Computer data is increasingly vital to modern organizations, and protecting against data loss in the event of a system failure is an increasingly important organization objective. Data protection systems for storing organizational source (e.g., production) site data on a periodic basis suffer from several drawbacks. First, they require a system shutdown during backup, since the data being backed up cannot be used during the backup operation. Second, they limit the points in time to which the production site can recover. For example, if data is backed up on a daily basis, there may be several hours of lost data in the event of a disaster. Third, the data recovery process itself is both time consuming and can consume system resources.
Some data protection systems use data replication, by creating a copy of the organization's production site data on a secondary backup storage system, and updating the backup with changes. The backup storage system may be situated in the same physical location as the production storage system, or in a physically remote location. Data replication systems generally operate either at the application level, at the file system level, at the hypervisor level or at the data block level.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described herein in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
One aspect provides a method for migrating a replica hierarchy of a storage system from at least one source device to at least one target device. A configuration of the replica hierarchy is migrated, one or more internal nodes of the replica hierarchy are migrated, and one or more leaf nodes of the replica hierarchy are migrated. A cutover operation is performed by deactivating the at least one source device associated with the replica hierarchy.
Another aspect provides a system having a processor and memory storing computer program code. When executed on the processor, the computer program code causes the processor to execute a migration process operable to perform operations to migrate a replica hierarchy from at least one source device to at least one target device in a storage system. A configuration of the replica hierarchy is migrated, one or more internal nodes of the replica hierarchy are migrated, and one or more leaf nodes of the replica hierarchy are migrated. A cutover operation is performed by deactivating the at least one source device associated with the replica hierarchy.
Another aspect provides a computer program product including a non-transitory computer readable storage medium. The non-transitory computer readable storage medium includes computer program code. When executed on the processor of a computer, the program code causes the computer to execute a process to migrate a replica hierarchy from at least one source device to at least one target device in a storage system. A configuration of the replica hierarchy is migrated, one or more internal nodes of the replica hierarchy are migrated, and one or more leaf nodes of the replica hierarchy are migrated. A cutover operation is performed by deactivating the at least one source device associated with the replica hierarchy.
Objects, aspects, features, and advantages of embodiments disclosed herein will become more fully apparent from the following detailed description, the appended claims, and the accompanying drawings in which like reference numerals identify similar or identical elements. Reference numerals that are introduced in the specification in association with a drawing figure may be repeated in one or more subsequent figures without additional description in the specification in order to provide context for other features. For clarity, not every element may be labeled in every figure. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating embodiments, principles, and concepts. The drawings are not meant to limit the scope of the claims included herewith.
Storage system 100 may include at least one source site 102 and at least one target site 112, which may be co-located or geographically separated. Source site 102 may include one or more processors 105, storage application 106, and storage 108. In some embodiments, storage 108 may include one or more storage volumes 1351-S, that operate as active or production volumes. Target site 112 may include replica manager 116 that manages a plurality of replicas 1181-N (generally referred to herein as replicas 118) according to a policy 114 (e.g., a replication and/or retention policy). Replicas 118 may be stored in one or more volumes 1391-Z of storage 137 of target site 112. Target site 112 may also include one or more processors 133. Source site 102 and target site 112 may be in communication with one or more hosts 113 via communication links 111 and 115, respectively.
Hosts 113 may perform input/output (I/O) operations on source-side storage 108 (e.g., read data from and write data to storage 108). In some embodiments, the I/O operations may be intercepted by and controlled by storage application 106. As changes are made to data stored on storage 108 via the I/O operations from hosts 113, or over time as storage system 100 operates, storage application 106 may control and/or perform data migration 121 from source site 102 to target site 112 over communication link 110. Some illustrative embodiments include migration manager 113a, which may perform data migration 121. In some embodiments, migration manager 113a may be part of source site 102 (e.g., part of storage application 106). In some embodiments, migration manager 113a may be part of target site 112 (e.g., part of replica manager 116). In some embodiments, migration manager 113a may be an external device in communication with source site 102 and target site 112, for example via communication links 111 and 115. In some embodiments, such as shown in
In some embodiments, communication link 110 may be a long distance communication link of a storage area network (SAN), such as an Ethernet or Internet (e.g., TCP/IP) link that may employ, for example, the iSCSI protocol. In some embodiments, one or both of source site 102 and/or target site 112 may include internal (e.g., short distance) communication links (shown as communication links 109 and 119) to transfer data between storage volumes 1391-Z for storing replicas 1181-N, such as an InfiniBand (IB) link or Fibre Channel (FC) link.
In illustrative embodiments, storage system 100 may employ a snapshot (or replication) mechanism to replicate data between source site 102 and target site 112. A replica (or snapshot) may be created from data within storage 108 and transferred to one or more target sites 112 during a data replication cycle. Data replication may be performed based on data replication policies that may define various settings for data recovery operations, shown as policy 114. For example, policy 114 may define a plurality of attributes, such as a frequency with which replicas are generated and how long each replica 118 is kept at target site 112. In some embodiments, one or both of storage application and/or replica manager 116 may define a remote replica lag (e.g., the length of time during which updates may be lost in case of a failure of source site 102), a recovery point objective (RPO) (e.g., a maximum acceptable lag time between the time data is committed to source site 102 and the time the data is committed to target site 112 or an acceptable amount of data loss measured in time), a recovery time objective (RTO) (e.g., the time taken to perform the recovery), the mode of replication (e.g., synchronous, asynchronous, continuous data protection (CDP), point in time (PIT), and so forth), and/or other attributes. For example, in one embodiment, storage application 106 may define the remote replica lag, RPO, RTO and/or other attributes, and policy 114 and replica manager 116 may define the retention policy. In some embodiments, policy 114 may define the remote replica lag, RPO, RTO, retention policy, and/or other attributes.
As described herein, in example embodiments, data replication may be asynchronous data replication performed at time-based intervals during operation of storage system 100. The timing of asynchronous replication cycles and the retention of the replicas 118 may be managed by one or both of storage application 106 of source site 102 and replica manager 116 of target site 112. In one embodiment, storage application 106 of source site 102 may define the timing of asynchronous replication cycles, and the retention may be defined by policy 114. Data replication may alternatively be synchronous data replication performed when data is changed on source site 102.
For example, asynchronous data replication may periodically generate snapshots (or replicas), scan and compare the snapshots to determine changes in data between the snapshots, and transfer the data difference to target site 112. The frequency with which to perform replication cycles may be determined by a recovery point objective (RPO) and/or retention policy settings of policy 114. For example, policy 114 may define an RPO setting of x seconds, where x may be a positive integer, to ensure that the most recent available replica 118 stored on target site 112 reflects the state of data stored on source site 102 no longer than x seconds ago. Policy 114 may also determine how many replicas 118 should be maintained, at what time (e.g., what time of day, week, month, etc.), and for what duration.
Storage system 100 may include one or more consistency groups. A consistency group 147 may include one or more volumes 135 of source site 102, each associated with a corresponding volume 139 of target site 112. Consistency group 147 may treat source volumes 135 and target volumes 139 as a single logical entity for data replication and migration. Each volume 139 may store one or more associated replicas 118 that reflect the data in the consistency group 147 at a point in time (e.g., when the replica 118 was created). For example, replicas (e.g., snapshots) 118 may be generated for each source volume 135 of consistency group 147 at the same time, and stored on associated ones of target volumes 139. As shown in
Illustrative embodiments may migrate data from one or more volumes 1351-S of source site 102 to one or more volumes 1391-Z of storage 137 of target site 112 in a “seamless” manner, shown as data migration 121. For example, data migration operation 121 may be said to be seamless if data is migrated from a first set of volumes of source site 102 (e.g., a first set of volumes 1351-S) to a second set of volumes 1391-Z of storage 137 of target site 112 while the storage system is operating and without the migrated data being unavailable to storage system 100 for other input/output (I/O) operations such as reads or writes. In other words, relocation of the data from source site 102 to target site 112 is “invisible” to users of the storage system in that the storage system is operable throughout data migration operation 121. In some embodiments, the migrated data may include snapshots (or replicas) created for data recovery.
Once the data is moved from source site 102 to target site 112 (including SCSI “personalities” of the source volumes), hosts 113 may connect to volumes 1391-Z of target site 112, and the volumes 1351-S of source site 102 can be deactivated (e.g., cutover). In some embodiments, a SCSI personality of a given volume may include meta-data associated with the volume. The meta-data may include, for example, one or more properties of the given volume (e.g., size, block size, transfer size, one or more features supported by the volume, etc.), one or more identifiers associated with the given volume (e.g., a volume serial number, a volume address, or vendor information of the volume) and dynamic state information of the volume (e.g., SCSI reservation state information of the volume, Asymmetric Logical Unit Access (ALUA) state information of the volume, etc.). In some embodiments, the SCSI personality meta-data may be stored in one or more inquiry pages of the volume, such as Vital Product Data (VPD) information pages of the volume. During data migration operation 121, the SCSI personalities of given ones of target volumes 1391-Z may be matched to the SCSI personalities of associated ones of source volumes 1351-S.
In some embodiments, during data migration operation 121, storage system 100 may operate in an active/passive mode, where hosts 113 cutover from source site 102 to target site 112, such that only one of the source site 102 and the target site 112 is accessible by hosts 113. In some embodiments, during data migration operation 121, storage system 100 may operate in an active/active mode, where hosts 113 are allowed concurrent access to both source site 102 and target site 112. In the active/active mode, source site 102 (or one or more volumes 135 of source site 102) may later be disconnected and removed, and hosts 113 access only target site 112.
Referring to
As described in conjunction with
Some embodiments of storage system 100 may store data in fixed-size chunks, for example 4 KB chunks, where each chunk may have an associated unique hash value. In such embodiments, storage system 100 may be configured to maintain a mapping between I/O (or logical) addresses associated with data and the hash values, and also to maintain a mapping between the hash values and physical storage addresses of the data. These mappings may be maintained using one or more address-to-hash (“A2H”) tables and/or one or more hash-to-physical address (“H2P”) tables. It will be appreciated that combinations of the A2H and H2P tables may provide multiple levels of indirection between the logical (or “I/O”) address used to access data and the physical address where that data is stored. Among other advantages, this may allow storage system 100 freedom to move data within storage 108.
Referring to
Referring to
LUN 402 may represent an original LUN to storage application 106 (e.g., LUN 402 is the production volume). LUN 402 may include offsets (e.g., a first offset (offset 1) 410a, a second offset (offset 2) 410b, a third offset (offset 3) 410c, a fourth offset (offset 4) 410d, a fifth offset (offset 5) 410e and a sixth (offset 6) offset 410f. LUN 402 has IID equal to “2” and an external ID (EID) equal to “1”. The EID may be used by storage application 106 to identify the LUN.
LUN 403 may be a snapshot of LUN 401 and may include offsets (e.g., a first offset (offset 1) 408a, a second offset (offset 2) 408b, a third offset (offset 3) 408c, a fourth offset (offset 4) 408d, a fifth offset (offset 5) 408e and a sixth (offset 6) offset 408f LUN 402 has IID equal to “3” and an external ID (EID) equal to “2”.
As shown in
If storage application 106 requests to read data from offset 4 (e.g., the fourth offset 408d) of LUN 403, replica manager 116 may determine that offset 4 (the fourth offset 408d) is empty, and may go to the parent of LUN 403 (in this example, to offset 4 (the fourth offset 404d) of LUN 401), to retrieve the value “d” and returns the value “d” to storage application 106.
Any updates to the original data in LUN 401 that are written by storage application 106 may be written instead to LUN 402 (e.g., the original or production volume). For example, storage application 106 or some other application (not shown) may write a value “x” to offset 3 (the third offset 410c) of LUN 402, as indicated by dashed line 410. If storage application 106 needs to read offset 3 (the third offset 410c) of LUN 402, replica manager 116 may determine that offset 3 (the third offset 410c) is not empty and return the value “x” to storage application 106.
Referring to
LUN 501 may include offsets (e.g., a first offset (offset 1) 504a, a second offset (offset 2) 504b, a third offset (offset 3) 504c, a fourth offset (offset 4) 504d, a fifth offset (offset 5) 504e and a sixth (offset 6) offset 504f. The offsets 504a-504f may store values a, b, c, d, e, f, g, respectively. LUN 501 is designated with an IID equal to “1” in the illustrative embodiment.
LUN 502 includes offsets (e.g., a first offset (offset 1) 510a, a second offset (offset 2) 510b, a third offset (offset 3) 510c, a fourth offset (offset 4) 510d, a fifth offset (offset 5) 510e and a sixth (offset 6) offset 510f Offsets 510a and 510b may store values “b” and “x,” respectively, while offsets 510c-510f may be empty. LUN 502 is designated with an IID equal to “2” in the illustrative embodiment.
LUN 503 may include offsets (e.g., a first offset (offset 1) 508a, a second offset (offset 2) 508b, a third offset (offset 3) 508c, a fourth offset (offset 4) 508d, a fifth offset (offset 5) 508e and a sixth (offset 6) offset 508f Offset 508d may store a value “y” while offsets 508a-508c, 508e and 508f may be empty. LUN 503 is designated with an IID equal to “3” in the illustrative embodiment.
LUN 504 may include offsets (e.g., a first offset (offset 1) 512a, a second offset (offset 2) 512b, a third offset (offset 3) 512c, a fourth offset (offset 4) 512d, a fifth offset (offset 5) 512e and a sixth (offset 6) offset 512f Offset 512a, 512c may store values “x” and “x,” respectively, while offsets 512b and 512d-512f may be empty. LUN 504 is designated with an IID equal to “4” and EID equal to “1” in the illustrative embodiment.
LUN 505 may include offsets (e.g., a first offset (offset 1) 514a, a second offset (offset 2) 514b, a third offset (offset 3) 514c, a fourth offset (offset 4) 514d, a fifth offset (offset 5) 514e and a sixth (offset 6) offset 514f Offsets 514d and 514e may store values “i” and “j,” respectively, while offsets 514a-514c and 512f may be empty. LUN 505 is designated with an IID equal to “5” and EID equal to “3” in the illustrative embodiment.
LUN 506 may include offsets (e.g., a first offset (offset 1) 516a, a second offset (offset 2) 516b, a third offset (offset 3) 516c, a fourth offset (offset 4) 516d, a fifth offset (offset 5) 516e and a sixth (offset 6) offset 516f Offset 516a may store a value “b” and while offsets 516b-516f may be empty. LUN 506 is designated with an IID equal to “6” in the illustrative embodiment.
LUN 507 may include offsets (e.g., a first offset (offset 1) 518a, a second offset (offset 2) 518b, a third offset (offset 3) 518c, a fourth offset (offset 4) 518d, a fifth offset (offset 5) 518e and a sixth (offset 6) offset 518f Offsets 518d and 518f may store values “m” and “b,” respectively while offsets 518a-518c and 518e may be empty. LUN 507 is designated with an IID equal to “7” and an EID equal to “4” in the illustrative embodiment.
LUN 508 may include offsets (e.g., a first offset (offset 1) 520a, a second offset (offset 2) 520b, a third offset (offset 3) 520c, a fourth offset (offset 4) 520d, a fifth offset (offset 5) 520e and a sixth (offset 6) offset 520f Offsets 520b and 520c may store values “b” and “b,” respectively, while offsets 520a and 520d-520f may be empty. LUN 508 is designated with an IID equal to “8” and an EID equal to “2” in the illustrative embodiment.
LUN 509 may include offsets (e.g., a first offset (offset 1) 522a, a second offset (offset 2) 522b, a third offset (offset 3) 522c, a fourth offset (offset 4) 522d, a fifth offset (offset 5) 522e and a sixth (offset 6) offset 522f Offset 522c may store a value “b” while offsets 522a, 522b and 522db-522f may be empty. LUN 509 is designated with an IID equal to “9” and an EID equal to “5” in the illustrative embodiment.
If storage application 106 requests to read the LUN with an EID of “5” at the fourth offset, an illustrative embodiment may first access LUN 509 and read the fourth offset 522d. Since no data is available at offset 522d, the parent of LUN 509 (e.g., LUN 506) may be read at the fourth offset, 516d. Since no data is available at the offset 516d, the parent of LUN 506 (e.g., LUN 503) may be read at the fourth offset, 508d. Since data is available at the offset 508d, the value “y” may be returned to storage application 106.
Described embodiments may employ one or more hierarchical replica trees, such as shown in
As described herein, each child, or leaf node, may inherit data from its parent node (e.g., as described, reading an empty offset in a child node may cause storage system 100 to retrieve data from the corresponding offset of the parent node). In illustrative embodiments, when a replica (snapshot) is created for a volume, the volume may become a parent (internal) node to one or more child (leaf) nodes. For example, as described in conjunction with
Although shown in
In illustrative embodiments, parent (internal) nodes may represent static data, and child (leaf) nodes may represent visible volumes (e.g., volumes that are accessible to hosts 113) having data that may be modified by host I/O operations. For example, if a parent (internal) node represents static data, an associated child (leaf) node may represent changes from the static data of the parent node from the time the child (leaf) node was created. In an illustrative embodiment, a leaf node may represent a replica (snapshot), and a parent node may represent the volume associated with the replica (snapshot). For example, a replica (snapshot) may represent a point-in-time copy of a parent volume, but the replica (snapshot) may diverge from the parent volume over time (e.g., the replica data may be modified), for example as described in conjunction with
Described embodiments may provide live (seamless) migration of the entire tree from a source storage array (e.g., 102) to a target storage array (e.g., 112), where storage system 100 is not taken offline during the migration (e.g., the data and/or volumes do not become inaccessible to hosts 113 during the migration). Further, described embodiments may migrate both source volumes and associated replicas (snapshots) without migrating the replicas (snapshots) as full volumes, which saves storage space on target site 112. For example, in some embodiments, for a full volume, all the data contents of the volume would be copied to the target. However, in some embodiments, data associated with a given replica (snapshot) may contain relatively few changes (or none at all) relative to data associated with a parent volume. Since a child (leaf) node may include only changed or modified data relative to an associated parent (internal) node, described embodiments may migrate replicas (snapshots) by copying only changed data for each replica.
Referring to
At block 604, storage system 100 may receive a selection of one or more hierarchical replica trees (e.g., hierarchical replica tree 500 of
At block 606, data migration may be performed for the selected one or more hierarchical replica trees (e.g., data associated with the structure of the selected hierarchical replica tree and data associated with each node of the selected hierarchical replica tree is copied and stored on one or more corresponding target volumes). Block 606 will be described in greater detail in conjunction with
Although not shown in
At block 610, storage system 100 may receive a selection of at least a portion of a hierarchical replica tree to include in a cutover operation and, at block 612, the cutover operation may be performed for the portion of the hierarchical replica tree selected at block 610. For example, a cutover operation from a source device to a target device may allow host access only to the target device and allow the source device to be deactivated. As indicated by block 614, block 612 may be iteratively repeated until all the hierarchical replica trees have had the cutover operation performed. At block 614, once all the hierarchical replica trees have had the cutover operation performed, at block 616 storage system 100 determines whether all the hierarchical replica trees have been successfully migrated. If, at block 616, one or more of the hierarchical replica trees have not been successfully migrated, then at block 618, a request to re-attempt migration may be received, and process 600 may repeat at block 606. Alternatively, at block 618, a request to cancel migration may be received (e.g., to determine a cause of the migration failure, etc.). If, at block 616, the hierarchical replica trees have been successfully migrated, then at block 620, replica hierarchy migration process 600 completes.
In described embodiments, replica hierarchy migration process 600 is “live,” such that hosts 113 may access the data being migrated during the migration process (e.g., hosts 113 may read and write to source site 102 during the migration process).
Referring to
At block 708, data associated with one or more leaf nodes of the selected replica tree hierarchy may be migrated from source site 102 to target site 112. As described, in some embodiments, leaf nodes may be associated with non-static data that may be modified during operation of storage system 100. Block 708 will be described in greater detail in conjunction with
Referring to
At block 808, the replica tree structure may be copied from source site 102 to target site 112, including internal and leaf nodes and associated relationships. Each node created on target site 112 may be paired with an associated node on source site 102. In described embodiments, the nodes may be addressed based on the node pairing information and the IID assigned at block 806. For example, the nodes may be addressed using a triplet based on an identifier associated with the selected replica tree hierarchy (e.g., a snapgroup identifier), the IID, and an offset associated with the data, such as described in conjunction with
At block 808, described embodiments may employ a command that replicates the structure of the replica tree hierarchy (snapgroup) from source site 102 to target site 112, including all internal and leaf nodes. An example of a snapgroup hierarchy is described by the node hierarchy shown in
Referring to
Referring to
Processes 600, 606′, 704′ and 708′ are not limited to use with the hardware and software of
The processes described herein are not limited to the specific embodiments described. For example, processes 600, 606′, 704′ and 708′ are not limited to the specific processing order shown in
Processor 1002 may be implemented by one or more programmable processors executing one or more computer programs to perform the functions of the system. As used herein, the term “processor” is used to describe an electronic circuit that performs a function, an operation, or a sequence of operations. The function, operation, or sequence of operations can be hard coded into the electronic circuit or soft coded by way of instructions held in a memory device. A “processor” can perform the function, operation, or sequence of operations using digital values or using analog signals. In some embodiments, the “processor” can be embodied in an application specific integrated circuit (ASIC). In some embodiments, the “processor” can be embodied in a microprocessor with associated program memory. In some embodiments, the “processor” can be embodied in a discrete electronic circuit. The “processor” can be analog, digital or mixed-signal.
While illustrative embodiments have been described with respect to processes of circuits, described embodiments may be implemented as a single integrated circuit, a multi-chip module, a single card, or a multi-card circuit pack. Further, as would be apparent to one skilled in the art, various functions of circuit elements may also be implemented as processing blocks in a software program. Such software may be employed in, for example, a digital signal processor, micro-controller, or general purpose computer. Thus, described embodiments may be implemented in hardware, a combination of hardware and software, software, or software in execution by one or more processors.
Some embodiments may be implemented in the form of methods and apparatuses for practicing those methods. Described embodiments may also be implemented in the form of program code, for example, stored in a storage medium, loaded into and/or executed by a machine, or transmitted over some transmission medium or carrier, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation. A non-transitory machine-readable medium may include but is not limited to tangible media, such as magnetic recording media including hard drives, floppy diskettes, and magnetic tape media, optical recording media including compact discs (CDs) and digital versatile discs (DVDs), solid state memory such as flash memory, hybrid magnetic and solid state memory, non-volatile memory, volatile memory, and so forth, but does not include a transitory signal per se. When embodied in a non-transitory machine-readable medium, and the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the method.
When implemented on a processing device, the program code segments combine with the processor to provide a unique device that operates analogously to specific logic circuits. Such processing devices may include, for example, a general purpose microprocessor, a digital signal processor (DSP), a reduced instruction set computer (RISC), a complex instruction set computer (CISC), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a programmable logic array (PLA), a microcontroller, an embedded controller, a multi-core processor, and/or others, including combinations of the above. Described embodiments may also be implemented in the form of a bitstream or other sequence of signal values electrically or optically transmitted through a medium, stored magnetic-field variations in a magnetic recording medium, etc., generated using a method and/or an apparatus as recited in the claims.
Various elements, which are described in the context of a single embodiment, may also be provided separately or in any suitable subcombination. It will be further understood that various changes in the details, materials, and arrangements of the parts that have been described and illustrated herein may be made by those skilled in the art without departing from the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
4164763 | Briccetti et al. | Aug 1979 | A |
4608839 | Tibbals, Jr. | Sep 1986 | A |
4821178 | Levin et al. | Apr 1989 | A |
5319645 | Bassi et al. | Jun 1994 | A |
5537534 | Voigt et al. | Jul 1996 | A |
5539907 | Srivastava et al. | Jul 1996 | A |
5627995 | Miller et al. | May 1997 | A |
5710724 | Burrows | Jan 1998 | A |
5732273 | Srivastava et al. | Mar 1998 | A |
5860137 | Raz et al. | Jan 1999 | A |
5896538 | Blandy et al. | Apr 1999 | A |
5903730 | Asai et al. | May 1999 | A |
5940618 | Blandy et al. | Aug 1999 | A |
5940841 | Schmuck et al. | Aug 1999 | A |
5987250 | Subrahmanyam | Nov 1999 | A |
5999842 | Harrison et al. | Dec 1999 | A |
6226787 | Serra et al. | May 2001 | B1 |
6327699 | Larus et al. | Dec 2001 | B1 |
6353805 | Zahir et al. | Mar 2002 | B1 |
6470478 | Bargh et al. | Oct 2002 | B1 |
6519766 | Barritz et al. | Feb 2003 | B1 |
6643654 | Patel et al. | Nov 2003 | B1 |
6654948 | Konuru et al. | Nov 2003 | B1 |
6658471 | Berry et al. | Dec 2003 | B1 |
6658654 | Berry et al. | Dec 2003 | B1 |
6870929 | Greene | Mar 2005 | B1 |
7099797 | Richard | Aug 2006 | B1 |
7143410 | Coffman et al. | Nov 2006 | B1 |
7251663 | Smith | Jul 2007 | B1 |
7315795 | Homma | Jan 2008 | B2 |
7389497 | Edmark et al. | Jun 2008 | B1 |
7421681 | DeWitt, Jr. et al. | Sep 2008 | B2 |
7552125 | Evans | Jun 2009 | B1 |
7574587 | DeWitt, Jr. et al. | Aug 2009 | B2 |
7672005 | Hobbs et al. | Mar 2010 | B1 |
7714747 | Fallon | May 2010 | B2 |
7814218 | Knee et al. | Oct 2010 | B1 |
7827136 | Wang et al. | Nov 2010 | B1 |
7908436 | Srinivasan et al. | Mar 2011 | B1 |
8200923 | Healey et al. | Jun 2012 | B1 |
8335899 | Meiri et al. | Dec 2012 | B1 |
8478951 | Healey et al. | Jul 2013 | B1 |
9037822 | Meiri et al. | May 2015 | B1 |
9104326 | Frank et al. | Aug 2015 | B2 |
9128942 | Pfau | Sep 2015 | B1 |
9208162 | Hallak et al. | Dec 2015 | B1 |
9270592 | Sites | Feb 2016 | B1 |
9286003 | Hallak et al. | Mar 2016 | B1 |
9304889 | Chen et al. | Apr 2016 | B1 |
9330048 | Bhatnagar et al. | May 2016 | B1 |
9342465 | Meiri | May 2016 | B1 |
9378106 | Ben-Moshe et al. | Jun 2016 | B1 |
9396243 | Halevi et al. | Jul 2016 | B1 |
9418131 | Halevi et al. | Aug 2016 | B1 |
9762460 | Pawlowski et al. | Sep 2017 | B2 |
9769254 | Gilbert et al. | Sep 2017 | B2 |
9785468 | Mitchell et al. | Oct 2017 | B2 |
20020056031 | Skiba et al. | May 2002 | A1 |
20020133512 | Milillo et al. | Sep 2002 | A1 |
20030023656 | Hutchison et al. | Jan 2003 | A1 |
20030079041 | Parrella, Sr. et al. | Apr 2003 | A1 |
20030126122 | Bosley et al. | Jul 2003 | A1 |
20030145251 | Cantrill | Jul 2003 | A1 |
20040030721 | Kruger et al. | Feb 2004 | A1 |
20040267835 | Zwilling et al. | Dec 2004 | A1 |
20050039171 | Avakian et al. | Feb 2005 | A1 |
20050102547 | Keeton et al. | May 2005 | A1 |
20050125626 | Todd | Jun 2005 | A1 |
20050144416 | Lin | Jun 2005 | A1 |
20050171937 | Hughes et al. | Aug 2005 | A1 |
20050177603 | Shavit | Aug 2005 | A1 |
20050193084 | Todd et al. | Sep 2005 | A1 |
20050278346 | Shang et al. | Dec 2005 | A1 |
20060031653 | Todd et al. | Feb 2006 | A1 |
20060031787 | Ananth et al. | Feb 2006 | A1 |
20060047776 | Chieng et al. | Mar 2006 | A1 |
20060070076 | Ma | Mar 2006 | A1 |
20060123212 | Yagawa | Jun 2006 | A1 |
20060242442 | Armstrong et al. | Oct 2006 | A1 |
20070078982 | Aidun et al. | Apr 2007 | A1 |
20070208788 | Chakravarty et al. | Sep 2007 | A1 |
20070276885 | Valiyaparambil et al. | Nov 2007 | A1 |
20070297434 | Arndt et al. | Dec 2007 | A1 |
20080163215 | Jiang et al. | Jul 2008 | A1 |
20080178050 | Kern et al. | Jul 2008 | A1 |
20080243952 | Webman et al. | Oct 2008 | A1 |
20080288739 | Bamba et al. | Nov 2008 | A1 |
20090006745 | Cavallo et al. | Jan 2009 | A1 |
20090030986 | Bates | Jan 2009 | A1 |
20090049450 | Dunshea et al. | Feb 2009 | A1 |
20090055613 | Maki et al. | Feb 2009 | A1 |
20090089483 | Tanaka et al. | Apr 2009 | A1 |
20090100108 | Chen | Apr 2009 | A1 |
20090222596 | Flynn et al. | Sep 2009 | A1 |
20090319996 | Shafi et al. | Dec 2009 | A1 |
20100042790 | Mondal et al. | Feb 2010 | A1 |
20100088296 | Periyagaram et al. | Apr 2010 | A1 |
20100180145 | Chu | Jul 2010 | A1 |
20100199066 | Artan et al. | Aug 2010 | A1 |
20100205330 | Noborikawa et al. | Aug 2010 | A1 |
20100223619 | Jaquet et al. | Sep 2010 | A1 |
20100257149 | Cognigni et al. | Oct 2010 | A1 |
20110060722 | Li et al. | Mar 2011 | A1 |
20110078494 | Maki et al. | Mar 2011 | A1 |
20110083026 | Mikami et al. | Apr 2011 | A1 |
20110099342 | Ozdemir | Apr 2011 | A1 |
20110119679 | Muppirala et al. | May 2011 | A1 |
20110161297 | Parab | Jun 2011 | A1 |
20110202744 | Kulkarni et al. | Aug 2011 | A1 |
20110225122 | Denuit et al. | Sep 2011 | A1 |
20110289291 | Agombar et al. | Nov 2011 | A1 |
20120054472 | Altman et al. | Mar 2012 | A1 |
20120059799 | Oliveira | Mar 2012 | A1 |
20120078852 | Haselton et al. | Mar 2012 | A1 |
20120124282 | Frank et al. | May 2012 | A1 |
20120158736 | Milby | Jun 2012 | A1 |
20120203742 | Goodman et al. | Aug 2012 | A1 |
20120278793 | Jalan et al. | Nov 2012 | A1 |
20120290546 | Smith et al. | Nov 2012 | A1 |
20120290798 | Huang et al. | Nov 2012 | A1 |
20120304024 | Rohleder et al. | Nov 2012 | A1 |
20130031077 | Liu et al. | Jan 2013 | A1 |
20130054524 | Anglin et al. | Feb 2013 | A1 |
20130073527 | Bromley | Mar 2013 | A1 |
20130110783 | Wertheimer et al. | May 2013 | A1 |
20130111007 | Hoffmann et al. | May 2013 | A1 |
20130138607 | Bashyam et al. | May 2013 | A1 |
20130151683 | Jain | Jun 2013 | A1 |
20130151759 | Shim et al. | Jun 2013 | A1 |
20130198854 | Erway et al. | Aug 2013 | A1 |
20130246354 | Clayton et al. | Sep 2013 | A1 |
20130246724 | Furuya | Sep 2013 | A1 |
20130265883 | Henry et al. | Oct 2013 | A1 |
20130282997 | Suzuki et al. | Oct 2013 | A1 |
20130318051 | Kumar et al. | Nov 2013 | A1 |
20130332610 | Beveridge | Dec 2013 | A1 |
20140040199 | Golab | Feb 2014 | A1 |
20140136759 | Sprouse et al. | May 2014 | A1 |
20140143206 | Pittelko | May 2014 | A1 |
20140161348 | Sutherland et al. | Jun 2014 | A1 |
20140195484 | Wang et al. | Jul 2014 | A1 |
20140237201 | Swift | Aug 2014 | A1 |
20140297588 | Babashetty et al. | Oct 2014 | A1 |
20140359231 | Matthews | Dec 2014 | A1 |
20140380282 | Ravindranath Sivalingam et al. | Dec 2014 | A1 |
20150006910 | Shapiro | Jan 2015 | A1 |
20150088823 | Chen et al. | Mar 2015 | A1 |
20150112933 | Satapathy | Apr 2015 | A1 |
20150149739 | Seo et al. | May 2015 | A1 |
20150161194 | Provenzano et al. | Jun 2015 | A1 |
20150205816 | Periyagaram et al. | Jul 2015 | A1 |
20150249615 | Chen et al. | Sep 2015 | A1 |
20150324236 | Gopalan | Nov 2015 | A1 |
20150363282 | Rangasamy | Dec 2015 | A1 |
20160034692 | Singler | Feb 2016 | A1 |
20160042285 | Gilenson et al. | Feb 2016 | A1 |
20160062853 | Sugabrahmam et al. | Mar 2016 | A1 |
20160080482 | Gilbert et al. | Mar 2016 | A1 |
20160188419 | Dagar et al. | Jun 2016 | A1 |
20160350391 | Vijayan et al. | Dec 2016 | A1 |
20160359968 | Chitti et al. | Dec 2016 | A1 |
20160366206 | Shemer et al. | Dec 2016 | A1 |
20170123704 | Sharma et al. | May 2017 | A1 |
20170139786 | Simon et al. | May 2017 | A1 |
20170161348 | Araki et al. | Jun 2017 | A1 |
Number | Date | Country |
---|---|---|
1804157 | Jul 2007 | EP |
WO 2010019596 | Feb 2010 | WO |
WO 2010040078 | Apr 2010 | WO |
WO 2012066528 | May 2012 | WO |
Entry |
---|
Response filed on May 2, 2016 to the Non-Final Office Action dated Dec. 1, 2015; for U.S. Appl. No. 14/230,405; 8 pages. |
Response filed on May 2, 2016 to the Non-Final Office Action dated Feb. 4, 2016; for U.S. Appl. No. 14/037,577; 10 pages. |
U.S. Final Office Action dated Nov. 2, 2017 for U.S. Appl. No. 14/494,895; 12 Pages. |
U.S. Non-Final Office Action dated Dec. 1, 2017 for U.S. Appl. No. 14/979,890; 10 Pages. |
U.S. Non-Final Office Action dated Dec. 11, 2017 for U.S. Appl. No. 15/196,447; 54 Pages. |
U.S. Non-Final Office Action dated Dec. 14, 2017 for U.S. Appl. No. 15/076,946; 28 Pages. |
Office Action dated Nov. 1, 2017 corresponding to U.S. Appl. No. 15/196,374, 64 Pages. |
Response to U.S. Final Office Action dated Apr. 6, 2016 corresponding to U.S. Appl. No. 14/034,981; Response filed on Jun. 16, 2016; 11 Pages. |
Notice of Allowance dated Jun. 29, 2016 corresponding to U.S. Appl. No. 14/034,981; 14 Pages. |
Response to U.S. Office Action dated Feb. 4, 2016 corresponding to U.S. Appl. No. 14/037,577; Response filed on May 2, 2016; 10 Pages. |
Notice of Allowance dated May 20, 2016 corresponding to U.S. Appl. No. 14/037,577; 19 Pages. |
Notice of Allowance dated Jun. 6, 2016 corresponding to U.S. Appl. No. 14/317,449; 43 Pages. |
U.S. Appl. No. 15/196,674, filed Jun. 29, 2016, Kleiner, et al. |
U.S. Appl. No. 15/196,427, filed Jun. 29, 2016, Shveidel. |
U.S. Appl. No. 15/196,374, filed Jun. 29, 2016, Shveidel, et al. |
U.S. Appl. No. 15/196,447, filed Jun. 29, 2016, Shveidel, et al. |
U.S. Appl. No. 15/196,472, filed Jun. 29, 2016, Shveidel. |
U.S. Appl. No. 14/034,981, filed Sep. 24, 2013, Halevi et al. |
U.S. Appl. No. 14/037,577, filed Sep. 26, 2013, Ben-Moshe et al. |
U.S. Appl. No. 14/230,405, filed Mar. 31, 2014, Meiri et al. |
U.S. Appl. No. 14/230,414, filed Mar. 31, 2014, Meiri. |
U.S. Appl. No. 14/317,449, filed Jun. 27, 2014, Halevi et al. |
U.S. Appl. No. 14/494,895, filed Sep. 24, 2014, Meiri et al. |
U.S. Appl. No. 14/494,899, filed Sep. 24, 2014, Chen et al. |
U.S. Appl. No. 14/979,890, filed Dec. 28, 2015, Maeiri et al. |
U.S. Appl. No. 15/001,784, filed Jan. 20, 2016, Meiri et al. |
U.S. Appl. No. 15/001,789, filed Jan. 20, 2016, Meiri et al. |
U.S. Appl. No. 15/076,775, filed Mar. 22, 2016, Chen et al. |
U.S. Appl. No. 15/076,946, filed Mar. 22, 2016, Meiri. |
U.S. Appl. No. 15/085,172, filed Mar. 30, 2016, Meiri. |
U.S. Appl. No. 15/085,181, filed Mar. 30, 2016, Meiri et al. |
U.S. Appl. No. 15/085,188, filed Mar. 30, 2016, Meiri et al. |
PCT International Search Report and Written Opinion dated Dec. 1, 2011 for PCT Application No. PCT/IL2011/000692; 11 Pages. |
PCT International Preliminary Report dated May 30, 2013 for PCT Patent Application No. PCT/IL2011/000692; 7 Pages. |
U.S. Appl. No. 12/945,915; 200 Pages. |
U.S. Appl. No. 12/945,915; 108 Pages. |
U.S. Appl. No. 12/945,915; 67 Pages. |
Nguyen et al., “B+ Hash Tree: Optimizing Query Execution Times for on-Disk Semantic Web Data Structures;” Proceedings of the 6th International Workshop on Scalable Semantic Web Knoledge Base Systems; Shanghai, China, Nov. 8, 2010; 16 Pages. |
Notice of Allowance dated Apr. 13, 2015 corresponding to U.S. Appl. No. 14/037,511; 11 Pages. |
Non-Final Office Action dated May 11, 2015 corresponding to U.S. Appl. No. 14/037,626; 13 Pages. |
Response to Office Action dated May 11, 2015 corresponding to U.S. Appl. No. 14/037,626; Response filed on Jul. 20, 2015; 10 Pages. |
Notice of Allowance dated Oct. 26, 2015 corresponding to U.S. Appl. No. 14/037,626; 12 Pages. |
Office Action dated Jul. 22, 2015 corresponding to U.S. Appl. No. 14/034,981; 28 Pages. |
Response to Office Action dated Jul. 22, 2015 corresponding to U.S. Appl. No. 14/034,981; Response filed on Dec. 22, 2015; 14 Pages. |
Office Action dated Sep. 1, 2015 corresponding to U.S. Appl. No. 14/230,414; 13 Pages. |
Response to Office Action dated Sep. 1, 2015 corresponding to U.S. Appl. No. 14/230,414; Response filed on Jan. 14, 2016; 10 Pages. |
Restriction Requirement dated Sep. 24, 2015 corresponding to U.S. Appl. No. 14/230,405; 8 Pages. |
Response to Restriction Requirement dated Sep. 24, 2015 corresponding to U.S. Appl. No. 14/230,405;Response filed Oct. 6, 2016; 1 Page. |
Office Action dated Dec. 1, 2015 corresponding to U.S. Appl. No. 14/230,405; 17 Pages. |
Office Action dated Feb. 4, 2016 corresponding to U.S. Appl. No. 14/037,577; 26 Pages. |
Notice of Allowance dated Feb. 10, 2016 corresponding to U.S. Appl. No. 14/494,899; 19 Pages. |
Notice of Allowance dated Feb. 26, 2016 corresponding to U.S. Appl. No. 14/230,414; 8 Pages. |
Final Office Action dated Apr. 6, 2016 corresponding to U.S. Appl. No. 14/034,981; 38 Pages. |
U.S. Non-Final Office Action dated Jul. 6, 2017 for U.S. Appl. No. 14/494,895; 36 Pages. |
Response to U.S. Non-Final Office Action dated Jul. 6, 2017 for U.S. Appl. No. 14/494,895; Response filed Oct. 3, 2017; 10 Pages. |
U.S. Non-Final Office Action dated Jun. 11, 2018 for U.S. Appl. No. 15/076,775; 17 Pages. |
U.S. Non-Final Office Action dated Dec. 29, 2017 corresponding to U.S. Appl. No. 15/196,674; 34 Pages. |
U.S. Non-Final Office Action dated Jan. 8, 2018 corresponding to U.S. Appl. No. 15/196,472; 16 Pages. |
U.S. Notice of Allowance dated Jan. 24, 2018 corresponding to U.S. Appl. No. 15/085,181; 8 Pages. |