IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0324428
(2008-11-26)
|
등록번호 |
US-8315992
(2012-11-20)
|
발명자
/ 주소 |
- Gipp, Stephan Kurt
- Park, Adonijah
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
29 인용 특허 :
6 |
초록
▼
A method, apparatus, and computer program product for implementing affinity based allocation for storage implementations employing deduplicated data stores is disclosed. According to an embodiment of the present invention, a backup manager determines if information associating a data source with a f
A method, apparatus, and computer program product for implementing affinity based allocation for storage implementations employing deduplicated data stores is disclosed. According to an embodiment of the present invention, a backup manager determines if information associating a data source with a first data target of a plurality of data targets has been established. The first data target is a deduplication data store and the information associating the data source with the first data target indicates an increased likelihood of at least some information stored on the data source is already being stored on the first data target prior to performing a backup. If information associating the data source with the first data target has been established, the backup manager stores a set of data on the data target.
대표청구항
▼
1. A method comprising: in response to identifying initiation of a backup of a data source, accessing an affinity database to determine whether an affinity relationship has been established between the data source and a first data target of a plurality of data targets, wherein the first data target
1. A method comprising: in response to identifying initiation of a backup of a data source, accessing an affinity database to determine whether an affinity relationship has been established between the data source and a first data target of a plurality of data targets, wherein the first data target is a deduplication data store, andthe affinity relationship indicates a likelihood that at least some information stored on the data source is already being stored on the first data target prior to performing the backup of the data source;in response to determining that the affinity relationship has been established, assigning the first data target to the data source to complete the backup; andperforming the backup of the data source to the first data target, wherein the performing the backup copies a set of data stored on the data source to the first data target. 2. The method of claim 1, wherein the affinity database does not contain any information associating a second data source with any of the plurality of data targets, and further comprising: selecting a second data target of the plurality of data targets;storing a second set of data generated by the second data source on the second data target; andgenerating information associating the second data source with the second data target. 3. The method of claim 1, wherein the affinity relationship further comprises: a set of one or more classification criteria; anda numerical value representing a strength of association between the data source and the first data target. 4. The method of claim 3, wherein the set of classification criteria further comprises: information identifying a client associated with the data source;information identifying a backup policy associated with the data source;information identifying a backup schedule associated with the data source; andinformation identifying a type of backup associated with the data source. 5. The method of claim 3, wherein the set of classification criteria further comprises: information identifying the first data target. 6. The method of claim 3, wherein the set of classification criteria further comprises: information identifying an operating system associated with the data source. 7. The method of claim 3, further comprising: receiving information indicating the set of one or more classification criteria from a system administrator; andstoring the set of one or more classification criteria. 8. The method of claim 3, further comprising: incrementing the numerical value based on a size of the set of data stored on the data source; anddecrementing the numerical value based on a size of an image deleted from the data source. 9. The method of claim 1, further comprising: in response to determining that the first data target cannot be accessed, selecting a third data target of the plurality of data targets;storing the set of data on the third data target; andgenerating information associating the data source with the third data target. 10. A system comprising: one or more processors; anda memory coupled to the one or more processors, wherein the memory stores program instructions executable by the one or more processors to:access an affinity database, to determine whether an affinity relationship has been established between a data source and a first data target of the plurality of data targets, in response to identifying initiation of a backup of the data source, wherein the first data target is a deduplication data store, andthe affinity relationship indicates a likelihood that at least some information stored on the data source is already being stored on the first data target prior to performing the backup of the data source;assign the first data target to the data source to complete the backup, in response to determining that the affinity relationship has been established; andperform the backup of the data source to the first data target, wherein the backup copies a set of data stored on the data source to the first data target. 11. A computer program product comprising: a plurality of instructions, comprisinga first set of instructions, executable on a computer system, to access an affinity database, to determine whether an affinity relationship has been established between a data source and a first data target of a plurality of data targets, in response to identifying initiation of a backup of the data source, wherein the first data target is a deduplication data store, andthe affinity relationship indicates a likelihood that at least some information stored on the data source is already being stored on the first data target prior to performing the backup of the data source;a second set of instructions, executable on the computer system, to assign the first data target to the data source to complete the backup, in response to determining that the affinity relationship has been established; anda third set of instructions, executable on the computer system, to perform the backup of the data source to the first data target, wherein the backup copies a set of data from the data source to the first data target; andnon-transitory computer readable storage media, wherein the instructions are encoded in the non-transitory computer readable storage media. 12. The computer program product of claim 11, wherein the affinity database does not contain any information associating a second data source with any of the plurality of data targets, and the instructions further comprise: a fourth set of instructions, executable on the computer system, to select a second data target of the plurality of data targets;a fifth set of instructions, executable on the computer system, to store a second set of data generated by the second data source on the second data target; anda sixth set of instructions, executable on the computer system, to generate information associating the second data source and the second data target. 13. The computer program product of claim 11, wherein the affinity database further comprises: a set of one or more classification criteria; anda numerical value representing a strength of association between the data source and the first data target. 14. The computer program product of claim 13, wherein the set of classification criteria further comprises: information identifying a client associated with the data source;information identifying a backup policy associated with the data source;information identifying a backup schedule associated with the data source; andinformation identifying a type of backup associated with the data source. 15. The computer program product of claim 13, wherein the set of classification criteria further comprises: information identifying the first data target. 16. The computer program product of claim 13, wherein the set of classification criteria further comprises: information identifying an operating system associated with the data source. 17. The computer program product of claim 13, wherein the instructions further comprise: a seventh set of instructions, executable on the computer system, to receive information indicating the set of one or more classification criteria from a system administrator; andan eighth set of instructions, executable on the computer system, to store the set of one or more classification criteria. 18. The computer program product of claim 13, wherein the instructions further comprise: a ninth set of instructions, executable on the computer system, to increment the numerical value based on a size of the set of data stored on the data source; anda tenth set of instructions, executable on the computer system, to decrement the numerical value based on a size of an image deleted from the data source. 19. The computer program product of claim 11, wherein the instructions further comprise: an eleventh set of instructions, executable on the computer system, to select a third data target of the plurality of data targets, in response to determining that the first data target cannot be accessed;a twelfth set of instructions, executable on the computer system, to store the set of data on the third data target; anda thirteenth set of instructions, executable on the computer system, to generate information associating the data source and the third data target.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.