This application is a continuation application of and claims priority from U.S. Pat. No. 10,296,354, issued May 21, 2019.
This invention relates to computer networks and, more particularly, to efficiently boot and management of a storage system.
As computer memory storage and data bandwidth increase, so does the amount and complexity of data that businesses daily manage. Large-scale distributed storage systems, such as data centers, typically run many business operations. A datacenter, which also may be referred to as a server room, is a centralized repository, either physical or virtual, for the storage, management, and dissemination of data pertaining to one or more businesses. A distributed storage system may be coupled to client computers interconnected by one or more networks. If any portion of the distributed storage system has poor performance, company operations may be impaired.
Software applications, such as a logical volume manager or a disk array manager, provide a means of allocating space on mass-storage arrays. In addition, this software allows a system administrator to create units of storage groups including logical volumes. There may be a significantly large number of volumes, each including an appreciable amount of allocation units (AUs).
A reboot of a storage system may occur for a variety of reasons. For example, a system administrator may request a reboot, a reboot may automatically occur during recovery from a power outage, a failover process may detect a first data storage controller fails and selects a second data storage controller to manage the storage subsystem. Whatever the reason, the boot sequence may consume an appreciable amount of time. One issue that must be managed is determining which of the AUs within the storage system are unallocated and available for use. Typically, identifying which AUs are in use and which are free includes a process of scanning the entire storage subsystem. As the number of AUs in the storage subsystem can be quite large, the scan process can introduce a significant delay in the reboot process. These delays in turn reduce system performance and/or may cause errors of other systems using the data.
In view of the above, systems and methods for efficiently starting up a plurality of solid-state storage devices after storage operation are desired.
Various embodiments of a computer system and methods for efficiently starting up a plurality of solid-state storage devices after storage operation are disclosed.
In various embodiments, a computing system is contemplated that includes one or more storage devices configured to store data in multiple allocation units (AUs). The data storage controller maintains an identification if AUs in the system that are available for allocation. Such an identification may be in the form of a “free list”, table, tree(s), or any other suitable data structure. Responsive to a request to allocate storage, the data storage controller selects an available AU for allocation. Additionally, in various embodiments, the storage controller is configured to maintain a subset (or “free sublist”) of AUs that are available for allocation. This subset represents less than all available AUs. In response to a request for an AU, an AU is selected from this subset. At various times, the storage controller stores an identification of the subset of AUs in the free sublist to persistent storage. There may be times when the identification of the subset of AUs that is persisted is not up to date with the AUs actually available for allocation in the system. In various embodiments, the persistent storage location corresponds to a boot region. In addition, the controller maintains a database that identifies AUs currently allocated within the system. This database further provides an identifier associated with allocated AUs that indicates when the AU was allocated relative to other allocated AUs. This database is updated in persistent storage at various times and may not always represent an up to date indication of AUs currently allocated within the system.
In various embodiments, during a boot sequence the previously persisted free sublist is accessed in the boot region to identify a subset of free AUs on the storage devices. In addition, the persisted database is accessed to determine a most recently allocated AU as identified by the database. Each AU identified by the free sublist is then accessed to determine whether it is in fact available or allocated. If one of these AUs is allocated, an identifier associated with the allocated AU is obtained and compared to the most recently allocated AU identified by the database. If the AU was allocated after the indication by the database, then the database is updated to reflect this information. After completing review of the AUs in the free sublist and updating the database, a comparison of all AU (allocated or free) in the system is compared to those identified as allocated by the database. The difference based on the comparison provides an indication of all free AUs in the system and processing may proceed.
In some embodiments, the free sublist represents only a portion of a larger AU management set that is maintained. In such embodiments, the AU management set identifies a subset of free AUs, AUs that have been selected for allocation but are not yet in use, and AUs that are currently allocated but whose identification has not yet been persisted to non-volatile storage. During a boot sequence, AUs identified by the AU management set are scanned to identify allocated AUs. Based on the scan, the allocated and unallocated AUs are identified and a new AU management set created for use in processing.
These and other embodiments will become apparent upon consideration of the following description and accompanying drawings.
While the invention is susceptible to various modifications and alternative forms, specific embodiments are shown by way of example in the drawings and are herein described in detail. It should be understood, however, that drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the invention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the appended claims.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention. However, one having ordinary skill in the art should recognize that the invention might be practiced without these specific details. In some instances, well-known circuits, structures, signals, computer program instruction, and techniques have not been shown in detail to avoid obscuring the present invention.
Referring to
When identified as being allocated for data storage, a given allocated unit (AU) is not currently available for allocation. A given allocated unit may store valid data as shown by data 14. Alternatively, an allocated AU may not store valid data but may not yet be identified as being free for allocation. Stored data may be user data, inter-device RAID (redundant arrays of inexpensive/independent disks) information, log information, intra-device protection data, metadata for one or more other allocation units, and so forth. In the example shown, free allocation units are identified as such by the pattern Data 12 (blank). Allocated units are identified with the pattern Data 14. In some embodiments, data may be stored in the devices 10 in a random access manner. In other embodiments, data may be stored in a particular manner as desired by a given algorithm. All such embodiments are contemplated.
In various embodiments, each of the allocation units may have an associated unique allocation unit identifier (AU ID). In various embodiments, such identifiers may be unique to a given device, a given array, a given logical storage unit, or otherwise. In some embodiments, the AU ID is unique within a given device of the devices 20a-20j and a device ID is combined with the AU ID to provide a unique identifier for the array 20. In the example shown in
In
A variety of operations within the system may cause an AU to be allocated or unallocated. For example, a given AU may be allocated responsive to the processing of a write request, responsive to garbage collection processes, or other processes that require allocation of storage. In some cases, the data to be stored includes user data to store on one or more of the devices 10. Alternatively, the data may include inter-device RAID information, log information, intra-device protection data, metadata for one or more other allocation units, and so forth. Processes requiring allocation of AUs may be generated by a client computer, a data storage controller (not shown) performing a deduplication operation, garbage collection operations, defragmentation operations, etc. For example, a deduplication operation may determine that user data received as part of a write request does not need to be stored as a copy already exists. However, a deduplication mapping table may be updated which does cause allocation of storage. These and other scenario are possible and are contemplated.
In various embodiments, state transitions of a given AU from free to allocated, and vice-versa, may not be immediately reflected in persistent storage. Rather, an in-memory representation may reflect changes to one or more AUs that have not been stored to persistent storage. For example, in one embodiment, a database is maintained in persistent storage that identifies allocation units currently in use in the storage system. In effect, this database may be seen to identify where valid data is currently stored in the storage system. The identification of AUs currently allocated may take many forms and various tables or other data structure may be used for storing such data. In various embodiments, the database may further identify when a given AU was allocated relative to other AUs. Deallocation of AUs may likewise be reflected in the database. For example, in one embodiment the allocation of an AU may be associated with a time stamp. In other embodiments, other types of identifiers are used to indicate an ordering. For example, in one embodiment, a strictly increasing identifier (e.g., each successive identifier is incremented) is used to determine whether an AU was allocated after another. Various such approaches are possible and are contemplated. Additionally, in various embodiments allocated AUs in the storage system may themselves store such an identifier and or otherwise be associated with such an identifier. In this manner, reading data stored within a given AU (e.g., as part of a header or user data itself) may provide an indication as to whether the AU is currently allocated and when the AU was allocated vis-à-vis another AU.
It is noted that the example shown in
Turning to
The selection of AUs identified by the free sublist 50 may be performed in any of a variety of ways. For example, if a data structure used for the free list 40 that is amenable to ordering AU IDs is used then a range of AU IDs from the free list 40 may be used. For example, in an ordered tree structure, a portion of the tree could be used. In other embodiments, AUs may be selected based upon other criteria, such as frequency of use, how recently used, number of errors detected, location, and so on. These and other approaches are possible and contemplated.
In various embodiments, when an AU is to be allocated within the system, the AU is selected from the free sublist 50—rather than the free list 40 as a whole. As noted above, allocation of an AU may be associated with a particular ID that is usable to indicate it was allocated before and/or after other AUs that have been allocated. Such an indication could be a strictly increasing identifier, time stamp, or otherwise. This identifier is then stored in association with the allocated AU (e.g., in a header associated with the AU or otherwise). When an AU is allocated, the AU is chosen from the free sublist 50 and that AU is now removed from the free sublist 50. Removal of the AU from the free sublist 50 may include actually removing an identification of the AU from the free sublist 50 or otherwise providing an indication in the free sublist 50 that it is no longer available for allocation. As noted above, some indication of AUs that have been allocated may be stored to persistent storage in a database of otherwise (e.g., on one or more of the devices 10 or elsewhere). However, storing this indication may not generally occur upon each allocation. Rather, storing such indications to persistent storage may occur on a periodic basis, at times of relatively low system load, time of day, or at some other time that may be determined programmatically, dynamically based on system or other conditions, or a combination of the two.
Additionally, in various embodiments, when a new sublist 50 is created, an identification of AUs in the sublist 50 may be stored to persistent storage before AUs may be allocated. For example, at system start an identification of all free AUs 40 may be determined. Based on this, the sublist 50 may be created and an identification of AU in the sublist 50 stored to persistent storage before AUs are allocated from the free sublist 50. During operation, at various times, a current state of the free sublist 50 is stored to persistent storage. Such times may be on a periodic basis, at times of relatively low system load, or at some other time that may be determined programmatically, dynamically based on system or other conditions, or a combination of the two. In various embodiments, when the free sublist 50 reaches a particular size (e.g., there only remain a given number of AUs available for allocation in the free sublist 50), it may be replenished with new AUs from the free list 40. In other embodiments, replenishment may be chosen on that basis of an opportune time. For example, when the system is idle or otherwise experiencing a low load, replenishment of the free sublist 50 may be performed. These and other embodiments are possible and are contemplated. When the free sublist 40 is replenished to include new AUs not previously included in the free sublist 50, an identification of AUs in the free sublist 50 may be stored in persistent storage before allocating AUs from the newly replenished free sublist 50. In some embodiments, the processing of write requests and other processes requiring allocation of an AU may be delayed while the free sublist 50 is being replenished. After it is replenished and an identification of the AUs identified by the newly replenished free sublist 50 are stored to persistent storage, the processes may resume.
In various embodiments, the free sublist 50, or some other identification of AUs included in the free sublist 50, may be stored in a location accessible during a boot process. For example, in one embodiment, a boot region of a storage device may be used. Similarly, data associated with the above described database that identifies allocated AUs in the system may be stored in such a location. During a boot process, this free sublist related data and database related data are used to speed the boot process as described below.
Turning now to
An overview of two processes are depicted in
In block 302, transactions targeting the data storage subsystem are processed. Such transactions may be externally generated or internally generated. For example, I/O transactions from a client or other device may be received that target the storage system. Alternatively, transactions may be internally generated responsive to administrative or maintenance tasks such as garbage collection, replication, deduplication, or otherwise. Responsive to such transactions, if there is no request for allocation of an AU (block 304), then processing may simply continue (block 302). However, a request for allocation of an AU may be generated (block 304). In various embodiments, the request is detected (block 320) by a process associated with the Free Sublist. In response, an AU is selected from the Free Sublist (block 322) and provided to a process associated with the requestor.
In block 306, the data is stored in the allocated AU(s). Additionally, an identification of the allocated AU is maintained (e.g., in volatile memory) (block 307).
If an event or a condition is satisfied for persisting the Allocated list (conditional block 308), then in block 310, the updated copy of the Allocated list is stored in persistent memory. Subsequently, control flow returns to block 302 for processing more transactions. Subsequently, a determination may be made as to whether an identification of allocated AUs is to be persisted (i.e., stored to non-volatile storage) (block 308). If not, then processing may simply resume (block 302). However, if it is determined that an identification of allocated AUs is to be persisted, then such an identification is stored to persistent storage (block 310). In various embodiments, the identification is stored to a database such as is discussed above. As already noted, the decision to persist (block 308) be based on any of a number of factors. For example, persisting may be performed periodically. The periodic time may be a programmable value stored in a configuration register. Alternatively, an idle time of the computing system is detected, a number of AUs to update in the Allocated list reaches a threshold, whereas the threshold may be programmable. Other events and conditions for qualifying the updated copy of the Allocated list to persistent memory are possible and contemplated.
In parallel with the Allocated AUs process, the free sublist is maintained. As shown, if a request for allocation of an AU is detected (block 320), then in block 322 an AU is selected from the free sublist and provided to a process associated with the requestor. In block 324, the selected AU is removed from the free lists or otherwise marked as no longer available for allocation. For example, a copy of the free sublist may be maintained in a RAM or other volatile memory and the selected AU has a state transition from free to allocate within the copy.
If an event or a condition is satisfied for persisting the free sublist (conditional block 326), then in block 328, the updated copy of the free sublist is stored in persistent memory. In some embodiments, the updated copy of the free sublist (or other information indicating which AUs are available in the free sublist) is sent to persistent storage when a periodic time duration is met. The periodic time may be a programmable value and the periodic time may differ from a similar value used for the Allocated list. Alternatively, an idle time of the computing system is detected and the updated copy of the free sublist is sent to persistent storage. Another condition may be a number of AUs to update in the free sublist reaches a threshold, whereas the threshold may be programmable. Other events and conditions for qualifying the updated copy of the Allocated list to persistent memory are possible and contemplated. If the information is not to be persisted (block 326), then processing may return to block 320.
Turning now to
In block 404, a free sublist is built from a free list that generally identifies all AUs available for allocation in the system. In various embodiments, the free list may identify millions of AUs, while the free sublist is selected to only include a fraction of these AUs. Selection of which AUs to include in the free sublist may be performed in any of a variety of ways. For example, if a data structure used for the free list 40 that is amenable to ordering AU IDs is used then a range of AU IDs from the free list 40 may be used. For example, in an ordered tree structure a portion of the tree could be used. In other embodiments, AUs may be selected based upon other criteria, such as frequency of use, how recently used, number of errors detected, location, and so on. These and other approaches are possible and contemplated.
In various embodiments, selection of AUs to be allocated are taken from the free sublist and not the larger free list. In various embodiments, allocation of AUs may not be performed until the free sublist has been created. Still further, in some embodiments allocation of AUs from the free sublist may not be performed until an identification of AUs in the free sublist has been persisted by storing the identification to persistent storage (block 406). In block 408, transactions are processed as described earlier, wherein various operations may generate the transactions. The free sublist is accessed to determine which AUs to allocate for the transactions.
In block 410, as transactions that allocate AUs are processed, an indication as to an order in which AUs are allocated is maintained. In some embodiments, a corresponding time stamp may be maintained for each transaction. In other embodiments, a respective monotonically increasing sequence number is assigned to transactions that allocate AUs. The time stamp or sequence number may be stored with an indication that a corresponding AU is allocated. For example, in some embodiments, the time stamp or sequence number may be stored with the indication in a header of the corresponding AU. Alternatively, the time-order information and the indication of being allocated are stored in a table or a device header. Other locations for storing the time-order information and the allocation indication are possible.
As described earlier for block 326 in
Turning now to
Responsive to a reboot (conditional block 502), in block 504 boot related code may be located and accessed. For example, a designated boot location may be accessed. In various embodiments, multiple locations may be accessed based on a priority. For example, boot related code and/or circuitry may follow a priority list of locations to search for a boot region. The boot region may include machine code to be loaded by the firmware into RAM. The machine code may be a first phase of boot code that also locates a larger second phase of boot code to be later loaded. Numerous such embodiments are possible and are contemplated.
In block 506, an identification of a most recently allocated AU is retrieved. In various embodiments, the database discussed above is accessed to obtain such information. As already described, the identifier may be a time stamp, a sequence number, or any other identifying data that can be used to determine if an AU was allocated after another AU. In addition, information related to the free sublist that was persisted is retrieved from storage (508). As discussed above, when a free sublist is created an identification of AUs in the free sublist may be persisted. Additionally, an identification of available AUs in the free sublist could be persisted at other times. Having obtained this free sublist information regarding AUs available for allocation, each AU identified by the information may be accessed in the storage system to determine whether or not it is in fact free. It is noted that in an embodiment where AUs are only allocable from the free sublist, any AU that might be allocated in the system that isn't identified by the information obtained in block 506 must be an AU identified in the free sublist information obtained in block 508. Therefore, by determining which of the AUs identified by the persisted free sublist information are actually allocated, we may determine all allocated AUs in the system.
Therefore, a scan of each AU identified by the free sublist information obtained in block 506. As described above, state information associated with each AU may indicate whether or not it is allocated. Such information may be stored in the header of the AU, a user data area of the AU, or a combination of the two. Alternatively, the state information may be stored in a device header or another table within another AU. In addition, for allocated AUs the information includes an indication usable to determine whether the AU was allocated after another allocated AU (e.g., time stamp, sequence number, or otherwise as previously discussed).
By comparing an indication as to when an AU was allocated to the most recently allocated AU identified by the database in block 506, it can be determined that the AU represents an allocated AU not reflected by the database. In other words, an AU was allocated within the system whose identification was not persisted to the database. For each AU identified in the free sublist and determined to be allocated after the AU identified in block 506, information corresponding to the AU may be used to update the information regarding allocated AUs in the system. For example, the database may be updated.
Subsequent to identifying allocated AUs in the system (e.g., by updating the database), in block 514 list of free AUs in the system may be determined. This may be determined by comparing all allocated AUs identified by the database to AUs in the system. The difference between these represents AUs that are not allocated. Having identified unallocated AUs in the system (Free List), a new free sublist may be created as discussed above and used for allocation of AUs. In block 516, the remainder of the reboot process continues prior to further processing of transactions.
In the discussion above, allocation units are described as generally being in one of two states—allocated or free. In the above described embodiments, a free sublist was tracked and persisted at various times. In such embodiments, the free sublist is the AU management set as described below. However, in various embodiments, AUs may exist in other states as well.
Generally speaking, unincorporated AUs 602 represent AUs within the storage system that have been allocated and are currently in use. However, information indicating that these unincorporated AUs 602 have been allocated and are in use has not yet been persisted. Transitional AUs 604 generally correspond to AUs that are in the process of being allocated for use but are not yet in use. For example, when an AU is selected for allocation from a free list, that AU may be (effectively) marked in some way as no longer being free. However between the time the AU is marked as not being free and the time it actually is in use storing data, the AU is considered to be transitional (it is in a transition period in which it is no longer free for allocation, but is not yet in active use). In addition to unincorporated AUs 602 and transitional AUs 604, in some embodiments an identification of speculative AUs 608 may also be maintained. Speculative AUs 608 generally represent AUs that are currently in use but are believed will be free in the near future. For example, in some embodiments the system may be able to monitor garbage collection processes and identify one or more AUs that are scheduled for garbage collection. These identified AUs may be added to the list of speculative AUs 608. In other embodiments, the system may be configured to predict that one or more AUs may be garbage collected in the near future and add these AUs to the list of speculative AUs 608 as well. Other methods of predicting and/or otherwise anticipating an AU may be soon freed are possible and are contemplated. Further, while the above discussion described unincorporated AUs 602, transitional AUs 604, free AUs 606, and speculative AUs 608, those skilled in the art will appreciated that AUs may have different states depending on the particular processes involved in moving from free to allocated, and vice-versa. In such embodiments, these AUs with other states may also be tracked and all such embodiments are contemplated.
Turning now to
In addition to the above, database 706 may at various times provide an identification of AUs that have been allocated and are in use (Allocated AUs) to process 704. Database 706 may generally correspond to an identification of AUs that have been allocated and are in use, but whose identification has not yet been persisted. Accordingly, these AUs identified by database 706 may generally correspond to the unincorporated [U] AUs discussed above. For example, request process 702 may provide an indication to database 706 when an AU that has been allocated is now is use (e.g., as indicated by the dashed arrow Writes to AUs). In other embodiments, this indication that an AU is in use and corresponds to an unincorporated AU may be provided by some other process or determined in some other way. It is noted that while
Still further, in some embodiments AUs which are believed will become free are tracked or otherwise identified. For example, as discussed above, garbage collection processes may schedule AU for reclamation and this information may be accessible or determinable by a speculative AU identifier process 712 as shown in
In addition to the above, at various times the AU management set may be computed/recomputed as discussed above (block 810). If such a recomputation is performed, information corresponding to the AUs identified in the AU management set may be persisted (block 814). As noted, in some embodiments, if the newly computed AU management set is a subset of information already persisted, then the persisting step may be skipped.
Having scanned all AUs in the storage system, AUs may be identified as allocated or free. As may be appreciated, some AUs may have been marked as defective or otherwise not usable. In such a case, they may essentially be removed from consideration. Based upon the information from the scan, a database may be updated to reflect identify (at least) the allocated AUs. This database may then be persisted. The remaining usable AUs may be identified as free. Subsequently, a new AU management set may be computed and processing may continue. Immediately subsequent to building the AU management set (block 924), the management set may only include a reduced free set of AUs as none have yet transitioned to a transitional or unincorporated state.
If the reboot type is determined to be of type Fast (block 910), then a process similar to that of
In the case where the reboot is of type Verify, the Fast reboot type is performed and a full scan is used to verify the correctness of the resulting database. As depicted in
It is noted that each of the above described methods and mechanisms may be combined in various ways. In addition, in various embodiments the AU management set may be managed in such a way that it has a relatively fixed size. In other words, the AU management set may be “set” (e.g., programmed) to identify a given number of AUs. In this manner, a reboot using the Fast reboot type will require scan of a relatively consistent number of AUs. This in turn may provide a relatively consistent, and perhaps predictable, reboot time.
Given an embodiment where the AU management set is configured to maintain some particular number of AUs, various processes described above may be managed in a particular way. For example, each time the AU management set is recomputed, the number of free AUs to include as part of a reduced set of free AUs may depend on the number of other types of AUs. As an example, if the AU management set is programmed to maintain identification of an integer number N AUs, then on recomputation of the management set L AUs may be determined to be unincorporated, M AUs may be determined to be transitional, and P AUs may be determined to be speculative. In order to maintain the management set to a total of N AUs, the number X of free AUs to include as part of the reduced set is X=N−L−M−P. Therefore, in one example, when the AU management set is first created (at boot) it contains an identification of N free AUs (in some embodiments the initial set may include some number of speculative AUs which would then reduce the number of free AUs identified). During processing some portion of these AUs will change state to transitional or unincorporated. However, in various embodiments the total number of AUs identified does not change. At the time of recomputation of the AU management set, the number and type of each AU may change in the set, but the total number may remain fixed. In some embodiments, recomputation may result in a change in the total number of AUs identified in the AU management set. Such a change could be programmable or dynamically determined responsive to system conditions. These and other embodiments are possible and are contemplated.
Referring to
In the network architecture 1000, each of the data storage arrays 1020a-1020b may be used for the sharing of data among different servers and computers, such as client computer systems 1010a-1010c. In addition, the data storage arrays 1020a-1020b may be used for disk mirroring, backup and restore, archival and retrieval of archived data, and data migration from one storage device to another. In an alternate embodiment, one or more client computer systems 1010a-1010c may be linked to one another through fast local area networks (LANs) in order to form a cluster. Such clients may share a storage resource, such as a cluster shared volume residing within one of data storage arrays 1020a-1020b.
Each of the data storage arrays 1020a-1020b includes a storage subsystem 1070 for data storage. Storage subsystem 1070 may comprise one or more storage devices 1076a-1076m. These storage devices 1076a-1076m may provide data storage services to client computer systems 1010a-1010c. Each of the storage devices 1076a-1076m uses a particular technology and mechanism for performing data storage. The type of technology and mechanism used within each of the storage devices 1076a-1076m may at least in part be used to determine the algorithms used for controlling and scheduling read and write operations to and from each of the storage devices 1076a-1076m. For example, the algorithms may locate particular physical locations corresponding to the operations. In addition, the algorithms may perform input/output (I/O) redirection for the operations, removal of duplicate data in the storage subsystem 1070, and support one or more mapping tables used for address redirection and deduplication.
The logic used in the above algorithms may be included in one or more of a base operating system (OS) 1032, a volume manager 1034, within each of the storage subsystem controllers 1074 and 1075, control logic within each of the storage devices 1076a-1076m, or otherwise. Additionally, the logic, algorithms, and control mechanisms described herein may comprise hardware and/or software.
In some embodiments, each of the storage devices 1076a-1076m may include or be further coupled to storage consisting of solid-state memory to store persistent data. In one embodiment, the included solid-state memory comprises solid-state drive (SSD) technology. A Solid-State Disk (SSD) may also be referred to as a Solid-State Drive. Storage array efficiency may be improved by creating a storage virtualization layer between user storage and physical locations within storage devices 1076a-1076m. In one embodiment, a virtual layer of a volume manager is placed in a device-driver stack of an operating system (OS), rather than within storage devices or in a network. A volume manager or a disk array manager is used to support device groups 1073a-1073m.
The controllers 1074 and 1075 may comprise logic for handling received read/write requests. In some embodiments, each of the data storage arrays 1020a-1020b includes multiple controllers, such as controllers 1074 and 1075. For example, when the original controller 1074 fails, a failover process transfers control to the secondary controller 1075. The base OS 1032, the volume manager 1034 (or disk array manager 1034), any OS drivers (not shown) and other software stored in memory medium 1030 may provide functionality providing access to files and the management of these functionalities. The base OS 1032 and the OS drivers may comprise program instructions stored on the memory medium 1030 and executable by processor 122 to perform one or more memory access operations in storage subsystem 1070 that correspond to received requests. Each of the data storage arrays 1020a-1020b may use a network interface 124 to connect to network 1080. Similar to client computer systems 1010a-1010c, in one embodiment, the functionality of network interface 124 may be included on a network adapter card.
It is noted that the above-described embodiments may comprise software. In such an embodiment, the program instructions that implement the methods and/or mechanisms may be conveyed or stored on a computer readable medium. Numerous types of media which are configured to store program instructions are available and include hard disks, floppy disks, CD-ROM, DVD, flash memory, Programmable ROMs (PROM), random access memory (RAM), and various other forms of volatile or non-volatile storage.
In various embodiments, one or more portions of the methods and mechanisms described herein may form part of a cloud-computing environment. In such embodiments, resources may be provided over the Internet as services according to one or more various models. Such models may include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). In IaaS, computer infrastructure is delivered as a service. In such a case, the computing equipment is generally owned and operated by the service provider. In the PaaS model, software tools and underlying equipment used by developers to develop software solutions may be provided as a service and hosted by the service provider. SaaS typically includes a service provider licensing software as a service on demand. The service provider may host the software, or may deploy the software to a customer for a given period of time. Numerous combinations of the above models are possible and are contemplated.
Although the embodiments above have been described in considerable detail, numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications.
Number | Name | Date | Kind |
---|---|---|---|
4970648 | Capots | Nov 1990 | A |
5208813 | Stallmo | May 1993 | A |
5403639 | Belsan et al. | Apr 1995 | A |
5940838 | Schmuck et al. | Aug 1999 | A |
6263350 | Wollrath et al. | Jul 2001 | B1 |
6412045 | DeKoning et al. | Jun 2002 | B1 |
6718448 | Ofer | Apr 2004 | B1 |
6757769 | Ofer | Jun 2004 | B1 |
6799283 | Tamai et al. | Sep 2004 | B1 |
6834298 | Singer et al. | Dec 2004 | B1 |
6850938 | Sadjadi | Feb 2005 | B1 |
6915434 | Kuroda et al. | Jul 2005 | B1 |
6973549 | Testardi | Dec 2005 | B1 |
7028216 | Aizawa et al. | Apr 2006 | B2 |
7028218 | Schwarm et al. | Apr 2006 | B2 |
7039827 | Meyer et al. | May 2006 | B2 |
7216164 | Whitmore et al. | May 2007 | B1 |
7783682 | Patterson | Aug 2010 | B1 |
7873619 | Faibish et al. | Jan 2011 | B1 |
7913300 | Flank et al. | Mar 2011 | B1 |
7933936 | Aggarwal et al. | Apr 2011 | B2 |
7979613 | Zohar et al. | Jul 2011 | B2 |
8086652 | Bisson et al. | Dec 2011 | B1 |
8117464 | Kogelnik | Feb 2012 | B1 |
8200887 | Bennett | Jun 2012 | B2 |
8205065 | Matze | Jun 2012 | B2 |
8352540 | Anglin et al. | Jan 2013 | B2 |
8527544 | Colgrove et al. | Sep 2013 | B1 |
8560747 | Tan et al. | Oct 2013 | B1 |
8621241 | Stephenson | Dec 2013 | B1 |
8700875 | Barron et al. | Apr 2014 | B1 |
8751463 | Chamness | Jun 2014 | B1 |
8806160 | Colgrove et al. | Aug 2014 | B2 |
8874850 | Goodson et al. | Oct 2014 | B1 |
8959305 | LeCrone et al. | Feb 2015 | B1 |
9081713 | Bennett | Jul 2015 | B1 |
9189334 | Bennett | Nov 2015 | B2 |
9311182 | Bennett | Apr 2016 | B2 |
9423967 | Colgrove et al. | Aug 2016 | B2 |
9436396 | Colgrove et al. | Sep 2016 | B2 |
9436720 | Colgrove et al. | Sep 2016 | B2 |
9454476 | Colgrove et al. | Sep 2016 | B2 |
9454477 | Colgrove et al. | Sep 2016 | B2 |
9513820 | Shalev | Dec 2016 | B1 |
9516016 | Colgrove et al. | Dec 2016 | B2 |
9552248 | Miller et al. | Jan 2017 | B2 |
9632870 | Bennett | Apr 2017 | B2 |
20020038436 | Suzuki | Mar 2002 | A1 |
20020087544 | Selkirk et al. | Jul 2002 | A1 |
20020178335 | Selkirk et al. | Nov 2002 | A1 |
20030140209 | Testardi | Jul 2003 | A1 |
20040049572 | Yamamoto et al. | Mar 2004 | A1 |
20050066095 | Mullick et al. | Mar 2005 | A1 |
20050216535 | Saika et al. | Sep 2005 | A1 |
20050223154 | Uemura | Oct 2005 | A1 |
20060074940 | Craft et al. | Apr 2006 | A1 |
20060136365 | Kedem et al. | Jun 2006 | A1 |
20060155946 | Ji | Jul 2006 | A1 |
20070067585 | Ueda et al. | Mar 2007 | A1 |
20070162954 | Pela | Jul 2007 | A1 |
20070171562 | Maejima et al. | Jul 2007 | A1 |
20070174673 | Kawaguchi et al. | Jul 2007 | A1 |
20070220313 | Katsuragi et al. | Sep 2007 | A1 |
20070245090 | King et al. | Oct 2007 | A1 |
20070266179 | Chavan et al. | Nov 2007 | A1 |
20080040570 | Challenger | Feb 2008 | A1 |
20080059699 | Kubo et al. | Mar 2008 | A1 |
20080065852 | Moore et al. | Mar 2008 | A1 |
20080134174 | Sheu et al. | Jun 2008 | A1 |
20080155191 | Anderson et al. | Jun 2008 | A1 |
20080178040 | Kobayashi | Jul 2008 | A1 |
20080209096 | Lin et al. | Aug 2008 | A1 |
20080244205 | Amano et al. | Oct 2008 | A1 |
20080275928 | Shuster | Nov 2008 | A1 |
20080285083 | Aonuma | Nov 2008 | A1 |
20080307270 | Li | Dec 2008 | A1 |
20090006587 | Richter | Jan 2009 | A1 |
20090037662 | La Frese et al. | Feb 2009 | A1 |
20090204858 | Kawaba | Aug 2009 | A1 |
20090228648 | Wack | Sep 2009 | A1 |
20090300084 | Whitehouse | Dec 2009 | A1 |
20100057673 | Savov | Mar 2010 | A1 |
20100058026 | Heil et al. | Mar 2010 | A1 |
20100067706 | Anan et al. | Mar 2010 | A1 |
20100077205 | Ekstrom et al. | Mar 2010 | A1 |
20100082879 | McKean et al. | Apr 2010 | A1 |
20100106905 | Kurashige et al. | Apr 2010 | A1 |
20100153620 | McKean et al. | Jun 2010 | A1 |
20100153641 | Jagadish et al. | Jun 2010 | A1 |
20100191897 | Zhang et al. | Jul 2010 | A1 |
20100250802 | Waugh et al. | Sep 2010 | A1 |
20100250882 | Hutchison et al. | Sep 2010 | A1 |
20100281225 | Chen et al. | Nov 2010 | A1 |
20100287327 | Li et al. | Nov 2010 | A1 |
20110072300 | Rousseau | Mar 2011 | A1 |
20110145598 | Smith et al. | Jun 2011 | A1 |
20110161559 | Yurzola et al. | Jun 2011 | A1 |
20110167221 | Pangal et al. | Jul 2011 | A1 |
20110238634 | Kobara | Sep 2011 | A1 |
20120023375 | Dutta et al. | Jan 2012 | A1 |
20120036309 | Dillow et al. | Feb 2012 | A1 |
20120117029 | Gold | May 2012 | A1 |
20120198175 | Atkisson | Aug 2012 | A1 |
20120330954 | Sivasubramanian et al. | Dec 2012 | A1 |
20130042052 | Colgrove et al. | Feb 2013 | A1 |
20130046995 | Movshovitz | Feb 2013 | A1 |
20130047029 | Ikeuchi et al. | Feb 2013 | A1 |
20130091102 | Nayak | Apr 2013 | A1 |
20130205110 | Kettner | Aug 2013 | A1 |
20130219125 | Kusters | Aug 2013 | A1 |
20130227236 | Flynn et al. | Aug 2013 | A1 |
20130275391 | Batwara et al. | Oct 2013 | A1 |
20130275656 | Talagala et al. | Oct 2013 | A1 |
20130283058 | Fiske et al. | Oct 2013 | A1 |
20130290648 | Shao et al. | Oct 2013 | A1 |
20130318132 | Basu | Nov 2013 | A1 |
20130318314 | Markus et al. | Nov 2013 | A1 |
20130339303 | Potter et al. | Dec 2013 | A1 |
20140052946 | Kimmel | Feb 2014 | A1 |
20140068791 | Resch | Mar 2014 | A1 |
20140089730 | Watanabe et al. | Mar 2014 | A1 |
20140101361 | Gschwind | Apr 2014 | A1 |
20140143517 | Jin et al. | May 2014 | A1 |
20140172929 | Sedayao et al. | Jun 2014 | A1 |
20140181620 | Kotzur | Jun 2014 | A1 |
20140201150 | Kumarasamy et al. | Jul 2014 | A1 |
20140215129 | Kuzmin et al. | Jul 2014 | A1 |
20140229131 | Cohen et al. | Aug 2014 | A1 |
20140229452 | Serita et al. | Aug 2014 | A1 |
20140281308 | Lango et al. | Sep 2014 | A1 |
20140325115 | Ramsundar et al. | Oct 2014 | A1 |
20150234709 | Koarashi | Aug 2015 | A1 |
20150244775 | Vibhor et al. | Aug 2015 | A1 |
20150278534 | Thiyagarajan et al. | Oct 2015 | A1 |
20150293822 | Chun | Oct 2015 | A1 |
20150310580 | Kumar | Oct 2015 | A1 |
20160019114 | Han et al. | Jan 2016 | A1 |
20160098191 | Golden et al. | Apr 2016 | A1 |
20160098199 | Golden et al. | Apr 2016 | A1 |
20180081562 | Vasudevan | Mar 2018 | A1 |
Number | Date | Country |
---|---|---|
103370685 | Oct 2013 | CN |
103370686 | Oct 2013 | CN |
104025010 | Nov 2016 | CN |
3066610 | Sep 2016 | EP |
3082047 | Oct 2016 | EP |
3120235 | Jan 2017 | EP |
2007087036 | Apr 2007 | JP |
2007094472 | Apr 2007 | JP |
2008250667 | Oct 2008 | JP |
2010211681 | Sep 2010 | JP |
1995002349 | Jan 1995 | WO |
1999013403 | Mar 1999 | WO |
2008102347 | Aug 2008 | WO |
2010071655 | Jun 2010 | WO |
Entry |
---|
Microsoft Corporation, “Fundamentals of Garbage Collection”, Retrieved Aug. 30, 2013 via the WayBack Machine, 11 pages. |
Microsoft Corporation, “GCSettings.lsServerGC Property”, Retrieved Oct. 27, 2013 via the WayBack Machine, 3 pages. |
Number | Date | Country | |
---|---|---|---|
Parent | 14602052 | Jan 2015 | US |
Child | 16401369 | US |