Patents by Inventor Niranjan Pendharkar
Niranjan Pendharkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20150031408Abstract: Methods and devices are disclosed for control total transmit power within specific absorption rate (SAR) limits when a multi-SIM wireless device, such as a dual-SIM dual active (DSDA) device, has two active data communications. Embodiment methods include determining a priority of at least one of two active data communications based upon a measured condition of the wireless device, and reducing transmit power on one of the two RF resources supporting one of the two active data communications with lower priority. To identify a higher or lower priority active data communication, characteristics of the communications or data may be used.Type: ApplicationFiled: July 25, 2013Publication date: January 29, 2015Applicant: QUALCOMM IncorporatedInventors: Naveen KALLA, Francis M. Ngai, Niranjan Pendharkar, Hemanth Kosaraju
-
Patent number: 8938420Abstract: A computer-implemented method for natural batching of I/O operations on a replication log may include: 1) identifying a replication log that records the order of writes within a cluster replication system, 2) determining that the replication log is unavailable, 3) queuing incoming I/O operations for the replication log in a single batch while the replication log is unavailable, 4) determining that the replication log has become available, 5) ceasing queuing of incoming I/O operations for the replication log based on the determination that the replication log has become available, and 6) grouping a plurality of I/O operations in the single batch for processing in parallel by assigning a same generation number to the plurality of I/O operations. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: July 26, 2012Date of Patent: January 20, 2015Assignee: Symantec CorporationInventors: Satyendra Thakur, Kirubakaran Kaliannan, Shailesh Marathe, Niranjan Pendharkar
-
Patent number: 8924359Abstract: Various systems and methods for cooperative tiering between an application and a storage device. One method can include receiving information from the application where the information identifies a storage object and identifies a location in a storage device. The location identifies one or more tiers of a plurality of tiers included in the storage device, and the storage object is assigned to the one or more tiers. The method also involves detecting whether the storage object is stored in the one or more tiers. If not, the storage device copies the storage object to the identified location. The information can also include an instruction by the application to move the storage object from a first tier to a second tier.Type: GrantFiled: April 7, 2011Date of Patent: December 30, 2014Assignee: Symantec CorporationInventors: Niranjan Pendharkar, Ashish Karnik
-
Patent number: 8868839Abstract: A computer-implemented method may include identifying a file that includes one or more data blocks stored within a storage device. The computer-implemented method may also include determining that the file has been accessed more frequently than one or more other files stored within the storage device and then tracking the number of times that at least one data block associated with the file is accessed in the storage device. The computer-implemented method may further include determining that the number of times that the data block associated with the file has been accessed in the storage device is above a predetermined threshold. In addition, the computer-implemented method may include caching the data block associated with the file in a caching mechanism to decrease the amount of time required to access the data block. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 7, 2011Date of Patent: October 21, 2014Assignee: Symantec CorporationInventors: Anindya Banerjee, Amit Jambure, Kedar Patwardhan, Niranjan Pendharkar
-
Patent number: 8825602Abstract: A method for providing data protection in object-based storage environments may include: 1) taking a first snapshot, at a first time, of a set of partitions that store data of a file system on a set of object storage devices; 2) using the first snapshot to sync the data of the file system with a data protection node; 3) taking a second snapshot, at a second time, of the set of partitions; 4) using information from the set of object storage devices to identify at least one object that changed between the first and second times; 5) using object identification information to deduce file identification information that identifies a file that comprises the changed object; and 6) sending the changed object and the file identification information to the data protection node. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 15, 2010Date of Patent: September 2, 2014Assignee: Symantec CorporationInventors: Samir Desai, Niranjan Pendharkar, Ganesh Varadarajan
-
Patent number: 8799222Abstract: A host-based replication snapshot method. The method includes synchronizing a set of data objects stored at both a replication source node and a secondary node. The method further includes identifying changed data objects out of the set of data objects from the replication source node that have been modified during a time period between a first time and a subsequent second time. Metadata indicating the changed data objects from the replication source node is transmitted to the secondary node. A snapshot is then generated at the second time on the secondary node by using the metadata.Type: GrantFiled: December 17, 2010Date of Patent: August 5, 2014Assignee: Symantec CorporationInventors: Shailesh Marathe, Ashish Gawali, Niranjan Pendharkar
-
Patent number: 8775751Abstract: Reclamation of storage space in presence of copy-on-write snapshot. In one embodiment, a reclamation command is generated. In response to generating the reclamation command, first data held within one storage device is copied to another storage device via a communication link. One or more first physical memory regions of the one storage device, which stores the first data, is allocated to a first region of a data volume. The other storage device is configured to store a copy-on-write snapshot of the data volume. In response to copying the first data, de-allocate the one or more first physical memory regions from the first data volume region.Type: GrantFiled: December 7, 2010Date of Patent: July 8, 2014Assignee: Symantec CorporationInventors: Niranjan Pendharkar, Shailesh Vaman Marathe
-
Patent number: 8700670Abstract: A method, in one embodiment, can include receiving a key and associated data via a computing device. Furthermore, the method can include searching a B+ tree data structure using the key to find a leaf node. The B+ tree data structure is stored by a persistent storage coupled to the computing device. The B+ tree data structure can include a first plurality of nodes that each contains a key-value entry that is not maintained in a sorted order based on its key. In addition, the key and associated data are appended to the leaf node. A sector that includes the leaf node and the key and associated data can be flushed to the persistent storage.Type: GrantFiled: April 12, 2010Date of Patent: April 15, 2014Assignee: Symantec CorporationInventors: Shilesh Marathe, Rajesh Chepuri, Niranjan Pendharkar
-
Patent number: 8700570Abstract: Various systems and methods for migrating replicated storage arrays. For example, one method can involve transferring a set of data from a first storage device to a second storage device. The method also involves terminating a replication relationship between the first storage device and establishing a new replication relationship between the second storage device and either the third storage device or a fourth storage device. Between the time that the replication relationship with the first storage device is terminated and the new replication relationship with the second storage device is established, the second storage device receives a plurality of change operations. The method involves applying the change operations to either the third storage device or fourth storage device.Type: GrantFiled: April 8, 2011Date of Patent: April 15, 2014Assignee: Symantec CorporationInventors: Shailesh Vaman Marathe, Niranjan Pendharkar
-
Patent number: 8688643Abstract: A computer-implemented method for adaptively preferring mirrors for read operations may include identifying a volume of data. The computer-implemented method may also include identifying a plurality of mirrors that mirror the volume of data. The computer-implemented method may further include identifying a storage property of at least one mirror in the plurality of mirrors. The computer-implemented method may additionally include identifying at least one attempt to read from the volume of data. The computer-implemented method may also include selecting the mirror for fulfilling the read attempt based at least in part on the storage property of the mirror. The computer-implemented method may further include fulfilling the read attempt from the selected mirror. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 16, 2010Date of Patent: April 1, 2014Assignee: Symantec CorporationInventors: Anandi Deopujari, Niranjan Pendharkar, Michael Wahl
-
Publication number: 20130346724Abstract: A region of memory is logically divided into a number of segments, each of which is logically divided into a number of blocks. Blocks are allocated sequentially. A head pointer and a tail pointer demarcate the section of allocated blocks. As allocated blocks are added, the tail pointer is moved so that it remains at the end of the section of allocated blocks. If the tail pointer is within a threshold distance of the head pointer, then the head pointer is moved from its current position to a new position, and the allocated blocks between the current and new positions are freed (deallocated and/or erased). Thus, writes to the memory can be performed sequentially, and blocks can be freed in advance of when they are actually needed.Type: ApplicationFiled: June 20, 2012Publication date: December 26, 2013Applicant: SYMANTEC CORPORATIONInventors: Dilip Madhusudan Ranade, Niranjan Pendharkar, Anindya Banerjee
-
Patent number: 8600935Abstract: A computer-implemented method for achieving file-level data-protection operations using block-level technologies may include: 1) identifying an I/O operation directed to at least one data block on a primary storage system, 2) accessing a data-protection list that uniquely identifies files that are to be protected by a data-protection operation, 3) determining that the I/O operation is directed to at least a portion of at least one file identified on the data-protection list, and then, in response to the determination, 4) performing the data-protection operation on the I/O operation. Various additional methods, systems, and configured computer-readable media are also disclosed.Type: GrantFiled: March 3, 2010Date of Patent: December 3, 2013Assignee: Symantec CorporationInventors: Suhas Dantkale, Niranjan Pendharkar
-
Patent number: 8572338Abstract: A computer-implemented method for creating space-saving snapshots may include: 1) identifying a parent volume on which to perform a snapshot, 2) allocating at least one thin-provisioned volume for the snapshot, 3) identifying an attempt to write to a region of the parent volume, and then 4) copying the region to the thin-provisioned volume. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: February 22, 2010Date of Patent: October 29, 2013Assignee: Symantec CorporationInventors: Shailesh Vaman Marathe, Niranjan Pendharkar
-
Publication number: 20130275653Abstract: Storage locations in a first tier of a multi-tier storage system are allocated to a first set of data structures (e.g., inodes) in a first file set. A file that is stored in the first tier is associated with a first data structure of the first set. In response to determining that data in the file should be moved to a second tier of the multi-tier storage system, the file is associated with a second data structure in a second file set. The second data structure is allocated a storage location in the second tier. Consequently, two data structures are associated with the file. The data is copied from the first tier to the storage location in the second tier, and can be subsequently accessed using the second data structure.Type: ApplicationFiled: April 13, 2012Publication date: October 17, 2013Applicant: SYMANTEC CORPORATIONInventors: Dilip Madhusudan Ranade, Niranjan Pendharkar
-
Patent number: 8560801Abstract: Various systems and methods for performing tiering-aware data defragmentation. One method can involve receiving tiering information from a storage device that comprises multiple tiers. The information specifies a tiering attribute and tiering attribute value for the tiers. The method involves establishing zones that have zone attribute values corresponding to the received tiering attribute values. The method then involves storing a given block in a particular zone in response to detecting that a block attribute value of the block corresponds to a zone attribute value for the zone.Type: GrantFiled: April 7, 2011Date of Patent: October 15, 2013Assignee: Symantec CorporationInventors: Niranjan Pendharkar, Ashish Karnik
-
Publication number: 20130246666Abstract: Shared storage access management systems and methods are presented. A method can comprise: performing an endpoint I/O source authority tracking process in which permission of an endpoint I/O source to perform an I/O with at least a portion of an endpoint storage target is tracked at least in part based on a corresponding endpoint I/O source ID value, and performing an I/O operation based upon results of the endpoint I/O source authority tracking process. In one embodiment, the endpoint I/O source ID value is associated with an endpoint I/O source that is a virtual machine. The endpoint I/O source ID value can be unique and can be bound to an endpoint I/O source. In one exemplary implementation, the endpoint I/O source ID value does not depend upon intermediate communication channel characteristics between a corresponding endpoint I/O source and endpoint storage target.Type: ApplicationFiled: March 14, 2012Publication date: September 19, 2013Applicant: SYMANTEC CORPORATIONInventors: Hari Krishna Vemuri, Niranjan Pendharkar
-
Patent number: 8527990Abstract: A computer-implemented method for migrating virtual machines may include: 1) identifying a request to migrate a virtual machine from a primary site to a secondary site, the primary site including a primary storage device used by the virtual machine and configured for asynchronous replication to a secondary storage device at the secondary site, 2) identifying a difference map that reflects differences between data on the primary storage device and the secondary storage device, 3) initiating the virtual machine at the secondary site, 4) intercepting an input/output attempt from the virtual machine at the secondary site to the secondary storage device, 5) determining, based on the difference map, that a region of the input/output attempt has not been synchronized from the primary storage device, and 6) retrieving the region from the primary storage device before allowing the input/output attempt to proceed. Various other methods, systems, and computer-readable media are disclosed.Type: GrantFiled: April 29, 2011Date of Patent: September 3, 2013Assignee: Symantec CorporationInventors: Shailesh Vaman Marathe, Niranjan Pendharkar, Kedar Patwardhan
-
Publication number: 20130205006Abstract: When a loss of connectivity between a first node in a cluster of nodes and a data store is detected, an input/output (I/O) request associated with an application that was executing on the first node is shipped to a second node in the cluster that is in communication with the data store. The application can be gracefully shut down on the first node, and the second node can execute the application and satisfy the I/O request.Type: ApplicationFiled: February 7, 2012Publication date: August 8, 2013Applicant: SYMANTEC CORPORATIONInventors: Mangesh Panche, Nitin Wankhede, Niranjan Pendharkar, Asmita Jagtap, Shailesh Marathe, Sumit Sharma
-
Patent number: 8484160Abstract: Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an information collection process, wherein the information collection process includes collecting information regarding guest operating system files of a virtual machine; performing a selective replication region identification process, wherein the selective replication region identification process includes identifying regions associated with a selective amount of the guest operating system files; and performing a replication process based upon result of the replication region identification process. In one embodiment, the selective replication region identification process includes identifying regions associated with files of interest. The selective replication region identification process can include identifying regions associated with temporary files.Type: GrantFiled: September 21, 2010Date of Patent: July 9, 2013Assignee: Symantec CorporationInventors: Sanjay Kumar, Mukund Agrawal, Niranjan Pendharkar, Sumit Kumar, Subash Rajaa
-
Patent number: 8407301Abstract: A computer-implemented method for creating incremental images of cluster volumes. The method may include 1) maintaining a parallel cluster comprising a plurality of cluster nodes connected to a cluster volume; 2) creating a first incremental image of the cluster volume by capturing changes to the cluster volume on a first mirror during a first period of time; 3) for each cluster node in the parallel cluster, blocking write completions for writes to the cluster volume; 4) while the write completions are blocked, switching to a second mirror to create a second incremental image of the cluster volume by capturing changes to the cluster volume on the second mirror during a second period of time; and 5) after switching to the second mirror, unblocking the write completions for writes to the cluster volume. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: March 3, 2010Date of Patent: March 26, 2013Assignee: Symantec CorporationInventor: Niranjan Pendharkar