CA2548084A1 - Method and apparatus for data storage using striping - Google Patents

Method and apparatus for data storage using striping Download PDF

Info

Publication number
CA2548084A1
CA2548084A1 CA002548084A CA2548084A CA2548084A1 CA 2548084 A1 CA2548084 A1 CA 2548084A1 CA 002548084 A CA002548084 A CA 002548084A CA 2548084 A CA2548084 A CA 2548084A CA 2548084 A1 CA2548084 A1 CA 2548084A1
Authority
CA
Canada
Prior art keywords
file
meta
data server
data
write
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002548084A
Other languages
French (fr)
Inventor
Michael L. Kazar
Richard N. Sanzi, Jr.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spinnaker Networks Inc
Original Assignee
Spinnaker Networks, Inc.
Michael L. Kazar
Richard N. Sanzi, Jr.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spinnaker Networks, Inc., Michael L. Kazar, Richard N. Sanzi, Jr. filed Critical Spinnaker Networks, Inc.
Publication of CA2548084A1 publication Critical patent/CA2548084A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users

Abstract

An apparatus for data storage includes a cluster of NFS servers. Each server has network ports for incoming file system requests and cluster traffic between servers. The apparatus includes a plurality of storage arrays in communication with the servers. The servers utilize a striped file system for storing data. A method for data storage. A method for establishing storage for a file. A method for removing a file from storage. A method for reading data in a file. A method for writing data in a file.

Description

METHOD AND APPARATUS FOR DATA STORAGE USING STRIPING
FIELD OF THE INVENTION
The present invention is related to the storage of data using striping with NFS servers. More specifically, the present invention is related to the storage of data using striping with NFS servers where ranges of attributes including modification times and change times are taken into account.
PACKGROUND OF THE INVENTION
An important problem in data storage is providing shared file access for a compute cluster comprised of many independent processors connected via a high speed network.
In a number of interesting cases, the compute cluster is accessing a single file, and in this case, it is a challenging to provide sufficient bandwidth from the entire compute cluster to this single file.
Previous approaches to this problem follow one of two architectures. In one class of solution, implemented by Sistina and PolyServe, for example, bandwidth to a single file is scaled by providing multiple servers that coordinate their access to the logical storage array (LUN) holding the file. These systems perform a complex distributed locking scheme to coordinate access to the LUN, coordinating, specifically, such operations such as disk block allocation, allocation of blocks to files, allocating mode numbers to files, and building indirect block trees. These systems are typically inefficient, as their locking overhead is very high.
In another class of solution, typified by the PVFS
system, data is striped among multiple servers through an additional file system layer built on top of a normal file system. In PVFS, updates to the various strip files in the resulting file system are not coordinated very closely, and operations that deal with global file properties, such as the file length, are implemented very expensively, or via approximations that may cause application errors. For example, in PVFS, determining the length of a file requires reading the individual file lengths from all of the strips, and taking the largest returned result, an expensive procedure. Similarly, an accurate modification time is l5 important for file systems whose data is exported via the Network File System (NFS) protocol, which uses the file's modification time as a version number. But PVFS, and similar parallel file systems, return the modification time for a file via a similar procedure to that returning the file length: they check with all servers and return the largest modification time field. Since the different servers have clocks that differ by no less than small numbers of microseconds, it is possible for a write to be performed at the server responsible for one stripe that happens to have the furthest advanced clock, and then perform a write to another server with an older clock, with the result that the second write does not advance the system wide file modification time. Having two versions of the file with the same modification time may cause incorrect behavior by protocols like NFS that use modification times as version numbers. Because of these problems, PVFS file systems are unsuitable for export over a network with NFS.
This invention differs from the current art by providing a solution that combines the efficient locking of a striped solution like PVFS with correct and efficient file attribute retrieving required for exporting data with NFS.
SUMMARY OF THE INVENTION
The present invention pertains to an apparatus for data storage. The apparatus comprises a cluster of NFS
servers. Each server has network ports for incoming file system requests and cluster traffic between servers. The apparatus comprises a plurality of storage arrays in communication with the servers. The servers utilize a striped file system for storing data.
The present invention pertains to a method for data storage. The method comprises the steps of creating a file across a plurality of NFS servers. There is the step of writing data into the file as strips of the data in the servers, the strips~together forming a stripe. There is the step of reading strips of the data from the servers. There is the step of deleting the strips from the servers.
The present invention pertains to a method for establishing storage for a file. The method comprises the steps of receiving an NFS create request at a network element. There is the step of receiving a file create request at a meta-data server from the network element.
There is the step of allocating an mode number for the file at the meta-data server. There is the step of making create calls to input output secondaries to mark the file as allocated by the input output secondaries . There is the step of committing the file create at the meta-data server.
The present invention pertains to a method for removing a file from storage. The method comprises the steps of receiving a delete file request at a meta-data server. There is the step of removing a file name of the file from a parent directory by the meta-data server at the meta-data server. There is the step of putting the file name on a file delete list by the meta-data server at the meta-data server. There is the step of sending delete calls to the input output secondaries. There is the step of receiving at the meta-data server acknowledgment calls from the input output secondaries that they have deleted the file.
There is the step of deleting the file at the meta-data server. There is the step of deleting the file from the file delete list. There is the step of placing an mode number associated with the file into a free list by the meta-data server at the meta-data server.
The present invention pertains to a method for reading data in a file. The method comprises the steps of receiving an NFS read request for data in the file at a network element. There is the step of determining by the network element which VFS stores at least one strip containing the data. There is the step of sending a file read request from the network element to at least one disk element of a plurality of servers storing a strip of the data. There is the step of obtaining current attributes associated with the file by each disk element. There is the step of reading the strips of the file from each disk element having the strips. There is the step of generating a response in regard to the file read request.
The present invention pertains to a method for writing data in a file. The method comprises the steps of receiving an NFS write request for a file at a network element. There is the step of determining by the network element which VFS is associated with the file. There is the step of sending a file write request from the network element to at least one disk element of a plurality of servers having a stripe of the VFS. There is the step of acquiring current attributes associated with the file: There is the step of writing a predetermined number of bytes of the data into each VFS strip in succession until all of the data is written into the file.
BRIEF DESCRIPTION OF THE DRAG~IINGS
In the accompanying drawings, the preferred embodiment of the invention and preferred methods of practicing the invention are illustrated in which:
Figure 1 is a schematic representation of an apparatus of the present invention.
Figure 2 is a schematic representation of the apparatus of the present invention.
Figure 3 is a representation of three strips.
Figure 4 is a schematic representation of a Read data Path, along with requests to the meta-data server.
Figure 5 shows calls exchanged as part of performing a write operation in a striped system.
Figure 6 shows the results of multiple calls to various disk elements being combined before the network element can generate an appropriate NFS response.
Figure 7 is a schematic representation of Create/Delete/Truncate communications.
DETAILED DESCRIPTION
Referring now to the drawings wherein like reference numerals refer to similar or identical parts throughout the several views, and more specifically to figure thereof, there is shown an apparatus 10 for data storage.
The apparatus 10 comprises a cluster 12 of NFS servers 14.
Each server 14 has network ports 16 for incoming file system requests and cluster 12 traffic between servers 14. The apparatus 10 comprises a plurality of storage arrays 18 in communication with the servers 14, the servers 14 utilizing a striped file system for storing data.
Preferably, each server 14 has a network element 20 and a disk element 22. Each disk element 22 preferably has a virtual file system 24 with the virtual file system 24 of each disk element 22 together forming a striped VFS.
Preferably, one disk element 22 for a virtual file system 24 acts as a meta-data server 26.
Preferably, a file has attributes and each server 14 for each file maintains a caching element that stores a last known version of the file attributes and ranges of modification time and change time values for assignment to write operation results. Each disk element 22 which is not the meta-data server 26 for a virtual file system 24 is preferably an input output secondary. Preferably, ranges of file modification times or file change times are reserved from the meta-data server 26 by the input output secondary.
The modification and change times in the ranges obtained from the meta-data server 26 are preferably issued to operations already queued at the input output secondary.
Preferably, modification and change times in the ranges obtained from the meta-data server 26 are issued to operations received during a window of time after the ranges are reserved from the meta-data server 26 by the input output secondary. Operations affecting all stripes of a file preferably begin executions first at the meta-data server 26 for a file, and then execute at all input output secondaries 28, such that operations at the input output secondaries 28 wait only for already executing operations that have already finished their communication with the meta-data server 26.

_g_ Preferably, operations follow one of at least two locking models, the first of which is to synchronize first with the meta-data server 26, then begin core execution by synchronizing with other operations executing at the input output secondary, and the second of which is to first synchronize at the meta-data server 26, and then to synchronize with operations at one or more input output secondaries 28 that have begun core execution at the input output secondaries 28. The cluster 12 network is preferably connected in a star topology. Preferably, the cluster 12 network is a switched Ethernet.
The present invention pertains to a method for data storage. The method comprises the steps of creating a file across a plurality of NFS servers 14. There is the step of writing data into the file as strips of the data in the servers 14, the strips together forming a stripe. There is the step of reading strips of the data from the servers 14.
There is the step of deleting the strips from the servers 14.
Preferably, there is the step of identifying a disk element 22 for a virtual file system 24 of an NFS server 14 as a meta-data server 26 and disk elements 22 for the NFS
severs which are not identified as the meta-data server 26 as input output secondaries 28. There is preferably the step of storing in a caching element at each input output secondary for each active file at a meta-data server 26 a last known version of attributes of the file which are good for a dallying period. Preferably, there is the step of the step of storing ranges of modification time and change time values in the caching element for assignment to write operations.
There is preferably the step of making a status request by the caching element to the meta-data server 26 to obtain a file's current attributes. Preferably, the making a status request step includes the step of obtaining modification time and change time ranges from the meta-data server 26. There is preferably the step of queuing file read and file write requests at the input output secondary until the file read and file write requests are admitted by the cache element and complete execution.
Preferably, there is the step of tracking by the cache element which file read and file write requests are executing for the file and which ranges are being read or written. There is preferably the step of requesting the cache element move out of invalid mode to read mode when a read operation must be executed. Preferably, there is the step of the step of checking a byte range affected by a file read request to ensure it does not overlap a byte range of any file write requests previously admitted and currently executing. There is preferably the step of requesting in response to a file write request that the cache element move into a write mode. Preferably, there is the step of the step of checking with the cache element the byte range affected by the file write request for overlap with any admitted and still executing file read or file write requests.

There is preferably the step, when executing a write request, of allocating a modification time and change time pair from the range of modification times and change times stored in the cache element. Preferably, there is the step of checking the head of a queue of pending file read and file write requests to see if the head can be admitted by the caching element after either a file read or file write request is completed. There are preferably the steps of detecting by the cache element that a file length must be updated in response to a file write request, moving the cache element into exclusive mode; and making a file write status call to the meta-data server 26 to update length attributes of the file.
The present invention pertains to a method for establishing storage for a file. The method comprises the steps of receiving an NFS create request at a network element 20. There is the step of receiving a file create request at a meta-data server 26 from the network element 20. There is the step of allocating an mode number for the file at the meta-data server 26. There is the step of making create calls to input output secondaries 28 to mark the file as allocated by the input output secondaries 28. There is the step of committing the file create at the meta-data server 26.
The present invention pertains to a method for removing a file from storage. The method comprises the steps of receiving a delete file request at a meta-data server 26.
There is the step of removing a file name of the file from a parent directory by the meta-data server 26 at the meta-data server 26. There is the step of putting the file on a file delete list by the meta-data server 26 at the meta-data server 26. There is the step of sending delete calls to the input output secondaries 28. There is the step of receiving at the meta-data server 26 acknowledgment calls from the input output secondaries 28 that they have deleted the file.
There is the step of removing the file at the meta-data server 26. There is the step of deleting the file from the file delete list. There is the step of placing an mode number associated with the file into a free list by the meta-data server 26 at the meta-data server 26.
The present invention pertains to a method for reading data in a file. The method comprises the steps of receiving an NFS read request for data in the file at a network element 20. There is the step of determining by the network element 20 which VFS stores at least one strip containing the data. There is the step of sending a file read request from the network element 20 to at least one disk element 22 of a plurality of servers 14 storing a strip of the data. There is the step of obtaining current attributes associated with the file by each disk element 22. There is the step of reading the strips of the file from each disk element 22 having the strips. There is the step of generating a response in regard to the file read request.
The present invention pertains to a method for writing data in a file. The method comprises the steps of receiving an NFS write request for a file at a network element 20. There is the step of determining by the network element 20 which VFS is associated with the file. There is the step of sending a file write request from the network element 20 to at least one disk element 22 of a plurality of servers 14 having a stripe of the VFS. There is the step of acquiring current attributes associated with the file. There is the step of writing a predetermined number of bytes of the data into each VFS strip in succession until all of the data is written into the file.
In the operation of the invention, it is implemented on top of a SpinServer, whose basic architecture is described by application number PCT/US01/46792, incorporated by reference herein. To recall, therein, a single global name space is implemented by a collection of network elements (NEs) 20 and disk elements (DEs) 22.
In the preferred embodiment, a single NE and DE are combined in a server 14, having both network ports 16 for incoming file system requests and other network ports 16 for cluster 12 traffic between SpinServers, as drawn above. In figure 2, the links at the top of figure 2 represent fibrechannel links between the SpinServers and their attached storage arrays 18. The horizontal black lines represent the private cluster 12 network that connects the NE and DE
components of different SpinServers together. Note that in figure 2, it appears that the cluster 12 link runs through SpinServer 2 to get to SpinServer 3, but in reality, the cluster 12 network is a switched gigabit Ethernet, with the machines connected in a star topology.

Assuming a system structured as described above, data is striped between multiple VFSes as a way of providing bandwidth from multiple DEs to what appears to be a single VFS.
Data within a VFS is implemented as an array of modes, as described by patent application number PCT/US01/48741, incorporated by reference herein, or as implemented in the Berkeley Fast File System, whose design and full implementation is available at http://www.freebsd.ora, incorporated by reference herein.
A striped VFS appears in the NFS name space as a single VFS, but is internally comprised of a set of strip VFSes, distributed among a number of DEs, one VFS per DE;
this collection is called a striped VFS or a striped set.
One server 14 for one of the VFSes is distinguished as the meta-data server 26, or MDS. Data is then distributed throughout the collection of VFSes as follows. All files in the striped VFS are represented at the MDS, and for all files except for regular data files, the MDS stores all of the data for the object. Thus, specifically, all directories, symbolic links, mount points, are stored completely at the MDS.
Data files are treated differently. Data files are striped among all the VFSes in a striped set, by putting different strips of the file' s data in different VFSes in the striped set, all sharing the same vnode number within each striped VFS. For example, if it is denoted by A.B.C, the file with VFS ID A, vnode B within that VFS, and unique generation number C, then if the striped VFS A is made up of VFSes A1, A2 and A3, the various stripes of a file A.B.C is stored in the files with file IDs A1.B.C, A2.B.C and A3.B.C.
That is, a file in a striped VFS with vnode B has its data stored in all of the component VFSes in the file with the same vnode and unique field in each component VFS. Strip N
of vnode B is stored on the I-th server 14 in the stripe set, where I = (B+N) mod STRIPE WIDTH
and STRIPE WIDTH is the number of strips in an entire stripe across all storage arrays 18 holding the striped VFS.
Figure 3 shows a file in a striped virtual file system ~4 (VFS A), created from three individual VFSes A1, A2 and A3. The file's vnode number is B, and its unique field is C. Strip 0 of the combined file is stored in the first strip of file A2.B.C, strip 1 is stored in strip 0 of file A3.B.C, strip 2 is stored as strip 0 of file A1.B.C, and strip 3 of the combined file goes back to file A~.B.C, this ,20 time as strip 1 of the file.
Data is striped as per figure 3, X bytes on each server 14, and then move to the next server 14 for the next X bytes, over and over again. The strip size is X, and the stripe size is X*<number of servers>, that is, if 32KB is written on each server 14, and then move to the next, and there are 8 servers participating in the cluster 12, then the strip size is 32K and the stripe size is 128K.
Most operations file system operations execute on the MDS, and the MDS alone performs attribute retrieval, directory lookup, symbolic link reading, directory reading, access checking, attribute setting (except for file length changes), directory creation, directory removal, file and directory renaming, locking, hard link creation, symbolic link creation, and access control list setting operations.
A number of other operations primarily affect a single strip, but that strip's processing of the request may require communication with the MDS; these include both read and write operations. Finally, normal file creation, file removal, and updating the length of a file all affect all of the files in a stripe set. The details of these operations are provided below.
All basic data operations except for spin read and spin write are handled at the MDS. Calls to spin read, and spin write are sent by the NE to the appropriate DE holding the appropriate strip of the file. As noted above, this strip is computed as a function of the relative strip within the data file, combined with the file' s vnode number, so that the striping begins with a different server for different files within a striped VFS. It should be noted that specific requests are identified consistent with the nomenclature of the preferred embodiment, such as spin-read or spin write.
These requirements are representative of the more general request associated with it, such as a read request or a write request or a status request.
When an NFS read is received by an NE, the NE
computes the real VFS storing the strip or strips containing the data being read, and then the NE sends the read requests to the DE (or DEs) storing the data. As part of executing the request, the DEs require the attributes associated with the file, and either use recently cached information or obtain it at the time from the MDS. This information is used to determine the file length, which is further used to trim file reads. It is also used to determine the file attributes to return to the caller of spin read.
Figure 4 shows how this works . An NFS read request enters the NE from the left, and is mapped into the corresponding spin-read request for the corresponding stripe, stored on the second IOS from the top. If the cache attribute stored at this IOS is current, the read operation is executed immediately and a response generated. Otherwise, a spin mds-read_status call is sent to the meta-data server (MDS) 26 to retrieve the current attributes for the file.
The same path is used for write requests, with an NFS write request entering the NE, being translated to a spin write call, and with the IOS calling the MDS with spin mds write_status if the cache element is unable to handle the request immediately. In addition, in the write case, if the file length is updated, the write call's spin mds write-status call updates the file length at the MDS.

A write works analogously to a read operation, in terms of determining the server 14 or servers 14 holding the data required to perform the write operation. A spin write operation, when handled by a DE, will also need to update the file attributes stored at the MDS. This update is handled by sending a request from the IOS to the MDS; optimizations described below allow the IOS to handle more than one spin write operation with a single status updating call to the MDS.
There are two calls an IOS can perform to the MDS.
The spin mds_read-status operation returns the current file attributes. The spin mds write-status operation returns the current file attributes, along with a range of mtime and come values the IOS can assign itself. The spin mds'write-status call can also take optional attributes to write to the file before returning the updated attributes;
this option is typically used for updating the file length when a spin write call at the IOS actually needs to update the file length.
Each IOS maintains, for each active file at the MDS, a caching element that stores the last known version of the file attributes, along with optional ranges of mtime and ctime values for assignment to write operations . At the IOS, this caching element processes queued read and write operations (spin-read and spin write calls), as follows.
File attributes are cached, and are good for a certain (short) period after they are obtained from the MDS, called the dallying period. If the cache element is in read mode, it has cached file attributes, but no range of mtimes and comes for use by writes. If the cache element is in write mode, it has cached file attributes as in read mode, but in addition has cached a range of mtime and ctime values for use by write operations. An element that has cached information that is too old to use is in invalid mode. A cache element moves from invalid mode to read mode by making a spin mds-read_status call to obtain the latest attributes from the MDS. A cache element in either invalid or read mode can move to write mode by calling spin mds write-status to obtain current attributes along with mtime and ctime ranges.
The mtime is the file's modification time, which means that it is the time at which the data in the file was last modified. The ctime is the file's change time, which advances when any property of the file changes, including its data. So, if you do a write to a file, both its mtime and ctimes change, but if you do an operation on the file like change its protection or file owner, only the ctime changes.
The ctime always changes if the mtime changes, but the mtime does not change every time that the dime changes.
All spin read and spin write calls at an IOS have to gain admission to the cache element before they can execute at the IOS; until they have been admitted, they are queued at the cache element. The cache element tracks which spin read or spin write operations are executing for the corresponding file, and which ranges the operations are reading or writing. A queued spin-read call first requests that the cache element move out of invalid mode into read mode, if the element is in invalid mode. Once the element is in either read or write mode, the byte range affected by the spin read call is checked to ensure that it does not overlap the byte range of any spin write calls that have been previously admitted and that are currently executing. If this condition passes as well, the spin_read call is admitted, and will complete with the attributes currently stored in the cache element. A queued spin write call requests that the cache element move into write mode. It then checks the byte range affected by the spin write call for overlap by any admitted and still executing spin_read or spin write calls. If there are no conflicting calls, the spin write call is admitted, and an mtime / ctime pair is allocated from the range stored in the cache element, and the spin_write executes locally. When the spin write call completes, the response is sent using the allocated mtime /
come pair . Whenever either a spin read or a spin write call completes, the head of the queue of pending spin-read and spin write requests is checked to see if it can be admitted, and new calls are admitted until a call is encountered that conflicts with the currently running set of spin_read and spin write calls.
A write call that gets admitted to the cache element may detect that it must update the file length as well. In this case, the cache element is moved into exclusive mode, which requires that all other operations complete before the spin write operation can proceed. After all the operations complete, a spin mds write-status call is made that updates the file length attributes and returns a new range of mtime and ctime values, and the write operation proceeds.
Figure 5 shows the calls exchanged as part of performing a spin write operation in a striped system. In this example, three NFS write calls arrive at an NE, which sends the three corresponding spin write calls to an IOS.
The IOS's cache element is not in write mode, so it makes a spin mds write-status call to the MDS to put the element into write mode. During this time, other spin write calls to the IOS are queued awaiting the cache element moving into write mode.
Certain read and write calls to a network element cross strip boundaries in the file system. Typically, this occurs on large NFS read or write calls that happen to 15 span a strip boundary by chance. In this case, the results of multiple SpinFS calls to various disk elements 22 are combined before the NE can generate the appropriate NFS
response. Figure 6 illustrates this case.
There are two approaches that can be used in these 20 cases. In the first approach, two or more DE spin-read or spin write operations are performed, one for each affected strip, and combine the results before returning the results to the client. The operation used to combine the multiple sets of attributes is to return the attributes associated with the status entry having the oldest (smallest) ctime field. In the second, the fact that NFSv3 and NFSv4 operations can perform short read or write operations are taken advantage of, and perform only the part of a read or write operation that fits within the first affected strip, and return an indication from the NE to the NFS client that only a subset of the data has been transferred. In this case, it is known that the client will send another request for the remaining data.
The preferred implementation actually uses a hybrid approach, depending upon the underlying access protocol.
Specifically, for protocols that allow the server 14 to perform a read or write for fewer bytes than requested, with the storage client having the responsibility for requesting a new transfer for the remaining bytes, the server 14 will implement the second approach described above. For the remaining protocols, which require all bytes to be transferred for each call, the first approach is used. Using short reads and writes when possible allows the storage clients to track more accurately the exact version of data in each page of their cache, and so prevents unnecessary cache invalidation operations at the storage client.
Two classes of operations are performed at the MDS, but also affect the IOSes in the system. One class includes file creation and deletion operations, and the second class includes file truncation. Both classes are described below.
Mufti-strip operations are directed to the MDS, which sends out requests to the various IOSes involved in the operation. As with all the other operations in this system, they are serialized by their file ctime values. The reader can see the path that these operations take through the system is shown in figure 7. There, an NFS create request is received by an NE, which translates it to a spin-create call, which is forwarded to the MDS (rightmost box). The MDS
performs this operation by issuing a number of spin-ios-create operations to all of the IOSes storing the VFS strips in question. Note that in the figure below, the spin'ios-create calls move from right to left, as opposed to the other calls involved in this operation.
File create and delete operations affect multiple strips, and are sent directly to the MDS, which drives their processing as follows.
File creation is quite straightforward. For a striped VFS, before actually doing the creation, the mode number that will be used is reserved, and spin-ios_oreate calls are made to the IOSes. The spin-ios_create call ensures that there is no data left in the specified file, that the file mode has the same unique field on the IOS as is stored on the MDS, and that the file's file type field indicates that the file is a regular file. The spin-ios_create calls are performed before the MDS commits the transaction that allocates the mode allocation, so that in the case of a crash before the mode has been created at each IOS, there are no changes made at the MDS, and the file allocation will eventually start from scratch.
In the event ~of a crash at any site, the file create will fail before any file entry is created, and before any modes are marked as allocated at the MDS. Thus, retrying the create will succeed without any resources having been lost by the failed attempt at file creation. Also note that by the time the created file finally becomes visible, with the directory entry having been created and the mode unlocked at the MDS, the file has been created on the MDS and all IOSes. Thus, there are no windows in which a partially created striped file is visible, even in the event of an MDS
or IOS crash.
Delete follows the same rule as create, ensuring that the transactional update that destroys the directory entry and frees the regular file mode executes as the very last stage in the file delete operation. That is, a file delete begins by sending a spin-ios_delete call to each of the remote VFSes (performing the spin_io delete calls in parallel). Once those calls complete, the strip at the MDS
is removed transactionally, and the file is gone.
One complication that arises in file deletion that does not occur in file creation is that, since the file already exists at the start of the operation, intermediate states during the deletion will be visible to anyone who executes read or write operations during the delete.
Typically, this means that during a delete, a read or write operation may, instead of just blocking and then returning ESTALE, may return ESTALE during the delete. That in and of itself is not a problem, but if the MDS crashes during this phase, then upon recovery, some of the strips will appear to be deleted, and will return ESTALE upon reads of that byte range, while others will still function. A new file delete operation will succeed, but the overall state of this file will lead to user confusion.
Thus, before starting the file delete operation, a transaction is committed that adds the file to a list of obj ects that are in the process of being deleted, and removes it from its parent directory. The system then sends spin_ios delete calls to all IOSes, and finally, performs a second transaction that removes the file from the MDS and from the list of files being deleted. Since the file is recorded as ~~to be deleted" in stable storage before the spin_remove call makes any changes at all, it is guaranteed that the file will eventually be deleted if it is ever started to be removed. Thus, any ESTALE errors due to accessing a file in the process of being deleted will be short-lived, and will occur only after the file is no longer visible in its parent directory.
The spin_ios-create and spin ios delete calls require the cache element on the IOS for the file involved to be in exclusive mode. Effectively, this means that these operations wait for all admitted operations for this file to complete before spin_ios-create or spin-ios delete can execute at the IOS.
File truncation is similar to file deletion, executing both at the MDS and at the various IOSes. It is desired for the truncate to be serializable with respect to the other operations at the IOSes. Specifically, if a truncate comes back with mtime 200, and a write executes at an IOS returning mtime 199, the data written at that IOS must reflect the effects of the truncate as well. On the other hand, if the write executes returning an mtime of 201, the write should not appear affected by the truncate.
This is accomplished by serializing truncations at the MDS, in the same way that file create and delete operations are serialized at the MDS. Specifically, spin setattr executes at the MDS, blocking incoming spin mds_read-status and spin mds write-status calls for the duration of its execution. During this time, it performs the truncate operation at the MDS, and sends a spin-ios'truncate operation to all of the IOSes. The spin-ios truncate operation actually performs the truncate operation at the IOS.
The IOS processes a spin-ios truncate operation as follows. First, all already admitted operations at the IOS
complete; these operations executed based upon mtime and ctime values already obtained from the MDS, and are serialized before the truncate operation. Next, the truncate operation is performed. The spin_ios truncate call's parameters include the file ID of the file being truncated, as well as its new length, and the attributes of the file after the truncation is performed, including updated mtime and ctime fields. After performing the truncate operation, the cache entry will be in read mode, and additional operations at the IOS queued for state changes in the cache entry can proceed.

To avoid deadlocks for thread resources within DE
elements in this design, two additional pools of threads are reserved for processing incoming requests at each of the IOS
and MDS.
Since any system can be both an MDS and an IOS at the same time (for different virtual file systems 24) , enough thread resources are reserved to ensure that at least one request sent from IOSes to MDSes can be executed, and to ensure that at least one request from MDSes to TOSes can be executed. Specifically, at least one thread is reserved for handling incoming spin mds-read-status and spin mds write status calls, and only those calls, and another thread is reserved that handles spin-ios-create, spin-ios delete and spin-ios truncate calls, and only those calls.
This section contains a walk-though example of the operation of the striped system described above.
It starts with a file create, followed by a number of striped writes, followed by a number of striped reads, and finishes with a file delete.
The initial file create begins at the MDS, which begins by allocating a vnode number for the new file. The MDS then makes spin_ios-create calls to all of the IOSes concurrently, marking the file as allocated on all of the IOSes. Once the spin-ios_create calls complete, the transaction at the MDS that actually creates the file at the MDS commits, and those changes are permanent.

After creating a file, multiple machines can write to that file. Assume for concreteness that there are three servers, I0, I1 and I2, with IO being the meta-data server 26 for the file. Assume clients CO and C1 are writing to the file. A time is represented as a 64 bit quantity giving the number of nanoseconds since 1/1/1970. At the time the file is created, its mtime and ctime values are both the same, say 1000000. Assume that CO then does 50 spin write calls for a strip stored at I1. I1 first moves to write mode, and receives a range of mtime and dime values from I0. In this case, assume that the current time at the time the write arrives at I1 is 2000000, so that the MDS grants I1 1000 values in its mtime and come ranges by speoifying that the mtime and ctime ranges for I1 are 2000000-2000999. The MDS
then sets the file' s mtime and ctime to 2001000. The 50 writes are assigned 50 distinct mtime and ctime pairs, starting at 2000000 for both mtime and come, and ending with 2000049 for both mtime and dime. During the processing of these writes, CO and C1 might send another 50 writes for one or more strips stored at I2. I2 as an IOS must move to write mode as well, and does so by calling spin mds write_status to obtain its own set of mtime and dime values. Since the MDS
has advanced the time stamps to 2001000 when putting I1 into write mode, the ranges returned to I2 are 2001000 through 2001999. The 50 writes are then performed at I2, and are given mtime and ctime values of 2001000 through 2001049 by I2. Note that 100 write operations have been executed on I1 and I2, at the cost of only two simple RPCs to I0.

Next, assume that 50 read operations are sent from clients CO and C1 to IOS I1. When the first read of the set arrives at I1, assume that it finds that the maximum time the IOS may remain in write mode has expired, and the IOS is back in idle state. Processing the spin-read calls requires that the IOS be in read mode, which it accomplishes by sending a spin mds-read_status call to the MDS. This call returns the current attributes, including the current file mtime and ctime values of 2002000. After the completion of the spin mds read_status call, the IOS I1 is able to return mtime and come values of 2002000 until the dallying period has expired. In this example, assuming all of those read operations arrive before the dallying~period has expired, all of the spin_read operations return attributes indicating the file has mtime and ctime values of 2002000.
Note that in this example, all of the operations are serialized by ctime. That is, all of the writes to the strip at I1 are serialized before any of the writes to strip I2, which themselves are serialized before any of the reads performed at I1.
Finally, when the file is deleted, the MDS receives the spin_remove call which triggers the deletion. The MDS
removes the file name from parent directory, puts the file into a list on stable storage of files being deleted, and commits the transaction. From this point, the file will eventually be deleted on the MDS and all IOSes, even in the case of multiple system crashes. The MDS then performs the second phase of deletion, sending spin_ios delete operations to all of the IOSes, in parallel. After every IOS
acknowledges successful execution of the spin'ios delete call the file is destroyed at the MDS and the mode put back in the free list at the MDS.
The technique described above solves the problem of providing shared file access for a compute cluster 12 comprised of many independent processors connected via a high speed network, because it allows the creation of a cluster 12 of NAS servers 14 that provides extremely high read or write performance to a single file.
With respect to read or write performance, for example, if an administrator needs 100 servers of performance to a single file, the administrator simply stripes the VFS
containing the desired file across 100 servers. Each network element 20 on each server 14 has approximately 1/100t'' of the aggregate load to the file, and each disk element 22 on each server 14 also has approximately 1/100th of the aggregate load to the file, so the load on all of the IOSes is distributed very evenly. The load on the MDS can be estimated as follows: with 5000 clients, each IOS has perhaps 50 clients accessing it at any one time. Each client has perhaps 8-16 IO requests outstanding at any instant, which means that the IOS has between 400 and 800 requests queued at any instant.
If there is one spin mds read-status or spin mds write_status call for every 100 queued requests, and each request is an 8K
read or write operation, then each call to the MDS from ~an IOS corresponds to about 800KB of data transfer. If the MDS
can handle, conservatively, 25,000 spin mds read-status or spin mds write_status calls / second, then the aggregate bandwidth supported to the single file is about 25,000 800KB or 20 gigabytes / second. This is the equivalent of 160 gigabit Ethernet ports, and is well above the performance 'of any clustered NFS server 14 system made of comparable technology.
In a preferred embodiment, the apparatus 10 runs on a dual processor' Intel PC with 4 GB of main memory. The apparatus 10 has 4 gigabit ethernet cards, 2 user ports for incoming NFS requests and 2 cluster 12 ports for communication with other NFS servers 14 in the cluster 12.
The calls that go over the cluster 12 ports are the spin-read, spin write, spin-create and spin delete calls (from a network element 20 to a disk element 22), as well as the spin-ios XXX and spin mds XXX calls (from a disk element 22 to another disk element 22). Each system also has 4 GB of main memory, which it uses for caching file data as well as general program memory.
The apparatus 10 runs on a dual processor, and although this isn't required, the network element 20 code is run on one of the CPUs and the disk element 22 code and the clustering code on the other CPU. The network element 20 processor thus runs the NFS and CIFS server code, while the disk element 22 processor runs the MDS and IOS code (possibly at the same time for different virtual file systems 24).
Although the invention has been described in detail in the foregoing embodiments for the purpose of illustration, it is to be understood that such detail is solely for that purpose and that variations can be made therein by those skilled in the art without departing from the spirit and scope of the invention except as it may be described by the following claims.

Claims (39)

1. An apparatus for data storage comprising:
a cluster of NFS servers, each server having network ports for incoming file system requests and cluster traffic between servers; and a plurality of storage arrays in communication with the servers, the servers utilizing a striped file system for storing data.
2. An apparatus as described in Claim 1 wherein each server has a network element and a disk element.
3. An apparatus as described in Claim 2 wherein each disk element has a virtual file system with the virtual file system of each disk element together forming a striped VFS.
4. An apparatus as described in Claim 3 wherein all disk elements for a virtual file system act as meta-data servers.
5. An apparatus as described in Claim 4 wherein a file has attributes and each server for each file maintains a caching element that stores a last known version of the file attributes and ranges of modification time and change time values for assignment to write operation results.
6. An apparatus as described in Claim 5 wherein each disk element which is not the meta-data server for a virtual file system is an input output secondary.
7. An apparatus as described in Claim 6 wherein ranges of file modification times or file change times are reserved from the meta-data server by the input output secondary.
8. An apparatus as described in Claim 7 wherein the modification and change times in the ranges obtained from the meta-data server are issued to operations already queued at the input output secondary.
9. An apparatus as described in Claim 8 wherein modification and change times in the ranges obtained from the meta-data server are issued to operations received during a window of time after the ranges are reserved from the meta-data server by the input output secondary.
10. An apparatus as described in Claim 9 wherein operations affecting all stripes of a file begin executions first at the meta-data server for a file, and then execute at all input output secondaries, such that operations at the input output secondaries wait only for already executing operations that have already finished their communication with the meta-data server.
11. An apparatus as described in Claim 10 wherein operations follow one of at least two locking models, the first of which is to synchronize first with the meta-data server, then begin core execution by synchronizing with other operations executing at the input output secondary, and the second of which is to first synchronize at the meta-data server, and then to synchronize with operations at one or more input output secondaries that have begun core execution at the input output secondaries.
12. An apparatus as described in Claim 11 wherein the cluster network is connected in a star topology.
13. An apparatus as described in Claim 12 wherein the cluster network is a switched Ethernet.
14. A method for data storage comprising the steps of creating a file across a plurality of NFS servers;
writing data into the file as strips of the data in the servers, the strips together forming a stripe;
reading strips of the data from the servers; and deleting the strips from the servers.
15. A method as described in Claim 14 including the step of identifying a disk element for a virtual file system of an NFS server as a meta-data server and disk elements for the NFS severs which are not identified as the meta-data server as input output secondaries.
16. A method as described in Claim 15 including the step of storing in a caching element at each input output secondary for each active file at a meta-data server a last known version of attributes of the file which are good for a dallying period.
17. A method as described in Claim 16 including the step of storing ranges of modification time and change time values in the caching element for assignment to write operations.
18. A method as described in Claim 17 including the step of making a status request by the caching element to the meta-data server to obtain a file's current attributes.
19. A method as described in Claim 18 wherein the making a status request step includes the step of obtaining modification time and change time ranges from the meta-data server.
20. A method as described in Claim 19 including the step of queuing file read and file write requests at the input output secondary until the file read and file write requests are admitted by the cache element and complete execution.
21. A method as described in Claim 20 including the step of tracking by the cache element of the file read and file write requests executing for the file and the ranges that are being read or written.
22. A method as described in Claim 21 including the step of requesting the cache element move out of invalid node to read mode when a read operation must be executed.
23. A method as described in Claim 22 including the step of checking a byte range affected by a file read request to ensure it does not overlap a byte range of any file write requests previously admitted and currently executing.
24. A method as described in Claim 23 including the step of requesting, in response to a file write request that the cache element move into a write mode.
25. A method as described in Claim 24 including the step of checking with the cache element the byte range affected by the file write request for overlap with any admitted and still executing file read or file write requests.
26. A method as described in Claim 25 including the step, when executing a write request, of allocating a modification time and change time pair from the range of modification times and change times stored in the cache element.
27. A method as described in Claim 26 including the step of checking the head of a queue of pending file read and file write requests to see if a head request can be admitted by the caching element after either a file read or file write request is completed.
28. A method as described in Claim 27 including the steps of detecting by the cache element that a file length must be updated in response to a file write request, moving the cache element into exclusive mode; and making a file write status call to the meta-data server to update length attributes of the file.
29. A method as described in Claim 14 including the step of storing in a caching element at each input output secondary for each active file at a meta-data server a last known version of attributes of the file which are good for a dallying period.
30. A method as described in Claim 14 including the step of storing ranges of modification time and change time values in a caching element for assignment to write operations.
31. A method as described in Claim 14 including the step of making a status request by a caching element to the meta-data server to obtain a file's current attributes.
32. A method as described in Claim 31 wherein the making a status request step includes the step of obtaining modification time and change time ranges from the meta-data server.
33. A method as described in Claim 14 including the step of requesting a cache element move out of invalid node to read mode when a read operation must be executed.
34. A method as described in Claim 14 including the step of requesting, in response to a file write request that a cache element move into a write mode.
35. A method as described in Claim 14 including the steps of detecting by a cache element that a file length must be updated in response to a file write request, moving the cache element into exclusive mode; and making a file write status call to a meta-data server to update length attributes of the file.
36. A method for establishing storage for a file comprising the steps of:
receiving an NFS create request at a network element;
receiving a file create request at a meta-data server from the network element;
allocating an mode number for the file at the meta-data server;

making create calls to input output secondaries to mark the file as allocated by the input output secondaries;
and committing the file create at the meta-data server.
37. A method for removing a file from storage comprising the steps of:
receiving a delete file request at a meta-data server;
removing a file name of the file from a parent directory by the meta-data server at the meta-data server;
putting the file on a file delete list by the meta-data server at the meta-data server;
sending delete calls to the input output secondaries;
receiving at the meta-data server acknowledgment calls from the input output secondaries that they have deleted the file;
deleting the file at the meta-data server;
removing the file from the file delete list; and placing an mode number associated with the file into a free list by the meta-data server at the meta-data server.
38. A method for reading data in a file comprising the steps of:
receiving an NFS read request for data in the file at a network element;
determining by the network element which VFS stores at least one strip containing the data;
sending a file read request from the network element to at least one disk element of a plurality of servers storing a strip of the data;
obtaining current attributes associated with the file by each disk element;
reading the strips of the file from each disk element having the strips; and generating a response in regard to the file read request.
39. A method for writing data in a file comprising the steps of:

receiving an NFS write request for a file at a network element;
determining by the network element which VFS is associated with the file;
sending a file write request from the network element to at least one disk element of a plurality of servers having a stripe of the VFS;
acquiring current attributes associated with the file; and writing a predetermined number of bytes of the data into each VFS strip in succession until all of the data is written into the file.
CA002548084A 2003-12-02 2004-11-15 Method and apparatus for data storage using striping Abandoned CA2548084A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/727,169 2003-12-02
US10/727,169 US7302520B2 (en) 2003-12-02 2003-12-02 Method and apparatus for data storage using striping
PCT/US2004/038423 WO2005060477A2 (en) 2003-12-02 2004-11-15 Method and apparatus for data storage using striping

Publications (1)

Publication Number Publication Date
CA2548084A1 true CA2548084A1 (en) 2005-07-07

Family

ID=34620572

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002548084A Abandoned CA2548084A1 (en) 2003-12-02 2004-11-15 Method and apparatus for data storage using striping

Country Status (9)

Country Link
US (3) US7302520B2 (en)
EP (1) EP1689345A4 (en)
JP (1) JP4607898B2 (en)
KR (1) KR100834162B1 (en)
CN (1) CN101019105B (en)
AU (1) AU2004304873B2 (en)
CA (1) CA2548084A1 (en)
IL (1) IL175684A0 (en)
WO (1) WO2005060477A2 (en)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7409497B1 (en) 2003-12-02 2008-08-05 Network Appliance, Inc. System and method for efficiently guaranteeing data consistency to clients of a storage system cluster
US7698289B2 (en) * 2003-12-02 2010-04-13 Netapp, Inc. Storage system architecture for striping data container content across volumes of a cluster
US7188128B1 (en) * 2003-12-12 2007-03-06 Veritas Operating Corporation File system and methods for performing file create and open operations with efficient storage allocation
US7409494B2 (en) 2004-04-30 2008-08-05 Network Appliance, Inc. Extension of write anywhere file system layout
US7430571B2 (en) * 2004-04-30 2008-09-30 Network Appliance, Inc. Extension of write anywhere file layout write allocation
US20050278383A1 (en) * 2004-05-28 2005-12-15 Network Appliance, Inc. Method and apparatus for keeping a file system client in a read-only name space of the file system
US8335807B1 (en) * 2004-08-30 2012-12-18 Sprint Communications Company, L.P. File distribution system and method
US7904649B2 (en) 2005-04-29 2011-03-08 Netapp, Inc. System and method for restriping data across a plurality of volumes
US7698334B2 (en) * 2005-04-29 2010-04-13 Netapp, Inc. System and method for multi-tiered meta-data caching and distribution in a clustered computer environment
US7962689B1 (en) * 2005-04-29 2011-06-14 Netapp, Inc. System and method for performing transactional processing in a striped volume set
EP1949214B1 (en) 2005-10-28 2012-12-19 Network Appliance, Inc. System and method for optimizing multi-pathing support in a distributed storage system environment
US7730258B1 (en) 2005-11-01 2010-06-01 Netapp, Inc. System and method for managing hard and soft lock state information in a distributed storage system environment
US8255425B1 (en) 2005-11-01 2012-08-28 Netapp, Inc. System and method for event notification using an event routing table
US7747584B1 (en) * 2006-08-22 2010-06-29 Netapp, Inc. System and method for enabling de-duplication in a storage system architecture
US8301673B2 (en) * 2006-12-29 2012-10-30 Netapp, Inc. System and method for performing distributed consistency verification of a clustered file system
US8489811B1 (en) 2006-12-29 2013-07-16 Netapp, Inc. System and method for addressing data containers using data set identifiers
US8312046B1 (en) 2007-02-28 2012-11-13 Netapp, Inc. System and method for enabling a data container to appear in a plurality of locations in a super-namespace
US7827350B1 (en) 2007-04-27 2010-11-02 Netapp, Inc. Method and system for promoting a snapshot in a distributed file system
US8060696B2 (en) * 2007-04-27 2011-11-15 Siemens Medical Solutions Usa, Inc. Positron emission tomography event stream buffering
US7797489B1 (en) 2007-06-01 2010-09-14 Netapp, Inc. System and method for providing space availability notification in a distributed striped volume set
US8224864B1 (en) * 2008-01-07 2012-07-17 Network Appliance, Inc. Striping directories across a striped volume set by the filenames contained in the directories
US7996607B1 (en) 2008-01-28 2011-08-09 Netapp, Inc. Distributing lookup operations in a striped storage system
US8019956B1 (en) 2008-03-07 2011-09-13 Network Appliance, Inc. System and method for concurrently storing and accessing data in a tree-like data structure
US7992055B1 (en) 2008-11-07 2011-08-02 Netapp, Inc. System and method for providing autosupport for a security system
US9524396B2 (en) * 2009-04-16 2016-12-20 International Business Machines Corporation System that maintains objects created and modified within designated directories on a per-client basis in a network filesystem
US8117388B2 (en) * 2009-04-30 2012-02-14 Netapp, Inc. Data distribution through capacity leveling in a striped file system
US8296517B2 (en) * 2009-08-19 2012-10-23 Oracle International Corporation Database operation-aware striping technique
CN102012871B (en) * 2009-09-08 2012-09-05 英业达股份有限公司 Method for remapping memory
US8627000B2 (en) * 2010-02-08 2014-01-07 Microsoft Corporation Virtual disk manipulation operations
CN102143228A (en) * 2011-03-30 2011-08-03 浪潮(北京)电子信息产业有限公司 Cloud storage system, cloud client and method for realizing storage area network service
US9553817B1 (en) 2011-07-14 2017-01-24 Sprint Communications Company L.P. Diverse transmission of packet content
CN102413172B (en) * 2011-10-31 2014-10-01 北京联创信安科技有限公司 Parallel data sharing method based on cluster technology and apparatus thereof
CN103795750B (en) * 2012-10-31 2017-03-01 中国银联股份有限公司 A kind of file transmitting method and its system
US9052942B1 (en) * 2012-12-14 2015-06-09 Amazon Technologies, Inc. Storage object deletion job management
CN103558998B (en) * 2013-11-07 2016-03-30 华为技术有限公司 A kind of method and apparatus of data manipulation
US10235288B2 (en) * 2015-10-02 2019-03-19 Netapp, Inc. Cache flushing and interrupted write handling in storage systems
US11385980B2 (en) * 2017-11-13 2022-07-12 Weka.IO Ltd. Methods and systems for rapid failure recovery for a distributed storage system
CN110413204B (en) * 2018-04-28 2023-02-10 伊姆西Ip控股有限责任公司 I/O management method, apparatus, and computer-readable medium
CN109325001B (en) * 2018-08-20 2021-06-29 郑州云海信息技术有限公司 Method, device and equipment for deleting small files based on metadata server

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US139167A (en) * 1873-05-20 Improvement in artificial stone
JP3160106B2 (en) * 1991-12-23 2001-04-23 ヒュンダイ エレクトロニクス アメリカ How to sort disk arrays
AU662973B2 (en) * 1992-03-09 1995-09-21 Auspex Systems, Inc. High-performance non-volatile ram protected write cache accelerator system
US5893140A (en) * 1996-08-14 1999-04-06 Emc Corporation File server having a file system cache and protocol for truly safe asynchronous writes
US5889934A (en) * 1997-02-24 1999-03-30 Data General Corporation Data validation system for a group of data storage disks
US6032216A (en) * 1997-07-11 2000-02-29 International Business Machines Corporation Parallel file system with method using tokens for locking modes
US6029168A (en) * 1998-01-23 2000-02-22 Tricord Systems, Inc. Decentralized file mapping in a striped network file system in a distributed computing environment
US6697846B1 (en) * 1998-03-20 2004-02-24 Dataplow, Inc. Shared file system
US6324581B1 (en) * 1999-03-03 2001-11-27 Emc Corporation File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems
US6671773B2 (en) * 2000-12-07 2003-12-30 Spinnaker Networks, Llc Method and system for responding to file system requests
US7165096B2 (en) * 2000-12-22 2007-01-16 Data Plow, Inc. Storage area network file system
US7685126B2 (en) * 2001-08-03 2010-03-23 Isilon Systems, Inc. System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20040139167A1 (en) * 2002-12-06 2004-07-15 Andiamo Systems Inc., A Delaware Corporation Apparatus and method for a scalable network attach storage system
US7127577B2 (en) * 2003-01-21 2006-10-24 Equallogic Inc. Distributed snapshot process
US7237021B2 (en) * 2003-04-04 2007-06-26 Bluearc Uk Limited Network-attached storage system, device, and method supporting multiple storage device types
US7412496B2 (en) * 2003-08-22 2008-08-12 Emc Corporation Management of the file-modification time attribute in a multi-processor file server system
US20070088702A1 (en) * 2005-10-03 2007-04-19 Fridella Stephen A Intelligent network client for multi-protocol namespace redirection

Also Published As

Publication number Publication date
KR100834162B1 (en) 2008-06-02
EP1689345A4 (en) 2009-07-29
JP2007537501A (en) 2007-12-20
AU2004304873B2 (en) 2008-08-28
US20090070345A1 (en) 2009-03-12
US20050120078A1 (en) 2005-06-02
WO2005060477A8 (en) 2007-05-18
US20070271350A1 (en) 2007-11-22
EP1689345A2 (en) 2006-08-16
US7302520B2 (en) 2007-11-27
WO2005060477A2 (en) 2005-07-07
KR20060111543A (en) 2006-10-27
US7805568B2 (en) 2010-09-28
AU2004304873A1 (en) 2005-07-07
CN101019105A (en) 2007-08-15
WO2005060477A3 (en) 2007-03-29
US7454567B2 (en) 2008-11-18
JP4607898B2 (en) 2011-01-05
CN101019105B (en) 2011-05-25
IL175684A0 (en) 2008-04-13

Similar Documents

Publication Publication Date Title
US7454567B2 (en) Method and apparatus for data storage using striping
US7865485B2 (en) Multi-threaded write interface and methods for increasing the single file read and write throughput of a file server
US8805889B2 (en) Metadata structures and related locking techniques to improve performance and scalability in a cluster file system
US7555504B2 (en) Maintenance of a file version set including read-only and read-write snapshot copies of a production file
US5987477A (en) Parallel file system and method for parallel write sharing
US5960446A (en) Parallel file system and method with allocation map
US5963963A (en) Parallel file system and buffer management arbitration
EP0899667B1 (en) Parallel file system and method for metadata node takeover
US5950199A (en) Parallel file system and method for granting byte range tokens
US5940838A (en) Parallel file system and method anticipating cache usage patterns
US5946686A (en) Parallel file system and method with quota allocation
US5974424A (en) Parallel file system and method with a metadata node
EP0892347B1 (en) Parallel file system and method for independent metadata logging
US5893086A (en) Parallel file system and method with extensible hashing
US5940841A (en) Parallel file system with extended file attributes
US6850969B2 (en) Lock-free file system
US5956734A (en) Parallel file system with a quota check utility
Kuszmaul et al. Everyone Loves File: File Storage Service ({FSS}) in Oracle Cloud Infrastructure
US10387384B1 (en) Method and system for semantic metadata compression in a two-tier storage system using copy-on-write
US10628391B1 (en) Method and system for reducing metadata overhead in a two-tier storage architecture
IX 19th USENIX Conference on File and Storage Technologies (FAST’21)

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued

Effective date: 20140430