Query-based selection of storage nodes

Information

  • Patent Grant
  • 11907256
  • Patent Number
    11,907,256
  • Date Filed
    Wednesday, September 28, 2022
    a year ago
  • Date Issued
    Tuesday, February 20, 2024
    2 months ago
Abstract
An illustrative method includes receiving, in response to a storage query sent to a plurality of storage nodes of a data storage system to inquire as to which of the storage nodes can store data, a plurality of responses from a subset of storage nodes included in the plurality of storage nodes, the responses including an indication as to whether any of the storage nodes included in the subset is already storing additional data having a data identifier included in the storage query; renaming, based on a particular storage node included in the subset indicating that the particular storage node is already storing the additional data, the data; selecting, based on the responses, multiple storage nodes included in the subset; and sending the data and the data identifier to the selected storage nodes for storage by the selected storage nodes.
Description
BACKGROUND

Such a method is disclosed e.g. in US, 2005/0246393, A1. This method is disclosed for a system that uses a plurality of storage centres at geographically disparate locations. Distributed object storage managers are included to maintain information regarding stored data.


One problem associated with such a system is how to accomplish simple and yet robust and reliable writing as well as maintenance of data.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a distributed data storage system.



FIGS. 2A-2C, and FIG. 3 illustrate a data reading process.



FIGS. 4A-4C, and FIG. 5 illustrate a data writing process.



FIG. 6 illustrates schematically a situation where a number of files are stored among a number of data storage nodes.



FIG. 7 illustrates the transmission of heartbeat signals.



FIG. 8 is an overview of a data maintenance process.





DETAILED DESCRIPTION

One object of the present disclosure is therefore to realise robust writing or maintenance of data in a distributed storage system, without the use of centralised maintenance servers, which may themselves be a weak link in a system. This object is achieved by means a method of the initially mentioned kind which is accomplished in a storage node and comprises: monitoring the status of other storage nodes in the system as well as writing operations carried out in the data storage system, detecting, based on the monitoring, conditions in the data storage system that imply the need for replication of data between the nodes in the data storage system, and initiating a replication process in case such a condition is detected. The replication process includes sending a multicast message, to a plurality of storage nodes, the message enquiring which of those storage nodes store specific data.


By means of such a method, each storage node can be active with maintaining data of the entire system. In case a storage node fails, its data can be recovered by other nodes in the system, which system may therefore considered to be self-healing.


The monitoring may include listening to heartbeat signals from other storage nodes in the system. A condition that implies need for replication is then a malfunctioning storage node.


The data includes files and a condition implying need for replications may then be one of a file deletion or a file inconsistency.


A replication list, including files that need replication, may be maintained and may include priorities.


The replication process may include: sending a multicast message to a plurality of storage nodes request enquiring which of those storage nodes store specific data, receiving responses from those storage nodes that contain said specific data, determining whether said specific data is stored on a sufficient number of storage nodes, and, if not, selecting at least one additional storage node and transmitting said specific data to that storage node. Further, the specific data on storage nodes containing obsolete versions thereof may be updated.


Additionally, the replication process may begin with the storage node attempting to attain mastership for the file, to be replicated, among all storage nodes in the system.


The monitoring may further include monitoring of reading operations carried out in the data storage system.


The present disclosure further relates to a data storage node, for carrying out maintenance of data, corresponding to the method. The storage node then generally comprises means for carrying out the actions of the method.


The object is also achieved by means of a method for writing data to a data storage system of the initially mentioned kind, which is accomplished in a server running an application which accesses data in the data storage system. The method comprises: sending a multicast storage query to a plurality of storage nodes, receiving a plurality of responses from a subset of said storage nodes, the responses including geographic data relating to the geographic position of each server, selecting at least two storage nodes in the subset, based on said responses, and sending data and a data identifier, corresponding to the data, to the selected storage nodes.


This method accomplishes robust writing of data in the sense that a geographic diversity is realised in an efficient way.


The geographic position may include latitude and longitude of the storage node in question, and the responses may further include system load and/or system age for the storage node in question.


The multicast storage query may include a data identifier, identifying the data to be stored.


Typically, at least three nodes may be selected for storage, and a list of storage nodes, successfully storing the data, may be sent to the selected storage nodes.


The present disclosure further relates to a server, for carrying out writing of data, corresponding to the method. The server then generally comprises means for carrying out the actions of the method.


The present disclosure is related to a distributed data storage system comprising a plurality of storage nodes. The structure of the system and the context in which it is used is outlined in FIG. 1.


A user computer 1 accesses, via the Internet 3, an application 5 running on a server 7. The user context, as illustrated here, is therefore a regular client-server configuration, which is well known per se. However, it should be noted that the data storage system to be disclosed may be useful also in other configurations.


In the illustrated case, two applications 5, 9 run on the server 7. Of course however, this number of applications may be different. Each application has an API (Application Programming Interface) 11 which provides an interface in relation to the distributed data storage system 13 and supports requests, typically write and read requests, from the applications running on the server. From an application's point of view, reading or writing information from/to the data storage system 13 need not appear different from using any other type of storage solution, for instance a file server or simply a hard drive.


Each API 11 communicates with storage nodes 15 in the data storage system 13, and the storage nodes communicate with each other. These communications are based on TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). These concepts are well known to the skilled person, and are not explained further.


It should be noted that different APIs 11 on the same server 7 may access different sets of storage nodes 15. It should further be noted that there may exist more than one server 7 which accesses each storage node 15. This, however does not to any greater extent affect the way in which the storage nodes operate, as will be described later.


The components of the distributed data storage system are the storage nodes 15 and the APIs 11, in the server 7 which access the storage nodes 15. The present disclosure therefore relates to methods carried out in the server 7 and in the storage nodes 15. Those methods will primarily be embodied as software implementations which are run on the server and the storage nodes, respectively, and are together determining for the operation and the properties of the overall distributed data storage system.


The storage node 15 may typically be embodied by a file server which is provided with a number of functional blocks. The storage node may thus comprise a storage medium 17, which typically comprises of a number of hard drives, optionally configured as a RAID (Redundant Array of Independent Disk) system. Other types of storage media are however conceivable as well.


The storage node 15 may further include a directory 19, which comprises lists of data entity/storage node relations as a host list, as will be discussed later.


In addition to the host list, each storage node further contains a node list including the IP addresses of all storage nodes in its set or group of storage nodes. The number of storage nodes in a group may vary from a few to hundreds of storage nodes. The node list may further have a version number.


Additionally, the storage node 15 may include a replication block 21 and a cluster monitor block 23. The replication block 21 includes a storage node API 25, and is configured to execute functions for identifying the need for and carrying out a replication process, as will be described in detail later. The storage node API 25 of the replication block 21 may contain code that to a great extent corresponds to the code of the server's 7 storage node API 11, as the replication process comprises actions that correspond to a great extent to the actions carried out by the server 7 during reading and writing operations to be described. For instance, the writing operation carried out during replication corresponds to a great extent to the writing operation carried out by the server 7. The cluster monitor block 23 is configured to carry out monitoring of other storage nodes in the data storage system 13, as will be described in more detail later.


The storage nodes 15 of the distributed data storage system can be considered to exist in the same hierarchical level. There is no need to appoint any master storage node that is responsible for maintaining a directory of stored data entities and monitoring data consistency, etc. Instead, all storage nodes 15 can be considered equal, and may, at times, carry out data management operations vis-a-vis other storage nodes in the system. This equality ensures that the system is robust. In case of a storage node malfunction other nodes in the system will cover up the malfunctioning node and ensure reliable data storage.


The operation of the system will be described in the following order: reading of data, writing of data, and data maintenance. Even though these methods work very well together, it should be noted that they may in principle also be carried out independently of each other. That is, for instance the data reading method may provide excellent properties even if the data writing method of the present disclosure is not used, and vice versa.


The reading method is now described with reference to FIGS. 2A-2C and 3, the latter being a flowchart illustrating the method.


The reading, as well as other functions in the system, utilise multicast communication to communicate simultaneously with a plurality of storage nodes. By a multicast or IP multicast is here meant a point-to-multipoint communication which is accomplished by sending a message to an IP address which is reserved for multicast applications.


For example, a message, typically a request, is sent to such an IP address (e.g. 244.0.0.1), and a number of recipient servers are registered as subscribers to that IP address. Each of the recipient servers has its own IP address. When a switch in the network receives the message directed to 244.0.0.1, the switch forwards the message to the IP addresses of each server registered as a subscriber.


In principle, only one server may be registered as a subscriber to a multicast address, in which case a point-to-point, communication is achieved. However, in the context of this disclosure, such a communication is nevertheless considered a multicast communication since a multicast scheme is employed.


Unicast communication is also employed referring to a communication with a single recipient.


With reference to FIG. 2A and FIG. 3, the method for retrieving data from a data storage system comprises the sending 31 of a multicast query to a plurality of storage nodes 15. In the illustrated case there are five storage nodes each having an IP (Internet Protocol) address 192.168.1.1, 192.168.1.2, etc. The number of storage nodes is, needless to say, just an example. The query contains a data identifier “2B9B4A97-76E5-499E-A21A6D7932DD7927”, which may for instance be a Universally Unique Identifier, UUID, which is well known per se.


The storage nodes scan themselves for data corresponding to the identifier. If such data is found, a storage node sends a response, which is received 33 by the server 7, cf. FIG. 2B. As illustrated, the response may optionally contain further information in addition to an indication that the storage node has a copy of the relevant data. Specifically, the response may contain information from the storage node directory about other storage nodes containing the data, information regarding which version of the data is contained in the storage node, and information regarding which load the storage node at present is exposed to.


Based on the responses, the server selects 35 one or more storage nodes from which data is to be retrieved, and sends 37 a unicast request for data to that/those storage nodes, cf. FIG. 2C.


In response to the request for data, the storage node/nodes send the relevant data by unicast to the server which receives 39 the data. In the illustrated case, only one storage node is selected. While this is sufficient, it is possible to select more than one storage node in order to receive two sets of data which makes a consistency check possible. If the transfer of data fails, the server may select another storage node for retrieval.


The selection of storage nodes may be based on an algorithm that take several factors into account in order to achieve a good overall system performance. Typically, the storage node having the latest data version and the lowest load will be selected although other concepts are fully conceivable.


Optionally, the operation may be concluded by server sending a list to all storage nodes involved, indicating which nodes contains the data and with which version. Based on this information, the storage nodes may themselves maintain the data properly by the replication process to be described.



FIGS. 4A-4C, and FIG. 5 illustrate a data writing process for the distributed data storage system.


With reference to FIG. 4A and FIG. 5 the method comprises a server sending 41 a multicast storage query to a plurality of storage nodes. The storage query comprises a data identifier and basically consists of a question whether the receiving storage nodes can store this file. Optionally, the storage nodes may check with their internal directories whether they already have a file with this name, and may notify the server 7 in the unlikely event that this is the case, such that the server may rename the file.


In any case, at least a subset of the storage nodes will provide responses by unicast transmission to the server 7. Typically, storage nodes having a predetermined minimum free disk space will answer to the query. The server 7 receives 43 the responses which include geographic data relating to the geographic position of each server. For instance, as indicated in FIG. 4B, the geographic data may include the latitude, the longitude and the altitude of each server. Other types of geographic data may however also be conceivable, such as a ZIP code or the like.


In addition to the geographic data, further information may be provided that serves as an input to a storage node selection process. In the illustrated example, the amount of free space in each storage node is provided together with an indication of the storage node's system age and an indication of the load that the storage node currently experiences.


Based on the received responses, the server selects 45 at least two, in a typical embodiment three, storage nodes in the subset for storing the data. The selection of storage nodes is carried out by means of an algorithm that take different data into account. The selection is carried out in order to achieve some kind of geographical diversity. At least it should preferably be avoided that only file servers in the same rack are selected as storage nodes. Typically, a great geographical diversity may be achieved, even selecting storage nodes on different continents. In addition to the geographical diversity, other parameters may be included in the selection algorithm. As long as a minimum geographic diversity is achieved, free space, system age and current load may also be taken into account.


When the storage nodes have been selected, the data to be stored and a corresponding data identifier is sent to each selected node, typically using a unicast transmission.


Optionally, the operation may be concluded by each storage node, which has successfully carried out the writing operation, sending an acknowledgement to the server. The server then sends a list to all storage nodes involved indicating which nodes have successfully written the data and which have not. Based on this information, the storage nodes may themselves maintain the data properly by the replication process to be described. For instance if one storage node's writing failed, there exists a need to replicate the file to one more storage node in order to achieve the desired number of storing storage nodes for that file.


The data writing method in itself allows an API in a server 7 to store data in a very robust way, as excellent geographic diversity may be provided.


In addition to the writing and reading operations, the API in the server 7 may carry out operations that delete files and update files. These processes will be described in connection with the data maintenance process below.


The aim of the data maintenance process is to make sure that a reasonable number of non-malfunctioning storage nodes each store the latest version of each file. Additionally, it may provide the function that no deleted files are stored at any storage node. The maintenance is carried out by the storage nodes themselves. There is thus no need for a dedicated “master” that takes responsibility for the maintenance of the data storage. This ensures improved reliability as the “master” would otherwise be a weak spot in the system.



FIG. 6 illustrates schematically a situation where a number of files are stored among a number of data storage nodes. In the illustrated case, twelve nodes, having IP addresses consecutively numbered from 192.168.1.1 to 192.168.1.12, are depicted for illustration purposes. Needless to say however, the IP address numbers need not be in the same range at all. The nodes are placed in a circular order only to simplify the description, i.e. the nodes need not have any particular order. Each node store one or two files identified, for the purpose of simplicity, by the letters A-F.


With reference to FIG. 8, the method for maintaining data comprises the detecting 51 conditions in the data storage system that imply the need for replication of data between the nodes in the data storage system, and a replication process 53. The result of the detection process 51 is a list 55 of files for which the need for replication has been identified. The list may further include data regarding the priority of the different needs for replication. Based on this list the replication process 53 is carried out.


The robustness of the distributed storage relies on that a reasonable number of copies of each file, correct versions, are stored in the system. In the illustrated case, three copies of each file is stored. However, should for instance the storage node with the address 192.168.1.5 fail, the desired number of stored copies for files “B” and “C” will be fallen short of.


One event that results in a need for replication is therefore the malfunctioning of a storage node in the system.


Each storage node in the system may monitor the status of other storage nodes in the system. This may be carried out by letting each storage node emit a so-called heartbeat signal at regular intervals, as illustrated in FIG. 7. In the illustrated case, the storage node with address 192.168.1.7 emits a multicast signal 57 to the other storage nodes in the system, indicating that it is working correctly. This signal may be received by all other functioning storage nodes in the system carrying out heartbeat monitoring 59 (cf. FIG. 8), or a subset thereof. In the case with the storage node with address 192.168.1.5 however, this node is malfunctioning and does not emit any heartbeat signal. Therefore, the other storage nodes will notice that no heartbeat signal has been emitted by this node in a long time which indicates that the storage node in question is down.


The heartbeat signal may, in addition to the storage node's address, include its node list version number. Another storage node, listening to the heartbeat signal and finding out that the transmitting storage node has a later version node list, may then request that transmitting storage node to transfer its node list. This means that addition and removal of storage nodes can be obtained simply by adding or removing a storage node and sending a new node list version to one single storage node. This node list will then spread to all other storage nodes in the system.


Again with reference to FIG. 8, each storage node searches 61 its internal directory for files that are stored by the malfunctioning storage node. Storage nodes which themselves store files “B” and “C” will find the malfunctioning storage node and can therefore add the corresponding file on their lists 55.


The detection process may however also reveal other conditions that imply the need for replicating a file. Typically such conditions may be inconsistencies, i.e. that one or more storage nodes has an obsolete version of the file. A delete operation also implies a replication process as this process may carry out the actual physical deletion of the file. The server's delete operation then only need make sure that the storage nodes set a deletion flag for the file in question. Each node may therefore monitor reading and writing operations carried out in the data storage system. Information provided by the server 7 at the conclusion of reading and writing operations, respectively, may indicate that one storage node contains an obsolete version of a file (in the case of a reading operation) or that a storage node did not successfully carry out a writing operation. In both cases there exists a need for maintaining data by replication such that the overall objects of the maintenance process are fulfilled.


In addition to the basic reading and writing operations 63, 65, at least two additional processes may provide indications that a need for replication exists, namely the deleting 67 and updating 69 processes that are now given a brief explanation.


The deleting process is initiated by the server 7 (cf. FIG. 1). Similar to the reading process, the server sends a query by multicasting to all storage nodes, in order to find out which storage nodes has data with a specific data identifier. The storage nodes scan themselves for data with the relevant identifier, and respond by a unicast transmission if they have the data in question. The response may include a list, from the storage node directory, of other storage nodes containing the data. The server 7 then sends a unicast request, to the storage nodes that are considered to store the file, that the file be deleted. Each storage node sets a flag relating to the file and indicating that it should be deleted. The file is then added to the replication list, and an acknowledgement is sent to the server. The replication process then physically deletes the file as will be described.


The updating process has a search function, similar to the one of the deleting process, and a writing function, similar to the one carried out in the writing process. The server sends a query by multicasting to all storage nodes, in order to find out which storage nodes has data with a specific data identifier. The storage nodes scan themselves for data with the relevant identifier, and respond by a unicast transmission if they have the data in question. The response may include a list, from the storage node directory, of other storage nodes containing the data. The server 7 then sends a unicast request, telling the storage nodes to update the data. The request of course contains the updated data. The storage nodes updating the data sends an acknowledgement to the server, which responds by sending a unicast transmission containing a list with the storage nodes that successfully updated the data, and the storage nodes which did not. Again, this list can be used by the maintenance process.


Again with reference to FIG. 8 the read 63, write 65, delete 67, and update 69 operations may all indicate that a need for replication exists. The same applies for the heartbeat monitoring 59. The overall detection process 51 thus generates data regarding which files need be replicated. For instance, a reading or updating operation may reveal that a specific storage node contains an obsolete version of a file. A deletion process may set a deletion flag for a specific file. The heartbeat monitoring may reveal that a number of files, stored on a malfunctioning storage node need be replicated to a new storage node.


Each storage nodes monitors the need for replication for all the files it stores and maintains a replication list 55. The replication list 55 thus contains a number of files that need be replicated. The files may be ordered in correspondence with the priority for each replication. Typically, there may be three different priority levels. The highest level is reserved for files which the storage node holds the last online copy of. Such a file need be quickly replicated to other storage nodes such that a reasonable level of redundancy may be achieved. A medium level of priority may relate to files where the versions are inconsistent among the storage nodes. A lower level of priority may relate to files which are stored on a storage node that is malfunctioning.


The storage node deals with the files on the replication list 55 in accordance with their level of priority. The replication process is now described for a storage node which is here called the operating storage node, although all storage nodes may operate in this way.


The replication part 53 of the maintaining process starts with the operating storage node attempting 71 to become the master for the file it intends to replicate. The operating storage nodes sends a unicast request to become master to other storage nodes that are known store the file in question. The directory 19 (cf. FIG. 1) provides a host list comprising information regarding which storage nodes to ask. In the event, for instance in case of a colliding request, that one of the storage nodes does not respond affirmatively, the file is moved back to the list for the time being, and an attempt is instead made with the next file on the list. Otherwise the operating storage node is considered to be the master of this file and the other storage nodes set a flag indicating that the operating storage node is master for the file in question.


The next step is to find 73 all copies of the file in question in the distributed storage system. This may be carried out by the operating storage node sending a multicast query to all storage nodes, asking which ones of them have the file. The storage nodes having the file submit responses to the query, containing the version of the file they keep as well as their host lists, i.e. the list of storage nodes containing the relevant file that is kept in the directory of each storage node. These host lists are then merged 75 by the operating storage node, such that a master host list is formed corresponding to the union of all retrieved host lists. If additional storage nodes are found, which were not asked when the operating storage node attempted to become master, that step may now be repeated for the additional storage nodes. The master host list contains information regarding which versions of the file the different storage nodes keep and illustrate the status of the file within the entire storage system.


Should the operating storage node not have the latest version of the file in question, this file is then retrieved 77 from one of the storage nodes that do have the latest version.


The operating storage node then decides 79 whether the host list need to be changed, typically if additional storage nodes should be added. If so, the operating storage node may carry out a process very similar to the writing process as carried out by the server and as described in connection with FIGS. 4A-4C, and 5. The result of this process is that the file is written to a new storage node.


In case of version inconsistencies, the operating storage node may update 81 copies of the file that are stored on other storage nodes, such that all files stored have the correct version.


Superfluous copies of the stored file may be deleted 83. If the replication process is initiated by a delete operation, the process may jump directly to this step. Then, as soon as all storage nodes have accepted the deletion of the file, the operating storage node simply requests, using unicast, all storage nodes to physically delete the file in question. The storage nodes acknowledge that the file is deleted.


Further the status, i.e. the master host list of the file is updated. It is then optionally possible to repeat steps 73-83 to make sure that the need for replication no longer exists. This repetition should result in a consistent master host list that need not be updated in step 85.


Thereafter, the replication process for that file is concluded, and the operating storage node may release 87 the status as master of the file by sending a corresponding message to all other storage nodes on the host list.


This system where each storage node takes responsibility for maintaining all the files it stores throughout the set of storage nodes provides a self-repairing (in case of a storage node malfunction) self-cleaning (in case of file inconsistencies or files to be deleted) system with excellent reliability. It is easily scalable and can store files for a great number of different applications simultaneously.


The invention is not restricted to the specific disclosed examples and may be varied and altered in different ways within the scope of the appended claims.

Claims
  • 1. A method comprising: receiving, in response to a storage query sent to a plurality of storage nodes of a data storage system to inquire as to which of the storage nodes can store data, a plurality of responses from a subset of storage nodes included in the plurality of storage nodes, the responses including an indication as to whether any of the storage nodes included in the subset is already storing additional data having a data identifier included in the storage query;renaming, based on a particular storage node included in the subset indicating that the particular storage node is already storing the additional data, the data;selecting, based on the responses, multiple storage nodes included in the subset; andsending the data and the data identifier to the selected storage nodes for storage by the selected storage nodes.
  • 2. The method of claim 1, further comprising: receiving acknowledgement information from each storage node included in the selected storage nodes that successfully carries out a write operation with respect to the data; andsending, to the selected storage nodes and based on the received acknowledgement information, a list identifying a storage node included in the selected storage nodes and that did not successfully carry out the write operation with respect to the data.
  • 3. The method of claim 2, wherein the list is configured to cause a particular storage node in the selected storage nodes to initiate a data replication procedure for the data.
  • 4. The method of claim 3, further comprising the particular storage node performing the data replication procedure for the data by: sending an additional storage query to the plurality of storage nodes requesting identification of data storage nodes that store the data;receiving one or more responses to the additional storage query from one or more other storage nodes included in the plurality of storage nodes and that store the data; andselecting a storage node in the plurality of storage nodes that does not already store the data to store an additional copy of the data.
  • 5. The method of claim 1, wherein the data is computer-readable data.
  • 6. The method of claim 1, wherein the responses comprise geographic data that identifies a geographic position of each of the storage nodes included in the subset.
  • 7. The method of claim 6, wherein the selecting of the multiple storage nodes comprises selecting storage nodes that have a minimum geographic diversity based on the geographic data for inclusion in the multiple storage nodes.
  • 8. The method of claim 1, wherein the responses comprise information representative of at least one of free storage space or current load for each of the storage nodes included in the subset.
  • 9. The method of claim 1, wherein the multiple storage nodes comprises at least three storage nodes.
  • 10. The method of claim 1, wherein the storage query comprises a multicast storage query sent to a multicast address.
  • 11. The method of claim 1, wherein the receiving of the plurality of responses comprises receiving a unicast transmission from each storage node included in the subset of storage nodes.
  • 12. The method of claim 1, wherein the receiving of the plurality of responses, the selecting of the multiple storage nodes, and the sending of the data and the data identifier are performed by an application programming interface (API).
  • 13. The method of claim 12, wherein the API is executed by a device configured to communicate with the data storage system by way of a network.
  • 14. The method of claim 12, wherein the API is executed by a storage node included in the data storage system.
  • 15. The method of claim 1, wherein the responses further comprise information representative of a system age for each of the storage nodes included in the subset.
  • 16. A physical server running an application and configured to execute an application programming interface (API) to perform a process comprising: receiving, in response to a storage query sent to a plurality of storage nodes of a data storage system to inquire as to which of the storage nodes can store data, a plurality of responses from a subset of storage nodes included in the plurality of storage nodes, the responses including an indication as to whether any of the storage nodes included in the subset is already storing additional data having a data identifier included in the storage query;renaming, based on a particular storage node included in the subset indicating that the particular storage node is already storing the additional data, the data;selecting, based on the responses, multiple storage nodes included in the subset; andsending the data and the data identifier to the selected storage nodes for storage by the selected storage nodes.
  • 17. The physical server of claim 16, wherein the server is configured to communicate with the data storage system by way of a network.
  • 18. The physical server of claim 16, wherein the server is implemented by a storage node within the data storage system.
  • 19. The physical server of claim 16, wherein the API is further configured to: receive acknowledgement information from each storage node included in the selected storage nodes that successfully carries out a write operation with respect to the data; andsend, to the selected storage nodes and based on the received acknowledgement information, a list identifying any storage node that did not successfully carry out the write operation with respect to the data.
  • 20. The physical server of claim 19, wherein the list is configured to cause at least one of the selected storage nodes to initiate a data replication procedure for the data.
Priority Claims (1)
Number Date Country Kind
0802277-4 Oct 2008 SE national
RELATED APPLICATIONS

This application is a continuation application of U.S. patent application Ser. No. 16/410,688, filed May 13, 2019, which is a continuation of U.S. patent application Ser. No. 15/084,445, filed Mar. 29, 2016 (now U.S. Pat. No. 10,650,022), which is a continuation of U.S. patent application Ser. No. 13/170,672, filed Jun. 28, 2011 (now U.S. Pat. No. 9,329,955), which is a continuation of U.S. patent application Ser. No. 13/125,524, filed Jul. 6, 2011 (now U.S. Pat. No. 8,688,630), which is a National Stage of PCT Application No. PCT/EP2009/063796, filed Oct. 21, 2009, which claims the benefit of Sweden Application No. 0802277-4, filed Oct. 24, 2008, the disclosures of which are incorporated herein by references in their entirety.

US Referenced Citations (254)
Number Name Date Kind
3707707 Spencer et al. Dec 1972 A
5713017 Lin et al. Jan 1998 A
5787247 Norin et al. Jul 1998 A
6003065 Yan et al. Dec 1999 A
6021118 Houck et al. Feb 2000 A
6055543 Christensen et al. Apr 2000 A
6259701 Shur et al. Jul 2001 B1
6345308 Abe Feb 2002 B1
6389432 Pothapragada et al. May 2002 B1
6401120 Gamache et al. Jun 2002 B1
6470420 Hospodor Oct 2002 B1
6510162 Fijolek et al. Jan 2003 B1
6732237 Jacobs et al. May 2004 B1
6782389 Chrin et al. Aug 2004 B1
6839815 Kagami et al. Jan 2005 B2
6925737 Bolduan et al. Aug 2005 B2
6985956 Luke et al. Jan 2006 B2
7039661 Ranade et al. May 2006 B1
7117294 Mi Oct 2006 B1
7200664 Hayden Apr 2007 B2
7206836 Dinker et al. Apr 2007 B2
7266556 Coates Sep 2007 B1
7308544 Kuwabara Dec 2007 B2
7320088 Gawali Jan 2008 B1
7330997 Odom Feb 2008 B1
7337331 Yoshida Feb 2008 B2
7340510 Iskov et al. Mar 2008 B1
7352765 Dai et al. Apr 2008 B2
7376945 Kakumani et al. May 2008 B1
7385978 Yang et al. Jun 2008 B1
7406484 Srinivasan et al. Jul 2008 B1
7428540 Coates Sep 2008 B1
7487305 Hill et al. Feb 2009 B2
7503052 Castro et al. Mar 2009 B2
7546486 Slik et al. Jun 2009 B2
7552122 Georgiev Jun 2009 B1
7565419 Kwiatkowski et al. Jul 2009 B1
7568069 Jantz et al. Jul 2009 B2
7574488 Matsubara Aug 2009 B2
7590672 Slik et al. Sep 2009 B2
7593966 Therrien et al. Sep 2009 B2
7624155 Nordin et al. Nov 2009 B1
7624158 Slik et al. Nov 2009 B2
7631023 Kaiser et al. Dec 2009 B1
7631045 Boerries et al. Dec 2009 B2
7631313 Mayhew et al. Dec 2009 B2
7634453 Bakke et al. Dec 2009 B1
7647329 Fischman et al. Jan 2010 B1
7685109 Ransil Mar 2010 B1
7694086 Kulkarni et al. Apr 2010 B1
7752211 Ozekinci Jul 2010 B1
7769711 Srinivasan et al. Aug 2010 B2
7778972 Cormie et al. Aug 2010 B1
7822711 Ranade Oct 2010 B1
7822766 Arndt et al. Oct 2010 B2
7840992 Dufrene et al. Nov 2010 B1
7873650 Chapman et al. Jan 2011 B1
7885982 Wight et al. Feb 2011 B2
7975115 Wayda et al. Jul 2011 B2
8060598 Cook et al. Nov 2011 B1
8073881 Georgiev Dec 2011 B1
8190561 Poole et al. May 2012 B1
8255430 Dutton et al. Aug 2012 B2
8281022 Bopardikar Oct 2012 B1
8296398 Lacapra et al. Oct 2012 B2
8401997 Tawri et al. Mar 2013 B1
8417828 Ma et al. Apr 2013 B2
8443062 Voutilainen et al. May 2013 B2
8468214 Bourlas et al. Jun 2013 B1
8495472 Magerramov et al. Jul 2013 B1
8504758 McHugh et al. Aug 2013 B1
8504797 Mimatsu Aug 2013 B2
8561115 Hattori et al. Oct 2013 B2
8577957 Behar et al. Nov 2013 B2
8706914 Duchesneau Apr 2014 B2
8707091 Gladwin et al. Apr 2014 B2
8745342 Amano et al. Jun 2014 B2
8769042 Sedeffow Jul 2014 B2
8822155 Sukumar et al. Sep 2014 B2
8898236 Kanakadandi et al. Nov 2014 B2
8918478 Ozzie et al. Dec 2014 B2
9098683 Rose Aug 2015 B2
9225780 Braam et al. Dec 2015 B2
9275063 Natanzon Mar 2016 B1
9280678 Redberg Mar 2016 B2
9367448 Botelho et al. Jun 2016 B1
9395922 Nishikido et al. Jul 2016 B2
9471593 Anderson et al. Oct 2016 B1
9552299 Stalzer Jan 2017 B2
9740403 Storer et al. Aug 2017 B2
9864874 Shanbhag et al. Jan 2018 B1
10025673 Maccanti et al. Jul 2018 B1
10102356 Sahin et al. Oct 2018 B1
10185495 Katsuki Jan 2019 B2
10324639 Seo Jun 2019 B2
10567406 Astigarraga et al. Feb 2020 B2
10810088 Gu et al. Oct 2020 B1
10846137 Vallala et al. Nov 2020 B2
10877683 Wu et al. Dec 2020 B2
11106810 Natanzon et al. Aug 2021 B2
20010034812 Ignatius et al. Oct 2001 A1
20010047400 Coates et al. Nov 2001 A1
20010048728 Peng Dec 2001 A1
20020042693 Kampe et al. Apr 2002 A1
20020073086 Thompson et al. Jun 2002 A1
20020103888 Janz et al. Aug 2002 A1
20020114341 Sutherland et al. Aug 2002 A1
20020145786 Chang et al. Oct 2002 A1
20020156912 Hurst et al. Oct 2002 A1
20030026254 Sim Feb 2003 A1
20030065663 Chu Apr 2003 A1
20030097468 Hamadi May 2003 A1
20030120654 Edlund et al. Jun 2003 A1
20030126122 Bosley et al. Jul 2003 A1
20030154238 Murphy et al. Aug 2003 A1
20030172089 Douceur et al. Sep 2003 A1
20030177261 Sekiguchi et al. Sep 2003 A1
20030233455 Leber et al. Dec 2003 A1
20040010654 Yasuda et al. Jan 2004 A1
20040030787 Jandel et al. Feb 2004 A1
20040059805 Dinker et al. Mar 2004 A1
20040064729 Yellepeddy Apr 2004 A1
20040078466 Coates et al. Apr 2004 A1
20040088297 Coates et al. May 2004 A1
20040088646 Yeager et al. May 2004 A1
20040111730 Apte Jun 2004 A1
20040243675 Taoyama et al. Dec 2004 A1
20040260775 Fedele Dec 2004 A1
20050010618 Hayden Jan 2005 A1
20050015431 Cherkasova Jan 2005 A1
20050015461 Richard et al. Jan 2005 A1
20050038990 Sasakura et al. Feb 2005 A1
20050044092 Adya et al. Feb 2005 A1
20050055418 Blanc et al. Mar 2005 A1
20050114711 Hesselink et al. May 2005 A1
20050177550 Jacobs et al. Aug 2005 A1
20050193245 Hayden et al. Sep 2005 A1
20050198032 Cochran Sep 2005 A1
20050204042 Banerjee et al. Sep 2005 A1
20050216523 Sakaguchi Sep 2005 A1
20050246393 Coates et al. Nov 2005 A1
20050256894 Talanis et al. Nov 2005 A1
20050278552 Delisle et al. Dec 2005 A1
20050283649 Turner et al. Dec 2005 A1
20060023969 Lara et al. Feb 2006 A1
20060031230 Kumar Feb 2006 A1
20060031439 Saffre Feb 2006 A1
20060047776 Chieng et al. Mar 2006 A1
20060080574 Saito et al. Apr 2006 A1
20060090045 Bartlett et al. Apr 2006 A1
20060090095 Massa et al. Apr 2006 A1
20060095397 Torres et al. May 2006 A1
20060112154 Douceur et al. May 2006 A1
20060218203 Yamato et al. Sep 2006 A1
20060236055 Itsuka Oct 2006 A1
20060253504 Lee et al. Nov 2006 A1
20060259594 Paliwal et al. Nov 2006 A1
20060288053 Holt et al. Dec 2006 A1
20070011302 Groner Jan 2007 A1
20070022087 Bahar et al. Jan 2007 A1
20070022121 Bahar et al. Jan 2007 A1
20070022122 Bahar et al. Jan 2007 A1
20070022129 Bahar et al. Jan 2007 A1
20070028291 Brennan et al. Feb 2007 A1
20070055703 Zimran et al. Mar 2007 A1
20070088703 Kasiolas et al. Apr 2007 A1
20070094269 Mikesell et al. Apr 2007 A1
20070094354 Soltis Apr 2007 A1
20070189153 Mason Aug 2007 A1
20070192451 Tran et al. Aug 2007 A1
20070198467 Wiser et al. Aug 2007 A1
20070220320 Sen et al. Sep 2007 A1
20070220328 Liu et al. Sep 2007 A1
20070255763 Beyerle et al. Nov 2007 A1
20070276838 Abushanab et al. Nov 2007 A1
20070288494 Chrin et al. Dec 2007 A1
20070288533 Srivastava et al. Dec 2007 A1
20070288638 Vuong et al. Dec 2007 A1
20080005195 Li et al. Jan 2008 A1
20080005199 Chen et al. Jan 2008 A1
20080010372 Khedouri et al. Jan 2008 A1
20080043634 Wang et al. Feb 2008 A1
20080077635 Sporny et al. Mar 2008 A1
20080084889 Archer et al. Apr 2008 A1
20080104218 Liang et al. May 2008 A1
20080104666 Dillaway May 2008 A1
20080109830 Giotzbach et al. May 2008 A1
20080126357 Casanova et al. May 2008 A1
20080168157 Marchand Jul 2008 A1
20080171556 Carter Jul 2008 A1
20080172478 Kiyohara et al. Jul 2008 A1
20080177767 Lin et al. Jul 2008 A1
20080198752 Fan et al. Aug 2008 A1
20080216174 Vogel et al. Sep 2008 A1
20080235321 Matsuo Sep 2008 A1
20080243950 Webman et al. Oct 2008 A1
20080244674 Hayashi et al. Oct 2008 A1
20080263183 Nishiyama et al. Oct 2008 A1
20080270822 Fan et al. Oct 2008 A1
20090043922 Crowther Feb 2009 A1
20090083810 Hattori et al. Mar 2009 A1
20090132543 Chatley et al. May 2009 A1
20090172211 Perry et al. Jul 2009 A1
20090172307 Perry et al. Jul 2009 A1
20090228669 Slesarev et al. Sep 2009 A1
20090249222 Schmidt et al. Oct 2009 A1
20090271412 Lacapra et al. Oct 2009 A1
20090287842 Plamondon Nov 2009 A1
20100010975 Morris Jan 2010 A1
20100020718 Tabbara Jan 2010 A1
20100057785 Khosravy et al. Mar 2010 A1
20100070515 Dutton et al. Mar 2010 A1
20100115078 Ishikawa et al. May 2010 A1
20100146497 Kogan et al. Jun 2010 A1
20100161138 Ange et al. Jun 2010 A1
20100169391 Baptist et al. Jul 2010 A1
20100169415 Leggette et al. Jul 2010 A1
20100185693 Murty et al. Jul 2010 A1
20100198888 Blomstedt et al. Aug 2010 A1
20100198889 Byers et al. Aug 2010 A1
20100223262 Krylov et al. Sep 2010 A1
20100303071 Kotalwar et al. Dec 2010 A1
20100306270 McDiarmid et al. Dec 2010 A1
20110035540 Fitzgerald et al. Feb 2011 A1
20110047413 McGill et al. Feb 2011 A1
20110047620 Mahaffey et al. Feb 2011 A1
20110055353 Tucker et al. Mar 2011 A1
20110072206 Ross et al. Mar 2011 A1
20110087690 Cairns Apr 2011 A1
20110125814 Slik et al. May 2011 A1
20110153557 Bernstein et al. Jun 2011 A1
20110161335 Dash et al. Jun 2011 A1
20110208825 Lee et al. Aug 2011 A1
20110231374 Jain et al. Sep 2011 A1
20110238909 Kumar et al. Sep 2011 A1
20110252204 Coon et al. Oct 2011 A1
20120066498 Engert Mar 2012 A1
20120109883 Iordanov et al. May 2012 A1
20120180070 Pafumi et al. Jul 2012 A1
20120191771 Preston et al. Jul 2012 A1
20120290870 Shah et al. Nov 2012 A1
20120331021 Lord Dec 2012 A1
20130031423 Barrow et al. Jan 2013 A1
20130060884 Bernbo et al. Mar 2013 A1
20130103851 Umeki et al. Apr 2013 A1
20130133030 Xue et al. May 2013 A1
20130254314 Chow et al. Sep 2013 A1
20130268632 Baron et al. Oct 2013 A1
20140006796 Smith et al. Jan 2014 A1
20140173112 Seago et al. Jun 2014 A1
20140289702 McMahon et al. Sep 2014 A1
20140298135 Dhuse et al. Oct 2014 A1
20150288659 Lukacs Oct 2015 A1
20160099963 Mahaffey et al. Apr 2016 A1
Foreign Referenced Citations (35)
Number Date Country
1726454 Jan 2006 CN
101710339 May 2010 CN
0774723 Jul 1998 EP
0934568 Jun 2003 EP
1521189 Apr 2005 EP
1578088 Sep 2005 EP
1669850 Jun 2006 EP
1798934 Jun 2007 EP
2031513 Mar 2009 EP
6348527 Dec 1994 JP
11249874 Sep 1999 JP
2000322292 Nov 2000 JP
2003030012 Jan 2003 JP
2003223286 Aug 2003 JP
2003248607 Sep 2003 JP
2003271316 Sep 2003 JP
2004005491 Jan 2004 JP
2007058275 Mar 2007 JP
2008250767 Oct 2008 JP
2009259007 Nov 2009 JP
1999038093 Jul 1999 WO
2001018633 Mar 2001 WO
2002035359 May 2002 WO
2002044835 Jun 2002 WO
2004053677 Jun 2004 WO
2006124911 Nov 2006 WO
2007014296 Feb 2007 WO
2007115317 Oct 2007 WO
2007134918 Nov 2007 WO
2008069811 Jun 2008 WO
2008102195 Aug 2008 WO
2009048726 Apr 2009 WO
2010046393 Apr 2010 WO
2010080533 Jul 2010 WO
2011131717 Oct 2011 WO
Non-Patent Literature Citations (22)
Entry
“Series X: Data Networks and Open System Communications”: OSI networking and system aspects—Naming, Addressing and Registration, International Telecommunication Union, Sep. 2004. ITU-T Recommendation X.667.
Anonymous, et al., “Universally unique identifier”, from Wikipedia, the free encyclopedia. Aug. 24, 2011, 9 pages.
Deering, et al., “Multicast Routing in Datagram Internetworks and Extended LANs”, ACM Transactions on Computer Systems, vol. 8, No. 2, May 1990, pp. 85-110.
Gavrilov, et al., “Data Replication”, Types and Properties of Replication, Comparison of Replication Mechanisms in MS SQL Server 2005 and Oracle server 10g, Nov. 20, 2006, 5 pages.
Handley, et al.,“Session Directories and Scalable Internet Multicast Address Allocation”, Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Aug. 31-Sep. 4, 1998, 12 pages.
Hewlett-Packard Development Co., et al., “HP Volume Shadowing for OpenVMS”, Hewlett-Packard Development Company L. P., OpenVMS Alpha 7.3-2, Sep. 2003, 162 pages.
Hwang, et al., “RAID-x: A New Distributed Disk Array for I/O-Centric Cluster Computing”, Proceedings the Ninth International Symposium on High-Performance Distributed Computing, 2000, pp. 279-286.
Katsurashima, et al., “NAS Switch: a Novel CIFS Server Virtualization”, Proceedings. 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, Apr. 7-10, 2003, pp. 82-86.
Kronenberg, et al., “VAXclusters: A Closely-Coupled Distributed System”, ACM Transactions on Computer Systems, vol. 4, No. 2, May 1986, pp. 130-146.
Lan, et al., “Consistency Maintenance in Peer-to-Peer File Sharing Networks”, Aug. 24, 2007, 11 pages.
Parris, et al., “Using OpenVMS Clusters for Disaster Tolerance”, System/Software Engineer, HP Services-Systems Engineering, 2003, 27 pages.
SAP Library, et al.,“Queues for Prioritized Message Processing”, SAP Exchange Infrastructure, Available online at http://help.sap.com/saphelp_nw04/helpdata/en/04/827440c36ed562e10000000a155106/content.htm, Feb. 6, 2009, pp. 1-2.
squid-cache.org, et al., “Squid Configuration Directive Reply_Body_Max_Size”, Available online at http://www.squid-cache.org/Doc/config/reply_body_max_size/, Dec. 21, 2008, pp. 1-2.
Stalzer, et al., “FlashBlades: System Architecture and Applications”, Proceedings of the 2nd Workshop on Architectures and Systems for Big Data, Association for Computing Machinery, New York, NY, 2012, pp. 10-14.
Storer, et al., “Pergamum: Replacing Tape with Energy Efficient, Reliable, Disc-Based Archival Storage”, FAST'08: Proceedings of the 6th USENIX Conference on File and Storage Technologies, Feb. 2008, Article No. 1, pp. 1-16.
Suryanarayanan, et al.,“Performance Evaluation of New Methods of Automatic Redirection for Load Balancing of Apache Servers Distributed in the Internet”, Proceedings. 25th Annual IEEE Conference on Local Computer Networks, Nov. 8-10, 2000, pp. 644-651.
Tang, et al., “An Efficient Data Location Protocol for Self-Organizing Storage Clusters”, Supercomputing, ACM/IEEE Conference, Phoenix, AZ, USA, Nov. 15-21, 2003, 13 pages.
Trustwave, et al., “How Do I Block Large Files by Content Size Before Download?”, Available online at https://www.trustwave.com/support/kb/article.aspx?id=13166, Mar. 23, 2009, pp. 1-2.
Weatherspoon, et al., “Antiquity: Exploiting a Secure Log for Wide-Area Distributed Storage”, Proceedings of the EuroSys Conference, ACM 2007, Lisbon, Portugal, Mar. 21-23, 2007, pp. 371-384.
Wikipedia, et al., “FastTrack”, Available online at http://de.wikipedia.org/w/index.php?title=FastTrack&01did=83614953, Jan. 8, 2011, pp. 1-2.
Wikipedia, et al., “Load Balancing (Computing)”, Available online at http://en.wikipedia.org/w/index.php?title=Load_balancing_%28computing%29&01did=446655159, Aug. 25, 2011, pp. 1-7.
Zhang, et al., “Brushwood: Distributed Trees in Peer-to-Peer Systems”, Peer-to-Peer Systems IV Lecture Notes in Computer Science vol. 3640, 2005, pp. 1-6.
Related Publications (1)
Number Date Country
20230013449 A1 Jan 2023 US
Continuations (4)
Number Date Country
Parent 16410688 May 2019 US
Child 17955165 US
Parent 15084445 Mar 2016 US
Child 16410688 US
Parent 13170672 Jun 2011 US
Child 15084445 US
Parent 13125524 US
Child 13170672 US