WO2003052604A1 - Data backup and restoration using dynamic virtual storage - Google Patents

Data backup and restoration using dynamic virtual storage Download PDF

Info

Publication number
WO2003052604A1
WO2003052604A1 PCT/US2002/040031 US0240031W WO03052604A1 WO 2003052604 A1 WO2003052604 A1 WO 2003052604A1 US 0240031 W US0240031 W US 0240031W WO 03052604 A1 WO03052604 A1 WO 03052604A1
Authority
WO
WIPO (PCT)
Prior art keywords
storage
virtual storage
vsm
data
controller
Prior art date
Application number
PCT/US2002/040031
Other languages
French (fr)
Inventor
Gaston R. Biessener
David W. Biessener
Michael T. Checky
Original Assignee
Voom Technologies, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Voom Technologies, Inc. filed Critical Voom Technologies, Inc.
Priority to AU2002359710A priority Critical patent/AU2002359710A1/en
Publication of WO2003052604A1 publication Critical patent/WO2003052604A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1466Management of the backup or restore process to make the backup process non-disruptive
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F2003/0697Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers device management, e.g. handlers, drivers, I/O schedulers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99955Archiving or backup

Definitions

  • This invention relates generally to data storage and, more particularly, to backup and restoration of a storage device.
  • Typical computing environments include one or more computing devices, such as desktop computers, laptop computers, hand-held computers, database servers, file servers, web servers, supercomputers, and the like. Each of these devices typically includes one or more processors and storage media for storing data and executable software modules.
  • the loss of data due to an unforeseen event is of paramount concern to organizations or other computer users.
  • the data may be lost, for example, by fire, flood, and other natural disasters, hardware failure, and even software viruses or other hostile network attacks.
  • organizations typically make use of an archival and retrieval system to periodically backup the data.
  • These systems may include a number of backup devices including remote storage devices, tape drives, optical jukeboxes and the like.
  • a backup operation is typically performed by one of a number of different commercially available software programs.
  • the software programs often run on a computer coupled to a network of computers, and tend to consume network bandwidth when saving the data to a backup device. Consequently, these programs tend to require considerable time to backup critical data, and can often consume significant computing and network resources.
  • the software program responsible for the backup and restoration may be subject to viruses or other network attacks, thereby increasing the risk to the organization.
  • the invention is directed to a system that makes use of dynamic virtual storage to save and restore data within a computing environment.
  • the system may include a controller that saves data stored to one or more physical storage devices by defining a primary virtual storage and a secondary virtual storage.
  • the controller may define the primary virtual storage and the secondary virtual storage within one or more logical storage volumes mapped to one or more physical storage devices.
  • the primary virtual storage and the secondary virtual storage may, for example, reside on physically separate storage mediums of separate devices, or may reside on a common storage medium within a storage device.
  • the controller uses the primary virtual storage to store an initial state of data written by a computing device prior to a point in time, referred to herein as time T 0 .
  • the primary virtual storage stores a snapshot of the data at time T 0 .
  • the controller uses the secondary virtual storage to store all data written by the computing device subsequent to time T 0 . Consequently, the controller responds to read requests received from the computing device by selectively reading data from the secondary virtual storage and the primary virtual storage, depending on whether data stored by the primary virtual storage has been rendered obsolete by data stored by the secondary virtual storage.
  • the controller provides the ability to quickly create a new snapshot of the data by dynamically reallocating the primary virtual storage and the secondary virtual storage.
  • the controller maintains a map that defines the allocation of the primary and secondary virtual storage.
  • the controller can quickly reallocate the primary storage to include the data written to the secondary virtual storage, thereby establishing a new time T 0 for the primary virtual storage.
  • the controller can backup data in a manner that appears almost instantaneous to the user.
  • the invention is directed to a method that includes storing a virtual storage map (NSM) allocating a primary virtual storage and a secondary virtual storage.
  • NSM virtual storage map
  • the method further includes updating the NSM to reallocate the primary virtual storage to include data written to the secondary virtual storage.
  • the NSM may define a set of storage units for each virtual storage, and updating the NSM may comprise updating the NSM to reallocate at least one storage unit from the secondary virtual storage to the primary storage device.
  • the method may further include receiving a save command, and updating the NSM in response to the save command.
  • the save command may be received in response to an actuated hardware switch from software executing on a host computer, from a handheld device, or the like.
  • the invention is directed to a system including a processor, a storage system having one or more physical storage devices, and a controller coupled to the processor and the storage system.
  • the controller maintains a virtual storage map (NSM) allocating a primary virtual storage and a secondary virtual storage within a storage system.
  • the controller may include a computer-readable medium to store the NSM, may store the NSM within the storage system, or both.
  • the controller stores data received from the processor prior to a time T 0 on the primary virtual storage, stores data received from the processor after time T 0 on the secondary virtual storage.
  • the controller updates the NSM in response to a save command to reallocate the primary virtual storage to include data written to the secondary virtual storage.
  • the system may include an input/output (I/O) device to issue the save command to the controller.
  • the I/O device may, for example, issue commands to the controller upon actuation of a hardware switch.
  • the I/O device may issue commands to the controller via a wireless signal.
  • the invention is directed to an apparatus including a computer-readable medium to store a virtual storage map (NSM) allocating a primary virtual storage and a secondary virtual storage within a storage system, and a control unit to update the VSM to reallocate the primary virtual storage to include data written to the secondary virtual storage.
  • the apparatus may include a first interface coupled to the control unit to receive storage requests from a processor, and a second interface coupling the control unit to the storage system.
  • the apparatus may further include an input/output (I/O) interface to receive a save command directing the control unit to reallocate the primary virtual storage.
  • I/O input/output
  • the invention provides a number of advantages.
  • the invention provides the ability to quickly backup data by dynamically reallocating virtual storage, such as by adjusting a virtual storage map.
  • the system can backup data in a manner that appears almost instantaneous to the user. The user, therefore, need not refrain from using the computing device for a significant period of time, as is often required by conventional backup mechanisms.
  • the controller may be used to provide a secure means for saving and restoring data that is not susceptible to malicious network users, viruses, or other such devices.
  • the controller may, for example, provide a hardware interface for saving and restoring data that is physically separate from the computing device and the software executing thereon.
  • a user such as a system administrator, may save and restore the data by actuating a hardware switch or interacting with the controller via a secure dedicated connection or wireless link.
  • the controller may be used to provide additional security by filtering any unauthorized commands issued to a storage system via a host computer.
  • the controller may, for example, filter unpublished, vendor-specific commands.
  • the controller may filter published but unwanted commands, or may translate the unwanted command to an acceptable command.
  • the controller may selectively filter the commands based on configuration information defined by a user, such as a system administrator. In this manner, the controller may provide a bus-level filter for access commands issued to the storage system.
  • FIG. 1 is a block diagram illustrating an example system that makes use of dynamic virtual storage to save and restore data.
  • FIG. 2 illustrates an example embodiment of a backup controller implemented as a single printed circuit board that may be embedded within a host computing device.
  • FIG. 3 A illustrates an example embodiment of an input/output (I/O) device for issuing save and restore commands to the controller.
  • I/O input/output
  • FIG. 3B illustrates another example embodiment of an input/output (I/O) device for issuing save and restore commands to the controller.
  • I/O input/output
  • FIG. 4 is a block diagram illustrating the relationship of physical storage devices, logical storage volumes and virtual storage.
  • FIG. 5 is a flow chart illustrating a high-level overview of the functions performed by the controller.
  • FIGS. 6A - 6B illustrates the allocation and reallocation of primary and secondary virtual storage within two logical storage volumes.
  • FIG. 7 is a block diagram illustrating one embodiment of a data structure maintained by the controller to allocate the virtual storage and to record data written to the secondary virtual storage.
  • FIG. 8 is a flow chart illustrating the controller backing up data by dynamically reallocating virtual storage using the data structure of FIG. 7.
  • FIGS. 9A-9E illustrate in further detail the process of dynamically reallocating virtual storage to save data in a manner that appears instantaneous to a user.
  • FIG. 10 is a block diagram illustrating another embodiment of a data structure maintained by the controller to allocate the virtual storage and to record locations of data written to the secondary virtual storage.
  • FIG. 11 is a flow chart illustrating the controller backing up data by dynamically reallocating virtual storage using the data structure of FIG. 10.
  • FIG. 12 is a block diagram illustrating another embodiment of a data structure maintained by the controller to allocate the virtual storage and to record locations of data written to the secondary virtual storage.
  • FIG. 13 is a flow chart illustrating the controller backing up data by dynamically reallocating virtual storage using the data structure of FIG. 12.
  • FIG. 14 is a block diagram illustrating another embodiment of a data structure maintained by the controller to allocate the virtual storage.
  • FIG. 1 is a block diagram illustrating an example system 2 that makes use of dynamic virtual storage to backup and restore data.
  • System 2 includes a controller 6 coupled between processor and storage system 8.
  • Processor 4 may be any type of programmable processor operating within a host computer or other device.
  • Processor 4 may operate within, for example, a desktop computer, a laptop computer or a network server, such as a file server, a web server or a database server.
  • processor 4 may be an embedded processor operating within a network or stand-alone appliance.
  • Storage system 8 provides a system for storing data and executable software modules for use by processor 4.
  • Storage system 8 may comprise, for example, one or more physical storage devices including one or more hard disks, tape drives, removable storage media, optical storage media, volatile storage memory, EEPROM and the like.
  • Controller 6 receives storage access requests, such as conventional read and write requests, from processor 4 via interconnect 12.
  • controller 6 manages storage system 8 by issuing commands to storage system 8 via interconnect 14.
  • Interconnects 12, 14 may conform to, for example, the small computer system interface (SCSI), a Fiber Channel interface, Integrated Drive Electronics / AT Attachment (IDE/ AT A) interface, or the like.
  • Storage system 8 may include one or more physical storage mediums, such as a conventional magnetic disk drives, magneto optical storage devices, and CDROMS.
  • controller 6 manages storage system 8 to provide a secure backup for data written by processor 4. Moreover, controller 6 provides mechanisms to backup and restore data in a manner that appears instantaneous to a user.
  • controller 6 allocates and maintains a primary virtual storage 10A and a secondary virtual storage 10B, collectively referred to as virtual storage 10, within storage system 8.
  • Controller 6 may allocate virtual storage 10 according to one or more physical storage media of storage system 8.
  • controller 6 may allocate virtual storage 10 according to logical storage volumes that are mapped to the underlying physical storage media of storage system 8.
  • the primary virtual storage and the secondary virtual storage may, for example, reside on physically separate storage mediums of separate devices, or may reside on a common storage medium within a storage device.
  • Controller 6 uses primary virtual storage 10A to store an initial state of data written by processor 4 prior to a point in time, referred to herein as time T 0 .
  • primary virtual storage 10A stores a snapshot of the data at time T 0 .
  • Controller 6 uses secondary virtual storage 10B to store all data written by processor 4 subsequent to time To. Consequently, controller 6 responds to read requests received from processor 4 by selectively reading data from secondary virtual storage 10B and the primary virtual storage 10A, depending on whether data stored by primary virtual storage 10A has been rendered obsolete by data stored by secondary virtual storage 10B. In order to respond a read request, controller 6 determines whether the requested data has been written to primary virtual storage 10A, or has been superceded by data written to secondary virtual storage 10B.
  • Controller 6 then selectively reads data from secondary virtual storage 10B and primary virtual storage 10A in response to the read request.
  • controller 6 dynamically allocates and reallocates virtual storage 10.
  • controller 6 maintains a virtual storage map (NSM) that defines the allocation of the primary and secondary virtual storage. Controller 6 may maintain the map within internal embedded memory, within storage system 8, or both.
  • NSM virtual storage map
  • controller 6 updates the VSM, dynamically reallocating primary virtual storage 10A to include the data written to secondary virtual storage 10B. Consequently, controller 6 dynamically reallocates secondary virtual storage 10B to exclude the data.
  • controller 6 quickly establishes a new time T 0 in which primary virtual storage 10A stores all of the data received prior to time T 0 .
  • controller 6 can save (backup) the data in the manner that appears instantaneous to a user. Specifically, by dynamically allocating and reallocating virtual storage 10 upon receiving the save command, controller 6 avoids copying any of the actual data in order to perform a backup.
  • controller 6 can also revert back to the previously saved state in similar fashion. Specifically, upon receiving a restore command, controller 6 can simply disregard the date written to secondary virtual storage 10B, thereby reverting to the data stored by primary virtual storage 10A. In this manner, controller 6 can quickly revert to using data stored prior to a time T 0 .
  • controller 6 may provide additional security by filtering any unauthorized commands received from processor 4. Controller 6 may, for example, filter unpublished, vendor-specific commands received from processor 4. In addition, controller 6 may filter published but unwanted commands, or may translate the unwanted command to an acceptable command. Controller 6 may selectively filter the commands based on configuration information defined by a user, such as a system administrator. In this manner, controller 6 may provide a bus-level filter for access commands issued to storage system 8.
  • FIG. 2 illustrates an example controller 6 implemented as a single printed circuit board that may be embedded within a host computing device.
  • controller 6 may include first interface 16, second interface 18, control unit 20, embedded memory 22 and bus interface 24.
  • First interface 16 and second interface 18 provide mechanisms for coupling controller 6 between processor 4 and storage system 8, respectively.
  • control unit 20 receives storage access commands from processor 4 via interconnect 12 and first interface 16.
  • control unit 20 manages and accesses storage system 8 via interconnect 14 and second interface 16.
  • controller 6 may be embedded within a mother board along with processor 4, within storage system 8, or within other components of system 2 disposed between processor 4 and storage system 8.
  • Control unit 20 stores the virtual storage map (VSM) within memory 22 to maintain a current allocation of primary virtual storage 10A and secondary virtual storage 10B within storage system 8.
  • control unit 20 may, as described below, store other information within memory 22 including a record of the locations of secondary virtual storage 10B to which data has been written.
  • control unit 20 may store the VSM and other information within storage system 8 for persistency, or within both memory 22 and storage system 8 for purposes of redundancy.
  • Control unit 20 receives data backup and restoration commands directly from I/O device 26.
  • I/O device 26 may be a dedicated device by which a user issues commands to controller 6, thereby bypassing processor 4. In this manner, I/O device 26 and controller 6 provide a secure means for saving and restoring data within storage system 8. Consequently, controller 6 and storage system 8 are not subject to attacks via network hackers, viruses or other malicious software.
  • I/O device 26 may comprises a keyboard, pointing device or other conventional input mechanisms. In one embodiment, comprises a panel mounted to a host computing device. Alternatively, I/O device 26 may comprise a dedicated communication link or wireless device by which a user, such as a network administrator, may save and restore data within storage system 8. In this embodiment, signals 23 may represent wireless communications received by controller 6 from I/O device 26.
  • Bus interface 24 provides a mechanism by which controller 6 may be directly coupled to a system or I/O bus within a chassis of the host computer. Bus interface 24 may provide, for example, power and ground signals for use by controller 6.
  • FIG. 3 A illustrates an example embodiment in which I/O device 26 comprises a I/O panel mounted to the host computing device.
  • I/O device 26 includes a save button 30, a restore button 32, and a lock button 34. Actuation of save button 30 causes I/O device 26 to issue a save command to control unit 20 of controller 6. Similarly, actuation of restore button 32 causes I/O device 26 to issue a restore command to controller 6.
  • Lock button 34 may be used to prevent controller 6 from performing an unauthorized or accidental save or restore operation. Specifically, actuation of lock 34 may prevent controller 6 from responding to a save command or restore command until specifically unlocked.
  • I/O device 26 may include other features such as a display of the last date and time at which a save was performed.
  • I/O device 26 may include mechanisms by which a user enters an authorization code or provides other secure information such as a digital key to be used for authenticating the user.
  • I/O device 26 need not be directly coupled to the host computer device.
  • I/O device 26 may include antenna 31 to communicate with controller 6 via radio frequency or other appropriate mechanisms.
  • I/O device 26 and controller 6 may be configured to communicate, for example, via cellular or infrared communications or may be enabled as BLUETOOTH applications.
  • I/O device may comprise a removable panel that engages controller 6 via an I/O port of other communication means.
  • FIG. 3B illustrates another example embodiment in which I/O device 26 includes a display area 36 and an input dial 35. Controller 6 displays status information and a current operating mode within display area 36. By interacting with dial 35, a user may perform a number of operations including a restore or a save operation.
  • controller 6 may place controller 6 in a mode for receiving field upgrades to internal operating software.
  • controller 6 initializes to a safe mode, i.e., LOCKED, upon power-up, thereby requiring user interaction with dial 35 prior to processing SAVE or RESTORE commands.
  • controller 6 provides a security mechanism in the event that controller 6 accepts SAVE and RESTORE commands from software executing on processor 4 or a remote computing device.
  • FIG. 4 is a block diagram illustrating the arrangement of, and relationship between, physical storage devices, logical storage volumes and the virtual storage.
  • the underlying physical storage media may comprise one or more distinct hard disks, magnetic tape drives, removable storage media, optical storage devices, or the like.
  • a number of logical storage volumes may then be defined and mapped upon the individual physical storage devices.
  • the physical storage devices may be grouped into a single logical storage volume, or multiple logical storage volumes.
  • a single logical storage volume may be mapped to multiple physical storage devices.
  • controller 6 may define and maintain the virtual storage.
  • controller 6 may allocate and dynamically reallocate primary virtual storage 10A and secondary virtual storage 10B within the logical storage volumes.
  • controller 6 may map the virtual storage directly to physical storage media, thereby bypassing the logical storage volumes.
  • FIG. 5 is a flow chart illustrating a high-level overview of the functions performed by controller 6.
  • controller 6 allocates primary virtual storage 10A and secondary storage 10B within storage system 8 (40). In this manner, controller 6 defines an initial state at a time To for primary virtual storage 10A and secondary virtual storage 10B. After allocating virtual storage 10, controller writes all data received from processor 4 to secondary virtual storage 10B (42).
  • Controller 6 maintains a record of the locations to which data has been written written to secondary virtual storage 10B subsequent to time T 0 (44). Controller 6 makes use of this record in order to respond to read requests received from processor 4.
  • controller 6 selectively reads data from primary virtual storage 10A and secondary virtual storage 10B based upon the record (46). For example, if the record indicates that the requested data has been written subsequent to time To, controller 6 reads the data from secondary virtual storage 10B and forwards the data to processor 4. Otherwise, controller 6 reads the data from primary virtual storage 10A and forwards the data to processor 4.
  • controller 6 Upon receiving a save command (48), controller 6 reallocates primary virtual storage 10A and secondary virtual storage 10B (50). In particular, controller 6 reallocates the virtual storage space to such that data written to to secondary virtual storage 10B subsequent to the time T 0 is allocated to primary virtual storage 10A and excluded from secondary virtual storage 10B. In this manner controller 6 establishes a new time T 0 in response to the save command (50).
  • FIG. 6A illustrates an example logical storage volume 52A and a logical storage volume 52B, collectively referred to as logical storage volumes 52, at a time To.
  • FIG. 6 A illustrates the initial allocation of primary virtual storage 10A and secondary virtual storage 10B within logical storage volumes 52. More particularly, primary virtual storage 10A is entirely allocated to logical storage volume 52A. Similarly, secondary virtual storage 10B is entirely allocated to logical storage volume 52B.
  • FIG. 6B illustrates the same logical storage volumes 52A at time a new time T 0 after controller 6 has performed a save operation, thereby reallocating virtual storage 10.
  • primary virtual storage 10A comprises a substantial portion of logical storage volume 52A, but has been reallocated to include portions of logical storage volume 52B.
  • regions 54A and 54B of logical storage volume 52 have been allocated to primary virtual storage 10A.
  • the corresponding regions within logical storage volume 52A have been allocated to secondary virtual storage 10B.
  • primary virtual storage 10A and secondary virtual storage 10B may be distributed throughout logical storage volumes 52 as a result of allocation and reallocation due to save commands.
  • controller 6 is able to quickly perform a save operation in a manner that appears instantaneous to the user.
  • FIG. 7 is a block diagram illustrating an example data structure 60 maintained by controller 6 to control the allocation of virtual storage 10, and to record the locations of data written to secondary virtual storage 10B.
  • data structure 60 includes a virtual storage map (VSM) 62, and a delta data map (DDM) 64.
  • VSM 62 defines a set of logical storage units within each of primary virtual storage 10A and secondary virtual storage 10B. The units may correspond to ranges of addresses, data blocks, sectors, or other units of storage within virtual storage 10.
  • VSM 62 comprises a bitmap containing a set of binary values. Each binary value corresponds to a respective storage unit.
  • Controller 6 may easily reallocate a storage unit from one virtual storage to another by changing a state of the corresponding binary value of VSM 62.
  • DDM 64 is a bitmap having a set of binary values. Each binary value of the set corresponds to a logical storage unit within secondary virtual storage 10B, and indicates whether data has been written to secondary virtual storage 10B subsequent to a time To. In this manner, controller 6 can readily determine whether to read data from secondary virtual storage 10B or from primary virtual storage 10A based on the DDM.
  • FIG. 8 is a flow chart illustrating the dynamic allocation of virtual storage 10 using data structure 60 of FIG. 7.
  • controller 6 initializes virtual storage map (VSM) 62 to allocate primary virtual storage 10A and secondary virtual storage 10B (70).
  • Controller 6 may, for example, initialize all of the binary values of VSM 62 to a null value, thereby allocating all storage units of primary virtual storage 10A to a first logical storage volume and all of the storage units of secondary virtual storage 10B to a second logical storage volume.
  • FIG. 6A illustrates an example initial allocation of primary virtual storage 10A and secondary virtual storage 10B.
  • controller 6 initializes the delta data map (DDM) 64 by setting all of the binary values to a null value (72). In this manner, controller 6 resets DDM 64 to indicate that no data has yet been stored to secondary virtual storage 10B subsequent to the allocation.
  • controller 6 writes data to secondary virtual storage 10B in response to write requests received from processor 4 (74).
  • controller 6 updates DDM 64 to record the locations of the data written to secondary virtual storage 10B (76).
  • controller 6 may change the state of the corresponding binary values within DDM 64 from a null value to a logical one, thereby marking the storage units as containing data written subsequent to time To.
  • controller 6 Upon receiving a read request from processor 4, controller 6 selectively reads data from primary virtual storage 10A and secondary virtual storage 10B based upon the state of the binary data within DDM 64 (78). More specifically, controller 6 reads the appropriate binary values of DDM 64 to determine whether the data requested by processor 4 has been written to secondary virtual storage 10B. If so, controller 6 reads the data from secondary virtual storage 10B and forwards the data to processor 4. If, however, the data has not been written from processor 4 subsequent to a time To, controller 6 reads the data from primary virtual storage 10A and forwards the data to processor 4.
  • controller 6 Upon receiving a save command (78), controller 6 reallocates primary virtual storage 10A and secondary virtual storage 10B by updating VSM 62 and DDM 64 (79). In general, controller 6 examines DDM 64 to identify those storage units within secondary virtual storage 10B that contain data written by processor 4 subsequent to time To. Controller 6 then updates VSM 62 to reallocate primary virtual storage 10A to include the identified storage units of secondary virtual storage 10B (79). In this manner, the storage units of secondary virtual storage 10B that contain data written subsequent to time T 0 are redefined to be included within primary virtual storage 10A. Consequently, the corresponding storage units within primary virtual storage 10A that contain old data are automatically redefined to be included within secondary virtual storage 10B.
  • Controller 6 resets DDM 64 by setting all of the binary values to null. In this manner, controller 6 marks all of the storage units within secondary virtual storage 10B as being initialized and available to store new data. In this manner, controller 6 establishes a new time T 0 .
  • FIGS. 9A-9E illustrate in further detail the process of dynamically reallocating virtual storage to save data in a manner that appears instantaneous to a user.
  • FIG. 9A illustrates an initial state in which VSM 80A is reset such that primary virtual storage 10A is mapped entirely to a first logical storage volume, and secondary virtual storage 10B is mapped entirely to a second logical storage volume.
  • DDM 82A is initialized to indicate that second virtual storage 10B currently contains no data written subsequent to a time T 0 .
  • Logical storage volumes 84A and 86A illustrate the current allocation of primary virtual storage 10A and second virtual storage 10B.
  • FIG. 9B illustrates the changes to DDM 82 after a number of write requests from processor 4.
  • DDM 82B indicates that 4 storage units of secondary virtual storage 10B contain data that has been written subsequent to initial state of time To.
  • FIG. 9C illusfrates the changes to VSM 80C and DDM 82C made by controller 6 in response to receiving a save command from a user, such as a system administrator.
  • controller 6 identifies the storage units of DDM 82B that store data written subsequent to time To.
  • Controller 6 modifies VSM 80C to reallocate primary virtual storage 10A and secondary virtual storage 10B.
  • controller 6 modifies the corresponding binary elements of VSM 80C such that primary virtual storage 10A includes those storage units of secondary virtual storage 10B to which data has been written subsequent to time T 0 .
  • This dynamic reallocation is illustrated by LSV 84C and LSV 86C.
  • Controller 6 may quickly and efficiently effect this dynamic reallocation by performing an exclusive-or (XOR) operation between DDM 82C VSM 80C.
  • FIG.9D illustrates the changes made to DDM 82D upon receiving an additional write request from processor 4.
  • controller 6 writes the data to secondary virtual storage 10B and update DDM 82D.
  • FIG. 9E illusfrates the changes made by controller 6 in response to a second save command.
  • controller 6 updates VSM 80E to reallocate primary virtual storage 10A and secondary virtual storage 10B, and clears DDM 82E.
  • FIG. 10 is block diagram illustrating another example data structure 87 maintained by controller 6 for dynamically allocating and reallocating virtual storage.
  • data structure 87 includes VSM 88, DDM 89 and additional status data 90.
  • status data 90 indicates whether each storage unit of the secondary virtual storage needs to be reallocated after a save command.
  • status data 90 may comprise a bitmap having a set of binary values. Each binary value may correspond to a storage unit within secondary virtual storage 10B.
  • the state of the binary value represents whether the corresponding storage unit has been reallocated, if necessary, in response to a recent save command.
  • data structure 87 may be useful when controller 6 performs the reallocation in the background, such as during free cycles of a system bus within a host computing device.
  • the reallocation can be performed solely during free cycles. If the free cycles are interrupted, status data 90 can maintain an indication of the status of the reallocation so that it can be finished during subsequent free cycles. In this manner, controller 6 can perform reallocation without using non-free cycles.
  • FIG. 11 is a flow chart illustrating the reallocation of virtual storage by controller 6 when making use of data structure 87.
  • controller 6 Upon receiving a save command (91), controller 6 sets a global flag indicating that a save must be performed and begins updating VSM 88 and DDM 89 during the background, i.e., between servicing of access requests received from processor 4 (91).
  • controller 6 Upon reallocating a storage unit, controller 6 sets the value of a corresponding bit within status data 90 to indicate that reallocation has either been performed or is not needed.
  • controller 6 accesses status data 90 to determine whether the storage units holding the requested data have been updated in response to the previous save command (96). If so, controller 6 immediately writes the data to the storage units of secondary virtual storage 10B (100). If not, controller 6 updates VSM 88 and DDM 89 (98) and status data 90 (99) prior to writing the data (100).
  • controller 6 If a read request is received (102), controller 6 selectively reads data from primary virtual storage 10A and secondary virtual storage 10B in accordance with DDM 89 as described above (104). Controller 6 continues to update status data 90 in the background until all of the storage units containing data written subsequent to time T 0 have been reallocated from secondary virtual storage 10B to primary virtual storage 10A (106).
  • FIG.12 is a block diagram illustrating another embodiment of a data structure 104 maintained by controller 6 for dynamically allocating and reallocating virtual storage.
  • data structure 104 includes VSM 106, DDM 108, version data 110 and a system version 111.
  • version data 110 stores a version number for each storage unit of secondary virtual storage 10B. More specifically, the version number corresponds to a save command received by controller 6, and indicates whether the storage unit is up to date.
  • System version 111 stores the most recent version for all of secondary virtual storage 10B, and is based upon the save commands received from I/O device 26. In particular, each time controller 6 receives a save command, controller 6 increments system version 111.
  • controller 6 increments the system version 111 (122).
  • controller 6 compares the version for the requested storage unit, as indicated by version data 110, with the system version 111 (126).
  • controller 6 initiates a reallocation of the storage unit from secondary virtual storage 10B to primary virtual storage 10A (128) and sets the version number for the storage unit to system version 111 (130).
  • controller 6 writes the data to the storage unit of secondary virtual storage 10B (132) and updates DDM 108 to indicate that the storage unit contains data subsequent to the last save command (133).
  • FIG.14 is a block diagram illusfrates another embodiment of a data structure 140 maintained by controller 6 for dynamically allocating and reallocating virtual storage.
  • data structure 140 includes VSM 142, DDM 144, version data 146, command history 148 and a system version 150.
  • command history 148 is a log indicating the sequence of save and restore commands received be controller 6.
  • Command history 148 may comprise, for example, a bitmap in which a binary value of one represents a save command and a binary value of zero represents a restore command.
  • a sequence of 11101 for example, represents the following sequence: SAVE, SAVE, SAVE, RESTORE, SAVE.
  • version data 110 may store an index into command history 148.
  • the version number indicates the last command, save or restore, applied to a particular storage unit of secondary virtual storage 10B.
  • the version number indicates a current state for the respective storage unit.
  • controller 6 Upon receiving a read request from processor 4, controller 6 accesses version data 146 to determine if the version for the accessed storage unit is less than system version 150. If so, controller 6 reallocates VSM 142 and updates the version data 146 for the accessed storage unit. In this manner, controller 6 may update data structure 140 within local memory 22. For write requests, controller 6 may perform a similar operation and save data structure 140 to storage system 8.
  • controller 6 may update command history 148 to reflect the command, save data structure 140 to storage system 8, and increment system version 150. This allows controller 6 to perform a save or restore in a manner that appears instantaneous to the user.

Abstract

A system (2) is described including a processor (4), a storage system (8) having one or more physical storage devices, and a controller (6) coupled to the processor and the storage system. The controller maintains a virtual storage map (VSM) allocating a primary virtual storage (10A) and a secondary virtual storage (10B) within a storage system (8). The controller stores data received from the processor prior to a time T0 on the primary virtual storage, stores data received from the processor after time T0 on the secondary virtual storage. The controller updates the VSM in response to a save command to reallocate the primary virtual storage to include data written to the secondary virtual storage. In this manner, the system can backup data in a manner that appears almost instantaneous to the user.

Description

DATA BACKUP AND RESTORATION USING DYNAMIC VIRTUAL STORAGE
TECHNICAL FIELD
[0001] This invention relates generally to data storage and, more particularly, to backup and restoration of a storage device.
BACKGROUND
[0002] Typical computing environments include one or more computing devices, such as desktop computers, laptop computers, hand-held computers, database servers, file servers, web servers, supercomputers, and the like. Each of these devices typically includes one or more processors and storage media for storing data and executable software modules.
[0003] The loss of data due to an unforeseen event is of paramount concern to organizations or other computer users. The data may be lost, for example, by fire, flood, and other natural disasters, hardware failure, and even software viruses or other hostile network attacks. To mitigate the risk of loss, due to an unforeseen event, organizations typically make use of an archival and retrieval system to periodically backup the data. These systems may include a number of backup devices including remote storage devices, tape drives, optical jukeboxes and the like.
[0004] A backup operation is typically performed by one of a number of different commercially available software programs. The software programs often run on a computer coupled to a network of computers, and tend to consume network bandwidth when saving the data to a backup device. Consequently, these programs tend to require considerable time to backup critical data, and can often consume significant computing and network resources. Furthermore, the software program responsible for the backup and restoration may be subject to viruses or other network attacks, thereby increasing the risk to the organization.
SUMMARY
[0005] In general, the invention is directed to a system that makes use of dynamic virtual storage to save and restore data within a computing environment. The system may include a controller that saves data stored to one or more physical storage devices by defining a primary virtual storage and a secondary virtual storage. The controller may define the primary virtual storage and the secondary virtual storage within one or more logical storage volumes mapped to one or more physical storage devices. In this manner, the primary virtual storage and the secondary virtual storage may, for example, reside on physically separate storage mediums of separate devices, or may reside on a common storage medium within a storage device.
[0006] The controller uses the primary virtual storage to store an initial state of data written by a computing device prior to a point in time, referred to herein as time T0. In other words, the primary virtual storage stores a snapshot of the data at time T0. The controller uses the secondary virtual storage to store all data written by the computing device subsequent to time T0. Consequently, the controller responds to read requests received from the computing device by selectively reading data from the secondary virtual storage and the primary virtual storage, depending on whether data stored by the primary virtual storage has been rendered obsolete by data stored by the secondary virtual storage.
[0007] The controller provides the ability to quickly create a new snapshot of the data by dynamically reallocating the primary virtual storage and the secondary virtual storage. In particular, the controller maintains a map that defines the allocation of the primary and secondary virtual storage. By adjusting the map, the controller can quickly reallocate the primary storage to include the data written to the secondary virtual storage, thereby establishing a new time T0 for the primary virtual storage. In this manner, the controller can backup data in a manner that appears almost instantaneous to the user. [0008] In one embodiment, the invention is directed to a method that includes storing a virtual storage map (NSM) allocating a primary virtual storage and a secondary virtual storage. The method further includes updating the NSM to reallocate the primary virtual storage to include data written to the secondary virtual storage. The NSM may define a set of storage units for each virtual storage, and updating the NSM may comprise updating the NSM to reallocate at least one storage unit from the secondary virtual storage to the primary storage device. The method may further include receiving a save command, and updating the NSM in response to the save command. The save command may be received in response to an actuated hardware switch from software executing on a host computer, from a handheld device, or the like.
[0009] In another embodiment, the invention is directed to a system including a processor, a storage system having one or more physical storage devices, and a controller coupled to the processor and the storage system. The controller maintains a virtual storage map (NSM) allocating a primary virtual storage and a secondary virtual storage within a storage system. The controller may include a computer-readable medium to store the NSM, may store the NSM within the storage system, or both. The controller stores data received from the processor prior to a time T0 on the primary virtual storage, stores data received from the processor after time T0 on the secondary virtual storage. The controller updates the NSM in response to a save command to reallocate the primary virtual storage to include data written to the secondary virtual storage. The system may include an input/output (I/O) device to issue the save command to the controller. The I/O device may, for example, issue commands to the controller upon actuation of a hardware switch. Alternatively, the I/O device may issue commands to the controller via a wireless signal.
[0010] In another embodiment, the invention is directed to an apparatus including a computer-readable medium to store a virtual storage map (NSM) allocating a primary virtual storage and a secondary virtual storage within a storage system, and a control unit to update the VSM to reallocate the primary virtual storage to include data written to the secondary virtual storage. The apparatus may include a first interface coupled to the control unit to receive storage requests from a processor, and a second interface coupling the control unit to the storage system. The apparatus may further include an input/output (I/O) interface to receive a save command directing the control unit to reallocate the primary virtual storage.
[0011] The invention provides a number of advantages. For example, the invention provides the ability to quickly backup data by dynamically reallocating virtual storage, such as by adjusting a virtual storage map. In this manner, the system can backup data in a manner that appears almost instantaneous to the user. The user, therefore, need not refrain from using the computing device for a significant period of time, as is often required by conventional backup mechanisms.
[0012] In addition, the controller may be used to provide a secure means for saving and restoring data that is not susceptible to malicious network users, viruses, or other such devices. The controller may, for example, provide a hardware interface for saving and restoring data that is physically separate from the computing device and the software executing thereon. A user, such as a system administrator, may save and restore the data by actuating a hardware switch or interacting with the controller via a secure dedicated connection or wireless link. [0013] Furthermore, the controller may be used to provide additional security by filtering any unauthorized commands issued to a storage system via a host computer. The controller may, for example, filter unpublished, vendor-specific commands. In addition, the controller may filter published but unwanted commands, or may translate the unwanted command to an acceptable command. The controller may selectively filter the commands based on configuration information defined by a user, such as a system administrator. In this manner, the controller may provide a bus-level filter for access commands issued to the storage system.
[0014] The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.
BRIEF DESCRIPTION OF DRAWINGS
[0015] FIG. 1 is a block diagram illustrating an example system that makes use of dynamic virtual storage to save and restore data.
[0016] FIG. 2 illustrates an example embodiment of a backup controller implemented as a single printed circuit board that may be embedded within a host computing device.
[0017] FIG. 3 A illustrates an example embodiment of an input/output (I/O) device for issuing save and restore commands to the controller.
[0018] FIG. 3B illustrates another example embodiment of an input/output (I/O) device for issuing save and restore commands to the controller.
[0019] FIG. 4 is a block diagram illustrating the relationship of physical storage devices, logical storage volumes and virtual storage.
[0020] FIG. 5 is a flow chart illustrating a high-level overview of the functions performed by the controller.
[0021] FIGS. 6A - 6B illustrates the allocation and reallocation of primary and secondary virtual storage within two logical storage volumes.
[0022] FIG. 7 is a block diagram illustrating one embodiment of a data structure maintained by the controller to allocate the virtual storage and to record data written to the secondary virtual storage.
[0023] FIG. 8 is a flow chart illustrating the controller backing up data by dynamically reallocating virtual storage using the data structure of FIG. 7. [0024] FIGS. 9A-9E illustrate in further detail the process of dynamically reallocating virtual storage to save data in a manner that appears instantaneous to a user.
[0025] FIG. 10 is a block diagram illustrating another embodiment of a data structure maintained by the controller to allocate the virtual storage and to record locations of data written to the secondary virtual storage.
[0026] FIG. 11 is a flow chart illustrating the controller backing up data by dynamically reallocating virtual storage using the data structure of FIG. 10.
[0027] FIG. 12 is a block diagram illustrating another embodiment of a data structure maintained by the controller to allocate the virtual storage and to record locations of data written to the secondary virtual storage.
[0028] FIG. 13 is a flow chart illustrating the controller backing up data by dynamically reallocating virtual storage using the data structure of FIG. 12.
[0029] FIG. 14 is a block diagram illustrating another embodiment of a data structure maintained by the controller to allocate the virtual storage.
DETAILED DESCRIPTION
[0030] FIG. 1 is a block diagram illustrating an example system 2 that makes use of dynamic virtual storage to backup and restore data. System 2 includes a controller 6 coupled between processor and storage system 8. Processor 4 may be any type of programmable processor operating within a host computer or other device. Processor 4 may operate within, for example, a desktop computer, a laptop computer or a network server, such as a file server, a web server or a database server. In addition, processor 4 may be an embedded processor operating within a network or stand-alone appliance. [0031] Storage system 8 provides a system for storing data and executable software modules for use by processor 4. Storage system 8 may comprise, for example, one or more physical storage devices including one or more hard disks, tape drives, removable storage media, optical storage media, volatile storage memory, EEPROM and the like. [0032] Controller 6 receives storage access requests, such as conventional read and write requests, from processor 4 via interconnect 12. In response, controller 6 manages storage system 8 by issuing commands to storage system 8 via interconnect 14. Interconnects 12, 14 may conform to, for example, the small computer system interface (SCSI), a Fiber Channel interface, Integrated Drive Electronics / AT Attachment (IDE/ AT A) interface, or the like. Storage system 8 may include one or more physical storage mediums, such as a conventional magnetic disk drives, magneto optical storage devices, and CDROMS.
[0033] As described in detail below, controller 6 manages storage system 8 to provide a secure backup for data written by processor 4. Moreover, controller 6 provides mechanisms to backup and restore data in a manner that appears instantaneous to a user. In particular, controller 6 allocates and maintains a primary virtual storage 10A and a secondary virtual storage 10B, collectively referred to as virtual storage 10, within storage system 8. Controller 6 may allocate virtual storage 10 according to one or more physical storage media of storage system 8. Alternatively, controller 6 may allocate virtual storage 10 according to logical storage volumes that are mapped to the underlying physical storage media of storage system 8. In this manner, the primary virtual storage and the secondary virtual storage may, for example, reside on physically separate storage mediums of separate devices, or may reside on a common storage medium within a storage device.
[0034] Controller 6 uses primary virtual storage 10A to store an initial state of data written by processor 4 prior to a point in time, referred to herein as time T0. In other words, primary virtual storage 10A stores a snapshot of the data at time T0. Controller 6 uses secondary virtual storage 10B to store all data written by processor 4 subsequent to time To. Consequently, controller 6 responds to read requests received from processor 4 by selectively reading data from secondary virtual storage 10B and the primary virtual storage 10A, depending on whether data stored by primary virtual storage 10A has been rendered obsolete by data stored by secondary virtual storage 10B. In order to respond a read request, controller 6 determines whether the requested data has been written to primary virtual storage 10A, or has been superceded by data written to secondary virtual storage 10B. Controller 6 then selectively reads data from secondary virtual storage 10B and primary virtual storage 10A in response to the read request. [0035] In order to quickly and efficiently backup and restore data, controller 6 dynamically allocates and reallocates virtual storage 10. In particular, controller 6 maintains a virtual storage map (NSM) that defines the allocation of the primary and secondary virtual storage. Controller 6 may maintain the map within internal embedded memory, within storage system 8, or both. In response to a save (backup) command, controller 6 updates the VSM, dynamically reallocating primary virtual storage 10A to include the data written to secondary virtual storage 10B. Consequently, controller 6 dynamically reallocates secondary virtual storage 10B to exclude the data. In this manner, controller 6 quickly establishes a new time T0 in which primary virtual storage 10A stores all of the data received prior to time T0. In this manner, controller 6 can save (backup) the data in the manner that appears instantaneous to a user. Specifically, by dynamically allocating and reallocating virtual storage 10 upon receiving the save command, controller 6 avoids copying any of the actual data in order to perform a backup.
[0036] In addition to the ability to save data in a manner that appears instantaneous to a user, controller 6 can also revert back to the previously saved state in similar fashion. Specifically, upon receiving a restore command, controller 6 can simply disregard the date written to secondary virtual storage 10B, thereby reverting to the data stored by primary virtual storage 10A. In this manner, controller 6 can quickly revert to using data stored prior to a time T0.
[0037] Furthermore, controller 6 may provide additional security by filtering any unauthorized commands received from processor 4. Controller 6 may, for example, filter unpublished, vendor-specific commands received from processor 4. In addition, controller 6 may filter published but unwanted commands, or may translate the unwanted command to an acceptable command. Controller 6 may selectively filter the commands based on configuration information defined by a user, such as a system administrator. In this manner, controller 6 may provide a bus-level filter for access commands issued to storage system 8.
[0038] FIG. 2 illustrates an example controller 6 implemented as a single printed circuit board that may be embedded within a host computing device. In this embodiment, controller 6 may include first interface 16, second interface 18, control unit 20, embedded memory 22 and bus interface 24. First interface 16 and second interface 18 provide mechanisms for coupling controller 6 between processor 4 and storage system 8, respectively. Specifically, control unit 20 receives storage access commands from processor 4 via interconnect 12 and first interface 16. In addition, control unit 20 manages and accesses storage system 8 via interconnect 14 and second interface 16. Although illustrated as implemented on a printed circuit board, controller 6 may be embedded within a mother board along with processor 4, within storage system 8, or within other components of system 2 disposed between processor 4 and storage system 8. [0039] Control unit 20 stores the virtual storage map (VSM) within memory 22 to maintain a current allocation of primary virtual storage 10A and secondary virtual storage 10B within storage system 8. In addition, control unit 20 may, as described below, store other information within memory 22 including a record of the locations of secondary virtual storage 10B to which data has been written. Alternatively, control unit 20 may store the VSM and other information within storage system 8 for persistency, or within both memory 22 and storage system 8 for purposes of redundancy. [0040] Control unit 20 receives data backup and restoration commands directly from I/O device 26. In particular, I/O device 26 may be a dedicated device by which a user issues commands to controller 6, thereby bypassing processor 4. In this manner, I/O device 26 and controller 6 provide a secure means for saving and restoring data within storage system 8. Consequently, controller 6 and storage system 8 are not subject to attacks via network hackers, viruses or other malicious software.
[0041] I/O device 26 may comprises a keyboard, pointing device or other conventional input mechanisms. In one embodiment, comprises a panel mounted to a host computing device. Alternatively, I/O device 26 may comprise a dedicated communication link or wireless device by which a user, such as a network administrator, may save and restore data within storage system 8. In this embodiment, signals 23 may represent wireless communications received by controller 6 from I/O device 26.
[0042] Bus interface 24 provides a mechanism by which controller 6 may be directly coupled to a system or I/O bus within a chassis of the host computer. Bus interface 24 may provide, for example, power and ground signals for use by controller 6. [0043] FIG. 3 A illustrates an example embodiment in which I/O device 26 comprises a I/O panel mounted to the host computing device. In this embodiment, I/O device 26 includes a save button 30, a restore button 32, and a lock button 34. Actuation of save button 30 causes I/O device 26 to issue a save command to control unit 20 of controller 6. Similarly, actuation of restore button 32 causes I/O device 26 to issue a restore command to controller 6. Lock button 34 may be used to prevent controller 6 from performing an unauthorized or accidental save or restore operation. Specifically, actuation of lock 34 may prevent controller 6 from responding to a save command or restore command until specifically unlocked.
[0044] I/O device 26 may include other features such as a display of the last date and time at which a save was performed. In addition, I/O device 26 may include mechanisms by which a user enters an authorization code or provides other secure information such as a digital key to be used for authenticating the user.
[0045] I/O device 26 need not be directly coupled to the host computer device. For a wireless device, I/O device 26 may include antenna 31 to communicate with controller 6 via radio frequency or other appropriate mechanisms. I/O device 26 and controller 6 may be configured to communicate, for example, via cellular or infrared communications or may be enabled as BLUETOOTH applications. Alternatively, I/O device may comprise a removable panel that engages controller 6 via an I/O port of other communication means. [0046] FIG. 3B illustrates another example embodiment in which I/O device 26 includes a display area 36 and an input dial 35. Controller 6 displays status information and a current operating mode within display area 36. By interacting with dial 35, a user may perform a number of operations including a restore or a save operation. In addition, the user may place controller 6 in a mode for receiving field upgrades to internal operating software. In one embodiment, controller 6 initializes to a safe mode, i.e., LOCKED, upon power-up, thereby requiring user interaction with dial 35 prior to processing SAVE or RESTORE commands. In this manner, controller 6 provides a security mechanism in the event that controller 6 accepts SAVE and RESTORE commands from software executing on processor 4 or a remote computing device. [0047] FIG. 4 is a block diagram illustrating the arrangement of, and relationship between, physical storage devices, logical storage volumes and the virtual storage. The underlying physical storage media may comprise one or more distinct hard disks, magnetic tape drives, removable storage media, optical storage devices, or the like. A number of logical storage volumes may then be defined and mapped upon the individual physical storage devices. For example, the physical storage devices may be grouped into a single logical storage volume, or multiple logical storage volumes. Also, a single logical storage volume may be mapped to multiple physical storage devices. Upon this layer of logical storage, controller 6 may define and maintain the virtual storage. In particular, controller 6 may allocate and dynamically reallocate primary virtual storage 10A and secondary virtual storage 10B within the logical storage volumes. Alternatively, controller 6 may map the virtual storage directly to physical storage media, thereby bypassing the logical storage volumes.
[0048] FIG. 5 is a flow chart illustrating a high-level overview of the functions performed by controller 6. Initially, controller 6 allocates primary virtual storage 10A and secondary storage 10B within storage system 8 (40). In this manner, controller 6 defines an initial state at a time To for primary virtual storage 10A and secondary virtual storage 10B. After allocating virtual storage 10, controller writes all data received from processor 4 to secondary virtual storage 10B (42). [0049] Controller 6 maintains a record of the locations to which data has been written written to secondary virtual storage 10B subsequent to time T0 (44). Controller 6 makes use of this record in order to respond to read requests received from processor 4. Specifically, upon receiving a read request, controller 6 selectively reads data from primary virtual storage 10A and secondary virtual storage 10B based upon the record (46). For example, if the record indicates that the requested data has been written subsequent to time To, controller 6 reads the data from secondary virtual storage 10B and forwards the data to processor 4. Otherwise, controller 6 reads the data from primary virtual storage 10A and forwards the data to processor 4.
[0050] Upon receiving a save command (48), controller 6 reallocates primary virtual storage 10A and secondary virtual storage 10B (50). In particular, controller 6 reallocates the virtual storage space to such that data written to to secondary virtual storage 10B subsequent to the time T0 is allocated to primary virtual storage 10A and excluded from secondary virtual storage 10B. In this manner controller 6 establishes a new time T0 in response to the save command (50).
[0051] FIG. 6A illustrates an example logical storage volume 52A and a logical storage volume 52B, collectively referred to as logical storage volumes 52, at a time To. In particular, FIG. 6 A illustrates the initial allocation of primary virtual storage 10A and secondary virtual storage 10B within logical storage volumes 52. More particularly, primary virtual storage 10A is entirely allocated to logical storage volume 52A. Similarly, secondary virtual storage 10B is entirely allocated to logical storage volume 52B.
[0052] FIG. 6B illustrates the same logical storage volumes 52A at time a new time T0 after controller 6 has performed a save operation, thereby reallocating virtual storage 10. In particular primary virtual storage 10A comprises a substantial portion of logical storage volume 52A, but has been reallocated to include portions of logical storage volume 52B.
[0053] Specifically, regions 54A and 54B of logical storage volume 52 have been allocated to primary virtual storage 10A. Similarly, the corresponding regions within logical storage volume 52A have been allocated to secondary virtual storage 10B. As illustrated, primary virtual storage 10A and secondary virtual storage 10B may be distributed throughout logical storage volumes 52 as a result of allocation and reallocation due to save commands. As described in further detail below, by reallocating virtual storage within the logical storage volumes, controller 6 is able to quickly perform a save operation in a manner that appears instantaneous to the user.
[0054] FIG. 7 is a block diagram illustrating an example data structure 60 maintained by controller 6 to control the allocation of virtual storage 10, and to record the locations of data written to secondary virtual storage 10B. Specifically, in this embodiment, data structure 60 includes a virtual storage map (VSM) 62, and a delta data map (DDM) 64. [0055] VSM 62 defines a set of logical storage units within each of primary virtual storage 10A and secondary virtual storage 10B. The units may correspond to ranges of addresses, data blocks, sectors, or other units of storage within virtual storage 10. In one embodiment, VSM 62 comprises a bitmap containing a set of binary values. Each binary value corresponds to a respective storage unit. A binary value of 1, for example, may indicate that the corresponding storage unit is allocated to primary virtual storage 10A. A binary value of 0, however, may indicate that the storage unit is allocated to secondary virtual storage 10B. Controller 6 may easily reallocate a storage unit from one virtual storage to another by changing a state of the corresponding binary value of VSM 62. [0056] Similarly, in one embodiment, DDM 64 is a bitmap having a set of binary values. Each binary value of the set corresponds to a logical storage unit within secondary virtual storage 10B, and indicates whether data has been written to secondary virtual storage 10B subsequent to a time To. In this manner, controller 6 can readily determine whether to read data from secondary virtual storage 10B or from primary virtual storage 10A based on the DDM.
[0057] FIG. 8 is a flow chart illustrating the dynamic allocation of virtual storage 10 using data structure 60 of FIG. 7. Initially, controller 6 initializes virtual storage map (VSM) 62 to allocate primary virtual storage 10A and secondary virtual storage 10B (70). Controller 6 may, for example, initialize all of the binary values of VSM 62 to a null value, thereby allocating all storage units of primary virtual storage 10A to a first logical storage volume and all of the storage units of secondary virtual storage 10B to a second logical storage volume. FIG. 6A, as described above, illustrates an example initial allocation of primary virtual storage 10A and secondary virtual storage 10B. [0058] Next, controller 6 initializes the delta data map (DDM) 64 by setting all of the binary values to a null value (72). In this manner, controller 6 resets DDM 64 to indicate that no data has yet been stored to secondary virtual storage 10B subsequent to the allocation. Next, controller 6 writes data to secondary virtual storage 10B in response to write requests received from processor 4 (74). After writing the data, controller 6 updates DDM 64 to record the locations of the data written to secondary virtual storage 10B (76). In particular, controller 6 may change the state of the corresponding binary values within DDM 64 from a null value to a logical one, thereby marking the storage units as containing data written subsequent to time To.
[0059] Upon receiving a read request from processor 4, controller 6 selectively reads data from primary virtual storage 10A and secondary virtual storage 10B based upon the state of the binary data within DDM 64 (78). More specifically, controller 6 reads the appropriate binary values of DDM 64 to determine whether the data requested by processor 4 has been written to secondary virtual storage 10B. If so, controller 6 reads the data from secondary virtual storage 10B and forwards the data to processor 4. If, however, the data has not been written from processor 4 subsequent to a time To, controller 6 reads the data from primary virtual storage 10A and forwards the data to processor 4.
[0060] Upon receiving a save command (78), controller 6 reallocates primary virtual storage 10A and secondary virtual storage 10B by updating VSM 62 and DDM 64 (79). In general, controller 6 examines DDM 64 to identify those storage units within secondary virtual storage 10B that contain data written by processor 4 subsequent to time To. Controller 6 then updates VSM 62 to reallocate primary virtual storage 10A to include the identified storage units of secondary virtual storage 10B (79). In this manner, the storage units of secondary virtual storage 10B that contain data written subsequent to time T0 are redefined to be included within primary virtual storage 10A. Consequently, the corresponding storage units within primary virtual storage 10A that contain old data are automatically redefined to be included within secondary virtual storage 10B. Controller 6 resets DDM 64 by setting all of the binary values to null. In this manner, controller 6 marks all of the storage units within secondary virtual storage 10B as being initialized and available to store new data. In this manner, controller 6 establishes a new time T0.
[0061] FIGS. 9A-9E illustrate in further detail the process of dynamically reallocating virtual storage to save data in a manner that appears instantaneous to a user. FIG. 9A illustrates an initial state in which VSM 80A is reset such that primary virtual storage 10A is mapped entirely to a first logical storage volume, and secondary virtual storage 10B is mapped entirely to a second logical storage volume. In addition, DDM 82A is initialized to indicate that second virtual storage 10B currently contains no data written subsequent to a time T0. Logical storage volumes 84A and 86A illustrate the current allocation of primary virtual storage 10A and second virtual storage 10B. [0062] FIG. 9B illustrates the changes to DDM 82 after a number of write requests from processor 4. In particular, DDM 82B indicates that 4 storage units of secondary virtual storage 10B contain data that has been written subsequent to initial state of time To.
[0063] FIG. 9C illusfrates the changes to VSM 80C and DDM 82C made by controller 6 in response to receiving a save command from a user, such as a system administrator. In particular, controller 6 identifies the storage units of DDM 82B that store data written subsequent to time To. Controller 6 then modifies VSM 80C to reallocate primary virtual storage 10A and secondary virtual storage 10B. In particular, controller 6 modifies the corresponding binary elements of VSM 80C such that primary virtual storage 10A includes those storage units of secondary virtual storage 10B to which data has been written subsequent to time T0. This dynamic reallocation is illustrated by LSV 84C and LSV 86C. Controller 6 may quickly and efficiently effect this dynamic reallocation by performing an exclusive-or (XOR) operation between DDM 82C VSM 80C. [0064] FIG.9D illustrates the changes made to DDM 82D upon receiving an additional write request from processor 4. In particular, controller 6 writes the data to secondary virtual storage 10B and update DDM 82D.
[0065] FIG. 9E illusfrates the changes made by controller 6 in response to a second save command. In particular, controller 6 updates VSM 80E to reallocate primary virtual storage 10A and secondary virtual storage 10B, and clears DDM 82E. [0066] FIG. 10 is block diagram illustrating another example data structure 87 maintained by controller 6 for dynamically allocating and reallocating virtual storage. In this embodiment, data structure 87 includes VSM 88, DDM 89 and additional status data 90. In particular, status data 90 indicates whether each storage unit of the secondary virtual storage needs to be reallocated after a save command. [0067] In particular, status data 90 may comprise a bitmap having a set of binary values. Each binary value may correspond to a storage unit within secondary virtual storage 10B. The state of the binary value represents whether the corresponding storage unit has been reallocated, if necessary, in response to a recent save command. In this manner, data structure 87 may be useful when controller 6 performs the reallocation in the background, such as during free cycles of a system bus within a host computing device. Thus, by including status data in the data structure, the reallocation can be performed solely during free cycles. If the free cycles are interrupted, status data 90 can maintain an indication of the status of the reallocation so that it can be finished during subsequent free cycles. In this manner, controller 6 can perform reallocation without using non-free cycles.
[0068] FIG. 11 is a flow chart illustrating the reallocation of virtual storage by controller 6 when making use of data structure 87. Upon receiving a save command (91), controller 6 sets a global flag indicating that a save must be performed and begins updating VSM 88 and DDM 89 during the background, i.e., between servicing of access requests received from processor 4 (91). Upon reallocating a storage unit, controller 6 sets the value of a corresponding bit within status data 90 to indicate that reallocation has either been performed or is not needed.
[0069] During this process, if controller 6 receives a write request (94), controller 6 accesses status data 90 to determine whether the storage units holding the requested data have been updated in response to the previous save command (96). If so, controller 6 immediately writes the data to the storage units of secondary virtual storage 10B (100). If not, controller 6 updates VSM 88 and DDM 89 (98) and status data 90 (99) prior to writing the data (100).
[0070] If a read request is received (102), controller 6 selectively reads data from primary virtual storage 10A and secondary virtual storage 10B in accordance with DDM 89 as described above (104). Controller 6 continues to update status data 90 in the background until all of the storage units containing data written subsequent to time T0 have been reallocated from secondary virtual storage 10B to primary virtual storage 10A (106).
[0071] FIG.12 is a block diagram illustrating another embodiment of a data structure 104 maintained by controller 6 for dynamically allocating and reallocating virtual storage. In this embodiment, data structure 104 includes VSM 106, DDM 108, version data 110 and a system version 111. In particular, version data 110 stores a version number for each storage unit of secondary virtual storage 10B. More specifically, the version number corresponds to a save command received by controller 6, and indicates whether the storage unit is up to date. System version 111 stores the most recent version for all of secondary virtual storage 10B, and is based upon the save commands received from I/O device 26. In particular, each time controller 6 receives a save command, controller 6 increments system version 111. [0072] FIG. 13 is a flow chart illustrating the operation of controller 6 when using data structure 104 of FIG. 12. Upon receiving a save command (120), controller 6 increments the system version 111 (122). Upon receiving a write request (124) controller 6 compares the version for the requested storage unit, as indicated by version data 110, with the system version 111 (126).
[0073] If the version number for the requested storage unit is less than system version 111, controller 6 initiates a reallocation of the storage unit from secondary virtual storage 10B to primary virtual storage 10A (128) and sets the version number for the storage unit to system version 111 (130). Next, controller 6 writes the data to the storage unit of secondary virtual storage 10B (132) and updates DDM 108 to indicate that the storage unit contains data subsequent to the last save command (133).
[0074] If however, the version number for the storage unit requested is equal to system version 111, controller 6 writes the data to secondary virtual storage 10B (132) without updating VSM 106 to reallocate storage units (132) and updates DDM 108 (133). If controller 6 receives a read request, controller 6 accesses DDM 108 and selectively reads data from secondary virtual storage 10B and primary virtual storage 10A (136). [0075] FIG.14 is a block diagram illusfrates another embodiment of a data structure 140 maintained by controller 6 for dynamically allocating and reallocating virtual storage. In this embodiment, data structure 140 includes VSM 142, DDM 144, version data 146, command history 148 and a system version 150. In particular, command history 148 is a log indicating the sequence of save and restore commands received be controller 6. Command history 148 may comprise, for example, a bitmap in which a binary value of one represents a save command and a binary value of zero represents a restore command. A sequence of 11101, for example, represents the following sequence: SAVE, SAVE, SAVE, RESTORE, SAVE.
[0076] In this embodiment, version data 110 may store an index into command history 148. In this manner, the version number indicates the last command, save or restore, applied to a particular storage unit of secondary virtual storage 10B. In other words, by indexing into command history 148, the version number indicates a current state for the respective storage unit.
[0077] Upon receiving a read request from processor 4, controller 6 accesses version data 146 to determine if the version for the accessed storage unit is less than system version 150. If so, controller 6 reallocates VSM 142 and updates the version data 146 for the accessed storage unit. In this manner, controller 6 may update data structure 140 within local memory 22. For write requests, controller 6 may perform a similar operation and save data structure 140 to storage system 8.
[0078] Upon receiving a save or restore command, controller 6 may update command history 148 to reflect the command, save data structure 140 to storage system 8, and increment system version 150. This allows controller 6 to perform a save or restore in a manner that appears instantaneous to the user.
[0079] Various embodiments of the invention have been described. These and other embodiments are within the scope of the following claims.

Claims

CLAIMS:
1. A method comprising: storing a virtual storage map (NSM) to allocate a primary virtual storage and a secondary virtual storage; and updating the NSM to reallocate the primary virtual storage to include data written to the secondary virtual storage.
2. The method of claim 1 , wherein the NSM allocates a set of storage units for each virtual storage, and further wherein updating the VSM comprises updating the VSM to reallocate at least one storage unit from the secondary virtual storage to the primary storage device.
3. The method of claim 1 , further comprising: receiving a save command; and updating the VSM in response to the save command.
4. The method of claim 3, wherein receiving a save command comprises receiving a signal in response to an actuated hardware switch.
5. The method of claim 3, wherein receiving a save command comprises receiving the save command from software executing on a host computer.
6. The method of claim 3, wherein receiving a save command comprises receiving a signal from a handheld device.
7. The method of claim 6, wherein receiving the signal from the handheld device comprises receiving a wireless communication from the handheld device.
8. The method of claim 1 , further comprising: storing data received from a host computer prior to a time T0 on the primary virtual storage; and storing data received from the host computer after time T0 on the secondary virtual storage.
9. The method of claim 8, further comprising storing a record of locations within secondary virtual storage to which the data written has been written.
10. The method of claim 9, further comprising selectively reading data from the primary virtual storage and the secondary virtual storage based on the record.
11. The method of claim 9, wherein the VSM allocates a set of storage units for each virtual storage, and wherein storing a record comprises storing a delta data map (DDM) to indicate those storage units of the secondary virtual storage to which the data has been written.
12. The method of claim 11 , wherein the DDM and the VSM comprises bitmaps having a set of binary values, wherein each binary value corresponds to a respective storage unit, and further wherein updating the VSM includes changing a state of at least one of the binary values.
13. The method of claim 1 , wherein the VSM defines a set of storage units within one or more logical storage volumes, and further wherein the logical storage volumes comprise one or more physical storage mediums.
14. The method of claim 1 , wherein storing the VSM comprises storing the VSM in a computer-readable medium coupled to a host computer.
15. The method of claim 1 , wherein storing the VSM comprises storing the VSM in an embedded memory of a controller coupled to a host computer via an input/output (I/O) bus.
16. The method of claim 1 , where updating the VSM comprises : storing a record of locations of the secondary virtual storage to which the data has been written after a time T0; receiving a save command at a time Ts where Ts > T0; and in response to the save command, adjusting the VSM to redefine the primary virtual storage to include the data written to the secondary storage device after T0.
17. The method of claim 1 , further comprising: storing the VSM as a bitmap defining a set of storage units for each virtual storage, wherein each binary value of the bitmap corresponds to a storage unit within each set; and storing a delta data map (DDM) as a bitmap to indicate those storage units of the secondary virtual storage to which data has been written after a time T0;
18. The method of claim 17, wherein updating the VSM comprises: setting each bit of the VSM bitmap based upon an exclusive or operation (XOR) of the binary value of VSM bit and a corresponding bit within the DDM; and clearing the corresponding bit within the DDM.
19. The method of claim 1 , further comprising: storing the VSM to define a set of storage units for the primary virtual storage and the secondary virtual storage; and storing status data for each storage unit of secondary virtual storage, wherein the status data indicates whether each storage unit needs to be reallocated.
20. The method of claim 19, wherein updating the VSM comprises: updating the VSM to reallocate the primary virtual storage during free cycles of a bus; and updating the corresponding status data while updating the VSM.
21. The method of claim 1 , further comprising: storing the VSM to define a set of storage units for the primary virtual storage and the secondary virtual storage; and storing version information for the storage units of secondary virtual storage, wherein the version information indicates a current version for each storage unit of the secondary virtual storage.
22. The method of claim 21 , wherein updating the VSM comprises : incrementing a system version indicator upon receiving a save command; in response to a write request to a storage unit of the secondary virtual storage, comparing the system version indicator with the save version for the storage unit indicated by the write request; reallocating the primary virtual storage based on the comparison; and updating the version for the storage unit indicated by the write request.
23. An apparatus comprising: a computer-readable medium to store a virtual storage map (VSM) allocating a primary virtual storage and a secondary virtual storage within a storage system; and a confrol unit to update the VSM to reallocate the primary virtual storage to include data written to the secondary virtual storage.
24. The apparatus of claim 23, further comprising: a first interface coupled to the confrol unit to receive storage requests from a processor; and a second interface coupling the confrol unit to the storage system.
25. The apparatus of claim 23, further comprising an input/output (I/O) interface to receive a save command, wherein the confrol unit reallocates the primary virtual storage in response to the save command.
26. The apparatus of claim 25, wherein the I/O interface receives a signal from an actuated switch.
27. The apparatus of claim 25, wherein the I/O interface receives a wireless signal.
28. The apparatus of claim 25, wherein the I/O interface receives the save command from software executing on a computing device.
29. The apparatus of claim 23, wherein the VSM represents allocation of a set of storage units for each virtual storage, and further wherein the confrol unit reallocates at least one storage unit from the secondary virtual storage to the primary storage device.
30. The apparatus of claim 23, wherein the control unit stores data received from a processor prior to a time T0 on the primary virtual storage, and further wherein the control unit stores data received from the processor after time T0 on the secondary virtual storage.
31. The apparatus of claim 23 , wherein the computer-readable medium further stores a record of locations of the secondary virtual storage to which data has been written.
32. The apparatus of claim 31 , wherein the control unit selectively reads data from the primary virtual storage and the secondary virtual storage based on the record.
33. The apparatus of claim 31 , wherein the VSM represents allocation of a set of storage units for each virtual storage, and the record comprises a delta data map (DDM) to indicate those storage units of the secondary virtual storage to which the data has been written.
34. The apparatus of claim 33, wherein the DDM and the VSM comprises bitmaps having a set of binary values, wherein each binary value corresponds to a respective storage unit, and further wherein the control unit reallocates the primary virtual storage by changing a state of at least one of the binary values.
35. The apparatus of claim 34, wherein the control unit reallocates the primary virtual storage by setting each bit of the VSM bitmap based upon an exclusive or (XOR) of the binary value of VSM bit and a corresponding bit within the DDM, and clearing the corresponding bit within the DDM.
36. The apparatus of claim 23, wherein the VSM represents allocation of a set of storage units for each of the virtual storages, and further wherein the computer-readable medium stores status data indicating whether each storage unit of the secondary virtual storage needs to be reallocated.
37. The apparatus of claim 23, wherein the VSM represents allocation of a set of storage units for each of the virtual storages, and further wherein the computer-readable medium stores version data indicating a current version for each storage unit of the secondary virtual storage.
38. A system comprising: a processor; a storage system having one or more physical storage devices; and a controller coupled to the processor and the storage system, wherein the controller maintains a virtual storage map (VSM) allocating a primary virtual storage and a secondary virtual storage within a storage system.
39. The system of claim 38, wherein the controller further comprises a computer- readable medium to store the VSM.
40. The system of claim 38, wherein the controller stores the VSM within the storage system.
41. The system of claim 38, wherein the controller stores data received from a processor prior to a time To on the primary virtual storage, and further wherein the confrol unit stores data received from the processor after time To on the secondary virtual storage.
42. The system of claim 41, wherein the controller updates the VSM in response to a save command to reallocate the primary virtual storage to include data written to the secondary virtual storage.
43. The system of claim 42, further comprising an input/output (I/O) device to issue a save command to the controller.
44. The system of claim 43, wherein the I/O device provides a signal to the controller upon actuation of a hardware switch.
45. The system of claim 43, wherein the I/O device issues commands to the controller via a wireless signal.
46. A method comprising: storing a virtual storage map (VSM) to allocate a primary virtual storage and a secondary virtual storage within a storage system; receiving requests from a processor to access the storage system; and selectively filtering unsupported requests including unpublished vendor-specific requests.
47. The method of claim 46, wherein receiving requests the requests with a controller coupled between the processor and a storage device via an input/output (I/O) bus.
48. The method of claim 46, wherein storing the VSM comprises storing the VSM in an embedded memory of a controller coupled to the processor via an input/output (I/O) bus.
49. A method comprising: storing a virtual storage map (VSM) to allocate a primary virtual storage and a secondary virtual storage; storing a record of locations of the secondary virtual storage to which data has been written after a time To; receiving a save command via a wireless communication; and adjusting the VSM in response to the save command.
50. The method of claim 49, wherein adjusting the VSM comprises redefining the primary virtual storage to include the data written to the secondary storage device after
To.
51 The method of claim 49, wherein receiving the save command via a wireless communication comprises receiving a signal from a handheld device.
52. An apparatus comprising: a computer-readable medium to store a virtual storage map (VSM) allocating a primary virtual storage and a secondary virtual storage within a storage system; an input/output (I/O); and a control unit to update the VSM in response to a save command; wherein the controller requires a user to select an operating mode from a default lock mode prior to accepting a save command.
53. The apparatus of claim 52, wherein the control unit receives the save command from software executing on a processor within a host computer.
54. A method comprising: storing a virtual storage map (VSM) to define a set of storage units for a primary virtual storage and a secondary virtual storage; storing history data indicating a sequence of save and restore commands; and storing version data for the storage units of secondary virtual storage, wherein the version data associates one of the commands within the history data with each of the storage units of the secondary virtual storage.
55. The method of claim 54, further comprising: receiving a save command; adjusting the VSM in response to the save command; and updating the history data.
56. The method of claim 54, further comprising: receiving a restore command; adjusting the VSM in response to the restore command; and updating the history data.
57. The method of claim 54, further comprising storing a record of locations within the secondary virtual storage to which data has been written after a time T0.
58. The method of claim 55, wherein adjusting the VSM comprises redefining the primary virtual storage to include the data written to the secondary storage device after To.
PCT/US2002/040031 2001-12-14 2002-12-11 Data backup and restoration using dynamic virtual storage WO2003052604A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002359710A AU2002359710A1 (en) 2001-12-14 2002-12-11 Data backup and restoration using dynamic virtual storage

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/020,086 2001-12-14
US10/020,086 US6948039B2 (en) 2001-12-14 2001-12-14 Data backup and restoration using dynamic virtual storage

Publications (1)

Publication Number Publication Date
WO2003052604A1 true WO2003052604A1 (en) 2003-06-26

Family

ID=21796674

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/040031 WO2003052604A1 (en) 2001-12-14 2002-12-11 Data backup and restoration using dynamic virtual storage

Country Status (3)

Country Link
US (1) US6948039B2 (en)
AU (1) AU2002359710A1 (en)
WO (1) WO2003052604A1 (en)

Families Citing this family (131)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7434219B2 (en) 2000-01-31 2008-10-07 Commvault Systems, Inc. Storage of application specific profiles correlating to document versions
US7107298B2 (en) 2001-09-28 2006-09-12 Commvault Systems, Inc. System and method for archiving objects in an information store
US7007152B2 (en) * 2001-12-28 2006-02-28 Storage Technology Corporation Volume translation apparatus and method
US7251713B1 (en) 2002-03-18 2007-07-31 Xiotech Corporation System and method to transport data snapshots
JP4704659B2 (en) 2002-04-26 2011-06-15 株式会社日立製作所 Storage system control method and storage control device
US7334099B2 (en) * 2002-06-28 2008-02-19 Microsoft Corporation Method and system for managing image files
US7293150B2 (en) * 2002-06-28 2007-11-06 Microsoft Corporation Method and system for creating and restoring an image file
JP2004046435A (en) * 2002-07-10 2004-02-12 Hitachi Ltd Backup method and storage controller used for the same
JP2004110367A (en) * 2002-09-18 2004-04-08 Hitachi Ltd Storage system control method, storage control device, and storage system
US7263593B2 (en) * 2002-11-25 2007-08-28 Hitachi, Ltd. Virtualization controller and data transfer control method
JP2004220450A (en) * 2003-01-16 2004-08-05 Hitachi Ltd Storage device, its introduction method and its introduction program
JP2005018193A (en) 2003-06-24 2005-01-20 Hitachi Ltd Interface command control method for disk device, and computer system
JP2005063363A (en) * 2003-08-20 2005-03-10 Fujitsu Ltd Data backup device, data backup method and data backup program
JP4386694B2 (en) * 2003-09-16 2009-12-16 株式会社日立製作所 Storage system and storage control device
US7904428B2 (en) 2003-09-23 2011-03-08 Symantec Corporation Methods and apparatus for recording write requests directed to a data store
US7991748B2 (en) 2003-09-23 2011-08-02 Symantec Corporation Virtual data store creation and use
US7827362B2 (en) 2004-08-24 2010-11-02 Symantec Corporation Systems, apparatus, and methods for processing I/O requests
US7287133B2 (en) 2004-08-24 2007-10-23 Symantec Operating Corporation Systems and methods for providing a modification history for a location within a data store
US7577806B2 (en) * 2003-09-23 2009-08-18 Symantec Operating Corporation Systems and methods for time dependent data storage and recovery
US7730222B2 (en) 2004-08-24 2010-06-01 Symantec Operating System Processing storage-related I/O requests using binary tree data structures
US7725760B2 (en) 2003-09-23 2010-05-25 Symantec Operating Corporation Data storage system
JP4307202B2 (en) * 2003-09-29 2009-08-05 株式会社日立製作所 Storage system and storage control device
US7447860B1 (en) * 2003-09-29 2008-11-04 Emc Corporation System and method for managing data associated with copying and recovery procedures in a data storage environment
US7496690B2 (en) * 2003-10-09 2009-02-24 Intel Corporation Method, system, and program for managing memory for data transmission through a network
WO2005036418A1 (en) * 2003-10-13 2005-04-21 Illuminator (Israel) Ltd. Apparatus and method for information recovery quality assessment in a computer system
US7428558B2 (en) * 2003-11-24 2008-09-23 Emc Corporation Persistent restore of virtual devices
JP4307964B2 (en) 2003-11-26 2009-08-05 株式会社日立製作所 Access restriction information setting method and apparatus
US7111137B2 (en) * 2003-12-29 2006-09-19 Sun Microsystems, Inc. Data storage systems and processes, such as one-way data mirror using write mirroring
US20050149554A1 (en) * 2003-12-29 2005-07-07 Chong Fay Jr. One-way data mirror using write logging
JP2005202893A (en) * 2004-01-19 2005-07-28 Hitachi Ltd Storage device controller, storage system, recording medium recording program, information processor, and method for controlling storage system
JP4391265B2 (en) 2004-02-26 2009-12-24 株式会社日立製作所 Storage subsystem and performance tuning method
US20060004984A1 (en) * 2004-06-30 2006-01-05 Morris Tonia G Virtual memory management system
JP4646574B2 (en) 2004-08-30 2011-03-09 株式会社日立製作所 Data processing system
JP2006127028A (en) 2004-10-27 2006-05-18 Hitachi Ltd Memory system and storage controller
US20060136508A1 (en) * 2004-12-16 2006-06-22 Sam Idicula Techniques for providing locks for file operations in a database management system
US7548918B2 (en) * 2004-12-16 2009-06-16 Oracle International Corporation Techniques for maintaining consistency for different requestors of files in a database management system
US7627574B2 (en) * 2004-12-16 2009-12-01 Oracle International Corporation Infrastructure for performing file operations by a database server
US7716260B2 (en) * 2004-12-16 2010-05-11 Oracle International Corporation Techniques for transaction semantics for a database server performing file operations
US7809675B2 (en) * 2005-06-29 2010-10-05 Oracle International Corporation Sharing state information among a plurality of file operation servers
US8224837B2 (en) * 2005-06-29 2012-07-17 Oracle International Corporation Method and mechanism for supporting virtual content in performing file operations at a RDBMS
JP4945118B2 (en) 2005-11-14 2012-06-06 株式会社日立製作所 Computer system that efficiently uses storage capacity
US7610304B2 (en) * 2005-12-05 2009-10-27 Oracle International Corporation Techniques for performing file operations involving a link at a database management system
US20070208918A1 (en) * 2006-03-01 2007-09-06 Kenneth Harbin Method and apparatus for providing virtual machine backup
CN100423491C (en) * 2006-03-08 2008-10-01 杭州华三通信技术有限公司 Virtual network storing system and network storing equipment thereof
US9317222B1 (en) 2006-04-24 2016-04-19 Emc Corporation Centralized content addressed storage
US9235477B1 (en) 2006-04-24 2016-01-12 Emc Corporation Virtualized backup solution
US9684739B1 (en) * 2006-05-11 2017-06-20 EMC IP Holding Company LLC View generator for managing data storage
US8025650B2 (en) * 2006-06-12 2011-09-27 Wound Care Technologies, Inc. Negative pressure wound treatment device, and methods
US7853566B2 (en) * 2006-08-04 2010-12-14 Apple Inc. Navigation of electronic backups
US7860839B2 (en) * 2006-08-04 2010-12-28 Apple Inc. Application-based backup-restore of electronic information
US7809688B2 (en) * 2006-08-04 2010-10-05 Apple Inc. Managing backup of content
US8370853B2 (en) 2006-08-04 2013-02-05 Apple Inc. Event notification management
US20080126442A1 (en) * 2006-08-04 2008-05-29 Pavel Cisler Architecture for back up and/or recovery of electronic data
US8311988B2 (en) 2006-08-04 2012-11-13 Apple Inc. Consistent back up of electronic information
US9009115B2 (en) 2006-08-04 2015-04-14 Apple Inc. Restoring electronic information
US7809687B2 (en) * 2006-08-04 2010-10-05 Apple Inc. Searching a backup archive
US7856424B2 (en) 2006-08-04 2010-12-21 Apple Inc. User interface for backup management
US7853567B2 (en) * 2006-08-04 2010-12-14 Apple Inc. Conflict resolution in recovery of electronic data
US8166415B2 (en) 2006-08-04 2012-04-24 Apple Inc. User interface for backup management
US8468136B2 (en) 2007-06-08 2013-06-18 Apple Inc. Efficient data backup
US8010900B2 (en) 2007-06-08 2011-08-30 Apple Inc. User interface for electronic backup
US8307004B2 (en) 2007-06-08 2012-11-06 Apple Inc. Manipulating electronic backups
US8725965B2 (en) * 2007-06-08 2014-05-13 Apple Inc. System setup for electronic backup
US8099392B2 (en) 2007-06-08 2012-01-17 Apple Inc. Electronic backup of applications
US20080307017A1 (en) 2007-06-08 2008-12-11 Apple Inc. Searching and Restoring of Backups
US8745523B2 (en) 2007-06-08 2014-06-03 Apple Inc. Deletion in electronic backups
US8429425B2 (en) 2007-06-08 2013-04-23 Apple Inc. Electronic backup and restoration of encrypted data
US20080307347A1 (en) * 2007-06-08 2008-12-11 Apple Inc. Application-Based Backup-Restore of Electronic Information
US8818936B1 (en) 2007-06-29 2014-08-26 Emc Corporation Methods, systems, and computer program products for processing read requests received during a protected restore operation
US8769048B2 (en) 2008-06-18 2014-07-01 Commvault Systems, Inc. Data protection scheduling, such as providing a flexible backup window in a data protection system
US9128883B2 (en) 2008-06-19 2015-09-08 Commvault Systems, Inc Data storage resource allocation by performing abbreviated resource checks based on relative chances of failure of the data storage resources to determine whether data storage requests would fail
US8352954B2 (en) 2008-06-19 2013-01-08 Commvault Systems, Inc. Data storage resource allocation by employing dynamic methods and blacklisting resource request pools
US8725688B2 (en) 2008-09-05 2014-05-13 Commvault Systems, Inc. Image level copy or restore, such as image level restore without knowledge of data object metadata
US20100070474A1 (en) 2008-09-12 2010-03-18 Lad Kamleshkumar K Transferring or migrating portions of data objects, such as block-level data migration or chunk-based data migration
US8682862B2 (en) * 2009-04-10 2014-03-25 Phd Virtual Technologies Inc. Virtual machine file-level restoration
US9256598B1 (en) 2009-08-19 2016-02-09 Emc Corporation Systems, methods, and computer readable media for copy-on-demand optimization for large writes
US8843489B2 (en) 2010-11-16 2014-09-23 Actifio, Inc. System and method for managing deduplicated copies of data using temporal relationships among copies
US9858155B2 (en) 2010-11-16 2018-01-02 Actifio, Inc. System and method for managing data with service level agreements that may specify non-uniform copying of data
US8904126B2 (en) 2010-11-16 2014-12-02 Actifio, Inc. System and method for performing a plurality of prescribed data management functions in a manner that reduces redundant access operations to primary storage
US8402004B2 (en) 2010-11-16 2013-03-19 Actifio, Inc. System and method for creating deduplicated copies of data by tracking temporal relationships among copies and by ingesting difference data
US8417674B2 (en) 2010-11-16 2013-04-09 Actifio, Inc. System and method for creating deduplicated copies of data by sending difference data between near-neighbor temporal states
US8984029B2 (en) 2011-01-14 2015-03-17 Apple Inc. File system management
US8943026B2 (en) 2011-01-14 2015-01-27 Apple Inc. Visual representation of a local backup
US8849762B2 (en) * 2011-03-31 2014-09-30 Commvault Systems, Inc. Restoring computing environments, such as autorecovery of file systems at certain points in time
WO2013019869A2 (en) 2011-08-01 2013-02-07 Actifio, Inc. Data fingerpringting for copy accuracy assurance
US9063883B2 (en) 2011-09-26 2015-06-23 International Business Machines Corporation Management of point-in-time copy relationship for extent space efficient volumes
CN102819468B (en) * 2011-11-30 2014-09-24 凯迈(洛阳)环测有限公司 Backup and query method of FLASH-based small data
US10157184B2 (en) 2012-03-30 2018-12-18 Commvault Systems, Inc. Data previewing before recalling large data files
WO2013192198A2 (en) 2012-06-18 2013-12-27 Actifio, Inc. Enhanced data management virtualization system
US8977828B2 (en) 2012-06-21 2015-03-10 Ca, Inc. Data recovery using conversion of backup to virtual disk
US9633216B2 (en) 2012-12-27 2017-04-25 Commvault Systems, Inc. Application of information management policies based on operation with a geographic entity
US9459968B2 (en) 2013-03-11 2016-10-04 Commvault Systems, Inc. Single index to query multiple backup formats
EP2997501A2 (en) 2013-05-14 2016-03-23 Actifio Inc. Efficient data replication and garbage collection predictions
US9904603B2 (en) 2013-11-18 2018-02-27 Actifio, Inc. Successive data fingerprinting for copy accuracy assurance
US9720778B2 (en) 2014-02-14 2017-08-01 Actifio, Inc. Local area network free data movement
US9798596B2 (en) 2014-02-27 2017-10-24 Commvault Systems, Inc. Automatic alert escalation for an information management system
US9648100B2 (en) 2014-03-05 2017-05-09 Commvault Systems, Inc. Cross-system storage management for transferring data across autonomous information management systems
US9823978B2 (en) 2014-04-16 2017-11-21 Commvault Systems, Inc. User-level quota management of data objects stored in information management systems
US9792187B2 (en) 2014-05-06 2017-10-17 Actifio, Inc. Facilitating test failover using a thin provisioned virtual machine created from a snapshot
US9740574B2 (en) 2014-05-09 2017-08-22 Commvault Systems, Inc. Load balancing across multiple data paths
WO2015195834A1 (en) 2014-06-17 2015-12-23 Rangasamy Govind Resiliency director
US11249858B2 (en) 2014-08-06 2022-02-15 Commvault Systems, Inc. Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host
US9852026B2 (en) 2014-08-06 2017-12-26 Commvault Systems, Inc. Efficient application recovery in an information management system based on a pseudo-storage-device driver
US10379963B2 (en) 2014-09-16 2019-08-13 Actifio, Inc. Methods and apparatus for managing a large-scale environment of copy data management appliances
US10042710B2 (en) 2014-09-16 2018-08-07 Actifio, Inc. System and method for multi-hop data backup
US9444811B2 (en) 2014-10-21 2016-09-13 Commvault Systems, Inc. Using an enhanced data agent to restore backed up data across autonomous storage management systems
WO2016094819A1 (en) 2014-12-12 2016-06-16 Actifio, Inc. Searching and indexing of backup data sets
WO2016115135A1 (en) 2015-01-12 2016-07-21 Xiangdong Zhang Disk group based backup
US10282201B2 (en) 2015-04-30 2019-05-07 Actifo, Inc. Data provisioning techniques
US10691659B2 (en) 2015-07-01 2020-06-23 Actifio, Inc. Integrating copy data tokens with source code repositories
US10613938B2 (en) 2015-07-01 2020-04-07 Actifio, Inc. Data virtualization using copy data tokens
US9766825B2 (en) 2015-07-22 2017-09-19 Commvault Systems, Inc. Browse and restore for block-level backups
US10296368B2 (en) 2016-03-09 2019-05-21 Commvault Systems, Inc. Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block-level pseudo-mount)
US10445298B2 (en) 2016-05-18 2019-10-15 Actifio, Inc. Vault to object store
US10476955B2 (en) 2016-06-02 2019-11-12 Actifio, Inc. Streaming and sequential data replication
US10838821B2 (en) 2017-02-08 2020-11-17 Commvault Systems, Inc. Migrating content and metadata from a backup system
US10740193B2 (en) 2017-02-27 2020-08-11 Commvault Systems, Inc. Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount
US10891069B2 (en) 2017-03-27 2021-01-12 Commvault Systems, Inc. Creating local copies of data stored in online data repositories
US10776329B2 (en) 2017-03-28 2020-09-15 Commvault Systems, Inc. Migration of a database management system to cloud storage
US11074140B2 (en) 2017-03-29 2021-07-27 Commvault Systems, Inc. Live browsing of granular mailbox data
US10599611B1 (en) * 2017-04-24 2020-03-24 EMC IP Holding Company LLC Base object selection and creation in data storage system management
US10855554B2 (en) 2017-04-28 2020-12-01 Actifio, Inc. Systems and methods for determining service level agreement compliance
US10664352B2 (en) 2017-06-14 2020-05-26 Commvault Systems, Inc. Live browsing of backed up data residing on cloned disks
US11403178B2 (en) 2017-09-29 2022-08-02 Google Llc Incremental vault to object store
US10795927B2 (en) 2018-02-05 2020-10-06 Commvault Systems, Inc. On-demand metadata extraction of clinical image data
US10789387B2 (en) 2018-03-13 2020-09-29 Commvault Systems, Inc. Graphical representation of an information management system
US11176001B2 (en) 2018-06-08 2021-11-16 Google Llc Automated backup and restore of a disk group
US11741233B2 (en) 2018-06-11 2023-08-29 Hewlett-Packard Development Company, L.P. Overriding sub-system identifiers with protected variable values
US10936442B2 (en) * 2018-07-06 2021-03-02 EMC IP Holding Company LLC Simultaneous file level recovery from multiple backups using a proxy virtual machine
US10860443B2 (en) 2018-12-10 2020-12-08 Commvault Systems, Inc. Evaluation and reporting of recovery readiness in a data storage management system
US11308034B2 (en) 2019-06-27 2022-04-19 Commvault Systems, Inc. Continuously run log backup with minimal configuration and resource usage from the source machine

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241670A (en) * 1992-04-20 1993-08-31 International Business Machines Corporation Method and system for automated backup copy ordering in a time zero backup copy session
US6061770A (en) * 1997-11-04 2000-05-09 Adaptec, Inc. System and method for real-time data backup using snapshot copying with selective compaction of backup data
US6131148A (en) * 1998-01-26 2000-10-10 International Business Machines Corporation Snapshot copy of a secondary volume of a PPRC pair

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4819154A (en) 1982-12-09 1989-04-04 Sequoia Systems, Inc. Memory back up system with one cache memory and two physically separated main memories
US4959774A (en) 1984-07-06 1990-09-25 Ampex Corporation Shadow memory system for storing variable backup blocks in consecutive time periods
JP2772103B2 (en) 1990-03-28 1998-07-02 株式会社東芝 Computer system startup method
US5544347A (en) 1990-09-24 1996-08-06 Emc Corporation Data storage system controlled remote data mirroring with respectively maintained data indices
US5212784A (en) 1990-10-22 1993-05-18 Delphi Data, A Division Of Sparks Industries, Inc. Automated concurrent data backup system
JP2603757B2 (en) 1990-11-30 1997-04-23 富士通株式会社 Method of controlling array disk device
JPH05341918A (en) 1992-05-12 1993-12-24 Internatl Business Mach Corp <Ibm> Connector for constituting duplex disk storage device system
US5487160A (en) 1992-12-04 1996-01-23 At&T Global Information Solutions Company Concurrent image backup for disk storage system
US5469573A (en) 1993-02-26 1995-11-21 Sytron Corporation Disk operating system backup and recovery system
JP3554045B2 (en) 1994-10-28 2004-08-11 富士通株式会社 Recorded content restoring device and recording restoring device of auxiliary storage device
US5799141A (en) 1995-06-09 1998-08-25 Qualix Group, Inc. Real-time data protection system and method
US5758057A (en) 1995-06-21 1998-05-26 Mitsubishi Denki Kabushiki Kaisha Multi-media storage system
US5740397A (en) 1995-10-11 1998-04-14 Arco Computer Products, Inc. IDE disk drive adapter for computer backup and fault tolerance
US5829046A (en) 1995-10-27 1998-10-27 Emc Corporation On-line tape backup using an integrated cached disk array
US5777874A (en) 1996-02-12 1998-07-07 Allen-Bradley Company, Inc. Programmable controller backup system
US5724501A (en) 1996-03-29 1998-03-03 Emc Corporation Quick recovery of write cache in a fault tolerant I/O system
US5901327A (en) 1996-05-28 1999-05-04 Emc Corporation Bundling of write data from channel commands in a command chain for transmission over a data link between data storage systems for remote data mirroring
US6000020A (en) 1997-04-01 1999-12-07 Gadzoox Networks, Inc. Hierarchical storage management from a mirrored file system on a storage network segmented by a bridge
US6081875A (en) 1997-05-19 2000-06-27 Emc Corporation Apparatus and method for backup of a disk storage system
US6038639A (en) * 1997-09-09 2000-03-14 Storage Technology Corporation Data file storage management system for snapshot copy operations
US6047294A (en) * 1998-03-31 2000-04-04 Emc Corp Logical restore from a physical backup in a computer storage system
US6366987B1 (en) 1998-08-13 2002-04-02 Emc Corporation Computer data storage physical backup and logical restore
US6269431B1 (en) * 1998-08-13 2001-07-31 Emc Corporation Virtual storage and block level direct access of secondary storage for recovery of backup data
US6920537B2 (en) 1998-12-31 2005-07-19 Emc Corporation Apparatus and methods for copying, backing up and restoring logical objects in a computer storage system by transferring blocks out of order or in parallel
US6549992B1 (en) 1999-12-02 2003-04-15 Emc Corporation Computer data storage backup with tape overflow control of disk caching of backup data stream
US6434681B1 (en) 1999-12-02 2002-08-13 Emc Corporation Snapshot copy facility for a data storage system permitting continued host read/write access
US6708227B1 (en) * 2000-04-24 2004-03-16 Microsoft Corporation Method and system for providing common coordination and administration of multiple snapshot providers
US6532527B2 (en) * 2000-06-19 2003-03-11 Storage Technology Corporation Using current recovery mechanisms to implement dynamic mapping operations
US6779095B2 (en) * 2000-06-19 2004-08-17 Storage Technology Corporation Apparatus and method for instant copy of data using pointers to new and original data in a data location
US6779094B2 (en) * 2000-06-19 2004-08-17 Storage Technology Corporation Apparatus and method for instant copy of data by writing new data to an additional physical storage area
US6557089B1 (en) 2000-11-28 2003-04-29 International Business Machines Corporation Backup by ID-suppressed instant virtual copy then physical backup copy with ID reintroduced
US6662281B2 (en) 2001-01-31 2003-12-09 Hewlett-Packard Development Company, L.P. Redundant backup device
US6957291B2 (en) 2001-03-29 2005-10-18 Quantum Corporation Removable disk storage array emulating tape library having backup and archive capability
US6728848B2 (en) 2001-06-11 2004-04-27 Hitachi, Ltd. Method and system for backing up storage system data
TW542971B (en) * 2001-07-05 2003-07-21 Penbex Data Systems Inc Automatic data backup system and method for portable electronic device
GB0116686D0 (en) 2001-07-07 2001-08-29 Hewlett Packard Co Data backup
US20030018657A1 (en) 2001-07-18 2003-01-23 Imation Corp. Backup of data on a network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5241670A (en) * 1992-04-20 1993-08-31 International Business Machines Corporation Method and system for automated backup copy ordering in a time zero backup copy session
US6061770A (en) * 1997-11-04 2000-05-09 Adaptec, Inc. System and method for real-time data backup using snapshot copying with selective compaction of backup data
US6131148A (en) * 1998-01-26 2000-10-10 International Business Machines Corporation Snapshot copy of a secondary volume of a PPRC pair

Also Published As

Publication number Publication date
US20030115432A1 (en) 2003-06-19
AU2002359710A1 (en) 2003-06-30
US6948039B2 (en) 2005-09-20

Similar Documents

Publication Publication Date Title
US6948039B2 (en) Data backup and restoration using dynamic virtual storage
US7185169B2 (en) Virtual physical drives
US20040088513A1 (en) Controller for partition-level security and backup
US7844855B2 (en) Stored memory recovery system
JP5208368B2 (en) System and method for automatically backing up a file as a generation file using the file system
US7269743B2 (en) Method and apparatus for secure data mirroring a storage system
US7069393B2 (en) Storage system providing file aware caching and file aware remote copy
US6671820B1 (en) System and method for the prevention of corruption of networked storage devices during backup data recovery
US7725940B2 (en) Operation management system for a diskless computer
JP4832862B2 (en) Disk array system and security method
US20070022259A1 (en) Write protection in a storage system allowing both file-level access and volume-level access
US7818533B2 (en) Storing location identifier in array and array pointer in data structure for write process management
US7370165B2 (en) Apparatus and method for protecting data recording on a storage medium
US7814338B2 (en) System and method for virtual tape management with creation and management options
US6282584B1 (en) Structure and method for reading/writing signature commands from/to a plurality of controller pairs
US20060277353A1 (en) Virtual tape library device, virtual tape library system, and method for writing data to a virtual tape
US9971532B2 (en) GUID partition table based hidden data store system
US7266657B2 (en) Data protection device and method of securing data
CA2454107C (en) Apparatus and method for protecting data recorded on a storage medium
EP1410139B1 (en) Method for protecting data recorded on a storage medium

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP