Sign In to Follow Application
View All Documents & Correspondence

Automatically Determining File Replication Mechanisms

Abstract: A backup administrator can backup files from a production server on any of a plurality of different bases. In particular, some files can be replicated on a changed-byte basis. In other cases, files can be backed up by replicating updated copies of the entire file, or even byte blocks of the file . Determinations as to how a replication agent will back up a certain file or set of files can be made by a backup administrator automatically through a predefined logic, or dynamically based on defined criteria. Corresponding agents at the production server can then flag these files as indicated. Thus, at a later point, when the DPM server requests the updates of each file, the production server can either send over copies of the changed file bytes, entire copies of the changed file itself, or even changed blocks of a file, as appropriate.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
21 July 2008
Publication Number
11/2009
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MICROSOFT CORPORATION
ONE MICROSOFT WAY, REMOND, WASHINGTON 98052-6399

Inventors

1. FRIES, ROBERT, M
ONE MICROSOFT WAY, REMOND, WASHINGTON 98052-6399
2. BADAMI, VINAY, S
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
3. BADAMI, VINAY, S
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
4. MICHAEL, MICHAEL, L
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399
5. SOMJI, SHIRAZ, M
ONE MICROSOFT WAY, REDMOND, WASHINGTON 98052-6399

Specification

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] N/A BACKGROUND and Relevant Art [0002] As computerized systems have increased in popularity, so have the needs to store and backup electronic files and other communications created by the users and applications associated therewith. In general, computer systems and related devices create files for a variety of reasons, such as in the general case of creating a word processing document in a work setting, as well as creating a file used for more sophisticated database purposes. In addition, many of these documents can include valuable work product, or sensitive information that should be protected. [0003] One will appreciate, therefore that there are a variety of reasons why an organization will want to backup electronic files on a regular basis, and thereby create a reliable restoration of an originally created file when needed. Generally, some of the challenges facing organizations implementing one or more such backup solutions relate to choices in a particular replication mechanism. That is, there are many ways (i.e., replication mechanisms) to copy data to be protected from a production server volume to a backup storage volume at a backup server, which is where the protected data would reside for recovery purposes. One can appreciate that each replication mechanism carries with it certain advantages and disadvantages. [0004] For example, one conventional replication mechanism involves the production server logging the names of files that have changed on a volume to be protected, and then sending the entire, updated files to a backup volume at the backup server that corresponds to the volume to be protected at the production server. Another, similar mechanism for doing this is for the production server to not only log the name(s) of file(s) that have changed, but also compare the file(s) that have changed at the production server with any corresponding backup copyof the file(s) at the backup server, and then send to the backup server only the differential, changed bytes. [0005] In particular, the latter mechanism can allow for faster monitoring in part since it may be done without use of a file system filter to monitor changes. Unfortunately, this replication mechanism may involve more resource overhead when comparing a prior copy of the file with an updated version. As such, both of these types of replication mechanism tend to be more effective with smaller files, or with large files that only have a set of the same bytes in a block of bytes that change frequently. Conversely, these replication mechanisms can be very inefficient for very large files, such as database files, particularly files that have sets of several bytes or byte blocks that change with relatively low frequency. [0006] Another conventional replication mechanism involves identifying changes to files, rather than identifying only files that have changed. This mechanism of identifying changes to files typically relies on identifying files (e.g., names, types or locations) that are intended for replication, and identifying only the bytes that have changed in the file between administrator-defined time intervals in between replications. Thus, a backup agent (e.g., a "clone agent" in combination with a "file system filter" at the production server) logs only those changed bytes in the file, and ultimately communicates those changed bytes to the backup storage volume (i.e., "replica volume" on the storage medium). Unfortunately, this replication mechanism still tends to be more cost-effective from a resource expenditure standpoint for very large files or files that change infrequently between replication intervals, but less cost-effective for files that tend to change frequently or are entirely overwritten with each update. [0007] Still another type of replication mechanism, which could be considered a hybrid in some respects of both of the above-discussed replication mechanisms, involves identifying files in terms of "byte blocks." Generally, "byte blocks" comprise fixed size contiguous blocks of bytes, of which there can be many in any given file. For example, a production server (or "file server") can identify files as sets of multiple blocks, where each block contains a plurality of bytes. If any of the bytes change within a given block (i.e., are updated, written to, etc.), the replication mechanism might flag the changed block, and send the entire block to the replica vulvae at an appropriate time. As such, the replica agent can spend only those resources that may be necessary to identify a changed block of bytes, rather than each changed byte in the file. This can allow a given server to avoid incurring additional overhead even though multiple changes may be made to the same byte block. Nevertheless, while this can provide the replication agent with some resource-expenditure advantages over the aforementioned mechanisms, this mechanism may still be better suited for larger files, such as database files, or files whose byte blocks are changed more than once within the same replication cycle. [0008] Accordingly, an organization that is determining to use a particular replication mechanism for its backup service may need to weigh several considerations. Complicating this is the notion

Documents

Application Documents

# Name Date
1 3799-CHENP-2008 FORM-18 18-01-2010.pdf 2010-01-18
1 3799-CHENP-2008-AbandonedLetter.pdf 2018-12-18
2 3799-CHENP-2008-FER.pdf 2018-06-13
2 3799-chenp-2008 pct.pdf 2011-09-04
3 FORM-6-1001-1100(JAYA).60.pdf 2015-03-13
3 3799-chenp-2008 form-5.pdf 2011-09-04
4 MS to MTL Assignment.pdf 2015-03-13
4 3799-chenp-2008 form-3.pdf 2011-09-04
5 MTL-GPOA - JAYA.pdf 2015-03-13
5 3799-chenp-2008 form-26.pdf 2011-09-04
6 FORM-6-1001-1100(JAYA).60.pdf ONLINE 2015-03-05
6 3799-chenp-2008 form-1.pdf 2011-09-04
7 MS to MTL Assignment.pdf ONLINE 2015-03-05
7 3799-chenp-2008 drawings.pdf 2011-09-04
8 MTL-GPOA - JAYA.pdf ONLINE 2015-03-05
8 3799-chenp-2008 description(complete).pdf 2011-09-04
9 3799-CHENP-2008 FORM-6 22-02-2015.pdf 2015-02-22
9 3799-chenp-2008 correspondence-others.pdf 2011-09-04
10 3799-chenp-2008 abstract.jpg 2011-09-04
10 3799-chenp-2008 claims.pdf 2011-09-04
11 3799-chenp-2008 abstract.pdf 2011-09-04
11 3799-chenp-2008 assignment.pdf 2011-09-04
12 3799-chenp-2008 abstract.pdf 2011-09-04
12 3799-chenp-2008 assignment.pdf 2011-09-04
13 3799-chenp-2008 abstract.jpg 2011-09-04
13 3799-chenp-2008 claims.pdf 2011-09-04
14 3799-chenp-2008 correspondence-others.pdf 2011-09-04
14 3799-CHENP-2008 FORM-6 22-02-2015.pdf 2015-02-22
15 3799-chenp-2008 description(complete).pdf 2011-09-04
15 MTL-GPOA - JAYA.pdf ONLINE 2015-03-05
16 3799-chenp-2008 drawings.pdf 2011-09-04
16 MS to MTL Assignment.pdf ONLINE 2015-03-05
17 3799-chenp-2008 form-1.pdf 2011-09-04
17 FORM-6-1001-1100(JAYA).60.pdf ONLINE 2015-03-05
18 3799-chenp-2008 form-26.pdf 2011-09-04
18 MTL-GPOA - JAYA.pdf 2015-03-13
19 MS to MTL Assignment.pdf 2015-03-13
19 3799-chenp-2008 form-3.pdf 2011-09-04
20 FORM-6-1001-1100(JAYA).60.pdf 2015-03-13
20 3799-chenp-2008 form-5.pdf 2011-09-04
21 3799-CHENP-2008-FER.pdf 2018-06-13
21 3799-chenp-2008 pct.pdf 2011-09-04
22 3799-CHENP-2008-AbandonedLetter.pdf 2018-12-18
22 3799-CHENP-2008 FORM-18 18-01-2010.pdf 2010-01-18

Search Strategy

1 search_12-06-2018.pdf