System and method for highly reliable data replication
First Claim
1. A reliable replication system comprising:
- a processor configured to;
generate replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device, wherein the replication data is included in a first container and wherein the first container is to be included in a second container associated with a reliable protocol;
add additional verification information to at least a portion of the replication data included in the first container to prevent data corruption; and
an interface coupled to the processor, configured to send the second container including the first container including the replication data with additional verification information over the communication channel to the destination replication device;
wherein;
the second container including the first container including the replication data with additional verification information is sent over the communication channel using the reliable protocol that allows at least a portion of the second container to be verified by the reliable protocol at the destination replication device;
the reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel; and
the additional verification information included in the first container includes information for verifying that replication data, included in the first container, sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol;
wherein upon receipt by the destination replication device, the replication data is configured to be verified by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol.
12 Assignments
0 Petitions
Accused Products
Abstract
Data replication includes generating replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device; adding additional verification information to at least a portion of the replication data to prevent data corruption; and sending the replication data and the additional verification information over the communication channel to the destination replication device. The replication data with additional verification information is sent over the communication channel using a reliable protocol that allows the replication data to be verified by the reliable protocol at the destination replication device. The reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel. The additional verification information includes information for verifying that replication data sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol.
-
Citations
19 Claims
-
1. A reliable replication system comprising:
-
a processor configured to; generate replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device, wherein the replication data is included in a first container and wherein the first container is to be included in a second container associated with a reliable protocol; add additional verification information to at least a portion of the replication data included in the first container to prevent data corruption; and an interface coupled to the processor, configured to send the second container including the first container including the replication data with additional verification information over the communication channel to the destination replication device;
wherein;the second container including the first container including the replication data with additional verification information is sent over the communication channel using the reliable protocol that allows at least a portion of the second container to be verified by the reliable protocol at the destination replication device; the reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel; and the additional verification information included in the first container includes information for verifying that replication data, included in the first container, sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol; wherein upon receipt by the destination replication device, the replication data is configured to be verified by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A data replication method comprising:
-
generating replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device, wherein the replication data is included in a first container and wherein the first container is to be included in a second container associated with a reliable protocol; adding additional verification information to at least a portion of the replication data included in the first container to prevent data corruption; and sending the second container including the first container including the replication data and the additional verification information over the communication channel to the destination replication device;
wherein;the second container including the first container including the replication data with additional verification information is sent over the communication channel using the reliable protocol that allows at least a portion of the second container to be verified by the reliable protocol at the destination replication device; the reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel; and the additional verification information included in the first container includes information for verifying that replication data, included in the first container, sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol; wherein upon receipt by the destination replication device, the replication data is configured to be verified by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for data replication, the computer program product being embodied in a computer readable storage medium and comprising computer instructions for:
-
generating replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device, wherein the replication data is included in a first container and wherein the first container is to be included in a second container associated with a reliable protocol; adding additional verification information to at least a portion of the replication data included in the first container to prevent data corruption; and sending the second container including the first container including the replication data and the additional verification information over the communication channel to the destination replication device;
wherein;the second container including the first container including the replication data with additional verification information is sent over the communication channel using the reliable protocol that allows at least a portion of the second container to be verified by the reliable protocol at the destination replication device; the reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel; and the additional verification information included in the first container includes information for verifying that replication data, included in the first container, sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol; wherein upon receipt by the destination replication device, the replication data is configured to be verified by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol.
-
Specification