Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RAID model, data reading and writing and reconstruction method thereof

A technology for data reading and writing, data writing, applied in electrical digital data processing, data processing input/output process, instruments, etc., can solve problems such as matching failure to adapt, write amplification, and inability to efficiently cooperate with I/O. , to achieve high I/O efficiency and improve performance.

Active Publication Date: 2016-12-14
SUZHOU KEDA TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The data segmentation method of RAID 5 is to divide all the disks horizontally and logically splicing the data blocks of the same length on each disk horizontally into a striped data structure. The length of the stripe cache (stripe buffer in memory) It is proportional to the number of disks, for example, Stripe_cache_size=4k*working_disks_nr*chunk_size; however, under normal circumstances, programs in user mode (especially in the field of surveillance video) are a kind of additional input, including audio and video, and the length It is controlled by the user-mode program itself, and it often fails to match the length of the buffer. Therefore, the biggest limitation of RAID 5 is the matching of the stripe cache (stripe buffer in memory) and the user-mode buffer. degree
When RAID 5 finds that the application buffer does not match the stripe cache, it sets the STRIPE_DELAYED flag to delay the delivery of I / O to the stripe in anticipation of subsequent data input. This is a passive waiting process. For a single I / O cannot achieve stripe cache matching, cannot efficiently cooperate with I / O, and has disadvantages such as write amplification of RCW and RMW
[0004] In addition, RAID5 has many design limitations such as interrupting user writing in the failure state and being unable to read the remaining data, and rebuilding the entire disk takes time and I / O resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RAID model, data reading and writing and reconstruction method thereof
  • RAID model, data reading and writing and reconstruction method thereof
  • RAID model, data reading and writing and reconstruction method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0052] The present invention provides a RAID model of a novel storage mode, such as figure 1 As shown, the RAID model includes: a RAID core check module, which adopts an Erasure code check algorithm based on Vandermonde matrix RS encoding; the Erasurecode check algorithm supports N data blocks to generate M check data, and the RAID core schedules module, which is used to uniformly schedule all the data read and write operations of the RAID model; the RAID core scheduling module selects N correct data blocks through a scheduling algorithm, and calculates corresponding M school data blocks through the RAID core verification module and, the RAID core I / O module, which is used to perform RAID data read and write operations; the RAID core scheduling module schedules the RAID core I / O module to write the N correct data blocks and corresponding After the M verification data are successfully written, the RAID core scheduling module sends a notification that N correct data blocks are s...

Embodiment approach 2

[0059] On the basis of Embodiment 1, the present invention provides a data reading and writing method of a RAID model, comprising steps: the RAID core scheduling module uniformly schedules the write operations of all data of the RAID model, such as image 3 As shown, the specific steps are as follows:

[0060] S10, the RAID core scheduling module creates object containers to accommodate all data; the RAID core scheduling module marks the object containers one by one;

[0061] S11, the RAID core scheduling provides a data writing interface for additional writing, and the user writes the data block into the data object through the data writing interface; the RAID core scheduling module schedules the RAID core verification module to perform verification calculation on the data block in the data object, The corresponding test data is obtained and stored in the test object;

[0062] S12, the RAID core scheduling module schedules the RAID core I / O module, and writes the data block ...

Embodiment approach 3

[0073] On the basis of Embodiment 2, the present invention provides a method for rebuilding a RAID model, such as Figure 5 shown, including the following steps:

[0074] S30, during the data writing process, define the data blocks and check data written into the storage medium as valid data; mark the storage space occupied by the valid data as allocated space, and mark other storage spaces as unallocated space, then, All data in the unallocated space and valid data in the allocated space are marked as invalid data after being actively deleted by the user;

[0075] S31, during the data writing process, the RAID core scheduling module establishes a query table of the corresponding relationship between the object container and the storage space of the storage medium;

[0076] S32, during data reconstruction, the RAID core scheduling module queries and judges all valid data to determine whether it is lost; if valid data is lost, then determine which object containers the lost va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RAID model. The RAID model comprises an RAID core verification module and an RAID core scheduling module; the RAID core verification module adopts an Erasure code verification algorithm of RS code on the basis of a Vandermonde matrix, the Erasure code verification algorithm supports N data blocks to generate M verification data, and the RAID core scheduling module is used for conducting unified scheduling on all data reading and writing operations of the RAID model; the RAID core scheduling module selects N correct data blocks through a scheduling algorithm, and corresponding M verification data is calculated through the RAID core verification module; an RAID core I / O module is used for executing data reading and writing operations of the RAID; the RAID core scheduling module creates an object container containing all data. According to the RAID model, the RAID core scheduling module conducts unified scheduling on all the data reading and writing operations of the RAID, a user does not need to conduct caching for length adaptation, the verification number can be customized, no state exists for attitude to data, overall reconstruction is not needed, and the reading and writing efficiency is high.

Description

technical field [0001] The invention relates to the technical field of RAID storage modes, in particular to a RAID model, data reading and writing and a reconstruction method thereof. Background technique [0002] With the revival of storage technology and the advent of the era of cloud computing, storage products have penetrated into every aspect of our lives. How to make data safer, more efficient in storage, and more convenient in application is something that needs to be faced in the development of storage products. The traditional RAID (Redundant Arrays of Independent Disks, disk array) 5 storage mode is to establish a horizontal space storage model by cutting the space of each disk horizontally, so that each disk can work together to improve storage efficiency, and use the XOR algorithm to save The data has N+1 redundant backup. [0003] The data segmentation method of RAID 5 is to divide all the disks horizontally and logically splicing the data blocks of the same le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/06
CPCG06F3/061G06F3/0644G06F3/0689
Inventor 周麒沈伟平陆雪忠陈卫东
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products