The disclosure generally relates to accessing remote storage devices and particularly to accessing remote storage devices over remote access.
Storage systems are growing in complexity for various reasons including having to control an ever growing amount of storage devices, and having to retrieve and store large quantities of data, just to name a few. There are various advantages to providing access to remote storage devices controlled by one or more servers to a plurality of client devices, while reducing Central Processing Unit (CPU) intervention in these processes. Remote direct memory access (RDMA) provides direct memory access from the memory of one computer device into another computer device without requiring operation system intervention. However, this provides various challenges, such as handling a plurality of requests from a plurality of clients to permit high-throughput, low-latency networking.
The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section. Similarly, issues identified with respect to one or more approaches should not assume to have been recognized in any prior art on the basis of this section, unless otherwise indicated.
Exemplary embodiments overcome the above disadvantages and other disadvantages not described above. Also, an exemplary embodiment is not required to overcome the disadvantages described above, and an exemplary embodiment of the present inventive concept may not overcome any of the problems described above.
One or more exemplary embodiments provide a network interface controller (NIC) for use in a server controlling a plurality of storage devices, the NIC including: a control logic configured to connect a server to a network, the control logic further including: a processor; a first memory; and a second memory; where the first memory contains instructions that, when executed by the processor, configure the NIC to: receive an input/output (I/O) request from a client device; store the I/O request in a queue within the second memory; and send the I/O request from the queue to at least one of the plurality of storage devices.
The second memory may include a queue configured to store a plurality of received I/O requests.
The first memory may further contain instructions that when executed by the secondary processing unit configure the NIC to: send again an I/O request stored in the second memory, in response to determining that the I/O request was not executed by the storage device.
The first memory may further contain instructions that when executed by the secondary processing unit configure the NIC to: erase the I/O request from the secondary memory in response to determining that the received response indicates a successful completion of the I/O request.
The secondary processing unit, the first memory and the second memory may be implemented from one of: a field-programmable gate array (FPGA), a complex programmable logic device (CPLD), an application-specific integrated circuit (ASIC), and a system on a chip (SoC).
The first memory and the second memory may be implemented as a single logic circuit.
The received response respective of the I/O request may include an interrupt request.
The indication sent to the client device may include an interrupt request.
The NIC may be further configured to send the indication to the client device before receiving an interrupt message respective of the I/O request from the storage device.
The I/O request may include a block of data and an address respective of the storage device.
The network interface and the communication interface may be implemented as a single interface.
The I/O request may contain an address of a data block respective of the storage device, and the first memory further contains instructions that when executed by the secondary processing unit configure the NIC to: determine if the client device has permission to access the data block of the storage device.
The NIC may provide support for remote direct memory access (RDMA) protocol, and the I/O request is stored in an I/O queue of the second memory using RDMA protocol.
The NIC may provide support for remote direct memory access (RDMA) protocol and the response respective of the I/O request is stored directly in a memory of the client device.
The first memory may further contain instructions that when executed by the secondary processing unit configure the NIC to: send the client device an indication that the received I/O request was not completed, in response to determining that the client device does not have permission to access the data block of the storage device.
The first memory further contains instructions that when executed by the secondary processing unit configure the NIC to: access a table of permissions to determine if the client device has permission to access the data block of the storage device, the table containing a list of data blocks of the storage device, and for each client device accessing the storage device, per instruction type permissions per each data block.
According to an aspect of an exemplary embodiment, there is provided a computerized method for providing a client device remote access to a server controlling a plurality of storage devices, by a network interface controller (NIC) including a secondary processing unit, a first memory and a second memory, the method including: receiving from the client device an input/output (I/O) request for a storage device from among the plurality of storage devices; storing the I/O request in the secondary memory of the NIC; sending the I/O request from the NIC to the storage device; receiving, from the storage device, a response respective of the I/O request intended for a primary processing unit of the server; and sending, from the NIC to the client device, an indication that the I/O request is completed.
The computerized method may further include storing a plurality of received I/O requests, using a queue of the secondary memory.
The computerized method may further include in response to determining that the I/O request was not executed by the storage device, sending an I/O request stored in the second memory again.
The computerized method may further include in response to determining that the received response indicates a successful completion of the I/O request, erasing the I/O request from the secondary memory.
The secondary processing unit, the first memory and the second memory may be implemented from one of: a field-programmable gate array (FPGA), a complex programmable logic device (CPLD), an application-specific integrated circuit (ASIC), and a system on a chip (SoC).
The first memory and the second memory may be implemented as a single logic circuit.
The received response respective of the I/O request includes an interrupt request.
The indication sent to the client device includes an interrupt request.
The computerized method may further include sending the indication to the client device before receiving the response respective of the I/O request from the storage device.
The I/O request may include a block of data and an address respective of the storage device.
The I/O request may contain an address of a data block respective of the storage device, the method further including: determining if the client device has permission to access the data block of the storage device.
The NIC may provide support for remote direct memory access (RDMA) protocol, and the I/O requests are stored in a queue of the second memory using RDMA protocol.
The NIC may provide support for remote direct memory access (RDMA) protocol and the I/O response is stored directly in a memory of the client device.
The computerized method may further include in response to determining that the client device does not have permission to access the data block of the storage device, sending an indication that the received I/O request was not completed to the client device.
The determining if the client device has permission to access the data block of the storage device may further include: accessing a table of permissions containing a list of data blocks of the storage device, and for each client device accessing the storage device, per instruction type permissions per each data block.
The instruction type may be any of: read, write, and discard.
According to an aspect of another exemplary embodiment, there is provided a non-transitory computer readable medium having stored thereon instructions for causing one or more processing units to execute a method for providing a client device remote access to a server controlling a plurality of storage devices, by a network interface controller (NIC) including a secondary processing unit, a first memory and a second memory, the method including: receiving from the client device an input/output (I/O) request for a storage device from among the plurality of storage devices; storing the I/O request in the secondary memory of the NIC; sending the I/O request from the NIC to the storage device; receiving, from the storage device, a response respective of the I/O request intended for a primary processing unit of the server; and sending, from the NIC to the client device, an indication that the I/O request is completed.
Other features and aspects will be apparent from the following detailed description, the drawings, and the claims.
The foregoing and other objects, features and advantages will become apparent and more readily appreciated from the following detailed description taken in conjunction with the accompanying drawings, in which:
Below, exemplary embodiments will be described in detail with reference to accompanying drawings so as to be easily realized by a person having ordinary knowledge in the art. The exemplary embodiments may be embodied in various forms without being limited to the exemplary embodiments set forth herein. Descriptions of well-known parts are omitted for clarity, and like reference numerals refer to like elements throughout.
It is important to note that the exemplary embodiments disclosed herein are only examples of the many advantageous uses of the innovative teachings herein. In general, statements made in the specification of the present application do not necessarily limit any of the various claims. Moreover, some statements may apply to some inventive features but not others. In general, unless otherwise indicated, singular elements may be in plural and vice versa with no loss of generality.
A network interface controller (NIC) for use in a server controlling a plurality of storage devices provides access to a plurality of clients each accessing one or more storage devices of the plurality of storage devices. The NIC is configured to receive from at least a client device an input/output (I/O) request for a storage device of the plurality of storage devices and store the I/O request in a secondary memory thereof. The I/O request is sent to the storage device and a response respective of the I/O request intended for the primary processing unit of the server is received by the NIC. The client device is sent an indication that the I/O request is completed. In some exemplary embodiments, the NIC determines if the client device has appropriate I/O permissions to access a specific data block.
Referring back to
The connectivity between the computer server and the network may implement, in some embodiments, remote direct memory access (RDMA) protocols, such as but not limited to RDMA over Converged Ethernet (RoCE), Infiniband, and iWARP. In another exemplary embodiment, the communication may be over a peer-to-peer (P2P) network.
In an exemplary embodiment, the control logic 110 receives an I/O request which includes an address and a block of data to be written to a remote storage device 240. The control logic 110 stores the I/O request in secondary memory 140, and sends an instruction to the remote storage device 240 to write the block of data to the address. The control logic 110 sends the client device a response that may trigger an interrupt indicating that the I/O request was completed. In response to the block of data not being successfully written to the remote storage device 240, the remote storage device outputs an interrupt indicating that the block of data was not successfully written to the remote storage device 240. The control logic 110 receives this interrupt from the remote storage device 240. In response to receiving this interrupt from the remote storage device 240, the control logic 110 may then resend an instruction to write any portion of the block of data which was not successfully written to the storage device 240, or resend the entire block of data to be written, for example. In response to the block of data being successfully written, the remote storage device 240 outputs a message that may trigger an interrupt indicating an I/O request was completed successfully. The control logic 110, in response to receiving the interrupt indicating the I/O request was successfully completed, may then erase the completed I/O request from secondary memory 140.
In some exemplary embodiments, a control logic, such as control logic 110 receives a plurality of I/O requests and stores them in a memory queue communicatively connected to the control logic. The stored I/O requests may be handled by the control logic according to a timestamp, or an assigned priority, for example.
In certain exemplary embodiments, a control logic, such as control logic 110 receives an I/O request from a client device. The I/O request includes an address of a block of data and may be a ‘read’, ‘write’, ‘discard’ or other storage instruction. The control logic determines if the client device has the appropriate access permission for the block of data and the instruction. If the client device does not have the appropriate permission, the control logic 110 sends an indication to the client device that the I/O request was not completed. A client device may have a ‘read’ permission for a block of data for which it does not have ‘write’ permission, for example. If the control logic determines that the client device has the appropriate ‘read’ or ‘write’ permission, execution continues as detailed further herein. Determination of permissions may be performed, for example, by accessing a table containing a list of data blocks and client devices having access permissions for each data block in the list. A table, list, database, bitmap, and like data structures may be used to determine I/O permissions. The data structure may be stored on the control logic 110, on the NIC 100A (or 100B), or separately of both but accessible to the control logic 110.
The principles herein are implemented as hardware, firmware, software or any combination thereof. Moreover, the software is preferably implemented as an application program tangibly embodied on a program storage unit or computer readable medium. The application program may be uploaded to, and executed by, a machine comprising any suitable architecture. Preferably, the machine is implemented on a computer platform having hardware such as a processing unit (“CPU”), a memory, and input/output interfaces. The computer platform may also include an operating system and microinstruction code. The various processes and functions described herein may be either part of the microinstruction code or part of the application program, or any combination thereof, which may be executed by a CPU, whether or not such computer or processor is explicitly shown. In addition, various other peripheral units may be connected to the computer platform such as an additional data storage unit and a printing unit and/or display unit.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the principles of the disclosure and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and exemplary embodiments, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure.
This Application is a continuation of U.S. patent application Ser. No. 14/726,919, filed Jun. 6, 2015, now allowed, which claims the benefit of U.S. Provisional Application Nos. 62/126,920 filed on Mar. 2, 2015, 62/119,412 filed on Feb. 23, 2015, 62/096,908 filed on Dec. 26, 2014, 62/085,568 filed on Nov. 30, 2014, and 62/030,700 filed on Jul. 30, 2014, the entire disclosures of which are incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5717691 | Dighe et al. | Feb 1998 | A |
5745671 | Hodges | Apr 1998 | A |
5889934 | Peterson | Mar 1999 | A |
6108812 | Born | Aug 2000 | A |
6839803 | Loh et al. | Jan 2005 | B1 |
7515612 | Thompson | Apr 2009 | B1 |
7539780 | Makhervaks et al. | May 2009 | B2 |
7577667 | Hinshaw et al. | Aug 2009 | B2 |
7590768 | Gormley | Sep 2009 | B2 |
7710968 | Cornett et al. | May 2010 | B2 |
8037154 | Biran et al. | Oct 2011 | B2 |
8103785 | Crowley et al. | Jan 2012 | B2 |
8122155 | Marti | Feb 2012 | B1 |
8233380 | Subramanian et al. | Jul 2012 | B2 |
8265095 | Fritz et al. | Sep 2012 | B2 |
8307271 | Liu et al. | Nov 2012 | B1 |
8407448 | Hayden et al. | Mar 2013 | B1 |
8433848 | Naamad et al. | Apr 2013 | B1 |
8706962 | Belluomini et al. | Apr 2014 | B2 |
8775718 | Kanevsky et al. | Jul 2014 | B2 |
8832216 | Bugge | Sep 2014 | B2 |
8910031 | Liu et al. | Dec 2014 | B1 |
9241044 | Shribman et al. | Jan 2016 | B2 |
9462308 | LaBosco et al. | Oct 2016 | B2 |
9639457 | Piszczek et al. | May 2017 | B1 |
20050129039 | Biran et al. | Jun 2005 | A1 |
20060059408 | Chikusa et al. | Mar 2006 | A1 |
20060235999 | Shah | Oct 2006 | A1 |
20080109616 | Taylor | May 2008 | A1 |
20080126509 | Subramanian et al. | May 2008 | A1 |
20090300023 | Vaghani | Dec 2009 | A1 |
20110131377 | Gray et al. | Jun 2011 | A1 |
20120079143 | Krishnamurthi et al. | Mar 2012 | A1 |
20120144233 | Griffith | Jun 2012 | A1 |
20120300633 | Friedman et al. | Nov 2012 | A1 |
20130054726 | Bugge | Feb 2013 | A1 |
20130198311 | Tamir et al. | Aug 2013 | A1 |
20130198312 | Tamir et al. | Aug 2013 | A1 |
20130262614 | Makhervaks et al. | Oct 2013 | A1 |
20140089444 | Makhervaks et al. | Mar 2014 | A1 |
20140211808 | Koren et al. | Jul 2014 | A1 |
20140297982 | Duzett | Oct 2014 | A1 |
20140317336 | Fitch et al. | Oct 2014 | A1 |
20150026286 | Sharp et al. | Jan 2015 | A1 |
20150089121 | Coudhury et al. | Mar 2015 | A1 |
20150319237 | Hussain et al. | Nov 2015 | A1 |
20160266965 | B et al. | Sep 2016 | A1 |
20160371226 | Shalf et al. | Dec 2016 | A1 |
20170187496 | Shalev et al. | Jun 2017 | A1 |
20170289036 | Vasudevan | Oct 2017 | A1 |
20180293188 | Katayama | Oct 2018 | A1 |
Number | Date | Country | |
---|---|---|---|
20180260139 A1 | Sep 2018 | US |
Number | Date | Country | |
---|---|---|---|
62126920 | Mar 2015 | US | |
62119412 | Feb 2015 | US | |
62096908 | Dec 2014 | US | |
62085568 | Nov 2014 | US | |
62030700 | Jul 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14726919 | Jun 2015 | US |
Child | 15975379 | US |