A method, computer readable medium, and network traffic management apparatus that accesses data in a compressed file system includes obtaining an original write request from a client computing device including at least object data. The object data is compressed into a plurality of compressed blocks. A mapping of each compressed block to a portion of the object data compressed therein is generated, wherein the portion of the object data compressed therein is represented in the mapping by a unique object identifier, a start offset, and a length. The compressed blocks and the mapping are stored in at least one data storage device. At least one data access request for at least a portion of the object data is serviced based on the mapping.
|
1. A method for accessing data in a compressed file system, comprising:
obtaining, by a network traffic management apparatus, at least one original write request from a client computing device comprising object data;
compressing, by the a network traffic management apparatus, the object data included in an original write request from a client computing device into a plurality of compressed blocks, wherein the object data is associated with a file system object;
generating, by the network traffic management apparatus, a mapping of each of the plurality of compressed blocks to a corresponding portion of the object data, wherein every corresponding portion of the object data is represented in the mapping by a corresponding unique an object identifier for the object, a start offset, and a length that corresponds to a size of the portion of the object data; and
servicing, by the network traffic management apparatus, at least one subsequent data access request for at least a portion one of the portions of the object data, the servicing comprising obtaining at least the requested portion of the object data from the mapped one of the plurality of compressed blocks based on the unique object identifier, the start offset and the length.
9. A non-transitory computer readable medium having stored thereon instructions for accessing data in a compressed file system comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
obtaining at least one original write request from a client computing device comprising object data;
compressing the object data included in an original write request from a client computing device into a plurality of compressed blocks, wherein the object data is associated with a file system object;
generating a mapping of each of the plurality of compressed blocks to a portion of the object data, wherein every corresponding portion of the object data is represented in the mapping by a corresponding unique an object identifier for the object, a start offset, and a length that corresponds to a size of the portion of the object data; and
servicing at least one subsequent data access request for one of the portions of the object data, wherein the servicing comprises obtaining at least the requested portion of the object data from the mapped one of the plurality of compressed blocks based on the unique object identifier, the start offset and the length.
17. A network traffic management apparatus comprising:
a memory;
configurable logic; and
a processor coupled to the memory and the configurable logic, at least one of the configurable logic configured to implement or the processor configured to execute programmed instructions stored in the memory comprising:
obtaining at least one original write request from a client computing device comprising object data;
compressing the object data included in an original write request from a client computing device into a plurality of compressed blocks, wherein the object data is associated with a file system object;
generating a mapping of each of the plurality of compressed blocks to a portion of the object data, wherein every corresponding portion of the object data is represented in the mapping by a corresponding unique an object identifier for the object, a start offset, and a length that corresponds to a size of the portion of the object data; and
servicing at least one subsequent data access request for one of the portions of the object data, wherein the servicing comprises obtaining at least the requested portion of the object data from the mapped one of the plurality of compressed blocks based on the unique object identifier, the start offset and the length.
2. The method as set forth in
obtaining, by the network traffic management apparatus, the data access request from the client computing device, wherein the data access request comprises a value for a plurality of parameters comprising the object identifier, the start offset, and the length;
identifying, by the network traffic management apparatus, the mapped at least one of the plurality of compressed block blocks based at least in part on the mapping and one or more of the data access request parameter values;
retrieving, by the network traffic management apparatus, the identified compressed block;
obtaining, by the network traffic management apparatus, at least a portion of the object data identified by the data access request parameter values; and
decompressing, by the network traffic management apparatus, the retrieved compressed block.
3. The method as set forth in
sending, by the network traffic management apparatus, the obtained object data to the requesting client computing device.
4. The method as set forth in
compressing, by the network traffic management apparatus, the object data into a plurality of compressed blocks each including compressed object data and an empty portion, the method further comprising replacing, by the network traffic management apparatus, the retrieved compressed block with a modified compressed block comprising, a compressed write request at least a portion of the additional object data when a size of the modified compressed block is not greater than a size of the retrieved compressed block.
5. The method as set forth in
modifying, by the network traffic management apparatus, the object data to include the at least a portion of the additional object data included in the write request;
generating, by the network traffic management apparatus, the modified compressed block; and
compressing, by the network traffic management apparatus, the modified object data.
6. The method as set forth in
7. The method as set forth in
storing, by the network traffic management apparatus, the compressed blocks and the mapping in at least one data storage device.
8. The method as set forth in
10. The medium as set forth in
obtaining the data access request from the client computing device, wherein the data access request comprises a value for a plurality of parameters comprising the object identifier, the start offset, and the length;
identifying the mapped at least one of the plurality of compressed block blocks based at least in part on the mapping and one or more of the data access request parameter values;
retrieving the identified compressed block;
obtaining at least a portion of the object data identified by the data access request parameter values; and
decompressing the retrieved compressed block.
11. The medium as set forth in
sending the obtained object data to the requesting client computing device.
12. The medium as set forth in
compressing the object data into a plurality of compressed blocks each comprising compressed object data and an empty portion, the medium further comprising replacing the retrieved compressed block with a modified compressed block comprising a compressed write request at least a portion of the additional object data when a size of the modified compressed block is not greater than a size of the retrieved compressed block.
13. The medium as set forth in
modifying the object data to include the at least a portion of the additional object data included in the write request; and
generating the modified compressed block; and
compressing the modified object data.
14. The medium as set forth in
15. The medium as set forth in
storing, the compressed blocks and the mapping in at least one data storage device.
16. The medium as set forth in
18. The apparatus as set forth in
obtaining, the data access request from the client computing device, wherein the data access request comprises a value for a plurality of parameters comprising the object identifier, the start offset, and the length;
identifying, the mapped at least one of the plurality of compressed block blocks based at least in part on the mapping and one or more of the data access request parameter values;
retrieving, the identified compressed block;
obtaining, at least a portion of the object data identified by the data access request parameter values: and
decompressing the retrieved compressed block.
19. The apparatus as set forth in
sending the obtained object data to the requesting client computing device.
20. The apparatus as set forth in
compressing the object data into a plurality of compressed blocks each including compressed object data and an empty portion, and wherein each of the plurality of compressed blocks includes compressed object data and an empty portion, and at least one of the configurable logic is further configured to implement or the processor are is further configured to execute programmed instructions stored in the memory further comprising:
replacing the retrieved compressed block with a modified compressed block including comprising a compressed write request at least a portion of the additional object data when a size of the modified compressed block is not greater than a size of the retrieved compressed block.
21. The apparatus as set forth in
modifying the object data to include the at least a portion of the additional object data included in the write request; and
generating the modified compressed block; and
compressing the modified object data.
22. The apparatus as set forth in
23. The apparatus as set forth in
storing, the compressed blocks and the mapping in at least one data storage device.
24. The apparatus as set forth in
|
This technology generally relates to accessing object data in a compressed file system, and, more particularly, to efficient methods and devices for servicing read and write data access requests independent of protocol.
In order to optimize utilization of relatively fast storage devices having limited capacity, such as in a tiered file storage system, relatively infrequently accessed files are often compressed into blocks of data and archived in relatively slow storage devices of the tiered storage system. Accessing an archived file, such as in response to a read or write request, generally requires decompressing the entire file, as identified based on a file handle or other identifier included in the request, in order to locate a portion of the file identified by a start offset and/or a length included in the request.
Accordingly, although such read and write requests often identify only a portion of the original file, all of the compressed blocks associated with the original file must be retrieved and decompressed in order to locate the requested portion, in order to service a read request, or locate the portion to be written, in order to service a write request. Additionally, in order to service a write request, the entire original file generally must be recompressed, subsequent to the write procedure, even though only a portion of the original file may have been modified. Retrieving and decompressing all of the compressed blocks associated with a file, and in the case of a write request, recompressing an entire file, requires significant time and resources thereby increasing the response time to the requesting client computing device, which is undesirable.
A method for managing requests for content includes obtaining with a network traffic management apparatus an original write request from a client computing device including at least object data. The object data is compressed with the network traffic management apparatus into a plurality of compressed blocks. A mapping of each compressed block to a portion of the object data compressed therein is generated with the network traffic management apparatus, wherein the portion of the object data compressed therein is represented in the mapping by a unique object identifier, a start offset, and a length. The compressed blocks and the mapping are stored with the network traffic management apparatus in at least one data storage device. At least one data access request for at least a portion of the object data is serviced with the network traffic management based on the mapping.
A non-transitory computer readable medium having stored thereon instructions for managing requests for content comprising machine executable code which when executed by at least one processor, causes the processor to perform steps including obtaining an original write request from a client computing device including at least object data. The object data is compressed into a plurality of compressed blocks. A mapping of each compressed block to a portion of the object data compressed therein is generated, wherein the portion of the object data compressed therein is represented in the mapping by a unique object identifier, a start offset, and a length. The compressed blocks and the mapping are stored in at least one data storage device. At least one data access request for at least a portion of the object data is serviced based on the mapping.
A network traffic management apparatus includes a memory, configurable logic, and a processor coupled to the memory and the configurable logic, at least one of the configurable logic configured to implement or the processor configured to execute programmed instructions stored in the memory including obtaining an original write request from a client computing device including at least object data. The object data is compressed into a plurality of compressed blocks. A mapping of each compressed block to a portion of the object data compressed therein is generated, wherein the portion of the object data compressed therein is represented in the mapping by a unique object identifier, a start offset, and a length. The compressed blocks and the mapping are stored in at least one data storage device. At least one data access request for at least a portion of the object data is serviced based on the mapping.
This technology provides a number of advantages including methods, non-transitory computer readable medium, and devices that efficiently access data in a compressed file system, the data being required to service read or write data access requests received from networked client computing devices. With this technology, a mapping of object data to compressed blocks including compressed object data is stored and utilized to retrieve only a portion of the compressed blocks storing the object data required to service a read or write request. Accordingly, only a subset of the compressed blocks storing object data needs to be decompressed to service a read request for only a portion of a file. Additionally, only a subset of the compressed blocks storing object data needs to be decompressed, modified, and rewritten to service a write request that does not require additional storage space beyond the fixed size of the compressed blocks. As a result, resource utilization is improved as well as response time, thereby improving the user experience with the file storage system.
A network environment 10 with an exemplary network traffic management apparatus 14 for accessing data in a compressed file system is illustrated in
In this example, the network traffic management apparatus 14 is coupled to client computing devices 12 through one of the LANs 28, although the client computing devices 12, or other devices, and network traffic management apparatus 14 may be coupled together via other topologies. Additionally, the network traffic management apparatus 14 is coupled to the servers 16 through another one of the LANs 28, although the servers 16, or other devices, and the network traffic management apparatus 14 may be coupled together via other topologies. LANs 28 each may employ any suitable interface mechanisms and network communication technologies including, for example, teletraffic in any suitable form (e.g., voice, modem, and the like), Public Switched Telephone Network (PSTNs), Ethernet-based Packet Data Networks (PDNs), combinations thereof, and the like. The network traffic management apparatus 14 is further coupled to client computing devices 12 through WAN 30, which may comprise any wide area network (e.g., Internet), although any other type of traffic network topology may be used. Various network processing applications, such as CIFS applications, NFS applications, HTTP Web Server applications, and/or FTP applications, may be operating on servers 16 and transmitting data (e.g., files, Web pages) through the network traffic management apparatus 14 in response to requests for content from client computing devices 12.
The network traffic management apparatus 14 facilitates servicing of data access requests in a compressed file storage system as illustrated and described with the examples herein, although network traffic management apparatus 14 may perform other types and numbers of functions, such as optimizing, securing and accelerating the traffic between client computing devices 12 and servers 16, and/or one or more applications. Network traffic management apparatus 14 includes at least one processor 18, memory 20, optional configurable logic device 21, I/O interface 22, and interface device 24 which are coupled together by bus 26, although network traffic management apparatus 14 may comprise other types and numbers of elements in other configurations. Although network traffic management apparatus 14 is shown in this example as being a standalone device, such as a BIGIP® device offered by F5 Networks, Inc., of Seattle, Wash., it should be appreciated that the network traffic management apparatus 14 could also be one of several blades servers coupled to a chassis device, such as a VIPRION® device, also offered by F5 Networks, Inc., of Seattle, Wash.
Processor(s) 18 may execute one or more computer-executable instructions stored in the memory 20 for the methods illustrated and described with reference to the examples, although the processor(s) can execute other types and numbers of instructions and perform other types and numbers of operations. The processor(s) 18 may comprise one or more central processing units (CPUs) or general purpose processors with one or more processing cores, such as AMD® processor(s), although other types of processor(s) could be used (e.g., Intel®).
Memory 20 may comprise one or more tangible storage media and/or devices, such as RAM, ROM, flash memory, CD-ROM, floppy disk, hard disk drive(s), solid state memory, DVD, or any other memory storage types or devices, including combinations thereof, which are known to those of ordinary skill in the art. The various storage devices of the memory 20 may be arranged in a tiered storage system to allow for less expensive and larger capacity storage devices, for example, to store less frequently accessed, compressed and/or archived data.
Memory 20 may store one or more non-transitory computer-readable instructions of this technology as illustrated and described with reference to the examples herein that may be executed by the one or more processor(s) 18. The flow charts shown in
The optional configurable logic device 21 may comprise specialized hardware configured to implement one or more steps of this technology as illustrated and described with reference to the examples herein. By way of example only, the optional configurable logic device 21 may comprise one or more of field programmable gate arrays (FPGAs), field programmable logic devices (FPLDs), application specific integrated circuits (ASICs) and/or programmable logic units (PLUs).
Input and display devices 22 enable a user, such as an administrator, to interact with the network traffic management apparatus 14, such as to input and/or view data and/or to configure, program and/or operate it by way of example only. Input devices may include a keyboard and/or a computer mouse and display devices may include a computer monitor, although other types and numbers of input devices and display devices could be used.
The interface device 24 in the network traffic management apparatus 14 is used to operatively couple and communicate between the network traffic management apparatus 14 and the client computing devices 12 and the servers 16, which are all coupled together by one or more local area networks (LAN) 28 and wide area networks (WAN) 30, although other types and numbers of communication networks or systems with other types and numbers of connections and configurations to other devices and elements. By way of example only, the local area networks (LAN) 28 and wide area networks (WAN) 30 can use TCP/IP over Ethernet and industry-standard protocols, including NFS, CIFS, SOAP, XML, LDAP, and SNMP, although other types and numbers of communication networks, can be used. In this example, the bus 26 is a hyper-transport bus in this example, although other bus types and links may be used, such as PCI.
Each of the client computing devices 12 and the servers 16 include a central processing unit (CPU) or processor, a memory, an interface device, and an I/O system, which are coupled together by a bus or other link, although other numbers and types of network devices could be used. The client computing devices 12, in this example, may run interface applications, such as Web browsers, that may provide an interface to make requests for and send content and/or data to different server-based applications via the LANs 28 and/or WANs 30.
Generally, servers 16 process requests received from client computing devices 12 via LANs 28 and/or WANs 30 according to the HTTP-based application RFC protocol or the CIFS or NFS protocol in this example, but the principles discussed herein are not limited to this example and can include other application protocols. A series of applications may run on the servers 16 that allow the transmission of data, such as object data, files, and/or metadata, requested by the client computing devices 12. The servers 16 may provide data or receive data in response to requests directed toward the respective applications on the servers 16 from the client computing devices 12. In some example, the servers 16 may further include various storage devices including a tiered file storage system and/or may be one or more tiers of a tiered file storage system including one or more other network devices. Accordingly the servers 16 can provide backup, archived, and/or compressed data storage services for other networked devices. It is to be understood that the servers 16 may be hardware or software or may represent a system with multiple servers 16 in a server pool, which may include internal or external networks. In this example the servers 16 may be any version of Microsoft® IIS servers or Apache® servers, although other types of servers may be used. Further, additional servers may be coupled to the LAN 28 and many different types of applications may be available on servers coupled to the LAN 28.
Although an exemplary network environment 10 with client computing devices 12, network traffic management apparatus 14, servers 16, LANs 28 and WANs 30 are described and illustrated herein, other types and numbers of systems, devices, blades, components, and elements in other topologies can be used. It is to be understood that the systems of the examples described herein are for exemplary purposes, as many variations of the specific hardware and software used to implement the examples are possible, as will be appreciated by those skilled in the relevant art(s).
Furthermore, each of the systems of the examples may be conveniently implemented using one or more general purpose computer systems, microprocessors, digital signal processors, and micro-controllers, programmed according to the teachings of the examples, as described and illustrated herein, and as will be appreciated by those of ordinary skill in the art.
In addition, two or more computing systems or devices can be substituted for any one of the systems or devices in any example. Accordingly, principles and advantages of distributed processing, such as redundancy and replication also can be implemented, as desired, to increase the robustness and performance of the devices and systems of the examples. The examples may also be implemented on computer system(s) that extend across any suitable network using any suitable interface mechanisms and traffic technologies, including by way of example only teletraffic in any suitable form (e.g., voice and modem), wireless traffic media, wireless traffic networks, cellular traffic networks, G3 traffic networks, Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, and combinations thereof.
The examples may also be embodied as a non-transitory computer readable medium having instructions stored thereon for one or more aspects of the technology as described and illustrated by way of the examples herein, which when executed by a processor (or configurable hardware), cause the processor to carry out the steps necessary to implement the methods of the examples, as described and illustrated herein.
An exemplary method for servicing read data access requests in a compressed file system will now be described with reference to
In step 202, the network traffic management apparatus 14 compresses the object data into at least one compressed block. In some examples, each compressed block has a fixed size or length, such as 64 kilobytes, for example, although the compressed blocks may be any other fixed size or of variable size.
In step 204, the network traffic management apparatus 14 stores the compressed blocks in the memory 20, although the compressed blocks can be stored in other data storage devices and at other locations. For example, the compressed blocks could be stored in one or more file server devices 16, a tiered storage system including the memory 20 and/or one or more file server devices 16, and/or any other data storage device(s).
In step 206, the network traffic management apparatus 14 maintains and stores a mapping of the original object data to the compressed blocks of object data, which the network traffic management apparatus 14 in the memory 20, although the mapping could be stored in other locations. One exemplary mapping is a table including object identifier, start offset, and length values for the object data included in the original write request associated with a unique identifier of the compressed block storing the compressed object data for the portion of the object data indicated by the associated start offset and length values, although other mappings of the original object data to the compressed object data can be used.
In one example, the unique identifier for each compressed block includes a file handle or other identifier shared by a plurality of compressed blocks storing compressed data for the same object as well as a start offset and a length value that together uniquely identify each compressed block. In the latter example, and in the exemplary operation in which the compressed blocks are of a fixed size, the length values will all be the same and the start offsets will all be intervals determined by the length value. In order to locate the compressed blocks at a later time, the network traffic management apparatus 14 can store a mapping of the unique identifier for each compressed block to a location of the compressed block in the data storage device or utilize any other method of maintaining the location of the compressed blocks.
In step 208, the network traffic management apparatus 14 obtains a read data access request from a client computing device 12 for object data previously stored as described and illustrated earlier with respect to steps 200, 202, 204, and 206. The read request can be based on any protocol requiring at least object identifier or file handle, start offset, and length parameters, the length parameter indicating a number of bytes, for example, including a common Internet file system (CIFS) protocol, a network file system (NFS) protocol, or a file transfer protocol (FTP), for example.
In step 210, the network traffic management apparatus 14 identifies at least one compressed block storing compressed object data required to service the read request by querying the table based on the read request parameter values. Accordingly, in one example, a read request is obtained by the network traffic management apparatus 14 from a client computing device 12 including at least parameter values F0 for the object identifier, 50 for the start offset, and 100 for the length. In this example, the mapping stored in step 206 for object F0 indicates that the compressed block having a unique identifier of C0 is storing start offset 0 and length 100, the compressed block having a unique identifier of C1 is storing start offset 100 and length 100, and the compressed block having a unique identifier of C2 is storing start offset 200 and length 75. Accordingly, in step 210, the network traffic management apparatus 14 identifies compressed blocks C0 and C1 based on the mapping of the object data byte range 50-150, as identified by the read request parameter values of 50 for the start offset and 100 for the length.
In step 212, the network traffic management apparatus 14 retrieves the identified compressed blocks from the data storage device. Accordingly, in this example, the network traffic management apparatus 14 retrieves compressed blocks C0 and C1 from a data storage device, such as one of server devices 16.
In step 214, the network traffic management apparatus 14 obtains the requested object data by decompressing the retrieved compressed blocks. Accordingly, in this example, blocks C0 and C1 are decompressed by the network traffic management apparatus 14 and the object data responsive to the received read request in step 208 is obtained based on the read request parameter values.
In step 216, the obtained object data is sent by the network traffic management apparatus 14 to the requesting one of the client computing devices 12. Because the read request included parameter values of 50 for the start offset and 100 for the length, in this example, only the second 50 bytes of object data included in compressed block C0 and only the first 50 bytes of object data included in compressed block C1 are obtained by the network traffic management apparatus 14, in step 214, and sent by the network traffic management apparatus 14, in step 216, to the requesting one of the client computing devices 12.
Accordingly, in this example, the read request received from the client computing device 12 is serviced by the network traffic management apparatus 14 without retrieving compressed block C2 from the data storage device and without decompressing compressed block C2. The ability of the network traffic management apparatus 14 to retrieve and decompress only those compressed blocks necessary to service a read request from a client computing device 12 is made possible by the mapping, stored in step 206, which allows the network traffic management apparatus 14 to identify only a subset of compressed blocks. As compressed files and objects are often archived in relatively slow data storage devices due to their relatively infrequent access by users of client computing devices 12, retrieving and decompressing only those necessary compressed blocks, instead of all compressed blocks storing object data for the object identified in the read request, can reduce resource utilization and response time, particularly when the number of compressed blocks not required to service the read request is substantial.
Referring to
In step 300, the network traffic management apparatus 14 obtains an original write request including at least the object data to be stored.
In step 302, the network traffic management apparatus 14 compresses the object data into at least one compressed block. In this example, each of the compressed blocks includes compressed object data and at least one empty portion. In some examples, the compressed blocks each have a fixed size, such as 64 kilobytes, 4 kilobytes of which is empty and does not include compressed object data, although any size of compressed block, compressed object data, and empty storage space can be used.
In step 304, the network traffic management apparatus 14 stores the compressed blocks in a data storage device such as the memory 20 of the network traffic management apparatus 14, one or more file server devices 16, a tiered storage system including the memory 20 and/or one or more file server devices 16, and/or any other data storage device(s).
In step 306, the network traffic management apparatus 14 maintains and stores a mapping of the original object data to the compressed blocks of object data.
In step 308, the network traffic management apparatus 14 obtains a write request from a client computing device 12 including a plurality of parameter values and object data to be used to modify object data previously stored as described and illustrated earlier with respect to steps 300, 302, 304, and 306. The write request can be based on any protocol requiring at least an object identifier or parameter value identifying the object to be modified, a start offset parameter value indicating the beginning location in the object to be modified, and a length parameter value indicating the portion of the object data to be modified. Accordingly, the protocol can include CIFS, NFS, or FTP, for example.
In step 310, the network traffic management apparatus 14 identifies at least one compressed block storing compressed object data required to service the write request by referencing the mapping, such as by querying a table storing the mapping, based on the write request parameter values. In step 312, the network traffic management apparatus 14 retrieves the identified compressed blocks.
In step 314, the network traffic management apparatus 14 obtains the object data to be modified by decompressing the retrieved compressed blocks. As at least a subset of the parameters are the same for a read request as for a write request, the identification of step 310, retrieval of step 312, and obtaining of step 314 can be performed by the network traffic management apparatus 14 as described and illustrated earlier with respect to steps 210, 212, and 214, respectively.
In step 316, the network traffic management apparatus 14 modifies the object data obtained in step 314 to include at least a portion of the object data included in the write request. In step 318, the network traffic management apparatus 14 generates modified compressed blocks by compressing the modified object data. Accordingly, the modified compressed blocks include compressed write request object data along with compressed object data that was previously stored and not currently modified.
The modified compressed blocks may be smaller, the same size, or larger than the corresponding compressed blocks retrieved, in step 312, by the network traffic management apparatus 14, depending on the size of the write request object data, the size of any previously stored object data that is replaced by the write request object data, and/or the compressibility of the object data as modified, for example. If a modified compressed block is not greater than the corresponding retrieved compressed block, the network traffic management apparatus 14 completes service of the write request by replacing, in step 320, the retrieved compressed block with the modified compressed block.
If the size of any compressed block is greater than the corresponding retrieved compressed block, the network traffic management apparatus 14 can retrieve every compressed block storing object data for the object identified by the write request object identifier parameter value, as identified based on the mapping. The network traffic management apparatus 14 can then decompress all of the retrieved compressed blocks, recompress the object data, and update the mapping. Because such an operation is relatively expensive, particularly with respect to compressed and archived data stored on relatively slow data storage device(s), including the empty portion in each compressed block when compressing the object data, in step 302, can provide for expansion of the compressed data upon servicing the write request, thereby reducing the number of instances in which a modified compressed block is greater in size than a corresponding retrieved compressed block.
Accordingly, in this example, in order to service a write data access request received from a client computing device 12, only those compressed blocks storing compressed object data required to service the write request are retrieved and decompressed by the network traffic management apparatus 14. Additionally, in examples in which a space for expansion is included by the network traffic management apparatus 14 in the form of an empty portion in the compressed blocks, the number of instances in which compressed blocks other than those necessary to service the write request will need to be retrieved, decompressed, recompressed, and stored can be reduced, thereby reducing resource utilization and response time.
The examples described herein have particular advantages for applications in which only portions of an archived object or file are read by a client computing device 12. Additionally, the examples described herein have particular advantages for applications in which only portions of an object or file are written such as databases and document and source control systems, for example, although these examples also provide advantages for other applications.
With this technology a mapping of object data to compressed blocks, each including compressed object data, is maintained and stored by the network traffic management apparatus 14 upon receiving an original write request. Subsequent read and write requests requiring access to the object data can be serviced by the network traffic management apparatus 14 based on the mapping and by only retrieving and decompressing, and in the case of some write requests, modifying and recompressing, only the compressed blocks required to service the requests. By accessing fewer compressed blocks in order to service data access requests, resource utilization is reduced and response time for servicing the data access request is reduced for the user of the requesting one of the client computing devices 12.
Having thus described the basic concept of the invention, it will be rather apparent to those skilled in the art that the foregoing detailed disclosure is intended to be presented by way of example only, and is not limiting. Various alterations, improvements, and modifications will occur and are intended to those skilled in the art, though not expressly stated herein. These alterations, improvements, and modifications are intended to be suggested hereby, and are within the spirit and scope of the invention. Additionally, the recited order of processing elements or sequences, or the use of numbers, letters, or other designations therefore, is not intended to limit the claimed processes to any order except as may be specified in the claims. Accordingly, the invention is limited only by the following claims and equivalents thereto.
Hansen, David, Majee, Sumandra
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
4843480, | Sep 12 1986 | Cannon Kabushiki Kaisha | Image reading apparatus for removing disturbances in output images |
4993030, | Apr 22 1988 | AMDAHL CORPORATION, 1250 EAST ARQUES AVENUE, SUNNYVALE, CALIFORNIA 94088 A DE CORP | File system for a plurality of storage classes |
5218695, | Feb 05 1990 | EPOCH SYSTEMS, INC , A CORP OF DE | File server system having high-speed write execution |
5282201, | Dec 22 1987 | Sun Microsystems, Inc | Dynamic packet routing network |
5303368, | Feb 28 1989 | Kabushiki Kaisha Toshiba | Dead lock preventing method for data base system |
5473362, | Nov 30 1993 | Microsoft Technology Licensing, LLC | Video on demand system comprising stripped data across plural storable devices with time multiplex scheduling |
5511177, | Nov 21 1991 | Hitachi, Ltd. | File data multiplexing method and data processing system |
5537585, | Feb 25 1994 | CLOUDING CORP | Data storage management for network interconnected processors |
5548724, | Mar 22 1993 | HITACHI INFORMATION & TELECOMMUNICATION ENGINEERING, LTD | File server system and file access control method of the same |
5550816, | Dec 29 1994 | NETWORK SYSTEMS CORP | Method and apparatus for virtual switching |
5550965, | Dec 27 1993 | THE CHASE MANHATTAN BANK, AS COLLATERAL AGENT | Method and system for operating a data processor to index primary data in real time with iconic table of contents |
5583995, | Jan 30 1995 | VERIDIAN INFORMATION SOLUTIONS, INC | Apparatus and method for data storage and retrieval using bandwidth allocation |
5586260, | Feb 12 1993 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
5590320, | Sep 14 1994 | EMC Corporation | Computer file directory system |
5606665, | Jul 01 1994 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Buffer descriptor prefetch in network and I/O design |
5623490, | Jun 09 1993 | RPX Corporation | Method and apparatus for multiple media digital communication system |
5649194, | Dec 29 1993 | Microsoft Technology Licensing, LLC | Unification of directory service with file system services |
5649200, | Jan 08 1993 | International Business Machines Corporation | Dynamic rule-based version control system |
5668943, | Oct 31 1994 | International Business Machines Corporation | Virtual shared disks with application transparent recovery |
5692180, | Jan 31 1995 | International Business Machines Corporation | Object-oriented cell directory database for a distributed computing environment |
5721779, | Aug 28 1995 | Juniper Networks, Inc | Apparatus and methods for verifying the identity of a party |
5724512, | Apr 17 1995 | Alcatel Lucent | Methods and apparatus for storage and retrieval of name space information in a distributed computing system |
5806061, | May 20 1997 | Hewlett Packard Enterprise Development LP | Method for cost-based optimization over multimeida repositories |
5832496, | Oct 12 1995 | NCR Corporation | System and method for performing intelligent analysis of a computer database |
5832522, | Feb 25 1994 | CLOUDING CORP | Data storage management for network interconnected processors |
5838970, | Oct 04 1994 | BANCTEC, INC | Object-oriented computer environment and related method |
5862325, | Feb 29 1996 | Intermind Corporation | Computer-based communication system and method using metadata defining a control structure |
5884303, | Mar 15 1996 | International Computers Limited | Parallel searching technique |
5889935, | May 28 1996 | EMC Corporation | Disaster control features for remote data mirroring |
5893086, | Jul 11 1997 | International Business Machines Corporation | Parallel file system and method with extensible hashing |
5897638, | Jun 16 1997 | Ab Initio Software LLC; Architecture LLC; Ab Initio Technology LLC | Parallel virtual file system |
5901327, | May 28 1996 | EMC Corporation | Bundling of write data from channel commands in a command chain for transmission over a data link between data storage systems for remote data mirroring |
5905990, | Jun 23 1997 | Xyratex Technology Limited | File system viewpath mechanism |
5917998, | Jul 26 1996 | International Business Machines Corporation | Method and apparatus for establishing and maintaining the status of membership sets used in mirrored read and write input/output without logging |
5920873, | Dec 06 1996 | International Business Machines Corporation | Data management control system for file and database |
5926816, | Oct 09 1996 | Oracle International Corporation | Database Synchronizer |
5937406, | Jan 31 1997 | GOOGLE LLC | File system interface to a database |
5991302, | Apr 10 1997 | Cisco Technology, Inc | Technique for maintaining prioritization of data transferred among heterogeneous nodes of a computer network |
5995491, | Jun 09 1993 | RPX Corporation | Method and apparatus for multiple media digital communication system |
5999664, | Nov 14 1997 | Xerox Corporation | System for searching a corpus of document images by user specified document layout components |
6012083, | Sep 24 1996 | Ricoh Company Ltd. | Method and apparatus for document processing using agents to process transactions created based on document content |
6029168, | Jan 23 1998 | PMC-SIERRA, INC | Decentralized file mapping in a striped network file system in a distributed computing environment |
6029175, | Oct 26 1995 | Teknowledge Corporation | Automatic retrieval of changed files by a network software agent |
6041365, | Oct 29 1985 | Apparatus and method for high performance remote application gateway servers | |
6044367, | Aug 02 1996 | Hewlett Packard Enterprise Development LP | Distributed I/O store |
6044444, | May 28 1996 | EMC Corporation | Remote data mirroring having preselection of automatic recovery or intervention required when a disruption is detected |
6047129, | Dec 30 1993 | VERITAS SOFTWARE CORPORATION, A DELAWARE CORPORATION | Software updating and distribution |
6047356, | Apr 18 1994 | HANGER SOLUTIONS, LLC | Method of dynamically allocating network node memory's partitions for caching distributed files |
6067558, | Sep 18 1997 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for providing increased content from a resource constrained device |
6072942, | Sep 18 1996 | McAfee, LLC | System and method of electronic mail filtering using interconnected nodes |
6078929, | Jun 07 1996 | DROPBOX, INC | Internet file system |
6085234, | Nov 28 1994 | RPX Corporation | Remote file services network-infrastructure cache |
6088694, | Mar 31 1998 | International Business Machines Corporation | Continuous availability and efficient backup for externally referenced objects |
6104706, | Jun 09 1993 | RPX Corporation | Method and apparatus for multiple media digital communication system |
6128627, | Apr 15 1998 | R2 SOLUTIONS LLC | Consistent data storage in an object cache |
6128717, | Jan 20 1998 | Quantum Corporation | Method and apparatus for storage application programming interface for digital mass storage and retrieval based upon data object type or size and characteristics of the data storage device |
6154777, | Jul 01 1996 | Oracle America, Inc | System for context-dependent name resolution |
6157950, | Dec 05 1997 | ENCANTO NETWORK, INC | Methods and apparatus for interfacing a computer or small network to a wide area network such as the internet |
6161145, | May 08 1997 | International Business Machines Corporation | Updating server-related data at a client |
6161185, | Mar 06 1998 | Verizon Patent and Licensing Inc | Personal authentication system and method for multiple computer platform |
6181336, | May 31 1996 | RPX Corporation | Database-independent, scalable, object-oriented architecture and API for managing digital multimedia assets |
6202156, | Sep 12 1997 | Oracle America, Inc | Remote access-controlled communication |
6223206, | May 11 1994 | International Business Machines Corporation | Method and system for load balancing by replicating a portion of a file being read by a first stream onto second device and reading portion with a second stream capable of accessing |
6233648, | Dec 26 1997 | Kabushiki Kaisha Toshiba | Disk storage system and data update method used therefor |
6237008, | Jul 20 1998 | International Business Machines Corporation | System and method for enabling pair-pair remote copy storage volumes to mirror data in another storage volume |
6256031, | Jun 26 1998 | Microsoft Technology Licensing, LLC | Integration of physical and virtual namespace |
6259405, | Jun 06 1995 | WAYPORT, INC | Geographic based communications service |
6260070, | Jun 30 1998 | Cisco Technology, Inc | System and method for determining a preferred mirrored service in a network by evaluating a border gateway protocol |
6282610, | Mar 31 1997 | NetApp, Inc | Storage controller providing store-and-forward mechanism in distributed data storage system |
6289345, | Jun 26 1997 | Fujitsu Limited | Design information management system having a bulk data server and a metadata server |
6292832, | Jun 30 1998 | Cisco Technology, Inc. | System and method for determining a preferred service in a network |
6304913, | Nov 09 1998 | TELEFONAKTIEBOLAGET L M ERICSSON PUBL | Internet system and method for selecting a closest server from a plurality of alternative servers |
6308162, | May 21 1997 | SAP SE | Method for controlled optimization of enterprise planning models |
6324581, | Mar 03 1999 | EMC IP HOLDING COMPANY LLC | File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems |
6329985, | Jun 30 1998 | EMC IP HOLDING COMPANY LLC | Method and apparatus for graphically displaying mapping of a logical object |
6330574, | Aug 05 1997 | Fujitsu Limited | Compression/decompression of tags in markup documents by creating a tag code/decode table based on the encoding of tags in a DTD included in the documents |
6338082, | Mar 22 1999 | MEC MANAGEMENT, LLC | Method, product, and apparatus for requesting a network resource |
6339785, | Nov 24 1999 | SPEEDBIT LTD | Multi-server file download |
6349343, | Sep 15 1994 | INFORMATION BUILDERS, INC | System and method for providing interoperability among heterogeneous object systems |
6353848, | Jul 31 1998 | SECURE CAM, LLC | Method and system allowing a client computer to access a portable digital image capture unit over a network |
6363056, | Jul 15 1998 | International Business Machines Corporation; IBM Corporation | Low overhead continuous monitoring of network performance |
6370527, | Dec 29 1998 | AT&T Properties, LLC; AT&T INTELLECTUAL PROPERTY II, L P | Method and apparatus for searching distributed networks using a plurality of search devices |
6370543, | May 24 1996 | INSOLVENCY SERVICES GROUP, INC ; Procter & Gamble Company, The | Display of media previews |
6374263, | Jul 19 1999 | International Business Machines Corporation | System for maintaining precomputed views |
6374336, | Dec 24 1997 | CERBERUS BUSINESS FINANCE, LLC, AS COLLATERAL AGENT | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
6389433, | Jul 16 1999 | Microsoft Technology Licensing, LLC | Method and system for automatically merging files into a single instance store |
6389462, | Dec 16 1998 | Alcatel Lucent | Method and apparatus for transparently directing requests for web objects to proxy caches |
6393581, | Aug 29 1996 | Cornell Research Foundation, Inc | Reliable time delay-constrained cluster computing |
6397246, | Nov 13 1998 | GLOBALFOUNDRIES Inc | Method and system for processing document requests in a network system |
6412004, | Mar 27 1997 | Microsoft Technology Licensing, LLC | Metaserver for a multimedia distribution network |
6438595, | Jun 24 1998 | EMC IP HOLDING COMPANY LLC | Load balancing using directory services in a data processing system |
6446108, | Jul 18 1997 | Alcatel Lucent | Method for wide area network service location |
6466580, | Feb 23 1999 | GLOBALFOUNDRIES Inc | Method and apparatus for processing high and low priority frame data transmitted in a data communication system |
6469983, | Feb 26 2001 | Maple Optical Systems, Inc. | Data packet transmission scheduling using a partitioned heap |
6477544, | Jul 16 1999 | Microsoft Technology Licensing, LLC | Single instance store for file systems |
6487561, | Dec 31 1998 | EMC IP HOLDING COMPANY LLC | Apparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size |
6493804, | Oct 01 1997 | Seagate Technology LLC | Global file system and data storage device locks |
6513061, | Oct 07 1997 | Hitachi, Ltd. | Proxy server selecting server and proxy server |
6514085, | Jul 30 1999 | SKILLSOFT IRELAND LIMITED | Methods and apparatus for computer based training relating to devices |
6516350, | Jun 17 1999 | International Business Machines Corporation | Self-regulated resource management of distributed computer resources |
6516351, | Dec 05 1997 | NETAPP INC | Enforcing uniform file-locking for diverse file-locking protocols |
6542909, | Jun 30 1998 | EMC IP HOLDING COMPANY LLC | System for determining mapping of logical objects in a computer system |
6542936, | Jul 03 1997 | CHEMTRON RESEARCH LLC | System for creating messages including image information |
6549916, | Aug 05 1999 | Oracle International Corporation | Event notification system tied to a file system |
6553352, | May 04 2001 | ACOUSTIC, L P | Interface for merchandise price optimization |
6556997, | Oct 07 1999 | Mavenir LTD | Information retrieval system |
6556998, | May 04 2000 | Matsushita Electric Industrial Co., Ltd. | Real-time distributed file system |
6560230, | Feb 01 1999 | Ericsson AB | Packet scheduling methods and apparatus |
6578069, | Oct 04 1999 | Microsoft Technology Licensing, LLC | Method, data structure, and computer program product for identifying a network resource |
6601101, | Mar 15 2000 | Hewlett Packard Enterprise Development LP | Transparent access to network attached devices |
6606663, | Sep 29 1998 | UNWIRED PLANET IP MANAGER, LLC; Unwired Planet, LLC | Method and apparatus for caching credentials in proxy servers for wireless user agents |
6612490, | Dec 22 1998 | International Business Mahines Corporation | Extended card file system |
6615267, | Mar 13 1997 | Google Technology Holdings LLC | System and method for delivery of information over narrow-band communications links |
6631422, | Aug 26 1999 | Mellanox Technologies, LTD | Network adapter utilizing a hashing function for distributing packets to multiple processors for parallel processing |
6654346, | Jul 19 1999 | RPX Corporation | Communication network across which packets of data are transmitted according to a priority scheme |
6697871, | Sep 21 1999 | Network General Technology | System and method for efficient encoding and decoding of protocol messages |
6701415, | Mar 31 1999 | Citrix Systems, Inc | Selecting a cache for a request for information |
6704755, | Dec 16 1999 | KEEPITSAFE, LLC | Systems and methods for backing up data files |
6708220, | Nov 19 1998 | X NET ASSOCIATES, INC | System and method for in-stream data compression |
6721794, | Apr 01 1999 | Comcast IP Holdings I, LLC | Method of data management for efficiently storing and retrieving data to respond to user access requests |
6728265, | Jul 30 1999 | Intel Corporation | Controlling frame transmission |
6728704, | Aug 27 2001 | VALTRUS INNOVATIONS LIMITED | Method and apparatus for merging result lists from multiple search engines |
6738357, | Jun 09 1993 | RPX Corporation | Method and apparatus for multiple media digital communication system |
6738790, | Oct 31 1997 | Oracle International Corporation | Approach for accessing large objects |
6742035, | Feb 28 2000 | MICRO FOCUS SOFTWARE INC | Directory-based volume location service for a distributed file system |
6744776, | Jan 28 2000 | Advanced Micro Devices, Inc. | Servicing priority traffic in multiport network switch |
6748420, | Nov 23 1999 | Cisco Technology, Inc | Methods and apparatus for providing shared access to an application |
6754215, | Aug 17 1999 | RAKUTEN GROUP, INC | Packet scheduling device |
6754699, | Jul 19 2000 | AKAMAI TECHNOLOGIES, INC | Content delivery and global traffic management network system |
6757706, | Jan 28 1999 | GOOGLE LLC | Method and apparatus for providing responses for requests of off-line clients |
6760337, | Aug 17 1999 | BICAMERAL LLC | Integrated circuit that processes communication packets with scheduler circuitry having multiple priority levels |
6775672, | Dec 19 2001 | Hewlett Packard Enterprise Development LP | Updating references to a migrated object in a partition-based distributed file system |
6775673, | Dec 19 2001 | Hewlett Packard Enterprise Development LP | Logical volume-level migration in a partition-based distributed file system |
6775679, | Mar 20 2001 | EMC IP HOLDING COMPANY LLC | Building a meta file system from file system cells |
6782450, | Dec 06 2001 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | File mode RAID subsystem |
6795860, | Apr 05 1999 | Cisco Technology, Inc. | System and method for selecting a service with dynamically changing information |
6801960, | Sep 28 2000 | EMC IP HOLDING COMPANY LLC | Switch-based acceleration of computer data storage employing aggregations of disk arrays |
6826613, | Mar 15 2000 | Hewlett Packard Enterprise Development LP | Virtually addressing storage devices through a switch |
6839761, | Apr 19 2001 | Microsoft Technology Licensing, LLC | Methods and systems for authentication through multiple proxy servers that require different authentication data |
6847959, | Jan 05 2000 | Apple Inc | Universal interface for retrieval of information in a computer system |
6847970, | Sep 11 2002 | International Business Machines Corporation | Methods and apparatus for managing dependencies in distributed systems |
6850997, | Sep 27 2000 | International Business Machines Corporation | System, method, and program for determining the availability of paths to a device |
6857009, | Oct 22 1999 | GATE WORLDWIDE HOLDINGS LLC | System and method for network access without reconfiguration |
6862282, | Aug 29 2000 | AVAYA Inc | Method and apparatus for packet ordering in a data processing system |
6865593, | Apr 12 2000 | SYNDIGO LLC | Dynamic integration of web sites |
6868439, | Apr 04 2002 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | System and method for supervising use of shared storage by multiple caching servers physically connected through a switching router to said shared storage via a robust high speed connection |
6868447, | May 09 2000 | Oracle America, Inc | Mechanism and apparatus for returning results of services in a distributed computing environment |
6871221, | Jan 21 2000 | QUEST SOFTWARE INC F K A DELL SOFTWARE INC ; Aventail LLC | Method and apparatus to manage network client logon scripts using a graphical management and administration tool |
6871245, | Nov 29 2000 | Radiant Data Corporation; INDEPENDENT STORAGE CORP | File system translators and methods for implementing the same |
6880017, | Mar 20 2000 | International Business Machines Corporation | System and method for providing an adaptive streaming flow control mechanism between the TCP and IP layers of the TCP/IP suite of protocols |
6883137, | Apr 17 2000 | PENDRAGON NETWORKS LLC | System and method for schema-driven compression of extensible mark-up language (XML) documents |
6889249, | Jan 11 2001 | RPX Corporation | Transaction aggregation in a switched file system |
6904040, | Oct 05 2001 | International Business Machines Corporaiton | Packet preprocessing interface for multiprocessor network handler |
6914881, | Nov 28 2000 | RPX CLEARINGHOUSE LLC | Prioritized continuous-deficit round robin scheduling |
6922688, | Jan 23 1998 | PMC-SIERRA, INC | Computer system storage |
6928518, | Nov 01 2001 | Oracle America, Inc | Disk drive employing adaptive flushing of a write cache |
6934706, | Mar 22 2002 | International Business Machines Corporation | Centralized mapping of security credentials for database access operations |
6938039, | Jun 30 2000 | EMC IP HOLDING COMPANY LLC | Concurrent file across at a target file server during migration of file systems between file servers using a network file system access protocol |
6938059, | Jun 30 1998 | EMC IP HOLDING COMPANY LLC | System for determining the mapping of logical objects in a data storage system |
6959373, | Dec 10 2001 | International Business Machines Corporation | Dynamic and variable length extents |
6961815, | Dec 05 2002 | International Business Machines Corporation | Multiple disk data storage system for reducing power consumption |
6970475, | Aug 17 1999 | AT&T Corporation | System and method for handling flows in a network |
6970924, | Feb 23 1999 | VISUAL NETWORKS, INC , CORPORATION OF THE STATE OF CALIFORNIA | Methods and apparatus for monitoring end-user experience in a distributed network |
6973455, | Mar 03 1999 | EMC IP HOLDING COMPANY LLC | File server system providing direct data sharing between clients with a server acting as an arbiter and coordinator |
6973490, | Jun 23 1999 | COLORADO WSC, LLC | Method and system for object-level web performance and analysis |
6973549, | Dec 10 2001 | International Business Machines Corporation | Locking technique for control and synchronization |
6975592, | Nov 22 2000 | RPX CLEARINGHOUSE LLC | Configurable rule-engine for layer-7 and traffic characteristic-based classification |
6985936, | Sep 27 2001 | International Business Machines Corporation | Addressing the name space mismatch between content servers and content caching systems |
6985956, | Nov 02 2000 | Oracle America, Inc | Switching system |
6986015, | Dec 10 2001 | International Business Machines Corporation | Fast path caching |
6990074, | Dec 16 1998 | RPX CLEARINGHOUSE LLC | Method and apparatus for the control of multimedia services in networks |
6990114, | Mar 26 2001 | Advanced Micro Devices, Inc. | System and method for deciding outgoing priority for data frames |
6990547, | Jan 29 2001 | OVERLAND STORAGE, INC | Replacing file system processors by hot swapping |
6990667, | Jan 29 2001 | OVERLAND STORAGE, INC | Server-independent object positioning for load balancing drives and servers |
6996841, | Apr 19 2001 | Microsoft Technology Licensing, LLC | Negotiating secure connections through a proxy server |
6999912, | Mar 13 2001 | Microsoft Technology Licensing, LLC | Provisioning computing services via an on-line networked computing environment |
7003533, | Dec 12 2000 | Sovereign Peak Ventures, LLC | File management method, content recording/playback apparatus and content recording program |
7003564, | Jan 17 2001 | Hewlett Packard Enterprise Development LP | Method and apparatus for customizably calculating and displaying health of a computer network |
7006502, | Dec 17 1998 | GOLDMAN SACHS SPECIALTY LENDING GROUP L P | System using stream specification and action specification stored in policy cache to process the flow of data packets by appropriate action processor |
7006981, | Apr 04 2001 | Oracle International Corporation | Assortment decisions |
7010553, | Mar 19 2002 | NetApp, Inc | System and method for redirecting access to a remote mirrored snapshot |
7013379, | Dec 10 2001 | International Business Machines Corporation | I/O primitives |
7020644, | Jun 21 2001 | SYNOPSIS, INC; Synopsys, Inc | Collection installable knowledge |
7020669, | Sep 27 2001 | EMC IP HOLDING COMPANY LLC | Apparatus, method and system for writing data to network accessible file system while minimizing risk of cache data loss/ data corruption |
7020713, | Oct 10 2000 | Apple Inc | System and method for balancing TCP/IP/workload of multi-processor system based on hash buckets |
7023974, | Oct 31 2002 | GOOGLE LLC | Compression of electronic communications |
7024427, | Dec 19 2001 | EMC IP HOLDING COMPANY LLC | Virtual file system |
7035212, | Jan 25 2001 | RPX Corporation | Method and apparatus for end to end forwarding architecture |
7039061, | Sep 25 2001 | Intel Corporation | Methods and apparatus for retaining packet order in systems utilizing multiple transmit queues |
7051112, | Oct 02 2001 | Alcatel-Lucent Canada Inc | System and method for distribution of software |
7054998, | Dec 06 2001 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | File mode RAID subsystem |
7055010, | Nov 06 2002 | SYNOLOGY INC. | Snapshot facility allowing preservation of chronological views on block drives |
7065482, | May 17 2001 | International Business Machines Corporation | Internet traffic analysis tool |
7072917, | Apr 24 2003 | Cisco Technology, Inc | Extended storage capacity for a network file server |
7075924, | Jun 09 1993 | RPX Corporation | Methods for multiple media digital communication |
7076689, | Oct 29 2002 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Use of unique XID range among multiple control processors |
7080314, | Jun 16 2000 | WSOU Investments, LLC | Document descriptor extraction method |
7089286, | May 04 2000 | Bellsouth Intellectual Property Corporation | Method and apparatus for compressing attachments to electronic mail communications for transmission |
7089491, | May 03 2002 | Microsoft Technology Licensing, LLC | System and method for enhancing XML schemas |
7111115, | Dec 24 1997 | CERBERUS BUSINESS FINANCE, LLC, AS COLLATERAL AGENT | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
7113962, | Jun 22 1999 | F5 Networks, Inc.; F5 Networks, Inc | Method and system for automatically updating content stored on servers connected by a network |
7113996, | Jul 21 2000 | ELIA DATA OF TEXAS, LLC | Method and system for secured transport and storage of data on a network |
7120728, | Jul 31 2002 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Hardware-based translating virtualization switch |
7120746, | Sep 09 2002 | International Business Machines Corporation | Technique for data transfer |
7127556, | Jun 30 1998 | EMC Corporation | Method and apparatus for initializing logical objects in a data storage system |
7133863, | Dec 28 2000 | Intel Corporation | Method and apparatus to search for information |
7133967, | May 09 2003 | International Business Machines Corporation | Storage system, controller, control method and program product therefor |
7143146, | Mar 13 2003 | Hitachi, Ltd. | Method for accessing distributed file system |
7146524, | Aug 03 2001 | EMC IP HOLDING COMPANY LLC | Systems and methods for providing a distributed file system incorporating a virtual hot spare |
7152184, | Nov 22 2001 | Kabushiki Kaisha Toshiba | Storage device, backup method and computer program code of this storage device |
7155466, | Oct 27 2003 | HITACHI VANTARA LLC | Policy-based management of a redundant array of independent nodes |
7161904, | Jun 04 2002 | GOOGLE LLC | System and method for hierarchical metering in a virtual router based network switch |
7165095, | Oct 26 2000 | Intel Corporation | Method and apparatus for distributing large payload file to a plurality of storage devices in a network |
7167821, | Jun 06 2000 | Microsoft Technology Licensing, LLC | Evaluating hardware models having resource contention |
7171469, | Sep 16 2002 | NetApp, Inc | Apparatus and method for storing data in a proxy cache in a network |
7173929, | Dec 10 2001 | International Business Machines Corporation | Fast path for performing data operations |
7181523, | Oct 26 2000 | Intel Corporation | Method and apparatus for managing a plurality of servers in a content delivery network |
7191163, | Apr 19 2002 | Computer Associates Think, Inc | System and method for providing inferencing services |
7194579, | Apr 26 2004 | Oracle America, Inc | Sparse multi-component files |
7197615, | Jul 07 2004 | Hitachi, Ltd. | Remote copy system maintaining consistency |
7219260, | May 26 2000 | EMC IP HOLDING COMPANY LLC | Fault tolerant system shared system resource with state machine logging |
7228359, | Feb 12 2002 | Cisco Technology, Inc. | Methods and apparatus for providing domain name service based on a client identifier |
7234074, | Dec 17 2003 | International Business Machines Corporation | Multiple disk data storage system for reducing power consumption |
7236491, | Nov 30 2000 | A10 Networks, Inc | Method and apparatus for scheduling for packet-switched networks |
7237076, | Mar 18 2003 | Hitachi, Ltd. | Method of maintaining a plurality of snapshots, server apparatus and storage apparatus |
7240100, | Apr 14 2000 | AKAMAI TECHNOLOGIES, INC | Content delivery network (CDN) content server request handling mechanism with metadata framework support |
7243089, | Nov 25 2003 | International Business Machines Corporation | System, method, and service for federating and optionally migrating a local file system into a distributed file system while preserving local access to existing data |
7243094, | May 31 2002 | ServiceNow, Inc | Method and system for intelligent storage management |
7257633, | Mar 03 2003 | Oracle America, Inc | Dynamic allocation of a pool of threads |
7263610, | Jul 30 2002 | Alcatel Lucent | Secure multicast flow |
7269168, | Jul 31 2002 | Brocade Communications Systems, Inc | Host bus adaptor-based virtualization switch |
7269582, | Apr 07 2003 | Thomson Licensing | Database model for hierarchical data formats |
7272613, | Oct 26 2000 | Intel Corporation | Method and system for managing distributed content and related metadata |
7280536, | Dec 10 2001 | International Business Machines Corporation | Fast path for performing data operations |
7284150, | Sep 22 2004 | Daedalus Blue LLC | System and method for reliably storing data and providing efficient incremental backup and asynchronous mirroring by preferentially handling new data |
7292541, | Jan 28 2004 | Oracle International Corporation | Methods and systems for unnumbered network link discovery |
7293097, | Dec 05 1997 | Network Appliance, Inc. | Enforcing uniform file-locking for diverse file-locking protocols |
7293099, | Sep 29 1998 | Oracle America, Inc | Heterogeneous network file access |
7293133, | Dec 31 2003 | Veritas Technologies LLC | Performing operations without requiring split mirrors in a multi-class file system |
7296263, | Dec 12 2002 | F5 Networks, Inc. | Method and system for performing operations on data using XML streams |
7299250, | Mar 07 2002 | Microsoft Technology Licensing, LLC | File availability in distributed file storage systems |
7308475, | May 06 2003 | F5 Networks, Inc. | Method and system for accessing network services |
7324533, | Feb 25 2003 | Cisco Technology, Inc | Using modem profiles to improve connectivity, connect timing, and compression performance on a modem relay (MR) gateway |
7330486, | Apr 27 2002 | Samsung Electronics Co., Ltd. | Internet protocol based communication system and method for setting host address and selecting source address therein |
7340571, | Sep 03 2004 | GOOGLE LLC | Storage system and data management device for storage system |
7343398, | Sep 04 2002 | CA, INC | Methods, apparatuses and systems for transparently intermediating network traffic over connection-based authentication protocols |
7346664, | Apr 24 2003 | Cisco Technology, Inc | Transparent file migration using namespace replication |
7373345, | Feb 21 2003 | DataCore Software Corporation | Additional hash functions in content-based addressing |
7373438, | Jun 13 2002 | NetApp, Inc | System and method for reprioritizing high-latency input/output operations |
7373520, | Jun 18 2003 | Veritas Technologies LLC | Method for computing data signatures |
7383288, | Jan 11 2001 | RPX Corporation | Metadata based file switch and switched file system |
7383463, | Feb 04 2004 | EMC IP HOLDING COMPANY LLC | Internet protocol based disaster recovery of a server |
7401220, | Mar 21 2001 | Microsoft Technology Licensing, LLC | On-disk file format for a serverless distributed file system |
7406484, | Sep 12 2000 | Hewlett Packard Enterprise Development LP | Storage allocation in a distributed segmented file system |
7409440, | Dec 12 2002 | F5 Net works, Inc. | User defined data items |
7415488, | Dec 31 2004 | Veritas Technologies LLC | System and method for redundant storage consistency recovery |
7415608, | Mar 21 2001 | Microsoft Technology Licensing, LLC | On-disk file format for a serverless distributed file system |
7418439, | Mar 17 2000 | TWIN PEAKS SOFTWARE, INC | Mirror file system |
7437358, | Jun 25 2004 | Apple Inc | Methods and systems for managing data |
7440982, | Nov 13 2003 | Commvault Systems, Inc | System and method for stored data archive verification |
7443321, | Feb 13 2007 | CA, INC | Compression of stream data using a hierarchically-indexed database |
7457982, | Apr 11 2003 | NetApp, Inc | Writable virtual disk of read-only snapshot file objects |
7467158, | Jun 10 2005 | Microsoft Technology Licensing, LLC | Object virtualization |
7475241, | Nov 22 2002 | Cisco Technology, Inc. | Methods and apparatus for dynamic session key generation and rekeying in mobile IP |
7477796, | Apr 09 2004 | Nokia Corporation | Method for preparing compressed image data file, image data compression device, and photographic device |
7509322, | Jan 11 2001 | RPX Corporation | Aggregated lock management for locking aggregated files in a switched file system |
7512673, | Jan 11 2001 | RPX Corporation | Rule based aggregation of files and transactions in a switched file system |
7519813, | Aug 02 2004 | NetApp, Inc | System and method for a sidecar authentication mechanism |
7555608, | Feb 13 2006 | Intel Corporation | Techniques to manage a flow cache |
7562110, | Jan 11 2001 | RPX Corporation | File switch and switched file system |
7571168, | Jul 25 2005 | Hitachi, LTD | Asynchronous file replication and migration in a storage network |
7574433, | Oct 08 2004 | NYTELL SOFTWARE LLC | Classification-expanded indexing and retrieval of classified documents |
7577723, | Nov 12 1998 | Ricoh Co., Ltd. | Method and apparatus for automatic network configuration |
7587471, | Jul 15 2002 | Hitachi, Ltd. | System and method for virtualizing network storages into a single file system view |
7590747, | Mar 03 2000 | Intel Corporation | Distributed storage cluster architecture |
7599941, | Jul 25 2005 | Hitachi, LTD | Transparent redirection and load-balancing in a storage network |
7610307, | Nov 30 2004 | Microsoft Technology Licensing, LLC | Method and system of detecting file system namespace changes and restoring consistency |
7610390, | Dec 04 2001 | Oracle America, Inc | Distributed network identity |
7624109, | Feb 27 2004 | International Business Machines Corporation | Distributed asynchronous ordered replication |
7639883, | Apr 18 2006 | RPX Corporation | Method, device, mobile terminal and computer program product for providing variable compression of data files |
7640347, | May 02 2002 | F5 Networks, Inc | Method and system for inserting POST data into the GET request to apply normal caching rules |
7644109, | Mar 19 2002 | NetApp, Inc | System and method for storage of snapshot metadata in a remote file |
7653699, | Jun 12 2003 | Veritas Technologies LLC | System and method for partitioning a file system for enhanced availability and scalability |
7656788, | Dec 15 2000 | Cisco Technology, Inc. | High-reliability cluster management |
7680836, | Aug 18 2006 | EMC IP HOLDING COMPANY LLC | Systems and methods for a snapshot of data |
7684423, | Jun 30 2006 | Oracle America, Inc | System and method for virtual network interface cards based on internet protocol addresses |
7685126, | Aug 03 2001 | EMC IP HOLDING COMPANY LLC | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system |
7685177, | Oct 03 2006 | EMC IP HOLDING COMPANY LLC | Detecting and managing orphan files between primary and secondary data stores |
7689596, | Feb 21 2005 | Canon Kabushiki Kaisha | Data transmission device and method for controlling the same and image reading apparatus using the same |
7694082, | Jul 29 2005 | TWITTER, INC | Computer program and method for managing resources in a distributed storage system |
7698458, | Oct 29 2004 | AKAMAI TECHNOLOGIES, INC | Load balancing network traffic using race methods |
7711771, | May 25 2001 | Oracle International Corporation | Management and synchronization application for network file system |
7725763, | Aug 02 2002 | International Business Machines Corporation | Functional continuity by replicating a software application in a multi-computer architecture |
7734603, | Jan 26 2006 | NetApp, Inc | Content addressable storage array element |
7739540, | Oct 30 2006 | Hitachi, Ltd. | Information system, data transfer method and data protection method |
7743031, | Sep 06 2002 | Hewlett Packard Enterprise Development LP | Time and space efficient technique for creating virtual volume copies |
7743035, | Aug 09 2002 | NetApp, Inc. | System and method for restoring a virtual disk from a snapshot |
7752294, | Oct 28 2002 | NetApp, Inc | Method and system for dynamic expansion and contraction of nodes in a storage area network |
7769711, | Sep 12 2000 | Hewlett Packard Enterprise Development LP | Migration of control in a distributed segmented file system |
7788335, | Jan 11 2001 | RPX Corporation | Aggregated opportunistic lock and aggregated implicit lock management for locking aggregated files in a switched file system |
7805470, | Jun 23 2005 | EMC IP HOLDING COMPANY LLC | Methods and apparatus for managing the storage of content in a file system |
7809691, | Feb 22 2005 | Veritas Technologies LLC | System and method of applying incremental changes prior to initialization of a point-in-time copy |
7818299, | Mar 19 2002 | NetApp, Inc. | System and method for determining changes in two snapshots and for transmitting changes to a destination snapshot |
7822839, | May 06 2003 | F5 Networks, Inc. | Method and system for accessing network services |
7822939, | Sep 25 2007 | EMC IP HOLDING COMPANY LLC | Data de-duplication using thin provisioning |
7831639, | Dec 22 2004 | Veritas Technologies LLC | System and method for providing data protection by using sparse files to represent images of data stored in block devices |
7849112, | Sep 03 2003 | EMC IP HOLDING COMPANY LLC | Using a file handle for associating the file with a tree quota in a file server |
7853958, | Jun 28 2006 | Intel Corporation | Virtual machine monitor management from a management service processor in the host processing platform |
7861085, | Sep 29 2004 | Rockwell Automation Technologies, Inc. | Systems and methods providing distributed management of electronic signatures in industrial automation systems |
7870154, | Sep 28 2007 | Hitachi, Ltd. | Method and apparatus for NAS/CAS unified storage system |
7877511, | Jan 13 2003 | F5 Networks, Inc | Method and apparatus for adaptive services networking |
7885970, | Jan 20 2005 | F5 Networks, Inc | Scalable system for partitioning and accessing metadata over multiple servers |
7886218, | Feb 27 2008 | Pulse Secure, LLC | Methods and devices for post processing rendered web pages and handling requests of post processed web pages |
7895653, | May 31 2007 | International Business Machines Corporation | Internet robot detection for network distributable markup |
7900002, | Apr 20 2006 | Microsoft Technology Licensing, LLC | Multi-client cluster-based backup and restore |
7903554, | Apr 04 2008 | DELL MARKETING CORPORATION | Leaking component link traffic engineering information |
7904466, | Dec 21 2007 | NetApp, Inc | Presenting differences in a file system |
7908245, | Mar 09 2007 | Fujitsu Limited | Database management method and database management apparatus |
7913053, | Feb 15 2005 | Veritas Technologies LLC | System and method for archival of messages in size-limited containers and separate archival of attachments in content addressable storage |
7937421, | Nov 14 2002 | EMC IP HOLDING COMPANY LLC | Systems and methods for restriping files in a distributed file system |
7953085, | Aug 30 2004 | International Business Machines Corporation | Third party, broadcast, multicast and conditional RDMA operations |
7953701, | Aug 08 2003 | Hitachi, Ltd. | Method of controlling total disk usage amount in virtualized and unified network storage system |
7958222, | May 06 2003 | F5 Networks, Inc. | Method and system for accessing network services |
7958347, | Feb 04 2005 | F5 Networks, Inc | Methods and apparatus for implementing authentication |
7974478, | Aug 24 2006 | QUEST SOFTWARE INC F K A DELL SOFTWARE INC ; Aventail LLC | Methods and apparatus for reducing storage size |
7984108, | Oct 07 2004 | Unisys Corporation | Computer system para-virtualization using a hypervisor that is implemented in a partition of the host system |
7984500, | Oct 05 2006 | Amazon Technologies, Inc | Detecting fraudulent activity by analysis of information requests |
8005953, | Jan 11 2001 | RPX Corporation | Aggregated opportunistic lock and aggregated implicit lock management for locking aggregated files in a switched file system |
8015157, | Feb 18 2009 | Hitachi, Ltd. | File sharing system, file server, and method for managing files |
8024443, | Dec 12 2002 | F5 Networks, Inc. | Methods for applying a user defined operation on data relating to a network and devices thereof |
8037528, | Sep 17 2007 | Cisco Technology, Inc.; Cisco Technology, Inc | Enhanced server to client session inspection |
8046547, | Jan 30 2007 | AMZETTA TECHNOLOGIES, LLC, | Storage system snapshots for continuous file protection |
8055724, | Mar 21 2005 | EMC IP HOLDING COMPANY LLC | Selection of migration methods including partial read restore in distributed storage management |
8064342, | Oct 27 2006 | Verizon Patent and Licensing Inc | Load balancing session initiation protocol (SIP) servers |
8069225, | Apr 14 2003 | RIVERBED TECHNOLOGY LLC | Transparent client-server transaction accelerator |
8074107, | Oct 26 2009 | Amazon Technologies, Inc. | Failover and recovery for replicated data instances |
8099758, | May 12 1999 | Microsoft Technology Licensing, LLC | Policy based composite file system and method |
8103622, | Dec 22 2006 | Network Appliance, Inc. | Rate of change monitoring for a volume storing application data in a fractionally reserved data storage system |
8112392, | Feb 13 2009 | CA, INC | Methods and systems for creating snapshots of virtualized applications |
8117244, | Nov 12 2007 | RPX Corporation | Non-disruptive file migration |
8151082, | Dec 06 2007 | Unification Technologies LLC | Apparatus, system, and method for converting a storage request into an append data storage command |
8155128, | Sep 26 2007 | Alcatel Lucent | Method and apparatus for establishing and managing diameter associations |
8161353, | Dec 06 2007 | Unification Technologies LLC | Apparatus, system, and method for validating that a correct data segment is read from a data storage device |
8171124, | Nov 25 2008 | Citrix Systems, Inc | Systems and methods for GSLB remote service monitoring |
8209403, | Aug 18 2008 | F5 Networks, Inc.; F5 Networks, Inc | Upgrading network traffic management devices while maintaining availability |
8271620, | Nov 13 2003 | Lantronix, Inc. | Communication protocol converter and method of protocol conversion |
8271751, | Apr 24 2008 | DISH TECHNOLOGIES L L C | Systems and methods for reliably managing files in a computer system |
8306948, | May 03 2010 | Canadian Imperial Bank of Commerce | Global deduplication file system |
8326798, | Sep 14 2009 | Network Appliance, Inc. | File system agnostic replication |
8351600, | Oct 30 2009 | Pure Storage, Inc | Distributed storage network and method for encrypting and decrypting data using hash functions |
8396836, | Jun 30 2011 | F5 Networks, Inc | System for mitigating file virtualization storage import latency |
8417746, | Apr 03 2006 | F5 Networks, Inc | File system management with enhanced searchability |
8463850, | Oct 26 2011 | F5 Networks, Inc.; F5 Networks, Inc | System and method of algorithmically generating a server side transaction identifier |
8468542, | Mar 04 2010 | ServiceNow, Inc | Virtual environment for server applications, such as web applications |
8484348, | Mar 05 2004 | RPX CLEARINGHOUSE LLC | Method and apparatus for facilitating fulfillment of web-service requests on a communication network |
8498951, | Jun 22 2006 | GOOGLE LLC | Approximate hashing functions for finding similar content |
8572007, | Oct 29 2010 | CA, INC | Systems and methods for classifying unknown files/spam based on a user actions, a file's prevalence within a user community, and a predetermined prevalence threshold |
8576283, | Jan 05 2010 | Target Brands, Inc. | Hash-based chain of custody preservation |
8595547, | Oct 26 2009 | Amazon Technologies, Inc. | Failover and recovery for replicated data instances |
8601000, | Jun 27 2011 | Amazon Technologies, Inc | System and method for conditionally updating an item with attribute granularity |
8620879, | Oct 13 2009 | GOOGLE LLC | Cloud based file storage service |
8635194, | Oct 19 2006 | Oracle International Corporation | System and method for data compression |
8645337, | Apr 30 2009 | Oracle International Corporation | Storing compression units in relational tables |
8676753, | Oct 26 2009 | Amazon Technologies, Inc. | Monitoring of replicated data instances |
8745266, | Jun 30 2011 | Citrix Systems, Inc | Transparent layer 2 redirection of request to single sign in service based on applying policy to content of request |
8745338, | May 02 2011 | NetApp, Inc | Overwriting part of compressed data without decompressing on-disk compressed data |
8838817, | Nov 07 2007 | NetApp, Inc | Application-controlled network packet classification |
8879431, | May 16 2011 | F5 Networks, Inc | Method for load balancing of requests' processing of diameter servers |
8959215, | Jul 06 2010 | NICIRA, INC | Network virtualization |
9143451, | Oct 01 2007 | F5 Networks, Inc. | Application layer network traffic prioritization |
20010007560, | |||
20010014891, | |||
20010047293, | |||
20010051955, | |||
20020010757, | |||
20020012352, | |||
20020012382, | |||
20020032758, | |||
20020035537, | |||
20020038360, | |||
20020059263, | |||
20020065810, | |||
20020065848, | |||
20020072048, | |||
20020073105, | |||
20020083118, | |||
20020087571, | |||
20020087744, | |||
20020087887, | |||
20020099829, | |||
20020099842, | |||
20020103823, | |||
20020106263, | |||
20020120763, | |||
20020133330, | |||
20020133491, | |||
20020143819, | |||
20020143852, | |||
20020143909, | |||
20020147630, | |||
20020150253, | |||
20020156905, | |||
20020161911, | |||
20020162118, | |||
20020174216, | |||
20020178410, | |||
20020188667, | |||
20020194112, | |||
20020194342, | |||
20020198956, | |||
20030005172, | |||
20030009429, | |||
20030009528, | |||
20030012382, | |||
20030018450, | |||
20030018585, | |||
20030022723, | |||
20030028514, | |||
20030033308, | |||
20030033535, | |||
20030034905, | |||
20030051045, | |||
20030055723, | |||
20030061240, | |||
20030065956, | |||
20030074301, | |||
20030105846, | |||
20030108000, | |||
20030108002, | |||
20030115218, | |||
20030115439, | |||
20030128708, | |||
20030130945, | |||
20030139934, | |||
20030140210, | |||
20030149781, | |||
20030156586, | |||
20030159072, | |||
20030171978, | |||
20030177364, | |||
20030177388, | |||
20030179755, | |||
20030189936, | |||
20030191812, | |||
20030195813, | |||
20030195962, | |||
20030200207, | |||
20030204635, | |||
20030212954, | |||
20030220835, | |||
20030229665, | |||
20030236995, | |||
20040003266, | |||
20040006575, | |||
20040006591, | |||
20040010654, | |||
20040015347, | |||
20040015783, | |||
20040017825, | |||
20040025013, | |||
20040028043, | |||
20040028063, | |||
20040030627, | |||
20040030740, | |||
20040030857, | |||
20040043758, | |||
20040044705, | |||
20040054748, | |||
20040054777, | |||
20040059789, | |||
20040064544, | |||
20040064554, | |||
20040093361, | |||
20040093474, | |||
20040098383, | |||
20040098595, | |||
20040122926, | |||
20040123277, | |||
20040133577, | |||
20040133605, | |||
20040133606, | |||
20040138858, | |||
20040139355, | |||
20040148380, | |||
20040153479, | |||
20040167967, | |||
20040177165, | |||
20040181605, | |||
20040199547, | |||
20040213156, | |||
20040215665, | |||
20040236798, | |||
20040236826, | |||
20040250032, | |||
20050008017, | |||
20050021615, | |||
20050021703, | |||
20050027841, | |||
20050027862, | |||
20050044158, | |||
20050050107, | |||
20050071589, | |||
20050091214, | |||
20050108575, | |||
20050114291, | |||
20050114701, | |||
20050117589, | |||
20050160161, | |||
20050160243, | |||
20050165656, | |||
20050174944, | |||
20050175013, | |||
20050187866, | |||
20050193245, | |||
20050198234, | |||
20050198501, | |||
20050213587, | |||
20050234928, | |||
20050240664, | |||
20050246393, | |||
20050256806, | |||
20050273456, | |||
20050289109, | |||
20050289111, | |||
20060010502, | |||
20060031374, | |||
20060031778, | |||
20060045089, | |||
20060045096, | |||
20060047785, | |||
20060074922, | |||
20060075475, | |||
20060080353, | |||
20060100752, | |||
20060106882, | |||
20060112151, | |||
20060112367, | |||
20060112399, | |||
20060123062, | |||
20060123210, | |||
20060130133, | |||
20060133374, | |||
20060140193, | |||
20060153201, | |||
20060167838, | |||
20060179261, | |||
20060184589, | |||
20060190496, | |||
20060200470, | |||
20060206547, | |||
20060209669, | |||
20060212746, | |||
20060218135, | |||
20060224636, | |||
20060224687, | |||
20060229861, | |||
20060230014, | |||
20060230265, | |||
20060235998, | |||
20060242179, | |||
20060259320, | |||
20060259949, | |||
20060268692, | |||
20060270341, | |||
20060271598, | |||
20060277225, | |||
20060282442, | |||
20060282461, | |||
20060282471, | |||
20060294164, | |||
20070005807, | |||
20070016613, | |||
20070016754, | |||
20070019636, | |||
20070024919, | |||
20070027929, | |||
20070027935, | |||
20070028068, | |||
20070038994, | |||
20070061441, | |||
20070067771, | |||
20070088702, | |||
20070112775, | |||
20070124415, | |||
20070124502, | |||
20070130255, | |||
20070136308, | |||
20070139227, | |||
20070147246, | |||
20070162891, | |||
20070168320, | |||
20070168525, | |||
20070180314, | |||
20070192543, | |||
20070208748, | |||
20070209075, | |||
20070226331, | |||
20070233826, | |||
20070239944, | |||
20070250560, | |||
20070260830, | |||
20080004022, | |||
20080010372, | |||
20080022059, | |||
20080046432, | |||
20080070575, | |||
20080104347, | |||
20080104443, | |||
20080114718, | |||
20080120592, | |||
20080141246, | |||
20080189468, | |||
20080200207, | |||
20080208917, | |||
20080208933, | |||
20080209073, | |||
20080215836, | |||
20080222223, | |||
20080243769, | |||
20080263401, | |||
20080270578, | |||
20080281908, | |||
20080281944, | |||
20080282047, | |||
20080294446, | |||
20090007162, | |||
20090013138, | |||
20090019535, | |||
20090037500, | |||
20090037975, | |||
20090041230, | |||
20090055507, | |||
20090055607, | |||
20090077097, | |||
20090080440, | |||
20090089344, | |||
20090089487, | |||
20090094252, | |||
20090094311, | |||
20090097480, | |||
20090106255, | |||
20090106263, | |||
20090106413, | |||
20090125955, | |||
20090132616, | |||
20090138314, | |||
20090161542, | |||
20090187915, | |||
20090204649, | |||
20090204650, | |||
20090204705, | |||
20090210431, | |||
20090210875, | |||
20090217163, | |||
20090217386, | |||
20090240705, | |||
20090240899, | |||
20090241176, | |||
20090254592, | |||
20090265396, | |||
20090265467, | |||
20090289828, | |||
20090292957, | |||
20090300161, | |||
20090313503, | |||
20090316708, | |||
20090319600, | |||
20100017423, | |||
20100017643, | |||
20100030777, | |||
20100042743, | |||
20100061232, | |||
20100064001, | |||
20100070476, | |||
20100082542, | |||
20100093318, | |||
20100122248, | |||
20100131654, | |||
20100179984, | |||
20100199042, | |||
20100205206, | |||
20100211547, | |||
20100228814, | |||
20100228819, | |||
20100242092, | |||
20100250497, | |||
20100274772, | |||
20100306169, | |||
20100325257, | |||
20100325634, | |||
20110055921, | |||
20110066736, | |||
20110072321, | |||
20110075667, | |||
20110083185, | |||
20110087696, | |||
20110093471, | |||
20110098087, | |||
20110099146, | |||
20110099420, | |||
20110107112, | |||
20110113095, | |||
20110119234, | |||
20110153985, | |||
20110185082, | |||
20110188415, | |||
20110213911, | |||
20110296411, | |||
20110320882, | |||
20120042115, | |||
20120078856, | |||
20120117028, | |||
20120144229, | |||
20120150699, | |||
20120150805, | |||
20120195273, | |||
20120254293, | |||
20120257506, | |||
20120258766, | |||
20130007239, | |||
20130058229, | |||
20130058252, | |||
20130058255, | |||
20130182713, | |||
20130238472, | |||
20150058595, | |||
AU2003300350, | |||
CA2080530, | |||
CA2512312, | |||
EP605088, | |||
EP738970, | |||
EP1081918, | |||
JP11282741, | |||
JP6205006, | |||
JP63010250, | |||
JP6332782, | |||
JP8021924, | |||
JP8328760, | |||
JP8339355, | |||
JP9016510, | |||
NZ566291, | |||
WO58870, | |||
WO2056181, | |||
WO239696, | |||
WO2004061605, | |||
WO2006091040, | |||
WO2008130983, | |||
WO2008147973, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 27 2017 | F5 Networks, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Oct 24 2022 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Sep 07 2024 | 4 years fee payment window open |
Mar 07 2025 | 6 months grace period start (w surcharge) |
Sep 07 2025 | patent expiry (for year 4) |
Sep 07 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 07 2028 | 8 years fee payment window open |
Mar 07 2029 | 6 months grace period start (w surcharge) |
Sep 07 2029 | patent expiry (for year 8) |
Sep 07 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 07 2032 | 12 years fee payment window open |
Mar 07 2033 | 6 months grace period start (w surcharge) |
Sep 07 2033 | patent expiry (for year 12) |
Sep 07 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |