The Datomia® innovation is in the merging of NAS technology and object storage. In Datomia® storage, every file is also an object, with a unique ID. It has the ability to be accessed from any application, from any geographic location and from any public or private storage provider, with simple HTTPS protocolprotocols, regardless of the same object being filed in a sub-folder on the NAS file system. This provides enterprise applications with a multi-vendor storage solution that has all benefits of object storage.
Traditional NAS storage offers very good performance. However, it produces too much replicated data, and it has very demanding infrastructure requirements, such as stacks of SSDs, Flash Drives and other dedicated hardware to provide performance.
Object storage is much simpler. The data is secure, and it may be dispersed (although, even with erasure coding, it will require an additional 60% data duplication for disaster recovery). However, you cannot replace a NAS with an object store. Object storage is missing the basic protocols, interfaces and hierarchical structure of NAS storage systems. It therefore This means it requires complicated integration scenarios with existing enterprise applications.
Erasure-Coded Object Storage Underneath
Datomizer™ Datomizer® is the trademark for Datomia's ®’s distributed, scalable, fault-tolerant and highly available cloud vault storage product. The Datomizer® NAS appliances have erasure-coded object storage underneath, similar to the differentiated cloud storage solutions provided by AmpliData, Cleversafe and SwiftStack.
Object storage has become a viable alternative to scale-out network-attached storage (scale-out NAS), because of its unlimited scalability, lower emphasis on processing and high-capacity networks, access via Internet protocols (rather than storage commands), custom metadata and off-the-shelf component compatibility.
The user has the choice of storage providers, including on-site, and they can switch between them at will. Unlike solutions offered by individual cloud providers, Datomia® lets you mix storage nodes from multiple vendors. This means that, even Even if a governing body pressured a cloud storage provider to relinquish all data, the data contained within Datomizer's ®’s Data AtomsTM could not be reconstructed without access to the locally installed NAS Vault.
The Block and File System Storages It Uses Are Both Mature and Proven Technologies
Datomia® enhances block and file system storage to meet the needs of an increasingly distributed and cloud-enabled computing ecosystem.
With block-based storage, blocks on disks are accessed via low-level storage protocols, such as SCSI commands, with little overhead and no additional abstraction layers. It's the fastest way to access data on disks. All higher-level tasks, such as multi-user access, sharing, locking and security, are usually deferred to operating systems. In other words, block-based storage takes care of all the low-level plumbing, but it depends on higher level applications for everything else.
High Performance and Secure Erasure Coding
In order to implement erasure coding for the application of Datomia® has created its own erasure codec for implementing very secure cloud NAS storage with a simplistic simple file system, Datomia has created its own erasure codec. This is the component responsible for the slicing of information across a number of storage nodes.
The structure of the erasure code is optimized to the user’s preferences
This structure provides erasure coding with flexible parameters. Users can manage storage efficiency, data protection against failures, network traffic and CPU utilization. To ensure the lowest latency, Datomia®’s erasure codec distributes network traffic, in conjunction with a special method for load balancing.
Datomia®’s codec configures an erasure correcting code from component codes of smaller lengths
Datomia® created a library of component codes, consisting of the best maximum distance separable (MDS) codes (such as Reed-Solomon), and codes with low encoding/decoding complexity (such as optimal binary linear codes).
Storage efficiency is enhanced by using MDS component codes. Network traffic and computational complexity are reduced by using linear codes over small finite fields. The number of component codes within the configured erasure correcting code depends on the number of available storage nodes; this is determined by the vault’s structure.
A High Performance, Software-Only Solution
Most other algorithms are limited in their ability to change the number of storage repositories that the system can use. Datomia® is different. Its erasure codec has an improved performance algorithm for data processing. Datomia's ®’s codec maximizes IOPS ratio by using concurrency and parallel processing. This avoids the intensive CPU utilization and latency, which are common problems with erasure coding in many of today's today’s erasure coding-based solutions. This is why Datomia As a result, Datomia® can be software only and does not need to have doesn’t require a hardware device for encoding files or . It also avoids operational limitations within datacenters.
Datomia® also combines smaller 4K4KB-123K 128KB blocks into bigger slices, in order to which significantly optimize optimizes and increase increases overall performance. In practice, this means the Datomia® codec requires far less processing power than the dedicated nodes of a Cleversafe, and it is far easier to deploy.
Higher Levels of Security
In order to To achieve higher levels of security (and protect customer's customer’s data from unauthorized access and theft), the Datomia® erasure codec completely mixes and hides the customer's customer’s original data. This is while operating within public or private cloud premises.
The degree of data mixture is selected according to user preferences. The mixture degree is typically the smallest number of storage nodes that need to be accessed in order to reconstruct the chosen amount of original user’s data. Higher mixture degrees correspond to higher levels of data protection against unauthorized access and higher data retrieval complexity.