System and method for highly reliable data replication
First Claim
1. A reliable replication system comprising:
- a processor configured to;
generate replication data, wherein the replication data corresponds to at least a part of file system data to be replicated on a destination replication device;
generate additional verification information based at least in part on at least a portion of the replication data;
include in a first container the replication data and the additional verification information;
include the first container in a second container associated with a reliable protocol; and
an interface coupled to the processor, configured to send the second container including the first container over a communication channel to the destination replication device, wherein the destination replication device is configured to verify the replication data, upon receipt, at least in part by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol, wherein a verification associated with the additional verification information is stronger than a verification associated with the reliable protocol.
12 Assignments
0 Petitions
Accused Products
Abstract
Data replication includes generating replication data that is part of a replicated file system to be sent over a communication channel to a destination replication device; adding additional verification information to at least a portion of the replication data to prevent data corruption; and sending the replication data and the additional verification information over the communication channel to the destination replication device. The replication data with additional verification information is sent over the communication channel using a reliable protocol that allows the replication data to be verified by the reliable protocol at the destination replication device. The reliable protocol is a protocol capable of detecting most but not all data corruption introduced by the communication channel. The additional verification information includes information for verifying that replication data sent using the reliable protocol does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol.
-
Citations
23 Claims
-
1. A reliable replication system comprising:
-
a processor configured to; generate replication data, wherein the replication data corresponds to at least a part of file system data to be replicated on a destination replication device; generate additional verification information based at least in part on at least a portion of the replication data; include in a first container the replication data and the additional verification information; include the first container in a second container associated with a reliable protocol; and an interface coupled to the processor, configured to send the second container including the first container over a communication channel to the destination replication device, wherein the destination replication device is configured to verify the replication data, upon receipt, at least in part by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol, wherein a verification associated with the additional verification information is stronger than a verification associated with the reliable protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A data replication method comprising:
-
generating replication data, wherein the replication data corresponds to at least a part of file system data to be replicated on a destination replication device; generating additional verification information based at least in part on at least a portion of the replication data; including in a first container the replication data and the additional verification information; including the first container in a second container associated with a reliable protocol; and sending the second container including the first container over a communication channel to the destination replication device, wherein the destination replication device is configured to verify the replication data, upon receipt, at least in part by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol, wherein a verification associated with the additional verification information is stronger than a verification associated with the reliable protocol. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product for data replication, the computer program product being embodied in a non-transitory computer readable storage medium and comprising computer instructions for:
-
generating replication data, wherein the replication data corresponds to at least a part of file system data to be replicated on a destination replication device; generating additional verification information based at least in part on at least a portion of the replication data; including in a first container the replication data and the additional verification information; including the first container in a second container associated with a reliable protocol; and sending the second container including the first container over a communication channel to the destination replication device, wherein the destination replication device is configured to verify the replication data, upon receipt, at least in part by determining whether at least a portion of the second container can be verified using the reliable protocol and in the event that the second container is verified by the reliable protocol, then checking the additional verification information included in the first container to further verify that the replication data does not include data corruption that was introduced by the communication channel and undetected by the reliable protocol, wherein a verification associated with the additional verification information is stronger than a verification associated with the reliable protocol.
-
Specification