摘要:
The disclosure relates to a method and system for creating a virtual array in a physical array. Unassigned whole volumes in at least one physical array are identified. The identified volumes are associated with a first virtual array. Unique names are given to the identified volumes. At least one path is assigned to the first virtual array. The first virtual array may be associated with a second virtual array. Data may be migrated or replicated from the first virtual array to the second virtual array using existing array services.
摘要:
A method apparatus and computer program product for providing access to host attribute information in a storage area network is disclosed. The storage area network is composed of a plurality of hosts coupled to at least one initiator. Each initiator is coupled to one or more targets and each initiator has an associated identifier. In each host, the identifier of the initiator is related to other host attribute information. The identifier may be, for example, a world wide name. The host attribute information including the identifier is sent from each of the plurality of hosts to the one or more targets and stored in memory of an associated storage array. Either a host or requestor remote from the storage array may request the collected host attribute information from the storage array. A topology of the storage area network may then be formed from the host attribute information of each host.
摘要:
A method, apparatus, and computer program product for controlling access to a target device utilizes an initiator identifier to either permit or deny access to a selected portion of the target device. To that end, a message having the initiator identifier is directed from the initiator device to the target device to request access to the selected portion of the target device. Upon receipt by the target device, it is determined if the initiator identifier is in a permitted set of identifiers associated with the selected portion of the target device. If the initiator identifier is in the permitted set, then access to the portion of the target device is permitted and the initiator can access the target in accordance with conventionally known processes.
摘要:
An architecture including a model-based management layer for managing resources and applications, and a method of software and resource management enabled by such an architecture.
摘要:
There is disclosed apparatus and methodology for enhancing computer system data transfer when writing to network attached storage systems employing FC-2 fibrechannel protocol by dynamically reconfiguring a fibrechannel switch in response to map/unmap command controls issued by a disk drive aggregator. The reconfiguration involves fabrication of a dynamic map table having sets of fibrechannel FC-2 header fields and their corresponding new or proxy destination IDs (which correspond to the switch's output ports), and fabrication of both an input frame header buffer for temporary storage purposes and a frame header field selector (which can be a frame header mask) containing only relevant information. The input frame header is temporarily stored in the buffer and the field selector is used to obtain a “distilled” input header which is compared with the dynamic map table of stored header fields to obtain a match. If one of the sets of header fields matches the distilled input header, its corresponding proxy destination or source ID is substituted into the corresponding FC-2 input frame header's destination ID field, whereby write command data transfers are accomplished between host computer and a particular disk drive directly, avoiding the aggregator and latency otherwise introduced by the aggregator. Similar disclosure is provided for read command data.
摘要:
A method apparatus and computer program product for providing access to host attribute information in a storage area network is disclosed. The storage area network is composed of a plurality of hosts coupled to at least one initiator. Each initiator is coupled to one or more targets and each initiator has an associated identifier. In each host, the identifier of the initiator is related to other host attribute information. The identifier may be, for example, a world wide name. The host attribute information including the identifier is sent from each of the plurality of hosts to the one or more targets and stored in memory of an associated storage array. Either a host or requestor remote from the storage array may request the collected host attribute information from the storage array. A topology of the storage area network may then be formed from the host attribute information of each host.