Patent application number | Description | Published |
20090222564 | Apparatus and Method for Supporting Connection Establishment in an Offload of Network Protocol Processing - A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, a mechanism for improving connection establishment in a system utilizing an offload network adapter is provided. The connection establishment mechanism provides the ability to offload connection establishment and maintenance of connection state information to the offload network adapter. As a result of this offloading of connection establishment and state information maintenance, the number of communications needed between the host system and the offload network adapter may be reduced. In addition, offloading of these functions to the offload network adapter permits bulk notification of established connections and state information to the host system rather than piecemeal notifications as is present in known computing systems. | 09-03-2009 |
20110161456 | Apparatus and Method for Supporting Memory Management in an Offload of Network Protocol Processing - A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system. | 06-30-2011 |
20110167134 | Apparatus and Method for Supporting Memory Management in an Offload of Network Protocol Processing - A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system. | 07-07-2011 |
20110225594 | Method and Apparatus for Determining Resources Consumed by Tasks - In a computer system comprising a plurality of computing devices wherein the plurality of computing devices processes a plurality of tasks and each task has a task type, a method for determining overheads associated with task types comprises the following steps. Overheads are estimated for a plurality of task types. One of the plurality of computing devices is selected to execute one of the plurality of tasks, wherein the selection comprises estimating load on at least a portion of the plurality of computing devices from tasks assigned to at least a portion of the plurality of computing devices and the estimates of overheads of the plurality of task types. One or more of the estimates of overheads of the plurality of task types are varied. | 09-15-2011 |
20110252127 | METHOD AND SYSTEM FOR LOAD BALANCING WITH AFFINITY - A method and system for distributing requests to multiple back-end servers in client-server environments. A front-end load balancer is used to send requests to multiple back-end servers. In appropriate cases, the load balancer will send requests to the servers based on affinity requirements, while maintaining load balance among servers. | 10-13-2011 |
20130170472 | MOBILITY MANAGEMENT OF OSI CONNECTIONS BETWEEN CELL TOWERS - A processor-implemented method, apparatus, and/or computer program product move Open Systems Interconnection (OSI) layer 4 connections between wirelessly-connected user equipment to a series of cell-towers, wherein an OSI layer 4 connection is extracted out of the underlying cellular protocols at the series of cell-towers. A detection is made that user equipment, which has a broken-out layer 4 connection, has moved from a first cell-tower to a second cell-tower. Traffic for an existing layer 4 connection from the user equipment is tunnelled between the first cell-tower and the second cell-tower. A predetermined trigger event is identified. In response to the predetermined trigger event occurring, an ongoing bidirectional flow of data packets is migrated from the user equipment over to layer 4 connections maintained at the second cell-tower. | 07-04-2013 |
20140040451 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Methods for inserting a middlebox into a network connection include monitoring network state information in a connection between a client and a server. When the connection is idle, a connection entry is created for each device and is initialized using state information gathered by monitoring the network connection. Redirection of the network connection is activated between the client and the server such that the middlebox mediates the connection. Methods for removing a middlebox from a network connection include determining a degree of mismatch between a sequence number in a first connection between the middlebox and a client and a sequence number in a second connection between the middlebox and a server, delaying acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch, and establishing a direct connection between the client and the server without mediation by the middlebox when the degree of mismatch is zero. | 02-06-2014 |
20140040457 | TRANSPARENT MIDDLEBOX WITH GRACEFUL CONNECTION ENTRY AND EXIT - Middlebox systems that can enter a connection include a monitoring module to monitor information in a connection between a client and a server, a processor to determine that the connection is idle, a table configured to create a first entry for the client and a second entry for the server, where the entries are initialized using information gathered by the monitoring module, and a control module to redirect the connection between the client and server to the middlebox. Middlebox systems that can exit a connection include a processor to determine a mismatch between sequence numbers in a first connection to a client device and in a second connection to a server device. A network control module delays acknowledgment signals from the middlebox on a connection to decrease the degree of mismatch and establishes a direct connection between the client device and the server device when mismatch is zero. | 02-06-2014 |
20140059190 | DYNAMIC MIDDLEBOX REDIRECTION BASED ON CLIENT CHARACTERISTICS - Traffic redirection methods include determining a quality-affective factor in a connection between a client and a server in a network; comparing the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; reconfiguring the network to redirect the connection to or away from a middlebox that performs the network processing function in accordance with the determination of whether the connection would benefit from the network processing function. | 02-27-2014 |
20140059191 | DYNAMIC MIDDLEBOX REDIRECTION BASED ON CLIENT CHARACTERISTICS - Dynamic middleboxes include a network monitor module configured to determine a quality-affective factor in a connection between a client and a server in a network; a processor configured to compare the quality-affective factor to a threshold to determine whether the connection would benefit from a network processing function; and a network control module configured to reconfigure the network to redirect the connection to a middlebox that performs the network processing function if the connection would benefit and further configured to reconfigure the network to exclude the middlebox from the connection if the connection would not benefit. | 02-27-2014 |
20140108626 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140108638 | Virtual Consolidated Appliance - Techniques for managing network traffic in a virtual consolidated appliance so as to avoid interruptions in existing network connections during reconfiguration of the virtual consolidated appliance are provided. In one aspect, a method for operating a virtual consolidated appliance having a plurality of servers is provided. The method includes the following steps. An assignment for load balancing is computed based on a status of the virtual consolidated appliance. A reconfiguration of the virtual consolidated appliance is discovered. A new assignment is computed for load balancing based on a new status of the virtual consolidated appliance based on the reconfiguration of the virtual consolidated appliance. Existing network connections are redirected according to the assignment during the reconfiguration of the virtual consolidated appliance. New network connections are served according to the new assignment. | 04-17-2014 |
20140126378 | Wireless Network Optimization Appliance - Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component. | 05-08-2014 |
20140126379 | Wireless Network Optimization Appliance - Methods and apparatus are provided for wireless network optimization. Wireless network traffic is optimized by receiving redirected traffic based on one or more configuration rules; and applying the redirected traffic to a protocol optimizer that optimizes the wireless network traffic based on one or more optimization rules. A management interface is optionally provided to manage the network optimization appliance. A process monitor is optionally provided to monitor one or more process threads to determine if the process threads have stalled. The process monitor can monitor other components and can be monitored by at least one other component. | 05-08-2014 |
20140307579 | SOFTWARE IMPLEMENTATION OF NETWORK SWITCH/ROUTER - A network switching system and method and a computer program product for operating a network switch are disclosed. The network switch includes a multitude of input ports and a multitude of output ports. In one embodiment, one processing device is assigned to each of the input ports and output ports to process data packets received at the input ports and transferred to the output ports. In one embodiment, the method comprises creating an intermediate adjustable configuration of processing devices functionally between the input ports and the output ports, and assigning the processing devices of the intermediate configuration to forward the data packets from the input ports to the output ports to obtain a balance between latency and synchronization of the transfer of the data packets from the input ports to the output ports. In an embodiment, software is used to create and to adjust dynamically the intermediate configuration. | 10-16-2014 |
Patent application number | Description | Published |
20090063638 | Method and Apparatus for Processing Messages in Messaging System - Techniques are disclosed for processing messages in a messaging system, particularly during an overload condition. For example, a method of processing messages of an instant messaging system includes the following steps. A message from a first instant messaging user is received during an overload condition. A message type associated with the received message is determined. The method then decides whether to send the message to a second instant messaging user based on the determined message type of the received message. In another method, processing messages in an instant messaging system includes the following steps. Presence information associated with a first instant messaging system user is received. The presence information is sent to a second instant messaging system user when the second messaging system user requests the presence information associated with the first instant messaging system user. | 03-05-2009 |
20090177779 | Methods and Apparatus for Randomization of Periodic Behavior in Communication Network - A technique for use in a client, wherein the client supports a state-based signaling protocol (e.g., Session Initiation Protocol or SIP), includes initiating a given session state between the client and a server that also supports the state-based signaling protocol, and refreshing the given session state in a randomized manner. Further, a technique for use in a server, wherein the server supports a state-based signaling protocol (again, e.g., SIP), includes randomly assigning an expiration time duration for a given session state between the server and a client that also supports the state-based signaling protocol, and reporting the randomly assigned expiration time for the given session state to the client. By randomizing various behaviors of the client, the server, or both, bursty traffic in the communication network is reduced or eliminated. | 07-09-2009 |
20090271515 | Method and Apparatus for Load Balancing in Network Based Telephony Application - Techniques are disclosed for load balancing in networks such as those networks handling telephony applications. By way of example, such techniques direct requests associated with calls to servers in a system comprised of a network routing calls between a plurality of callers and at least one receiver wherein a load balancer sends requests associated with calls to a plurality of servers as follows. A request associated with a call, a caller, or a receiver is received, depending on the particular load balancing technique. A server is selected to receive the request. A subsequent request is received. A determination is made whether or not the subsequent request is associated with the call, the caller, or the receiver, depending on the particular load balancing technique. The subsequent request is sent to the server based on determining that the subsequent request is associated with the call, the caller, or the receiver, again depending on the particular load balancing technique. | 10-29-2009 |
20090271798 | Method and Apparatus for Load Balancing in Network Based Telephony Application - Techniques are disclosed for load balancing in networks such as those networks handling telephony applications. By way of example, a method for directing requests associated with calls to servers in a system comprised of a network routing calls between a plurality of nodes wherein a node participates in a call as a caller or a receiver and wherein a load balancer sends requests associated with calls to a plurality of servers comprises the following steps. A request associated with a node belonging to a group including a plurality of nodes is received. A server is selected to receive the request. A subsequent request is received. A determination is made whether or not the subsequent request is associated with a node belonging to the group. The subsequent request is sent to the server based on determining that the subsequent request is associated with a node belonging to the group. By way of another example, a method for balancing requests among servers in a client server environment wherein a load balancer sends requests associated with a client to a plurality of servers comprises the following steps. Information is maintained regarding a weighted number of requests assigned to each server. The load balancer receives a request from a client. A server s | 10-29-2009 |
20090287846 | Method and Apparatus for Load Balancing in Network Based Telephony Based On Call Length - Techniques are disclosed for load balancing based on call length in networks such as those networks handling telephony applications. By way of example, one method for directing requests associated with calls to servers in a system comprised of a network routing calls between at least one caller and at least one receiver wherein the network comprises a load balancer sending requests to a plurality of servers comprises the following steps. A first request of a call is received. A server s | 11-19-2009 |
20110119367 | Methods and Apparatus for Randomization of Periodic Behavior in Communication Network - A technique for use in a client, wherein the client supports a state-based signaling protocol (e.g., Session Initiation Protocol or SIP), includes initiating a given session state between the client and a server that also supports the state-based signaling protocol, and refreshing the given session state in a randomized manner. Further, a technique for use in a server, wherein the server supports a state-based signaling protocol (again, e.g., SIP), includes randomly assigning an expiration time duration for a given session state between the server and a client that also supports the state-based signaling protocol, and reporting the randomly assigned expiration time for the given session state to the client. By randomizing various behaviors of the client, the server, or both, bursty traffic in the communication network is reduced or eliminated. | 05-19-2011 |
Patent application number | Description | Published |
20090288306 | DIGITAL RULER WITH LOW-FRICTION SLIDING CONTACT - A low cost digital ruler with desirable ergonomic characteristics and accuracy. A low friction sliding position indicator includes a compliant element that forces its connection pads against the ruler's electronic scale contacts, to determining measurement positions. The position indicator includes an instrument receiving feature that engages a writing instrument and moves in conjunction with it, thereby measuring a line as it is drawn. A position indicator preload arrangement includes the compliant element, which is deflected to exert a preload that forces the sliding position indicator against a housing of the digital ruler. Alignment features of the position indicator and housing have cross sections that provide a self-aligning angled interference fit, which accurately aligns the sliding position indicator, under the action of the preload force. Misalignment constraint surfaces constrain the sliding position indicator in approximate alignment by, even if an external force overcomes the preload force. | 11-26-2009 |
20100145650 | ON-SITE CALIBRATION METHOD AND OBJECT FOR CHROMATIC POINT SENSORS - A chromatic point sensor (CPS) calibration object and characterizing data are provided. The calibration object comprises a flat base plane with steps extending from it. Step measurement points provided by the steps and base plane measurement points provided by portions of the base plane are intermingled along a measurement track. The characterizing data characterizes known heights of the measurement points. A calibration method acquires measurement data such that some base plane measurement points should be at nearly the same measurement distance and therefore have the same common mode errors relative to known base plane measurement point heights. If such base plane measurement points exhibit minimal error variations, then measurements for those and proximate measurement points may provide reliable calibration data. In contrast, error variations outside an expected range indicate unreliable measurements that should be screened or replaced by new calibration measurements. | 06-10-2010 |
20130076892 | METHOD UTILIZING IMAGE CORRELATION TO DETERMINE POSITION MEASUREMENTS IN A MACHINE VISION SYSTEM - A method utilizing image correlation to determine position measurements in a machine vision system. In a first operating state, the machine vision system utilizes traditional scale-based techniques to determine position measurements, while in a second operating state, image correlation displacement sensing techniques are utilized to determine position measurements. The image correlation techniques provide for higher accuracy for measuring distances between features that are separated by more than one field of view. The user may toggle between the operating states through a selection on the user interface, and guidance may be provided regarding when the image correlation mode is likely to provide higher accuracy, depending on factors such as the distance to be measured and the characteristics of the surface being measured. | 03-28-2013 |
20130162972 | CHROMATIC POINT SENSOR CONFIGURATION INCLUDING REAL TIME SPECTRUM COMPENSATION - A chromatic point sensor system configured to compensate for potential errors due to workpiece material effects comprises a first confocal optical path including a longitudinally dispersive element configured to focus different wavelengths at different distances proximate to a workpiece; a second optical path configured to focus different wavelengths at substantially the same distance proximate to the workpiece; a light source connected to the first confocal optical path; a light source connected to the second optical path; a first confocal optical path disabling element; a second optical path disabling element; and a CPS electronics comprising a CPS wavelength detector which provides output spectral profile data. The output spectral profile data from the second optical path is usable to compensate output spectral profile data from the first confocal optical path for a distance-independent profile component that includes errors due to workpiece material effects. | 06-27-2013 |
20140033554 | HANDHELD MEASUREMENT TOOL WITH USER DEFINED DISPLAY - A handheld measurement tool with a display that can be defined by a user. The handheld measurement tool may be a portable measurement gauge (e.g. a digital caliper, digital “dial” gauge, height gauge, micrometer, indicator, etc.) that may be utilized for measuring precise physical dimensions of workpieces. The display may be independently modified according to a customer's individual needs for various precision measurement applications. A remote device (e.g. PC, laptop, tablet, smartphone, etc.) may be utilized for reconfiguring the display, wherein a user can select and modify display format arrangements on the remote device. When the remote device is coupled to the portable measurement gauge, the gauge display is reconfigured so as to have a similar appearance to the defined display format arrangement. In certain embodiments, voice commands may be reconfigured and used for controlling the gauge display. | 02-06-2014 |
20140126804 | EDGE MEASUREMENT VIDEO TOOL AND INTERFACE INCLUDING AUTOMATIC PARAMETER SET ALTERNATIVES - A user interface for setting parameters for an edge location video tool is provided. In one implementation, the user interface includes a multi-dimensional parameter space representation with edge zones that allows a user to adjust a single parameter combination indicator in a zone in order to adjust multiple edge detection parameters for detecting a corresponding edge. The edge zones indicate the edge features that are detectable when the parameter combination indicator is placed within the edge zones. In another implementation, representations of multiple edge features that are detectable by different possible combinations of the edge detection parameters are automatically provided in one or more windows. When a user selects one of the edge feature representation, the corresponding combination of edge detection parameters is set as the parameters for the edge location video tool. | 05-08-2014 |
20140150272 | Electronic Caliper Configured to Generate Power for Measurement Operations - An electronic caliper generates power for measurement operations. The caliper comprises a scale member, a slider, a signal processing portion configured to measure a displacement between the scale member and slider, a power generating arrangement attached to the slider comprising a gear assembly configured to rotate in response to a force provided through a power generating handle to the gear assembly by a user moving the power generating handle relative to the gear assembly, and a power generator coupled to the gear assembly and configured to rotate in response to force provided by the rotating gear assembly and provide power to the signal processing portion. The power generating arrangement generates power as the user moves the power generating handle, and the power generating arrangement contributes a motion resistance force component of at most 20N as the user moves the power generating handle with a maximum manual acceleration. | 06-05-2014 |
20140150274 | Electronic Caliper Configured to Generate Power for Measurement Operations - An electronic caliper generates power for measurement operations. The caliper comprises a scale member, a slider, a signal processing portion configured to measure a displacement between the scale member and slider, a power generating arrangement attached to the slider comprising a gear assembly configured to rotate in response to a force provided through the scale member to the gear assembly by a user opening or closing the caliper, and a power generator coupled to the gear assembly and configured to rotate in response to force provided by the rotating gear assembly and provide power to the signal processing portion. The power generating arrangement generates power as the user opens or closes the caliper and is configured such that it contributes a motion resistance force component of at most 20N during the user opening or closing the caliper using a maximum manual acceleration and/or speed. | 06-05-2014 |
20140150570 | SYSTEM AND METHOD FOR SETTING MEASUREMENT FORCE THRESHOLDS IN A FORCE SENSING CALIPER - An electrically powered caliper is provided which includes a scale member, a slider, a displacement sensor, a force sensing arrangement and a signal processing portion. The signal processing portion is configured to receive a force signal and indicate a respective force corresponding to the respective position of the slider. Force data is acquired comprising a plurality of respective forces corresponding to respective positions of the slider. The signal processing portion defines an acceptable measurement force range defined by at least a minimum force threshold that is determined such that it exceeds a compensation force corresponding to at least one force component included in the force signal that is independent of user variations of the measurement force. It may analyze acquired force data to identify pre-contact data, and set the minimum force threshold for a current measurement procedure based on that pre-contact data. | 06-05-2014 |
20150059431 | Calibration Control Device for Metrology Tools - A calibration control device for being coupled to a measuring device such as a caliper, micrometer, or gauge is provided. The calibration control device includes a circuit portion and couples to a coupling feature on the measuring device. A calibration limit portion defines a parameter limit as related to a usage limit for which the measuring device is certified as calibrated. A controller operates a host-side data connection portion of the calibration control device to output measuring data in a first mode when the usage limit is not exceeded, and operates the calibration control device to perform a calibration limit function when the usage limit is exceeded. The calibration limit function may include stopping the output of the measuring data through the host-side data connection or providing an out-of-calibration warning to the host, or the like. | 03-05-2015 |
Patent application number | Description | Published |
20090240761 | Sending voluminous data over the internet - A system comprises a first set of data transfer tools, operable by and exhibited to a first workstation and a second workstation, the first set of data transfer tools including commands for controlling transfer and communication, a second set of data transfer tools, operable by and exhibited to the first workstation and the second workstation, the second set of data transfer tools implementing and processing transfer and communication of data between workstations involved in a communication, and a remote storage device coupled to a communications network, accessible by the first workstation and the second workstation, for temporarily storing data communicated from one workstation to the second workstation. | 09-24-2009 |
20100274886 | VIRTUALIZED DATA STORAGE IN A VIRTUALIZED SERVER ENVIRONMENT - Methods and systems for virtualizing a storage system within a virtualized server environment are presented herein. A computer network includes a first physical server configured as a first plurality of virtual servers. The computer network also includes a plurality of storage devices. The computer network also includes a first storage module operating on the first physical server. The first storage module is operable to configure the storage devices into a virtual storage device and monitor the storage devices to control storage operations between the virtual servers and the virtual storage device. The computer network also includes a second physical server configured as a second plurality of virtual servers. The second server includes a second storage module that is operable to maintain integrity of the virtual storage device in conjunction with the first storage module of the first physical server. | 10-28-2010 |
20100274969 | ACTIVE-ACTIVE SUPPORT OF VIRTUAL STORAGE MANAGEMENT IN A STORAGE AREA NETWORK ("SAN") - Methods and apparatuses are provided for active-active support of virtual storage management in a storage area network (“SAN”). When a storage manager (that manages virtual storage volumes) of the SAN receives data to be written to a virtual storage volume from a computer server, the storage manager determines whether the writing request may result in updating a mapping of the virtual storage volume to a storage system. When the writing request does not involve updating the mapping, which happens most of the time, the storage manager simply writes the data to the storage system based on the existing mapping. Otherwise, the storage manager sends an updating request to another storage manager for updating a mapping of the virtual storage volume to a storage volume. Subsequently, the storage manager writes the data to the corresponding storage system based on the mapping that has been updated by the another storage manager. | 10-28-2010 |
20110016152 | BLOCK-LEVEL DATA DE-DUPLICATION USING THINLY PROVISIONED DATA STORAGE VOLUMES - Data segments are logically organized in groups in a data repository. Each segment is stored at an index in the data repository. In association with a write request, a hash algorithm is applied to the data segment to generate a group identifier. Each group is identifiable by a corresponding group identifier. The group identifier is applied to a hash tree to determine whether a corresponding group in the data repository exists. Each existing group in the data repository corresponds to a leaf of the hash tree. If no corresponding group exists in the data repository, the data segment is stored in a new group in the data repository. However, if a corresponding group exists, the group is further searched to determine if a data segment matching the data segment to be stored is already stored. The data segment can be stored in accordance with the results of the search. | 01-20-2011 |
20110029728 | METHODS AND APPARATUS FOR REDUCING INPUT/OUTPUT OPERATIONS IN A RAID STORAGE SYSTEM - Methods and systems for managing RAID volumes are disclosed. Metadata is associated with storage devices that comprise a RAID volume. The metadata identifies each of a plurality of portions as being either initialized or non-initialized. The number of I/O operations performed by a storage controller coupled with the storage devices is reduced in response to a request for the RAID volume based on the metadata. | 02-03-2011 |
20110055174 | STORAGE SYSTEM DATA COMPRESSION ENHANCEMENT - Data segments are logically organized in clusters in a data repository of a data storage system. Each clusters contains compressed data segments and data common to the compression of the segments, such as a dictionary. In association with a write request, it is determined in which of the clusters would the data segment most efficiently be compressed, and the data segment is stored in that data cluster. | 03-03-2011 |
20110072224 | SNAPSHOT METADATA MANAGEMENT IN A STORAGE SYSTEM - Methods and systems for improving performance in a storage system utilizing snapshots are disclosed by using metadata management of snapshot data. Specifically, various metadata structures associated with snapshots are utilized to reduce the number of IO operations required to locate data within any specific snapshot. The number of IO operations are reduced by allowing the various metadata structures associated with the temporally current snapshot to locate data directly within any temporally earlier snapshot or on the original root volume. | 03-24-2011 |
20110202721 | REDUNDANT ARRAY OF INDEPENDENT STORAGE - A data storage system includes three or more storage devices, each associated with a unique data volume. A first one of the data storage devices at least has two or more data storage areas but can have more storage areas, which can be either data storage areas or parity storage areas. A second data storage device at least has two storage areas, one of which is a data storage area. A third data storage device at least has a parity storage area but can have more storage areas, which can be either data storage areas or parity storage areas. A first group of corresponding storage areas is defined by at least the data storage areas of the first and second storage devices and the parity storage area of the third storage device. A second group of corresponding storage areas is defined by at least the storage areas of the first and second storage devices. When a data segment is written to one of the data storage areas of a storage device, parity information can be updated using information read from one or more storage areas of the group of corresponding storage areas having the data storage area to which the data segment is written. | 08-18-2011 |
20110282842 | DATA PROTECTION IN A DATA STORAGE SYSTEM - Systems and methods herein provide for protecting data using snapshots and images of those snapshots to quickly recreate data upon request. For example, a storage controller of a data storage system allocates a period of time between creating snapshots of data in a first storage volume of the data storage system. The controller then logs received write requests to the first storage volume and generates snapshot of data in the first storage volume based on the allocated period of time. Thereafter, the controller may receive a request to recreate data. The controller locates the snapshot in the first storage volume based on that request to recreate the data. In doing so, the controller generates a snapshot image in a second storage volume. The controller then retrieves logged write requests and applies them to the snapshot image to recreate the data in the second storage volume. | 11-17-2011 |
20130117448 | Virtual Private Storage Array Service for Cloud Servers - A method for providing virtual private storage array (VPSA) service for cloud users over a computer network includes receiving parameters for the VPSA over the network and creating the VPSA from resources of server computers. Creating the VPSA includes allocating and exposing drives that meets or exceeds specified drive characteristics, drive quantity, and array redundancy criteria to virtual controllers (VCs) in the VPSA, and dedicating parts of processor/memory complexes that each meets or exceeds a specified virtual controller hardware model to the VCs. The VCs run on virtual machines on the dedicated parts of processor/memory complexes on independent server computers. The VCs discover the exposed drives, create a virtual pool from the exposed virtual drives, implement data protection on the virtual pool, create volumes from the virtual pool, expose the volumes over the network to a customer computer, and handle access requests to the volumes from the customer computer. | 05-09-2013 |
20140366121 | Virtual Private Storage Array Service for Cloud Servers - A method for providing virtual private storage array (VPSA) service for cloud users over a computer network includes receiving parameters for the VPSA over the network and creating the VPSA from resources of server computers. Creating the VPSA includes allocating and exposing drives that meets or exceeds specified drive characteristics, drive quantity, and array redundancy criteria to virtual controllers (VCs) in the VPSA, and dedicating parts of processor/memory complexes that each meets or exceeds a specified virtual controller hardware model to the VCs. The VCs run on virtual machines on the dedicated parts of processor/memory complexes on independent server computers. The VCs discover the exposed drives, create a virtual pool from the exposed virtual drives, implement data protection on the virtual pool, create volumes from the virtual pool, expose the volumes over the network to a customer computer, and handle access requests to the volumes from the customer computer. | 12-11-2014 |