and Domain specific Ontologies”, FLAIRS-01 Proceedings, 2001, pp. 300-302.
Kornblum, Jesse, “Identifying Almost Identical Files Using Context Triggered Piecewise Hashing,” www.sciencedirect.com, Digital Investigation 3S (2006), pp. S91-S97.
Lortu Software Development, “Kondar Technology-Deduplication,” http://www.lortu.com/en/deduplication.asp, Internet accessed on Dec. 5, 2008, 3 pages.
Overland Storage, “Data Deduplication,” http://www.overlandstorage.com/topics/data_deduplication.html, Internet accessed on Dec. 5, 2008, 2 pages.
Quantum Corporation, “Data De-Duplication Background: A Technical White Paper,” May 2008, 13 pages.
Rosenblum et al., “The Design and Implementation of a Log-Structure File System,” Operating Systems Review SIGOPS, vol. 25, No. 5, New York, US, pp. 1-15 (May 1991).
Wei, et al. “MAD2: A scalable high-throughput exact deduplication approach for network backup services.” Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on. IEEE, 2010, 14 pages.
Wolman et al., On the scale and performance of cooperative Web proxy caching, 1999.
Wu, et al., Load Balancing and Hot Spot Relief for Hash Routing among a Collection of Proxy Caches, 1999.
Final Office Action for Japanese Application No. 2003531581, dated Mar. 24, 2009, 6 pages.
International Search Report and Written Opinion, International Application No. PCT/US2009/58137, dated Dec. 23, 2009, 14 pages.
International Search Report and Written Opinion, International Application No. PCT/US2011/030804, dated Jun. 9, 2011.
International Search Report and Written Opinion, International Application No. PCT/US2011/030814, dated Jun. 9, 2011.
International Search Report and Written Opinion, International Application No. PCT/US2013/045443 dated Nov. 14, 2013, 16 pages.
International Preliminary Reporton Patentability, International Application No. PCT/US2013/045443 dated Dec. 16, 2014 11 pages.
Related Publications (1)
Number Date Country
20200334210 A1 Oct 2020 US
Provisional Applications (1)
Number Date Country
61423040 Dec 2010 US
Continuations (3)
Number Date Country
Parent 15875896 Jan 2018 US
Child 16921513 US
Parent 14673586 Mar 2015 US
Child 15875896 US
Parent 13324613 Dec 2011 US
Child 14673586 US