×

Method, system, and apparatus for providing resilient data transfer in a data protection system

  • US 9,372,906 B2
  • Filed: 06/10/2013
  • Issued: 06/21/2016
  • Est. Priority Date: 09/09/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method, implemented at a data protection system that includes one or more processors, for restarting a transmission of data from a first location to a second location, and for applying changed data, the method comprising:

  • receiving from the second location a first checkpoint, the first checkpoint having been received by the second location from the first location, the first checkpoint including (i) a first pointer to a first position in a first log at the first location that corresponds to a last data record transmitted by the first location to the second location as part of the transmission of data from the first location to the second location, and (ii) a second pointer to a second position in a second log at the second location storing the first checkpoint;

    receiving from the second location a second checkpoint, the second checkpoint including a third pointer to a third position in the second log at the second location that corresponds to a last record applied to a data store at the second location; and

    based at least on determining that the transmission of data from the first location to the second location is to be restarted, performing at least the following;

    transmitting one or more first start commands to the second location, the one or more first start commands identifying;

    a fourth position in the second log from which to start applying data records to the data store, based on the third position pointed to by third pointer of the second checkpoint; and

    a fifth position in the second log to which to begin storing received data records from the first location, based on the second position pointed to by the second pointer of the first checkpoint; and

    transmitting one or more second start commands to the first location, the one or more second start commands identifying a sixth position in the first log from which to send data records to the second location, based on first position pointed to by the first pointer of the first checkpoint.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×