Patents by Inventor Prasad Bagal
Prasad Bagal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10127054Abstract: A method and apparatus for booting a clustered management system is provided where the configuration information required to boot the system is stored within the system itself. The techniques cope with several issues including finding the configuration data on the physical disk before the logical disk system is established, coping with replicated copies of configuration data, network partitions and disk drive failures that may prevent a booting node to have perfect knowledge of the state of the entire system, and active nodes modifying or moving configuration data while the booting node is searching for a consistent, correct copy of configuration data.Type: GrantFiled: February 10, 2015Date of Patent: November 13, 2018Assignee: Oracle International CorporationInventors: Rajiv Wickremesinghe, Harish Nandyala, Prasad Bagal, David Friedman
-
Patent number: 9892756Abstract: A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site.Type: GrantFiled: October 19, 2015Date of Patent: February 13, 2018Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Sameer Joshi, Prasad Bagal, Rajiv Wickremesinghe, Richard Long, Harish Nandyala, Shie-rei Huang
-
Patent number: 9875040Abstract: Techniques are provided for assigning read requests to storage devices in a manner that reduces the likelihood that any storage device will become overloaded or underutilized. Specifically, a read-request handler assigns read requests that are directed to each particular item among the storage devices that have copies of the item based on how busy each of those storage devices is. Consequently, even though certain storage devices may have copies of the same item, there may be times during which one storage device is assigned a disproportionate number of the reads of the item because the other storage device is busy with read requests for other items, and there may be other times during which other storage device is assigned a disproportionate number of the reads of the item because the one storage device is busy with read request for other items.Type: GrantFiled: August 24, 2015Date of Patent: January 23, 2018Assignee: Oracle International CorporationInventors: William H. Bridge, Jr., Prasad Bagal, Lavina Jain, Rajiv Wickremesinghe, Darshan Nagarajappa, Richard L. Long
-
Patent number: 9852284Abstract: Techniques are described for logically isolating data I/O requests from different operating systems (OSes) for a same multi-tenant storage system (MTSS). Techniques provide for OSes and the MTSS to obtain security tokens associated with the OSes. In an embodiment, an OS uses a security token to generate an authentication token based on the contents of a data input/output (I/O) request and sends the authentication token to the MTSS along with the data I/O request. When an MTSS receives such data I/O request, MTSS retrieves its own copy of the security token associated with the OS and generates its own authentication token based on the contents of the received data I/O request. If the authentication token generated by the MTSS matches the authentication token generated by the OS, then the data I/O request is successfully authenticated. Otherwise, if the authorization tokens fail to match, then the data I/O request has been compromised.Type: GrantFiled: April 28, 2017Date of Patent: December 26, 2017Assignee: Oracle International CorporationInventors: Samarjeet Tomar, Prasad Bagal, Harish Nandyala
-
Publication number: 20170228532Abstract: Techniques are described for logically isolating data I/O requests from different operating systems (OSes) for a same multi-tenant storage system (MTSS). Techniques provide for OSes and the MTSS to obtain security tokens associated with the OSes. In an embodiment, an OS uses a security token to generate an authentication token based on the contents of a data input/output (I/O) request and sends the authentication token to the MTSS along with the data I/O request. When an MTSS receives such data I/O request, MTSS retrieves its own copy of the security token associated with the OS and generates its own authentication token based on the contents of the received data I/O request. If the authentication token generated by the MTSS matches the authentication token generated by the OS, then the data I/O request is successfully authenticated. Otherwise, if the authorization tokens fail to match, then the data I/O request has been compromised.Type: ApplicationFiled: April 28, 2017Publication date: August 10, 2017Inventors: Samarjeet Tomar, Prasad Bagal, Harish Nandyala
-
Patent number: 9690597Abstract: A method and apparatus for booting a clustered management system is provided where the configuration information required to boot the system is stored within the system itself. The techniques cope with several issues including finding the configuration data on the physical disk before the logical disk system is established, coping with replicated copies of configuration data, network partitions and disk drive failures that may prevent a booting node to have perfect knowledge of the state of the entire system, and active nodes modifying or moving configuration data while the booting node is searching for a consistent, correct copy of configuration data.Type: GrantFiled: February 10, 2015Date of Patent: June 27, 2017Assignee: Oracle International CorporationInventors: Rajiv Wickremesinghe, Harish Nandyala, Prasad Bagal, David Friedman
-
Patent number: 9660987Abstract: Techniques are described for logically isolating data I/O requests from different operating systems (OSes) for a same multi-tenant storage system (MTSS). Techniques provide for OSes and the MTSS to obtain security tokens associated with the OSes. In an embodiment, an OS uses a security token to generate an authentication token based on the contents of a data input/output (I/O) request and sends the authentication token to the MTSS along with the data I/O request. When an MTSS receives such data I/O request, MTSS retrieves its own copy of the security token associated with the OS and generates its own authentication token based on the contents of the received data I/O request. If the authentication token generated by the MTSS matches the authentication token generated by the OS, then the data I/O request is successfully authenticated. Otherwise, if the authorization tokens fail to match, then the data I/O request has been compromised.Type: GrantFiled: July 30, 2015Date of Patent: May 23, 2017Assignee: Oracle International CorporationInventors: Prasad Bagal, Samarjeet Tomar, Harish Nandyala
-
Publication number: 20170034165Abstract: Techniques are described for logically isolating data I/O requests from different operating systems (OSes) for a same multi-tenant storage system (MTSS). Techniques provide for OSes and the MTSS to obtain security tokens associated with the OSes. In an embodiment, an OS uses a security token to generate an authentication token based on the contents of a data input/output (I/O) request and sends the authentication token to the MTSS along with the data I/O request. When an MTSS receives such data I/O request, MTSS retrieves its own copy of the security token associated with the OS and generates its own authentication token based on the contents of the received data I/O request. If the authentication token generated by the MTSS matches the authentication token generated by the OS, then the data I/O request is successfully authenticated. Otherwise, if the authorization tokens fail to match, then the data I/O request has been compromised.Type: ApplicationFiled: July 30, 2015Publication date: February 2, 2017Inventors: Prasad Bagal, Samarjeet Tomar, Harish Nandyala
-
Publication number: 20160042762Abstract: A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site.Type: ApplicationFiled: October 19, 2015Publication date: February 11, 2016Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Sameer JOSHI, Prasad BAGAL, Rajiv WICKREMESINGHE, Richard LONG, Harish NANDYALA, Shie-rei HUANG
-
Publication number: 20150363123Abstract: Techniques are provided for assigning read requests to storage devices in a manner that reduces the likelihood that any storage device will become overloaded or underutilized. Specifically, a read-request handler assigns read requests that are directed to each particular item among the storage devices that have copies of the item based on how busy each of those storage devices is. Consequently, even though certain storage devices may have copies of the same item, there may be times during which one storage device is assigned a disproportionate number of the reads of the item because the other storage device is busy with read requests for other items, and there may be other times during which other storage device is assigned a disproportionate number of the reads of the item because the one storage device is busy with read request for other items.Type: ApplicationFiled: August 24, 2015Publication date: December 17, 2015Inventors: William H. Bridge, JR., Prasad Bagal, Lavina Jain, Rajiv Wickremesinghe, Darshan Nagarajappa, Richard L. Long
-
Patent number: 9208038Abstract: A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site.Type: GrantFiled: May 13, 2014Date of Patent: December 8, 2015Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Sameer Joshi, Prasad Bagal, Rajiv Wickremesinghe, Richard Long, Harish Nandyala, Shie-rei Huang
-
Patent number: 9141508Abstract: Techniques are provided for assigning read requests to storage devices in a manner that reduces the likelihood that any storage device will become overloaded or underutilized. Specifically, a read-request handler assigns read requests that are directed to each particular item among the storage devices that have copies of the item based on how busy each of those storage devices is. Consequently, even though certain storage devices may have copies of the same item, there may be times during which one storage device is assigned a disproportionate number of the reads of the item because the other storage device is busy with read requests for other items, and there may be other times during which other storage device is assigned a disproportionate number of the reads of the item because the one storage device is busy with read request for other items.Type: GrantFiled: December 21, 2010Date of Patent: September 22, 2015Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Willliam H. Bridge, Jr., Prasad Bagal, Lavina Jain, Rajiv Wickremesinghe, Darshan Nagarajappa, Richard L. Long
-
Publication number: 20150160949Abstract: A method and apparatus for booting a clustered management system is provided where the configuration information required to boot the system is stored within the system itself. The techniques cope with several issues including finding the configuration data on the physical disk before the logical disk system is established, coping with replicated copies of configuration data, network partitions and disk drive failures that may prevent a booting node to have perfect knowledge of the state of the entire system, and active nodes modifying or moving configuration data while the booting node is searching for a consistent, correct copy of configuration data.Type: ApplicationFiled: February 10, 2015Publication date: June 11, 2015Inventors: RAJIV WICKREMESINGHE, HARISH NANDYALA, PRASAD BAGAL, DAVID FRIEDMAN
-
Patent number: 9009121Abstract: A method and apparatus for booting a clustered management system is provided where the configuration information required to boot the system is stored within the system itself. The techniques cope with several issues including finding the configuration data on the physical disk before the logical disk system is established, coping with replicated copies of configuration data, network partitions and disk drive failures that may prevent a booting node to have perfect knowledge of the state of the entire system, and active nodes modifying or moving configuration data while the booting node is searching for a consistent, correct copy of configuration data.Type: GrantFiled: October 30, 2009Date of Patent: April 14, 2015Assignee: Oracle International CorporationInventors: Rajiv Wickremesinghe, Harish Nandyala, Prasad Bagal, David Friedman
-
Publication number: 20140250323Abstract: A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site.Type: ApplicationFiled: May 13, 2014Publication date: September 4, 2014Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Sameer JOSHI, Prasad BAGAL, Rajiv WICKREMESINGHE, Richard LONG, Harish NANDYALA, Shie-rei HUANG
-
Patent number: 8732521Abstract: A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site.Type: GrantFiled: August 31, 2011Date of Patent: May 20, 2014Assignee: Oracle International CorporationInventors: Sameer Joshi, Prasad Bagal, Rajiv Wickremesinghe, Richard Long, Harish Nandyala, Shie-rei Huang
-
Patent number: 8701110Abstract: A method of updating an extent map is described. The method includes providing in a memory an instance of a first version of the extent map, wherein the instance is referenced by an application. The extent map include entries. The method further includes storing, at each extent map entry, an offset from the beginning of a physical drive which is identified within said each extent map entry, providing a second version of the extent map, comparing the first version of the extent map with the second version of the extent map, in response to the comparing, determining that is at least on segment in the second version of the extent map that is different from a corresponding at least one segment in the first version of the extent map.Type: GrantFiled: December 9, 2012Date of Patent: April 15, 2014Assignee: Oracle International CorporationInventors: David Friedman, Prasad Bagal
-
Patent number: 8392915Abstract: Methods of hot-swapping a logical volume manager (LVM) and updating an associated extent map are presented. Methods for migrating a virtual machine running an application using an LVM from one physical machine to another physical machine are also presented. The LVM can be used by a database application or other applications in a single-node or multi-node environment. The LVM is shut down, version numbers for each segment of its associated extent map are saved, and a new LVM is started. The new LVM's extent map is compared with the old extent map, and segments in the LVM which have changed are selectively updated.Type: GrantFiled: November 19, 2008Date of Patent: March 5, 2013Assignee: Oracle International CorporationInventors: David Friedman, Prasad Bagal
-
Publication number: 20130055018Abstract: A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site.Type: ApplicationFiled: August 31, 2011Publication date: February 28, 2013Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Sameer JOSHI, Prasad BAGAL, Rajiv WICKREMESINGHE, Richard LONG, Harish NANDYALA, Shie-rei HUANG
-
Publication number: 20120159094Abstract: Techniques are provided for assigning read requests to storage devices in a manner that reduces the likelihood that any storage device will become overloaded or underutilized. Specifically, a read-request handler assigns read requests that are directed to each particular item among the storage devices that have copies of the item based on how busy each of those storage devices is. Consequently, even though certain storage devices may have copies of the same item, there may be times during which one storage device is assigned a disproportionate number of the reads of the item because the other storage device is busy with read requests for other items, and there may be other times during which other storage device is assigned a disproportionate number of the reads of the item because the one storage device is busy with read request for other items.Type: ApplicationFiled: December 21, 2010Publication date: June 21, 2012Applicant: ORACLE INTERNATIONAL CORPORATIONInventors: Willliam H. Bridge, JR., Prasad Bagal, Lavina Jain, Rajiv Wickremesinghe, Darshan Nagarajappa, Richard L. Long