Method and system for maintaining data in a continuous data protection system
First Claim
Patent Images
1. A method for providing continuous data protection, the method comprising the steps of:
- writing data to a primary volume;
duplicating the writes made to the primary volume to a second volume in a sequential fashion, wherein the secondary volume contains a chronological ordering of all writes made to the primary volume; and
identifying any point in time (APTI) window wherein all writes to the secondary volume are maintained so that within the identified APIT window, the primary volume may be restored to any previous point within the APIT window;
creating a block-ordered mapping data structure to track changes in the data written to the secondary volume between two points in time; and
merging the mapping data structures that protect contiguous points in time, whereby fewer mapping data structures are needed to protect the data between the same two points in time spanning the merged mapping data structures.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system where data is maintained in a continuous data protection system is disclosed. A primary volume may be protected according to an any-point-in-time (APIT) window wherein restores may be performed at any time as desired. The APIT window may be of any time duration as desired. Outside of the APIT window, a retention policy for phasing out data may be established as desired.
-
Citations
33 Claims
-
1. A method for providing continuous data protection, the method comprising the steps of:
-
writing data to a primary volume; duplicating the writes made to the primary volume to a second volume in a sequential fashion, wherein the secondary volume contains a chronological ordering of all writes made to the primary volume; and identifying any point in time (APTI) window wherein all writes to the secondary volume are maintained so that within the identified APIT window, the primary volume may be restored to any previous point within the APIT window; creating a block-ordered mapping data structure to track changes in the data written to the secondary volume between two points in time; and merging the mapping data structures that protect contiguous points in time, whereby fewer mapping data structures are needed to protect the data between the same two points in time spanning the merged mapping data structures. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for operating a data protection system for a protected computer system, the method comprising the steps of:
-
tracking writes made to a primary volume; duplicating the writes to the primary volume in a sequential fashion on a secondary volume, wherein the secondary volume contains a chronological ordering of all writes made to the primary volume; organizing a mapping of the writes between the primary volume and the secondary volume into block-ordered data structures, wherein the data structures enable the primary volume to be restored at any point in time; identifying any point in time window wherein the data structures are maintained so that within the identified time window, the primary volume may be restored at any point within the time window; and merging the data structures that protect contiguous points in time, whereby fewer data structures are needed to protect the data between the same two points in time spanning the merged data structures. - View Dependent Claims (10, 11, 12)
-
-
13. A system for providing continuous data protection, the system comprising:
-
a host computer; a primary volume for storing data written by the host computer; a secondary volume wherein writes made to the primary volume are sequentially duplicated onto the secondary volume, the secondary volume containing a chronological ordering of all writes made to the primary volume; and a data protection system configured to; manage the duplication of writes to the secondary volume; map data between the primary volume and the secondary volume using block-ordered data structures, wherein the data structures are maintained so that within an established time window, the primary volume may be restored to any point within the time window; and merge the data structures that protect contiguous points in time, whereby fewer data structures are needed to protect the data between the same two points in time spanning the merged data structures. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer-readable storage medium containing a set of instructions for a general purpose computer, the set of instructions comprising:
-
a tracking code segment for tracking writes made to a primary volume; a duplicating code segment for duplicating the writes to the primary volume in a sequential fashion on a secondary volume, wherein the secondary volume contains a chronological ordering of all writes made to the primary volume; an organizing code segment for organizing a mapping of the writes between the primary volume and the secondary volume into block-ordered data structures, wherein the data structures enable the primary volume to be restored to any point in time; an identifying code segment for identifying any point in time window wherein the data structures are maintained so that within the identified time window, the primary volume may be restored to any point within the time window; and a merging code segment for merging the data structures that protect contiguous points in time, whereby fewer data structures are needed to protect the data between the same two points in time spanning the merged data structures.
-
-
19. A method for enabling data recovery from a primary volume in a contiguous data protection system, comprising the steps of:
-
creating an initial copy of the primary volume; after the initial copy is made, duplicating each write to the primary volume to a write log to be stored on a secondary volume, the write log being written to the secondary volume when the write log is full, wherein the secondary volume contains a chronological ordering of all writes made to the primary volume; creating a snapshot of the primary volume, the snapshot being a point in time to which the primary volume can be stored; creating a block-ordered data structure to track the writes made to the secondary volume, the data structure being derived from the write log and containing the writes made to the primary volume between two points in time; and merging the data structures that protect contiguous points in time, whereby fewer data structures are needed to protect the data between the same two points in time spanning the merged data structures. - View Dependent Claims (20, 21)
-
-
22. A method for providing continuous data protection, comprising the steps of:
-
writing data to a primary volume; duplicating the writes made to the primary volume to a secondary volume in a sequential fashion, wherein the secondary volume contains a time-based ordering of all writes made to the primary volume; identifying an any point in time (APIT) window wherein all writes to the secondary volume are maintained so that within the identified APIT window, the primary volume may be restored to any point within the APIT window; mapping the writes between the primary volume and secondary volume using a data structure; and merging data structures that protect contiguous points in time, whereby fewer data structures are needed to protect the data between the same two points in time spanning the merged data structures. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A currently implemented method for continuously protecting data stored on a volume of a storage system, comprising:
-
writing data to a primary volume in a block-based order; duplicating the data to a write log in a sequential order;
creating a block-ordered mapping data structure from the write log, the block-ordered mapping data structure stored on a secondary volume and used to track changed in the data between two points in time, whereby the data is continuously protected; andmerging the mapping data structures that protect contiguous points in time, whereby fewer mapping data structure are needed to protect the data between the same two points in time spanning the merged mapping data structures. - View Dependent Claims (31, 32, 33)
-
Specification