METHODS FOR DYNAMIC THROTTLING TO SATISFY MINIMUM THROUGHPUT SERVICE LEVEL OBJECTIVES AND DEVICES THEREOF

    公开(公告)号:WO2021016185A1

    公开(公告)日:2021-01-28

    申请号:PCT/US2020/042779

    申请日:2020-07-20

    Applicant: NETAPP, INC.

    Abstract: Methods, non-transitory machine readable media, and computing devices that dynamically throttle non-priority workloads to satisfy minimum throughput service level objectives (SLOs) are disclosed. With this technology, a determination is made when a number of detection intervals with a violation within a detection window exceeds a threshold, when a current one of the detection intervals is outside an observation area. The detection intervals are identified a violated based on an average throughput for priority workloads within the detection intervals exceeding a minimum throughput SLO. A throttle is then set to rate-limit non-priority workloads, when the number of violated detection intervals within the detection window exceeds the threshold. Advantageously, throughput for priority workloads is more effectively managed and utilized with this technology such that throttling oscillations are reduced, throttling is not deployed in conditions in which it would not improve throughput, and throttling is minimally deployed to maximize throughput.

    ERASURE CODING CONTENT DRIVEN DISTRIBUTION OF DATA BLOCKS

    公开(公告)号:WO2020081491A1

    公开(公告)日:2020-04-23

    申请号:PCT/US2019/056200

    申请日:2019-10-15

    Applicant: NETAPP, INC.

    Abstract: A technique is configured to provide data protection, such as replication and erasure coding, of content driven distribution of data blocks served by storage nodes of a cluster. When providing data protection in the form of replication (redundancy), a slice service of the storage node generates one or more copies or replicas of a data block for storage on the cluster. Each replicated data block is illustratively organized within a bin that is maintained by block services of the nodes for storage on storage devices. When providing data protection in the form of erasure coding, the block services may select data blocks to be erasure coded. A set of data blocks for erasure coding may then be grouped together to form a write group. According to the technique, EC group membership is guided by varying bin groups so the data is resilient against failure. Slice services of the storage nodes assign data blocks of different bins and replicas to a write group.

    ASSIGNMENT OF NETWORK CONFIGURATION FOR A WIRED NETWORK USING A WIRELESS NETWORK

    公开(公告)号:WO2020028767A1

    公开(公告)日:2020-02-06

    申请号:PCT/US2019/044830

    申请日:2019-08-02

    Applicant: NETAPP, INC.

    Abstract: A technique is configured to utilize frames generated by a first layer of a protocol stack for a first network to configure network parameters associated with a second layer of the protocol stack for a second network. The frames are illustratively beacon frames generated by a data link layer of a Transmission Control Protocol/Internet Protocol (TCP/IP) stack for a wireless network, and the network parameters are illustratively IP addresses associated with a network layer of the TCP/IP stack for a wired network. Notably, the beacon frames of the wireless network may be utilized for two-way communication exchange on a per node basis for each node in the wired network.

    MULTI-MODAL ELECTRONIC DOCUMENT CLASSIFICATION

    公开(公告)号:WO2020018370A9

    公开(公告)日:2020-01-23

    申请号:PCT/US2019/041590

    申请日:2019-07-12

    Applicant: NETAPP, INC.

    Abstract: A method comprising operating at least one hardware processor for: receiving, as input, a plurality of electronic documents, training a machine learning classifier based, at least on part, on a training set comprising: (i) labels associated with the electronic documents, (ii) raw text from each of said plurality of electronic documents, and (iii) a rasterized version of each of said plurality of electronic documents, and applying said machine learning classifier to classify one or more new electronic documents.

    COMPOSITE AGGREGATE ARCHITECTURE
    37.
    发明申请

    公开(公告)号:WO2018175144A1

    公开(公告)日:2018-09-27

    申请号:PCT/US2018/022140

    申请日:2018-03-13

    Applicant: NETAPP, INC.

    Abstract: Techniques are provided for providing a storage abstraction layer for a composite aggregate architecture. A storage abstraction layer is utilized as an indirection layer between a file system and a storage environment. The storage abstraction layer obtains characteristic of a plurality of storage providers that provide access to heterogeneous types of storage of the storage environment (e.g., solid state storage, high availability storage, object storage, hard disk drive storage, etc.). The storage abstraction layer generates storage bins to manage storage of each storage provider. The storage abstraction layer generates a storage aggregate from the heterogeneous types of storage as a single storage container. The storage aggregate is exposed to the file system as the single storage container that abstracts away from the file system the management and physical storage details of data of the storage aggregate.

    METHODS FOR PERFORMING DATA DEDUPLICATION ON DATA BLOCKS AT GRANULARITY LEVEL AND DEVICES THEREOF

    公开(公告)号:WO2018156503A1

    公开(公告)日:2018-08-30

    申请号:PCT/US2018/018783

    申请日:2018-02-20

    Applicant: NETAPP INC.

    Inventor: KATIYAR, Manish

    CPC classification number: G06F3/0641 G06F3/0608 G06F3/067 G06F3/0673

    Abstract: A method, non-transitory computer readable medium, and device that assists with performing data deduplication on data blocks includes receiving a plurality of data blocks, wherein each of the received plurality of data blocks are of an equal memory size. Each of the received plurality of data blocks are split into a plurality of segments with a segment size less than the equal memory size. Duplicate data is identified within each of the plurality of segments for each of the received plurality of data blocks. One occurrence of the identified duplicate data is stored from each of the received plurality of data blocks into a new data block.

    CROSS-PLATFORM REPLICATION
    39.
    发明申请
    CROSS-PLATFORM REPLICATION 审中-公开
    交叉平台复制

    公开(公告)号:WO2017190130A1

    公开(公告)日:2017-11-02

    申请号:PCT/US2017/030381

    申请日:2017-05-01

    Applicant: NETAPP, INC.

    Abstract: One or more techniques and/or computing devices are provided for cross- platform replication. For example, a replication relationship may be established between a first storage endpoint and a second storage endpoint, where at least one of the storage endpoints, such as the first storage endpoint, lacks or has incompatible functionality to perform and manage replication because the storage endpoints have different storage platforms that store data differently, use different control operations and interfaces, etc. Accordingly, replication destination workflow, replication source workflow, and/or a proxy representing the first storage endpoint may be implemented at the second storage endpoint comprising the replication functionality. In this way, replication, such as snapshot replication, may be implemented between the storage endpoints by the second storage endpoint using the replication destination workflow, the replication source workflow, and/or the proxy that either locally executes tasks or routes tasks to the first storage endpoint such as for data access.

    Abstract translation: 为跨平台复制提供一个或多个技术和/或计算设备。 例如,可以在第一存储端点和第二存储端点之间建立复制关系,其中至少一个存储端点(例如第一存储端点)缺乏或具有不兼容的功能来执行和管理复制,因为存储端点 具有不同的存储数据的不同存储平台,使用不同的控制操作和接口等。因此,表示第一存储端点的复制目标工作流程,复制源工作流程和/或代理可以在包括复制功能的第二存储端点处实现 。 这样,第二存储端点可以使用复制目的地工作流,复制源工作流和/或代理在存储端点之间实现诸如快照复制之类的复制,所述复制目的地工作流,本地执行任务或将任务路由到第一 存储端点,如数据访问。

    SECURE DATA REPLICATION
    40.
    发明申请
    SECURE DATA REPLICATION 审中-公开
    安全数据复制

    公开(公告)号:WO2017190129A1

    公开(公告)日:2017-11-02

    申请号:PCT/US2017/030372

    申请日:2017-05-01

    Applicant: NETAPP, INC.

    Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller (116) may host first storage (128) within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller (116) may establish an access policy with a second storage controller (118) to which data is to be replicated from the first storage (128). The access policy may define an authentication mechanism for the first storage controller (116) to authenticate the second storage controller (118), an authorization mechanism specifying a type of access that the second storage controller (118) has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.

    Abstract translation: 为安全数据复制提供一个或多个技术和/或计算设备。 例如,第一存储控制器(116)可以托管存储资源(例如,文件,逻辑单元号(LUN),卷等)的第一存储装置(128)。 第一存储控制器(116)可以与第二存储控制器(118)建立访问策略,数据将被从第一存储器(128)复制到第二存储控制器(118)。 访问策略可以定义用于第一存储控制器(116)认证第二存储控制器(118)的认证机制,指定第二存储控制器(118)对存储资源具有的访问类型的授权机制,以及 访问控制机制,指定第二存储控制器对存储资源的数据访问的控制方式。 通过这种方式,可以对数据复制请求进行认证和授权,以便根据访问控制机制以安全的方式提供数据。

Patent Agency Ranking