摘要:
A method and system for transmitting an application message between nodes of a clustered data processing system is disclosed. According to one embodiment, a method, embodied within a machine-readable medium, is provided according to which a determination is made whether one or more application messages to be transmitted to a first node of a plurality of nodes from a second node of the plurality may be currently transmitted. The method of the described embodiment further includes the processing of the one or more application messages in response to a determination whether the one or more application messages of may be currently transmitted.
摘要:
A method and apparatus for managing a loop network, the loop network (200) including at least one loop (206, 208), a plurality of devices (210) connected to the at least one loop (206, 208) via ports (211, 212), wherein at least two of the devices are initiators (207, 209). The method includes each initiator (207, 209) sending a frame to all other initiators (207, 209) in the loop network (200) identifying any ports (211, 212) which should not be used. Each initiator (207, 209) merges the information from all other initiators (207, 209) with its own information identifying any ports (211, 212) which should not be used resulting in all the initiators (207, 209) generating a single list of ports (211, 212) to be used which is consistent across all the initiators (207, 209). Each initiator (207, 209) applies an algorithm (300) to determine a common set of ports (211, 212) to be used by all the initiators (207, 209) and to balance port accesses across the loop network (200).
摘要:
An apparatus operable with a host and at least first and second data storage for avoiding overwriting of a stored data item in the second data storage by a copy services system is provided. The apparatus includes a storage use analyzer for determining the availability of the second data storage. A copy services requester communicates with the host to receive a request to establish a copy services relationship, using the second data storage as a target data storage. A request blocking and passing component passes the request to establish a copy services relationship using the second data storage as the target data storage, responsive to a positive determination of availability of the second storage. The request blocking and passing component may also block the request responsive to a negative determination of availability of the second data storage.
摘要:
A method, system, and machine-readable medium for providing high-performance lock management for a flash copy image of a region of data in N-way shared storage systems is disclosed. According to one embodiment, a data processing system is provided which comprises a cache to store a copy of metadata specifying a coherency relationship between a region of data and a flash copy image of the region of data, wherein the metadata is subject to one or more lock protocols controlled by an owner storage controller node; and a client storage controller node, coupled with the cache, comprising an input/output performing component to receive a request to perform an input/output operation on at least one of the region of data and the flash copy image of the region of data and to perform the input/output operation utilizing the copy of the metadata.
摘要:
A host data processing system includes a data storage system having a cache memory and a back end storage. In response to a detection of an event failure during an input/output (I/O) request from the host data processing system to the data storage system, the data associated with the I/O request is forwarded to the back end storage data, and a copy of the data associated with the I/O request is sent to the cache memory. A determination is made as to whether or not there is an acknowledgement from the back end storage regarding the receipt of the data associated with the I/O request. If there is an acknowledgement from the back end storage regarding the receipt of the data associated with the I/O request, the data associated with the I/O request is flushed from the cache memory, and the received acknowledgement is routed to the host data processing system.
摘要:
A method for software upgrade in a first node operable in a distributed computing system is disclosed. The method comprises receiving, by a receiving component, a new version of application software and a new version of infrastructure software and installing, by an installation component, the new version of application software and the new version of infrastructure software. A first startup component starts the new version of infrastructure software. A second startup component starts an old version of application software to run with the new version of the infrastructure software. Responsive to an indication from a second node that the new version of application software and the new version of infrastructure software have been installed at the second node, the old version of application software is quiesced by a transition component. The old version is unloaded the new version of application software is loaded.
摘要:
A controller for use at a node of a clustered computer apparatus comprises an exception detection component for detecting an exception raised by a service component at the node; a quiesce component responsive to the exception detection component for quiescing lease-governed activity by the service component prior to termination of a lease; a lease control component responsive to the quiesce component for pre-expiry relinquishing of the lease; and a communication component responsive to the lease control component for communicating the pre-expiry relinquishing of the lease to one or more further nodes of the clustered computer apparatus. The controller may further include a second communication component for receiving a communication indicating the pre-expiry relinquishing of a lease; a second lease control component responsive to the communication to control failure processing; and a second service component to perform a service in place of the service component at the node.
摘要:
An apparatus for data transmission over a network includes a buffer and a timer mechanism for timing an optimum interval (less than the round-trip error response delay) for retransmission of data. A first accessor accesses data in the buffer for transmission and starts a first timeout clock. Second or further accessors of the buffer are responsive to a timeout to access the data, start a timeout clock and attempt to transmit the data on a path avoiding path elements used by prior accessors. A counter increments and decrements a count of the references to the buffer by accessors and signals when the count reaches zero. A memory manager returns the buffer to a free buffer pool responsive to the reference counter signaling that the count has reached zero. An analysis mechanism can be used to determine the optimum interval and tune the timer mechanism.
摘要:
An apparatus, method, and computer program for facilitating disaster recovery of a first computer system, wherein first data residing on a first storage device associated with the first computer system is recoverable from second data residing on a second storage device associated with a second computer system and wherein the second storage device is operable to have an associated state of powered up or powered down. A receiver receives an update operation for updating the second storage device. A processor updates anon-volatile storage means with the update operation, prior to update of the second storage device, wherein the non-volatile storage means is associated with the second computer system.
摘要:
A storage network control apparatus is operable to present virtualized storage to a host system and includes a monitoring component, an analysis component, a detection component, and a migration component. The monitoring component is for monitoring input/output (I/O) activity for virtual storage logical units over time. The analysis component is for identifying a repeating instance of peak I/O activity for a virtual storage logical unit over time and for generating a predictive signature therefrom. The detecting component is for identifying an instance of such a predictive signature. The migration component is responsive to the detecting component, and is for migrating data mapped by the virtual storage logical unit across additional real storage units to improve the I/O performance of the virtual storage logical unit prior to a recurrence of the repeating instance of peak I/O activity. A corresponding logic arrangement may be incorporated in hardware, software or a combination thereof.