Erasure coded storage aggregation in data centers
First Claim
1. One or more device memories storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
- selecting, by one or more processors configured with executable instructions, a first plurality of nodes of at least one data center to store a data file as a first set of erasure coded fragments;
storing the data file as the first set of erasure coded fragments in the first plurality of nodes of the at least one data center;
monitoring, during a first time period, a first access frequency of the data file that is stored as the first set of erasure coded fragments;
determining that the first access frequency of the data file meets or exceeds a first predetermined frequency threshold during the first time period or after the first time period expires;
reconstructing the data file from at least a portion of the first set of erasure coded fragments after determining that the first access frequency of the data file meets or exceeds the first predetermined frequency threshold;
storing the reconstructed data file in a storage node;
monitoring, during a second time period, a second access frequency of the reconstructed data file that is stored in the storage node;
determining that the second access frequency of the reconstructed data file is below a second predetermined frequency threshold during the second time period or after the second time period expires;
selecting a second plurality of nodes to store the reconstructed data file as a second set of erasure coded fragments, wherein the second plurality of nodes is different than the first plurality of nodes; and
storing the reconstructed data file as the second set of erasure coded fragments in the second plurality of nodes after determining that the second access frequency of the reconstructed data file is below the second predetermined frequency threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of erasure coded storage aggregation are disclosed. The erasure coded storage aggregation includes storing a data file as erasure coded fragments in a plurality of nodes of one or more data centers. The erasure coded storage aggregation further includes monitoring an access frequency of the data file. Based on the comparison between the access frequency and a predetermined threshold, the data file is either reconstructed from the erasure coded fragments and stored in a storage node or retained as erasure coded fragments in the plurality of nodes of the one or more data centers.
-
Citations
20 Claims
-
1. One or more device memories storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
-
selecting, by one or more processors configured with executable instructions, a first plurality of nodes of at least one data center to store a data file as a first set of erasure coded fragments; storing the data file as the first set of erasure coded fragments in the first plurality of nodes of the at least one data center; monitoring, during a first time period, a first access frequency of the data file that is stored as the first set of erasure coded fragments; determining that the first access frequency of the data file meets or exceeds a first predetermined frequency threshold during the first time period or after the first time period expires; reconstructing the data file from at least a portion of the first set of erasure coded fragments after determining that the first access frequency of the data file meets or exceeds the first predetermined frequency threshold; storing the reconstructed data file in a storage node; monitoring, during a second time period, a second access frequency of the reconstructed data file that is stored in the storage node; determining that the second access frequency of the reconstructed data file is below a second predetermined frequency threshold during the second time period or after the second time period expires; selecting a second plurality of nodes to store the reconstructed data file as a second set of erasure coded fragments, wherein the second plurality of nodes is different than the first plurality of nodes; and storing the reconstructed data file as the second set of erasure coded fragments in the second plurality of nodes after determining that the second access frequency of the reconstructed data file is below the second predetermined frequency threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 18, 19)
-
-
9. A method comprising:
-
selecting, by one or more processors configured with executable instructions, a first plurality of nodes of at least one data center to store a data file as a first set of erasure coded fragments; storing the data file as the first set of erasure coded fragments in the first plurality of nodes of the at least one data center; monitoring, during a first time period, a first access frequency of the data file that is stored as the first set of erasure coded fragments;
determining that the first access frequency of the data file meets or exceeds a first predetermined frequency threshold during the first time period or after the first time period expires;reconstructing the data file from at least a portion of the first set of erasure coded fragments after determining that the first access frequency of the data file meets or exceeds the first predetermined frequency threshold; storing the reconstructed data file in a storage node; monitoring, during a second time period, a second access frequency of the reconstructed data file that is stored in the storage node;
determining that the second access frequency of the reconstructed data file is below a second predetermined frequency threshold during the second time period or after the second time period expires;selecting a second plurality of nodes to store the reconstructed data file as a second set of erasure coded fragments, wherein the second plurality of nodes is different than the first plurality of nodes; and storing the reconstructed data file as the second set of erasure coded fragments in the second plurality of nodes after determining that the second access frequency of the reconstructed data file is below the second predetermined frequency threshold. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 20)
-
Specification