Electrical computers and digital processing systems: memory – Storage accessing and control – Control technique
Reexamination Certificate
2002-05-10
2004-08-31
Nguyen, Hiep T. (Department: 2187)
Electrical computers and digital processing systems: memory
Storage accessing and control
Control technique
C711S156000
Reexamination Certificate
active
06785789
ABSTRACT:
BACKGROUND OF THE INVENTION
Businesses employ large-scale data processing systems for storing and processing their data.
FIG. 1
illustrates relevant components of an exemplary data processing system
10
having a host computer system
12
, a transaction log
14
, a primary data storage system
16
, and a secondary data storage system
18
. Primary and secondary data storage system
16
and
18
include data memories
22
and
24
, respectively, which store primary and back up data volumes, respectively, which will be more fully described below. The primary data volume is the “working” data volume or the contents of data that are accessed by host computer system
12
in response to host computer system
12
receiving a transaction (i.e, instruction) to read, write or otherwise modify data. The back up data volume is a point in time copy of the primary data volume and is used when primary data storage system fails or when the primary data volume contained therein is logically corrupted or destroyed by operator error or invalid software behavior.
Host computer system
12
accesses (e.g., read, write, or otherwise modify) data in primary data volume of memory
22
in accordance with an access transaction received thereby. When computer system
10
receives a transaction to access, for example, a particular file of data in the primary data volume, host computer
12
first accesses an index table which maps a file name of the file to the location of one or more physical blocks of memory in memory
22
. Once the location of th memory blocks are known, host computer system
12
can access the memory blocks and read or write data thereto in accordance with the transaction.
Data processing systems, such as that shown in
FIG. 1
, often experience a logical corruption or destruction of data in their primary data volume or a physical failure in their primary data storage system. When these events occur, access to the primary data volume will be denied. Without a back up copy of the primary data, a business, which relies on its data processing system, will be severely impacted by these events.
To continue operating after a logical corruption in the primary data volume or a physical failure in their primary data storage system, business's often create a point in time “back up copy” of the primary data volume. In
FIG. 1
, a back up copy of the primary data volume in memory
22
can be created in memory
24
of secondary data storage system
18
. Creating a back up copy of the primary data volume is a procedure well known in the art. A back up copy is created in memory
24
each time the host computer system
12
issues a backup command. Transaction log
14
maintains a copy of all transactions that modify data of the primary data volume after a back up copy of the primary volume is created. It is noted that the entire contents of the primary data volume need not be copied into memory
24
each time the primary volume is backed up. Rather, only the contents of memory blocks of memory
22
which differ from the contents of corresponding memory blocks of memory
24
need to be updated upon each primary volume back up. Moreover, the primary data volume is not backed up every time host computer system
12
writes or modifies data in the primary data volume in memory
22
.
When, for example, primary data storage system
16
experiences a physical failure, the secondary data storage system
18
and the back up copy created therein can used to service read or write transactions provided to host computer system
12
. However, before the back up copy can be used, the back up copy must be updated from the time it was created so that the data contents thereof mirror the contents of the primary data volume just before the failure of primary data storage system
16
. In an update procedure, all transactions stored in log
14
which occurred between the time the back up copy was created and the time the failure occurred, are applied by host computer system
12
to the back up copy within secondary data system
18
. Once all the transactions are applied, the back up copy should be identical to the primary data volume just before the failure, and host computer system
12
can resume processing received transactions using the updated back up copy as if it were the primary data volume.
Unfortunately, updating data in the backup copy results in a loss of the original or stable point in time copy of the primary data volume. If the secondary data storage system
18
experiences physical failure or if logical data corruption occurs in the updated back up copy due to, for example, operator error, host computer system
12
, once again, will not be able to process transaction received requests. To avoid this, it is common practice to create a copy of the back up copy data, preferably in an additional data storage system (not shown). Thereafter, the the copy of the backup copy is updated using the transactions stored within the log
14
. Once updated, host computer system
12
can process newly received transactions using the copy of the back up copy. Unfortunately, a substantial amount of time may be needed to copy the entire contents of the back up copy. This delay of time may be unacceptable to a business which is seeking to continue processing transactions as soon as possible after, for example, a failure of its primary data storage system
16
.
SUMMARY OF THE INVENTION
Disclosed is a method for creating a virtual copy of data stored in a first memory. The virtual copy of data stored in the first memory is created in a second memory in response to a request to create a copy of all data stored in the first memory. Creating the virtual copy includes, in one embodiment, creating first and second tables in memory each one of which comprises a plurality of multibit entries. Each entry of the first table corresponds to a respective memory region of the first memory. Each entry of the second table corresponds to a respective memory region of the second memory. Each first bit of the first table indicates whether the corresponding memory region of the first memory contains valid data. Each second bit of the first table indicates whether data in the corresponding memory region of the first memory has been modified since the first table was created. Each first bit of the second table indicates whether the corresponding memory region of the second memory contains data copied from the first memory. Each second bit of the second table indicates whether data in the corresponding memory region of the second memory has been modified since the second table was created. Additionally, using the present invention more than one virtual copy of data stored in the first memory can be created at a time. Further, using the present invention, a virtual copy of the virtual copy can be created.
REFERENCES:
patent: 5155824 (1992-10-01), Edenfield et al.
patent: 5497483 (1996-03-01), Beardsley et al.
patent: 5506580 (1996-04-01), Whiting et al.
patent: 5532694 (1996-07-01), Mayers et al.
patent: 5649152 (1997-07-01), Ohran et al.
patent: 5778395 (1998-07-01), Whiting et al.
patent: 5835953 (1998-11-01), Ohran
patent: 5907672 (1999-05-01), Matze et al.
patent: 6073222 (2000-06-01), Ohran
patent: 6085298 (2000-07-01), Ohran
patent: 6141734 (2000-10-01), Razdan et al.
patent: 6189079 (2001-02-01), Micka et al.
patent: 6282610 (2001-08-01), Bergsten
patent: 6341341 (2002-01-01), Grummon et al.
patent: 6353878 (2002-03-01), Dunham
patent: 6434681 (2002-08-01), Armangau
patent: 6460054 (2002-10-01), Grummon
patent: 6564301 (2003-05-01), Middleton
patent: 6591351 (2003-07-01), Urabe et al.
patent: 2003/0041220 (2003-02-01), Peleska
Colgrove John A.
Karr Ronald S.
Kekre Anand A.
Kiselev Oleg
Pendharkar Niranjan S.
Campbell Stephenson Ascolese LLP
Nguyen Hiep T.
Veritas Operating Corporation
LandOfFree
Method and apparatus for creating a virtual data copy does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for creating a virtual data copy, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for creating a virtual data copy will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3285626