Method and Apparatus to Align and Deduplicate Objects
The present invention relates generally to information systems involving deduplication and, more particularly, to methods and apparatus for managing deduplication efficiently by using alignment. In recent years, deduplication has become popular. Deduplication is a data compression technique for deleting duplicated data and leaving only one copy of the data and references to the data. Deduplication can reduce the storage capacity because only one data is stored. In the deduplication process, data is divided to small chunks. When same chunks are found, then one chunk is left and the other chunks are deleted and references to the one chunk remaining are created for the other chunks. When the size of total data is 1 PB and the size of chunk is 4 KB, the number of chunks is 250,000,000,000. It takes relatively a long time to search the same chunks when the number of chunks subject to compare is relatively large. On the other hand, when the size of chunk is relatively large (for example 1 MB), it takes relatively short time to search the same chunks because the number of chunks subject to compare is relatively small. However, relatively fewer same chunks are found when the size of chunk is relatively large (for example 1 MB) because the boundary location of object and boundary location of chunk has a relatively lower possibility to match. When the size of chunk is relatively small (for example 4 KB), boundary location of object and boundary location of chunk has a relatively higher possibility to match. Exemplary embodiments of the invention provide system to manage object-based data efficiently by deduplicating data. In deduplicating data, the system obtains information of the location of the objects and uses the information in calculating the hash value. In some embodiments, the storage system further includes a hash value calculation program which obtains boundary locations of the objects from the object allocation information. The hash value calculation program divides data from the boundary location to chunks to match the boundary location of the objects subject to deduplication. The hash value calculation program calculates hash value from the each chunk. A deduplication program searches the same hash values. When the deduplication program find the same hash values, the deduplication program changes mappings. Several areas on the virtual volumes are mapped to one area on the logical volumes. These and other features and advantages of the present invention will become apparent to those of ordinary skill in the art in view of the following detailed description of the specific embodiments. In the following detailed description of the invention, reference is made to the accompanying drawings which form a part of the disclosure, and in which are shown by way of illustration, and not of limitation, exemplary embodiments by which the invention may be practiced. In the drawings, like numerals describe substantially similar components throughout the several views. Further, it should be noted that while the detailed description provides various exemplary embodiments, as described below and as illustrated in the drawings, the present invention is not limited to the embodiments described and illustrated herein, but can extend to other embodiments, as would be known or as would become known to those skilled in the art. Reference in the specification to “one embodiment,” “this embodiment,” or “these embodiments” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention, and the appearances of these phrases in various places in the specification are not necessarily all referring to the same embodiment. Additionally, in the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that these specific details may not all be needed to practice the present invention. In other circumstances, well-known structures, materials, circuits, processes and interfaces have not been described in detail, and/or may be illustrated in block diagram form, so as to not unnecessarily obscure the present invention. Furthermore, some portions of the detailed description that follow are presented in terms of algorithms and symbolic representations of operations within a computer. These algorithmic descriptions and symbolic representations are the means used by those skilled in the data processing arts to most effectively convey the essence of their innovations to others skilled in the art. An algorithm is a series of defined steps leading to a desired end state or result. In the present invention, the steps carried out require physical manipulations of tangible quantities for achieving a tangible result. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals or instructions capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, instructions, or the like. It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining,” “displaying,” or the like, can include the actions and processes of a computer system or other information processing device that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system's memories or registers or other information storage, transmission or display devices. The present invention also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may include one or more general-purpose computers selectively activated or reconfigured by one or more computer programs. Such computer programs may be stored in a computer-readable storage medium, such as, but not limited to optical disks, magnetic disks, read-only memories, random access memories, solid state devices and drives, or any other types of media suitable for storing electronic information. The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general-purpose systems may be used with programs and modules in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform desired method steps. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein. The instructions of the programming language(s) may be executed by one or more processing devices, e.g., central processing units (CPUs), processors, or controllers. Exemplary embodiments of the invention, as will be described in greater detail below, provide apparatuses, methods and computer programs for object-based data management. System Configuration The memory 164 comprises a disk control program 221, RAID (Redundant Arrays of Inexpensive (or Independent) Disks) group information 222, logical volume information 223, pool information 224, virtual volume information 225, hash value information 226, a hash value calculation program 227, and a deduplication program 228. The disk control program 221 receives a read command and a write command from the application server 100, reads data from the HDD 166, and writes data to the HDD 166 using the RAID group information 222, the logical volume information 223, the pool information 224, and the virtual volume information 225. The hash value calculation program 227 converts a large variable-sized amount of data into a small datum with a hash function. The deduplication program 228 deletes duplicate data and leaves only one copy of the data to be stored along with references to the unique copy of data. Process Flow Diagrams In step 1301, the disk control program 221 is executed when the storage subsystem receives a read command 320 or a write command 340 from the application program 202. In step 1302, if the command that the disk control program 221 received in step 1301 is a write command 340, then the process goes to step 1303; if not, then the process goes to step 1309. In step 1303, if the volume name 342 and the volume address 343 are allocated in the virtual volume information 225, then the process goes to step 1304; if not, then the process goes to step 1307. In step 1304, if the reference status 508 specified by the volume name 342 and the volume address 343 is “NO”, then the process goes to step 1308; if not, then the process goes to step 1305. In step 1305, the disk control program 221 allocates an another area of a logical volume to the virtual volume specified by the volume name 342 and the volume address 343 and updates virtual volume information 225. For example, when the volume name 342 is “VOL-B” and the volume address 343 is “10-14” for a write command 340, the disk control program 221 writes the data 344 to the page 1 822 on the V-VOL B in In step 1309, if the volume name 322 and the volume address 323 are allocated in the virtual volume information 225, then the process goes to step 1310; if not, then the process goes to step 1311. In step 1310, the disk control program 221 gets the volume name 322 and the volume address 323 from the read command 340, gets the logical volume name 501, the page number 502, the offset 503, and the length 504 from the virtual volume information 225, gets the RAID group name 421 and the RAID group address 422 from the logical volume information 223, gets the media name 402 from the RAID group information 222, and reads data from the HDD 166 based on the mapping information gathered. In step 1311, the disk control program 221 returns “0” to the application server 100 because the area specified by the volume name 322 and the volume address 323 of the read command 320 is not one to which data is written. In step 1401, the hash value calculation program 227 obtains the object allocation information 203 from the application server 100. Alternatively, this information could be sent from the application server periodically, or after the information is updated. In step 1402, the hash value calculation program 227 selects an object (row) from the object allocation information 203. For example, the hash value calculation program 227 selects the “TABLE A” of “DB A” (row 306). In step 1403, the hash value calculation program 227 divides the data specified by the virtual volume name 304 and the virtual volume address 305 that is selected in step 1402 to the size of page. For example, the address from “7” to “32” is divided to the address from “7” to “16”, from “17” to “26”, and “27” to “32” as in In step 1405, after all the hash value for the objects have been calculated, the deduplication program 228 selects one of calculated hash value (row) from the hash value information 226. For example, the deduplication program 228 selects the row 705. In step 1406, the deduplication program 228 compares with the other calculated hash values 704, and searches for the hash value 704 that matches the hash value 704 that is selected in step 1405. In this case, the hash value 704 in the row 705 has the same value as the hash value 704 in the row 708. In step decision 1407, if the deduplication program 228 found the same value as the hash value 704 that is selected in step 1405, then the process goes to step 1408; if not, then the process goes to step 1411. In step 1408, the deduplication program 228 calculates the difference between the offsets 702 that have the same hash values. This gap would be required to update the allocation after the data is deduplicated. In this case, the offset 702 in the row 705 is “7” and the offset 702 in the row 708 is “2.” Therefore the gap between the objects is “5” (7−2=5). In step 1409, the deduplication program 228 divides the page that is found in step 1406 to two areas and changes allocation to map objects that hash value is the same to one page on logical volume and updates the virtual volume information 225. The gap calculated in step 1408 would be used to divide the page. In this case, the deduplication program 228 divides the page 0 821 on the V-VOL B to the address from “0” to “4” and the address from “5” to “9” based on the gap calculated. The deduplication program 228 does not change allocation of the address from “0” to “4” in the page 0 821 on the V-VOL B because there are 2 objects in the address from “0” to “4.” The deduplication program 228 changes allocation of the address from “5” to “9” in the page 0 821 on the V-VOL B to the address from “150” to “154” in the page 15 902 on the L-VOL A. The deduplication program 228 updates the virtual volume information 225 to record the mapping information and reference status. In this case, before step 1409, the address from “0” to “9” of the page 0 821 on the V-VOL B was mapped to the address from “420” to “429” of the page 42 921 on the L-VOL A as shown in In step decision 1410, the deduplication program 228 checks if all the rows in the hash value information 226 have been subject to hash value comparison and all the data having the same hash values have been identified. If so, then the process ends; and if not, then the process goes to step 1405 so that another hash value is subject to comparison. Of course, the system configurations illustrated in In the description, numerous details are set forth for purposes of explanation in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that not all of these specific details are required in order to practice the present invention. It is also noted that the invention may be described as a process, which is usually depicted as a flowchart, a flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. As is known in the art, the operations described above can be performed by hardware, software, or some combination of software and hardware. Various aspects of embodiments of the invention may be implemented using circuits and logic devices (hardware), while other aspects may be implemented using instructions stored on a machine-readable medium (software), which if executed by a processor, would cause the processor to perform a method to carry out embodiments of the invention. Furthermore, some embodiments of the invention may be performed solely in hardware, whereas other embodiments may be performed solely in software. Moreover, the various functions described can be performed in a single unit, or can be spread across a number of components in any number of ways. When performed by software, the methods may be executed by a processor, such as a general purpose computer, based on instructions stored on a computer-readable medium. If desired, the instructions can be stored on the medium in a compressed and/or encrypted format. From the foregoing, it will be apparent that the invention provides methods, apparatuses and programs stored on computer readable media for object-based tier management. Additionally, while specific embodiments have been illustrated and described in this specification, those of ordinary skill in the art appreciate that any arrangement that is calculated to achieve the same purpose may be substituted for the specific embodiments disclosed. This disclosure is intended to cover any and all adaptations or variations of the present invention, and it is to be understood that the terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification. Rather, the scope of the invention is to be determined entirely by the following claims, which are to be construed in accordance with the established doctrines of claim interpretation, along with the full range of equivalents to which such claims are entitled. In deduplicating data including objects, the system obtains information of the location of the objects and uses the information in calculating the hash value. The hash value calculation program divides data from the boundary location to chunks to match the boundary location of the objects subject to deduplication and the hash value is calculated from each chunk. 1. An storage system coupled to a server for managing object-based data comprising:
a processor; a memory; and a plurality of storage devices, wherein in deduplicating data, said storage system obtains information of boundary location of objects included in the data subject to deduplication, divides the data subject to deduplication based on said information of boundary location of the objects, and calculates hash value of said divided data. 2. The storage system according to wherein said storage system provides a plurality of virtual volumes to said server, and each page of said plurality of virtual volumes are allocated from a plurality of logical volumes allocated from said plurality of storage devices, said allocation of each said page from said plurality of logical volumes is performed when the page is subject to a write command, wherein said memory maintains said information of the boundary location of objects and allocation between the pages of said plurality of virtual volumes and said plurality of logical volumes. 3. The storage system according to wherein if the calculated hash value of said divided data of two objects matches, a portion of said logical volume storing one of said divided data is released and corresponding page of said virtual volume is associated with a portion of said logical volume storing the other one of said divided data. 4. The storage system according to wherein in response to a write command from said server, if an address of said virtual volume subject to said write command has been deduplicated, said storage system allocates a new region from said plurality of logical volumes. 5. The storage system according to wherein if an address of said virtual volume subject to said write command has been deduplicated, said storage system releases the association between said page of said virtual volume and said portion of said logical volume storing the other one of said divided data. 6. The storage system according to wherein said memory includes a status information of whether each page of said plurality of virtual volumes has been deduplicated or not, and if said new region is allocated against said write command, said status information on the corresponding page is set as not deduplicated. 7. The storage system according to said memory includes information of offset between the object and page and the length of divided data subject to hash value calculation. 8. The storage system according to wherein said information of boundary location of objects are obtained from said application server. 9. The storage system according to wherein said deduplication is performed by executing a deduplication program stored in said memory, and said deduplication is performed when said storage system subject to commands issued from said server. 10. The storage system according to wherein said plurality of storage devices are hard disk drives. 11. A method for managing object-based data in a system which includes a server and a storage system, the storage system having a plurality of storage devices, the method comprising:
obtaining information of boundary location of objects included in the data subject to deduplication; dividing the data subject to deduplication based on said information of boundary location of the objects; calculating hash values of said divided data; and comparing said hash values calculated. 12. The method according to wherein said storage system provides a plurality of virtual volumes to said server, and each page of said plurality of virtual volumes are allocated from a plurality of logical volumes allocated from said plurality of storage devices, said allocation of each said page from said plurality of logical volumes is performed when the page is subject to a write command, and wherein said information of the boundary location of objects and allocation between the pages of said plurality of virtual volumes and said plurality of logical volumes are maintained by said storage system. 13. The method according to if the calculated hash value of said divided data of two objects matches, releasing a portion of said logical volume storing one of said divided data, and associating corresponding page of said virtual volume with a portion of said logical volume storing the other one of said divided data. 14. The method according to in response to a write command from said server, if an address of said virtual volume subject to said write command has been deduplicated, allocating a new region from said plurality of logical volumes. 15. The method according to if an address of said virtual volume subject to said write command has been deduplicated, releasing the association between said page of said virtual volume and said portion of said logical volume storing the other one of said divided data. 16. The method according to maintaining a status information of whether each page of said plurality of virtual volumes has been deduplicated or not; and if said new region is allocated against said write command, setting said status information on the corresponding page as not deduplicated. 17. The method according to storing in said storage system information of offset between the object and page and the length of divided data subject to hash value calculation. 18. The method according to wherein said information of boundary location of objects are obtained from said application server. 19. The method according to wherein said deduplication is performed by executing a deduplication program stored in said memory, and said deduplication is performed when said storage system subject to commands issued from said server. 20. The method according to wherein said plurality of storage devices are hard disk drives.BACKGROUND OF THE INVENTION
BRIEF SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE INVENTION













