摘要:
According to one embodiment, a semiconductor device includes an interconnect provided on a first interlayer insulating film covering a semiconductor substrate in which an element is formed, a cap layer provided on the upper surface of the interconnect, and a barrier film provided between the interconnect and a second interlayer insulating film covering the interconnect. The interconnect includes a high-melting-point conductive layer, and the width of the interconnect is smaller than the width of the cap layer. The barrier film includes a compound of a contained element in the high-melting-point conductive layer.
摘要:
According to one embodiment, a method of manufacturing a semiconductor device including forming a metal film on aback surface of a glass substrate which supports a semiconductor substrate on a front surface thereof; forming a metal oxide film by oxidizing the whole or at least a portion of the metal film from the front surface; forming protective film, such as silicon nitride, on the metal oxide film; holding the front surface of the protective film with an electrostatic chuck; and forming a via for electrical connection in the semiconductor substrate while the front surface of the protective film is in contact with by the electrostatic chuck; then using a laser to delaminate the glass substrate from the semiconductor substrate.
摘要:
A computer system to prevent intervention and falsification by setting encrypted transfer between a host computer and a first storage device that provides a virtual volume and between the first storage device and second and third storage devices that provide a real volume corresponding to the virtual volume. A management computer specifies the second and third storage device that provide the real volume corresponding to the virtual volume by providing a volume corresponding to the virtual volume used by a host computer in which encrypted transfer becomes necessary, and setting the encrypted transfer to communication between the first storage device and the second and third storage devices, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer in the first storage device.
摘要:
The present invention provides techniques for creation, operation and management of network-based storage services. Specific embodiments provide improved efficiency of the service management tasks used for designing, operating and accounting the robust and profitable network services, for example. In representative embodiments, techniques for constructing integrated network and storage services are provided. In a specific embodiment, the service comprises of three major service components: virtual private networks (VPN), application servers and storage area networks (SAN). Each of these service components has its own customer identification information, such as VPN identifier for VPN services, process identifier for application servers and logical unit number (LUN) for storage devices.
摘要:
The present invention decreases the burden of operation required for specifying the continuity status and the cause of failure of a network storage device. A host computer accepts the specification of the device identifier, that is an identifier of the network storage device in the host protocol which positions in a higher hierarchy than the network communication protocol, and a volume identifier, that is an identifier of the volume. Then based on the specified device identifier, the host computer specifies the network identifier, that is an identifier of the network storage device in the network communication protocol. And continuity is confirmed in the network communication protocol in which the specified network identifier is the destination. Also continuity is confirmed in the host protocol in which the device identifier is the destination. And the volume specified by the volume identifier is accessed.
摘要:
Disclosed is to prevent an intervention and falsification by setting encrypted transfer between a host computer and a storage device that provides a virtual volume and between the storage device that provides the virtual volume and a storage device that provides a real volume corresponding to the virtual volume. A management computer 1 specifies storage devices 3b and 3c that provide a real volume corresponding to a virtual volume by providing a volume corresponding to the virtual volume used by a host computer 3 in which encrypted transfer becomes necessary, sets the encrypted transfer to communication between a storage device 3a that provides the virtual volume and the specified storage devices 3b and 3c that provide the real volume corresponding to the virtual volume, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer 2 in the storage device 3a that provides the virtual volume.
摘要:
In an IP-SAN, instead of the presence or absence of mount/unmount requests, the actual mount/unmount status of storages is determined by monitoring session information of the storage apparatus and communicated to a mount reservation server. Change of access status is communicated in an accurate and real-time manner to the user terminal or management server that uses disk resources. This solves a problem that stoppage of access cannot be detected when the presence or absence of access to the storage apparatus is determined only by the mount/unmount request. The invention also solves a problem that, when the mounting is broken down due to any failure, a computer requesting to use the disk resources cannot access the disk despite its mount request.
摘要:
In a storage session management system in a storage area network, the session information blocks periodically collected from the storage devices in the network are grouped based on the information indicating the relation between sessions. That is, since a storage session management server in the management system integrally manages constitution information and operation information, when there is a possibility that circumstances such as a failure and the deterioration of performance occur in information devices, a failure notification module displays such circumstances and makes notification of them to a minimum necessary range that is consolidated by a session consolidation module, thereby a storage session can be managed without applying loads on the respective information devices and the network.
摘要:
The object of the present invention is to provide a communication network system that reduces the burden of entering settings for the network system. A service directory server in the communication network system provides unified management of the service information of the service-providing server installed in the network. The service information managed by the service directory server is distributed to the communication nodes either automatically or in response to requests from a communication node. The communication nodes receive packets and, for received packets that are addressed to itself, a service-providing server destination is determined based on the service information provided by the service directory server and the packet is transferred to the server to receive the service.
摘要:
A user terminal sends a resource reservation request message in which time information indicative of time to perform a communication is designated to a switching node to which the self user terminal is linked. The switching node manages a reservation state of each of resources which can be used by the self switching node among resources of a network together with time information indicative of time when a communication using the resource is performed. When the resource reservation request message is received, an unreserved resource is obtained at a time indicated by the time information designated in the resource reservation request message, the obtained resource is reserved, and a resource reservation result notice message indicative of the reservation result is returned to the user terminal. A resource management server is also provided so as to reserve a network resource with a simple operation. The reservation can be performed in consideration of priority and cost of a communication. Reservation information can be always recognized by a client. When resource reservation is failed, an alternative plan is automatically calculated and presented.