Hierarchical systems and methods for performing data storage operations

Information

  • Patent Grant
  • 8566278
  • Patent Number
    8,566,278
  • Date Filed
    Thursday, October 13, 2011
    13 years ago
  • Date Issued
    Tuesday, October 22, 2013
    11 years ago
Abstract
The invention is a hierarchical backup system. The interconnected network computing devices are put into groups of backup cells. A backup cell has a manager software agent responsible maintaining and initiating a backup regime for the network computing devices in the backup cell. The backups are directed to backup devices within the backup cell. Several backup cells can be defined. A manager software agent for a particular cell may be placed into contact with the manager software agent of another cell, by which information about the cells may be passed back and forth. Additionally, one of the software agents may be given administrative control over another software agent with which it is in communication.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The present invention is directed to storage and retrieval systems. In particular, the invention is directed towards a hierarchical storage and retrieval system for a computer or a series of interconnected computers.


2. Description of Related Art


Conventional backup devices usually employ a monolithic backup and retrieval system servicing a single server with attached storage devices. These systems usually control all aspects of a data backup or retrieval, including timing the backup, directing the files to be backed up, directing the mode of the archival request, and directing the storage are not scalable and often direct only one type of backup and retrieval system, whether it is a network backup or a single machine backup.


If a backup software program failed for a particular computing device, a chance exists that the information for the backup suite would also be lost. Information about the activities of the backup program may be corrupted or lost. Additionally, without reinstallation, the backup program could not direct the backup of the particular computing device, and important information may not be backed up until the re-establishment of the backup program on the computing device.


Further, with distributed computing devices, it is necessary to micromanage each backup program on each computing device to maintain consistency in the backup activities of all backup programs. No external control can be asserted over multiple backup programs from a centralized location. Many other problems and disadvantages of the prior art will become apparent to one skilled in the art after comparing such prior art with the present invention as described herein.


SUMMARY OF THE INVENTION

Various aspects of the present invention may be found in a backup system for a network computing system. The network computer system has a first network device and a second network device. The backup system has a first software agent operating on a first network device on the network computing system. The first software agent is communicatively coupled to at least one backup device. The first software agent maintains operational parameters for the backup regime for the network computer system. The first software agent makes archival requests directed to the backup device or devices to initiate archival requests, including backups and restores.


A second software agent, operating on the second network device, supervises the operation of the first software agent. The second software agent is able to initiate archival function requests to the backup device or devices independent from the first software agent. Additionally, the second software agent may make an archival request directly to the first software agent, which then initiates the actual request directed to the backup device. The backup system of claim 1 wherein the first software agent is responsive to archival function requests from the second software agent. Or, the second software agent may change the operational parameters of the first software agent, thus allowing the second software agent to set administrative control of the backup of the network computing devices.


The first software agent communicates information on the status of the backup device or devices that it is responsible for to the second software agent. The first software agent may also communicate the status of the network computing devices that it is responsible for the backup of to the second software agent. This allows the second software agent to stand in for the first software agent when the first software agent is unable to perform at its full functionality. The second software agent is able to manage the backup of the network computing devices that the first software agent is responsible for when the first software agent is unable to do so.


In an exemplary embodiment, the network computer system has a first group of network computing devices. A manager software component runs on a network device and is responsible for managing parameters describing the archival characteristics of the first group of network devices, as well as able to initiate archival requests for those network computing devices.


The manager software component is communicatively coupled to at least one, possibly more, backup devices that physically perform the archival requests at the behest of instructions from the manager software component. A second software component supervises the manager software component, and is able to initiate a change in the operational parameters as described by the manager software component. Thus, the second software component may administer the characteristics of the backup policy of the manager software component.


In one embodiment, the second software component executes on a second network device, or it may also execute on the network device on which the manager component is executing. In an embodiment, the second software component is itself a manager software component responsible for the backup policies of a second group of network devices.


Or, the manager software component can operate the backup activities of a backup cell. Additionally, the second software component can operate the backup activities of a second backup cell, as well as manage or supervise the manager software component operating the first cell. Thus, a hierarchical structure in a backup system can be defined.


In another embodiment, the network computer system has a first group of network devices. The backup system has defined domains.


The first domain has a first manager software agent executing on a first network computing device. The first manager software agent is responsible for managing backup activities for the first group of network devices. The backup activities are coordinated with a backup device or devices that are in communication with the first manager software agent. These backup devices respond to the archival requests of the first manager software agent to carry out a backup policy for the first group of network devices.


A second domain has a second software agent, which administers the activities of the first manager software agent. The second software agent receives information on the first domain, and as such, the second software agent may operate the backup activities of the first domain.


The second software agent can manage a second group of network devices in the second domain in a similar manner to the first manager software agent operating and managing the first domain. As such, many other domains can be defined, and may be placed in communication with other domains. The manager software agent of each domain may be responsible for administratively managing other domains, and may in turn be managed by manager software agents in other domains. Many different control structures can be built with this interconnectivity of domains.


The information on a domain may be passed to another manager software agent responsible for another domain. The parent manager software agent may be able to pass instructions to the child domain and its manager software agent. As such, the parent manager software agent can operate the domain, or may be able to administer the child manager software agent's management of the domain.


Further, the second manager software agent may execute on the same network device as the first manager software agent. Alternatively, the second manager software agent may execute on a different network device as the first manager software agent.


Other aspects of the present invention will become apparent with further reference to the drawings and specification that follow.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a block diagram of a hierarchical network backup system according to the invention.



FIG. 2 is functional block diagram of an embodiment of the hierarchical backup system of FIG. 1 embodying data transfer between the components comprising the individual backup cell and the transfer of data outside of the backup cell.



FIG. 3 is a block diagram detailing the use of the manager component of FIG. 1 as a virtual manager component for a plurality of virtual backup cells.



FIG. 4 is a logical block diagram of the resulting backup cells of the network system depicted in FIG. 3.



FIG. 5 is a block diagram of an exemplary hierarchical backup network according to the invention.





DETAILED DESCRIPTION OF THE INVENTION


FIG. 1 is a block diagram of a hierarchical network backup system according to the invention. A backup cell 100 comprises a plurality of network devices 110 (1), 120 (2), and 130 (3) that are to be backed up. The backups of the network devices are made to the attached backup devices 112, 122, and 132.


The network computing device 110 (1) contains a first manager component such as manager component 114. The first manager component 114 is a software agent responsible for maintaining backup parameters of the backups in the backup cell 100, and initiating a backup policy for the attached network computing devices according to those parameters. The parameters can include schedules of backups, aging policies, pruning policies, and backup media usage policies. Thus, through the operation of the first manager component 114, an administrator can define the characteristics of the backup actions for the network computing devices associated with the backup cell 100.


Connected to and in communication with the backup cell 100 is a backup cell 150, comprising a plurality of network devices 160 (4), 170 (5), and 180 (6). These network devices are also subject to backing up to the backup devices 162, 172, and 182.


The network computing device 160 (4) contains a second manager component such as manager component 164 that is responsible for the backup parameters of the backups in the backup cell 150. The second manager component 164 is similar in operation and in functionality to the first manager component 114 in the backup cell 100. Thus, through the operation of the second manager component 164, an administrator can define the characteristics of the backup actions for the backup cell 100.


In the case where the network 140 connecting the network devices 110 (1), 120 (2), and 130 (3) is not suitable based on speed and/or reliability, the size and scope of the backup cell 100 may be limited. Or, the site at which the backup cell 100 is physically located may not have an administrator present with the background, ability, or authority to modify the backup parameters of the backup cell 100. Or, having a single point of failure, namely the network device 110 (1) or the first manager component 114 may not be an acceptable alternative to the user of the backup cell 100.


As such, the second manager component 164 of the backup cell 150 is placed in communication with the backup cell 100. The second manager component 164 running on the network device 160 (4) is given the authority, power, and ability to maintain and control the backup parameters and actions on the backup cell 100. Further, information on the status of the network devices, the backup devices, and on the first manager component 114 is made known to the second manager component 164. Thus, the backup of the network devices 110 (1), 120 (2), and 130 (3) may be maintained and controlled from another software agent at another location, such as the second manager component 164. As such, alternative administration may be exercised on the backup characteristics and actions of the backup cell 100 from another backup cell.


Routine activities within the backup cell 100 can take place with little or no interaction with the second remote manager component 164. These routine activities include backups of and restorations to the network devices 110 (1), 120 (2), and 130 (3), and administration and/or configuration of the parameters of the archival functionality of the backup cell 100.


Alternatively, interaction with the second remote manager component 164 could take place when an administrator who is logged into the network device 160 (4) would like to administer activity that takes place in the backup cell 100. Or, splitting of administrative functionality between the first and second manager components 114 and 164 could take place, thus centralizing some or all of the definition of the functionality of the backup schemes to a common set of parameters across associated backup cells. Or, the administrative authority of the manager components may be highly decentralized, and the alternative control of another backup cell may be used only when the manager component of another backup has failed for some reason.


Information on the individual components making up the backup cell 100 can be communicated to the second manager component 164. Thus, the second manager component 164 could, to varying degrees as defined by operational needs, operate or initiate operation of the various components of the backup cell 100.


The second manager component 164 could also be configured to change the operational parameters of the manager component 150. Thus, a system wide change to backup cell parameters can be initiated through a single manager component and propagated to other backup cells. Or, the second manager component 164 could fill in for the first manager component 114 should it fail. Additionally, the interaction between the backup cells and other manager components allows for the appearance of a “seamless” network of backup cells to administrators sitting in remote locations.


Additional supervisory levels, controls, or permissions could be added to the second manager component 164 to allow the supervisory control of additional backup cells for which the first manager component 114 is supervising. As such, a hierarchy of backup control can be realized through the interaction of levels or connections of manager components.


Additionally, the first and second manager components 114 and 164 can be configured such that critical events are propagated to another manager component having supervisory control or permission for it. Thus, an administrator logged into a managerial component sitting in the path of propagation can see critical events happening in the backup cells in the path of supervision. This criticality threshold for an event to be propagated to another management component of another backup cell may be configurable. Thus, an individual manager component can track the universe of backup cells that it is communicatively coupled to.


It should be noted that while only one backup cell is pictured in communication with the second manager component 164, that any number of backup cells may be envisioned. It should also be noted that the hierarchy of backup cells may be configured in many manners. Thus, a single manager component may associate itself with several other backup cells, in a “shallow” configuration. Or, each succeeding manager component may be associated with one or more other backup cells, providing a tree-like structure to the supervisory capacities of the manager components. Or, a ring-like structure may be envisioned, where each manager component is associated with another backup cell, and the last manager component is associated with the first backup cell.


Further details on structures of a backup cell may also be envisioned by reference to U.S. patent application Ser. No. 09/354,063, entitled “MODULAR BACKUP AND RETRIEVAL SYSTEM”, filed Jul. 15, 1999. This application is incorporated hereby by reference for all purposes. The details of the backup cell as recited in the reference are substantially similar to that outlined above, but are not detailed in this application.



FIG. 2 is functional block diagram of an embodiment of the hierarchical backup system of FIG. 1 embodying data transfer between the components comprising the individual backup cell and the transfer of data outside of the backup cell. The backup cell 200 comprises the network computing devices 210 (1), 220 (2), and 230 (3). The network computing device 210 (1) runs a first manager component such as first manager component 212, responsible for the backup parameters of the backup cell 200, as described before.


The network computing devices 210 (1) and 230 (3) are communicatively coupled to backup devices 218 and 238, respectively. The backup devices 218 and 238 store the data and or files directed to them in a backup, where the data and/or files can be retrieved at a later time.


The backup devices 218 and 238 are operated by media components 216 and 236, respectively. The media component 216 is a software agent responsible for the physical operation of the backup device 218 during a backup or restore. During a backup, the media component 216 maintains an index of the data units and/or files backed up and where they are physically located on the physical backup device 218. The backup device 238 and the media component 236 operate in a similar manner. It should be noted that the backup devices may be many types of devices, including such storage devices as tape drives, cartridge drives, magneto-optical drives, or any combination thereof.


The network computing devices 210 (1), 220 (2), and 230 (3) also contain client components 214, 224, and 234, respectively. The client components 214, 224, and 234 are software agents tasked with maintaining the operational parameters and controlling a backup or restore of an individual network computing device. Thus, the types of files and/or data backed up, the priority of the files and/or data to be backed up, and other operational parameters of a backup for a particular network computing device are controlled by a particular client component.


In a backup, the first manager component 212 would indicate to the appropriate client component to initiate a backup, and that the backup should be directed to a particular backup media. For example, assume that the first manager component 212 determines that a backup of the network device 220 (2) is warranted. The first manager component 212 also determines that the backup should be directed to the backup device 238. The first manager component 212 would contact the client component 224 with the request for a backup of the network device 220 (2), and that the data and/or files should be stored through the media component 236 on the backup device 238.


The client component 224 undertakes the backup of the network computing device 220 (2) in an appropriate manner. The backup may be a full backup, an incremental backup, or a differential backup, depending upon the strategy as defined by an administrator for the network computing device 220 (2). The client component 224 would then notify the media component 236 of the data and/or files to be backed up. The media component 236 would cause the data and/or files sent by the client component 224 to be physically backed up on the backup device 238.


The media component 236 makes an index entry for the backed up file and/or data units, thus keeping an easily maintained and coordinated way to manage information on the backup of the file and/or data units, including their whereabouts and other particulars. Portions of the indexed information on the file and/or data units are forwarded to the first manager component 212. The manager component may use this information in the managing of the backup devices and the determination of where to send other file and or data units from backups from other network computing devices.


The first manager component 212 is able to receive and send this indexed information to the second manager component such as second manager component 262 running on the network computing device 260 (4). Additional indexed information on the backup can exist distributed about the various media components, and the first or second manager components 212 or 262 can access this information by querying the proper media component for it. Thus, the information required to make the proper query can be passed among the manager components as well. The second manager component 262 can itself be a manager component for the backup cell where it resides.


While a peer-to-peer relationship can be present among the manager components, the manager components can be configured in a parent-child relationship as well. The first manager component 212 can be configured to receive directions from the second manager component 262 regarding the operation of the backup cell 200. Additionally, information on the client components 214, 224, and 234 could be provided, as well as information on the media components 216 and 236, and on the backup devices 218 and 238.


Should the second manager component 262 running on the network computing device 260 (4) be so configured, this information from the first manager component 212 could be propagated to the second manager component 262. Thus, complete operational control of the first manager component 212 could be asserted from the second manager component 262 with the proper authorization.


Further, since the second manager component 262 has information about the client components 214, 224, and 234, the information about the media components 216 and 236, as well as information about the media devices 218 and 238, the second manager component 262 could operate as a surrogate manager component to the backup cell 200. As such, the first manager component 212 could be bypassed in the event of a failure of the first manager component 212.


Additionally, the second manager component 262 may be given a supervisory control over the first manager component 212. This would enable the second manager component 262 to change operational parameters, administration, or configuration of the backup cell 200, or to allow a supervisor sitting at the network device 260 (4) to operate the functionality of the backup cell 200 in the event of an emergency.



FIG. 3 is a block diagram detailing the use of the manager component of FIG. 1 as a virtual manager component for a plurality of virtual backup cells. The backup cells 100 and 150 of FIG. 1 may be “virtual”, as well as physical, backup cells. The virtual manager components can identify administrative domains over which the particular virtual manager component exercises administrative control.


In this case, one physical manager component such as first manager component 310 could be logically divided into several virtual manager components 320 (3), 330 (1), and 340 (2). Each of the virtual manager components 320 (3), 330 (1), and 340 (2) would be responsible for the backup functionality of portions of the physical network devices located in the physical backup cell.


The first manager component 310 runs on a network computing device 312. Connected to and in communication with the network computing device 312 are network computing devices 370 (3), 372 (4), 350 (1), 352 (2), 360 (5), and 362 (6).


The network computing devices 370 (3) and 372 (4) are logically grouped together as a unit requiring one particular set of backup guidelines. Similarly, the network computing devices 350 (1) and 352 (2) are logically grouped together as another group of network computing devices requiring another particular set of backup guidelines. Also, the network computing devices 360 (5) and 362 (6) are logically grouped together as a unit requiring yet another particular set of backup guidelines.


The first manager component 310 can be configured to operate three independent backup management policies. The virtual manager component 340 (2) is responsible for the backup management of the group of network devices 370 (3) and 372 (4). The virtual manager component 320 (3) is responsible for the backup management of the group of network devices 350 (1) and 352 (2). The virtual manager component 330 (1) is responsible for the backup management of the group of network devices 360 (5) and 362 (6).


A remote network computing device 380 operates a second manager component such as manager component 385. The second manager component 385 is in communication with the first manager component 310. As such, the first manager component 310 can be configured to supervise the activities of the manager component 310, and the virtual manager components 320 (3), 330 (1), and 340 (2).



FIG. 4 is a logical block diagram of the resulting backup cells of the network system depicted in FIG. 3. The manager component 340 and the network computing devices 370 (3) and 372 (4) make up a first virtual backup cell 410. Similarly, the manager component 320 (3), along with the network computing devices 350 (1) and 352 (2), make up a second virtual backup cell 420. Also, the manager component 330 (1) and the network computing devices 360 (5) and 362 (6) make up a third virtual backup cell 430.


Each virtual manager component is responsible and maintains the functional parameters associated with the group of network computing devices associated with it. Each virtual manager component within the physical first manager component 310 (depicted in FIG. 3) is able to maintain and control the backup and restoration actions and parameters of the network devices associated with it in a manner independent from the other virtual manager components it is related to.


The virtual manager components may be configured where one of the manager components maintains supervisory control over the others, or any other combination. Or, the remote second manager component 385 may maintain supervisory control any of the virtual manager components 320 (3), 330 (1), and 340 (2) and their associated backup cells. Or, as indicated earlier, any or all of the virtual manager components 320 (3), 330 (1), and 340 (2) may be configured to supervise the second manager component 385 and its associated backup cell.


As such, the ability to link together similar network devices under different manager components enables a backup system that easily defines domains and sub-domains within an enterprise or organization. Thus, a manager component able to maintain supervisory control over others may be easily maintained and identified in a linked network of virtual and physical backup cells by name.



FIG. 5 is a block diagram of an exemplary hierarchical backup network according to the invention. Each bubble represents a physical backup cell, as described previously. The physical backup cells may contain other virtual backup cells. The backup cells can be configurable by a domain name, which uniquely identifies the location and/or supervisory overview of the backup cell in the hierarchy.


As such, the root backup cell of the network of backup cells can be defined as the domain name “Company”, or other identifier indicating the root. In the naming convention, any manager component associated with a particular name would exercise supervisory control over manager components having that name followed by a delimiter, and followed by a sub-domain name. In this case, the manager component within a backup cell that is the root of a sub-tree would be able to exercise supervisory or administrative control over the backup cells further from the root.


Thus, the manager component associated with the “Company” backup cell would exercise supervisory control over the entire tree, including the sub-domains indicated by “Company.hq”, “Company.mktg”, “Company.eng”, and “Company.sales”. Additionally, the manager components under each of the sub-domains would exercise supervisory control over the sub-sub-domains identified with the proper sub-domain prefix.


As such, the domain “Company.hq” may be representative of an administrative domain located at a company's headquarters and responsible for backup actions and parameters about the physical headquarters. The managerial component associated with the domain “Company” can exercise supervisory control over the backup cell associated with the domain “Company.hq”.


A backup cell 510 is a backup cell associated with the sales network computing devices. The backup cell 510 contains two different domains, “Company.sales” and “Company.sales.usa”. The domain “Company.sales” is the supervisory domain for the sub-domains existing underneath “Company.sales”. The domain “Company.sales.usa” is associated with a backup cell that manages the backups for network computing devices in the company's United States sales area. The manager component directing the backup cell “Company.sales.usa” is supervised by the manager component associated with the backup cell “Company.sales”


A backup cell 512 is associated with the network devices involved in the company's sales in Europe. The backup cell 512 is communicatively coupled to the backup cell 510, and is given the domain name “Company.sales.eur”. As such, the manager component associated with the backup cell 512 is under the supervisory control of the manager component associated with the domain “Company.sales”.


Correspondingly, the backup cell 514 is concerned with directing backups of network computing devices involved in the Asian sales division. The backup cell 514 is communicatively coupled to the backup cell 510, and has the domain name “Company.sales.asia”. Thus, the manager component for the backup cell 514 is under the supervisory control of the manager component associated with the domain name “Company.sales”.


One should note that in this example the manager components for the backup cell 512 do not have supervisory control over the backup cell 514, and vice versa. In any case, this is possible and can be implemented.


The backup cell 520 contains several hierarchical portions. First, the domain “Company.mktg” is contained in the backup cell 520. The manager component associated with the “Company.mktg” domain exercise supervisory functions for backup cells residing under the “Company.mktg” domain. These other sub-domains are administered and configured from the manager component associated with the “Company.mktg” domain.


Additionally, the backup cell 520 contains the virtual backup cells “Company.mktg.ty” and “Company.mktg.print”, each associated with the backup of network devices associated with the different departments in the “Company.mktg” domain. Each domain has its own virtual manager component exercising control over its own particular administrative domain, and being under the supervisory control of a manager component running on the same backup cell 520.


A backup cell 530 contains a domain named “Company.eng”, responsible for supervisory control of the backup schemes for the network devices in the company's engineering locations. The backup cell 530 also contains a domain “Company.eng.nj”. The manager component associated with the domain “Company.eng.nj” is responsible for the configuration, administration, and direction of backups of network computing devices for engineering work located in the company's New Jersey locations.


Nested underneath the backup cell 530 are backup cells 532, 534, and 536, having the domain names “Company.eng.ca”, “Company.eng.tx”, and “Company.eng jp”, respectively. Each of these backup cells is responsible for the backup of network computing devices at a particular location, and is under the supervisory control of the manager component associated with the domain “Company.eng”.


Additionally, other backup cells 540 and 542 are nested beneath the domain “Company.eng.ca”. The domains “Company.eng.ca.routers” and “Company.eng.ca.gateways” are associated with backup cells for network computing devices associated with specific lines of engineering.


Thus, from the manager component associated with the domain “Company”, an administrator can configure, administer, or direct backup activities for any of the nested backup cells below it in the “hq”, “sales”, “mktg”, or “eng” domains. Sufficient information on backups and events are replicated up from the lower lying backup cells in the tree to allow the manager component associated with the “Company” domain to perform these supervisory duties. Further, any intervening manager components in the path between a specific domain and the root may perform the supervisory activities.


Thus, from any backup cell on a sub-tree, a manager component associated with that backup cell can supervise, configure, or administer the backup functionality of any backup cell in nested below it. For example, and administrator at the “Company.eng” manager component would be able to configure all the backup cells in with the name “Company.eng.*”, where “*” stands for any sub-domain under the “Company.eng” domain.


Critical events or information regarding a physical backup in a backup cell, such as the information indexed by a media component as it backs up a file and/or data unit, are communicated towards the root. For example, assume that a particular network computing device operating in the backup cell “Company.eng.ca.gateways” fails. If the event is critical enough, news of the event would be replicated to “Company.eng.ca”, and from there to “Company.eng”, and ultimately to “Company”. Thus, actions at any of these backup cells may be asserted to aid the situation. Information regarding the backup process would also be replicated towards the root.


Usually, the events are replicated in an online fashion in real-time. Replication takes place, subject to criticality thresholds, all the way to the root as long as the parent backup cell is reachable. If the parent is unreachable, the underlying backup cell needing to send the information on may periodically spawn a process to check on the reachability of the parent backup cell. If the parent backup cell resumes a reachable state, the message, along with others stored in a queue, are passed upwards to the parent backup cell.


Or, the parent may request a “dump” of meta-data and critical events regarding the status of the system and its children at any time. This dump may be a one level dump, or may recursively act on all the sub-domains of the sub-domain. This meta-data could include the information regarding the backup event and indexed at the time of backup, information of all domains known to the child backup cell, backup devices and their associated media components in the backup cell, clients and their client components in the backup cell, applications running on the client network devices in the backup cell, related archive files grouped into archive groups on the network devices in the backup cell, sets of related media defining a media group in the backup cell, and all backup devices.


Thus, not only events may be passed upwards, but the state of each backup cell, both physical and virtual, may be passed upwards accordingly. This allows the parent manager component to act in place of the child should it be required to do so. Or, it allows true supervisory control of the child backup cell, as well as the supervisory control over any child backup cells of the child backup cell, and so on.


Additionally, due to the passage of this information, viewing, administering, configuring, and controlling the domains under a particular domain is possible from a root domain. Further, the manager components associated with the sub-domains may be administered from the root domain of the tree or any sub-tree within the main body of the tree structure. Thus, administration en masse is possible for an entire enterprise, division, location, or any other granularity as required. In view of the above detailed description of the present invention and associated drawings, other modifications and variations will now become apparent to those skilled in the art. It should also be apparent that such other modifications and variations may be effected without departing from the spirit and scope of the present invention as set forth in this specification.

Claims
  • 1. A storage management system for storing data in a network environment, the storage management system comprising: a first plurality of virtual backup devices;a first manager component comprising one or more computer processors associated with at least the first plurality of virtual backup devices, the first manager component configured to manage backup operations for at least one of the first plurality of virtual backup devices;a second plurality of virtual backup devices;a second manager component associated with at least the second plurality of virtual backup devices, the second manager component configured to manage backup operations for at least one of the second plurality of virtual backup devices;a plurality of media components configured to execute on at least one network computing device and being communicatively coupled to the first and second manager components and the first and second plurality of virtual backup devices,wherein the first manager component is configured to direct backup operations on at least one of the first plurality of virtual backup devices by directing data through at least one of the plurality of media components to one or more of the first plurality of virtual backup devices; andwherein the second manager component is configured to direct backup operations on at least one of the second plurality of virtual backup devices by directing data through at least one of the plurality of media components to one or more of the second plurality of virtual backup devices.
  • 2. The storage management system of claim 1 wherein the at least one of the plurality of media components comprises an index of the physical location of the data stored on the first plurality of virtual backup devices.
  • 3. The storage management system of claim 2 wherein the media component is configured to send at least a portion of the index to the second manager component.
  • 4. The storage management system of claim 3 wherein the second manager component is configured to send the portion of the index to the first manager component.
  • 5. The storage management system of claim 1 wherein the first manager component is configured to maintain information regarding an operational status of at least one of the second manager component and at least one of the plurality of media components.
  • 6. The storage management system of claim 1 wherein the at least one other of the second plurality of virtual backup devices further comprises a client component configured to obtain and transmit the data to at least one of the plurality of media components.
  • 7. The system of claim 1, wherein the backup operations are based on at least one of a storage schedule, an aging policy and a pruning policy.
  • 8. A method for performing a storage operation in a storage management system, the method comprising: processing backup operations with a first management component comprising one or more computer processors, wherein the first management component is associated with at least a first plurality of virtual backup devices;processing backup operations with a second management component associated with a second plurality of virtual backup devices;directing with the first manager component backup operations on at least one of the first plurality of virtual backup devices by directing data through at least one of a plurality of media components to one or more of the first plurality of virtual backup devices; anddirecting with the second manager component backup operations on at least one of the second plurality of virtual backup devices by directing data through at least one of the plurality of media components to one or more of the second plurality of virtual backup devices.
  • 9. The method of claim 8 wherein the backup operations are based at least on an aging policy.
  • 10. The method of claim 8 additionally comprising alerting the first manager component with respect to backup operations by the second manager component.
  • 11. The method of claim 8 further comprising selecting a third manager component based on an availability of the second manager component and the third manager component.
  • 12. The method of claim 8 further comprising maintaining an index of the physical location of the data stored on at least one of the first or second plurality of virtual backup devices.
  • 13. The method of claim 12 further comprising sending at least a portion of the index to the second manager component.
  • 14. The method of claim 13 further comprising sending the portion of the index to the first manager component.
  • 15. The method of claim 8, further comprising maintaining information regarding an operational status of the second manager component, and at least one of the plurality of media components.
  • 16. The method of claim 8, wherein the backup operations are based on at least one of a storage schedule, an aging policy and a pruning policy.
RELATED APPLICATIONS

This application is a continuation of U.S. patent application No. 13/011,219, entitled “HIERARCHICAL SYSTEMS AND METHODS FOR PERFORMING DATA STORAGE OPERATIONS”, filed Jan. 21, 2011, which is a continuation of U.S. patent application Ser. No. 12/109,201, entitled “HIERARCHICAL SYSTEMS AND METHODS FOR PERFORMING DATA STORAGE OPERATIONS”, filed Apr. 24, 2008, now U.S. Pat. No. 7,877,351, issued Jan. 25, 2011, which is a continuation of U.S. patent application Ser. No. 09/354,058, entitled “HIERARCHICAL BACKUP AND RETRIEVAL SYSTEM,” filed on Jul. 15, 1999, now U.S. Pat. No. 7,395,282, issued Jul. 1, 2008, each of which are hereby incorporated herein by reference in their entireties. This application is also related to U.S. patent application Ser. No. 09/354,063, entitled “MODULAR BACKUP AND RETRIEVAL SYSTEM”, filed on Jul. 15, 1999, which is hereby incorporated herein by reference in its entirety.

US Referenced Citations (397)
Number Name Date Kind
4296465 Lemak Oct 1981 A
4686620 Ng Aug 1987 A
4751639 Corcoran et al. Jun 1988 A
4995035 Cole et al. Feb 1991 A
5005122 Griffin et al. Apr 1991 A
5093912 Dong et al. Mar 1992 A
5125075 Goodale et al. Jun 1992 A
5133065 Cheffetz et al. Jul 1992 A
5140683 Gallo et al. Aug 1992 A
5163148 Walls Nov 1992 A
5193154 Kitajima et al. Mar 1993 A
5204958 Cheng et al. Apr 1993 A
5212772 Masters May 1993 A
5226157 Nakano et al. Jul 1993 A
5239647 Anglin et al. Aug 1993 A
5241668 Eastridge et al. Aug 1993 A
5241670 Eastridge et al. Aug 1993 A
5265159 Kung Nov 1993 A
5276860 Fortier et al. Jan 1994 A
5276867 Kenley et al. Jan 1994 A
5287500 Stoppani, Jr. Feb 1994 A
5301351 Jippo Apr 1994 A
5311509 Heddes et al. May 1994 A
5321816 Rogan et al. Jun 1994 A
5333251 Urabe et al. Jul 1994 A
5333315 Saether et al. Jul 1994 A
5347653 Flynn et al. Sep 1994 A
5387459 Hung Feb 1995 A
5410700 Fecteau et al. Apr 1995 A
5426284 Doyle Jun 1995 A
5448724 Hayashi et al. Sep 1995 A
5455926 Keele et al. Oct 1995 A
5491810 Allen Feb 1996 A
5495607 Pisello et al. Feb 1996 A
5504873 Martin et al. Apr 1996 A
5544345 Carpenter et al. Aug 1996 A
5544347 Yanai et al. Aug 1996 A
5555404 Torbjornsen et al. Sep 1996 A
5559957 Balk Sep 1996 A
5559991 Kanfi Sep 1996 A
5574898 Leblang et al. Nov 1996 A
5598546 Blomgren Jan 1997 A
5613134 Lucus et al. Mar 1997 A
5615392 Harrison et al. Mar 1997 A
5619644 Crockett et al. Apr 1997 A
5638509 Dunphy et al. Jun 1997 A
5642496 Kanfi Jun 1997 A
5649185 Antognini et al. Jul 1997 A
5659614 Bailey Aug 1997 A
5673381 Huai et al. Sep 1997 A
5675511 Prasad et al. Oct 1997 A
5677900 Nishida et al. Oct 1997 A
5682513 Candelaria et al. Oct 1997 A
5687343 Fecteau et al. Nov 1997 A
5699361 Ding et al. Dec 1997 A
5719786 Nelson et al. Feb 1998 A
5729743 Squibb Mar 1998 A
5734817 Roffe et al. Mar 1998 A
5737747 Vishlitzky et al. Apr 1998 A
5740405 DeGraaf Apr 1998 A
5742807 Masinter Apr 1998 A
5751997 Kullick et al. May 1998 A
5758359 Saxon May 1998 A
5758649 Iwashita et al. Jun 1998 A
5761677 Senator et al. Jun 1998 A
5761734 Pfeffer et al. Jun 1998 A
5764972 Crouse et al. Jun 1998 A
5778395 Whiting et al. Jul 1998 A
5790828 Jost Aug 1998 A
5805920 Sprenkle et al. Sep 1998 A
5806058 Mori et al. Sep 1998 A
5812398 Nielsen Sep 1998 A
5812748 Ohran et al. Sep 1998 A
5813009 Johnson et al. Sep 1998 A
5813013 Shakib et al. Sep 1998 A
5813017 Morris Sep 1998 A
5829046 Tzelnic et al. Oct 1998 A
5835953 Ohran Nov 1998 A
5845257 Fu et al. Dec 1998 A
5860073 Ferrel et al. Jan 1999 A
5860104 Witt et al. Jan 1999 A
5864871 Kitain et al. Jan 1999 A
5875478 Blumenau Feb 1999 A
5875481 Ashton et al. Feb 1999 A
5878230 Weber et al. Mar 1999 A
5881311 Woods Mar 1999 A
5884067 Storm et al. Mar 1999 A
5887134 Ebrahim Mar 1999 A
5893139 Kamiyama Apr 1999 A
5896531 Curtis et al. Apr 1999 A
5897642 Capossela et al. Apr 1999 A
5898431 Webster et al. Apr 1999 A
5901327 Ofek May 1999 A
5924102 Perks Jul 1999 A
5926836 Blumenau Jul 1999 A
5933104 Kimura Aug 1999 A
5933601 Fanshier et al. Aug 1999 A
5950205 Aviani, Jr. Sep 1999 A
5956519 Wise et al. Sep 1999 A
5956733 Nakano et al. Sep 1999 A
5958005 Thorne et al. Sep 1999 A
5970233 Liu et al. Oct 1999 A
5970255 Tran et al. Oct 1999 A
5974563 Beeler, Jr. Oct 1999 A
5978841 Berger Nov 1999 A
5987478 See et al. Nov 1999 A
5991753 Wilde Nov 1999 A
5995091 Near et al. Nov 1999 A
6000020 Chin et al. Dec 1999 A
6003089 Shaffer et al. Dec 1999 A
6009274 Fletcher et al. Dec 1999 A
6012090 Chung et al. Jan 2000 A
6012415 Linseth Jan 2000 A
6016553 Schneider et al. Jan 2000 A
6018744 Mamiya et al. Jan 2000 A
6021415 Cannon et al. Feb 2000 A
6023710 Steiner et al. Feb 2000 A
6026414 Anglin Feb 2000 A
6026437 Muschett et al. Feb 2000 A
6052735 Ulrich et al. Apr 2000 A
6070228 Belknap et al. May 2000 A
6073137 Brown et al. Jun 2000 A
6073220 Gunderson Jun 2000 A
6076148 Kedem et al. Jun 2000 A
6078934 Lahey et al. Jun 2000 A
6085030 Whitehead et al. Jul 2000 A
6088694 Burns et al. Jul 2000 A
6091518 Anabuki Jul 2000 A
6094416 Ying Jul 2000 A
6101585 Brown et al. Aug 2000 A
6105037 Kishi Aug 2000 A
6105129 Meier et al. Aug 2000 A
6108640 Slotznick Aug 2000 A
6108712 Hayes, Jr. Aug 2000 A
6112239 Kenner et al. Aug 2000 A
6122668 Teng et al. Sep 2000 A
6131095 Low et al. Oct 2000 A
6131190 Sidwell Oct 2000 A
6137864 Yaker Oct 2000 A
6148377 Carter et al. Nov 2000 A
6148412 Cannon et al. Nov 2000 A
6154787 Urevig et al. Nov 2000 A
6154852 Amundson et al. Nov 2000 A
6161111 Mutalik et al. Dec 2000 A
6161192 Lubbers et al. Dec 2000 A
6167402 Yeager Dec 2000 A
6175829 Li et al. Jan 2001 B1
6189051 Oh et al. Feb 2001 B1
6212512 Barney et al. Apr 2001 B1
6212521 Minami et al. Apr 2001 B1
6230164 Rekieta et al. May 2001 B1
6249795 Douglis Jun 2001 B1
6253217 Dourish et al. Jun 2001 B1
6260069 Anglin Jul 2001 B1
6263368 Martin Jul 2001 B1
6269382 Cabrera et al. Jul 2001 B1
6269431 Dunham Jul 2001 B1
6275953 Vahalia et al. Aug 2001 B1
6292783 Rohler Sep 2001 B1
6295541 Bodnar et al. Sep 2001 B1
6301592 Aoyama et al. Oct 2001 B1
6304880 Kishi Oct 2001 B1
6314439 Bates et al. Nov 2001 B1
6314460 Knight et al. Nov 2001 B1
6324581 Xu et al. Nov 2001 B1
6328766 Long Dec 2001 B1
6330570 Crighton Dec 2001 B1
6330572 Sitka Dec 2001 B1
6330589 Kennedy Dec 2001 B1
6330642 Carteau Dec 2001 B1
6343287 Kumar et al. Jan 2002 B1
6343324 Hubis et al. Jan 2002 B1
6350199 Williams et al. Feb 2002 B1
6351763 Kawanaka Feb 2002 B1
6351764 Voticky et al. Feb 2002 B1
RE37601 Eastridge et al. Mar 2002 E
6353878 Dunham Mar 2002 B1
6356801 Goodman et al. Mar 2002 B1
6356863 Sayle Mar 2002 B1
6360306 Bergsten Mar 2002 B1
6367029 Mayhead et al. Apr 2002 B1
6374336 Peters et al. Apr 2002 B1
6389432 Pothapragada et al. May 2002 B1
6396513 Helfman et al. May 2002 B1
6397308 Ofek et al. May 2002 B1
6418478 Ignatius et al. Jul 2002 B1
6421709 McCormick et al. Jul 2002 B1
6421711 Blumenau et al. Jul 2002 B1
6438595 Blumenau et al. Aug 2002 B1
6442600 Anderson Aug 2002 B1
6453325 Cabrera et al. Sep 2002 B1
6466592 Chapman Oct 2002 B1
6470332 Weschler Oct 2002 B1
6473794 Guheen et al. Oct 2002 B1
6487561 Ofek et al. Nov 2002 B1
6487644 Huebsch et al. Nov 2002 B1
6493811 Blades et al. Dec 2002 B1
6519679 Devireddy et al. Feb 2003 B2
6535910 Suzuki et al. Mar 2003 B1
6538669 Lagueux, Jr. et al. Mar 2003 B1
6542909 Tamer et al. Apr 2003 B1
6542972 Ignatius et al. Apr 2003 B2
6546545 Honarvar et al. Apr 2003 B1
6549918 Probert et al. Apr 2003 B1
6553410 Kikinis Apr 2003 B2
6557039 Leong et al. Apr 2003 B1
6564219 Lee et al. May 2003 B1
6564228 O'Connor May 2003 B1
6581143 Gagne et al. Jun 2003 B2
6593656 Ahn et al. Jul 2003 B2
6604149 Deo et al. Aug 2003 B1
6615241 Miller et al. Sep 2003 B1
6631493 Ottesen et al. Oct 2003 B2
6647396 Parnell et al. Nov 2003 B2
6647409 Sherman et al. Nov 2003 B1
6654825 Clapp et al. Nov 2003 B2
6658436 Oshinsky et al. Dec 2003 B2
6658526 Nguyen et al. Dec 2003 B2
6704933 Tanaka et al. Mar 2004 B1
6721767 De Meno et al. Apr 2004 B2
6728733 Tokui Apr 2004 B2
6732124 Koseki et al. May 2004 B1
6742092 Huebsch et al. May 2004 B1
6757794 Cabrera et al. Jun 2004 B2
6760723 Oshinsky et al. Jul 2004 B2
6763351 Subramaniam et al. Jul 2004 B1
6789161 Blendermann et al. Sep 2004 B1
6871163 Hiller et al. Mar 2005 B2
6874023 Pennell et al. Mar 2005 B1
6886020 Zahavi et al. Apr 2005 B1
6912645 Dorward et al. Jun 2005 B2
6941304 Gainey et al. Sep 2005 B2
6952758 Chron et al. Oct 2005 B2
6968351 Butterworth Nov 2005 B2
6973553 Archibald, Jr. et al. Dec 2005 B1
6978265 Schumacher Dec 2005 B2
6983351 Gibble et al. Jan 2006 B2
7003519 Biettron et al. Feb 2006 B1
7003641 Prahlad et al. Feb 2006 B2
7035880 Crescenti et al. Apr 2006 B1
7039860 Gautestad May 2006 B1
7062761 Slavin et al. Jun 2006 B2
7076685 Pillai et al. Jul 2006 B2
7082441 Zahavi et al. Jul 2006 B1
7085904 Mizuno et al. Aug 2006 B2
7096315 Takeda et al. Aug 2006 B2
7103731 Gibble et al. Sep 2006 B2
7103740 Colgrove et al. Sep 2006 B1
7107298 Prahlad et al. Sep 2006 B2
7107395 Ofek et al. Sep 2006 B1
7120757 Tsuge Oct 2006 B2
7130970 Devassy et al. Oct 2006 B2
7134041 Murray et al. Nov 2006 B2
7149893 Leonard et al. Dec 2006 B1
7155465 Lee et al. Dec 2006 B2
7155481 Prahlad et al. Dec 2006 B2
7155633 Tuma et al. Dec 2006 B2
7174312 Harper et al. Feb 2007 B2
7194454 Hansen et al. Mar 2007 B2
7246140 Therrien et al. Jul 2007 B2
7246207 Kottomtharayil et al. Jul 2007 B2
7269612 Devarakonda et al. Sep 2007 B2
7272606 Borthakur et al. Sep 2007 B2
7278142 Bandhole et al. Oct 2007 B2
7287047 Kavuri Oct 2007 B2
7293133 Colgrove et al. Nov 2007 B1
7315923 Retnamma et al. Jan 2008 B2
7315924 Prahlad et al. Jan 2008 B2
7328225 Beloussov et al. Feb 2008 B1
7343356 Prahlad et al. Mar 2008 B2
7343365 Farnham et al. Mar 2008 B2
7343453 Prahlad et al. Mar 2008 B2
7343459 Prahlad et al. Mar 2008 B2
7346623 Prahlad et al. Mar 2008 B2
7346751 Prahlad et al. Mar 2008 B2
7356657 Mikami Apr 2008 B2
7359917 Winter et al. Apr 2008 B2
7380072 Kottomtharayil et al. May 2008 B2
7386552 Kitamura et al. Jun 2008 B2
7389311 Crescenti et al. Jun 2008 B1
7395282 Crescenti et al. Jul 2008 B1
7409509 Devassy et al. Aug 2008 B2
7430587 Malone et al. Sep 2008 B2
7433301 Akahane et al. Oct 2008 B2
7434219 De Meno et al. Oct 2008 B2
7447692 Oshinsky et al. Nov 2008 B2
7454569 Kavuri et al. Nov 2008 B2
7467167 Patterson Dec 2008 B2
7472238 Gokhale Dec 2008 B1
7484054 Kottomtharayil et al. Jan 2009 B2
7490207 Amarendran Feb 2009 B2
7496589 Jain et al. Feb 2009 B1
7500053 Kavuri et al. Mar 2009 B1
7500150 Sharma et al. Mar 2009 B2
7509316 Greenblatt et al. Mar 2009 B2
7512601 Cucerzan et al. Mar 2009 B2
7519726 Palliyll et al. Apr 2009 B2
7523483 Dogan Apr 2009 B2
7529748 Wen et al. May 2009 B2
7532340 Koppich et al. May 2009 B2
7536291 Retnamma et al. May 2009 B1
7543125 Gokhale Jun 2009 B2
7546324 Prahlad et al. Jun 2009 B2
7581077 Ignatius et al. Aug 2009 B2
7596586 Gokhale et al. Sep 2009 B2
7613748 Brockway et al. Nov 2009 B2
7617253 Prahlad et al. Nov 2009 B2
7617262 Prahlad et al. Nov 2009 B2
7617541 Plotkin et al. Nov 2009 B2
7627598 Burke Dec 2009 B1
7627617 Kavuri et al. Dec 2009 B2
7636743 Erofeev Dec 2009 B2
7651593 Prahlad et al. Jan 2010 B2
7661028 Erofeev Feb 2010 B2
7668798 Scanlon et al. Feb 2010 B2
7685126 Patel et al. Mar 2010 B2
7716171 Kryger May 2010 B2
7734715 Hyakutake et al. Jun 2010 B2
7757043 Kavuri et al. Jul 2010 B2
7802067 Prahlad et al. Sep 2010 B2
7840537 Gokhale et al. Nov 2010 B2
7844676 Prahlad et al. Nov 2010 B2
7870355 Erofeev Jan 2011 B2
7873808 Stewart Jan 2011 B2
7877351 Crescenti et al. Jan 2011 B2
7962455 Erofeev Jun 2011 B2
8041673 Crescenti et al. Oct 2011 B2
8078583 Prahlad et al. Dec 2011 B2
8086809 Prahlad et al. Dec 2011 B2
8121983 Prahlad et al. Feb 2012 B2
8204859 Ngo Jun 2012 B2
8214444 Prahlad et al. Jul 2012 B2
8266106 Prahlad et al. Sep 2012 B2
8266397 Prahlad et al. Sep 2012 B2
8352433 Crescenti et al. Jan 2013 B2
8433679 Crescenti et al. Apr 2013 B2
20020004883 Nguyen et al. Jan 2002 A1
20020040376 Yamanaka et al. Apr 2002 A1
20020042869 Tate et al. Apr 2002 A1
20020049626 Mathias et al. Apr 2002 A1
20020049778 Bell et al. Apr 2002 A1
20020069324 Gerasimov et al. Jun 2002 A1
20020103848 Giacomini et al. Aug 2002 A1
20020107877 Whiting et al. Aug 2002 A1
20020161753 Inaba et al. Oct 2002 A1
20030061491 Jaskiewicz et al. Mar 2003 A1
20030097361 Huang et al. May 2003 A1
20030163399 Harper et al. Aug 2003 A1
20030172158 Pillai et al. Sep 2003 A1
20040107199 Dairymple et al. Jun 2004 A1
20040193953 Callahan et al. Sep 2004 A1
20040205206 Naik et al. Oct 2004 A1
20040230829 Dogan et al. Nov 2004 A1
20050033800 Kavuri et al. Feb 2005 A1
20050044114 Kottomtharayil et al. Feb 2005 A1
20050246510 Retnamma et al. Nov 2005 A1
20050268068 Ignatius et al. Dec 2005 A1
20060005048 Osaki et al. Jan 2006 A1
20060010154 Prahlad et al. Jan 2006 A1
20060010227 Atluri Jan 2006 A1
20070043956 El Far et al. Feb 2007 A1
20070078913 Crescenti et al. Apr 2007 A1
20070100867 Celik et al. May 2007 A1
20070143756 Gokhale Jun 2007 A1
20070183224 Erofeev Aug 2007 A1
20070288536 Sen et al. Dec 2007 A1
20080059515 Fulton Mar 2008 A1
20080229037 Bunte et al. Sep 2008 A1
20080243914 Prahlad et al. Oct 2008 A1
20080243957 Prahlad et al. Oct 2008 A1
20080243958 Prahlad et al. Oct 2008 A1
20080244177 Crescenti et al. Oct 2008 A1
20090055407 Oshinsky et al. Feb 2009 A1
20090228894 Gokhale Sep 2009 A1
20090248762 Prahlad et al. Oct 2009 A1
20090271791 Gokhale Oct 2009 A1
20090319534 Gokhale Dec 2009 A1
20090319585 Gokhale Dec 2009 A1
20100005259 Prahlad Jan 2010 A1
20100049753 Prahlad et al. Feb 2010 A1
20100094808 Erofeev Apr 2010 A1
20100100529 Erofeev Apr 2010 A1
20100122053 Prahlad et al. May 2010 A1
20100131461 Prahlad et al. May 2010 A1
20100138393 Crescenti et al. Jun 2010 A1
20100145909 Ngo Jun 2010 A1
20100179941 Agrawal et al. Jul 2010 A1
20100205150 Prahlad et al. Aug 2010 A1
20110066817 Kavuri et al. Mar 2011 A1
20110072097 Prahlad et al. Mar 2011 A1
20120059797 Prahlad et al. Mar 2012 A1
20120089800 Prahlad et al. Apr 2012 A1
20120124042 Oshinsky et al. May 2012 A1
20120124289 Kavuri et al. May 2012 A1
20120331071 Prahlad et al. Dec 2012 A1
20130006944 Prahlad et al. Jan 2013 A1
20130007391 Crescenti et al. Jan 2013 A1
Foreign Referenced Citations (27)
Number Date Country
0259912 Mar 1988 EP
0341230 Nov 1989 EP
0381651 Aug 1990 EP
0405926 Jan 1991 EP
0467546 Jan 1992 EP
0599466 Jun 1994 EP
0670543 Sep 1995 EP
0717346 Jun 1996 EP
0774715 May 1997 EP
0809184 Nov 1997 EP
0862304 Sep 1998 EP
0899662 Mar 1999 EP
0899662 Mar 1999 EP
0981090 Feb 2000 EP
0986011 Mar 2000 EP
1174795 Jan 2002 EP
H11-102314 Apr 1999 JP
H11-259459 Sep 1999 JP
2001-60175 Mar 2001 JP
WO 9417474 Aug 1994 WO
WO 9513580 May 1995 WO
WO 9839707 Sep 1998 WO
WO 9912098 Mar 1999 WO
WO 9914692 Mar 1999 WO
WO 9923585 May 1999 WO
WO 0104756 Jan 2001 WO
WO 2005050381 Jun 2005 WO
Non-Patent Literature Citations (44)
Entry
Pel-Yung Hsiao and Wei-Shiung Feng; “Using a Multiple Storage Quad Tree on a Hierarchical VLSI Compaction Scheme”; IEEE; 1990; pp. 1-15.
Szor, The Art of Virus Research and Defense, Symantec Press (2005) ISBN 0-321-30454-3, Part 1.
Szor, The Art of Virus Research and Defense, Symantec Press (2005) ISBN 0-321-30454-3, Part 2.
Witten et al., Data Mining: Practical Machine Learning Tools and Techniques, Ian H. Witten & Eibe Frank, Elsevier (2005) ISBN 0-12-088407-0, Part 1.
Witten et al., Data Mining: Practical Machine Learning Tools and Techniques, Ian H. Witten & Eibe Frank, Elsevier (2005) ISBN 0-12-088407-0, Part 2.
International Preliminary Report on Patentability, PCT/US2004/038278, May 15, 2006.
International Search Report, PCT/US2004/038278, Feb. 1, 2006.
International Search Report on Patentability dated Dec. 21, 2000 in PCT/US00/19364 filed Nov. 14, 2000 (Publication No. WO01/04756).
Armstead et al., “Implementation of a Campus-Wide Distributed Mass Storage Service: The Dream vs. Reality,” IEEE, 1995, pp. 190-199.
Arneson, “Development of Omniserver; Mass Storage Systems,” Control Data Corporation, 1990, pp. 88-93.
Arneson, “Mass Storage Archiving in Network Environments” IEEE, 1998, pp. 45-50.
Ashton, et al., “Two Decades of policy-based storage management for the IBM mainframe computer”, www.research.ibm.com, 19 pages, published Apr. 10, 2003, printed Jan. 3, 2009., www.research.ibm.com, Apr. 10, 2003, pp. 19.
Cabrera, et al. “ADSM: A Multi-Platform, Scalable, Back-up and Archive Mass Storage System,” Digest of Papers, Compcon '95, Proceedings of the 40th IEEE Computer Society International Conference, Mar. 5-9, 1995, pp. 420-427, San Francisco, CA.
Catapult, Inc., Microsoft Outlook 2000 Step by Step, Published May 7, 1999, “Collaborating with Others Using Outlook & Exchange”, p. 8 including “Message Timeline.”
Communication in European Application No. 02 747 883.3, mailed Jul. 20, 2007.
Eitel, “Backup and Storage Management in Distributed Heterogeneous Environments,” IEEE, 1994, pp. 124-126.
European Examination Report, App. No. 01906806.3-1244 dated Sep. 21, 2010, 6 pages.
European Examination Report, Application No. 01906806.3-1244, dated Sep. 13, 2006, 3 pages.
European Office Action dated Mar. 26, 2008, EP019068337.
European Office Action dated Apr. 22, 2008, EP02778952.8.
Gait, “The Optical File Cabinet: A Random-Access File system for Write-Once Optical Disks,” IEEE Computer, vol. 21, No. 6, pp. 11-22 (1988).
http://en.wikipedia.org/wiki/Naive—Bayes—classifier dated Jun. 1, 2010.
International Preliminary Report on Patentability, PCT/US2004/038278, dated May 15, 2006.
International Search Report and Preliminary Report on Patentability dated Feb. 21, 2002, PCT/US2001/003183.
International Search Report and Preliminary Report on Patentability dated Mar. 3, 2003, PCT/US2002/018169.
International Search Report and Preliminary Report on Patentability dated May 4, 2001, PCT/US2000/019363.
International Search Report and Preliminary Report on Patentability dated Sep. 29, 2001, PCT/US2001/003209.
International Search Report, dated Aug. 22, 2002, PCT/US2002/017973.
International Search Report, dated Dec. 21, 2000, PCT/US2000/019324.
International Search Report, dated Dec. 21, 2000, PCT/US2000/019329.
International Search Report, dated Dec. 23, 2003, PCT/US2001/003088.
International Search Report, dated Dec. 21, 2000, PCT/US2000/019364.
International Search Report, dated Feb. 1, 2006, PCT/US2004/038278.
Jander, “Launching Storage-Area Net,” Data Communications, US, McGraw Hill, NY, vol. 27, No. 4(Mar. 21, 1998), pp. 64-72.
Japanese Office Action dated Jul. 15, 2008, Application No. 2003/502696.
Microsoft, about using Microsoft Excel 2000 files with earlier version Excel, 1985-1999, Microsoft, p. 1.
Rosenblum et al., “The Design and Implementation of a Log-Structure File System,” Operating Systems Review SIGOPS, vol. 25, No. 5, New York, US, pp. 1-15 (May 1991).
Supplementary European Search Report dated Sep. 21, 2006, EP02778952.8.
Supplementary European Search Report, European Patent Application No. 02747883, dated Sep. 15, 2006; 2 pages.
Szor, The Art of Virus Research and Defense, Symantec Press (2005) ISBN 0-321-30454-3.
Toyoda, Fundamentals of Oracle 8i Backup and Recovery, DB Magazine, Japan, Shoeisha, Co., Ltd.; Jul. 2000; vol. 10, No. 4, 34 total pages.
Translation of Japanese Office Action dated Mar. 25, 2008, Application No. 2003-504235.
Weatherspoon H. et al., “Silverback: A Global-Scale Archival System,” Mar. 2001, pp. 1-15.
Witten et al., Data Mining: Practical Machine Learning Tools and Techniques, Ian H. Witten & Eibe Frank, Elsevier (2005) ISBN 0-12-088407-0.
Related Publications (1)
Number Date Country
20120030177 A1 Feb 2012 US
Continuations (3)
Number Date Country
Parent 13011219 Jan 2011 US
Child 13273083 US
Parent 12109201 Apr 2008 US
Child 13011219 US
Parent 09354058 Jul 1999 US
Child 12109201 US