WO2016119910A1 - Creating backup - Google Patents

Creating backup Download PDF

Info

Publication number
WO2016119910A1
WO2016119910A1 PCT/EP2015/059237 EP2015059237W WO2016119910A1 WO 2016119910 A1 WO2016119910 A1 WO 2016119910A1 EP 2015059237 W EP2015059237 W EP 2015059237W WO 2016119910 A1 WO2016119910 A1 WO 2016119910A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
backup
priority
network
assigned
Prior art date
Application number
PCT/EP2015/059237
Other languages
French (fr)
Inventor
Kumar CHANDRASHEKAR
Original Assignee
Longsand Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Longsand Limited filed Critical Longsand Limited
Publication of WO2016119910A1 publication Critical patent/WO2016119910A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1451Management of the data involved in backup or backup restore by selection of backup contents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments

Definitions

  • Backup and restore mechanisms ensure that information stored on any storage media on devices, such as personal computers (PCs), laptops, tablets PCs, and smart phones, is recoverable in the event of loss or damage to the device.
  • the backup and restore mechanisms maintain an additional copy of the data at a storage location, for example, a backup server, other than the storage media on the devices. Therefore, creating the backup of data involves copying and reproducing the data from local systems to another storage location. The backed-up data is retrievable from the other storage location to the local systems.
  • Figure 1A illustrates a network environment having a backup system for creating backup, according to an example of the present subject matter.
  • Figure 1 B illustrates a schematic of the backup system, according to an example of the present subject matter.
  • Figure 1 C illustrates a detailed schematic of the backup system, according to an example of the present subject matter.
  • Figure 2 illustrates a method for creating backup, according to an example of the present subject matter.
  • Figure 3 illustrates a detailed method for creating backup, according to an example of the present subject matter.
  • Figure 4 illustrates a network environment for creating backup, according to an example of the present subject matter.
  • Such techniques usually involve reduction of size of backup data that is stored on backup server(s).
  • the backup data can include a copy of the data to be backed-up from a local system to the backup server.
  • one such generally used technique can involve compression or de-duplication or both, of the data to be backed-up.
  • such techniques may not considerably reduce the size of the backup data to be stored on the backup server.
  • the storage space used for backing up data of each client machine on the backup server may be less than the size of the file being backed-up; however, the total backup data of the network may run into a couple of hundreds of Mb.
  • the present subject matter provides an approach for creating the backup of data based on availability of the data in a network.
  • the network can be intranet or the internet.
  • the file can be a complete file or a part of the file, and stored on a client device coupled to the network.
  • determining the availability can involve searching of the file in the network and based on whether the file is found on the network or not, the availability of the file can be determined. Further, based on the availability of the file, a priority can be assigned to the file and the backup of the file can be created based on the priority assigned to the file.
  • the assignment of priority can involve classification of the file as private or public, based on the availability of the file in the network. In case the file is unavailable in the network and cannot be located, the file is classified as private and, if the file is available in the network, then the file is classified as public.
  • classification of the file can be achieved before the file is assigned any priority. Therefore, the classification of the file can precede the assignment of priority to the file.
  • the assignment of priority to the file can be based on the classification of the file. For instance, the file classified as private, i.e., a file unavailable in the network, can be assigned a priority to indicate that such a file is to be backed-up. On the other hand, the file classified as public can be assigned a priority indicating that a copy of such a file may not have to be backed-up.
  • the priority can be assigned to the file based on a number of instances of the file in the network.
  • number of locations that the file is present at can also be used as a basis for assigning the priority to the file.
  • the file can be assigned a first priority.
  • the first priority can indicate that the entire contents of the file have to be backed-up. Therefore, in such a case, a copy of the file to be backed-up is created and saved to create backup of the file. In an example, the copy can be saved on a backup server.
  • the priority can be assigned to the file based on a threshold number of instances of the file, the threshold number of instances being predefined. For instance, if the threshold number of instances of the file is not available in the network, then the file is assigned an intermediate priority. On the other hand, if the file is available in the network in greater number than the threshold number of instances, then the file is assigned a second priority.
  • the intermediate priority and the second priority can indicate that the contents of the file may not have to be backed-up.
  • locations of the file in the network can be stored as part of creating the backup for that file. In said example, the locations of the file can be stored on the backup server.
  • the file is assigned intermediate priority, in one instance, the location and other parameter associated with the file can be saved, instead of saving the copy of the file.
  • the present subject matter facilitates in load balancing on the backup server.
  • the file is being restored from the backup server to the client device. If the file is classified as public, i.e., the file can be found on the network, in case of restore operation, the backup server can just send the locations of the file to the client device and the client device can obtain the file directly from locations in the network.
  • Figure 1 A illustrates a network environment 100 having a backup system 102 for creating backup, according to an example of the present subject matter.
  • Examples of the backup system 102 can include, but is not limited to, servers, desktop computers, laptops, and the like.
  • the backup system 102 can be coupled to a plurality of client devices
  • the backup system 102 can communicate with the client devices 104 over the network 106 to exchange information.
  • the network 106 may be a wireless network, a wired network, or a combination thereof.
  • the network 106 can also be an individual network or a collection of many such individual networks, interconnected with each other and functioning as a single large network, e.g., the Internet or an intranet.
  • the network 106 can be one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), and the internet.
  • the network 106 may either be a dedicated network, virtual network, or a shared network, which represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), and Transmission Control Protocol/Internet Protocol (TCP/IP), to communicate with each other.
  • HTTP Hypertext Transfer Protocol
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • the network 106 may include a Global System for Mobile Communication (GSM) network, a Universal Mobile Telecommunications System (UMTS) network, or any other communication network that use any of the commonly used protocols, for example, Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol/Internet Protocol (TCP/IP).
  • GSM Global System for Mobile Communication
  • UMTS Universal Mobile Telecommunications System
  • HTTP Hypertext Transfer Protocol
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • the backup system 102 can be coupled to a backup server 108 over the network 106.
  • the backup server 108 can serve as a repository for maintaining backed-up data of the client devices 104.
  • the backup server 108 can be further coupled to a mirror backup server 1 10 over the network 106.
  • the mirror backup server 1 10 can be a repository where a duplicate of the data of the backup server 108 can be stored and may serve as backup of the backup server 108 in case of failure of the backup server 108.
  • the backup system 102 can create backup of a file of the client devices 104 in a manner so as to optimize a storage space occupied by the backup on a backup server.
  • the file can be an entire file or a part of the file.
  • the file to be backed-up is a curriculum vitae.
  • the file to be backed-up can either be the entire document or certain portions of the curriculum vitae.
  • the file to be backed-up can be selected by or obtained based on a user input.
  • the backup system 102 can selectively save a copy of the file on the backup server 108.
  • the backup system 102 can determine cases in which the file may not have to be backed-up by creating another copy.
  • the backup system 102 can determine an availability of the file in the network 106 and, based on the availability of the file, the backup system 102 can create the backup of the file.
  • the backup system 102 can forego the saving of the copy of the file on the backup server 108, thereby saving considerable amount of storage space on the backup server 108.
  • the backup system 102 may store another parameter associated with the file, allowing the file to still be retrievable, for example, in case of loss of the file from the client device 104.
  • FIG. 1 B illustrates the backup system 102, according to an example of the present subject matter.
  • the backup system 102 may include, for example, a processor 1 12 and modules 1 14 communicatively coupled to the processor 1 12.
  • the processor 1 12 may include microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any other devices that manipulate signals and data based on computer-readable instructions.
  • functions of the various elements shown in the figures, including any functional blocks labeled as "processor(s)" may be provided through the use of dedicated hardware as well as hardware capable of executing computer-readable instructions.
  • the modules 1 14 may also be used as, signal processor(s), state machine(s), logic circuitries, and/or any other device or component that manipulates signals based on operational instructions. Further, the modules 1 14 can be used by hardware, by computer- readable instructions executed by a processing unit, or by a combination thereof.
  • the modules 1 14 can include a priority assignment module 1 16 and backup creation module 1 18.
  • the priority assignment module 1 16 can identify a file to be backed-up on the client device 104 in the 106 network.
  • the network 106 can include intranet or may include the internet.
  • the priority assignment module 1 16 can determine availability of the file in the network. In an example, the priority assignment module 1 16 can determine the availability of the file in the network by searching for the file in the network at locations other than on the client device. For instance, if the file is found in any location in the network other than the client device, then the priority assignment module 1 16 marks the file as available; otherwise, the priority assignment module 1 16 marks the file as unavailable. [0027] Accordingly, based on the availability of the file in the network, the backup creation module 1 18 can create backup of the file.
  • the backup creation module 1 18 can create a copy of the file and save the copy for creating the backup for the file.
  • the backup creation module 1 18 can save the location of the file as part of backing-up the file. For example, the backup creation module 1 18 can create the backup of the file on the backup server.
  • FIG. 1 C illustrates a detailed schematic of the backup system 102 showing various components thereof, according to an example of the present subject matter.
  • the backup system 102 may include the processor 1 12, the modules 1 14, a memory 120, data 122, and interface(s) 124.
  • the processor 1 12, among other capabilities, may fetch and execute computer-readable instructions stored in the memory 120.
  • the memory 120 can include a non- transitory computer-readable medium including, for example, volatile memory, such as Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM), and/or non-volatile memory, such as Read Only Memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
  • volatile memory such as Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM)
  • DRAM Dynamic Random Access Memory
  • non-volatile memory such as Read Only Memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
  • the modules 1 14 can include other module(s) 126.
  • the other module(s) 126 may include computer-readable instructions that supplement applications or functions performed by the backup system 102.
  • the data 122 can include classification data 128, priority data 130, and other data 132.
  • the other data 132 may include data generated and saved by the modules 1 14 for providing various functionalities to the backup system 102.
  • the backup system 102 can be coupled to the plurality of client devices 104 through the interface(s) 124.
  • the client devices 104 can interact with and exchange data with each other and the backup system 102 over the network 106.
  • the interfaces 124 may include a variety of commercially available interfaces, for example, interfaces for peripheral device(s), such as data input output devices, referred to as I/O devices, storage devices, network devices, and intermediate power devices.
  • the interfaces 124 may facilitate multiple communications within a wide variety of networks and protocol types, including wired networks and wireless networks.
  • the backup system 102 can achieve backing up of data from the client devices 104 onto the backup server 108.
  • the backup system 102 can identify cases in which a copy of a file to be backed-up is not to be created and stored on the backup server 108. In such cases, the backup system 102 can store another parameter associated with the file. For instance, the parameter can still allow the backup system 102 to retrieve the file, for example, in case of loss of the file from the client device 104.
  • the priority assignment module 1 16 can determine availability of the file in the network 106.
  • the file can include an entire file or a part of the file.
  • the priority assignment module 1 16 can determine the availability by searching for the file in the network 106.
  • the priority assignment module 1 16 can ascertain whether the file is discoverable in the network 106 at any location other than the client device 104 for which the backup is being created.
  • the priority assignment module 1 16 can search for the file in the network by using a search application program interface (API), such as those used for internet search engine services.
  • API application program interface
  • the priority assignment module 1 16 can assign a priority to the file.
  • the priority assignment module 1 16 can classify the file as private or public, based on the availability of the file in the network. For instance, the priority assignment module 1 16 can classify the file before assigning any priority.
  • the priority assignment module 1 16 can classify a file as private if the file is not discoverable in the network 106 upon being searched. For example, photographs taken from a DSLR camera or a smart phone by a user and stored on a laptop and not uploaded to a social media website or a confidential presentation prepared by a user for work purposes and saved on the laptop can include files that can be classified as private by the priority assignment module 1 16. Further, the priority assignment module 1 16 can classify the file as public if the file is discoverable in the network 106.
  • an image downloaded from the internet and used as a Screensaver or desktop image on a PC, or a song on the client device 104 seeded over a network for downloading can be the files that the priority assignment module 1 16 can classify as public. Further, the priority assignment module 1 16 can store the classification of the file in the classification data 128.
  • the priority assignment module 1 16 can assign the priority to the file based on the classification of the file. For instance, for the file classified as private, i.e., a file unavailable and undiscoverable anywhere else in the network, the priority assignment module 1 16 can assign a priority to indicate that such a file is to be backed-up on the backup server 108. In such a case, in one example, the priority assignment module 1 16 can assign the first priority to the file. On the other hand, for the file classified as public, the priority assignment module 1 16 can assign a priority indicating that such the contents of the file may not have to be backed-up. In said example, the priority assignment module 1 16 can assign the intermediate priority or the second priority to the file, as is described in detail below.
  • the priority assignment module 1 16 can assign the priority to the file based on a number of instances of the file discovered in the network 106. Therefore, in the above mentioned case where the priority assignment module 1 16 determines that no other instance of the file is present in the network 106, i.e., the file is private, the priority assignment module 1 16 can assign the first priority to the file. In an example, the first priority can indicate that the file is to be backed-up along with the contents thereof. [0038] However, where the priority assignment module 1 16 determines that another instance of the file is present in the network 106, i.e., the file is public, the priority assignment module 1 16 can determine the number of instances of the file discovered to assign the priority to the file. In an example, the priority assignment module 1 16 can assign the priority based on availability of a threshold number of instances of the file in the network 106. The threshold number of instances can be predefined and saved in the priority data 130.
  • the priority assignment module 1 16 determines that the threshold number of instances of the file is not discoverable or available in the network 106, then the priority assignment module 1 16 assigns the intermediate priority to the file.
  • the priority assignment module 1 16 ascertains that the file is available in the network 106 in greater number than the threshold number of instances, then the priority assignment module 1 16 can assign the second priority to the file. Therefore, if the file is available in the network but has a few copies, i.e., less than the threshold number, then the priority assignment module 1 16 assigns the file the intermediate priority.
  • the priority assignment module 1 16 assigns the file the second priority.
  • the intermediate priority and the second priority can indicate that contents of the file may not have to be backed-up.
  • the backup creation module 1 18 can create the backup for the file. As mentioned previously, the backup creation module 1 18 can create the backup for the file based on the priority assigned to the file, the priority assigned to the file, in turn, being based on the availability of the file in the network 106.
  • the backup creation module 1 18, in effect, can create the backup for the file based on the availability of the file in the network 106. For instance, when the file is unavailable in the network 106, i.e., the file is classified as private and assigned the first priority, the backup creation module 1 18 can create a copy of the file and save the copy on the backup server 108 to create the backup of the file. In case the file is assigned the second priority, i.e., the file is available in abundance in the network 106, the backup creation module 1 18 can, instead, save the locations in the network 106 at which the file is discoverable as part of creating the backup for that file.
  • the backup creation module 1 18 may not save the contents of the file; however, the backup creation module 1 18 can save, for example, location and other parameters associated with the file. For instance, the other parameters can include the size of the file, and the type of file. In another example, the backup creation module 1 18 can obtain user inputs regarding creation of backup of the file in case the priority assignment module 1 16 assigns intermediate priority to the file.
  • the priority assignment module 1 16 can assign the priority and the backup creation module 1 18 can, accordingly, create the backup, in the same manner as explained above, based on the number of locations that the file is present in the network 106.
  • the backup creation module 1 18 can compress the copy of the file to be saved as backup or de-duplicate the file, or both, before creating the backup of the file on the backup server 108. Therefore, in said example, the backup data can include the copy of the file or the address or location of the file in the network 106.
  • the backup system 102 can provide for making a decision on whether the backup of the file created by the backup system 102 is to be copied over to the mirror backup server 1 10 or not, for instance, based on the priority assigned to the file. In an example, if the priority assignment module 1 16 classifies the file being backed-up as private, i.e., as having first priority, then the backup for that file can be copied on to the mirror backup server 1 10.
  • the priority assignment module 1 16 determines that the file has less than threshold number of instances in the network 106, i.e., assigns the file intermediate priority, then contents of the file may saved for creating the backup; however, the backup including the location and other parameters of the file may be copied to the mirror backup server 1 10.
  • the priority assignment module 1 16 classifies the file being backed-up as public having more than threshold number of instances in the network 106, i.e., the file is assigned the second priority, then backup of that file may not be copied to the mirror backup server 1 10, since the file is already available on the network 106 and can act as a copy.
  • the backup system 102 is to backup a desktop background image onto the backup server 108. Owing to the fact that many users download desktop background images from the internet and such an image can be found at many locations on the internet, the priority assignment module 1 16 can assign the second priority to the image. Accordingly, the backup creation module 1 18, as explained above, may not backup the image in this case. Instead, the backup creation module 1 18 can save the list of addresses or universal resource locators (URLs) from where the image can be downloaded. This helps in reducing the storage space used on the backup server 108. [0047] Further, consider another scenario where the backup system 102 is to backup data from a corporate network of the client devices 104 with Open Source operating system installed on the client devices 104 and is to backup the operating system related files.
  • URLs universal resource locators
  • the 500Mb of files can be compressed to lesser than 500Mb.
  • each of such compressed files from each client machine on the corporate network is stored on the backup server 108 and may run into several Gigabits (Gb) of data.
  • Gb Gigabits
  • the backup of the files may use a slightly more than 500Mb of storage space on the backup server 108.
  • both compression and data de-duplication are used in combination, then the storage space used on the backup server 108 may be less than 500Mb, but the total backup data may still run into a couple of hundreds of Mb.
  • the priority assignment module 1 16 can assign the second priority to the files. This is so because the Open Source operating systems are distributed widely on the internet and each of these files can be downloaded from many locations on the internet. Therefore, the backup creation module 1 18 can store the list of addresses or URLs of the files available on the internet. Therefore, the data to be backed-up on the backup server 108, in such a case, may be a few Mb of storage space.
  • Methods 200 and 300 are described in Figure 2 and Figure 3, respectively, for creating backup, according to an example of the present subject matter. While Figure 2 illustrates an overview of the method 200 for creating backup, Figure 3 illustrates a detailed method 300 for creating backup. [0051] The order in which the methods 200 and 300 are described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any appropriate order to execute the methods 200 and 300 or an alternative method. Additionally, individual blocks may be deleted from the methods 200 and 300 without departing from the spirit and scope of the subject matter described herein.
  • the methods 200 and 300 can be performed by programmed computing devices, for example, based on instructions retrieved from non- transitory computer readable media.
  • the computer readable media can include machine-executable or computer-executable instructions to perform all or portions of the described method.
  • the computer readable media may be, for example, digital memories, magnetic storage media, such as a magnetic disks and magnetic tapes, hard drives, or optically readable data storage media.
  • the methods 200 and 300 may be performed by a computing system, such as the backup system 102.
  • a computing system such as the backup system 102.
  • the components of the backup system 102 performing the various steps of the methods 200 and 300 are not described in detail with reference to Figure 2 and Figure 3. Such details are provided in the description provided with reference to Figure 1 A and Figure 1 B.
  • a file to be backed-up can be identified.
  • the file can be identified and obtained from the client device 104 in the network 106, the client device 104 being coupled to various other devices, such as the client devices 104 and servers, in the network 106 to exchange data.
  • the file to be backed-up can be an entire file or a part of the file.
  • a priority is assigned to the file based on availability of the file in the network 106.
  • determining the availability can involve searching of the file in the network 1 06.
  • the assignment of priority can involve classification of the file as private or public, based on the availability of the file in the network 106.
  • the assignment of priority to the file can be further based on the classification of the file.
  • the priority can be assigned to the file based on a number of instances of the file in the network 106.
  • the file can be assigned a first priority.
  • the priority can be assigned to the file based on a threshold number of instances of the file. When the threshold number of instances of the file is not available in the network 106, then the file is assigned an intermediate priority. On the other hand, if the file is available in the network 1 06 in greater number than the threshold number of instances, then the file is assigned a second priority.
  • the backup of the file can be created. For example, based on the assigned priority, a copy of the file to be backed-up is created and saved, or an address of the file indicating the location of the file in the network is saved.
  • the file to be backed-up is obtained, for instance, from the client device 104 in the network 106.
  • the file is classified as private and assigned the first priority.
  • the first priority indicates that the file is to be backed-up by creating another copy, since any other copy of the file is not discoverable in the network 106.
  • the file is classified as public, but the assignment of priority is based on the threshold number of instances of the file. Accordingly, at block 308, it is determined whether the threshold number of instances of the file is available in the network 106 or not.
  • the file is classified as public and assigned an intermediate priority.
  • the intermediate priority can indicate that the contents of the file may not have to be saved as part of creating the backup.
  • the file is still classified as public, but it is assigned the second priority.
  • the second priority can indicate that the file is abundantly available and another copy of the file is not to be created for creating backup.
  • the backup is created for the file based on the priority assigned to the file. Further, since the priority is based on the availability of the file in the network 106, the backup is created based on the availability of the file in the network 106. [0065] For example, in case the file is assigned the first priority, it indicates that the contents of the file are to be backed-up. Therefore, in such a case, a copy of the file to be backed-up is created and saved on the backup server 108 to create the backup. On the other hand, if the file is assigned the second priority, it indicates that the contents of the file may not have to be backed-up. In such a scenario, the locations of the file can be stored on the backup server to create the backup.
  • Figure 4 illustrates an example network environment 400 using a non-transitory computer readable medium 402 for creating backup, according to an example of the present subject matter.
  • the network environment 400 may be a public networking environment or a private networking environment.
  • the network environment 400 includes a processing resource 404 communicatively coupled to the non-transitory computer readable medium 402 through a communication link 406.
  • the processing resource 404 can be a processor of a computing system, such as the backup system 102.
  • the non-transitory computer readable medium 402 can be, for example, an internal memory device or an external memory device.
  • the communication link 406 may be a direct communication link, such as one formed through a memory read/write interface.
  • the communication link 406 may be an indirect communication link, such as one formed through a network interface.
  • the processing resource 404 can access the non-transitory computer readable medium 402 through a network 408.
  • the network 408 may be a single network or a combination of multiple networks and may use a variety of communication protocols.
  • the processing resource 404 and the non-transitory computer readable medium 402 may also be communicatively coupled to data sources 410 over the network 408.
  • the data sources 410 can include, for example, databases and computing devices.
  • the data sources 410 may be used by the database administrators and other users to communicate with the processing resource 404.
  • the non-transitory computer readable medium 402 includes a set of computer readable instructions, such as the priority assignment module 1 16 and the backup creation module 1 18.
  • the set of computer readable instructions can be accessed by the processing resource 404 through the communication link 406 and subsequently executed to perform acts for network service insertion.
  • the priority assignment module 1 16 can obtain a file to be backed-up on the client device 104 in a network.
  • the network can include an intranet or may include the internet and the client device 104 can be coupled to a plurality of other devices to exchange data over the network.
  • the priority assignment module 1 16 can determine availability of the file in the network. In an example, the priority assignment module 1 16 can determine the availability of the file in the network by searching for the file in the network at locations other than on the client device. For instance, if the file is found in any location in the network other than the client device, then the priority assignment module 1 16 marks the file as available; otherwise, the priority assignment module 1 16 marks the file as unavailable.
  • the backup creation module 1 18 can create backup of the file. For instance, when the priority assignment module 1 16 determines the file to be unavailable in the network, the backup creation module 1 18 can create a copy of the file and save the copy for creating the backup for the file. On the other hand, when the priority assignment module 1 16 determines the file to be available at another location in the network, instead of creating another copy of the file, the backup creation module 1 18 can save the location of the file as part of backing-up the file. For example, the backup creation module 1 18 can create the backup of the file on the backup server.
  • the backup system 102 can assign a plurality of intermediate priorities between the first and the second priority and the manner of creating the backup for each such intermediate priority can be defined by an administrator and stored in the priority data 130.
  • the backup system 102 can be the device from which data is to be backed-up. In other words, the backup system 102 can create backup of the data stored thereon.

Abstract

Examples of creating backup are described. According to one example, a file to be backed-up is identified, and based on availability of the file in a network, a priority is assigned to the file. Further, backup of the file is created based on the priority assigned to the file.

Description

CREATING BACKUP
BACKGROUND
[0001 ] Backup and restore mechanisms ensure that information stored on any storage media on devices, such as personal computers (PCs), laptops, tablets PCs, and smart phones, is recoverable in the event of loss or damage to the device. For the purpose of providing such facility, the backup and restore mechanisms maintain an additional copy of the data at a storage location, for example, a backup server, other than the storage media on the devices. Therefore, creating the backup of data involves copying and reproducing the data from local systems to another storage location. The backed-up data is retrievable from the other storage location to the local systems.
BRIEF DESCRIPTION OF FIGURES
[0002] Figure 1A illustrates a network environment having a backup system for creating backup, according to an example of the present subject matter.
[0003] Figure 1 B illustrates a schematic of the backup system, according to an example of the present subject matter.
[0004] Figure 1 C illustrates a detailed schematic of the backup system, according to an example of the present subject matter.
[0005] Figure 2 illustrates a method for creating backup, according to an example of the present subject matter.
[0006] Figure 3 illustrates a detailed method for creating backup, according to an example of the present subject matter.
[0007] Figure 4 illustrates a network environment for creating backup, according to an example of the present subject matter.
DETAILED DESCRIPTION
[0008] Several techniques are available and generally used for backing up data. Such techniques usually involve reduction of size of backup data that is stored on backup server(s). The backup data can include a copy of the data to be backed-up from a local system to the backup server. For example, one such generally used technique can involve compression or de-duplication or both, of the data to be backed-up. However, such techniques may not considerably reduce the size of the backup data to be stored on the backup server.
[0009] Consider a scenario where data is being backed-up from client machines in a network, and files related to an Open Source operating system are being backed-up from the client machines. The generally used compression technique can compress the data to a slightly smaller size but the compressed data from each client machine when stored on the backup server may occupy a considerable amount of storage space. In the same scenario, if data de- duplication is used, then there will be one copy of the operating system files stored on the backup server. In addition, the backup data of each client machine will still use considerable storage space on the backup server. Further, if both compression and data de-duplication is used together, then the storage space used for backing up data of each client machine on the backup server may be less than the size of the file being backed-up; however, the total backup data of the network may run into a couple of hundreds of Mb.
[0010] Examples of creating backup are described herein. In an example, the present subject matter provides an approach for creating the backup of data based on availability of the data in a network. For instance, the network can be intranet or the internet. In an example, the file can be a complete file or a part of the file, and stored on a client device coupled to the network.
[0011] In accordance with an example of the present subject matter, for creating the backup of a file, availability of the file is determined in the network. In an example, determining the availability can involve searching of the file in the network and based on whether the file is found on the network or not, the availability of the file can be determined. Further, based on the availability of the file, a priority can be assigned to the file and the backup of the file can be created based on the priority assigned to the file.
[0012] According to an aspect of the present subject matter, the assignment of priority can involve classification of the file as private or public, based on the availability of the file in the network. In case the file is unavailable in the network and cannot be located, the file is classified as private and, if the file is available in the network, then the file is classified as public.
[0013] In one example, classification of the file can be achieved before the file is assigned any priority. Therefore, the classification of the file can precede the assignment of priority to the file. In said example, the assignment of priority to the file can be based on the classification of the file. For instance, the file classified as private, i.e., a file unavailable in the network, can be assigned a priority to indicate that such a file is to be backed-up. On the other hand, the file classified as public can be assigned a priority indicating that a copy of such a file may not have to be backed-up.
[0014] In addition, according to an aspect, the priority can be assigned to the file based on a number of instances of the file in the network. In another example, number of locations that the file is present at can also be used as a basis for assigning the priority to the file.
[0015] In case the file is unavailable in the network or, in other words, there is no other instance of the file in the network, i.e., the file is private, then the file can be assigned a first priority. In an example, the first priority can indicate that the entire contents of the file have to be backed-up. Therefore, in such a case, a copy of the file to be backed-up is created and saved to create backup of the file. In an example, the copy can be saved on a backup server.
[0016] Further, in case the file is available in the network, i.e., the file is public, then, in an example, the priority can be assigned to the file based on a threshold number of instances of the file, the threshold number of instances being predefined. For instance, if the threshold number of instances of the file is not available in the network, then the file is assigned an intermediate priority. On the other hand, if the file is available in the network in greater number than the threshold number of instances, then the file is assigned a second priority. The intermediate priority and the second priority can indicate that the contents of the file may not have to be backed-up. For example, in case the file is assigned the second priority, locations of the file in the network can be stored as part of creating the backup for that file. In said example, the locations of the file can be stored on the backup server. Further, in case the file is assigned intermediate priority, in one instance, the location and other parameter associated with the file can be saved, instead of saving the copy of the file.
[0017] The present subject matter facilitates in load balancing on the backup server. Consider a scenario where the file is being restored from the backup server to the client device. If the file is classified as public, i.e., the file can be found on the network, in case of restore operation, the backup server can just send the locations of the file to the client device and the client device can obtain the file directly from locations in the network.
[0018] The above aspects are further described in the figures and associated description below. It should be noted that the description and figures merely illustrate the principles of the present subject matter. Therefore, various arrangements that embody the principles of the present subject matter, although not explicitly described or shown herein, can be devised from the description and are included within its scope.
[0019] Figure 1 A illustrates a network environment 100 having a backup system 102 for creating backup, according to an example of the present subject matter. Examples of the backup system 102 can include, but is not limited to, servers, desktop computers, laptops, and the like. In an example, as depicted in Figure 1 A, the backup system 102 can be coupled to a plurality of client devices
104-1 , 104-2 104-N, collectively referred to as client devices 104 and individually referred to as a client device 104 over a network 106. In an example, the backup system 102 can communicate with the client devices 104 over the network 106 to exchange information.
[0020] The network 106 may be a wireless network, a wired network, or a combination thereof. The network 106 can also be an individual network or a collection of many such individual networks, interconnected with each other and functioning as a single large network, e.g., the Internet or an intranet. The network 106 can be one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), and the internet. The network 106 may either be a dedicated network, virtual network, or a shared network, which represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), and Transmission Control Protocol/Internet Protocol (TCP/IP), to communicate with each other. In an example, the network 106 may include a Global System for Mobile Communication (GSM) network, a Universal Mobile Telecommunications System (UMTS) network, or any other communication network that use any of the commonly used protocols, for example, Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol/Internet Protocol (TCP/IP).
[0021] In addition, the backup system 102 can be coupled to a backup server 108 over the network 106. In an example, the backup server 108 can serve as a repository for maintaining backed-up data of the client devices 104. Further, the backup server 108 can be further coupled to a mirror backup server 1 10 over the network 106. In an example, the mirror backup server 1 10 can be a repository where a duplicate of the data of the backup server 108 can be stored and may serve as backup of the backup server 108 in case of failure of the backup server 108.
[0022] In operation, the backup system 102 can create backup of a file of the client devices 104 in a manner so as to optimize a storage space occupied by the backup on a backup server. The file can be an entire file or a part of the file. For instance, consider the file to be backed-up is a curriculum vitae. In such a case, the file to be backed-up can either be the entire document or certain portions of the curriculum vitae. In an example, the file to be backed-up can be selected by or obtained based on a user input.
[0023] According to an aspect, the backup system 102 can selectively save a copy of the file on the backup server 108. In other words, the backup system 102 can determine cases in which the file may not have to be backed-up by creating another copy. In an example, for creating the backup of a file, the backup system 102 can determine an availability of the file in the network 106 and, based on the availability of the file, the backup system 102 can create the backup of the file. In such cases, the backup system 102 can forego the saving of the copy of the file on the backup server 108, thereby saving considerable amount of storage space on the backup server 108. Instead, the backup system 102 may store another parameter associated with the file, allowing the file to still be retrievable, for example, in case of loss of the file from the client device 104.
[0024] Figure 1 B illustrates the backup system 102, according to an example of the present subject matter. The backup system 102 may include, for example, a processor 1 12 and modules 1 14 communicatively coupled to the processor 1 12. The processor 1 12 may include microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any other devices that manipulate signals and data based on computer-readable instructions. Further, functions of the various elements shown in the figures, including any functional blocks labeled as "processor(s)", may be provided through the use of dedicated hardware as well as hardware capable of executing computer-readable instructions.
[0025] The modules 1 14, amongst other things, include routines, programs, objects, components, and data structures, which perform particular tasks or implement particular abstract data types. The modules 1 14 may also be used as, signal processor(s), state machine(s), logic circuitries, and/or any other device or component that manipulates signals based on operational instructions. Further, the modules 1 14 can be used by hardware, by computer- readable instructions executed by a processing unit, or by a combination thereof. The modules 1 14 can include a priority assignment module 1 16 and backup creation module 1 18.
[0026] According to an aspect, the priority assignment module 1 16 can identify a file to be backed-up on the client device 104 in the 106 network. The network 106, as mentioned previously, can include intranet or may include the internet. Further, the priority assignment module 1 16 can determine availability of the file in the network. In an example, the priority assignment module 1 16 can determine the availability of the file in the network by searching for the file in the network at locations other than on the client device. For instance, if the file is found in any location in the network other than the client device, then the priority assignment module 1 16 marks the file as available; otherwise, the priority assignment module 1 16 marks the file as unavailable. [0027] Accordingly, based on the availability of the file in the network, the backup creation module 1 18 can create backup of the file. For instance, when the priority assignment module 1 16 determines the file to be unavailable in the network, the backup creation module 1 18 can create a copy of the file and save the copy for creating the backup for the file. On the other hand, when the priority assignment module 1 16 determines the file to be available at another location in the network, instead of creating another copy of the file, the backup creation module 1 18 can save the location of the file as part of backing-up the file. For example, the backup creation module 1 18 can create the backup of the file on the backup server. [0028] The various components of the backup system 102 are described in detail in conjunction with Figure 1 C.
[0029] Figure 1 C illustrates a detailed schematic of the backup system 102 showing various components thereof, according to an example of the present subject matter. The backup system 102, among other things, may include the processor 1 12, the modules 1 14, a memory 120, data 122, and interface(s) 124. The processor 1 12, among other capabilities, may fetch and execute computer-readable instructions stored in the memory 120. The memory 120, communicatively coupled to the processor 1 12, can include a non- transitory computer-readable medium including, for example, volatile memory, such as Static Random Access Memory (SRAM) and Dynamic Random Access Memory (DRAM), and/or non-volatile memory, such as Read Only Memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
[0030] Further, in an example, in addition to the priority assignment module 1 16 and the backup creation module 1 18, the modules 1 14 can include other module(s) 126. The other module(s) 126 may include computer-readable instructions that supplement applications or functions performed by the backup system 102. In addition, the data 122 can include classification data 128, priority data 130, and other data 132. The other data 132 may include data generated and saved by the modules 1 14 for providing various functionalities to the backup system 102.
[0031] Further, the backup system 102 can be coupled to the plurality of client devices 104 through the interface(s) 124. The client devices 104 can interact with and exchange data with each other and the backup system 102 over the network 106. The interfaces 124 may include a variety of commercially available interfaces, for example, interfaces for peripheral device(s), such as data input output devices, referred to as I/O devices, storage devices, network devices, and intermediate power devices. The interfaces 124 may facilitate multiple communications within a wide variety of networks and protocol types, including wired networks and wireless networks.
[0032] As explained above, the backup system 102 can achieve backing up of data from the client devices 104 onto the backup server 108. The backup system 102 can identify cases in which a copy of a file to be backed-up is not to be created and stored on the backup server 108. In such cases, the backup system 102 can store another parameter associated with the file. For instance, the parameter can still allow the backup system 102 to retrieve the file, for example, in case of loss of the file from the client device 104.
[0033] According to an example, for the purpose of creating the backup, the priority assignment module 1 16 can determine availability of the file in the network 106. For instance, the file can include an entire file or a part of the file. In an example, as mentioned above, the priority assignment module 1 16 can determine the availability by searching for the file in the network 106. The priority assignment module 1 16 can ascertain whether the file is discoverable in the network 106 at any location other than the client device 104 for which the backup is being created. In one case, the priority assignment module 1 16 can search for the file in the network by using a search application program interface (API), such as those used for internet search engine services.
[0034] Further, based on the availability of the file, the priority assignment module 1 16 can assign a priority to the file. According to an aspect of the present subject matter, as part of assigning the priority, the priority assignment module 1 16 can classify the file as private or public, based on the availability of the file in the network. For instance, the priority assignment module 1 16 can classify the file before assigning any priority.
[0035] As part of classification, the priority assignment module 1 16 can classify a file as private if the file is not discoverable in the network 106 upon being searched. For example, photographs taken from a DSLR camera or a smart phone by a user and stored on a laptop and not uploaded to a social media website or a confidential presentation prepared by a user for work purposes and saved on the laptop can include files that can be classified as private by the priority assignment module 1 16. Further, the priority assignment module 1 16 can classify the file as public if the file is discoverable in the network 106. In one example, an image downloaded from the internet and used as a Screensaver or desktop image on a PC, or a song on the client device 104 seeded over a network for downloading can be the files that the priority assignment module 1 16 can classify as public. Further, the priority assignment module 1 16 can store the classification of the file in the classification data 128.
[0036] According to an aspect, the priority assignment module 1 16 can assign the priority to the file based on the classification of the file. For instance, for the file classified as private, i.e., a file unavailable and undiscoverable anywhere else in the network, the priority assignment module 1 16 can assign a priority to indicate that such a file is to be backed-up on the backup server 108. In such a case, in one example, the priority assignment module 1 16 can assign the first priority to the file. On the other hand, for the file classified as public, the priority assignment module 1 16 can assign a priority indicating that such the contents of the file may not have to be backed-up. In said example, the priority assignment module 1 16 can assign the intermediate priority or the second priority to the file, as is described in detail below.
[0037] In addition, according to an aspect, the priority assignment module 1 16 can assign the priority to the file based on a number of instances of the file discovered in the network 106. Therefore, in the above mentioned case where the priority assignment module 1 16 determines that no other instance of the file is present in the network 106, i.e., the file is private, the priority assignment module 1 16 can assign the first priority to the file. In an example, the first priority can indicate that the file is to be backed-up along with the contents thereof. [0038] However, where the priority assignment module 1 16 determines that another instance of the file is present in the network 106, i.e., the file is public, the priority assignment module 1 16 can determine the number of instances of the file discovered to assign the priority to the file. In an example, the priority assignment module 1 16 can assign the priority based on availability of a threshold number of instances of the file in the network 106. The threshold number of instances can be predefined and saved in the priority data 130.
[0039] Accordingly, in said example, if the priority assignment module 1 16 determines that the threshold number of instances of the file is not discoverable or available in the network 106, then the priority assignment module 1 16 assigns the intermediate priority to the file. On the other hand, if the priority assignment module 1 16 ascertains that the file is available in the network 106 in greater number than the threshold number of instances, then the priority assignment module 1 16 can assign the second priority to the file. Therefore, if the file is available in the network but has a few copies, i.e., less than the threshold number, then the priority assignment module 1 16 assigns the file the intermediate priority. However, if the file is abundantly available in the network, i.e., has greater number of instances than the threshold number, then the priority assignment module 1 16 assigns the file the second priority. As mentioned above, the intermediate priority and the second priority can indicate that contents of the file may not have to be backed-up. [0040] Further, once the priority assignment module 1 16 has assigned the priority to the file, the backup creation module 1 18 can create the backup for the file. As mentioned previously, the backup creation module 1 18 can create the backup for the file based on the priority assigned to the file, the priority assigned to the file, in turn, being based on the availability of the file in the network 106. Therefore, according to an aspect, the backup creation module 1 18, in effect, can create the backup for the file based on the availability of the file in the network 106. For instance, when the file is unavailable in the network 106, i.e., the file is classified as private and assigned the first priority, the backup creation module 1 18 can create a copy of the file and save the copy on the backup server 108 to create the backup of the file. In case the file is assigned the second priority, i.e., the file is available in abundance in the network 106, the backup creation module 1 18 can, instead, save the locations in the network 106 at which the file is discoverable as part of creating the backup for that file.
[0041] Further, in case the file is assigned intermediate priority, the backup creation module 1 18 may not save the contents of the file; however, the backup creation module 1 18 can save, for example, location and other parameters associated with the file. For instance, the other parameters can include the size of the file, and the type of file. In another example, the backup creation module 1 18 can obtain user inputs regarding creation of backup of the file in case the priority assignment module 1 16 assigns intermediate priority to the file.
[0042] In another example, the priority assignment module 1 16 can assign the priority and the backup creation module 1 18 can, accordingly, create the backup, in the same manner as explained above, based on the number of locations that the file is present in the network 106.
[0043] Further, the backup creation module 1 18 can compress the copy of the file to be saved as backup or de-duplicate the file, or both, before creating the backup of the file on the backup server 108. Therefore, in said example, the backup data can include the copy of the file or the address or location of the file in the network 106.
[0044] According to an example, the backup system 102 can provide for making a decision on whether the backup of the file created by the backup system 102 is to be copied over to the mirror backup server 1 10 or not, for instance, based on the priority assigned to the file. In an example, if the priority assignment module 1 16 classifies the file being backed-up as private, i.e., as having first priority, then the backup for that file can be copied on to the mirror backup server 1 10. In another example, if the priority assignment module 1 16 determines that the file has less than threshold number of instances in the network 106, i.e., assigns the file intermediate priority, then contents of the file may saved for creating the backup; however, the backup including the location and other parameters of the file may be copied to the mirror backup server 1 10. In said example, if the priority assignment module 1 16 classifies the file being backed-up as public having more than threshold number of instances in the network 106, i.e., the file is assigned the second priority, then backup of that file may not be copied to the mirror backup server 1 10, since the file is already available on the network 106 and can act as a copy.
[0045] The creation of backups by the backup system 102, in accordance with the present subject matter, is explained further with the help of the following examples.
[0046] Consider the backup system 102 is to backup a desktop background image onto the backup server 108. Owing to the fact that many users download desktop background images from the internet and such an image can be found at many locations on the internet, the priority assignment module 1 16 can assign the second priority to the image. Accordingly, the backup creation module 1 18, as explained above, may not backup the image in this case. Instead, the backup creation module 1 18 can save the list of addresses or universal resource locators (URLs) from where the image can be downloaded. This helps in reducing the storage space used on the backup server 108. [0047] Further, consider another scenario where the backup system 102 is to backup data from a corporate network of the client devices 104 with Open Source operating system installed on the client devices 104 and is to backup the operating system related files. Now, if the generally used compression technique is used on the client devices 104 for backing up the data, then considering that the files to be backed-up are about 500 Megabits (Mb) in size, the 500Mb of files can be compressed to lesser than 500Mb. However, each of such compressed files from each client machine on the corporate network is stored on the backup server 108 and may run into several Gigabits (Gb) of data. [0048] In the same scenario, if generally used data de-duplication technique is used, then one copy of the operating system files is stored on the backup server 108; the other copies are reference copies. In addition, the backup of the files may use a slightly more than 500Mb of storage space on the backup server 108. Additionally, if both compression and data de-duplication are used in combination, then the storage space used on the backup server 108 may be less than 500Mb, but the total backup data may still run into a couple of hundreds of Mb.
[0049] On the other hand, in the same scenario if the backup system 102 in accordance with the present subject matter is used, then the priority assignment module 1 16 can assign the second priority to the files. This is so because the Open Source operating systems are distributed widely on the internet and each of these files can be downloaded from many locations on the internet. Therefore, the backup creation module 1 18 can store the list of addresses or URLs of the files available on the internet. Therefore, the data to be backed-up on the backup server 108, in such a case, may be a few Mb of storage space.
[0050] Methods 200 and 300 are described in Figure 2 and Figure 3, respectively, for creating backup, according to an example of the present subject matter. While Figure 2 illustrates an overview of the method 200 for creating backup, Figure 3 illustrates a detailed method 300 for creating backup. [0051] The order in which the methods 200 and 300 are described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any appropriate order to execute the methods 200 and 300 or an alternative method. Additionally, individual blocks may be deleted from the methods 200 and 300 without departing from the spirit and scope of the subject matter described herein.
[0052] The methods 200 and 300 can be performed by programmed computing devices, for example, based on instructions retrieved from non- transitory computer readable media. The computer readable media can include machine-executable or computer-executable instructions to perform all or portions of the described method. The computer readable media may be, for example, digital memories, magnetic storage media, such as a magnetic disks and magnetic tapes, hard drives, or optically readable data storage media.
[0053] The methods 200 and 300 may be performed by a computing system, such as the backup system 102. For the sake of brevity of description of Figure 2 and Figure 3, the components of the backup system 102 performing the various steps of the methods 200 and 300 are not described in detail with reference to Figure 2 and Figure 3. Such details are provided in the description provided with reference to Figure 1 A and Figure 1 B. [0054] Referring to Figure 2, at block 202, a file to be backed-up can be identified. In an example, the file can be identified and obtained from the client device 104 in the network 106, the client device 104 being coupled to various other devices, such as the client devices 104 and servers, in the network 106 to exchange data. Further, in one case, the file to be backed-up can be an entire file or a part of the file.
[0055] At block 204, a priority is assigned to the file based on availability of the file in the network 106. In an example, determining the availability can involve searching of the file in the network 1 06. Further, according to an aspect of the present subject matter, the assignment of priority can involve classification of the file as private or public, based on the availability of the file in the network 106. In said example, the assignment of priority to the file can be further based on the classification of the file.
[0056] In addition, according to an aspect, the priority can be assigned to the file based on a number of instances of the file in the network 106. In the above case, where there are no instances of the file in the network 106 other than that on the client device, i.e., the file is classified as private, the file can be assigned a first priority. Further, in case the file is available in the network 106, i.e., the file is public, the priority can be assigned to the file based on a threshold number of instances of the file. When the threshold number of instances of the file is not available in the network 106, then the file is assigned an intermediate priority. On the other hand, if the file is available in the network 1 06 in greater number than the threshold number of instances, then the file is assigned a second priority.
[0057] At block 206, based on the priority assigned to the file, the backup of the file can be created. For example, based on the assigned priority, a copy of the file to be backed-up is created and saved, or an address of the file indicating the location of the file in the network is saved.
[0058] Referring to Figure 3, at block 302, the file to be backed-up is obtained, for instance, from the client device 104 in the network 106. [0059] At block 304, it is determined whether the file is available in the network 106 or not. In an example, to determine whether the file is available in the network, the file can be searched for in the network 106.
[0060] If at block 304, it is determined that the file is not available or discoverable in the network 106 (NO path from block 304), it means that the file is not present anywhere except on the client device. Accordingly, at block 306, the file is classified as private and assigned the first priority. The first priority indicates that the file is to be backed-up by creating another copy, since any other copy of the file is not discoverable in the network 106. [0061] If at block 304, it is determined that the file is available, i.e., discoverable in the network (YES path from block 304), then the file is classified as public, but the assignment of priority is based on the threshold number of instances of the file. Accordingly, at block 308, it is determined whether the threshold number of instances of the file is available in the network 106 or not.
[0062] In case the threshold number of instances of the file is not available in the network 106 (NO path from block 308), then at block 310, the file is classified as public and assigned an intermediate priority. The intermediate priority can indicate that the contents of the file may not have to be saved as part of creating the backup.
[0063] In case the threshold number of instances of the file is available in the network 106, (YES path from block 308), then at block 312, the file is still classified as public, but it is assigned the second priority. In an example, the second priority can indicate that the file is abundantly available and another copy of the file is not to be created for creating backup.
[0064] Further, at block 314, the backup is created for the file based on the priority assigned to the file. Further, since the priority is based on the availability of the file in the network 106, the backup is created based on the availability of the file in the network 106. [0065] For example, in case the file is assigned the first priority, it indicates that the contents of the file are to be backed-up. Therefore, in such a case, a copy of the file to be backed-up is created and saved on the backup server 108 to create the backup. On the other hand, if the file is assigned the second priority, it indicates that the contents of the file may not have to be backed-up. In such a scenario, the locations of the file can be stored on the backup server to create the backup.
[0066] Figure 4 illustrates an example network environment 400 using a non-transitory computer readable medium 402 for creating backup, according to an example of the present subject matter. The network environment 400 may be a public networking environment or a private networking environment. In one example, the network environment 400 includes a processing resource 404 communicatively coupled to the non-transitory computer readable medium 402 through a communication link 406.
[0067] For example, the processing resource 404 can be a processor of a computing system, such as the backup system 102. The non-transitory computer readable medium 402 can be, for example, an internal memory device or an external memory device. In one example, the communication link 406 may be a direct communication link, such as one formed through a memory read/write interface. In another example, the communication link 406 may be an indirect communication link, such as one formed through a network interface. In such a case, the processing resource 404 can access the non-transitory computer readable medium 402 through a network 408. The network 408 may be a single network or a combination of multiple networks and may use a variety of communication protocols. [0068] The processing resource 404 and the non-transitory computer readable medium 402 may also be communicatively coupled to data sources 410 over the network 408. The data sources 410 can include, for example, databases and computing devices. The data sources 410 may be used by the database administrators and other users to communicate with the processing resource 404.
[0069] In one example, the non-transitory computer readable medium 402 includes a set of computer readable instructions, such as the priority assignment module 1 16 and the backup creation module 1 18. The set of computer readable instructions, referred to as instructions hereinafter, can be accessed by the processing resource 404 through the communication link 406 and subsequently executed to perform acts for network service insertion.
[0070] For discussion purposes, the execution of the instructions by the processing resource 404 has been described with reference to various components introduced earlier with reference to description of Figure 1 A and Figure 1 B. [0071] On execution by the processing resource 404, the priority assignment module 1 16 can obtain a file to be backed-up on the client device 104 in a network. The network can include an intranet or may include the internet and the client device 104 can be coupled to a plurality of other devices to exchange data over the network. Further, the priority assignment module 1 16 can determine availability of the file in the network. In an example, the priority assignment module 1 16 can determine the availability of the file in the network by searching for the file in the network at locations other than on the client device. For instance, if the file is found in any location in the network other than the client device, then the priority assignment module 1 16 marks the file as available; otherwise, the priority assignment module 1 16 marks the file as unavailable.
[0072] Accordingly, based on the availability of the file in the network, the backup creation module 1 18 can create backup of the file. For instance, when the priority assignment module 1 16 determines the file to be unavailable in the network, the backup creation module 1 18 can create a copy of the file and save the copy for creating the backup for the file. On the other hand, when the priority assignment module 1 16 determines the file to be available at another location in the network, instead of creating another copy of the file, the backup creation module 1 18 can save the location of the file as part of backing-up the file. For example, the backup creation module 1 18 can create the backup of the file on the backup server.
[0073] Further, while the above description is provided with reference to assignment of the first priority, the intermediate priority, and the second priority, the backup system 102 can assign a plurality of intermediate priorities between the first and the second priority and the manner of creating the backup for each such intermediate priority can be defined by an administrator and stored in the priority data 130. In addition, although the above description is provided as the backup system 102 creating the backup of data on the client device 104, as mentioned previously, the backup system 102 can be the device from which data is to be backed-up. In other words, the backup system 102 can create backup of the data stored thereon.
[0074] Although examples for creating backup have been described in language specific to structural features and/or methods, it is to be understood that the appended claims are not limited to the specific features or methods described. Rather, the specific features and methods are disclosed as examples for creating backup.

Claims

I/We claim:
1 . A method comprising: identifying a file to be backed-up; assigning a priority to the file based on availability of the file in a network; and creating backup of the file based on the priority assigned to the file.
2. The method as claimed in claim 1 , wherein the assigning comprises assigning a first priority to the file when the file is unavailable in the network, the creating the backup comprising saving a copy of the file assigned the first priority.
3. The method as claimed in claim 1 , wherein the assigning is based on a number of instances of the file available in the network.
4. The method as claimed in claim 3, wherein the creating the backup comprises saving a location of the file.
5. The method as claimed in claim 1 further comprising copying the backup to a mirror backup server, based on the priority assigned to the file.
6. A backup system comprising:
a processor;
a priority assignment module coupled to the processor to: identify a file to be backed-up; and
determine availability of the file in a network; and backup creation module to create backup based on the availability of the file.
7. The backup system as claimed in claim 6, wherein the priority assignment module is to:
determine whether the file is unavailable in the network; classify the file as private when the file is unavailable; and assign a first priority to the file classified as private.
8. The backup system as claimed in claim 7, wherein the backup creation module saves contents of the file classified as private.
9. The backup system as claimed in claim 6, wherein the priority assignment module is to: classify the file as public, when the file is available; determine whether a threshold number of instances of the file are available in the network; and assign a priority to the file based on the threshold number of instances of the file available in the network.
10. The backup system as claimed in claim 9, wherein the backup creation module saves a location of the file, based on the priority assigned to the file.
1 1 . A non-transitory computer-readable medium comprising instructions executable by a processing resource to: determine availability of a file to be backed-up, wherein the availability of the file is determined based on number of instances of the file available in a network; assign a priority to the file based on the availability of the file; and create backup of the file based on the priority assigned to the file.
12. The non-transitory computer-readable medium as claimed in claim 1 1 further comprising instructions executable by the processor to: assign a first priority to the file unavailable in the network; and create the backup by saving a copy of the file
13. The non-transitory computer-readable medium as claimed in claim 1 1 further comprising instructions executable by the processor to copy the backup to a mirror backup server, based on the priority assigned to the file.
14. The non-transitory computer-readable medium as claimed in claim 1 1 further comprising instructions executable by the processor to assign a second priority to the file having more than a threshold number of instances available in the network.
The non-transitory computer-readable medium as claimed in claim 1 1 further comprising instructions executable by the processor to create the backup by saving a location of the file.
PCT/EP2015/059237 2015-01-31 2015-04-28 Creating backup WO2016119910A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN493CH2015 2015-01-31
IN493/CHE/2015 2015-01-31

Publications (1)

Publication Number Publication Date
WO2016119910A1 true WO2016119910A1 (en) 2016-08-04

Family

ID=53188998

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/059237 WO2016119910A1 (en) 2015-01-31 2015-04-28 Creating backup

Country Status (1)

Country Link
WO (1) WO2016119910A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0899662A1 (en) * 1997-08-29 1999-03-03 Hewlett-Packard Company Backup and restore system for a computer network
WO1999012098A1 (en) * 1997-08-29 1999-03-11 Hewlett-Packard Company Data backup and recovery systems
US8055614B1 (en) * 2008-12-23 2011-11-08 Symantec Corporation Method and apparatus for providing single instance restoration of data files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0899662A1 (en) * 1997-08-29 1999-03-03 Hewlett-Packard Company Backup and restore system for a computer network
WO1999012098A1 (en) * 1997-08-29 1999-03-11 Hewlett-Packard Company Data backup and recovery systems
US8055614B1 (en) * 2008-12-23 2011-11-08 Symantec Corporation Method and apparatus for providing single instance restoration of data files

Similar Documents

Publication Publication Date Title
US11494273B2 (en) Holistically protecting serverless applications across one or more cloud computing environments
US20220222104A1 (en) Cross-hypervisor live-mount of backed up virtual machine data
US20200364194A1 (en) Migration of a database management system to cloud storage
US9424136B1 (en) Systems and methods for creating optimized synthetic backup images
US10503604B2 (en) Virtual machine data protection
US11288135B2 (en) Synthesizing a restore image from one or more secondary copies to facilitate data restore operations to a file server
US8548953B2 (en) File deduplication using storage tiers
KR101960993B1 (en) Efficient application-aware disaster recovery
US8832234B1 (en) Distributed data storage controller
JP5638126B2 (en) Schedule-based data lifecycle management
US9612910B2 (en) Systems and methods for generating catalogs for snapshots
US11314444B1 (en) Environment-sensitive distributed data management
US20140172783A1 (en) System and method for providing computing environment delivery service with offline operations
US8990164B1 (en) Systems and methods for performing incremental backups
EP3356941B1 (en) Systems and methods for restoring data from opaque data backup streams
US8930364B1 (en) Intelligent data integration
US10372547B1 (en) Recovery-chain based retention for multi-tier data storage auto migration system
US8983899B1 (en) Systems and methods for archiving files in distributed replication environments
US10191817B2 (en) Systems and methods for backing up large distributed scale-out data systems
US11099941B2 (en) System and method for accelerating application service restoration
US20210216657A1 (en) Distributing data amongst storage components using data sensitivity classifications
WO2015183437A1 (en) Cloud library de-duplication
US10372607B2 (en) Systems and methods for improving the efficiency of point-in-time representations of databases
US11630742B2 (en) System and method of performing recovery using a backup image
WO2016119910A1 (en) Creating backup

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15723150

Country of ref document: EP

Kind code of ref document: A1

WA Withdrawal of international application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15723150

Country of ref document: EP

Kind code of ref document: A1