Lun with zero storage as a protocol endpoint

    公开(公告)号:US09983896B1

    公开(公告)日:2018-05-29

    申请号:US14985960

    申请日:2015-12-31

    Abstract: A method includes (a) receiving a setup command directing a computing device to create a protocol endpoint to allow a remote host device to access storage volumes of the computing device presented to the remote host through the protocol endpoint as virtual storage volumes, (b) in response to receiving the setup command, creating a logical storage device object representing the protocol endpoint, the logical storage device object having zero underlying storage capacity, (c) subsequent to creating the logical storage device object, receiving a command directed at the protocol endpoint, and (d) in response to receiving the command, processing the command by a driver stack on the computing device containing the logical storage device object representing the protocol endpoint, the driver stack being shorter than another driver stack on the computing device used to process storage commands directed at another logical storage device object having non-zero underlying storage.

    Using spare disk drives to overprovision raid groups

    公开(公告)号:US09921912B1

    公开(公告)日:2018-03-20

    申请号:US14870187

    申请日:2015-09-30

    CPC classification number: G06F11/1092

    Abstract: A technique for managing spare disk drives in a data storage system includes transferring segments of data from disk drives of an operating RAID group to spare regions on a set of spare disk drives to create unused space in the disk drives of the RAID group, thus using the spare regions to overprovision storage in the RAID group. Upon a failure of one of the disk drives in the RAID group, data of the failing disk drive are rebuilt based on the segments of data as well as on data from still-functioning disk drives in the RAID group. Thus, the spare disk drives act not only to overprovision storage for the RAID group prior to disk drive failure, but also to fulfill their role as spares in the event of a disk drive failure.

    Optimizations to avoid intersocket links

    公开(公告)号:US10303396B1

    公开(公告)日:2019-05-28

    申请号:US15789127

    申请日:2017-10-20

    Inventor: David W. Harvey

    Abstract: Described are techniques for processing read and write requests in a system having a NUMA (non-uniform memory access) configuration. Such techniques may include receiving, at a front end adapter of the system, a write request, to write first data to a first storage device, storing a first copy of the first data in first memory local to a first domain, copying, using a first inter-storage processor communication connection, the first data from the first memory to a third memory of a third domain thereby creating a second copy of the first data in the third memory; and determining, in accordance with a first heuristic and first criteria, whether to use the first copy of the first data stored in the first memory or the second copy of the first data stored in the third memory as a source when writing the first data to the first storage device.

    Optimizations to avoid intersocket links

    公开(公告)号:US09817607B1

    公开(公告)日:2017-11-14

    申请号:US14310179

    申请日:2014-06-20

    Inventor: David W. Harvey

    CPC classification number: G06F3/0689 G06F3/061 G06F3/0635 G06F3/0656 G06F12/08

    Abstract: Described are techniques for processing read and write requests in a system having a NUMA (non-uniform memory access) configuration. Such techniques may include receiving, at a front end adapter of the system, a write request, to write first data to a first storage device, storing a first copy of the first data in first memory local to a first domain, copying, using a first inter-storage processor communication connection, the first data from the first memory to a third memory of a third domain thereby creating a second copy of the first data in the third memory; and determining, in accordance with a first heuristic and first criteria, whether to use the first copy of the first data stored in the first memory or the second copy of the first data stored in the third memory as a source when writing the first data to the first storage device.

Patent Agency Ranking