Abstract:
PROBLEM TO BE SOLVED: To allow a plurality of virtual filers to participate in a plurality of address spaces having overlapping network addresses. SOLUTION: A technique enables a server, such as a filer, configured with a plurality of virtual servers, such as virtual filers (vfilers), to participate in a plurality of private network address spaces having potentially overlapping network addresses. The technique also enables selection of an appropriate vfiler to service requests within a private address space in a manner that is secure and distinct from other private address spaces supported by the filer. An IPspace refers to each distinct address space in which the filer and its storage operating system participate. An IPspace identifier is applied to translation procedures that enable the selection of a correct vfiler for processing an incoming request and an appropriate routing table for processing an outgoing request. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To reduce parity calculation and disk I/O overhead in a RAID system. SOLUTION: A method is provided for controlling storage of data in a plurality of storage devices each including a plurality of storage blocks, for example, in a RAID array. The method includes receiving a plurality of write requests associated with data, and buffering the write requests. A file system defines a group of storage blocks, responsive to disk topology information. The group includes a plurality of storage blocks in each of the plurality of storage devices. Each data block of the data to be written is associated with a respective one of the storage blocks, for transmitting the association to the plurality of storage devices. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To generate and maintain a plurality of virtual servers in a server. SOLUTION: Architecture provides capability for generating and maintaining a plurality of instances of virtual servers such as virtual filers (vfilers) in one server such as a filer. Each vfiler is a logical division of network resources and storage resources of a filer platform to establish the instances of a multi-protocol server. In each vfiler, an individual security domain is further assigned to each access protocol so as to guarantee access control to an assigned resource and a shared resource. A vfiler boundary check is performed by a file system, and in regard to a file stored in a requested filer platform, it is decided whether a current vfiler can access a particular storage resource. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To improve the performance characteristics of a medium in a hybrid medium storage architecture.SOLUTION: A hybrid medium storage architecture includes a log structure file system composed as a hybrid storage medium, and constituted to control a plurality of different storage media for providing the overall storage space of a storage system cooperatively with each other. The log structure file system executes the initial arrangement and migration of data, and executes writing allocation with the fine particle size of data among a plurality of storage space places of the hybrid storage medium to improve the performance characteristics of the medium.
Abstract:
PROBLEM TO BE SOLVED: To enable specialized computing devices to perform virus scanning. SOLUTION: A method includes the steps of: receiving, at a storage server (filer) 130, requests for a plurality of files maintained by the storage server 130, from a client device 110; in response to the requests for the plurality of files, causing, by the storage server 130, each of a plurality of cluster devices 141 to execute virus scanning on the plurality of files; at the storage server 130, receiving results of the virus scanning; and responding to the requests according to the results of the virus scanning. The method further includes storing the results of the virus scanning into a database, and responding to following requests for one of the plurality of files based on the results of the virus scanning stored in the database. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
A method for selectively providing, to a subset of authorized user accounts, wake-on-demand access to session servers during a period of scheduled unavailability includes receiving, by a service broker machine, from a client machine, at least one credential. The service broker machine requests, from a database, connection information associated with the at least one credential. The service broker machine receives, from the database, connection information. The service broker machine determines that the at least one virtual resource is unavailable. The service broker machine determines whether the received credential indicates that a user of the client machine is authorized to request reactivation of the unavailable at least one virtual resource. The service broker machine directs, reactivation of the unavailable at least one virtual resource. The service broker machine provides, to the client machine, the connection information.
Abstract:
A processing system includes a plurality of virtual machines which have shared access to a non-volatile solid-state memory (NVSSM) subsystem, by using remote direct memory access (RDMA). The NVSSM subsystem can include flash memory and other types of non-volatile solid-state memory. The processing system uses scatter-gather lists to specify the RDMA read and write operations. Multiple reads or writes can be combined into a single RDMA read or write, respectively, which can then be decomposed and executed as multiple reads or writes, respectively, in the NVSSM subsystem. Memory accesses generated by a single RDMA read or write may be directed to different memory devices in the NVSSM subsystem, which may include different forms of non-volatile solid-state memory.
Abstract:
An architecture provides the ability to create and maintain multiple instances of virtual servers, such as virtual filers (vfilers), within a server, such as a storage appliance. A vfiler is a logical partitioning of network and storage resources of the storage appliance platform to establish an instance of a multi-protocol server. Each vfiler is allocated a subset of dedicated units of storage resources, such as volumes or logical sub-volumes (qtrees), and one or more network address resources. Each vfiler is also allowed shared access to a file system resource of a storage operating system. To ensure controlled access to the allocated and shared resources, each vfiler is further assigned its own security domain for each access protocol. A vfiler boundary check is performed by the file system to verify that a current vfiler is allowed to access certain storage resources for a requested file stored on the filer platform.
Abstract:
A processing system includes a plurality of virtual machines which have shared access to a non-volatile solid-state memory (NVSSM) subsystem, by using remote direct memory access (RDMA). The NVSSM subsystem can include flash memory and other types of non-volatile solid-state memory. The processing system uses scatter-gather lists to specify the RDMA read and write operations. Multiple reads or writes can be combined into a single RDMA read or write, respectively, which can then be decomposed and executed as multiple reads or writes, respectively, in the NVSSM subsystem. Memory accesses generated by a single RDMA read or write may be directed to different memory devices in the NVSSM subsystem, which may include different forms of non-volatile solid-state memory.