Method for improving mean time to data loss (MTDL) in a fixed content distributed data storage
First Claim
1. A protection management method for a system of nodes, wherein each node comprises a processor, and a plurality of drives, the protection management method comprising:
- grouping the plurality of nodes, for each of a plurality of data protection levels which define a number of nodes to store a copy of object data, into a group of one or more protection sets being associated with the respective data protection level, wherein a given node is a member of plural protection sets being associated with different data protection levels but only the member of one protection set among the one or more protection sets associated with the respective data protection level;
defining, for each of a plurality of protection levels, a plurality of protection sets being associated with respective protection levels;
storing copies of first object data that has a first protection level to each node in a first protection set which is associated with the first protection level based on a protection set map, and constraining distribution of the copies of the first object data to each node within the first protection set which is associated with the first protection level; and
storing copies of second object data that has a second protection level to each node in a second protection set which is associated with the second protection level based on the protection set map, and constraining distribution of the copies of the second object data to each node within the second protection set which is associated with the second protection level.
4 Assignments
0 Petitions
Accused Products
Abstract
An archival storage cluster of preferably symmetric nodes includes a data protection management system that periodically organizes the then-available nodes into one or more protection sets, with each set comprising a set of n nodes, where “n” refers to a configurable “data protection level” (DPL). At the time of its creation, a given protection set is closed in the sense that each then available node is a member of one, and only one, protection set. When an object is to be stored within the archive, the data protection management system stores the object in a given node of a given protection set and then constrains the distribution of copies of that object to other nodes within the given protection set. As a consequence, all DPL copies of an object are all stored within the same protection set, and only that protection set. This scheme significantly improves MTDL for the cluster as a whole, as the data can only be lost if multiple failures occur within nodes of a given protection set. This is far more unlikely than failures occurring across any random distribution of nodes within the cluster.
17 Citations
19 Claims
-
1. A protection management method for a system of nodes, wherein each node comprises a processor, and a plurality of drives, the protection management method comprising:
-
grouping the plurality of nodes, for each of a plurality of data protection levels which define a number of nodes to store a copy of object data, into a group of one or more protection sets being associated with the respective data protection level, wherein a given node is a member of plural protection sets being associated with different data protection levels but only the member of one protection set among the one or more protection sets associated with the respective data protection level; defining, for each of a plurality of protection levels, a plurality of protection sets being associated with respective protection levels; storing copies of first object data that has a first protection level to each node in a first protection set which is associated with the first protection level based on a protection set map, and constraining distribution of the copies of the first object data to each node within the first protection set which is associated with the first protection level; and storing copies of second object data that has a second protection level to each node in a second protection set which is associated with the second protection level based on the protection set map, and constraining distribution of the copies of the second object data to each node within the second protection set which is associated with the second protection level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A protection management method for a system including a plurality of nodes, the protection management method comprising:
-
grouping the plurality of nodes, for each of a plurality of data protection levels which define a number of nodes to store a copy of object data, into a group of one or more protection sets being associated with the respective data protection level, wherein a given node is a member of plural protection sets being associated with different data protection levels but only the member of one protection set among the one or more protection sets associated with the respective data protection level; defining, for each of a plurality of protection levels, a plurality of protection sets being associated with respective protection levels, storing copies of first object data that has a first protection level to each node in a first protection set which is associated with the first protection level based on a protection set map, and constraining distribution of the copies of the first object data to each node within the first protection set which is associated with the first protection level; and storing copies of second object data that has a second protection level to each node in a second protection set which is associated with the second protection level based on the protection set map, and constraining distribution of the copies of the second object data to each node within the second protection set which is associated with the second protection level. - View Dependent Claims (10, 11, 12)
-
-
13. A system, comprising:
-
a plurality of nodes, the plurality of nodes being grouped, for each of a plurality of data protection levels which define a number of nodes to be able to store a copy of object data, into a group of one or more protection sets being associated with the respective data protection level, wherein a given node is a member of plural protection sets being associated with different data protection levels but only the member of one protection set among the one or more protection sets associated with the respective data protection level; and a network that couples the plurality of nodes; wherein the system is configured to, upon receipt of first object data that has a first protection level, store copies of the first object data that has the first protection level to each node in a first protection set which is associated with the first protection level based on a protection set map, and constraining distribution of the copies of the first object data to each node within the first protection set which is associated with the first protection level, and wherein the system is configured to, upon receipt of second object data that has a second protection level, store copies of the second object data that has the second protection level to each node in a second protection set which is associated with the second protection level based on the protection set map, and constraining distribution of the copies of the second object data to each node within the second protection set which is associated with the second protection level. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification