×

Data storage resource allocation by employing dynamic methods and blacklisting resource request pools

  • US 8,352,954 B2
  • Filed: 06/19/2008
  • Issued: 01/08/2013
  • Est. Priority Date: 06/19/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method of assigning data storage requests to data storage resources, the method comprising:

  • receiving at least two data storage requests to be performed in multiple locations,wherein each of the multiple locations includes at least one separate data storage resource of a data storage system;

    determining, for each received data storage request, whether or not a requested resource has been blacklisted by comparing the received data storage request to a generated blacklist table to blacklist that request based on a resource requirement category of that request;

    for each data storage request, and before receiving data storage requests to be executed, determining at least first and second sets of data storage resources to handle the request,wherein the first set of data storage resources is a preferred set of data storage resources to handle the request, while the second set of data storage resources is an alternate set of data storage resources to handle the request, andwherein the first data storage resources differs from the second set of data storage resources;

    before receiving data storage requests to be executed, establishing a data storage resource allocation based at least in part on one of the at least first and second sets of data storage resources determined to handle each data storage requestwherein establishing the data storage resource allocation includes building a grid allocation table,wherein columns of the grid allocation table include resources with common characteristics, and rows of the grid allocation table include the data storage requests, orwherein rows of the grid allocation table include resources with common characteristics, and columns of the grid allocation table include the data storage requests;

    determining whether requested resources from a failed request comprise common or unique resources; and

    selectively adding the failed request to the blacklist table when the failed request corresponded to a common resource, and not adding the failed request to the blacklist table when the failed request corresponded to a unique requested resource.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×