Method and apparatus for accessing remote storage in a distributed storage cluster architecture
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
G06F-012/00
출원번호
US-0753221
(2000-12-29)
발명자
/ 주소
Coates, Joshua L.
Bozeman, Patrick E.
Patterson, David A.
출원인 / 주소
Intel Corporation
인용정보
피인용 횟수 :
143인용 특허 :
31
초록▼
A network storage system includes a virtual file system (“VFS”) that manages the files of the network storage system, and a storage center that stores the files. The VFS and the storage center are separated, such that a client accesses the VFS to conduct file system operations and the client accesse
A network storage system includes a virtual file system (“VFS”) that manages the files of the network storage system, and a storage center that stores the files. The VFS and the storage center are separated, such that a client accesses the VFS to conduct file system operations and the client accesses the storage center to upload/download files. The client accesses the network storage system through one or more storage ports. The storage center includes a plurality of distributed object storage managers (DOSMS) and a storage cluster that includes a plurality of intelligent storage nodes. The network storage system includes additional storage centers at geographically disparate locations. The network storage system uses a multi-cast protocol to maintain file information at the DOSMs regarding files stored in the intelligent storage nodes, including files stored in disparate storage centers.
대표청구항▼
1. A method comprising:determining by a selected one of a plurality of control nodes, whether a client request to access an object is authentic, the determining being based upon whether a first certificate matches a second certificate, the first certificate being obtained from the client request, th
1. A method comprising:determining by a selected one of a plurality of control nodes, whether a client request to access an object is authentic, the determining being based upon whether a first certificate matches a second certificate, the first certificate being obtained from the client request, the second certificate being calculated based upon an encoded request from the client request; if the selected one of the plurality of control nodes determines that the client request is authentic, determining, by the selected one of the plurality of control nodes, one of a plurality of storage nodes in which the object is located; and retrieving the object from the one of the plurality of storage nodes. 2. The method of claim 1, wherein:the second certificate is based upon a first calculation and a second calculation, the first calculation comprising hashing an object fingerprint and a key to yield a first result, the second calculation yielding the second certificate and comprising hashing the first result and the key. 3. The method of claim 2, further comprising:generating, based upon the client request, the first certificate and the object fingerprint. 4. The method of claim 1, wherein:the selected one of the plurality of control nodes is selected by a level four switch. 5. The method of claim 4, wherein:the level four switch selects the selected one of the plurality of control nodes based on availability of the selected one of the plurality of control nodes to retrieve the object. 6. The method of claim 2, wherein:the object fingerprint identifies the object. 7. The method of claim 1, wherein:the determining of the one of the plurality of storage nodes is based upon examination by the selected one of the plurality of control nodes of a file table at the one of the plurality of control nodes. 8. The method of claim 7, further comprising:broadcasting by the selected one of the control nodes a broadcast request for the object to the plurality of storage nodes. 9. An apparatus comprising:a selected one of a plurality of control nodes to determine whether a client request to access an object is authentic, based upon whether a first certificate matches a second certificate, the first certificate being obtained from the client request, the second certificate being calculated based upon an encoded request from the client request; and the selected one of the plurality of control nodes being capable of, if the selected one of the plurality of control nodes determines that the client request is authentic, determining one of a plurality of storage nodes in which the object is located, and retrieving the object from the one of the plurality of storage nodes. 10. The apparatus of claim 9, wherein:the second certificate is based upon a first calculation and a second calculation, the first calculation comprising hashing an object fingerprint and a key to yield a first result, the second calculation yielding the second certificate and comprising hashing the first result and the key. 11. The apparatus of claim 10, wherein:the selected one of the plurality of control nodes is capable of generating, based upon the client request, the first certificate and the object fingerprint. 12. The apparatus of claim 10, wherein:the object fingerprint identifies the object. 13. The apparatus of claim 9, further comprising:a level four switch to select the selected one of the plurality of control nodes. 14. The apparatus of claim 13, wherein:the level four switch is capable of selecting the selected one of the plurality of control nodes based on availability of the selected one of the plurality of control nodes to retrieve the object. 15. The apparatus of claim 9, wherein:the selected one of the plurality of control nodes is capable of determining the one of the plurality of storage nodes based upon examination by the selected one of the plurality of control nodes of a file table at the one of the plurality of control nodes. 16. The apparatus of claim 15, wherein:the selected one of the control nodes is capable of broadcasting a broadcast request for the object to the plurality of storage nodes.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (31)
Thomas Alan Gall ; Jeffery David Haumont, Computer system and method for sharing a job with other computers on a computer network using IP multicast.
Kern Robert Frederic ; Paulsen Michael Aloysius ; Shepard William Chambers ; Yudenfriend Harry Morris, Concurrent switch to shadowed device for storage controller and device errors.
Chow Kit M. ; Meyer Michael W. ; Muller P. Keith ; Adamson Alan P., Dynamic and consistent naming of fabric attached storage by a file system on a compute node storing information mapping API system I/O calls for data objects with a globally unique identification.
Xu Yikang ; Vahalia Uresh K. ; Jiang Xiaoye ; Gupta Uday ; Tzelnic Percy, File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems.
Tysen Atticus N. (San Francisco CA) Sidhu Gursharan (Menlo Park CA) Chang C. Victor (Fremont CA) Calamera Pablo (San Jose CA), Message protection mechanism and graphical user interface therefor.
Iskiyan James Lincoln (Tucson AZ) Kern Robert Frederic (Tucson AZ) Micka William Frank (Tucson AZ) Shomler Robert Wesley (Morgan Hill CA), Method and apparatus for suspending multiple duplex pairs during back up processing to insure storage devices remain syn.
Isaak, James DeWitt, Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority.
Tzelnic Percy ; Vahalia Uresh K ; Ting Dennis P.J. ; Gupta Uday, Network file server using a cached disk array storing a network file directory including file locking information and da.
Asano Shigehiro,JPX ; Kanai Tatsunori,JPX ; Kanno Shinichi,JPX ; Maeda Seiji,JPX, Network server device and file management system using cache associated with network interface processors for redirecting requested information between connection networks.
Beardsley Brent Cameron ; Iskiyan James Lincoln ; Micka William Frank ; Yudenfriend Harry Morris, Peer-to-peer backup system with failure-triggered device switching honoring reservation of primary device.
Popelka Paul ; Tripathy Tarun Kumar ; Walter Richard Allen ; Del Fante Paul Brian ; Repakula Murali Sundaramoorthy ; Narayanaswamy Lakshman ; Sterk Donald Wayne ; Bodas Amod Prabhakar ; McCutcheon Le, Processing system with dynamically allocatable buffer memory.
Heil Thomas F. ; Francis Martin H. ; DeKoning Rodney A. ; Weber Bret S., System and method for peer-to-peer accelerated I/O shipping between host bus adapters in clustered computer network.
Eschelbeck, Gerhard; Villa, Andrea, System and method for providing trustworthy network security concern communication in an active security management environment.
Dawson, Colin Scott; Kissel, Erick Christian; Morton, David Michael; Scheid, III, William J., Apparatus, system, and method for data access management.
Byers, Brandon Patrick; Chatley, Scott Philip; Phan, Thanh Trac; Gallagher, J. Gabriel; Pistek, Peter Jan, Client application program interface for network-attached storage system.
Balasubramanian, Shankar; Degwekar, Anil; Ramachandran, Srinivasan; Raj, Anand; Visweswaraiah, Deepak, Cloud enabled filesystems provided by an agent which interfaces with a file system on a data source device.
Volini, Phillip; Werneke, John Raymond; Schumaler, Carl; Smith, Michael; Giannantonio, Frank; Iaia, Vito; Moriarty, Sean, Controlled token distribution to protect against malicious data and resource access.
Hori, Yoshihiro; Tada, Kenichiro; Hirai, Tatsuya; Tsuru, Masafumi; Hasebe, Takayuki, Data storage device capable of storing multiple sets of history information on input/output processing of security data without duplication.
Lev Ran, Etai; Glixman, Shahar; Ben Shaul, Israel Z.; Bortnikov, Vita; Kaminsky, Daniel; Ben Kiki, Danit; Zach, Idan; Cidon, Israel, Double-proxy remote data access system.
Enko, Yutaka; Iwasaki, Masaaki; Nakatani, Yoji, File storage service system, file management device, file management method, ID denotative NAS server and file reading method.
Enko, Yutaka; Iwasaki, Masaaki; Nakatani, Yoji, File storage service system, file management device, file management method, ID denotative NAS server and file reading method.
Enko,Yutaka; Iwasaki,Masaaki; Nakatani,Yoji, File storage service system, file management device, file management method, ID denotative NAS server and file reading method.
Yoshimine,Takao; Tsutsui,Mototsugu; Sueyoshi,Takahiko; Nakamura,Toshinori; Hanaya,Hiroyuki; Uchiyama,Nobuyuki, Information processing device, server connection method, program storage medium, and network system.
Douceur, John R.; Theimer, Marvin M.; Adya, Atul; Bolosky, William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur, John R.; Theimer, Marvin M.; Adya, Atul; Bolosky, William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Douceur,John R.; Theimer,Marvin M.; Adya,Atul; Bolosky,William J., Locating potentially identical objects across multiple computers based on stochastic partitioning of workload.
Platt, Mark Jonathan; Pratt, Christopher Kent; Burns, Keith Roger; Omberg, Erik James, Method and system for restoring information from backup storage media.
Zhang, Yaoxue; Xu, Guangbin; Kuang, Wenyuan; Zhou, Yuezhi, Method for transferring data between terminal apparatuses in a transparent computation system.
Boutboul, Irwin; Kim, Moon J.; Meliksetian, Dikran; Oesterlin, Robert G.; Ravinsky, Jr., Anthony, Method, system and program product for storing downloadable content on a plurality of enterprise storage system (ESS) cells.
Boutboul, Irwin; Kim, Moon J.; Meliksetian, Dikran; Oesterlin, Robert G.; Ravinsky, Jr., Anthony, Method, system and program product for storing downloadable content on a plurality of enterprise storage system (ESS) cells.
Coates,Joshua L.; Bozeman,Patrick E.; Gautier,Taylor, Methods and apparatus for off loading content servers through direct file transfer from a storage center to an end-user.
Denker, Dennis A.; Lew, Raymond Yung-Chien; Hsu, Debbie, Methods and systems for computer aided event and venue setup and modeling and interactive maps.
Haridas, Ganesh; Narasimman, Sundar; Suriyanarayanan, Karthik; A S, Gunassekaran; Klose, Michael Frank, Monitoring, diagnosing, and repairing a management database in a data storage management system.
Haridas, Ganesh; Narasimman, Sundar; Suriyanarayanan, Karthik; A S, Gunassekaran; Klose, Michael Frank, Monitoring, diagnosing, and repairing a management database in a data storage management system.
Black, Bryan; Roersma, Jacob S.; Boelens, Jared; Knol, Luke; Dunbar, Neil; Lange, Sig; Swanson, Wylie, Policy based processing of content objects in a content delivery network using mutators.
Mayo, Robert N.; Ranganathan, Parthasarathy; Stets, Jr., Robert J.; Wallach, Deborah A., Priority analysis of access transactions in an information system.
Pendlebury, Kenneth C.; Pratt, Christopher K.; Jones, Terence C.; Omberg, Erik J.; Marsh, John A.; Reese, Christopher D., System and method for creating a de-duplicated data set.
Crafford, Chris; Gomes, Robert; Brooks, Alan Royce; Overton, Jeffrey Mark, System and method for management of retention periods for content in a computing system.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device identifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device identifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device identifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device indentifiers to enhance security.
Fujiwara, Shinji; Sagawa, Nobutoshi; Uemura, Tetsuya; Odawara, Hiroaki, System and method for virtualizing a distributed network storage as a single-view file system.
Shetty, Sachin; Sankar, Krishna; Jassal, Amrit; Patel, Kalpesh; Sharma, Shishir, System and method of implementing an object storage infrastructure for cloud-based services.
Prahlad, Anand; Kavuri, Srinivas; Madeira, Andre Duque; Lunde, Norman R.; Bunte, Alan G.; May, Andreas; Schwartz, Jeremy Alan, Systems and methods for storage modeling and costing.
Prahlad, Anand; Kavuri, Srinivas; Madeira, Andre Duque; Lunde, Norman R.; Bunte, Alan G.; May, Andreas; Schwartz, Jeremy Alan, Systems and methods for storage modeling and costing.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, Systems and methods for using unique device identifiers to enhance security.
Campbell, Eric; Hoffman, Robert F; Maloney, Jr., Robert; Lemanis, Maris N; Mintzer, Andrew, Transfer client of a secure system for unattended remote file and message transfer.
Campbell, Eric; Hoffman, Robert F; Maloney, Jr., Robert; Lemanis, Maris N, Transfer server of a secure system for unattended remote file and message transfer.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.