Patents by Inventor Xue Qiang Zhou

Xue Qiang Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10095416
    Abstract: A method for optimizing data storage based on application feedback includes receiving, by a storage system from an application, an I/O request associated with particular data residing on the storage system. The storage system processes the I/O request and returns a response to the application. The application analyzes the I/O and sends feedback to the storage system indicating whether I/O performance associated with the I/O request was acceptable. In the event the I/O performance was not acceptable, the storage system automatically adjusts an algorithm for placing the particular data on storage tiers of the storage system. This may include, for example, adjusting a decision window over which I/O activity to the particular data is measured, adjusting a weight of the particular data, adjusting a priority of the particular data within a migration queue, or the like. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: September 27, 2016
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Patent number: 10078662
    Abstract: A method and computer system for data storage in a network including receiving, from a user device, a target data to be stored, determining an application associated with the target data in the user device, obtaining a storage pattern generated by monitoring a historical data, the storage pattern indicating storage characteristics of the historical data, the historical data being associated with the application, and controlling a storage of the target data in a network based on the storage pattern.
    Type: Grant
    Filed: October 20, 2015
    Date of Patent: September 18, 2018
    Assignee: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Publication number: 20180260146
    Abstract: A method for managing data replicated by an asynchronous copy service. The method includes a computer processor identifying a set of information associated with an element of data stored in an I/O queue. The method further includes modifying an order to transmit elements of data in the I/O queue based, at least in part, on the identified set of information associated with the element of data in the I/O queue. The method further includes transmitting one or more elements of data in the I/O queue, to a secondary storage location that is network accessible, based at least in part on the order to transmit elements of data in the I/O queue.
    Type: Application
    Filed: March 10, 2017
    Publication date: September 13, 2018
    Inventor: Xue Qiang Zhou
  • Publication number: 20180260149
    Abstract: A method for managing data replicated by an asynchronous copy service. The method includes a computer processor identifying a set of information associated with an element of data stored in an I/O queue. The method further includes modifying an order to transmit elements of data in the I/O queue based, at least in part, on the identified set of information associated with the element of data in the I/O queue. The method further includes transmitting one or more elements of data in the I/O queue, to a secondary storage location that is network accessible, based at least in part on the order to transmit elements of data in the I/O queue.
    Type: Application
    Filed: December 27, 2017
    Publication date: September 13, 2018
    Inventor: Xue Qiang Zhou
  • Patent number: 10044556
    Abstract: Performance-degrading hardware components in computer storage systems are identified. A timed-out input/output (I/O) operation is detected. Hardware components that include a plurality of types of hardware components involved with the timed-out I/O operation are identified. Involve counts of the hardware components are increased. A plurality of suspicious hardware components are identified based, at least in part, on a hardware hierarchy including one or more types of hardware components. There is at most one suspicious hardware component for each type of hardware component. A performance-degrading hardware component is identified from among the plurality of suspicious hardware components based, at least in part, on the involve counts and the hardware hierarchy. The performance-degrading hardware component is in a layer of the hardware hierarchy that is lower than layers including other suspicious hardware components.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: August 7, 2018
    Assignee: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Publication number: 20180203611
    Abstract: A method for optimizing data storage for write-in-free-space workloads is disclosed. In one embodiment, such a method includes receiving a write request to write an updated version of data to a new block address in free space. The new block address maps to a destination extent. The method further determines an old block address, mapping to a source extent, storing a previous version of the data. The method determines whether the source extent is the same as the destination extent. If the source extent is not the same as the destination extent (i.e., the old block address and new block address point to blocks in different extents), the method transfers temperature statistics associated with the old block address from the source extent to the destination extent. The method writes the updated version of the data to the new block address. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: January 19, 2017
    Publication date: July 19, 2018
    Applicant: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Publication number: 20180145894
    Abstract: A method for determining path health to conduct a plurality of Input-Output (IO) operations along a healthy path in a network is provided. The present invention may include receiving an IO request from a user and sending the received IO request on a first path. The present invention may include determining a first IO response has exceeded a threshold time on the first path. The present invention may include determining the first path has degraded based on the exceeded threshold time. The present invention may include generating a duplicate IO request and sending on a second path. The present invention may include receiving the duplicated IO response before receiving the original IO response. The present invention may include determining a health state associated with the slower path. The present invention may include refreshing a path state machine based on the determined health state associated with the slow path.
    Type: Application
    Filed: February 9, 2018
    Publication date: May 24, 2018
    Inventor: Xue Qiang Zhou
  • Publication number: 20180136981
    Abstract: Embodiments of the present disclosure relate to a new approach for workload balancing in a system. A computer-implemented method comprises obtaining a configuration of a system, wherein the configuration includes a connection relationship between components in the system. The method further comprises determining a workload threshold of a given component in the components based on the configuration, wherein a workload threshold of an upstream component of the given component is associated with a workload limit of the upstream component and a workload limit of the given component. The method further comprises determining a utilization rate of the given component based at least partially on a workload amount of the given component, the workload threshold of the given component, and the workload threshold of the upstream component.
    Type: Application
    Filed: November 17, 2016
    Publication date: May 17, 2018
    Applicant: International Business Machines Corporation
    Inventors: Nicolas M. Clayton, Shan Fan, Yongjie Gong, Yang Liu, Xue Qiang Zhou
  • Publication number: 20180123923
    Abstract: A method for determining path health to conduct a plurality of Input-Output (IO) operations along a healthy path in a network is provided. The present invention may include receiving an IO request from a user and sending the received IO request on a first path. The present invention may include determining a first IO response has exceeded a threshold time on the first path. The present invention may include determining the first path has degraded based on the exceeded threshold time. The present invention may include generating a duplicate IO request and sending on a second path. The present invention may include receiving the duplicated IO response before receiving the original IO response. The present invention may include determining a health state associated with the slower path. The present invention may include refreshing a path state machine based on the determined health state associated with the slow path.
    Type: Application
    Filed: October 27, 2016
    Publication date: May 3, 2018
    Inventor: Xue Qiang Zhou
  • Publication number: 20180088803
    Abstract: A method for optimizing data storage based on application feedback includes receiving, by a storage system from an application, an I/O request associated with particular data residing on the storage system. The storage system processes the I/O request and returns a response to the application. The application analyzes the I/O and sends feedback to the storage system indicating whether I/O performance associated with the I/O request was acceptable. In the event the I/O performance was not acceptable, the storage system automatically adjusts an algorithm for placing the particular data on storage tiers of the storage system. This may include, for example, adjusting a decision window over which I/O activity to the particular data is measured, adjusting a weight of the particular data, adjusting a priority of the particular data within a migration queue, or the like. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: September 27, 2016
    Publication date: March 29, 2018
    Applicant: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Publication number: 20180091360
    Abstract: Method, system and computer program product are disclosed for error recovery process. The method comprises: detecting an event of error in a computer system having a plurality of components; obtaining a QoS requirement for the event; determining a strategy for error recovery process based on the obtained QoS requirement; and executing an error recovery process for the event based on the determined strategy for error recovery process.
    Type: Application
    Filed: September 27, 2016
    Publication date: March 29, 2018
    Inventors: Chuan Li, Xue Qiang Zhou
  • Publication number: 20180088837
    Abstract: A method to optimize primary and secondary read cache in a data replication environment includes determining contents of a primary read cache at a primary site. The method updates a primary cache map describing the contents and transmits the primary cache map from the primary site to a secondary site. At the secondary site, the method uses the primary cache map to substantially synchronize a secondary read cache with the primary read cache. The method further monitors for updates to the primary read cache and updates the primary cache map accordingly. When a difference between a current primary cache map and a previously transmitted primary cache map reaches a threshold, the method transmits the current primary cache map from the primary site to the secondary site. A corresponding system and computer program product are also disclosed.
    Type: Application
    Filed: September 27, 2016
    Publication date: March 29, 2018
    Applicant: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Publication number: 20170371566
    Abstract: A computer-implemented method, computer program product and system for dynamic granularity of a data storage by identifying tiers of data including units of data with a unit heat index, corresponding to an activity level metric and identifying a tier heat index for each of the tiers of data corresponding to an average of the unit heat index for the units of data within the tiers of data. Furthermore determining a granularity index based on a size of the units of data; calculating a pairing index by comparing the unit heat indexes from the corresponding tiers of data and calculating an efficiency index by comparing the unit heat indexes indicating a percentage of the of units of data within a first tier of data with a higher unit heat index than all of the units of data within a another tier of data with a lower tier heat index.
    Type: Application
    Filed: June 27, 2016
    Publication date: December 28, 2017
    Inventor: Xue Qiang Zhou
  • Publication number: 20170357542
    Abstract: The present disclosure relates to a method and an apparatus for failure detection in a storage system. One embodiment provides a method for failure detection in a storage system. The method includes determining an amount of data received by a plurality of switches in the storage system within a predetermined time window so as to obtain a plurality of data amounts; determining a count of check errors detected by the plurality of switches in the data to obtain a plurality of check error counts; and calculating a failure risk for the plurality of switches based on the plurality of data amounts and the plurality of check error counts. Another embodiment of the present invention provides a corresponding apparatus.
    Type: Application
    Filed: August 29, 2017
    Publication date: December 14, 2017
    Inventors: Xue Qiang Zhou, Jing Zhang
  • Patent number: 9760419
    Abstract: The present disclosure relates to a method and an apparatus for failure detection in a storage system. One embodiment provides a method for failure detection in a storage system. The method includes determining an amount of data received by a plurality of switches in the storage system within a predetermined time window so as to obtain a plurality of data amounts; determining a count of check errors detected by the plurality of switches in the data to obtain a plurality of check error counts; and calculating a failure risk for the plurality of switches based on the plurality of data amounts and the plurality of check error counts. Another embodiment of the present invention provides a corresponding apparatus.
    Type: Grant
    Filed: October 21, 2015
    Date of Patent: September 12, 2017
    Assignee: International Business Machines Corporation
    Inventors: Xue Qiang Zhou, Jing Zhang
  • Patent number: 9632871
    Abstract: A problematic disk within a Redundant Array of Independent Disks (RAID) data storage system can be reused. A first disk within the RAID data storage system can be formatted, initialized, and validated in response to the first disk experiencing a recoverable data storage error. The first disk can be designated as a second-level redundant disk within the RAID data storage system in order for the RAID data storage system to access the first disk in response to success of the validating operation on the first disk. Problematic disks experiencing media errors and/or slow disk errors can be isolated from the RAID data storage system to ensure high reliability of the RAID system.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: April 25, 2017
    Assignee: International Business Machines Corporation
    Inventor: Xue Qiang Zhou
  • Publication number: 20160380806
    Abstract: Performance-degrading hardware components in computer storage systems are identified. A timed-out input/output (I/O) operation is detected. Hardware components that include a plurality of types of hardware components involved with the timed-out I/O operation are identified. Involve counts of the hardware components are increased. A plurality of suspicious hardware components are identified based, at least in part, on a hardware hierarchy including one or more types of hardware components. There is at most one suspicious hardware component for each type of hardware component. A performance-degrading hardware component is identified from among the plurality of suspicious hardware components based, at least in part, on the involve counts and the hardware hierarchy. The performance-degrading hardware component is in a layer of the hardware hierarchy that is lower than layers including other suspicious hardware components.
    Type: Application
    Filed: June 23, 2015
    Publication date: December 29, 2016
    Inventor: Xue Qiang Zhou
  • Publication number: 20160170819
    Abstract: The present disclosure relates to a method and an apparatus for failure detection in a storage system. One embodiment provides a method for failure detection in a storage system. The method includes determining an amount of data received by a plurality of switches in the storage system within a predetermined time window so as to obtain a plurality of data amounts; determining a count of check errors detected by the plurality of switches in the data to obtain a plurality of check error counts; and calculating a failure risk for the plurality of switches based on the plurality of data amounts and the plurality of check error counts. Another embodiment of the present invention provides a corresponding apparatus.
    Type: Application
    Filed: October 21, 2015
    Publication date: June 16, 2016
    Inventors: Xue Qiang Zhou, Jing Zhang
  • Publication number: 20160154837
    Abstract: A method and computer system for data storage in a network including receiving, from a user device, a target data to be stored, determining an application associated with the target data in the user device, obtaining a storage pattern generated by monitoring a historical data, the storage pattern indicating storage characteristics of the historical data, the historical data being associated with the application, and controlling a storage of the target data in a network based on the storage pattern.
    Type: Application
    Filed: October 20, 2015
    Publication date: June 2, 2016
    Inventor: Xue Qiang Zhou
  • Publication number: 20150309876
    Abstract: The present disclosure discloses a method and system for reuse of a problematic disk in a Redundant Array of Independent Disks (RAID) system. The method includes performing formatting, initializing and validating operations on a first disk in the RAID system in response to the first disk experiencing a problem and determining that is not a hard error. The method may also include setting the first disk as a second-level redundant disk in the RAID system in order for the RAID system to use the first disk again in response to success of the validating operation on the first disk. The method and the system can enable the problematic disks isolated out of the system due to media errors and/or slow disk errors in the high-end RAID storage to be reused by the RAID system under the precondition of ensuring the reliability of the system.
    Type: Application
    Filed: March 10, 2015
    Publication date: October 29, 2015
    Inventor: Xue Qiang Zhou