H04L67/1097

Migration of network file copy operations between host computing devices

A method of migrating a network file copy (NFC) operation from a first host computing device to a second host computing device includes the steps of: transmitting a first request to the first host computing device to execute the NFC operation, wherein the NFC operation comprises transferring data from a shared datastore to another datastore; after transmitting the first request, selecting the second host computing device to complete the NFC operation in place of the first host computing device, and transmitting a second request to the first host computing device to stop executing the NFC operation; after transmitting the second request, detecting a message indicating that the first host computing device completed the copying of a first portion of the data; and in response to the detection of the message, transmitting a third request to the second host computing device to perform the remainder of the NFC operation.

Migration of network file copy operations between host computing devices

A method of migrating a network file copy (NFC) operation from a first host computing device to a second host computing device includes the steps of: transmitting a first request to the first host computing device to execute the NFC operation, wherein the NFC operation comprises transferring data from a shared datastore to another datastore; after transmitting the first request, selecting the second host computing device to complete the NFC operation in place of the first host computing device, and transmitting a second request to the first host computing device to stop executing the NFC operation; after transmitting the second request, detecting a message indicating that the first host computing device completed the copying of a first portion of the data; and in response to the detection of the message, transmitting a third request to the second host computing device to perform the remainder of the NFC operation.

Self-replicating management services for distributed computing architectures
11595475 · 2023-02-28 · ·

Self-replicating management services for distributed computing architectures are provided herein. An example method includes providing one or more nodes providing services; and maintaining a quorum of a plurality of management servers by: providing a distributed coordination service for the one or more nodes on each of the plurality of management servers; managing, via a director, requests for data on the distributed coordination service from the one or more nodes; promoting at least one of the one or more nodes to being one of the plurality of management servers; and maintaining secure tunnels between the plurality of management servers and the one or more nodes.

File control for data packet routers using consensus and inter-planetary file system (IPFS)

Packet routers route data packets based on existing topology files. The packet routers hash the existing topology files into content-addressed objects and exchange the content-addressed objects. One of the routers modifies its topology file into a new topology file, hashes the new topology file into a new content-addressed object, and transfers the new content-addressed object to the other packet routers. The packet routers exchange the content-addressed objects, and in response, exchange the topology files. The routers establish a consensus on the new topology file based on the existing topology files. The one packet router routes additional data packets based on the new topology file in response to the consensus. In some examples, the content-addressed objects comprise Inter-Planetary File System (IPFS) objects.

Singular control path for mainframe storage

Providing TCP/IP control commands to a storage system includes intercepting TCP/IP data provided on a TCP/IP network, determining if the TCP/IP data corresponds to a control command directed to the storage system, and converting the TCP/IP data to a Fibre Channel control command that is forwarded to the storage system if the TCP/IP data is a control command directed to the storage system. A host may intercept the TCP/IP data. The host may be coupled to the storage system. The storage system may have only Fibre Channel connectivity. A PC having only TCP/IP connectivity may provide the control commands via the TCP/IP network. At least two hosts may be coupled to the TCP/IP network. Software on one of the hosts may provide the control commands for the storage system. The storage system may be coupled to an other one of the hosts.

Singular control path for mainframe storage

Providing TCP/IP control commands to a storage system includes intercepting TCP/IP data provided on a TCP/IP network, determining if the TCP/IP data corresponds to a control command directed to the storage system, and converting the TCP/IP data to a Fibre Channel control command that is forwarded to the storage system if the TCP/IP data is a control command directed to the storage system. A host may intercept the TCP/IP data. The host may be coupled to the storage system. The storage system may have only Fibre Channel connectivity. A PC having only TCP/IP connectivity may provide the control commands via the TCP/IP network. At least two hosts may be coupled to the TCP/IP network. Software on one of the hosts may provide the control commands for the storage system. The storage system may be coupled to an other one of the hosts.

Method, electronic device and computer program product for storage management

Techniques for storage management involve: receiving, at a storage server, an access request for target data from a client, wherein the access request occurs in a session between the storage server and the client; determining, based on attribute information of the client, security information of the session, wherein the security information indicates whether the session is subjected to antivirus protection; and executing, based on the security information, an access operation specified by the access request on the target data. Therefore, the performance of the storage server can be improved while the security of the storage server is ensured.

Method, electronic device and computer program product for storage management

Techniques for storage management involve: receiving, at a storage server, an access request for target data from a client, wherein the access request occurs in a session between the storage server and the client; determining, based on attribute information of the client, security information of the session, wherein the security information indicates whether the session is subjected to antivirus protection; and executing, based on the security information, an access operation specified by the access request on the target data. Therefore, the performance of the storage server can be improved while the security of the storage server is ensured.

Intelligent and automatic load balancing of workloads on replication appliances based on appliance load scores

Various systems and methods are provided in which a replication process is initiated between a primary site and a recovery site, each having plurality of gateway appliances. Replication loads are evaluated for each given gateway appliance of the plurality of gateway appliances. If a determination is made that at least one gateway appliance of the plurality of gateway appliances is not overloaded, the plurality of gateway appliances are sorted based on replication loads respectively associated with each gateway appliance, and a determination is made as to whether a relative difference in replication loads between a gateway appliance having a highest replication load and a gateway appliance having a lowest replication load exceeds a difference threshold to determine whether the replication workloads between the gateway appliances should be rebalanced.

Pre-positioning target content in a storage network

A method for execution in a storage network, the method begins by determining a user device group content preference, wherein the user group content includes target content for a user device group and the determining includes predicting future target content for the user group. The method continues by selecting a plurality of network edge units for staging encoded data slices, identifying target content for partial download to the plurality of network edge units and dispersed error encoding the target content to generate a set of encoded data slices. The method then continues by identifying encoded data slices from the set of encoded data slices corresponding to the target content for partial download and determining a partial downloading schedule for sending the encoded data slices for partial download to each network edge unit of the plurality of network edge units. The method continues by facilitating partial downloading of the target content by sending the encoded data slices for partial download to each network edge unit of the plurality of network edge units.