US20010013104A1 - Loosely coupled mass storage computer cluster - Google Patents
Loosely coupled mass storage computer cluster Download PDFInfo
- Publication number
- US20010013104A1 US20010013104A1 US09/826,695 US82669501A US2001013104A1 US 20010013104 A1 US20010013104 A1 US 20010013104A1 US 82669501 A US82669501 A US 82669501A US 2001013104 A1 US2001013104 A1 US 2001013104A1
- Authority
- US
- United States
- Prior art keywords
- data
- processor
- input
- systems
- switched
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims abstract description 84
- 239000012634 fragment Substances 0.000 claims description 44
- 230000008569 process Effects 0.000 claims description 39
- 238000012545 processing Methods 0.000 claims description 16
- 238000013500 data storage Methods 0.000 claims description 10
- 230000006870 function Effects 0.000 claims description 9
- 230000000694 effects Effects 0.000 claims description 6
- 230000009131 signaling function Effects 0.000 claims 1
- 230000002411 adverse Effects 0.000 abstract description 3
- 238000013459 approach Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 7
- 241001522296 Erithacus rubecula Species 0.000 description 5
- 230000015654 memory Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 101000927793 Homo sapiens Neuroepithelial cell-transforming gene 1 protein Proteins 0.000 description 3
- 101001124937 Homo sapiens Pre-mRNA-splicing factor 38B Proteins 0.000 description 3
- 101000631937 Homo sapiens Sodium- and chloride-dependent glycine transporter 2 Proteins 0.000 description 3
- 101000639975 Homo sapiens Sodium-dependent noradrenaline transporter Proteins 0.000 description 3
- 102100028886 Sodium- and chloride-dependent glycine transporter 2 Human genes 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000007792 addition Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000033001 locomotion Effects 0.000 description 2
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- IOYNQIMAUDJVEI-BMVIKAAMSA-N Tepraloxydim Chemical compound C1C(=O)C(C(=N/OC\C=C\Cl)/CC)=C(O)CC1C1CCOCC1 IOYNQIMAUDJVEI-BMVIKAAMSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000003853 activation of bipolar cell growth Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
- G06F11/1088—Reconstruction on already foreseen single or plurality of spare disks
Definitions
- the invention relates generally to mass storage device interconnections and in particular, to a method and apparatus for increasing delivery bandwidth, providing fault tolerance, and input/output load balancing in a multiprocessor computer cluster.
- RAID- 5 striping and parity techniques to organize data in a fault tolerant and efficient manner.
- the RAID (Redundant Array of Inexpensive Disks) approach is well described in the literature and has various levels of operation, including RAID- 5 , and the data organization can achieve data storage in a fault tolerant and load balanced manner.
- RAID- 5 provides that the stored data is spread among three or more disk drives, in a redundant manner, so that even if one of the disk drives fails, the data stored on the drive can be recovered in an efficient and error free manner from the other storage locations.
- This method also advantageously, using RAID- 5 striping, makes use of each of the disk drives in relatively equal and substantially parallel operations. Accordingly, if one has a six gigabyte cluster volume which spans three disk drives, each disk drive would be responsible for servicing two gigabytes of the cluster volume. Each two gigabyte drive would be comprised of one-third redundant information, to provide the redundant, and thus fault tolerant, operation required for the RAID- 5 approach.
- objects of the invention are a method and apparatus having improved and increased mass storage read and write bandwidth (delivery bandwidth), operating using a reliable and fault tolerant protocol in a novel topology and enabling large quantities of data to be read and written in accordance with well known and accepted techniques.
- Other objects of the invention include a method and apparatus which is relatively inexpensive, reliable, simple to build, and easy to maintain.
- the invention relates to a method and apparatus for redundantly storing data in a distributed computer system having at least three processor systems, each processor system having at least one central processing unit and at least one mass storage sub-system.
- the method features the steps of interconnecting each one of the processor systems in a point to point two way channel interconnection with each other one of the processor systems and storing input data across the processor systems according to a distributed, redundant storage process.
- data is stored at each mass sub-storage system and some of a redundant representation of the data is stored also at each processor mass storage sub-system.
- the method features storing data across the processor systems according to a RAID- 5 process and, further, storing data within each processor system according to a RAID- 5 process.
- the method further features the step of reading data from the computer system, in the absence of a failure of any of the processor systems, over respective ones of the data channel interconnections, whereby the reading step establishes a load balance across the processor systems.
- the reading of data from the computer system features the steps of reading data from each non-failed processor system storing the data, and reading redundant data from the non-failed processor systems in place of the data stored at the failed processor system. Thereafter, the needed data stored at the failed processor system can be recreated using the redundant data and the data read from the non-failed processor systems.
- the method may prevent the writing of any data at any processor system until the failed processor system is brought back on line.
- the invention further features the limiting case wherein there are only two processor systems initially.
- the system continues, in the absence of a failure, to provide increased bandwidth by reading succeeding blocks of data from alternate processors in sequence; and, in this manner, effects a load balancing and provides increased read bandwidth compared to a typical so-called “mirrored” system.
- data is read from one processor only, the other processor acting as a backup.
- data is read from all of the processors thereby providing an increased read bandwidth and load balancing.
- the two processor version of the invention while not providing all of the advantages of the system with a larger number of processors, does allow easy scalability to a processor system having greater capacity, less overhead, and greater bandwidth.
- the method in some embodiments of the invention wherein data storage is modelled at a disk abstraction level, feature either designating one processor system to effect all write functions for the computer system, designating one processor for allocating files for each data input and enabling all processor systems to write input data to each of its associated and allocated files, or arbitrating write operations among the processor systems using a distributed lock manager.
- the data input is stored as named fragment files, or named files, in each processor system.
- named fragment files, or named files they can be accessed and reconstructed, for example even when a process or system is added to the distributed computer system.
- the system continues to deliver stored data as an output stream even as the number of processor systems, network interfaces, and amount of storage is changed.
- the method uses file names to distinguish, modulus “IN”, data fragments from modulus “N+1” data fragments, even as these modulus “N+1” data fragments are created from the modulus “N” fragments.
- the method features the step of reconstructing a failed processor system by reconstructing only the data objects which were written while the processor system was in a failed state.
- the distributed computer system in accordance with the invention has at least three processor systems for redundantly storing data, each processor system having at least one central processing unit and at least one mass storage system.
- the distributed computer system features interconnecting channels providing a point to point two way channel interconnection from each one of the processor systems to each other one of the processor systems, and a data storage controller at each processor system.
- the controllers act to store data input at any one of the processor systems according to a distributed redundant storage process whereby data is stored at each of the computer processors and some of a redundant representation of the data is stored also at each of the processors.
- the storage controllers store data across the processing systems according to a RAID- 5 process, and further, can store data at each processor system in its associated mass storage sub-system according to a RAID- 5 process.
- the apparatus of the invention further features a system in which the controllers read data from the computer system, in the absence of a failure of any processor system, so as to maintain and establish a load balance across the computer system.
- the controllers In the presence of a failure of one of the processor systems, the controllers read data from each non-failed processor system storing the data (over the appropriate dedicated network connection) and read redundant data from each non-failed processor system in place of the data stored at the failed processor system.
- the requesting processor system can then recreate the data stored at the failed processor using the read data and the redundant data.
- an “external” processor can be employed to recreate the data stored at the failed processor, thereby preserving the delivery bandwidth of the system even in the face of a failed processor.
- the apparatus features a storage controller which stores the input data as named fragment files, or named files, in the distributed computer system.
- the apparatus of the invention also relates to a redundant switch having at least n interruptible inputs, n interrupting inputs, and n outputs.
- the redundant switch features n+1 switched systems, each switched system having at least two control inputs, a first input, a second input, a third input, and a fourth input, and a first and a second output.
- Each switched system is connected at its second output to n interrupting signal generator, n interrupting output of the associated signal generator being connected to the second input of the connected switched system.
- the switched systems are interconnected in a ring structure so that each switched system further has n interruptible input signal connected to the first input, the second input of a first neighbor switched system in the ring being connected to the third input, the interruptible input from the other neighbor switched system on the ring being connected to the fourth input, and each switched system having switching circuitry responsive to the control input for switching any of its inputs to at least its first output and for connecting either of its first and fourth inputs to its second output.
- the controller provides the control signals to the control inputs of the switched system to enable the cross-bar operation.
- the redundant switch has n+1 switched systems each switched system having at least two control inputs, four signal inputs, and two signal outputs.
- Each switched system is connected at one of its outputs to an associated interrupting signal generator and n interrupting output of the associated signal generator is connected to an input of the connected switched system.
- the switched systems are interconnected in a ring structure so that each switched system is connected to a first and a second nearest neighbor.
- Each switched system has switching circuitry responsive to the control input for the switched system for selectively switching its inputs to its outputs.
- a controller provides the control inputs to the switched systems to enable the switched systems to effectively rotate signal switching functions one position in one or both directions around the ring. Thereby, a failed signal generator can be bypassed and the signals on the n first outputs continue uninterrupted.
- the invention in another aspect, relates to a distributed data delivery system having at least three processor systems for redundantly storing data, each processor system having at least one central processing unit and one mass storage system. Interconnecting data channels provide a point to point, two way, channel interconnection from each one of the processor systems to each other one of the processor systems.
- a data storage controller at each processor system stores data input from any one of the processor systems according to a distributed, redundant storage process whereby data is stored at each of the processor systems and some of a redundant representation of the data is stored at each of the processors as well.
- a switching circuit having n interruptible input ports, at least n+1 interrupting input ports, and at least n+1 output ports, has n interruptible input signals connected to respective primary processor systems, each primary processor system having an output connected to a respective interrupting input.
- a switching controller connected to the switching circuit for selectively interrupting each of the n interruptible input ports with the signal information available from a respective one of the processor systems, in the event of a failure at a processor, and using a previously unused processor system in that process, causes the switching circuit to connect the interruptible input port of the failed processor system to a different processor system, and to replace the output of the failed processor system with the output of another processor system.
- FIG. 1 is a schematic block diagram of an interconnected computer system according to the invention.
- FIG. 2 is a more detailed block diagram of a processor system according to the invention.
- FIG. 3 is a table illustrating an index file in accordance with the invention.
- FIG. 4 is a diagram illustrating the software architecture in accordance with the invention.
- FIG. 5 illustrates the cluster volume arrangement according to the invention
- FIG. 6 describes the cluster volume HomeBlock format in accordance with the invention
- FIG. 6A is a table defining the HomeBlock format of FIG. 6;
- FIG. 6B shows a data object broken into a plurality of blocks
- FIG. 6C shows the relationship of a data object to its stored named fragment files
- FIG. 6D is a table defining the header block of a named fragment file according to one embodiment of the invention.
- FIG. 6E is a table defining the data object format of FIG. 6D;
- FIG. 6F illustrates reading a video object from the cluster members
- FIG. 7 illustrates the data and parity organization for a data object according to a RAID- 5 striping protocol
- FIG. 8 is a table describing the terminology used in connection with the flow chart of FIG. 9;
- FIGS. 9 A- 9 C are flow charts for determining data and ParityBlock locations according to the invention.
- FIG. 10 illustrates a cluster volume both before and after reformatting in accordance with the invention
- FIG. 11 illustrates a 2n ⁇ n switch
- FIG. 12 illustrates n 2 ⁇ 1 switches in a circuit arrangement
- FIG. 13 illustrates a 2n ⁇ n system in accordance with the invention
- FIG. 14 is a more detailed block diagram of the switched system of FIG. 13;
- FIG. 15 illustrates a video system in a ring configuration accordance with an alternate embodiment of the invention
- FIG. 16 illustrates, in more detail, the switched system of FIG. 15.
- FIG. 17 illustrates a truth table for the switched system of FIG. 16 in accordance with the invention.
- a redundant distributed computer system 10 has a plurality of processor systems 12 a , 12 b , 12 c , 12 d , 12 e , in the illustrated embodiment, which are interconnected by interconnecting channels 14 a , 14 b , 14 c , . . . 14 j in a plurality of point to point channel interconnections.
- each processor system 12 is directly connected in a point to point connection to each other processor system.
- more or less processor systems can be used, although a practical upper limit may be between nine and thirteen and the lower limit is three. (As noted earlier, a two processor system, can be used, to effect some of the advantages of the invention; however, for purposes of description hereinafter, the three or more processor embodiment will be detailed.).
- each processor system 12 has a CPU 20 connecting, in the illustrated embodiment, to an internal data communications bus 22 , to which are connected at least a memory and communications controller 24 and a mass memory storage unit 26 .
- the mass storage unit typically has a plurality of disk drive units 28 .
- Controller 24 is also connected to a plurality of channel interface units 30 , each of which is connected to a different interconnecting channel 14 for establishing the point to point communications with other processor systems through their respective channel interface units 30 .
- the interconnecting channels 14 use a protocol running on Fast Ethernet datalink devices.
- This protocol provides a relatively high efficiency and enables communications between processors, in the illustrated embodiment, at a bandwidth on the order of 100 megabits/sec. Accordingly, referring to FIG. 1, each processor 12 , being connected to four interconnecting channels, has a bandwidth to the external processor memories of approximately 400 megabits/sec. (less overhead), in addition to its own capabilities with regard to its local mass storage 26 .
- video input information and data is provided to one or more processor systems 12 over external feedlines, for example, network feeds 32 which require high bandwidth storage of the substantial data needed to represent and store even small durations of video data (including audio). In particular, for example, one minute of video data can require sixty-six megabytes of storage.
- network feeds 32 which require high bandwidth storage of the substantial data needed to represent and store even small durations of video data (including audio). In particular, for example, one minute of video data can require sixty-six megabytes of storage.
- the particular embodiment described herein and displayed in FIG. 1 has substantial bandwidth to enable the video information to be distributed among the various processor systems so that in a preferred embodiment of the invention the video data input to one of the processor systems 12 is actually stored along many, and preferably all of the video processor systems 12 .
- the controllers 24 of the processor systems 12 individually and collectively act to store data across the entire computer system 10 network in a redundant fashion so that if any one processor system 12 fails the remaining processor systems can nevertheless reconstruct all the data available in the entire system.
- this approach provides, in the illustrated embodiment, load balancing across the various processing systems as well as enabling any one processor system requiring either to read or write data the capability of a very large bandwidth memory communication channel.
- a RAID- 5 architecture is implemented, for the first time, at the system level to provide the redundancy, load balancing, and bandwidth necessary to meet the objectives of the distributive computer system.
- the computer system 10 will have, before receipt of the data, allocated storage in each of the processor systems in one of a plurality of different ways.
- a storage cluster volume having a specified capacity will be deployed among the processor systems 12 . For example, if the storage cluster volume was 10 gigabytes, in the embodiment of FIG. 1, each processor system would be responsible for servicing two gigabytes of the cluster volume for use not only for itself, but for the other processor systems or members of the cluster.
- the systems Under normal operating conditions therefore the systems will have preestablished a protocol for both writing and reading data. According to one protocol, the systems will have selected one system for writing of all data for the cluster volume.
- a distributed lock may be used to arbitrate write operations among the processor systems.
- one processor system can allocate files for each data input and thereafter enable each of the processor systems to write input data to its associated allocated files.
- the cluster volume described above is a collection of logical disk blocks (some local and some remote) that are shared between cluster members (the different processor systems of the cluster).
- cluster members the different processor systems of the cluster.
- each cluster member has an instance of a file system running, and each node would have access to the entire set of logical blocks. While this solution works, it has several problems. First, only one system can write to the cluster volume; second, the integrity of the cluster volume has to be strictly managed; and third, changes to the file system structure (the creation or deletion of files) has to be replicated in each instance of the file system running on each cluster member.
- the cluster architecture provides access to data objects and named fragment files, much in the way a file server provides “files” to network clients. Since the cluster members keep their file system private and only export access to the data objects, each cluster member can read, write, or delete files from its local file system without disrupting the other members of the cluster. There is no significant penalty for this method and it reduces the complexity of the cluster software. Data objects are then fragmented and written to the members of a cluster using the RAID- 5 striping and parity techniques, allowing each individual data object to be read, recovered, or written independently of all other data objects.
- the entire local cluster volume has to be reconstructed.
- the reconstruction of the entire cluster volume can take anywhere from several hours to several days depending upon the size of a volume.
- each of the processors 12 is viewed, even though they exist at the system level, in a RAID- 5 context, with striping, as follows. Assuming that each processor writes in 64 kilobytes blocks, a first block will be sent to and written by processor 12 a , a second block by processor 12 b , a third block by processor 12 c , a fourth block by processor 12 d , and a fifth block, a Redundancy block or ParityBlock by processor 12 e .
- the redundancy block or ParityBlock to be written by processor 12 e in its mass storage will be the EXCLUSIVE-OR of the blocks sent to processors 12 a , 12 b , 12 c , and 12 d .
- redundancy methods can be used including various forms of, for example, Huffman coding and other redundant coding methods so that not only may one failure of a processor be taken into account but multiple processor failures can be taken into account. The cost, of course, is increased processing in both the writing and perhaps reading of data.
- each processor is connected in a point to point two way connection to each other processor, it is possible to write all five blocks of data substantially in parallel, thus making full use of the bandwidth available to the writing controller and, at the same time, distributing substantially equally, the writing load across the entire computer system.
- the next block of data (a DataBlock) can be written to, for example, processor system 12 b , the sixth block to processor system 12 c , the seventh block to processor system 12 d , and the eighth block to processor system 12 e .
- the parity or redundancy block would be written in processor system 12 a .
- each of the redundant blocks would be written in a determined and round robin, rotating manner, in accordance with the RAID- 5 processing protocol.
- the location of the blocks is illustrated in FIG. 3. A short algorithm can be employed to determine the location of a particular block, as described in more detail below.
- the processors can use a RAID- 5 protocol, in its ordinary and well known sense, to store data among its plurality of disk drive devices 26 associated with that processor.
- a RAID- 5 protocol in its ordinary and well known sense, to store data among its plurality of disk drive devices 26 associated with that processor.
- each cluster volume must have at least three members.
- a cluster cannot continue to operate, if it uses the RAID- 5 protocol, if more than one cluster member should fail. (The use of other, more complex protocols, can relax, somewhat this constraint.)
- the major software components of a single processor system 12 include a port driver 50 , a class driver 52 , a remote file provider 54 a local file provider 56 , a file system 58 (SeaFile, FAT, NTFS), a SCSI driver 60 , a RAID controller 62 , a fast Ethernet adapter 64 , and a SeaNet transport 66 .
- the cluster architecture utilizes RAID- 5 technology to build a fault tolerant distributed system.
- the data objects are stored as named fragment files across the members of the cluster.
- Data objects are striped (in accordance with RAID- 5 protocol) and stored with parity information to allow a missing named fragment file to be reconstructed if a cluster member fails. This is described in more detail below.
- a RAID port driver masks the fact that the data object exists as a set of named fragment files. It provides the multiplexing and demultiplexing services to merge the named fragment files into a data object byte stream.
- the RAID port driver registers as both a provider and a consumer. When the class driver attempts to open a data object, it calls all the provider port drivers in the system. Upon being called, the RAID port driver becomes a consumer and uses the class driver to open each of the data fragments that comprise the data object. Once a session has been established to each of the named fragment files, that is, once access has been provided to each named fragment file, the RAID port driver performs an open call back to notify the class driver that the data object is available.
- the port driver accesses the data (video) objects stored on the cluster.
- the video named fragment files are read or written using RAID- 5 methods from the local and remote providers. It masks other port drivers (for example, video decoders or ATM links) from any failures, since it will reconstruct missing data fragments in real time.
- the remote file provider represents any third party application or device driver that might use the cluster technology. Examples include Lotus Notes, medical applications, or database systems.
- the on-disk structure of the cluster volume (file system 54 ) can be either NTFS, FAT, SeaFile or raw disk access, in the illustrated embodiment.
- the file system component is responsible for storing and retrieving the named fragment files.
- the Transport component 66 provides an efficient network service to other cluster members. It detects and reports failures in real-time to the RAID driver.
- the fast Ethernet Adapter provides a 100 Mb/second full duplex link between each cluster member through interface units 30 .
- the SCSI driver for example a DAC960, provides access to local disk storage and allows the cluster RAID driver to read or write data for local file system managers.
- a RAID controller provides efficient access to the named fragment files.
- the local portion of a data object is read or written by the RAID controller.
- the RAID controlled volume can be configured, to either a RAID- 0 , RAID- 1 , RAID- 5 , RAID- 6 or RAID- 7 level in the illustrated embodiment, and as noted above, configuring a volume in a RAID- 5 protocol allows a cluster member to continue even when a single disk fails to perform properly.
- a cluster volume is a logical disk volume that spans multiple cluster members or processor systems.
- the design principal for a cluster volume is to utilize a fraction of each processor system memory for each video stream thus creating a balanced and scalable system. Since the video data stored in the cluster volumes is mission critical, the integrity of the cluster volume must be carefully maintained. Accordingly, a set of checks are used to ensure that the cluster members agree on a consistent view of the cluster volume and that only one cluster member writes to the cluster volume.
- each cluster member of a cluster volume that is, each processor system 12 , maintains and verifies its cluster volume “HomeBlock” to ensure the integrity of the cluster volume.
- a cluster member processor system boots, it checks the cluster volume HomeBlock incarnation and volume identifier against the other cluster member processor systems HomeBlocks to ensure that the cluster volume was not modified while it was down. If the cluster volume was modified, a rebuild process can repair the out of date cluster member.
- each cluster member 35 in the illustrated embodiment of the invention, has one cluster volume HomeBlock 37 for each cluster volume.
- the cluster volumes are organized using the RAID- 5 protocol across the processor systems which are the members of the cluster. (Note that a cluster volume need not extend across all processors 12 of the system 10 , but must extend across at least three processors, or two if mirroring is permitted.)
- the controllers organize the data and the writing controller writes blocks of data in a round robin fashion, as described above, across the cluster members participating in the cluster volume.
- Each data object in this system is stored as a set of named fragment files.
- Each fragment file contains a header block that allows the named fragment file to be self describing.
- Data objects are fragmented when they are written to the cluster.
- FIGS. 6B and 6C illustrate the relationship of a data object to its named fragment files.
- a fragment file written on any individual cluster member includes the named fragment header and the plurality of blocks comprising the fragment file.
- the data object is fragmented into three files.
- the amount of data in a block is called the volume stripe size.
- the default stripe size is 64 kilobytes.
- the RAID- 5 protocol uses a ParityBlock to recover from a single fault.
- the ParityBlock is written for every n minus 1 blocks where n is the number of cluster processor system members. This technique, as noted above, thus allows for the reconstruction of the cluster volume data when any one cluster member fails.
- parity blocks are created by EXCLUSIVE-OR'ing the n ⁇ 1 DataBlocks forming a stripe level.
- FIG. 6D describes the named fragment file header format.
- the header block describes the content of the fragment.
- FIG. 6E describes, in table form, the particular components of the header for one particular embodiment of the invention.
- FIG. 6F illustrates reading the DataBlocks of a single video object spread across the members of a cluster.
- a cluster member opens each named fragment file and reads the first block from cluster member 0 , for example, the second block from cluster member 1 , and the third block, assuming no parity block, from cluster member 2 .
- the read process would cycle back to cluster member 0 .
- the complexity of this process is hidden, as noted above, from the consumer by the RAID port driver. Since, in the above description, the parity blocks which are stored with the named fragment files were ignored, in fact when the video data object is read the parity blocks are skipped and only the actual data is read. The organization of the parity blocks thus introduces an additional complexity which must be attended to.
- the parity DataBlocks are also written, as noted above, in a round robin fashion to avoid a single set of disk heads from being left idle during the read process.
- parity blocks are stored in each named fragment file on each cluster member.
- the blocks associated with a missing block are read to reconstruct the missing block. For example, if cluster member 2 were unavailable, and block 7 was requested, parity block 6
- a algorithmic process is preferred and operates more quickly.
- integer arithmetic is employed to locate data and parity blocks stored in named fragment files.
- the number of parity blocks is first determined by dividing the block number to be located, by the cluster size minus 1. This, in essence, provides the number of parity blocks up to and but not including the row in which the block to be found resides. The division is integer division and the remainder is discarded. Thus, PBC provides the number of parity blocks up to and including the last complete row of blocks. Next, the so-called adjusted block number is set equal to the total number of blocks which have been stored, including the parity blocks within complete rows, up to the block to be found. This is indicated at 302 .
- the optional parity block count is determined next. To determine whether the parity block, in the row of the block to be found, is located before or after the block to be located, a quantity ABN L , equal to the total number of blocks modulo the number of cluster members squared, is generated at 364 .
- the optional parity count is set to “zero” at 306 , and, if ABN L divided by the number of clusters is less than or equal to ABN L modulo the number of clusters at 308 , the optional parity count is set to “one” at 310 .
- a “zero” optional parity count indicates that the block is before the parity block in the row while a “one” optional parity count indicates that the block is after the parity block of the row. This assumes that the parity is configured as described in FIG. 6C.
- the final block number is then the adjusted block number plus the value of OPC. This is indicated at 320 .
- the cluster member can be calculated by taking the final block number modulo the number of clusters. This is indicated at 330 .
- the local block number within that cluster is then the final block number divided by the number of clusters. This is indicated at 340 . (Recall that the first block number is zero.)
- the parity block number for the binary block number must be determined. This is performed as illustrated below, referring to the flow chart of FIG. 9B.
- a parity block number is determined by multiplying the number of clusters by the integer portion of a division, the numerator of which is the final block number and the denominator of which is the number of clusters. This is indicated at 400 .
- the parity block offset within the repeating pattern is determined and added to the parity block number (PBN) previously determined. This is accomplished by taking the final block number modulo the number of cluster members squared and dividing that number by the number of clusters. That value is then added to the parity block number to obtain the final value of the parity block number. This is indicated at 420 .
- the cluster volume master controls access to each block of the cluster volume.
- the computer system 10 provides a protocol to determine the cluster volume master for each volume.
- Each cluster volume in the illustrated and preferred embodiment, is controlled by a different processor system member (to the extent possible) to distribute the write load across all of the cluster members.
- a cluster volume master detects that a cluster processor system member has failed, it instructs the remaining cluster members to advance the cluster volume incarnation (in the HomeBlock) and to clear the cluster volume “dirty bit” in the cluster volume state.
- the next write operation to the cluster volume will cause the dirty bit to be set, indicating that the failed cluster member must execute a rebuilding process before it can rejoin the cluster volume. If the implemented cluster protocol prevents a write to the cluster volume while a cluster member is in a failed state, the failed member may not need to rebuild.
- the cluster volume does not have to be write locked during the rebuilding operation.
- Write operations to already rebuilt DataBlocks simply update the DataBlock.
- Write operations to DataBlocks not yet rebuilt can simply be ignored and they will be reconstructed at a later time. Special care however is required when handling a write operation for the current DataBlock being reconstructed. In this case, reconstruction should be completed and the write operation should be executed after, and only after, the reconstructed data is written.
- the system when the system operates upon data objects, the system can continue to operate, modifying data objects as necessary.
- the failed member When the failed member has been restored, it executes a rebuilding process only for the data objects which have been changed. The remaining objects are not affected. In this way, even during a failure, writing can continue to be implemented and the failure becomes transparent to the user or consumer.
- the rebuilding occurs object by object, it can be done at a more leisurely pace since not all of a cluster volume will be adversely affected by writing any of file within the volume.
- the method and apparatus of the invention provide a process for increasing the storage capacity “on line”. For example, to add storage to a cluster, disk drives are added to each cluster member (that is, each processor system 12 ) and a new cluster volume or new data objects can be created. This is a simple operation and the existing cluster volumes or data objects remain fault tolerant during the upgrade. Cluster members may have to be rebooted however in order to “see” (that is, recognize) the new disk drives.
- the method and apparatus of the invention can further provide for the addition of a new cluster processor system (and its associated storage) during operation. This is a much more complex operation and can proceed as follows.
- the new cluster processor system member is inserted into the cluster by networking the new cluster member to each of the original cluster processor system members 12 as illustrated in FIG. 1. Each cluster volume is then “write locked” so that writing to any portion of the volume is not allowed. Each cluster volume is reformatted by initiating a change in the current cluster volume format to a new format. This operation is in essence a translation from an n member cluster volume to an n+1 member cluster volume. Each DataBlock is read and rewritten, new ParityBlocks are generated, and the progress is check-pointed in case a system failure occurs during the reformatting operation.
- any one cluster volume is not increased by this operation; rather, each local cluster volume size is decreased and the residual disk space from the operation can be configured into yet additional cluster volume(s). Finally, as cluster volume reformatting is completed, the “write lock” is removed from the cluster volume. Referring to FIG. 10 in a typical system, the various sizes of the cluster volume within each of the cluster processor system members is illustrated both before and after reformatting.
- FIGS. 11 - 13 there is illustrated a switching system useful in conjunction with the structure of FIG. 1, and in which a fault tolerant operation provides resiliency and robustness, as well as relatively low cost for the described system.
- a 2n ⁇ n cross-bar system wherein any one of 2n inputs can be placed on any of n outputs.
- Such a cross-bar system 100 might have, for example, n (interruptible) network feeds 102 and n advertising or other interrupting feeds 104 which are to be used to selectively replace the network feeds.
- n output selections 106 represents one of the network feeds which is switchably replaced, from time to time by one of the interrupting feeds 104 .
- the n outputs connect to output channels for transmission over, for example, a cable network.
- FIG. 12 A simpler approach, though less flexible and hence to some extent less desirable, is illustrated in FIG. 12 wherein the 2n ⁇ n switch 108 is replaced by n two by one switches 110 .
- a network input 112 is provided to each 2 ⁇ 1 switch 110 and an interrupting or other input 114 is also provided to each 2 ⁇ 1 switch 110 .
- This system works well provided that none of the interrupting feeds is lost. (The interrupting feeds over lines 114 are typically generated by a processor system 12 and it is implicitly assumed that the network feeds are reliable and always present.) If an interrupting feed is lost, by failure of a processor system 12 , then the output over lines 116 will be incorrect since there is no provision for an alternate source of the interrupting feed.
- the network feeds over lines 112 are considered reliable and available at all times. Thus, it is only the interrupting feed over lines 114 which may fail.
- the interrupting feeds are typically provided by, for example, a processor system 12 , and thus if the processor system 12 fails, there is no flexibility or robustness in the switches 110 , as configured in FIG. 12, (or even the crossbar switch provided in FIG. 11, since the failed source cannot be replaced) to recover.
- FIG. 13 illustrates a limited video delivery system in which there are two network feeds and two interrupting feeds generated by local processor systems. In other embodiments more network interruptible and interrupting feeds can be used and the system can be accordingly scaled.
- the network feeds over lines 130 and 132 are input to respective video insertion and feed systems 134 and 136 , respectively.
- Each video system has a processor system 138 , 140 (these can be the same as processor systems 12 described in connection with FIG. 1) and a switched system 142 , 144 which is able to place, in a controlled manner, as described below, ones of its four inputs, on its output lines.
- the switched systems provide a network feed output signal on lines 146 , 148 , designated as OUT 0 and OUT 1 , respectively.
- a spare video insertion and feed system 150 which has a processor system 152 and a switched system 154 mirroring the interconnection of the processor system and switched system of video systems 134 and 136 , provides a fault tolerance under the conditions described below.
- the processor systems 138 , 140 , and 152 are interconnected by point-to-point communications and operate in a manner, with respect to each other, which is identical to that described for the larger computer system illustrated in connection with FIG. 1.
- any processor system 138 , 140 , 152 has access to the video stored by the other processor systems, and the video is stored at the processor level preferably according to a RAID- 5 protocol.
- the video objects are stored in a processor's local disk array also in accordance with a RAID- 5 protocol.
- Each processor system receives an output feed (typically a network feed) from its associated switched system over lines 160 , 162 , and 164 and provides n interrupting output in response to the input feed, for example an advertisement, to its associated switched system over lines 166 , 168 , and 170 .
- the signals carried over lines 160 , 162 , 164 , 166 , 168 and 170 are video signals as will be described in more detail below.
- the video systems 134 , 136 and 150 are interconnected in a ring structure through their switched systems.
- each switched system provides an output, labelled 172 , 174 , 176 , which becomes an input to a neighboring video system in the ring configuration; and the network input line of video systems 134 and 136 is connected as another input to that other neighboring switched system on the ring which, as described above, received an input signal from its other neighboring system.
- the NET 1 input is provided to both switched system 144 and switched system 142 while the NET 0 input is provided to switched system 142 and switched system 154 .
- Outputs 173 , 174 , 176 are connected respectively as inputs to systems 144 , 154 , and 142 .
- Each processor system also provides, either from the processor itself or through an on-board controller 12 a , typically controlled by the processor CPU, two switch control signals as described in more detail below.
- FIG. 14 there is illustrated a preferred embodiment of the video system which allows, referring to the orientation of FIG. 13, the video systems to switch in a downward round robin direction (meaning that spare video system 150 can replace the operation of video system 134 should video system 134 or video system 136 fail).
- the spare video system 150 replaces it and provides the correct interrupting feed to the switched system 142 .
- video system 134 will act to provide the correct interrupting feed to switched system 144 and video system 150 will thereafter operate to provide the correct interrupting feed to the switched system 142 of video system 134 .
- This “downward” movement can be extended to a larger operating system having, for example, nine network-feeds in which case there would be the nine network video systems like circuitry 134 plus a spare video system corresponding to system 150 .
- the ring can be reconfigured to move upward or as will be hereinafter described, the switched systems can be structured so that the motion of the ring can be directed in either the upward or downward direction as viewed in FIG. 13. In this latter configuration, the interconnecting structure is more complex as will be described hereinafter.
- each switched system of FIG. 13 has two multi-input single output controlled switch elements 190 , 192 .
- the reference numbers correspond to the reference numbers of FIG. 13 and, in particular, the illustrated video system 134 .
- the network feed over line 130 is directed to the default or number 1 position of each of switches 190 and 192 .
- the signal on line 130 is fed through switch 192 and is output over line 146 .
- switch 190 Simultaneously that signal is also fed through switch 190 and is output over line 160 to the processor system 138 .
- the processor system analyzes the input signal and provides, over line 166 , at the correct time, an insert which interrupts the signal over line 130 and replaces it. This is effected by switch element 192 which changes the signal over line 146 from that connected at its number 1 position to that connected at its number 3 position.
- the controller (and control lines) for switching the outputs of switches 190 and 192 have been omitted for clarity of presentation.
- each processor has two (or three) control lines for controlling the switching functions of its associated switch and at least one neighboring switch, depending upon whether the ring will fail up, fail down, or optionally fail in either direction.
- the processors are further, preferably, interconnected through a further communications line, such as an Ethernet bus, so that each processor is aware of the status, and actions, taken by each other processor. This allows an orderly compensation for a failed processor as described herein.)
- the switch element 192 returns to its “default” number 1 position.
- switch 192 under the control of a controller, switches back and forth as processor system 138 generates the correct interrupting video in accordance with the processor interconnections illustrated in FIG. 13 (as an example of a simpler version of the more complex system illustrated in FIG. 1).
- the processor 140 referring now to FIG. 13, of video system 136 were to fail, the first step of the fault-tolerant system would provide that the video system of 134 would be modified so that it generates the necessary insert video signals for switched system 144 and provides those insert signals to switched system 144 over line 172 .
- the network feed for video system 136 that is NET 1 over line 132 , connects to video system 134 , is switched by switch element 190 of video system 134 and is placed on the output of switch element 190 , that is on line 160 .
- the processor system 138 in response to this new video generates an insert video over line 166 which is also available over line 172 . That insert video signal is thus provided to the switched system 144 and its switch, which corresponds to switch 192 of switched system 142 , then connects the input on its corresponding line input 4 to line 146 , and outputs it over line 146 as “OUT 1 ”.
- video system 134 has lost use of its processor system 138 . It thus turns to the spare video system 150 and its processor system 152 which, in combination with switched system 154 provides the appropriate insert video over line 176 (along with the correct insert control signals).
- Switch 192 thus, at the correct time, switches to place the insert video available over line 176 at its output, over line 146 , to become OUT 0 .
- switch 192 returns to its default value to place NETO, its network input, at switch position 1 , as its output. In this manner, the video systems 134 , 136 , and 150 “cover” redundantly for each other so that a failure of one processor system will not adversely affect operation of the delivery system.
- This ringed redundancy operates not only because the switched systems 142 , 144 , 154 are interconnected in a ring structure, but also because the processor systems themselves are interconnected and operate in a redundant fashion in accordance with the embodiment of FIG. 1.
- each processor system is capable of fully acquiring the necessary insert video objects stored redundantly in the collective system memory, for any of the network feeds.
- FIGS. 13 and 14 fails in an “up direction”.
- video system 136 provides its network input not to video system 134 but to spare video system 150 and accordingly provides its output over line 174 not to spare video system 150 but to video system 134 , the system would fail in the reverse direction.
- a more complex video switched system which is capable of shifting “in either direction” in response to a failed system.
- the ring connection depending upon the proximity of the failure to the spare, will fail either up or down to reduce the time delay for correcting the failed situation. It will be seen, however, referring to FIGS. 13 and 14, that it is not necessary to use this system, but that single direction failure system will work substantially as well in most failure situations.
- FIGS. 15 and 16 there is illustrated a 3 element ringed system which can fail in either direction.
- This system operates in a manner corresponding to that of the video delivery system illustrated in connection with FIGS. 13 and 14, and accordingly, its detailed operation need not be described.
- the ringed system has two video systems 200 and 202 , each of which has a video processor 204 , 206 , and a switched system 208 , 210 respectively.
- a spare video system 212 having a video processor 214 and a switched system 216 .
- the processor system 214 of the spare video processor 212 will, in this illustrated embodiment, replace the processor system which has failed.
- the switch elements of the switched systems for the spare system and the failed system will reconfigure the switches to provide the network input for the failed system to the spare system, which will provide that network input to its processor system.
- the video insert output of the processor system will then be routed through the spare switched system to the switch system corresponding to the failed processor for delivery, at the correct time, to its output.
- a larger element ringed system can be employed, and, as with the embodiment of FIGS. 13 , and 14 , the video systems will chain with a first nearest neighbor replacing the failed processor and a next second nearest neighbor then acting to replace the processor of the first nearest neighbor, etc., until the spare video system is used.
- a typical switched system has four multi-input switches 180 , 182 , 184 , and 186 connected as illustrated in FIG. 16, in one particular embodiment of the invention, in order to enable the switching described hereinabove to take place.
- FIG. 17 there is provided a truth table indicating, for each switch of FIG. 16, its status depending upon whether the switch is operating in a “normal” mode, in a failed-up mode, or a failed-down mode. The number within the matrix identifies, for a switch of FIG. 16, which input to direct to the output.
- switch 4 (reference number 186 ) the selected input depends upon whether the switch is expected to place the interruptible input (“NO INSERT”) or the interrupting input (“INSERT”) at its output port.
- NO INSERT interruptible input
- INSERT interrupting input
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
- The invention relates generally to mass storage device interconnections and in particular, to a method and apparatus for increasing delivery bandwidth, providing fault tolerance, and input/output load balancing in a multiprocessor computer cluster.
- Modern reliable computer systems require a large capacity mass storage, and large bandwidth access to that mass storage. While disk sizes have increased substantially, for example a typical personal computer today can be configured with over a gigabyte of storage, the bandwidth available to access the storage has improved, but not significantly. Thus, while large volumes of information can be stored, the rate at which the storage can be accessed has not generally changed in the past few years. In particular, considering the requirements of a digital video system for the delivery of constant bit rate video streams such as MPEG-2 digital video streams, it is important to provide a high bandwidth to accommodate the data requirements of the digital video network, for example an ATM OC-3 network interface.
- While various methods have been employed to provide sufficient quantities of data in a reliable configuration, perhaps one of the more popular, and least expensive, approaches is the use of RAID-5 striping and parity techniques to organize data in a fault tolerant and efficient manner. The RAID (Redundant Array of Inexpensive Disks) approach is well described in the literature and has various levels of operation, including RAID-5, and the data organization can achieve data storage in a fault tolerant and load balanced manner.
- In particular, RAID-5 provides that the stored data is spread among three or more disk drives, in a redundant manner, so that even if one of the disk drives fails, the data stored on the drive can be recovered in an efficient and error free manner from the other storage locations. This method also advantageously, using RAID-5 striping, makes use of each of the disk drives in relatively equal and substantially parallel operations. Accordingly, if one has a six gigabyte cluster volume which spans three disk drives, each disk drive would be responsible for servicing two gigabytes of the cluster volume. Each two gigabyte drive would be comprised of one-third redundant information, to provide the redundant, and thus fault tolerant, operation required for the RAID-5 approach.
- Consider a processor reading a video data object from a local RAID-5 array. In normal operation, using a RAID-5 approach, when the processor needs to access a video data object which is spread across all of the disk drives connected to the processor, the processor reads a portion of the video data object in a round robin fashion from each of the disk drives. For example, a first 64 kilobyte block of the video data object can be stored and read on a first drive, the next 64 kilobyte block being stored on the second drive, and so on. In addition, however, the parity check (actually an EXCLUSIVE-OR function), also a 64 kilobyte block, is stored so that if there were n disk drives there would be one parity block written for each n−1 blocks of data.
- The processor reading the disk drives, however, is still “stuck” with a relatively narrow bandwidth. Accordingly, the amount of data which can be read is limited by the bus to which the drives are connected. For example, a SCSI bus which, while providing substantial improvements over buses from years ago, is still relatively slow compared to the needs of video applications. Also, the use of a local RAID-5 controller can combine the outputs of multiple local SCSI buses, but is subject to the failure of the local processor. Such a failure eliminates access to all the data.
- Accordingly, objects of the invention are a method and apparatus having improved and increased mass storage read and write bandwidth (delivery bandwidth), operating using a reliable and fault tolerant protocol in a novel topology and enabling large quantities of data to be read and written in accordance with well known and accepted techniques. Other objects of the invention include a method and apparatus which is relatively inexpensive, reliable, simple to build, and easy to maintain.
- The invention relates to a method and apparatus for redundantly storing data in a distributed computer system having at least three processor systems, each processor system having at least one central processing unit and at least one mass storage sub-system. The method features the steps of interconnecting each one of the processor systems in a point to point two way channel interconnection with each other one of the processor systems and storing input data across the processor systems according to a distributed, redundant storage process. Thereby, data is stored at each mass sub-storage system and some of a redundant representation of the data is stored also at each processor mass storage sub-system.
- In particular aspects of the invention, the method features storing data across the processor systems according to a RAID-5 process and, further, storing data within each processor system according to a RAID-5 process.
- The method further features the step of reading data from the computer system, in the absence of a failure of any of the processor systems, over respective ones of the data channel interconnections, whereby the reading step establishes a load balance across the processor systems. In the presence of a failure of one of the processor systems, the reading of data from the computer system features the steps of reading data from each non-failed processor system storing the data, and reading redundant data from the non-failed processor systems in place of the data stored at the failed processor system. Thereafter, the needed data stored at the failed processor system can be recreated using the redundant data and the data read from the non-failed processor systems. In some embodiments of the invention, during the time when a failure has occurred at any processor system, the method may prevent the writing of any data at any processor system until the failed processor system is brought back on line.
- In another aspect, the invention further features the limiting case wherein there are only two processor systems initially. In accordance with this aspect of the invention, the system continues, in the absence of a failure, to provide increased bandwidth by reading succeeding blocks of data from alternate processors in sequence; and, in this manner, effects a load balancing and provides increased read bandwidth compared to a typical so-called “mirrored” system. In a typical mirrored system, data is read from one processor only, the other processor acting as a backup. Thus, in accordance with the invention, data is read from all of the processors thereby providing an increased read bandwidth and load balancing. As noted hereinafter, therefore, the two processor version of the invention, while not providing all of the advantages of the system with a larger number of processors, does allow easy scalability to a processor system having greater capacity, less overhead, and greater bandwidth.
- In various aspects of the storage step, the method, in some embodiments of the invention wherein data storage is modelled at a disk abstraction level, feature either designating one processor system to effect all write functions for the computer system, designating one processor for allocating files for each data input and enabling all processor systems to write input data to each of its associated and allocated files, or arbitrating write operations among the processor systems using a distributed lock manager.
- In another aspect of the storage step, however, the data input is stored as named fragment files, or named files, in each processor system. When stored as named fragment files, or named files, they can be accessed and reconstructed, for example even when a process or system is added to the distributed computer system. The system continues to deliver stored data as an output stream even as the number of processor systems, network interfaces, and amount of storage is changed. This is possible because the method uses file names to distinguish, modulus “IN”, data fragments from modulus “N+1” data fragments, even as these modulus “N+1” data fragments are created from the modulus “N” fragments. Further, the method features the step of reconstructing a failed processor system by reconstructing only the data objects which were written while the processor system was in a failed state.
- The distributed computer system in accordance with the invention has at least three processor systems for redundantly storing data, each processor system having at least one central processing unit and at least one mass storage system. The distributed computer system features interconnecting channels providing a point to point two way channel interconnection from each one of the processor systems to each other one of the processor systems, and a data storage controller at each processor system. The controllers act to store data input at any one of the processor systems according to a distributed redundant storage process whereby data is stored at each of the computer processors and some of a redundant representation of the data is stored also at each of the processors. In a preferred embodiment, the storage controllers store data across the processing systems according to a RAID-5 process, and further, can store data at each processor system in its associated mass storage sub-system according to a RAID-5 process.
- The apparatus of the invention further features a system in which the controllers read data from the computer system, in the absence of a failure of any processor system, so as to maintain and establish a load balance across the computer system. In the presence of a failure of one of the processor systems, the controllers read data from each non-failed processor system storing the data (over the appropriate dedicated network connection) and read redundant data from each non-failed processor system in place of the data stored at the failed processor system. The requesting processor system can then recreate the data stored at the failed processor using the read data and the redundant data. In a preferred embodiment, an “external” processor can be employed to recreate the data stored at the failed processor, thereby preserving the delivery bandwidth of the system even in the face of a failed processor.
- In another aspect, the apparatus features a storage controller which stores the input data as named fragment files, or named files, in the distributed computer system.
- The apparatus of the invention also relates to a redundant switch having at least n interruptible inputs, n interrupting inputs, and n outputs. The redundant switch features n+1 switched systems, each switched system having at least two control inputs, a first input, a second input, a third input, and a fourth input, and a first and a second output. Each switched system is connected at its second output to n interrupting signal generator, n interrupting output of the associated signal generator being connected to the second input of the connected switched system. The switched systems are interconnected in a ring structure so that each switched system further has n interruptible input signal connected to the first input, the second input of a first neighbor switched system in the ring being connected to the third input, the interruptible input from the other neighbor switched system on the ring being connected to the fourth input, and each switched system having switching circuitry responsive to the control input for switching any of its inputs to at least its first output and for connecting either of its first and fourth inputs to its second output. The controller provides the control signals to the control inputs of the switched system to enable the cross-bar operation.
- In another aspect, the redundant switch has n+1 switched systems each switched system having at least two control inputs, four signal inputs, and two signal outputs. Each switched system is connected at one of its outputs to an associated interrupting signal generator and n interrupting output of the associated signal generator is connected to an input of the connected switched system. The switched systems are interconnected in a ring structure so that each switched system is connected to a first and a second nearest neighbor. Each switched system has switching circuitry responsive to the control input for the switched system for selectively switching its inputs to its outputs. A controller provides the control inputs to the switched systems to enable the switched systems to effectively rotate signal switching functions one position in one or both directions around the ring. Thereby, a failed signal generator can be bypassed and the signals on the n first outputs continue uninterrupted.
- In another aspect, the invention relates to a distributed data delivery system having at least three processor systems for redundantly storing data, each processor system having at least one central processing unit and one mass storage system. Interconnecting data channels provide a point to point, two way, channel interconnection from each one of the processor systems to each other one of the processor systems. A data storage controller at each processor system stores data input from any one of the processor systems according to a distributed, redundant storage process whereby data is stored at each of the processor systems and some of a redundant representation of the data is stored at each of the processors as well. A switching circuit having n interruptible input ports, at least n+1 interrupting input ports, and at least n+1 output ports, has n interruptible input signals connected to respective primary processor systems, each primary processor system having an output connected to a respective interrupting input. A switching controller, connected to the switching circuit for selectively interrupting each of the n interruptible input ports with the signal information available from a respective one of the processor systems, in the event of a failure at a processor, and using a previously unused processor system in that process, causes the switching circuit to connect the interruptible input port of the failed processor system to a different processor system, and to replace the output of the failed processor system with the output of another processor system.
- Other objects, features, and advantages of the invention will be apparent from the following drawings taken together with the description of a particular embodiments in which:
- FIG. 1 is a schematic block diagram of an interconnected computer system according to the invention;
- FIG. 2 is a more detailed block diagram of a processor system according to the invention;
- FIG. 3 is a table illustrating an index file in accordance with the invention;
- FIG. 4 is a diagram illustrating the software architecture in accordance with the invention;
- FIG. 5 illustrates the cluster volume arrangement according to the invention;
- FIG. 6 describes the cluster volume HomeBlock format in accordance with the invention;
- FIG. 6A is a table defining the HomeBlock format of FIG. 6;
- FIG. 6B shows a data object broken into a plurality of blocks;
- FIG. 6C shows the relationship of a data object to its stored named fragment files;
- FIG. 6D is a table defining the header block of a named fragment file according to one embodiment of the invention;
- FIG. 6E is a table defining the data object format of FIG. 6D;
- FIG. 6F illustrates reading a video object from the cluster members;
- FIG. 7 illustrates the data and parity organization for a data object according to a RAID-5 striping protocol;
- FIG. 8 is a table describing the terminology used in connection with the flow chart of FIG. 9;
- FIGS.9A-9C are flow charts for determining data and ParityBlock locations according to the invention;
- FIG. 10 illustrates a cluster volume both before and after reformatting in accordance with the invention;
- FIG. 11 illustrates a 2n×n switch;
- FIG. 12 illustrates
n 2×1 switches in a circuit arrangement; - FIG. 13 illustrates a 2n×n system in accordance with the invention;
- FIG. 14 is a more detailed block diagram of the switched system of FIG. 13;
- FIG. 15 illustrates a video system in a ring configuration accordance with an alternate embodiment of the invention;
- FIG. 16 illustrates, in more detail, the switched system of FIG. 15; and
- FIG. 17 illustrates a truth table for the switched system of FIG. 16 in accordance with the invention.
- Referring to FIG. 1, a redundant distributed
computer system 10 has a plurality ofprocessor systems channels processor system 12 is directly connected in a point to point connection to each other processor system. In other embodiments of the invention, more or less processor systems can be used, although a practical upper limit may be between nine and thirteen and the lower limit is three. (As noted earlier, a two processor system, can be used, to effect some of the advantages of the invention; however, for purposes of description hereinafter, the three or more processor embodiment will be detailed.). - Referring in more detail to each
processor system 12, and referring to FIG. 2, eachprocessor system 12 has aCPU 20 connecting, in the illustrated embodiment, to an internaldata communications bus 22, to which are connected at least a memory andcommunications controller 24 and a massmemory storage unit 26. The mass storage unit typically has a plurality ofdisk drive units 28.Controller 24 is also connected to a plurality ofchannel interface units 30, each of which is connected to adifferent interconnecting channel 14 for establishing the point to point communications with other processor systems through their respectivechannel interface units 30. - In the illustrated embodiment of the invention, the interconnecting
channels 14 use a protocol running on Fast Ethernet datalink devices. This protocol provides a relatively high efficiency and enables communications between processors, in the illustrated embodiment, at a bandwidth on the order of 100 megabits/sec. Accordingly, referring to FIG. 1, eachprocessor 12, being connected to four interconnecting channels, has a bandwidth to the external processor memories of approximately 400 megabits/sec. (less overhead), in addition to its own capabilities with regard to itslocal mass storage 26. - In one particular application of the computer system illustrated in FIG. 1, video input information and data is provided to one or
more processor systems 12 over external feedlines, for example, network feeds 32 which require high bandwidth storage of the substantial data needed to represent and store even small durations of video data (including audio). In particular, for example, one minute of video data can require sixty-six megabytes of storage. Fortunately, the particular embodiment described herein and displayed in FIG. 1 has substantial bandwidth to enable the video information to be distributed among the various processor systems so that in a preferred embodiment of the invention the video data input to one of theprocessor systems 12 is actually stored along many, and preferably all of thevideo processor systems 12. - In accordance with a particular embodiment of the invention, the
controllers 24 of theprocessor systems 12 individually and collectively act to store data across theentire computer system 10 network in a redundant fashion so that if any oneprocessor system 12 fails the remaining processor systems can nevertheless reconstruct all the data available in the entire system. In addition, this approach, as will be described in more detail below, provides, in the illustrated embodiment, load balancing across the various processing systems as well as enabling any one processor system requiring either to read or write data the capability of a very large bandwidth memory communication channel. - In the preferred embodiment of the invention, a RAID-5 architecture is implemented, for the first time, at the system level to provide the redundancy, load balancing, and bandwidth necessary to meet the objectives of the distributive computer system. In a particular application, assuming that video data is to be received by
processor system 12 e oninput line 30, thecomputer system 10 will have, before receipt of the data, allocated storage in each of the processor systems in one of a plurality of different ways. In one method, but not the preferred method which will be described hereinafter, a storage cluster volume having a specified capacity will be deployed among theprocessor systems 12. For example, if the storage cluster volume was 10 gigabytes, in the embodiment of FIG. 1, each processor system would be responsible for servicing two gigabytes of the cluster volume for use not only for itself, but for the other processor systems or members of the cluster. - Under normal operating conditions therefore the systems will have preestablished a protocol for both writing and reading data. According to one protocol, the systems will have selected one system for writing of all data for the cluster volume. In another aspect of the invention, a distributed lock may be used to arbitrate write operations among the processor systems. In a third embodiment, one processor system can allocate files for each data input and thereafter enable each of the processor systems to write input data to its associated allocated files.
- The cluster volume described above is a collection of logical disk blocks (some local and some remote) that are shared between cluster members (the different processor systems of the cluster). In this design, each cluster member has an instance of a file system running, and each node would have access to the entire set of logical blocks. While this solution works, it has several problems. First, only one system can write to the cluster volume; second, the integrity of the cluster volume has to be strictly managed; and third, changes to the file system structure (the creation or deletion of files) has to be replicated in each instance of the file system running on each cluster member.
- Rather than use the cluster volume structure identified above, in a preferred embodiment of the invention, the cluster architecture provides access to data objects and named fragment files, much in the way a file server provides “files” to network clients. Since the cluster members keep their file system private and only export access to the data objects, each cluster member can read, write, or delete files from its local file system without disrupting the other members of the cluster. There is no significant penalty for this method and it reduces the complexity of the cluster software. Data objects are then fragmented and written to the members of a cluster using the RAID-5 striping and parity techniques, allowing each individual data object to be read, recovered, or written independently of all other data objects. In addition, because all data objects are stored independently, only the data objects written while a cluster member is down need be recovered. In the cluster volume method, as will be described below, the entire local cluster volume has to be reconstructed. The reconstruction of the entire cluster volume can take anywhere from several hours to several days depending upon the size of a volume. When only the data objects are stored, only a small subset of the data will need to be reconstructed if written during the time when a cluster member is down.
- In order to achieve a redundant, and hence fault tolerant, storage system, each of the
processors 12 is viewed, even though they exist at the system level, in a RAID-5 context, with striping, as follows. Assuming that each processor writes in 64 kilobytes blocks, a first block will be sent to and written byprocessor 12 a, a second block byprocessor 12 b, a third block byprocessor 12 c, a fourth block byprocessor 12 d, and a fifth block, a Redundancy block or ParityBlock byprocessor 12 e. In accordance with the RAID-5 approach, the redundancy block or ParityBlock to be written byprocessor 12 e in its mass storage will be the EXCLUSIVE-OR of the blocks sent toprocessors - After the first four data blocks (and one redundancy block) have been written, the next block of data (a DataBlock) can be written to, for example,
processor system 12 b, the sixth block toprocessor system 12 c, the seventh block toprocessor system 12 d, and the eighth block toprocessor system 12 e. Then, the parity or redundancy block would be written inprocessor system 12 a. In accordance with this practice, each of the redundant blocks would be written in a determined and round robin, rotating manner, in accordance with the RAID-5 processing protocol. The location of the blocks is illustrated in FIG. 3. A short algorithm can be employed to determine the location of a particular block, as described in more detail below. - Further, within each processor system itself, the processors can use a RAID-5 protocol, in its ordinary and well known sense, to store data among its plurality of
disk drive devices 26 associated with that processor. Thus, there is provided the novel circumstance of employing the RAID-5 technology twice, both at the storage level as is well known, but also at the system level, which is new, to achieve a high reliability, lower cost, computer system. - The structure of FIG. 1 as described herein has a number of constraints in order to maintain its proper functionality. First, each cluster volume must have at least three members. Second, a cluster cannot continue to operate, if it uses the RAID-5 protocol, if more than one cluster member should fail. (The use of other, more complex protocols, can relax, somewhat this constraint.) Third, it appears that a practical limit, under current operating parameters, is nine to thirteen cluster members. When more cluster members are employed, the point to point wiring becomes progressively more difficult and expensive. Indeed, nine cluster members would require thirty-six interconnecting channels while thirteen cluster volumes would have 78 interconnecting channels.
- Referring now to FIG. 4, the major software components of a single processor system12 (also called a “cluster member”) include a
port driver 50, aclass driver 52, a remote file provider 54 alocal file provider 56, a file system 58 (SeaFile, FAT, NTFS), aSCSI driver 60, aRAID controller 62, afast Ethernet adapter 64, and aSeaNet transport 66. - The cluster architecture utilizes RAID-5 technology to build a fault tolerant distributed system. The data objects are stored as named fragment files across the members of the cluster. Data objects are striped (in accordance with RAID-5 protocol) and stored with parity information to allow a missing named fragment file to be reconstructed if a cluster member fails. This is described in more detail below.
- In order to provide transparent data object access, a RAID port driver masks the fact that the data object exists as a set of named fragment files. It provides the multiplexing and demultiplexing services to merge the named fragment files into a data object byte stream. The RAID port driver registers as both a provider and a consumer. When the class driver attempts to open a data object, it calls all the provider port drivers in the system. Upon being called, the RAID port driver becomes a consumer and uses the class driver to open each of the data fragments that comprise the data object. Once a session has been established to each of the named fragment files, that is, once access has been provided to each named fragment file, the RAID port driver performs an open call back to notify the class driver that the data object is available.
- In the particular application of accessing the data (video) objects, the port driver accesses the data (video) objects stored on the cluster. The video named fragment files are read or written using RAID-5 methods from the local and remote providers. It masks other port drivers (for example, video decoders or ATM links) from any failures, since it will reconstruct missing data fragments in real time. The remote file provider represents any third party application or device driver that might use the cluster technology. Examples include Lotus Notes, medical applications, or database systems. The on-disk structure of the cluster volume (file system 54) can be either NTFS, FAT, SeaFile or raw disk access, in the illustrated embodiment. The file system component is responsible for storing and retrieving the named fragment files.
- The
Transport component 66 provides an efficient network service to other cluster members. It detects and reports failures in real-time to the RAID driver. The fast Ethernet Adapter provides a 100 Mb/second full duplex link between each cluster member throughinterface units 30. The SCSI driver, for example a DAC960, provides access to local disk storage and allows the cluster RAID driver to read or write data for local file system managers. - A RAID controller provides efficient access to the named fragment files. The local portion of a data object is read or written by the RAID controller. The RAID controlled volume can be configured, to either a RAID-0, RAID-1, RAID-5, RAID-6 or RAID-7 level in the illustrated embodiment, and as noted above, configuring a volume in a RAID-5 protocol allows a cluster member to continue even when a single disk fails to perform properly.
- As described above, when cluster volumes are used, a cluster volume is a logical disk volume that spans multiple cluster members or processor systems. Considering a specific application, such as the storage and retrieval of video data objects, the design principal for a cluster volume is to utilize a fraction of each processor system memory for each video stream thus creating a balanced and scalable system. Since the video data stored in the cluster volumes is mission critical, the integrity of the cluster volume must be carefully maintained. Accordingly, a set of checks are used to ensure that the cluster members agree on a consistent view of the cluster volume and that only one cluster member writes to the cluster volume.
- In the illustrated embodiment of the invention, and referring to FIG. 5, each cluster member of a cluster volume that is, each
processor system 12, maintains and verifies its cluster volume “HomeBlock” to ensure the integrity of the cluster volume. When a cluster member processor system boots, it checks the cluster volume HomeBlock incarnation and volume identifier against the other cluster member processor systems HomeBlocks to ensure that the cluster volume was not modified while it was down. If the cluster volume was modified, a rebuild process can repair the out of date cluster member. - Accordingly, therefore, each
cluster member 35, in the illustrated embodiment of the invention, has onecluster volume HomeBlock 37 for each cluster volume. Referring to FIGS. 6 and 6A, the various offsets and byte identifications are detailed for the preferred embodiment of the invention. The cluster volumes are organized using the RAID-5 protocol across the processor systems which are the members of the cluster. (Note that a cluster volume need not extend across allprocessors 12 of thesystem 10, but must extend across at least three processors, or two if mirroring is permitted.) The controllers organize the data and the writing controller writes blocks of data in a round robin fashion, as described above, across the cluster members participating in the cluster volume. - As noted above, in the preferred embodiment, data objects are employed. Each data object in this system is stored as a set of named fragment files. Each fragment file contains a header block that allows the named fragment file to be self describing. Data objects are fragmented when they are written to the cluster. FIGS. 6B and 6C illustrate the relationship of a data object to its named fragment files. As illustrated, a fragment file written on any individual cluster member includes the named fragment header and the plurality of blocks comprising the fragment file. In the example, the data object is fragmented into three files.
- The amount of data in a block is called the volume stripe size. In the illustrated embodiment of the invention the default stripe size is 64 kilobytes. In addition to striping, the RAID-5 protocol uses a ParityBlock to recover from a single fault. The ParityBlock is written for every n minus 1 blocks where n is the number of cluster processor system members. This technique, as noted above, thus allows for the reconstruction of the cluster volume data when any one cluster member fails. In the preferred embodiment of the invention, parity blocks are created by EXCLUSIVE-OR'ing the n−1 DataBlocks forming a stripe level. For the preferred embodiment of the invention, wherein data is stored as data objects, FIG. 6D describes the named fragment file header format. As noted above, the header block describes the content of the fragment. FIG. 6E describes, in table form, the particular components of the header for one particular embodiment of the invention.
- FIG. 6F illustrates reading the DataBlocks of a single video object spread across the members of a cluster. To play this video object, a cluster member opens each named fragment file and reads the first block from
cluster member 0, for example, the second block fromcluster member 1, and the third block, assuming no parity block, fromcluster member 2. At this point the read process would cycle back tocluster member 0. The complexity of this process is hidden, as noted above, from the consumer by the RAID port driver. Since, in the above description, the parity blocks which are stored with the named fragment files were ignored, in fact when the video data object is read the parity blocks are skipped and only the actual data is read. The organization of the parity blocks thus introduces an additional complexity which must be attended to. The parity DataBlocks are also written, as noted above, in a round robin fashion to avoid a single set of disk heads from being left idle during the read process. - Accordingly, therefore, referring to FIG. 7, there is illustrated the organization wherein parity blocks are stored in each named fragment file on each cluster member. During a failure, the blocks associated with a missing block are read to reconstruct the missing block. For example, if
cluster member 2 were unavailable, andblock 7 was requested,parity block 6|7 andblock 6 would be read and EXCLUSIVE OR'd to generate the missing block. While it would certainly be possible to determine the location of a DataBlock using tables, in a preferred embodiment of the invention a algorithmic process is preferred and operates more quickly. In this illustrated embodiment, integer arithmetic is employed to locate data and parity blocks stored in named fragment files. - Referring to FIG. 8, there is illustrated a list of the variables used in a computer software program used to determine the location of a block. A flow chart of the program will now be described in connection with FIG. 9A. Initially, at 300, the number of parity blocks is first determined by dividing the block number to be located, by the cluster size minus 1. This, in essence, provides the number of parity blocks up to and but not including the row in which the block to be found resides. The division is integer division and the remainder is discarded. Thus, PBC provides the number of parity blocks up to and including the last complete row of blocks. Next, the so-called adjusted block number is set equal to the total number of blocks which have been stored, including the parity blocks within complete rows, up to the block to be found. This is indicated at302.
- The optional parity block count is determined next. To determine whether the parity block, in the row of the block to be found, is located before or after the block to be located, a quantity ABNL, equal to the total number of blocks modulo the number of cluster members squared, is generated at 364. The optional parity count is set to “zero” at 306, and, if ABNL divided by the number of clusters is less than or equal to ABNL modulo the number of clusters at 308, the optional parity count is set to “one” at 310. A “zero” optional parity count indicates that the block is before the parity block in the row while a “one” optional parity count indicates that the block is after the parity block of the row. This assumes that the parity is configured as described in FIG. 6C.
- The final block number is then the adjusted block number plus the value of OPC. This is indicated at320. Then, the cluster member can be calculated by taking the final block number modulo the number of clusters. This is indicated at 330. The local block number within that cluster is then the final block number divided by the number of clusters. This is indicated at 340. (Recall that the first block number is zero.)
- If a failure has occurred, the parity block number for the binary block number must be determined. This is performed as illustrated below, referring to the flow chart of FIG. 9B. First, a parity block number is determined by multiplying the number of clusters by the integer portion of a division, the numerator of which is the final block number and the denominator of which is the number of clusters. This is indicated at400. Next, the parity block offset within the repeating pattern is determined and added to the parity block number (PBN) previously determined. This is accomplished by taking the final block number modulo the number of cluster members squared and dividing that number by the number of clusters. That value is then added to the parity block number to obtain the final value of the parity block number. This is indicated at 420.
- It may also be necessary to locate the DataBlocks associated with a parity block. Referring to FIG. 9C, this is determined by finding the row in which the parity block number (PBN) is to be found. The row is determined by taking the integer value of the division of the parity block number and the number of clusters and multiplying that value times the number of clusters. This is indicated at430. The parity block location is equal to the parity block number modulo the number of cluster members squared, that quantity divided by the number of cluster members. This is indicated at 440. The following subroutine (written in C) is then employed to determine the blocks associated with the parity blocks:
- for (i=0; i<CS; i++)
- if (PBN row +i !=PBN)
- FBN=PBN row +i
- If a cluster processor system member fails, the reading controller for the data object implements the preceding steps to recover a missing DataBlock. The output of this operation yields the missing (failed) DataBlock.
- When cluster volumes are employed, as noted above, the cluster volume master controls access to each block of the cluster volume. The
computer system 10 provides a protocol to determine the cluster volume master for each volume. Each cluster volume, in the illustrated and preferred embodiment, is controlled by a different processor system member (to the extent possible) to distribute the write load across all of the cluster members. When a cluster volume master detects that a cluster processor system member has failed, it instructs the remaining cluster members to advance the cluster volume incarnation (in the HomeBlock) and to clear the cluster volume “dirty bit” in the cluster volume state. The next write operation to the cluster volume will cause the dirty bit to be set, indicating that the failed cluster member must execute a rebuilding process before it can rejoin the cluster volume. If the implemented cluster protocol prevents a write to the cluster volume while a cluster member is in a failed state, the failed member may not need to rebuild. - The cluster volume does not have to be write locked during the rebuilding operation. Write operations to already rebuilt DataBlocks simply update the DataBlock. Write operations to DataBlocks not yet rebuilt can simply be ignored and they will be reconstructed at a later time. Special care however is required when handling a write operation for the current DataBlock being reconstructed. In this case, reconstruction should be completed and the write operation should be executed after, and only after, the reconstructed data is written.
- On the other hand, when the system operates upon data objects, the system can continue to operate, modifying data objects as necessary. When the failed member has been restored, it executes a rebuilding process only for the data objects which have been changed. The remaining objects are not affected. In this way, even during a failure, writing can continue to be implemented and the failure becomes transparent to the user or consumer. Importantly, also, since the rebuilding occurs object by object, it can be done at a more leisurely pace since not all of a cluster volume will be adversely affected by writing any of file within the volume.
- Once a cluster processor system member has failed, the failure of any other cluster processor system member will cause the cluster volume to become unreadable in this illustrated embodiment. Only after the failed cluster member has been reconstructed, therefore, can another failure be handled for this embodiment of the invention. However, as noted above, in other embodiments of the invention, two or even more failures could be handled, however, more complex, and hence more lengthy reconstruction and encryption processes would need to be employed.
- When expansion of a cluster is required, for example when cluster volumes become full or when the capacity of the cluster needs to be increased, the method and apparatus of the invention provide a process for increasing the storage capacity “on line”. For example, to add storage to a cluster, disk drives are added to each cluster member (that is, each processor system12) and a new cluster volume or new data objects can be created. This is a simple operation and the existing cluster volumes or data objects remain fault tolerant during the upgrade. Cluster members may have to be rebooted however in order to “see” (that is, recognize) the new disk drives.
- However, the method and apparatus of the invention can further provide for the addition of a new cluster processor system (and its associated storage) during operation. This is a much more complex operation and can proceed as follows.
- The new cluster processor system member is inserted into the cluster by networking the new cluster member to each of the original cluster
processor system members 12 as illustrated in FIG. 1. Each cluster volume is then “write locked” so that writing to any portion of the volume is not allowed. Each cluster volume is reformatted by initiating a change in the current cluster volume format to a new format. This operation is in essence a translation from an n member cluster volume to an n+1 member cluster volume. Each DataBlock is read and rewritten, new ParityBlocks are generated, and the progress is check-pointed in case a system failure occurs during the reformatting operation. The size of any one cluster volume is not increased by this operation; rather, each local cluster volume size is decreased and the residual disk space from the operation can be configured into yet additional cluster volume(s). Finally, as cluster volume reformatting is completed, the “write lock” is removed from the cluster volume. Referring to FIG. 10 in a typical system, the various sizes of the cluster volume within each of the cluster processor system members is illustrated both before and after reformatting. - When a new cluster member is added to a system wherein the format of the stored data is in data objects, the existing data objects need to be refragmented from n named fragment files to n+1 named fragment files. This operation can occur as a background activity allowing access to the original data object until the new named fragment files have been created. Once the new fragment files exist the old fragment files can be deleted. This process takes place, therefore, at “leisure” and at no time is the named fragment unavailable for use.
- Referring now to FIGS.11-13, there is illustrated a switching system useful in conjunction with the structure of FIG. 1, and in which a fault tolerant operation provides resiliency and robustness, as well as relatively low cost for the described system.
- In a most general sense, in a video insertion system, to which the invention is particularly applicable, it is desirable to have a 2n×n cross-bar system wherein any one of 2n inputs can be placed on any of n outputs. Such a
cross-bar system 100, referring to FIG. 11, might have, for example, n (interruptible) network feeds 102 and n advertising or other interruptingfeeds 104 which are to be used to selectively replace the network feeds. Each of then output selections 106 represents one of the network feeds which is switchably replaced, from time to time by one of the interrupting feeds 104. The n outputs connect to output channels for transmission over, for example, a cable network. - A simpler approach, though less flexible and hence to some extent less desirable, is illustrated in FIG. 12 wherein the 2n×n switch108 is replaced by n two by one switches 110. In this configuration, a
network input 112 is provided to each 2×1switch 110 and an interrupting orother input 114 is also provided to each 2×1switch 110. This system works well provided that none of the interrupting feeds is lost. (The interrupting feeds overlines 114 are typically generated by aprocessor system 12 and it is implicitly assumed that the network feeds are reliable and always present.) If an interrupting feed is lost, by failure of aprocessor system 12, then the output overlines 116 will be incorrect since there is no provision for an alternate source of the interrupting feed. In summary then, in a typical system, the network feeds overlines 112 are considered reliable and available at all times. Thus, it is only the interrupting feed overlines 114 which may fail. The interrupting feeds are typically provided by, for example, aprocessor system 12, and thus if theprocessor system 12 fails, there is no flexibility or robustness in theswitches 110, as configured in FIG. 12, (or even the crossbar switch provided in FIG. 11, since the failed source cannot be replaced) to recover. - In accordance with the invention, however, a “spare” switched system is provided which can be used to replace a failed interrupting feed in the FIG. 12 embodiment, in a robust and flexible manner. Thus, referring to FIG. 13, the invention provides a method and apparatus for compensating for a failed insertion feed from a system processor by providing a complete spare system. The spare system interconnects with the active systems in a ring structure, to create a robust and fault-tolerant signal, for example video, delivery system. FIG. 13 illustrates a limited video delivery system in which there are two network feeds and two interrupting feeds generated by local processor systems. In other embodiments more network interruptible and interrupting feeds can be used and the system can be accordingly scaled. The network feeds over
lines feed systems processor system 138, 140 (these can be the same asprocessor systems 12 described in connection with FIG. 1) and a switchedsystem - The switched systems provide a network feed output signal on
lines 146, 148, designated as OUT0 and OUT1, respectively. In the illustrated embodiment, a spare video insertion andfeed system 150, which has aprocessor system 152 and a switchedsystem 154 mirroring the interconnection of the processor system and switched system ofvideo systems - The
processor systems processor system lines lines lines - The
video systems video systems system 144 and switchedsystem 142 while the NET0 input is provided to switchedsystem 142 and switchedsystem 154.Outputs systems board controller 12 a, typically controlled by the processor CPU, two switch control signals as described in more detail below. - Referring now to FIG. 14, there is illustrated a preferred embodiment of the video system which allows, referring to the orientation of FIG. 13, the video systems to switch in a downward round robin direction (meaning that
spare video system 150 can replace the operation ofvideo system 134 shouldvideo system 134 orvideo system 136 fail). Thus, as noted above, shouldvideo system 134 fail due to a processor failure (it is assumed that the switched system will not fail), thespare video system 150 replaces it and provides the correct interrupting feed to the switchedsystem 142. Should thevideo system 136 fail due to a processor system failure, in a chain reaction,video system 134 will act to provide the correct interrupting feed to switchedsystem 144 andvideo system 150 will thereafter operate to provide the correct interrupting feed to the switchedsystem 142 ofvideo system 134. This “downward” movement can be extended to a larger operating system having, for example, nine network-feeds in which case there would be the nine network video systems likecircuitry 134 plus a spare video system corresponding tosystem 150. In other embodiments, the ring can be reconfigured to move upward or as will be hereinafter described, the switched systems can be structured so that the motion of the ring can be directed in either the upward or downward direction as viewed in FIG. 13. In this latter configuration, the interconnecting structure is more complex as will be described hereinafter. - Referring now to FIG. 14, in the illustrated embodiment, each switched system of FIG. 13 has two multi-input single output controlled
switch elements video system 134. - In normal operation, the network feed over
line 130 is directed to the default ornumber 1 position of each ofswitches line 130 is fed throughswitch 192 and is output overline 146. Simultaneously that signal is also fed throughswitch 190 and is output overline 160 to theprocessor system 138. The processor system, analyzes the input signal and provides, overline 166, at the correct time, an insert which interrupts the signal overline 130 and replaces it. This is effected byswitch element 192 which changes the signal overline 146 from that connected at itsnumber 1 position to that connected at itsnumber 3 position. (The controller (and control lines) for switching the outputs ofswitches line 166 ends, theswitch element 192 returns to its “default”number 1 position. Thus, in normal operation,switch 192, under the control of a controller, switches back and forth asprocessor system 138 generates the correct interrupting video in accordance with the processor interconnections illustrated in FIG. 13 (as an example of a simpler version of the more complex system illustrated in FIG. 1). - If the
processor 140, referring now to FIG. 13, ofvideo system 136 were to fail, the first step of the fault-tolerant system would provide that the video system of 134 would be modified so that it generates the necessary insert video signals for switchedsystem 144 and provides those insert signals to switchedsystem 144 overline 172. Accordingly, in this failure mode of operation, referring now also to FIG. 14, the network feed forvideo system 136, that is NET1 overline 132, connects tovideo system 134, is switched byswitch element 190 ofvideo system 134 and is placed on the output ofswitch element 190, that is online 160. Theprocessor system 138 in response to this new video generates an insert video overline 166 which is also available overline 172. That insert video signal is thus provided to the switchedsystem 144 and its switch, which corresponds to switch 192 of switchedsystem 142, then connects the input on itscorresponding line input 4 toline 146, and outputs it overline 146 as “OUT1”. - In this replacement process, however,
video system 134 has lost use of itsprocessor system 138. It thus turns to thespare video system 150 and itsprocessor system 152 which, in combination with switchedsystem 154 provides the appropriate insert video over line 176 (along with the correct insert control signals).Switch 192, thus, at the correct time, switches to place the insert video available overline 176 at its output, overline 146, to become OUT0. After the insert ends, switch 192 returns to its default value to place NETO, its network input, atswitch position 1, as its output. In this manner, thevideo systems - This ringed redundancy operates not only because the switched
systems - The embodiment illustrated in FIGS. 13 and 14 fails in an “up direction”. By simply modifying the “neighboring connections” so that, for example,
video system 136 provides its network input not tovideo system 134 but to sparevideo system 150 and accordingly provides its output overline 174 not to sparevideo system 150 but tovideo system 134, the system would fail in the reverse direction. - In a second particular embodiment of the video distribution system, there is provided a more complex video switched system which is capable of shifting “in either direction” in response to a failed system. By this is meant that the ring connection, depending upon the proximity of the failure to the spare, will fail either up or down to reduce the time delay for correcting the failed situation. It will be seen, however, referring to FIGS. 13 and 14, that it is not necessary to use this system, but that single direction failure system will work substantially as well in most failure situations.
- Accordingly, referring to FIGS. 15 and 16, there is illustrated a 3 element ringed system which can fail in either direction. This system operates in a manner corresponding to that of the video delivery system illustrated in connection with FIGS. 13 and 14, and accordingly, its detailed operation need not be described. The ringed system has two
video systems video processor system spare video system 212 having avideo processor 214 and a switchedsystem 216. (The point to point, two way, interconnecting channels between theprocessors - Independent of the direction of the shift, and referring to FIG. 15, the
processor system 214 of thespare video processor 212 will, in this illustrated embodiment, replace the processor system which has failed. The switch elements of the switched systems for the spare system and the failed system will reconfigure the switches to provide the network input for the failed system to the spare system, which will provide that network input to its processor system. The video insert output of the processor system will then be routed through the spare switched system to the switch system corresponding to the failed processor for delivery, at the correct time, to its output. When more than two input network feeds are used, a larger element ringed system can be employed, and, as with the embodiment of FIGS. 13, and 14, the video systems will chain with a first nearest neighbor replacing the failed processor and a next second nearest neighbor then acting to replace the processor of the first nearest neighbor, etc., until the spare video system is used. - Referring to FIG. 16, a typical switched system has four
multi-input switches switches - Additions, subtractions, and other modifications of the preferred embodiments of the invention will be apparent to those practiced in the art and are within the scope of following claims.
- What is claimed is:
Claims (39)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/826,695 US6449730B2 (en) | 1995-10-24 | 2001-04-05 | Loosely coupled mass storage computer cluster |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/547,565 US5862312A (en) | 1995-10-24 | 1995-10-24 | Loosely coupled mass storage computer cluster |
US08/991,278 US5996089A (en) | 1995-10-24 | 1997-12-16 | Loosely coupled mass storage computer cluster |
US09/412,232 US6571349B1 (en) | 1995-10-24 | 1999-10-05 | Loosely coupled mass storage computer cluster |
US09/826,695 US6449730B2 (en) | 1995-10-24 | 2001-04-05 | Loosely coupled mass storage computer cluster |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/412,232 Continuation US6571349B1 (en) | 1995-10-24 | 1999-10-05 | Loosely coupled mass storage computer cluster |
Publications (2)
Publication Number | Publication Date |
---|---|
US20010013104A1 true US20010013104A1 (en) | 2001-08-09 |
US6449730B2 US6449730B2 (en) | 2002-09-10 |
Family
ID=27068581
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/826,695 Expired - Lifetime US6449730B2 (en) | 1995-10-24 | 2001-04-05 | Loosely coupled mass storage computer cluster |
US09/954,830 Expired - Lifetime US6557114B2 (en) | 1995-10-24 | 2001-09-18 | Loosely coupled mass storage computer cluster |
US10/137,085 Expired - Lifetime US6574745B2 (en) | 1995-10-24 | 2002-04-30 | Loosely coupled mass storage computer cluster |
US10/414,059 Abandoned US20030191983A1 (en) | 1995-10-24 | 2003-04-15 | Loosely coupled mass storage computer cluster |
US10/938,765 Abandoned US20050166017A1 (en) | 1995-10-24 | 2004-09-10 | Loosely coupled mass storage computer cluster |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/954,830 Expired - Lifetime US6557114B2 (en) | 1995-10-24 | 2001-09-18 | Loosely coupled mass storage computer cluster |
US10/137,085 Expired - Lifetime US6574745B2 (en) | 1995-10-24 | 2002-04-30 | Loosely coupled mass storage computer cluster |
US10/414,059 Abandoned US20030191983A1 (en) | 1995-10-24 | 2003-04-15 | Loosely coupled mass storage computer cluster |
US10/938,765 Abandoned US20050166017A1 (en) | 1995-10-24 | 2004-09-10 | Loosely coupled mass storage computer cluster |
Country Status (1)
Country | Link |
---|---|
US (5) | US6449730B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050038622A1 (en) * | 2003-08-15 | 2005-02-17 | Broadcom Corporation | Method and system for rerouteable cyclic redundancy check sum (CRC) for different sources |
US20100162053A1 (en) * | 2008-12-23 | 2010-06-24 | Mosaid Technologies Incorporated | Error detection method and a system including one or more memory devices |
US20120089799A1 (en) * | 2009-06-18 | 2012-04-12 | Chengdu Huawei Symantec Technologies Co., Ltd. | Data backup processing method, data storage node apparatus and data storage device |
CN107346209A (en) * | 2016-05-08 | 2017-11-14 | 上海霄云信息科技有限公司 | A kind of multiple disks gathering data-storage system and its implementation and application process |
Families Citing this family (98)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5862312A (en) * | 1995-10-24 | 1999-01-19 | Seachange Technology, Inc. | Loosely coupled mass storage computer cluster |
US6567926B2 (en) * | 1995-10-24 | 2003-05-20 | Seachange International, Inc. | Loosely coupled mass storage computer cluster |
US6449730B2 (en) * | 1995-10-24 | 2002-09-10 | Seachange Technology, Inc. | Loosely coupled mass storage computer cluster |
US6871222B1 (en) | 1999-05-28 | 2005-03-22 | Oracle International Corporation | Quorumless cluster using disk-based messaging |
US7020695B1 (en) * | 1999-05-28 | 2006-03-28 | Oracle International Corporation | Using a cluster-wide shared repository to provide the latest consistent definition of the cluster (avoiding the partition-in time problem) |
US7076783B1 (en) | 1999-05-28 | 2006-07-11 | Oracle International Corporation | Providing figure of merit vote from application executing on a partitioned cluster |
US7391865B2 (en) | 1999-09-20 | 2008-06-24 | Security First Corporation | Secure data parser method and system |
AU7596300A (en) | 1999-09-20 | 2001-04-24 | Ethentica, Inc. | Cryptographic server with provisions for interoperability between cryptographic systems |
US6622163B1 (en) * | 2000-03-09 | 2003-09-16 | Dell Products L.P. | System and method for managing storage resources in a clustered computing environment |
US6779045B2 (en) * | 2001-03-21 | 2004-08-17 | Intel Corporation | System and apparatus for increasing the number of operations per transmission for a media management system |
US6950966B2 (en) * | 2001-07-17 | 2005-09-27 | Seachange International, Inc. | Data transmission from raid services |
US7685126B2 (en) | 2001-08-03 | 2010-03-23 | Isilon Systems, Inc. | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system |
US7146524B2 (en) | 2001-08-03 | 2006-12-05 | Isilon Systems, Inc. | Systems and methods for providing a distributed file system incorporating a virtual hot spare |
US7080400B1 (en) * | 2001-08-06 | 2006-07-18 | Navar Murgesh S | System and method for distributed storage and presentation of multimedia in a cable network environment |
US6889345B2 (en) * | 2001-10-19 | 2005-05-03 | Hewlett-Packard Development Company, Lp. | System and method for locating a failed storage device in a data storage system |
US7085953B1 (en) | 2002-11-01 | 2006-08-01 | International Business Machines Corporation | Method and means for tolerating multiple dependent or arbitrary double disk failures in a disk array |
US7318116B2 (en) * | 2002-11-08 | 2008-01-08 | International Business Machines Corporation | Control path failover in an automated data storage library |
US7937421B2 (en) * | 2002-11-14 | 2011-05-03 | Emc Corporation | Systems and methods for restriping files in a distributed file system |
US7552192B2 (en) * | 2002-12-18 | 2009-06-23 | Ronnie Gerome Carmichael | Massively parallel computer network-utilizing MPACT and multipoint parallel server (MPAS) technologies |
JP2004246632A (en) * | 2003-02-14 | 2004-09-02 | Hitachi Ltd | Data distribution server, program and network system |
US7351217B2 (en) * | 2003-05-23 | 2008-04-01 | Yvette Scherpenborg | Thermal compressive aerating bandage and methods of use relating to same |
CA2527210A1 (en) * | 2003-05-27 | 2004-12-09 | Clean Earth Technologies, Llc | Radar or sensor system with hierarchical architecture and reconfigurable functionality |
JP2005157825A (en) * | 2003-11-27 | 2005-06-16 | Hitachi Ltd | Computer system having failure recovery function and failure recovery method |
US7426656B2 (en) * | 2004-03-30 | 2008-09-16 | Hewlett-Packard Development Company, L.P. | Method and system executing user programs on non-deterministic processors |
US20060020852A1 (en) * | 2004-03-30 | 2006-01-26 | Bernick David L | Method and system of servicing asynchronous interrupts in multiple processors executing a user program |
US20050240806A1 (en) * | 2004-03-30 | 2005-10-27 | Hewlett-Packard Development Company, L.P. | Diagnostic memory dump method in a redundant processor |
US8434118B2 (en) * | 2004-05-27 | 2013-04-30 | Time Warner Cable Enterprises Llc | Playlist menu navigation |
US7203871B2 (en) | 2004-06-03 | 2007-04-10 | Cisco Technology, Inc. | Arrangement in a network node for secure storage and retrieval of encoded data distributed among multiple network nodes |
CA2584525C (en) | 2004-10-25 | 2012-09-25 | Rick L. Orsini | Secure data parser method and system |
US7734952B1 (en) * | 2004-10-27 | 2010-06-08 | Unisys Corporation | System and method for maintaining a constant processor service level in a computer |
US8055711B2 (en) | 2004-10-29 | 2011-11-08 | Emc Corporation | Non-blocking commit protocol systems and methods |
US8238350B2 (en) | 2004-10-29 | 2012-08-07 | Emc Corporation | Message batching with checkpoints systems and methods |
US8051425B2 (en) | 2004-10-29 | 2011-11-01 | Emc Corporation | Distributed system with asynchronous execution systems and methods |
US7472309B2 (en) * | 2004-12-22 | 2008-12-30 | Intel Corporation | Methods and apparatus to write a file to a nonvolatile memory |
US7386758B2 (en) * | 2005-01-13 | 2008-06-10 | Hitachi, Ltd. | Method and apparatus for reconstructing data in object-based storage arrays |
US20060168410A1 (en) * | 2005-01-24 | 2006-07-27 | Andruszkiewicz John J | Systems and methods of merge operations of a storage subsystem |
EP1705926A1 (en) * | 2005-03-24 | 2006-09-27 | Alcatel Alsthom Compagnie Generale D'electricite | Failsafe stream processing |
US20060288132A1 (en) * | 2005-05-31 | 2006-12-21 | Mccall James A | Memory single-to-multi load repeater architecture |
US7551572B2 (en) | 2005-10-21 | 2009-06-23 | Isilon Systems, Inc. | Systems and methods for providing variable protection |
US7797283B2 (en) | 2005-10-21 | 2010-09-14 | Isilon Systems, Inc. | Systems and methods for maintaining distributed data |
US7386675B2 (en) | 2005-10-21 | 2008-06-10 | Isilon Systems, Inc. | Systems and methods for using excitement values to predict future access to resources |
US7788303B2 (en) | 2005-10-21 | 2010-08-31 | Isilon Systems, Inc. | Systems and methods for distributed system scanning |
US7346720B2 (en) * | 2005-10-21 | 2008-03-18 | Isilon Systems, Inc. | Systems and methods for managing concurrent access requests to a shared resource |
US7917474B2 (en) | 2005-10-21 | 2011-03-29 | Isilon Systems, Inc. | Systems and methods for accessing and updating distributed data |
WO2008054406A2 (en) | 2005-11-18 | 2008-05-08 | Orsini Rick L | Secure data parser method and system |
US7921131B2 (en) | 2005-12-19 | 2011-04-05 | Yahoo! Inc. | Method using a hierarchy of servers for query processing of column chunks in a distributed column chunk data store |
US7921087B2 (en) * | 2005-12-19 | 2011-04-05 | Yahoo! Inc. | Method for query processing of column chunks in a distributed column chunk data store |
US7860865B2 (en) * | 2005-12-19 | 2010-12-28 | Yahoo! Inc. | System of a hierarchy of servers for query processing of column chunks in a distributed column chunk data store |
US7921132B2 (en) | 2005-12-19 | 2011-04-05 | Yahoo! Inc. | System for query processing of column chunks in a distributed column chunk data store |
US8214388B2 (en) * | 2005-12-19 | 2012-07-03 | Yahoo! Inc | System and method for adding a storage server in a distributed column chunk data store |
US7848261B2 (en) | 2006-02-17 | 2010-12-07 | Isilon Systems, Inc. | Systems and methods for providing a quiescing protocol |
US8687628B2 (en) * | 2006-03-16 | 2014-04-01 | Rockstar Consortium USLP | Scalable balanced switches |
US20070245392A1 (en) * | 2006-03-31 | 2007-10-18 | Masstech Group Inc. | Disaster recovery |
US7756898B2 (en) | 2006-03-31 | 2010-07-13 | Isilon Systems, Inc. | Systems and methods for notifying listeners of events |
JP4939102B2 (en) * | 2006-04-21 | 2012-05-23 | 株式会社日立製作所 | Reliable method for network boot computer system |
US8156296B2 (en) | 2006-07-28 | 2012-04-10 | Dell Products L.P. | System and method for managing resets in a system using shared storage |
US8539056B2 (en) | 2006-08-02 | 2013-09-17 | Emc Corporation | Systems and methods for configuring multiple network interfaces |
US7953704B2 (en) | 2006-08-18 | 2011-05-31 | Emc Corporation | Systems and methods for a snapshot of data |
US7676691B2 (en) | 2006-08-18 | 2010-03-09 | Isilon Systems, Inc. | Systems and methods for providing nonlinear journaling |
US7752402B2 (en) | 2006-08-18 | 2010-07-06 | Isilon Systems, Inc. | Systems and methods for allowing incremental journaling |
US7680836B2 (en) * | 2006-08-18 | 2010-03-16 | Isilon Systems, Inc. | Systems and methods for a snapshot of data |
US7822932B2 (en) | 2006-08-18 | 2010-10-26 | Isilon Systems, Inc. | Systems and methods for providing nonlinear journaling |
US7590652B2 (en) | 2006-08-18 | 2009-09-15 | Isilon Systems, Inc. | Systems and methods of reverse lookup |
US7899800B2 (en) | 2006-08-18 | 2011-03-01 | Isilon Systems, Inc. | Systems and methods for providing nonlinear journaling |
US7680842B2 (en) | 2006-08-18 | 2010-03-16 | Isilon Systems, Inc. | Systems and methods for a snapshot of data |
US7882071B2 (en) | 2006-08-18 | 2011-02-01 | Isilon Systems, Inc. | Systems and methods for a snapshot of data |
CN101569132B (en) * | 2006-11-07 | 2013-04-17 | 安全第一公司 | Systems and methods for distributing and securing data |
EP2069995A1 (en) | 2006-12-05 | 2009-06-17 | Security First Corporation | Improved tape backup method |
US8286029B2 (en) | 2006-12-21 | 2012-10-09 | Emc Corporation | Systems and methods for managing unavailable storage devices |
US7593938B2 (en) | 2006-12-22 | 2009-09-22 | Isilon Systems, Inc. | Systems and methods of directory entry encodings |
US7509448B2 (en) | 2007-01-05 | 2009-03-24 | Isilon Systems, Inc. | Systems and methods for managing semantic locks |
US8966080B2 (en) | 2007-04-13 | 2015-02-24 | Emc Corporation | Systems and methods of managing resource utilization on a threaded computer system |
US7900015B2 (en) | 2007-04-13 | 2011-03-01 | Isilon Systems, Inc. | Systems and methods of quota accounting |
US7779048B2 (en) | 2007-04-13 | 2010-08-17 | Isilon Systems, Inc. | Systems and methods of providing possible value ranges |
US7966289B2 (en) | 2007-08-21 | 2011-06-21 | Emc Corporation | Systems and methods for reading objects in a file system |
US7882068B2 (en) | 2007-08-21 | 2011-02-01 | Isilon Systems, Inc. | Systems and methods for adaptive copy on write |
US7949692B2 (en) | 2007-08-21 | 2011-05-24 | Emc Corporation | Systems and methods for portals into snapshot data |
US8135134B2 (en) | 2007-09-14 | 2012-03-13 | Security First Corp. | Systems and methods for managing cryptographic keys |
US20090172244A1 (en) * | 2007-12-31 | 2009-07-02 | Chaoyang Wang | Hierarchical secondary raid stripe mapping |
CA2710868A1 (en) | 2008-01-07 | 2009-07-16 | Security First Corp. | Systems and methods for securing data using multi-factor or keyed dispersal |
US8201056B2 (en) * | 2008-02-19 | 2012-06-12 | Nec Laboratories America, Inc. | Anti-jamming piecewise coding method for parallel inference channels |
EP2651100A1 (en) | 2008-02-22 | 2013-10-16 | Security First Corporation | Systems and methods for secure workgroup management and communication |
US7870345B2 (en) | 2008-03-27 | 2011-01-11 | Isilon Systems, Inc. | Systems and methods for managing stalled storage devices |
US7953709B2 (en) | 2008-03-27 | 2011-05-31 | Emc Corporation | Systems and methods for a read only mode for a portion of a storage system |
US7984324B2 (en) | 2008-03-27 | 2011-07-19 | Emc Corporation | Systems and methods for managing stalled storage devices |
US7949636B2 (en) | 2008-03-27 | 2011-05-24 | Emc Corporation | Systems and methods for a read only mode for a portion of a storage system |
US8239624B2 (en) | 2008-06-06 | 2012-08-07 | Pivot3, Inc. | Method and system for data migration in a distributed RAID implementation |
US8219750B2 (en) | 2008-06-30 | 2012-07-10 | Pivot3 | Method and system for execution of applications in conjunction with distributed RAID |
US20100251313A1 (en) * | 2009-03-31 | 2010-09-30 | Comcast Cable Communications, Llc | Bi-directional transfer of media content assets in a content delivery network |
US8654971B2 (en) | 2009-05-19 | 2014-02-18 | Security First Corp. | Systems and methods for securing data in the cloud |
WO2011068738A2 (en) | 2009-11-25 | 2011-06-09 | Orsini Rick L | Systems and methods for securing data in motion |
CN103038750A (en) | 2010-03-31 | 2013-04-10 | 安全第一公司 | Systems and methods for securing data in motion |
CN103238305A (en) | 2010-05-28 | 2013-08-07 | 安全第一公司 | Accelerator system for use with secure data storage |
CN103609059B (en) | 2010-09-20 | 2016-08-17 | 安全第一公司 | The system and method shared for secure data |
US8984144B2 (en) | 2011-03-02 | 2015-03-17 | Comcast Cable Communications, Llc | Delivery of content |
CN105051750B (en) | 2013-02-13 | 2018-02-23 | 安全第一公司 | System and method for encrypted file system layer |
WO2016081942A2 (en) | 2014-11-21 | 2016-05-26 | Security First Corp. | Gateway for cloud-based secure storage |
US10540227B2 (en) * | 2018-01-03 | 2020-01-21 | Hewlett Packard Enterprise Development Lp | Sequential memory access on a high performance computing system |
Family Cites Families (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4905145A (en) | 1984-05-17 | 1990-02-27 | Texas Instruments Incorporated | Multiprocessor |
US5113523A (en) | 1985-05-06 | 1992-05-12 | Ncube Corporation | High performance computer system |
US5228127A (en) | 1985-06-24 | 1993-07-13 | Fujitsu Limited | Clustered multiprocessor system with global controller connected to each cluster memory control unit for directing order from processor to different cluster processors |
US5251299A (en) | 1985-12-28 | 1993-10-05 | Fujitsu Limited | System for switching between processors in a multiprocessor system |
EP0232859A3 (en) | 1986-01-27 | 1989-08-30 | International Business Machines Corporation | Processor intercommunication network |
US4729095A (en) | 1986-05-19 | 1988-03-01 | Ncube Corporation | Broadcast instruction for use in a high performance computer system |
WO1988007314A1 (en) | 1987-03-19 | 1988-09-22 | Siemens Aktiengesellschaft | Process for operating a multiprocessor central control unit of a relay system |
US5008882A (en) | 1987-08-17 | 1991-04-16 | California Institute Of Technology | Method and apparatus for eliminating unsuccessful tries in a search tree |
US4868818A (en) | 1987-10-29 | 1989-09-19 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Fault tolerant hypercube computer system architecture |
US4920432A (en) * | 1988-01-12 | 1990-04-24 | Eggers Derek C | System for random access to an audio video data library with independent selection and display at each of a plurality of remote locations |
US5072371A (en) | 1989-03-01 | 1991-12-10 | The United States Of America As Represented By The United States Department Of Energy | Method for simultaneous overlapped communications between neighboring processors in a multiple |
US5202980A (en) | 1989-06-30 | 1993-04-13 | Nec Corporation | Information processing system capable of readily taking over processing of a faulty processor |
US5402428A (en) | 1989-12-25 | 1995-03-28 | Hitachi, Ltd. | Array disk subsystem |
US5166939A (en) * | 1990-03-02 | 1992-11-24 | Micro Technology, Inc. | Data storage apparatus and method |
US5140592A (en) * | 1990-03-02 | 1992-08-18 | Sf2 Corporation | Disk array system |
US5088081A (en) | 1990-03-28 | 1992-02-11 | Prime Computer, Inc. | Method and apparatus for improved disk access |
US5130992A (en) | 1990-04-16 | 1992-07-14 | International Business Machines Corporaiton | File-based redundant parity protection in a parallel computing system |
US5121483A (en) | 1990-05-21 | 1992-06-09 | International Business Machines Corporation | Virtual drives in an automated storage library |
US5155845A (en) | 1990-06-15 | 1992-10-13 | Storage Technology Corporation | Data storage system for providing redundant copies of data on different disk drives |
CA2022302C (en) * | 1990-07-30 | 1995-02-28 | Douglas J. Ballantyne | Method and apparatus for distribution of movies |
US5265098A (en) | 1990-08-03 | 1993-11-23 | International Business Machines Corporation | Method and means for managing DASD array accesses when operating in degraded mode |
US5367636A (en) | 1990-09-24 | 1994-11-22 | Ncube Corporation | Hypercube processor network in which the processor indentification numbers of two processors connected to each other through port number n, vary only in the nth bit |
US5093718A (en) * | 1990-09-28 | 1992-03-03 | Inteletext Systems, Inc. | Interactive home information system |
US5375128A (en) | 1990-10-18 | 1994-12-20 | Ibm Corporation (International Business Machines Corporation) | Fast updating of DASD arrays using selective shadow writing of parity and data blocks, tracks, or cylinders |
US5208813A (en) | 1990-10-23 | 1993-05-04 | Array Technology Corporation | On-line reconstruction of a failed redundant array system |
US5155835A (en) | 1990-11-19 | 1992-10-13 | Storage Technology Corporation | Multilevel, hierarchical, dynamically mapped data storage subsystem |
US5132992A (en) * | 1991-01-07 | 1992-07-21 | Paul Yurt | Audio and video transmission and receiving system |
US5271012A (en) | 1991-02-11 | 1993-12-14 | International Business Machines Corporation | Method and means for encoding and rebuilding data contents of up to two unavailable DASDs in an array of DASDs |
US5303244A (en) | 1991-03-01 | 1994-04-12 | Teradata | Fault tolerant disk drive matrix |
US5357607A (en) | 1991-04-01 | 1994-10-18 | Xerox Corporation | File storage process for electronic printing systems having multiple disks |
US5239659A (en) | 1991-06-19 | 1993-08-24 | Storage Technology Corporation | Phantom duplex copy group apparatus for a disk drive array data storge subsystem |
EP0519669A3 (en) | 1991-06-21 | 1994-07-06 | Ibm | Encoding and rebuilding data for a dasd array |
US5301297A (en) | 1991-07-03 | 1994-04-05 | Ibm Corp. (International Business Machines Corp.) | Method and means for managing RAID 5 DASD arrays having RAID DASD arrays as logical devices thereof |
US5333143A (en) | 1991-08-29 | 1994-07-26 | International Business Machines Corporation | Method and means for b-adjacent coding and rebuilding data from up to two unavailable DASDS in a DASD array |
US5237658A (en) * | 1991-10-01 | 1993-08-17 | Tandem Computers Incorporated | Linear and orthogonal expansion of array storage in multiprocessor computing systems |
US5379417A (en) | 1991-11-25 | 1995-01-03 | Tandem Computers Incorporated | System and method for ensuring write data integrity in a redundant array data storage system |
JPH05233570A (en) | 1991-12-26 | 1993-09-10 | Internatl Business Mach Corp <Ibm> | Distributed data processing system between different operating systems |
US5371882A (en) | 1992-01-14 | 1994-12-06 | Storage Technology Corporation | Spare disk drive replacement scheduling system for a disk drive array data storage subsystem |
US5389963A (en) * | 1992-02-05 | 1995-02-14 | Dynacom, Inc. | System for selectively interconnecting audio-video sources and receivers |
JP2548480B2 (en) * | 1992-02-10 | 1996-10-30 | 富士通株式会社 | Disk device diagnostic method for array disk device |
JP3411300B2 (en) | 1992-02-18 | 2003-05-26 | 株式会社日立製作所 | Information processing device |
US5423037A (en) | 1992-03-17 | 1995-06-06 | Teleserve Transaction Technology As | Continuously available database server having multiple groups of nodes, each group maintaining a database copy with fragments stored on multiple nodes |
US5410667A (en) | 1992-04-17 | 1995-04-25 | Storage Technology Corporation | Data record copy system for a disk drive array data storage subsystem |
US5708668A (en) * | 1992-05-06 | 1998-01-13 | International Business Machines Corporation | Method and apparatus for operating an array of storage devices |
US5371532A (en) * | 1992-05-15 | 1994-12-06 | Bell Communications Research, Inc. | Communications architecture and method for distributing information services |
US5305438A (en) * | 1992-05-19 | 1994-04-19 | Sony Electronics Inc. | Video storage, processing, and distribution system using recording format independent hierarchical storages and processors |
JP2888401B2 (en) | 1992-08-03 | 1999-05-10 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Synchronization method for redundant disk drive arrays |
JP3183719B2 (en) | 1992-08-26 | 2001-07-09 | 三菱電機株式会社 | Array type recording device |
US5396485A (en) | 1992-09-01 | 1995-03-07 | Hitachi, Ltd. | Information communication system for point-to-point communication and point-to-multipoint communication using same lines |
US5412661A (en) | 1992-10-06 | 1995-05-02 | International Business Machines Corporation | Two-dimensional disk array |
US5404508A (en) | 1992-12-03 | 1995-04-04 | Unisys Corporation | Data base backup and recovery system and method |
US5819109A (en) | 1992-12-07 | 1998-10-06 | Digital Equipment Corporation | System for storing pending parity update log entries, calculating new parity, updating the parity block, and removing each entry from the log when update is complete |
US6157967A (en) * | 1992-12-17 | 2000-12-05 | Tandem Computer Incorporated | Method of data communication flow control in a data processing system using busy/ready commands |
US6269453B1 (en) * | 1993-06-29 | 2001-07-31 | Compaq Computer Corporation | Method for reorganizing the data on a RAID-4 or RAID-5 array in the absence of one disk |
US5390327A (en) | 1993-06-29 | 1995-02-14 | Digital Equipment Corporation | Method for on-line reorganization of the data on a RAID-4 or RAID-5 array in the absence of one disk and the on-line restoration of a replacement disk |
US5392244A (en) | 1993-08-19 | 1995-02-21 | Hewlett-Packard Company | Memory systems with data storage redundancy management |
JP3249868B2 (en) | 1993-11-19 | 2002-01-21 | 株式会社日立製作所 | Array type storage system |
US5473362A (en) * | 1993-11-30 | 1995-12-05 | Microsoft Corporation | Video on demand system comprising stripped data across plural storable devices with time multiplex scheduling |
US5504861A (en) | 1994-02-22 | 1996-04-02 | International Business Machines Corporation | Remote data duplexing |
US5544163A (en) | 1994-03-08 | 1996-08-06 | Excel, Inc. | Expandable telecommunications system |
US5649092A (en) * | 1994-04-21 | 1997-07-15 | Unisys Corporation | Fault tolerant apparatus and method for maintaining one or more queues that are shared by multiple processors |
US5671377A (en) | 1994-07-19 | 1997-09-23 | David Sarnoff Research Center, Inc. | System for supplying streams of data to multiple users by distributing a data stream to multiple processors and enabling each user to manipulate supplied data stream |
US5638516A (en) | 1994-08-01 | 1997-06-10 | Ncube Corporation | Parallel processor that routes messages around blocked or faulty nodes by selecting an output port to a subsequent node from a port vector and transmitting a route ready signal back to a previous node |
US5623595A (en) | 1994-09-26 | 1997-04-22 | Oracle Corporation | Method and apparatus for transparent, real time reconstruction of corrupted data in a redundant array data storage system |
WO1996017306A2 (en) | 1994-11-21 | 1996-06-06 | Oracle Corporation | Media server |
US5521299A (en) | 1994-11-22 | 1996-05-28 | National Science Council | Oligonucleotides for detection of baculovirus infection |
JPH08153113A (en) * | 1994-11-28 | 1996-06-11 | Fujitsu Ltd | Multimedia server |
US5583995A (en) | 1995-01-30 | 1996-12-10 | Mrj, Inc. | Apparatus and method for data storage and retrieval using bandwidth allocation |
US5604862A (en) * | 1995-03-14 | 1997-02-18 | Network Integrity, Inc. | Continuously-snapshotted protection of computer files |
US5608448A (en) | 1995-04-10 | 1997-03-04 | Lockheed Martin Corporation | Hybrid architecture for video on demand server |
US5649093A (en) * | 1995-05-22 | 1997-07-15 | Sun Microsystems, Inc. | Server disk error recovery system |
US5848230A (en) * | 1995-05-25 | 1998-12-08 | Tandem Computers Incorporated | Continuously available computer memory systems |
US5799141A (en) * | 1995-06-09 | 1998-08-25 | Qualix Group, Inc. | Real-time data protection system and method |
US5740397A (en) * | 1995-10-11 | 1998-04-14 | Arco Computer Products, Inc. | IDE disk drive adapter for computer backup and fault tolerance |
US6567926B2 (en) * | 1995-10-24 | 2003-05-20 | Seachange International, Inc. | Loosely coupled mass storage computer cluster |
US6449730B2 (en) | 1995-10-24 | 2002-09-10 | Seachange Technology, Inc. | Loosely coupled mass storage computer cluster |
US5862312A (en) * | 1995-10-24 | 1999-01-19 | Seachange Technology, Inc. | Loosely coupled mass storage computer cluster |
US5742752A (en) | 1995-12-29 | 1998-04-21 | Symbios Logic Inc. | Method for performing a RAID stripe write operation using a drive XOR command set |
US5881311A (en) * | 1996-06-05 | 1999-03-09 | Fastor Technologies, Inc. | Data storage subsystem with block based data management |
US5928327A (en) * | 1996-08-08 | 1999-07-27 | Wang; Pong-Sheng | System and process for delivering digital data on demand |
US6055570A (en) * | 1997-04-03 | 2000-04-25 | Sun Microsystems, Inc. | Subscribed update monitors |
US6108699A (en) * | 1997-06-27 | 2000-08-22 | Sun Microsystems, Inc. | System and method for modifying membership in a clustered distributed computer system and updating system configuration |
US6374336B1 (en) * | 1997-12-24 | 2002-04-16 | Avid Technology, Inc. | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
JPH11345095A (en) * | 1998-06-02 | 1999-12-14 | Toshiba Corp | Disk array device and control method therefor |
US6412079B1 (en) * | 1998-10-09 | 2002-06-25 | Openwave Systems Inc. | Server pool for clustered system |
-
2001
- 2001-04-05 US US09/826,695 patent/US6449730B2/en not_active Expired - Lifetime
- 2001-09-18 US US09/954,830 patent/US6557114B2/en not_active Expired - Lifetime
-
2002
- 2002-04-30 US US10/137,085 patent/US6574745B2/en not_active Expired - Lifetime
-
2003
- 2003-04-15 US US10/414,059 patent/US20030191983A1/en not_active Abandoned
-
2004
- 2004-09-10 US US10/938,765 patent/US20050166017A1/en not_active Abandoned
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050038622A1 (en) * | 2003-08-15 | 2005-02-17 | Broadcom Corporation | Method and system for rerouteable cyclic redundancy check sum (CRC) for different sources |
US7590503B2 (en) * | 2003-08-15 | 2009-09-15 | Broadcom Corporation | Method and system for rerouteable cyclic redundancy check sum (CRC) for different sources |
US20100162053A1 (en) * | 2008-12-23 | 2010-06-24 | Mosaid Technologies Incorporated | Error detection method and a system including one or more memory devices |
US8880970B2 (en) * | 2008-12-23 | 2014-11-04 | Conversant Intellectual Property Management Inc. | Error detection method and a system including one or more memory devices |
US20120089799A1 (en) * | 2009-06-18 | 2012-04-12 | Chengdu Huawei Symantec Technologies Co., Ltd. | Data backup processing method, data storage node apparatus and data storage device |
CN107346209A (en) * | 2016-05-08 | 2017-11-14 | 上海霄云信息科技有限公司 | A kind of multiple disks gathering data-storage system and its implementation and application process |
Also Published As
Publication number | Publication date |
---|---|
US6449730B2 (en) | 2002-09-10 |
US20030191983A1 (en) | 2003-10-09 |
US6557114B2 (en) | 2003-04-29 |
US20020138784A1 (en) | 2002-09-26 |
US20050166017A1 (en) | 2005-07-28 |
US20020013916A1 (en) | 2002-01-31 |
US6574745B2 (en) | 2003-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6557114B2 (en) | Loosely coupled mass storage computer cluster | |
US6571349B1 (en) | Loosely coupled mass storage computer cluster | |
US6567926B2 (en) | Loosely coupled mass storage computer cluster | |
WO1997015942A9 (en) | Loosely coupled mass storage computer cluster | |
US7054927B2 (en) | File system metadata describing server directory information | |
US8214590B2 (en) | Systems and methods for storing parity groups | |
US6871295B2 (en) | Dynamic data recovery | |
US20060041718A1 (en) | Fault-tolerant computer network file systems and methods | |
US20020191311A1 (en) | Dynamically scalable disk array | |
US20060031287A1 (en) | Systems and methods for load balancing drives and servers | |
US20020124137A1 (en) | Enhancing disk array performance via variable parity based load balancing | |
AU1416092A (en) | Disk drive array memory system using nonuniform disk drives | |
JPH0744322A (en) | Method and equipment for controlling hierarchy of dasd array | |
JPH0724039B2 (en) | Storage subsystem and method of reclaiming part of a parity group | |
US6301711B1 (en) | System and method for the network support of full motion video using a redundant array of inexpensive disks | |
KR101158838B1 (en) | Method to establish high level of redundancy, fault tolerance and performance in a raid system without using parity and mirroring |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CITIZENS BANK OF MASSACHUSETTS, MASSACHUSETTS Free format text: SECURITY INTEREST;ASSIGNOR:SEACHANGE INTERNATIONAL, INC.;REEL/FRAME:012333/0977 Effective date: 20011022 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
CC | Certificate of correction | ||
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: SEACHANGE TECHNOLOGY, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MANN, BRUCE E.;TRASATTI, PHILIP J.;CARLOZZI, MICHAEL D.;AND OTHERS;REEL/FRAME:026979/0857 Effective date: 19951023 Owner name: SEACHANGE INTERNATIONAL, INC., MASSACHUSETTS Free format text: CHANGE OF NAME;ASSIGNOR:SEACHANGE TECHNOLOGY, INC.;REEL/FRAME:026980/0030 Effective date: 19960327 |
|
FPAY | Fee payment |
Year of fee payment: 12 |