×

System and method for highly reliable data replication

  • US 8,209,283 B1
  • Filed: 02/19/2009
  • Issued: 06/26/2012
  • Est. Priority Date: 02/19/2009
  • Status: Active Grant
First Claim
Patent Images

1. A reliable replication system comprising:

  • a processor configured to;

    generate replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device, wherein the replication data is included in a first container and wherein the first container is to be included in a second container associated with a reliable protocol;

    add additional verification information to at least a portion of the replication data included in the first container to prevent data corruption; and

    an interface coupled to the processor, configured to send the second container including the first container including the replication data with additional verification information over the communication channel to the destination replication device;

    wherein;

    the second container including the first container including the replication data with additional verification information is sent over the communication channel using the reliable protocol that allows at least a portion of the second container to be verified by the reliable protocol at the destination replication device;

    the reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel; and

    the additional verification information included in the first container includes information for verifying that replication data, included in the first container, sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol;

    wherein upon receipt by the destination replication device, the replication data is configured to be verified by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×