Dell products l.p. (20240111414). SYSTEMS AND METHODS FOR ESTABLISHING SCALABLE STORAGE TARGETS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR ESTABLISHING SCALABLE STORAGE TARGETS

Organization Name

dell products l.p.

Inventor(s)

Xiangping Chen of Harvard MA (US)

Walter A. O'brien, Iii of Westborough MA (US)

Xunce Zhou of Austin TX (US)

SYSTEMS AND METHODS FOR ESTABLISHING SCALABLE STORAGE TARGETS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240111414 titled 'SYSTEMS AND METHODS FOR ESTABLISHING SCALABLE STORAGE TARGETS

Simplified Explanation

The abstract describes a method for connecting a storage volume to a compute node by creating a storage target cluster and sending connection instructions to the compute node.

  • The storage manager receives an access request from a compute node.
  • The access request includes a storage volume identifier.
  • A lookup is performed in a target database to identify a target entry with the storage volume identifier.
  • If the target entry is not found, a new storage target cluster is created.
  • First connection instructions, including the storage target cluster identifier, are sent to the compute node.

Potential Applications

This technology could be applied in cloud computing environments, data centers, and storage management systems.

Problems Solved

This technology streamlines the process of connecting storage volumes to compute nodes, reducing manual intervention and improving efficiency.

Benefits

- Faster and more efficient connection of storage volumes to compute nodes. - Automated creation of storage target clusters. - Improved overall system performance and reliability.

Potential Commercial Applications

- Cloud service providers - Data storage companies - IT infrastructure management firms

Possible Prior Art

One possible prior art could be the use of storage management software that automates the process of connecting storage volumes to compute nodes.

What is the impact of this technology on data security?

This article does not address the potential impact of this technology on data security.

How does this technology compare to existing storage volume connection methods?

This article does not provide a direct comparison to existing storage volume connection methods.


Original Abstract Submitted

a method for facilitating a connection to a storage volume, that includes receiving, by a storage manager, an access request from compute node, where the access request includes a storage volume identifier associated with the storage volume, performing a lookup, in a target database, to identify a target entry that includes the storage volume identifier, making a first determination that the target database does not comprise the target entry, and based on the first determination, creating a first storage target cluster for the storage volume, and sending first connection instructions to the compute node, where the first connection instructions comprise a first storage target cluster identifier associated with the first storage target cluster.