×

System and method for ensuring write data integrity in a redundant array data storage system

  • US 5,379,417 A
  • Filed: 11/25/1991
  • Issued: 01/03/1995
  • Est. Priority Date: 11/25/1991
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for ensuring the completion and integrity of data modification operations to a redundant data storage array subsystem, comprising:

  • a. a first host processor configured to initiate data modification operations for data records and to generate host check point information about said data modification operations;

    b. a second host processor, coupled to the first host processor, to receive the host check point information and assume control of initiated data modification operations if the first host processor fails;

    c. first and second buffers, coupled to the first and second host processors, each buffer having sufficient capacity for receiving and storing entire generated data modification operations from the first or second host processor, whereby subsequent failure of either host processor does not affect the received data modification operations;

    d. a redundant array of data storage devices coupled to both the first and second buffers for storing data records as indicated by said data modification operations originating from either host processor;

    e. a first array processor, coupled to the first buffer and to the redundant array of data storage devices to receive data modification operations transmitted to the controller from the first buffer, the array processor being configured to control the completion of the data modification operations to the redundant array of data storage devices, and to generate array check point information about said data modification operations; and

    f. a second array processor, coupled to the second buffer, to the redundant array of data storage devices, and to the first array processor, the second array processor being configured to receive data modification operations from the second buffer, the array check point information generated by the first array processor, and to assume control of the completion of the data modification operations to the redundant array of data storage devices if the first array processor fails.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×