Patent application number | Description | Published |
20080222311 | Management of shared storage I/O resources - Automated management of shared I/O resources involves use of a policy engine for implementing I/O scheduling group I/O policies. The I/O policies are used for determining whether corresponding I/O requests should be issued to a shared storage system immediately or should be delayed via corresponding policy-based queues. In the context of database systems, a database administrator can specify policies regarding how I/O resources should be used and the database system itself enforces the policies, rather than requiring the database administrator enforce the I/O usage of the database and of the individual users. | 09-11-2008 |
20090037424 | EFFICIENT NETWORK DATA TRANSFER - An approach for providing efficient network data transfer service is provided. In one embodiment, a first database server receives, from a second database server, a first request to access a first storage subsystem. Here, the second database server cannot access first data in the first storage subsystem without another database server transmitting the first data to the second database server. In response, the first database server provides the second database server a first set of access primitives. Using the first set of access primitives, the second database server may access data stored in the first storage subsystem that may be otherwise not accessible. As a result, the first database server receives, from the second database server, a first data access request to access first data stored in the first storage subsystem. | 02-05-2009 |
20090240783 | Direct network file system - A computer-implemented method of implementing a network file system may include steps of providing a host, the host including an Operating System (OS) that includes a kernel and a first client implementing the Network File System (NFS) protocol in the kernel, and a database server process. A second NFS client may be provided in the database server process. A NFS server may be provided, coupled to the host. A device implementing the Network Attached Storage (NAS) protocol may also be provided, coupled to the NFS server. NFS requests to access data stored in the NAS server may then be generated and sent from the second NFS client in the database server process directly to the NFS server, bypassing the first NFS client in the OS kernel of the host. NFS File handles obtained by one database process may be shared with other database processes through a shared memory area. | 09-24-2009 |
20100077107 | STORAGE-SIDE STORAGE REQUEST MANAGEMENT - Techniques are provided for managing, within a storage system, the sequence in which I/O requests are processed by the storage system based, at least in part, on a one or more logical characteristics of the I/O requests. The logical characteristics may include, for example, the identity of the user for whom the I/O request was submitted, the service that submitted the I/O request, the database targeted by the I/O request, an indication of a consumer group to which the I/O request maps, the reason why the I/O request was issued, a priority category of the I/O request, etc. Techniques are also provided for automatically establishing a scheduling policy within a storage system, and for dynamically changing the scheduling policy in response to changes in workload. | 03-25-2010 |
20120072770 | Data Corruption Diagnostic Engine - A computer is programmed to execute a diagnostic procedure either on a pre-set schedule or asynchronously in response to an event, such as an error message, or a user command. When executed, the diagnostic procedure automatically checks for integrity of one or more portions of data in the computer, to identify any failure(s). In some embodiments, the failure(s) may be displayed to a human, after revalidation to exclude any failure that no longer exists. | 03-22-2012 |
20120173774 | STORAGE-SIDE STORAGE REQUEST MANAGEMENT - Techniques are provided for managing, within a storage system, the sequence in which I/O requests are processed by the storage system based, at least in part, on one or more logical characteristics of the I/O requests. The logical characteristics may include, for example, the identity of the user for whom the I/O request was submitted, the service that submitted the I/O request, the database targeted by the I/O request, an indication of a consumer group to which the I/O request maps, the reason why the I/O request was issued, a priority category of the I/O request, etc. Techniques are also provided for automatically establishing a scheduling policy within a storage system, and for dynamically changing the scheduling policy in response to changes in workload. | 07-05-2012 |
20130339636 | STORAGE-SIDE STORAGE REQUEST MANAGEMENT - Techniques are provided for managing, within a storage system, the sequence in which I/O requests are processed by the storage system based, at least in part, on one or more logical characteristics of the I/O requests. The logical characteristics may include, for example, the identity of the user for whom the I/O request was submitted, the service that submitted the I/O request, the database targeted by the I/O request, an indication of a consumer group to which the I/O request maps, the reason why the I/O request was issued, a priority category of the I/O request, etc. Techniques are also provided for automatically establishing a scheduling policy within a storage system, and for dynamically changing the scheduling policy in response to changes in workload. | 12-19-2013 |
20150058498 | Management Of Shared Storage I/O Resources - Automated management of shared I/O resources involves use of a policy engine for implementing I/O scheduling group I/O policies. The I/O policies are used for determining whether corresponding I/O requests should be issued to a shared storage system immediately or should be delayed via corresponding policy-based queues. In the context of database systems, a database administrator can specify policies regarding how I/O resources should be used and the database system itself enforces the policies, rather than requiring the database administrator enforce the I/O usage of the database and of the individual users. | 02-26-2015 |