Log Access Method Storage Control Apparatus, Archive System, and Method of Operation
First Claim
1. A Log Access Method Storage Control Apparatus comprising:
- a storage controller communicatively coupled to an external client; and
a plurality of shard location and client subscription tables.
9 Assignments
0 Petitions
Accused Products
Abstract
A file shard store includes high performance encoding and compaction circuits. An apparatus and its method of operation avoids duplicate storage of file fragments. A plurality of tables control write operations into a plurality of log segments. Shard keys are transferred to uniquely identify fragments of files which may have been previously stored and associated with one or more of client subscribers. An apparatus comprises a plurality of location/subscription tables, a shard transfer circuit, a storage control circuit, an append-to-log circuit coupled to a large storage array, and a log segment compactor circuit.
58 Citations
17 Claims
-
1. A Log Access Method Storage Control Apparatus comprising:
-
a storage controller communicatively coupled to an external client; and a plurality of shard location and client subscription tables. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for operating an Log Access Method Storage Control Apparatus comprising:
-
receiving a get command from a client with one or more shard key, obtaining a location for each requested shard from a computer readable table, and delivering the shard(s) to the requesting client. - View Dependent Claims (8)
-
-
9. A method for operating a Log Access Method Storage Control Apparatus comprising:
-
receiving a shard key from a transmitting client, and sending the transmitting client at least one first code. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for operating a Log Access Method Storage Control Apparatus comprising:
-
receiving a command and an argument from a transmitting client, when the command is Exists and the argument is a shard key, reading a table for presence or absence of the shard key and returning the result to the transmitting client;
when the command is Unmark, and the argument is a shard key,removing the identity of the transmitting client front a log associated with a shard uniquely associated with the shard key. when the command is Mark, and the argument is a shard key, adding the identity of the transmitting client to a log associated with a shard uniquely associated with the shard key. when the command is Get, and the argument is a shard key, looking up the location of a shard uniquely associated with the shard key, and transmitting the shard to the transmitting client, when the command is Put, and the arguments comprise a shard and a shard key, storing the shard at a location, storing the shard key, the location, and an identification of the transmitting client into a table, and initializing a log file with at least the shard key and the identification of the transmitting client. - View Dependent Claims (15)
-
-
16. A method for reinitializing one of a plurality of shard locator and client subscription tables comprising:
reading a file containing shard meta data, client subscription, and location data associated with a log segment.
-
17. A method for restoration operation of a file stored in a log access method archive system, the method comprising:
-
receiving front a requestor a plurality of shard ids and client ids; looking up a shard location for each shard;
on a condition that the client is a subscriber to each of the shard ids,retrieving each requested shard; and transmitting the retrieved shard to the requestor.
-
Specification