Patent application number | Description | Published |
20080250197 | Physical Tape Interchange Format - A virtual tape server for executing a method involving a partitioning of a virtual tape volume into a plurality of virtual tape blocks. The virtual tape volume includes a virtual tape volume header having recovery information, each virtual tape block includes a virtual tape block header identifying the virtual tape volume and a block sequence number, and one or more of the virtual tape blocks includes the virtual tape volume header. The method further involves a formatting of a physical tape volume including each virtual tape block. | 10-09-2008 |
20080250214 | Method and System for Insuring Data Integrity in Anticipation of a Disaster - A preparation of a storage system of a pending disaster at an onsite location of the storage system involves the storage system receiving a disaster preparation initiation from an offsite client. In response to receiving the disaster preparation initiation from the offsite client, the storage system to executes disaster preparation of onsite data including managing a temporary storage of onsite data volumes to at least one peer site, managing a storage of onsite cached data to a first onsite removable media, and/or managing a storage of onsite management information to a second onsite removable media. | 10-09-2008 |
20080313403 | APPARATUS, SYSTEM, AND METHOD FOR SELECTING AN INPUT/OUTPUT TAPE VOLUME CACHE - An apparatus, system, and method are disclosed for selecting an input/output tape volume cache (TVC). A history module maintains access history instances for a plurality of clusters. A request module receives an access request for a logical volume. An adjustment module weights the access history instances in favor of recent access history instances. A calculation module calculates an affinity of the logical volume for each cluster of the plurality of clusters. The calculation module may calculate the affinity of the logical volume for each cluster of the plurality of clusters using read/write/scratch granularity and an algorithm. Further, the calculation module may filter out clusters. A selection module selects a cluster TVC with a highest affinity as the TVC for the logical volume. | 12-18-2008 |
20090006734 | APPARATUS, SYSTEM, AND METHOD FOR SELECTING A CLUSTER - An apparatus, system, and method are disclosed for selecting a source cluster in a distributed storage configuration. A measurement module measures system factors for a plurality of clusters over a plurality of instances. The clusters are in communication over a network and each cluster comprises at least one tape volume cache. A smoothing module applies a smoothing function to the system factors, wherein recent instances have higher weights. A lifespan module calculates a mount-to-dismount lifespan for each cluster from the smoothed system factors. A selection module selects a source cluster for accessing an instance of a specified volume in response to the mount-to-dismount lifespans and a user policy. | 01-01-2009 |
20090055616 | MAINTAINING RESERVED FREE SPACE FOR SEGMENTED LOGICAL VOLUMES - A storage manager application implemented in a first computational device maintains a virtual logical volume having a plurality of segments created by the storage manager application, wherein space is reserved at the end of a physical volume corresponding to the virtual logical volume, and wherein the physical volume comprises a linear storage medium. A request is received to write data, at the first computational device, from a second computational device. The data is written to the reserved space, wherein the writing of the data causes new segments to be created in the reserved space. | 02-26-2009 |
20090063411 | PROPAGATION OF UPDATES FOR ATTRIBUTES OF A STORAGE OBJECT FROM AN OWNER NODE OF THE STORAGE OBJECT TO OTHER NODES - Local versions of attributes of a storage object are maintained at a plurality of nodes, wherein a first attribute designates a first node of the plurality of nodes as an owner node for the storage object, and wherein a second attribute includes information to resolve validity of ownership of the storage object among the plurality of nodes. The owner node communicates changes to be made to the local versions of the attributes at other nodes of the plurality of nodes. A second node of the plurality of nodes requests ownership of the storage object. The first attribute is updated to designate the second node of the plurality of nodes as the owner node, in response to determining from the second attribute that the validity of ownership of the storage object allows the second node to inherit ownership of the storage object once the first node surrenders ownership of the storage object. | 03-05-2009 |
20090063487 | SECURING TRANSFER OF OWNERSHIP OF A STORAGE OBJECT FROM AN UNAVAILABLE OWNER NODE TO ANOTHER NODE - Provided are a method, system, and article of manufacture that maintain a plurality of nodes coupled over a network, wherein a first node of the plurality of nodes initially owns a plurality of storage objects accessible via the network. A serialization lock is maintained in association with the plurality of storage objects, wherein the first node becomes unavailable. A second node of the plurality of nodes determines that the second node is to preemptively assume ownership of a selected storage object of the plurality of storage objects initially owned by the first node that has become unavailable. The second node acquires the serialization lock. The second node secures ownership of the selected storage object, subsequent to acquiring the serialization lock. | 03-05-2009 |
20090063668 | TRANSFER OF OWNERSHIP OF A STORAGE OBJECT IN RESPONSE TO AN ORIGINAL OWNER NODE BECOMING AVAILABLE AFTER A PERIOD OF UNAVAILABILITY - Provided are a method, system, and article of manufacture, wherein a plurality of nodes coupled over a network are maintained, wherein a first node of the plurality of nodes initially owns a plurality of storage objects accessible via the network. A second node preemptively takes ownership of a selected storage object of the plurality of storage objects, in response to the first node becoming unavailable, wherein other nodes of the plurality of nodes can request ownership of the selected storage object while the first node is unavailable. A determination is made that the first node that originally owned the selected storage object has become available after a period of unavailability. A determination is made of the current owner node of the selected storage object, wherein the current owner node is one of the second node and the other nodes. The selected storage object is updated at the first node by the current owner node of the selected storage object, prior to allowing the first node to act on or assume ownership of the selected storage object. | 03-05-2009 |
20090193140 | SYSTEM AND METHOD FOR THROTTLING HOST THROUGHPUT - A method for throttling host throughput in a computer storage subsystem is provided. The host throughput is compared to a throughput limit for a predetermined time period. If the host throughput exceeds the throughput limit during the predetermined time period, an input/output (I/O) delay is set equal to the remainder of the predetermined time period, and the delay is implemented for an associated storage device of the computer storage subsystem. | 07-30-2009 |
20090327469 | Method for Controlling Host Throughput to a Computer Storage Subsystem - A method for controlling the throughput in a communications channel between a host and its storage subsystem is disclosed. A determination is made whether or not a total throughput value is greater than a predetermined maximum throughput value. If the total throughput value is greater than the predetermined maximum throughput value, a delay is applied to the communications channel. If the total throughput value is not greater than the predetermined maximum throughput value, another determination is made whether or not one time period has completed. If one time period has completed, a total throughput value and an exponential moving average (EMA) throughput value of the communications channel is retrieved, a new EMA throughput value is generated based on the total throughput value and the EMA throughput value, and adjusting the total throughput value based on whether or not the new throughput value is greater than a predetermined maximum throughput value. | 12-31-2009 |
20100174762 | Apparatus, System, and Method for Maintaining A Context Stack - An apparatus, system, and method are disclosed for maintaining a context stack. A monitor module monitors a stack size after each monitor interval for a stack of a plurality of contexts. Each context defines communications between a process and a data set and comprises a pathway for communicating with the data set and a process identifier. A stack module deallocates a context that satisfies a stack policy from the stack if the stack size is within a buffer threshold of a maximum threshold. | 07-08-2010 |
20110107024 | EXTENDED LOGICAL WORM DATA INTEGRITY PROTECTION - A data storage system stores logical data object(s), each identified by a logical identifier. A control is configured to assign a unique WORM (Write Once Read Many) identifier to the logical data object, and stores the unique WORM identifier as associated with the logical identifier, in a database maintained by the control so as to be persistent. Data storage is configured to write the logical data object with a header with the unique WORM identifier. The control, in order to allow the logical data object to be accessed externally to the control, requires matching the unique WORM identifier in the header of a logical data object to the unique WORM identifier of the persistent database for the logical object. The unique WORM identifier is formed of a checksum hash value related to nonce fields comprising at least the logical identifier of the logical data object, an incrementing token, and a time stamp. | 05-05-2011 |
20110107045 | HYBRID STORAGE DATA MIGRATION BY SELECTIVE DATA REMOVAL - A hybrid data storage system is one which has data storage clusters of different types. In a hybrid data storage system, at least one first data storage cluster is configured to store data and has high data storage capacity; and at least one second data storage cluster is configured to store data and has lower data storage capacity than the first cluster. The data is initially replicated and stored by at least one first and at least one second data storage cluster. The method identifies a portion of the stored initially replicated data of at least one second data storage cluster as “pinned”; continues to store the pinned initially replicated data; and selectively removes non-pinned initially replicated data from the second data storage cluster(s) to account for the capacity difference. | 05-05-2011 |
20110107140 | SELECTIVE WRITE PROTECT FOR DISASTER RECOVERY TESTING - Various method, system, and computer program product embodiments for implementing selective write-protect by a processor in a data storage system within a plurality of redundant storage systems for disaster recovery testing are provided. In one such embodiment, a write-protect state is initiated within at least one of the plurality of redundant storage systems. An available plurality of categories, including at least one write-protect exclusion category, is configured within a management interface of the data storage system, such that during the disaster recovery testing a storage volume categorized in the write-protect exclusion category is excluded from write protection. | 05-05-2011 |
20110119441 | SELECTIVE DEVICE ACCESS CONTROL - Various method, system, and computer program product embodiments for selective device access control in a data storage system are provided. In one such embodiment, a plurality of access groups associated with logical devices used to access the data storage system is initialized. Each of the plurality of access groups corresponds to a range of the logical devices. An access group name of one of the access groups is bound to a logical volume of the data storage system at a volume creation. The logical volume, once bound to the access group name, is granted access by those of the logical devices in a range of the logical devices corresponding to the one of the access groups. | 05-19-2011 |
20110145497 | Cluster Families for Cluster Selection and Cooperative Replication - An apparatus, system, and method are disclosed to create cluster families for cluster selection and cooperative replication. The clusters are grouped into family members of a cluster family base on their relationships and roles. Members of the cluster family determine which family member is in the best position to obtain replicated information and become cumulatively consistent within their cluster family. Once the cluster family becomes cumulatively consistent, the data is shared within the cluster family so that all copies within the cluster family are consistent. | 06-16-2011 |
20110145517 | DYNAMIC REUSE AND RECONFIGURATION OF LOGICAL DATA OBJECTS IN A VIRTUAL TAPE SYSTEM - An embodiment of the invention comprises a virtual tape system supporting at least one Write Once Read Many (WORM) logical tape and at least one read-write logical tape, comprising a processor configured to a first task and/or a second task. The first task initializes a new logical data object from a single pool of at least two logical data objects, with the new logical data object bound with a member of a media type group consisting of a WORM data object or a read-write data object. The second task reuses one of the logical data objects without manual ejection and reinsertion. The reuse may include the processor configured to cycle the logical data object through a scratch pool as a selected scratch logical data object and mount the selected scratch logical data object with a write from beginning of tape command to bind at least one data attribute to the WORM data object. | 06-16-2011 |
20120159063 | SELECTING AN INPUT/OUTPUT TAPE VOLUME CACHE - For selecting an input/output tape volume cache (TVC), a history module maintains access history instances for a plurality of clusters, each cluster comprising a TVC. A request module receives an access request for a logical volume wherein an instance of the logical volume is stored on each of the plurality of clusters and each instance of the logical volume is synchronized with each other instance of the logical volume. An adjustment module weights the access history instances in favor of recent access history instances. A calculation module calculates an affinity of the logical volume instance stored on each cluster of the plurality of clusters. A selection module selects a cluster TVC with a highest logical volume affinity as the TVC for the logical volume. | 06-21-2012 |
20120239891 | DYNAMIC REUSE AND RECONFIGURATION OF LOGICAL DATA OBJECTS IN A VIRTUAL TAPE SYSTEM - A method in one embodiment for operating a virtual server supporting at least one Write Once Read Many (WORM) logical data object and at least one read-write logical object includes initializing a logical data object from a common pool of the logical data objects, the logical data object bound with a member of a media type group, the member of the media type group comprising a WORM logical data object and a read-write logical data object; and reusing one of the logical data objects as the member of the media type group without ejection and reinsertion by mounting the logical data object with a write from beginning of logical data object to bind at least one data attribute to the member of the media type group to replace any previous attribute and data associated with the logical data object. | 09-20-2012 |
20120284467 | EXTENDED LOGICAL WORM DATA INTEGRITY PROTECTION WITH UNIQUE WORM IDENTIFIER IN HEADER AND DATABASE - A data storage system stores logical data object(s), each identified by a logical identifier. A control is configured to assign a unique WORM (Write Once Read Many) identifier to the logical data object, and stores the unique WORM identifier as associated with the logical identifier, in a database maintained by the control so as to be persistent. Data storage is configured to write the logical data object with a header with the unique WORM identifier. The control, in order to allow the logical data object to be accessed externally to the control, requires matching the unique WORM identifier in the header of a logical data object to the unique WORM identifier of the persistent database for the logical object. The unique WORM identifier is formed of a checksum hash value related to nonce fields comprising at least the logical identifier of the logical data object, and an incrementing token. | 11-08-2012 |
20120290805 | CLUSTER FAMILIES FOR CLUSTER SELECTION AND COOPERATIVE REPLICATION - An apparatus, system, and method are disclosed for cooperative replication of multiple clusters. A copy request to copy a volume into a first cluster is received. A determination is made whether the first cluster is a family member of a cluster family. If the first cluster is a family member of the cluster family, a determination is made whether another family member already completed copying the volume. If another family member has not already copied the volume, the first cluster is designated to inherit the copy request. The copy request is executed and the volume is cooperative replicated into the cluster family. Cumulative consistency is achieved within the cluster family. The volume is shared within the cluster family so that all copies of the volume within the cluster family are consistent. | 11-15-2012 |
20130007361 | SELECTIVE DEVICE ACCESS CONTROL - Methods, systems, and computer program products for selective device access control in a data storage system are provided. A method includes initializing a plurality of access groups associated with logical devices used to access the data storage system, each of the plurality of access groups corresponding to a range of the logical devices, pursuant to a mount of a logical volume of the data storage system, and binding an access group name of one the plurality of access groups to at least one of a metadata of the logical volume at a volume creation and a volume header of the logical volume, wherein the logical volume, once bound to the access group name, is granted access by those of the logical devices in a range of the logical devices corresponding to the one of the plurality of access groups. | 01-03-2013 |
20140032957 | SYNCHRONOUS MODE REPLICATION TO MULTIPLE CLUSTERS - Provided are a computer program product, system, and method for synchronous mode replication to multiple clusters receiving a write to a volume from a host. A received write is cached in a memory. A determination is made of a replication rule indicating one of a plurality of replication modes for a first cluster and a second cluster used for replication for the write, wherein one of the replication modes comprises a synchronous mode. A determination is made that the replication rule indicates a synchronous mode for the first and the second clusters. The write is transmitted from the memory to the first cluster to store in a first non-volatile storage of the first cluster and to the second cluster to store in a second non-volatile storage in response to determining that the replication rule indicates the synchronous mode. | 01-30-2014 |
20140344540 | CLUSTER FAMILIES FOR CLUSTER SELECTION AND COOPERATIVE REPLICATION - Cluster families for cluster selection and cooperative replication are created. The clusters are grouped into family members of a cluster family base on their relationships and roles. Members of the cluster family determine which family member is in the best position to obtain replicated information and become cumulatively consistent within their cluster family. Once the cluster family becomes cumulatively consistent, the data is shared within the cluster family so that all copies within the cluster family are consistent. Each family member in the family replicates 1/Nth volumes and N represents a total number of cluster family members in the family. | 11-20-2014 |
20150067255 | APPARATUS, SYSTEM, AND METHOD FOR MAINTAINING A CONTEXT STACK - An apparatus, system, and method are disclosed for maintaining a context stack. A monitor module monitors a stack size after each monitor interval for a stack of a plurality of contexts. Each context defines communications between a process and a data set and comprises a pathway for communicating with the data set and a process identifier. A stack module deallocates a context that satisfies a stack policy from the stack if the stack size is within a buffer threshold of a maximum threshold. | 03-05-2015 |
20150089169 | DYNAMIC REUSE AND RECONFIGURATION OF LOGICAL DATA OBJECTS IN A VIRTUAL TAPE SYSTEM - A method according to one embodiment includes selecting, by a processor, one of a WORM logical data object and a read-write logical data object for reuse as a new WORM logical data object, said processor maintaining data attributes bound to said selected logical data object until it is determined that said selected logical data object is available for reuse. At least one temporary data attribute is assigned to said selected logical data object while maintaining said data attributes bound to said selected logical data object The selected logical data object is mounted and a write command to beginning of logical data object is received to bind at least one data attribute to said selected logical data object to replace data attributes and data associated with said selected logical data object to reuse said selected logical data object as said new WORM logical data object. | 03-26-2015 |