Method and device for data replication

ABSTRACT

There is provided a method and device for data replication. The method comprises: obtaining, in a network interface card, data segments by segmenting input first data; determining, in the network interface card, fingerprints corresponding to the data segments; and comparing, in a central processing unit, the fingerprints of the data segments with existing fingerprints corresponding to processed data segments, and determining, based on a result of the comparing, whether to de-duplicate the data segments corresponding to the fingerprints, to perform the data replication.

RELATED APPLICATIONS

This application claim priority from Chinese Patent Application NumberCN201511023162.8, filed on Dec. 30, 2015 at the State IntellectualProperty Office, China, titled “METHOD AND DEVICE FOR DATA REPLICATION”the contents of which is herein incorporated by reference in itsentirety.

FIELD

The present disclosure generally relates to the field of storage, andmore specifically, relates to a method and device for data replication.

BACKGROUND

In a data storage device, for example a data replication product DATADOMAIN of the EMC corporation, prior to replicating a large amount ofdata to the storage device (such as a disk), a duplicate data removingoperation is firstly required, which is also named as de-duplication, toreplicate updated portions in the large amount of data to the storagedevice, thereby saving storage space.

However, in such a data storage device, relevant operations includingthe de-plication, such as data segmentation, compression/decompression,encryption/decryption, or the like, are all performed by a centralprocessing unit (CPU). Hence, a network interface card (NIC/FC)connecting the large amount of data to be replicated and the storagedevice conventionally does not have any programming functions. Thoughthe above operation for data replication may be performed through theCPU, this CPU-based solution often occupies a large amount of CPUresources and results in a lower performance per unit power output (forexample, the performance per Watt), and besides, the CPU does not haveany advantages in certain single-threaded processing as compared tohardware devices, such as a field programmable gate array (FPGA), or thelike.

Dedicated hardware for performing the above operation (for example,Application Specific Integrated Circuit, ASIC) may be used to replacethe CPU to perform the above mentioned operation. Although such kind ofdedicated hardware-based solution may achieve a higher performance perunit power output, the extendibility or the design flexibility of thededicated hardware-based network interface card are dramaticallyrestrained due to difficulty for changing the hardware.

SUMMARY

In order to solve the above problem, the embodiments of the presentdisclosure provide a network interface card-based, particularly forexample, method for data replication of a FPGA-based network interfacecard and a device thereof.

A first aspect of the present disclosure provides a method for datareplication, comprising: obtaining, in a network interface card, datasegments by segmenting input first data; determining, in the networkinterface card, fingerprints corresponding to the data segments; andcomparing, in a central processing unit, the fingerprints of the datasegments with existing fingerprints corresponding to processed datasegments, and determining, based on a result of the comparing, whetherto de-duplicate the data segments corresponding to the fingerprints, toperform the data replication.

According to embodiments of the present disclosure, the networkinterface card is configured as a field programmable gate array(FPGA)-based network interface card.

Since some operations particularly suitable to be performed by thenetwork interface card, such as data segmentation, etc., are changed tobe performed in the network interface card, the CPU resource utilizationis reduced, thereby realizing optimization of the overall costperformance and the power performance ratio.

According to embodiments of the present disclosure, determining, in thenetwork interface card, fingerprints (FPs) corresponding to the datasegments comprises: determining, in the network interface card, thefingerprints corresponding to the data segments based on a secure hashalgorithm SHA1.

It should be indicated that the advantages of replacing the data segmentwith the fingerprint lie in that only a few bytes (for example, thefingerprint output by the SHA1 algorithm only have 16 bytes) are used torepresent a data segment, such that it is not necessary to compare eachdata segment with the existing data segments byte by byte during thefollowing de-duplication, and only the fingerprint representing thecorresponding data segment and having a few bytes is compared with theexisting fingerprints. Though the fingerprint obtained through forexample the SHA1 algorithm loses an amount of information, there causesa quite low error rate due to a sophisticated design of the algorithmwhen the fingerprint obtained through the algorithm is used to performthe following de-duplication judgment. This remarkably reducescalculation complexity of the CPU.

According to embodiments of the present disclosure, the methodcomprises, prior to segmenting the first data, obtaining, throughprotocol processing, the first data from a data packet entering into thenetwork interface card.

The protocol processing operation allows extraction of correspondingoriginal data from a data packet input through different interfaces,such as a network interface card interface (NIC) or a fiber channelinterface (FC), and the like, for the subsequent segment processing.

According to embodiments of the present disclosure, comparing, in acentral processing unit, the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermining, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints comprises: if afingerprint matches with any of the existing fingerprints,de-duplicating, by the central processing unit, the data segmentcorresponding to the fingerprint.

According to embodiments of the present disclosure, comparing, in acentral processing unit, the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermining, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints comprises: if afingerprint matches with none of the existing fingerprints, determining,by the central processing unit that the data segment corresponding tothe fingerprint is a data segment unable to be de-duplicated; andcompressing, in the network interface card, the data segment unable tobe de-duplicated.

The in-line de-duplication performed prior to replicating the data tothe storage device efficiently reduces occupancy of the duplicate datain the storage space.

Optionally, the method may comprises: encrypting the compressed datasegment in the network interface card.

According to embodiments of the present disclosure, the method furthercomprises: after determining the fingerprints corresponding to the datasegments, writing the fingerprints together with the data segmentscorresponding to the fingerprints from the network interface card to afirst cache.

According to embodiments of the present disclosure, the method furthercomprises: prior to comparing the fingerprints with the existingfingerprints, reading, by the central processing unit, the fingerprintsfrom a first cache.

According to embodiments of the present disclosure, the method furthercomprises: after comparing the fingerprints with the existingfingerprints, reading, by the central processing unit, from a firstcache the data segment unable to be de-duplicated for used incompressing in the network interface card.

The use of one or more first caches accelerates the speed of the centralprocessing unit for reading and writing (110) the data to be replicatedand processed via the network interface card.

According to embodiments of the present disclosure, the method mayfurther comprise: after the compressing or the encrypting, writing intoa second cache the data segment compressed or encrypted in the networkinterface card.

A second aspect of the present disclosure provides a device for datareplication, comprising: a network interface card configured to: obtaindata segments by segmenting input first data, and determine fingerprintscorresponding to the data segments; and a central processing unitconfigured to: compare the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermine, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints, to perform the datareplication.

According to embodiments of the present disclosure, the networkinterface card is configured as a field programmable gate array(FPGA)-based network interface card.

According to embodiments of the present disclosure, the networkinterface card is further configured to: determine the fingerprintscorresponding to the data segments based on a secure hash algorithm.

According to embodiments of the present disclosure, the networkinterface card is further configured to: prior to segmenting the firstdata, obtain, through protocol processing, the first data from a datapacket entering into the network interface card.

According to embodiments of the present disclosure, the centralprocessing unit is further configured to: if a fingerprint matches withany of the existing fingerprints, de-duplicate the data segmentcorresponding to the fingerprint.

According to embodiments of the present disclosure, the centralprocessing unit is further configured to, if a fingerprint matches withnone of the existing fingerprints, determine that the data segmentcorresponding to the fingerprint is a data segment unable to bede-duplicated; and the network interface card is further configured tocompress the data segment unable to be de-duplicated.

According to embodiments of the present disclosure, the networkinterface card is further configured to: encrypt the compressed datasegment.

According to embodiments of the present disclosure, the networkinterface card is further configured to: after determining thefingerprints corresponding to the each data segments, write thefingerprint together with the data segments corresponding to thefingerprints from the network interface card into a first cache.

According to embodiments of the present disclosure, the centralprocessing unit is further configured to: prior to comparing thefingerprints with the existing fingerprints, read the fingerprints froma first cache.

According to embodiments of the present disclosure, the centralprocessing unit is further configured to: after comparing thefingerprints with the existing fingerprints, read, from a first cache,the data segment unable to be de-duplicated for use in compressing inthe network interface card.

According to embodiments of the present disclosure, the networkinterface card is further configured to: after the compressing or theencrypting, write, into a second cache, the data segment compressed orencrypted in the network interface card.

A third aspect of the present disclosure provides a computer programproduct for data replication, the computer program product beingtangibly stored on a non-transient computer readable medium andcomprising a machine executable instruction which enables, during beingexecuted, the machine to execute steps of the method according to thefirst aspect.

A fourth aspect of the present disclosure provides a data storage devicefor executing the method for data replication according to the firstaspect.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a flow chart of a method for data replicationaccording to embodiments of the present disclosure.

FIG. 2 illustrates a structure diagram of an FPGA-based system for datareplication according to embodiments of the present disclosure.

FIG. 3 illustrates a block diagram for data duplication according toembodiments of the present disclosure.

DETAILED DESCRIPTION OF EMBODIMENTS

Principles of the present disclosure are described with reference toseveral exemplary embodiments shown in the figures. Although figuresshow preferred embodiments of the present disclosure, it should beappreciated that these embodiments are described only to enable thoseskilled in the art to better understand and implement the presentdisclosure, and not intended to limit the scope of the presentdisclosure in any manner.

FIG. 1 illustrates a flow chart of a method 100 for data duplicationaccording to embodiments of the present disclosure. As shown in FIG. 1,the method 100 comprises the following main steps S110-S130.

In step S110, in the network interface card, data segments are obtainedby segmenting input first data; in step S120, in the network interfacecard, fingerprints corresponding to the data segments are determined;and in step S130, in a central processing unit, the fingerprints of thedata segments are compared with existing fingerprints corresponding toprocessed data segments, and it is determined, based on a result of thecomparing, whether to de-duplicate the data segments corresponding tothe fingerprints.

Preferably, the network interface card may be configured as a fieldprogrammable gate array (FPGA)-based network interface card.

As compared to a CPU and a dedicated integrated hardware device, theFPGA involves a well compromise between the performance per unit poweroutput and extendibility. In other words, the FPGA not only has a betterextendibility than the dedicated integrated hardware device due to itsprogrammable capability on software and hardware, but is highly suitableto perform some particular operations as mentioned above, such as datasegmenting, compression/decompression, encryption/decryption, and theFPGA therefore has the performance per unit power output times more thanthat of the CPU. Thereupon, the network interface card for connectingthe data to be replicated and the storage device, which is realizedusing the FPGA, generally has a better cost performance and an increasedpower performance ratio.

It is seen from the steps of the method 100 as shown in FIG. 1 that, asit can be proved that the step of data segmenting S110 and the step offingerprint determining S120 are particularly suitable for theoperations performed by the network interface card, these steps arecombined to be performed preferably in the network interface card of theFPGA, and the de-duplicating operation S130 still remains to be executedby the CPU because it is more suitable to be executed by the CPU. Thissegmentation in the processing task optimizes the overall costperformance and the power performance ratio.

FIG. 2 illustrates a structure diagram of an FPGA-based system for datareplication according to embodiments of the present disclosure.

Referring to FIG. 2, the steps of the method 100 in FIG. 1 are detailedhereinafter.

According to the embodiments of the present disclosure, the method 100may additionally comprises: prior to segmenting the first data (i.e.,the step S110), obtaining, through protocol processing, the first datafrom a data packet entering into the network interface card.

According to the embodiment shown in FIG. 2, different external datapackets are firstly input via a network interface card interface (NIC)201 or a fiber channel interface (FC) 202 into an FPGA-based networkinterface card 210 depending on different external data sources. As thedata packet input into the network interface card 210 is not originaldata, it subsequently needs to extract the corresponding first data asthe original data from the input data packet through different protocolprocessing to be used in the following data segment processing. Theprotocol processing shown in FIG. 2 includes for example TCP/IP and FCtransmission layer protocol processing 203, and for example applicationlayer protocol processing 204 of a network file system (NFS)/commoninternet file system (CIFS).

After obtaining the first data as the original data, the method thenproceeds to the step S110. At the step S110, the input first data aresegment-processed in the network interface card to obtain a plurality ofdata segments.

According to the embodiment shown in FIG. 2, the first data as theoriginal data are segment-processed through for example an anchoralgorithm, as indicated by a block 205. According to a specificembodiment of the present disclosure, a plurality of data segments afterbeing segment-processed may have different sizes ranging from severalKBs to several GBs.

According to a specific embodiment of the present disclosure, thesegment processing of the first data may be preferably based on variablelengths. It is because that the modification made by a user to a file(for example, the file in a GB magnitude) may be minor, for instance,only several bytes added. In this case, if the fixed-length segmentprocessing is used, all the following data segments without modificationwill be altered accordingly. If the variable-length segment processingis used, only those altered data segments are adaptively drawn theattention and those unaltered data segments are not affected, therebyincreasing the efficiency of de-duplicating.

It should be noted that the present disclosure is not intended to limitthe algorithm for data segment processing, and any data segmentalgorithm should fall into the protection scope of the presentdisclosure.

After obtaining each data segment, the method then proceeds to the stepS120. At the step S120, the fingerprints corresponding to the datasegments is determined in the network interface card.

According to the embodiments of the present disclosure, the step S120may be included in the network interface card to determine acorresponding fingerprint for each data segment based on secure hashalgorithm (SHA1), as indicated by a block 205.

Similarly, the present disclosure is not intended to limit the algorithmfor obtaining a fingerprint, and all algorithms for obtaining afingerprint, besides the SHA1, shall fall into the protection scope ofthe present disclosure, as well.

It should be indicated that the advantages of replacing the datasegments with the fingerprint lie in that only a few bytes (for example,only 16 bytes for the fingerprint output by the SHA1 algorithm) are usedto represent a data segment, such that it is not necessary to compareeach data segment with the existing data segments byte by byte duringthe following de-duplicating operation, and only the fingerprint havinga few bytes and corresponding to the data segment is compared with theexisting fingerprints. Though the fingerprint obtained through forexample the SHA1 algorithm loses an amount of information, the errorrate is quite low due to the sophisticated design of the algorithm whenthe fingerprint obtained through the algorithm is used to perform thefollowing de-duplication judgment. This remarkably reduces calculationcomplexity of the CPU.

According to the embodiments of the present disclosure, the method 100may further comprises: after determining the fingerprints correspondingto the data segments, writing the fingerprints together with the datasegments corresponding to the fingerprints from the network interfacecard to a first cache (for example writing into 231, 232 as shown inFIG. 2), as illustrated by paths indicated with arrows 208 and 209.

Optionally, after obtaining a plurality of data segments and beforedetermining the corresponding fingerprint for each data segment, theplurality of data segments may be written into the first cache 231. Andthen, after determining the corresponding fingerprint for each datasegment, the fingerprint is written from the network interface card intothe first cache 232.

Similarly, the present disclosure is not intended to limit the sequenceof writing the data segment and the fingerprint into the first cache.

According to the embodiment shown in FIG. 2, the first cache comprisesan original data cache 231 for storing original data, and an anchor andfingerprint cache 232 for storing an anchor and a fingerprint. Accordingto the embodiment shown in FIG. 2, the first cache is configured as oneportion of the memory 230. The original data and the fingerprint arewritten into the original data cache 231 and the anchor and fingerprintcache 232 for storing the anchor and the fingerprint, as illustratedrespectively by paths 208 and 209 in FIG. 2.

After obtaining the fingerprint (i.e., the step S120), the method 100then proceeds to the step S130. At the step S130, in the centralprocessing unit, the fingerprints of the data segments are compared withthe existing fingerprints corresponding to processed data segments, andit is determined, based on a result of the comparing, whether tode-duplicate the data segments corresponding to the fingerprints.

According to embodiments of the present disclosure, prior to comparingthe fingerprints with existing fingerprints, the central processing unitfirstly reads the fingerprint from the first cache for the followingcomparison operation, as illustrated by a path indicated with an arrow221.

According to embodiments of the present disclosure, comparing, in acentral processing unit, the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermining, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints comprises: if afingerprint matches with any of the existing fingerprints,de-duplicating, by the central processing unit, the data segmentcorresponding to the fingerprint.

According to one specific embodiment of the present disclosure, allexisting fingerprints may be stored in for example a fingerprint lookuptable, such that the fingerprint corresponding to the data segment to bereplicated can be rapidly compared with the existing data fingerprints.

According to the embodiments of the present disclosure, comparing, in acentral processing unit, the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermining, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints comprises, if afingerprint matches with none of the existing fingerprints, the centralprocessing unit determines that the data segment corresponding to thefingerprint is a data segment unable to be de-duplicated, i.e., theupdated/added data segment indeed needing to be duplicated to thestorage device; and in the network interface card, the data segmentunable to be de-duplicated is compressed, as shown in a dashed box 206.

According to the embodiments of the present disclosure, after comparingthe fingerprints with the existing fingerprints, the central processingunit needs to read from the first cache the data segment unable to bede-duplicated, and sends the same to the FPGA for compressing in thenetwork interface card, as illustrated by a path indicated with an arrow222.

This may also prove that, as compared to the CPU, the FPGA—based networkinterface card is more suitable to perform the compressing/decompressingoperation.

Optionally, the compressed data segment may be encrypted in the networkinterface card, as shown in a dashed box 207.

According to the embodiments of the present disclosure, after thecompressing operation 206 or the optional encrypting operation 207, thedata segment compressed or encrypted in the network interface card iswritten into the second cache, as illustrated by a path indicated withan arrow 223.

According to embodiments shown in FIG. 2, the second cache is forexample a compressed data cache 233 for storing compressed data.According to the embodiment shown in FIG. 2, the second cache is alsoconfigured as a part of the memory 230.

It is seen from the embodiment shown in FIG. 2 that, as compared to atraditional network interface card, the FPGA-based network interfacecard design only introduces additional traffic of the anchor, thefingerprint, and the compressed data in PCIe bus.

FIG. 3 illustrates a block diagram 300 of a device for data duplicationaccording to embodiments of the present disclosure. The device 300 maycomprise the following main devices: data segmenting unit 310 forobtaining, in a network interface card, data segments by segmentinginput first data; fingerprint determining unit 320 for, determining, inthe network interface card, fingerprints corresponding to the datasegments; and de-duplication determining unit 330 for, comparing, in acentral processing unit, the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermining, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints, to perform the datareplication.

According to embodiments of the present disclosure, the device for datareplication comprises: a network interface card configured to: obtaindata segments by segmenting input first data, and determine fingerprintscorresponding to the data segments; and a central processing unitconfigured to: compare the fingerprints of the data segments withexisting fingerprints corresponding to processed data segments, anddetermine, based on a result of the comparing, whether to de-duplicatethe data segments corresponding to the fingerprints, to perform the datareplication.

According to embodiments of the present disclosure, the networkinterface card may be configured as a field programmable gate array(FPGA)-based network interface card.

According to embodiments of the present disclosure, the networkinterface card may be further configured to determine the fingerprintscorresponding to the data segments based on a secure hash algorithm.

According to embodiments of the present disclosure, the networkinterface card may be further configured to prior to segmenting thefirst data, obtain, through protocol processing, the first data from adata packet entering into the network interface card.

According to embodiments of the present disclosure, the centralprocessing unit may be further configured to: if a fingerprint matcheswith any of the existing fingerprints, de-duplicate the data segmentcorresponding to the fingerprint.

According to embodiments of the present disclosure, the centralprocessing unit may be further configured to, if a fingerprint matcheswith none of the existing fingerprints, determine that the data segmentcorresponding to the fingerprint is a data segment unable to bede-duplicated; and the network interface card may be further configuredto compress the data segment unable to be de-duplicated. 10079 jAccording to embodiments of the present disclosure, the networkinterface card may be further configured to encrypt the compressed datasegment.

According to embodiments of the present disclosure, the networkinterface card may be further configured to, after determining thefingerprints corresponding to the data segments, write the fingerprinttogether with the data segments corresponding to the fingerprints fromthe network interface card into a first cache.

According to embodiments of the present disclosure, the centralprocessing unit may be further configured to, prior to comparing thefingerprints with the existing fingerprints, read the fingerprints froma first cache.

According to embodiments of the present disclosure, the centralprocessing unit may be further configured to, after comparing thefingerprint with the existing fingerprints, read, from a first cache,the data segment unable to be de-duplicated for use in compressing inthe network interface card.

According to embodiments of the present disclosure, the networkinterface card may be further configured to, after the compressing orthe encrypting, write, into a second cache, the data segment compressedor encrypted in the network interface card.

In conclusion, each embodiment of the present disclosure provides amethod for data replication, comprising: in a network interface card,performing segment-processing on input first data to obtain a pluralityof data segments; in the network interface card, determining acorresponding fingerprint for each data segment; and in a centralprocessing unit, comparing the fingerprint of the each data segment withexisting fingerprints corresponding to the processed data segments oneby one, and determining, based on a comparison result, whether tode-duplicate the data segment corresponding to the fingerprint, toperform data replication. Since some operations particularly suitable tobe performed by the network interface card, such as data segmentation,compression/decompression, encryption/decryption, etc., are changed tobe performed in the network interface card, the CPU resource utilizationis reduced, thereby realizing optimization of the overall costperformance and the power performance ratio. Further, the datareplicating operation performed using the method and the device of thepresent disclosure enables the data to undergo an efficient in-linede-duplicating operation prior to being replicated to the storagedevice, and occupancy of the duplicate data in the storage space iseffectively reduced accordingly.

What are described above are only optional embodiments of the presentdisclosure and not intended to limit the present disclosure. Thoseskilled in the art appreciate that the present disclosure may includevarious modifications and variations. Any modifications, equivalentsubstitutions and improvements within the spirit and principle of thepresent disclosure should all fall within the protection scope of thepresent disclosure.

1. A method for data replication, comprising: obtaining, in a networkinterface card, data segments by segmenting input first data;determining, in the network interface card, fingerprints correspondingto the data segments; and comparing, in a central processing unit, thefingerprints of the data segments with existing fingerprintscorresponding to processed data segments, and determining, based on aresult of the comparing, whether to de-duplicate the data segmentscorresponding to the fingerprints, to perform the data replication. 2.The method according to claim 1, wherein the network interface card isconfigured as a field programmable gate array (FPGA)-based networkinterface card.
 3. The method according to claim 1 or 2, whereindetermining, in the network interface card, fingerprints correspondingto the data segments comprises: determining, in the network interfacecard, the fingerprints corresponding to the data segments based on asecure hash algorithm.
 4. The method according to claim 1, furthercomprising: prior to segmenting the first data, obtaining, throughprotocol processing, the first data from a data packet entering into thenetwork interface card.
 5. The method according to claim 1, whereincomparing, in a central processing unit, the fingerprints of the datasegments with existing fingerprints corresponding to processed datasegments, and determining, based on a result of the comparing, whetherto de-duplicate the data segments corresponding to the fingerprintscomprises: if a fingerprint matches with any of the existingfingerprints, de-duplicating, by the central processing unit, the datasegment corresponding to the fingerprint.
 6. The method according toclaim 1, wherein comparing, in a central processing unit, thefingerprints of the data segments with existing fingerprintscorresponding to processed data segments, and determining, based on aresult of the comparing, whether to de-duplicate the data segmentscorresponding to the fingerprints comprises: if a fingerprint matcheswith none of the existing fingerprints, determining, by the centralprocessing unit, that the data segment corresponding to the fingerprintis a data segment unable to be de-duplicated; and compressing, in thenetwork interface card, the data segment unable to be de-duplicated. 7.The method according to claim 6, further comprising: encrypting thecompressed data segment in the network interface card.
 8. The methodaccording to claim 1, further comprising: after determining thefingerprints corresponding to the data segments, writing thefingerprints together with the data segments corresponding to thefingerprints from the network interface card to a first cache.
 9. Themethod according to claim 6, further comprising: prior to comparing thefingerprints with the existing fingerprints, reading, by the centralprocessing unit, the fingerprints from a first cache.
 10. The methodaccording to claim 6, further comprising: after comparing thefingerprints with the existing fingerprints, reading, by the centralprocessing unit, from a first cache the data segment unable to bede-duplicated for used in compressing in the network interface card. 11.The method according to claim 6, further comprising: after thecompressing or the encrypting, writing into a second cache the datasegment compressed or encrypted in the network interface card.
 12. Adevice for data replication, comprising: a network interface cardconfigured to: obtain data segments by segmenting input first data, anddetermine fingerprints corresponding to the data segments; and a centralprocessing unit configured to: compare the fingerprints of the datasegments with existing fingerprints corresponding to processed datasegments, and determine, based on a result of the comparing, whether tode-duplicate the data segments corresponding to the fingerprints, toperform the data replication.
 13. The device according to claim 12,wherein the network interface card is configured as a field programmablegate array (FPGA)-based network interface card.
 14. The device accordingto claim 12, wherein the network interface card is further configuredto: determine the fingerprints corresponding to the data segments basedon a secure hash algorithm.
 15. The device according to claim 12,wherein the network interface card is further configured to: prior tosegmenting the first data, obtain, through protocol processing, thefirst data from a data packet entering into the network interface card.16. The device according to claim 12, wherein the central processingunit is further configured to: if a fingerprint matches with any of theexisting fingerprints, de-duplicate the data segment corresponding tothe fingerprint.
 17. The device according to claim 12, wherein thecentral processing unit is further configured to, if a fingerprintmatches with none of the existing fingerprints, determine that the datasegment corresponding to the fingerprint is a data segment unable to bede-duplicated; and wherein the network interface card is furtherconfigured to compress the data segment unable to be de-duplicated. 18.The device according to claim 17, wherein the network interface card isfurther configured to: encrypt the compressed data segment.
 19. Thedevice according to claim 12, wherein the network interface card isfurther configured to: after determining the fingerprints correspondingto the data segments, write the fingerprint together with the datasegments corresponding to the fingerprints from the network interfacecard into a first cache.
 20. The device according to claim 17, whereinthe central processing unit is further configured to: prior to comparingthe fingerprints with the existing fingerprints, read the fingerprintsfrom a first cache. 21-24. (canceled)