Julian Satran’s research while affiliated with IBM and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (44)


Enhanced direct memory access
  • Patent
  • Full-text available

February 2015

·

58 Reads

·

Shmuel Ben-Yehuda

·

Zorik Machulsky

·

[...]

·

III Thomas Basil Smith

A method for facilitating direct memory access in a computing system in response to a request to transfer data is provided. The method comprises selecting a thread for transferring the data, wherein the thread executes on a processing core within the computing system; providing the thread with the request, wherein the request comprises information for carrying out a data transfer; and transferring the data according to the request. The method may further comprise: coordinating the request with a memory management unit, such that virtual addresses may be used to transfer data; invalidating a cache line associated with the source address or flushing a cache line associated with the destination address, if requested. Multiple threads can be selected to transfer data based on their proximity to the destination address.

Download

System, method and computer program product for inviting other virtual machine to access a memory space allocated to a virtual machine

November 2014

·

19 Reads

A method for accessing a memory space allocated to a virtual machine, the method includes: receiving a request from the virtual machine to generate, for another virtual machine, a memory credential associated with a certain memory space allocated to the virtual machine; generating, in response to the request, a cryptographically signed credential; sending the cryptographically signed credential to the other virtual machine; receiving from the other virtual machine an access request to access at least one memory entry within the certain memory space; and accessing the at least one memory entry, if the access request complies with the memory credential.


Object based storage system and method of operating thereof

October 2014

·

13 Reads

A method and a storage system for managing logical objects, wherein the storage system includes a plurality of control servers and the method includes: (i) defining a plurality of object pools and associating each logical object, hosted in the storage system, with one of the plurality of object pools; (ii) configuring each control server to have a primary responsibility over at least two of the object pools, such that each object pool is controlled by one primary control server, configured to handle requests directed to logical objects associated with the object pool; and (iii) in response to a failure of one of the plurality of control servers, configuring each operational server of the plurality of control servers to take over primary responsibility for at least one object pool, originally defined under the primary responsibility of the failed control server.


Avoiding duplication of data units in a cache memory of a storage system

October 2014

·

17 Reads

According to the teaching disclosed herein there is provided at least a method, system and device for managing a cache memory of a storage system. The storage system is associated with at least one physical storage device and, responsive to a read request, comprising information indicative of a logical address of at least one requested data unit, to obtain a storage physical address associated with the logical address, search the cache memory for a data unit associated with the storage physical address and service the request from the cache in case the data unit is found in the cache memory.


Mass data storage system and method of operating thereof

July 2014

·

10 Reads

There are provided a mass storage system comprising a control layer operatively coupled to a physical storage space and operable to interface with one or more clients and to present to said clients a plurality of logical volumes. The method of operating the storage system comprises: dividing one or more logical volumes into a plurality of statistical segments with predefined size; assigning to each given statistical segment a corresponding activity level characterizing statistics of I/O activity with regard to data portions within the given statistical segment, said statistics collected over a plurality of cycles of fixed counting length; and managing one or more data storage processes in the storage system (e.g. a background defragmentation process, a background garbage collection process, a destage management process, etc.) using said activity level.


Policy-driven capacity management in resource provisioning environments

May 2014

·

8 Reads

Systems and methods for policy-driven capacity management in a resource provisioning environment, the method comprising storing, in an operational database one or more virtual resource sets (VRSs) and elasticity ranges for components to be deployed in a resource provisioning environment, and probabilistic guarantees on the elasticity ranges defined in a service manifest provided by a service subscriber; collecting historical data about capacity usage in the resource provisioning environment and failure statistics from the operational database, in addition to prior service commitments due to previously contracted service level agreements (SLAs) stored in a SLA repository; calculating equivalent capacity for the resource provisioning environment based on a defined residual benefit goal, and other business goals instrumented by way of a policy engine; and placing requested virtual resources on physical resources, in response to determining that sufficient physical capacity is available to host the calculated equivalent capacity.


Memory protection and security using credentials

February 2014

·

11 Reads

A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory.


Cluster-wide read-copy update system and method

January 2014

·

4 Reads

·

1 Citation

A system, method and computer program product for synchronizing updates to shared mutable data in a clustered data processing system. A data element update operation is performed at each node of the cluster while preserving a pre-update view of the shared mutable data, or an associated operational mode, on behalf of readers that may be utilizing the pre-update view. A request is made for detection of a grace period, and grace period detection processing is performed for detecting when the cluster-wide grace period has occurred. When it does, a deferred action associated with the update operation it taken, such as removal of a pre-update view of the data element or termination of an associated mode of operation.


Managing communication between nodes in a virtual network

December 2013

·

11 Reads

A method for managing communication between nodes in a virtual network is provided. A first computing system utilizes first information to forward first data to the second computing system in a physical network. If the first information is incorrect, the second computing system forwards an unlearning request to the first computing system, and the first computing system updates or deletes the first information. If the first information is not available, the first computing system forwards the first data to a group of computing systems in the physical network by way of an unknown network service. Upon receiving the first data, the second computing system or a third computing system in the physical network forwards a learning request to the first computing system, and the first computing system utilizes the learning request to generate the first information.


Concurrent access to a single disk track by combining reads and writes to a disk with a mask

June 2013

·

6 Reads

A storage system, a disk controller, a disk drive and a method of operating thereof. The method includes: configuring a disk drive in a manner enabling executing one or more read requests concurrently with executing one or more write requests addressed to the same data track of the disk drive; responsive to a received write request addressed to a certain track of the disk drive, identifying with the help of the control layer one or more read requests concurrent to received write request and addressed to the same track; if the received write request and the identified one or more read requests match a predefined criterion, generating and issuing, with the help of the control layer, a command to the disk drive for executing a single task corresponding to the concurrent read and write requests combined in accordance with a certain mask.


Citations (28)


... Object-based network storage systems, which leverage the strengths of DAS (Direct Attached Storage), NAS (Network Attached Storage), and SAN (Storage Area Network) into a single framework, have the potential to provide high system performance, scalability, robust data security, and easy data sharing across multiple platforms [2,12,21,22]. By decoupling the metadata access from data access and enabling the object-based storage devices (OSDs) more intelligence (e.g., self-management, self-optimization, and QoS provision), the object-base network storage system is emerging as a new network storage paradigm. ...

Reference:

WPAR: A Weight-Based Metadata Management Strategy for Petabyte-Scale Object Storage Systems
Object Store Based SAN File Systems
  • Citing Article
  • January 2004

... We propose using rate-based flow control instead of the slow-start and congestion avoidance for TCP [15]. We plan to modify the selective negative acknowledgment (SNACK) approach of iSCSI [1] for error control, instead of using ARQ of TCP. Furthermore, we add the option of integrating RAID as one of the protocol functions. ...

Ietf internet draft draft-ietf-ips-iscsi-14
  • Citing Article

... Lately, there have been other attempts at developing distributed filesystems. For example, there is the zFS filesys- tem [14] (the successor to the DSF project [8]) that makes use of transactions and a lease-based scheme to provide consistency in the presence of concurrent file access. The primary difference between zFS and our system is that our approach uses a group communication protocol to guarantee consistency. ...

DSF - DATA SHARING FACILITY

... Network Stack as a Service. IsoStack [76], ZygOS [67], TAS [33], NetKernel [54], FreeFlow [34], and RoUD [21] use dedicated CPU cores to construct an efficient and low latency network stack. Snap [47] is an industry framework proposed by Google and provided in a general-purpose, multi-tenant cloud environment. ...

IsoStack: highly efficient network processing on dedicated cores

... [9] proposes intrusion detection techniques at the SAN target level. Unfortunately, the introspection they do at the SAN-level leads to interference within the SAN controller's I/O path [10]. IDStor [10] avoids this problem through a network-based intrusion detection approach. ...

Block storage listener for detecting file-level intrusions