Standard and non-standard dispersed storage network data access
First Claim
1. A method comprises:
- determining, by a computing device of a dispersed storage network (DSN), whether to utilize a non-standard DSN data accessing protocol or a standard DSN data accessing protocol to access data from the DSN, wherein the data is dispersed storage error encoded into one or more sets of encoded data slices and wherein the one or more sets of encoded data slices are stored in a set of storage units of the DSN;
when the computing device determines to use the non-standard DSN data accessing protocol;
generating, by the computing device, a set of non-standard data access requests regarding the data, wherein a non-standard data access request of the set of non-standard data access requests includes a network identifier of a storage unit of the set of storage units, a data identifier corresponding to the data, and a data access function;
sending, by the computing device, the set of non-standard data access requests to at least some storage units of the set of storage units, which includes the storage unit;
converting, by the storage unit, the non-standard data access request into one or more DSN slice names;
determining, by the storage unit, that the one or more DSN slice names are within a slice name range allocated to the storage unit; and
when the one or more DSN slice names are within the slice name range, executing, by the storage unit, the data access function regarding one or more encoded data slices corresponding to the one or more DSN slice names.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes determining, by a computing device of a dispersed storage network (DSN), whether to utilize a non-standard DSN data accessing protocol or a standard DSN data accessing protocol to access data from the DSN. When the computing device determines to use the non-standard DSN data accessing protocol, the method further includes generating a set of non-standard data access requests. The method further includes sending the set of non-standard data access requests to storage units. The method further includes converting, by a storage unit, the non-standard data access request into one or more DSN slice names. The method further includes determining, by the storage unit, that the one or more DSN slice names are within a slice name range. When the one or more DSN slice names are within the slice name range, the method further includes executing, by the storage unit, the data access function.
82 Citations
14 Claims
-
1. A method comprises:
-
determining, by a computing device of a dispersed storage network (DSN), whether to utilize a non-standard DSN data accessing protocol or a standard DSN data accessing protocol to access data from the DSN, wherein the data is dispersed storage error encoded into one or more sets of encoded data slices and wherein the one or more sets of encoded data slices are stored in a set of storage units of the DSN; when the computing device determines to use the non-standard DSN data accessing protocol; generating, by the computing device, a set of non-standard data access requests regarding the data, wherein a non-standard data access request of the set of non-standard data access requests includes a network identifier of a storage unit of the set of storage units, a data identifier corresponding to the data, and a data access function; sending, by the computing device, the set of non-standard data access requests to at least some storage units of the set of storage units, which includes the storage unit; converting, by the storage unit, the non-standard data access request into one or more DSN slice names; determining, by the storage unit, that the one or more DSN slice names are within a slice name range allocated to the storage unit; and when the one or more DSN slice names are within the slice name range, executing, by the storage unit, the data access function regarding one or more encoded data slices corresponding to the one or more DSN slice names. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable memory comprises:
-
a first memory element that stores operational instructions that, when executed by a computing device of a dispersed storage network (DSN), causes the computing device to; determine whether to utilize a non-standard DSN data accessing protocol or a standard DSN data accessing protocol to access data from the DSN, wherein the data is dispersed storage error encoded into one or more sets of encoded data slices and wherein the one or more sets of encoded data slices are stored in a set of storage units of the DSN; when the computing device determines to use the non-standard DSN data accessing protocol; generate a set of non-standard data access requests regarding the data, wherein a non-standard data access request of the set of non-standard data access requests includes a network identifier of a storage unit of the set of storage units, a data identifier corresponding to the data, and a data access function; and send the set of non-standard data access requests to at least some storage units of the set of storage units, which includes the storage unit; and a second memory element that stores operational instructions that, when executed by a storage unit of the set of storage units, causes the storage unit to; convert the non-standard data access request into one or more DSN slice names; determine that the one or more DSN slice names are within a slice name range allocated to the storage unit; and when the one or more DSN slice names are within the slice name range, execute the data access function regarding one or more encoded data slices corresponding to the one or more DSN slice names. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification