Claims
- 1. A system for implementing hierarchical distributed cache coherence in a storage network, the system comprising:
a redundancy group (RG) including a first plurality of storage resources and a second plurality of storage resources located remotely from the first plurality of storage resources; an AMF access group (AAG), including a plurality of AMFs that share read and write access to the RG, wherein the AAG includes two or more local AMF access groups (LAAGs), each LAAG being either remote from other LAAGs or communicably coupled to other LAAGs by a low bandwidth network link; and a proxy node configured to manage communications between the two or more LAAGs so as to minimize or eliminate inter-LAAG meta-data traffic for read and write operations.
- 2. The system of claim 1, wherein the proxy node is implemented in one of the plurality of AMFs or as a separate AMF.
- 3. A method for implementing hierarchical distributed cache coherence in a storage network, the network comprising a redundancy group (RG) including a first plurality of storage resources and a second plurality of storage resources located remotely from the first plurality of storage resources, and an AMF access group (AAG), including a plurality of AMFs that share read and write access to the RG, wherein the AAG includes two or more local AMF access groups (LAAGs), each LAAG being either remote from other LAAGs or communicably coupled to other LAAGs by a low bandwidth network link, the method comprising:
receiving a data access request from a host by a first AMF in a first LAAG; sending meta-data related associated with the access request to a second AMF in the LAAG, wherein the second AMF is configured to act as a proxy agent for the LAAG; and sending, from the second AMF, the meta-data to the proxy agent for each of the other LAAGs.
- 4. The method of claim 3, wherein the data access request is a request to read data from a RG.
- 5. The method of claim 3, wherein the data access request is a request to write data to a RG.
- 6. The method of claim 5, wherein the meta-data includes a write invalidate command.
- 7. A method for implementing preferred target selection for read operations by a given AMF so that the read operations are directed toward data mirrors residing within the nearest LRG.
- 8. A method for implementing preferred AMF selection, and source mirror selection for rebuild and data transfer operations so that read/write traffic is confined as much as possible to the LRG associated with the target storage resource.
- 9. A method for implementing preferred target selection for read operations by a given AMF in fail-over scenarios so that these read operations are directed toward the nearest surviving data mirror.
- 10. A method for implementing preferred target selection for read operations by a given AMF so that these read operations are directed toward data mirrors residing within the nearest LRG.
- 11. A method for implementing adaptive geographically aware RAID.
CROSS-REFERENCES TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Patent Application Serial No. 60/333,996, filed Nov. 28, 2001, “SYSTEMS AND METHODS FOR IMPLEMENTING CONTENT SENSITIVE ROUTING OVER A WIDE AREA NETWORK (WAN)”, which is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60333996 |
Nov 2001 |
US |