Abstract:
A method and system for starting up a network or network device with particular discussion regarding Fibre Channel networks and switches. The method and system relate to powering on or re-starting a plurality of Fibre Channel switching devices, each of those devices having ports. The system generally calls for the selection of a priority threshold that relates to the importance of tasks in fabric formation. Some embodiments of the system exploit a port authentication procedure to separate the execution of tasks higher in priority than the threshold from tasks lower in priority than the threshold.
Abstract:
The snapshot capability moving into the SAN fabric and being provided as a snapshot service. A well-known address is utilized to receive snapshot commands. Each switch in the fabric connected to a host contains a front end or service interface to receive the snapshot command. Each switch of the fabric connected to a storage device used in the snapshot process contains a write interceptor module which cooperates with hardware in the switch to capture any write operations which would occur to the snapshot data area. The write interceptor then holds these particular write operations until the original blocks are transferred to a snapshot or separate area so that the original read data is maintained. Should a read operation occur to the snapshot device and the original data from requested location has been relocated, a snapshot server captures these commands and redirects the read operation to occur from the snapshot area. If, however, the read operation is directed to the original drive, the read is provided from the original data areas, even if the data had been replaced. The snapshot server determines the existence of particular snapshot devices, allocates their storage locations, provides this information to both the service interfaces and the write interceptors and handles read and write operations to the snapshot device.
Abstract:
A network configuration device or entity has control of defined management and security functions in the network, or in many embodiments, in a Fibre Channel fabric. The network configuration device may control many functions. Foremost, it may control the recognition, operation and succession procedure for network configuration entities. It may also control user configurable options for the network, rules for interaction between other entities in the network, rules governing management-level access to the network, and rules governing management-level access to individual devices in the network. In addition, the network configuration entity may exploit policy sets to implement its control.
Abstract:
The present invention relates to methods for regenerating a single-stranded nucleic acid template following its conversion to a double-stranded product, e.g., during a polymerase reaction, and also to regenerating a hairpin or anchoring sequence by removal of the template and its synthesized complement, by design of enzyme restriction sites into the hairpin or anchoring sequence.
Abstract:
A device comprising an array of molecules immobilised on a solid surface is disclosed, wherein the array has a surface density which allows each molecule to be individually resolved, e.g. by optical microscopy. Therefore, the arrays of the present invention consist of single molecules are more spatially distinct than the arrays of the prior art.
Abstract:
A method for performing block-level incremental backups of file system volumes using a pseudo device layer of a volume manager. A driver associated with a snapshot backup program is configured to back up the full pseudo disk upon receipt of a backup request, and not automatically performed upon startup. Incremental backups are performed thereafter using a driver that has been modified to include a monitor that tracks writes during backups. The standard I/O routine of the kernel is overwritten with an I/O routine that tracks write operations. The volume manager is called back to perform the incremental backup operations upon each write operation. The going down routine of the kernel is also overwritten to track any updates to the volume manager. If the volume manager is updated, the data structure is cleared and future backups are performed from a subsequent full backup.
Abstract:
Copy capability moved into the SAN fabric and provided as a data mover service. A well-known address is utilized to receive copy commands from the hosts. Each switch in the fabric contains a front end or service interface which receives the copy command and manages access control or zoning and LUN mapping. LUN mapping and zoning are based on shared databases. Assuming correct zoning, the service interface will perform any necessary LUN mapping on the received copy command and forward the command to a copy engine to perform the copy operation. The switch service interface also maintains copy operation status, querying the copy engine if necessary, so that any host status requests are also simply handled. Additionally, if multiple copy engines are present, the switches can communicate to perform load balancing.
Abstract:
This invention relates to the identification of modified cytosine residues, such as 5-methylcytosine (5mC), 5-hydroxymethylcytosine (5hmC) and 5-formylcytosine (5fC) to be distinguished from cytosine (C) in a sample nucleotide sequence. Methods may comprise oxidising or reducing a first portion of polynucleotides which comprise the sample nucleotide sequence; treating the oxidised or reduced first portion and a second portion of polynucleotides with bisulfite; sequencing the polynucleotides in the first and second portions of the population following steps ii) and iii) to produce first and second nucleotide sequences, respectively and; identifying the residue in the first and second nucleotide sequences which corresponds to a cytosine residue in the sample nucleotide sequence. These methods may be useful, for example in the analysis of genomic DNA and/or of RNA.
Abstract:
This invention relates to the identification of modified cytosine residues, such as 5-methylcytosine (5mC), 5-hydroxymethylcytosine (5hmC) and 5-formylcytosine (5fC) to be distinguished from cytosine (C) in a sample nucleotide sequence. Methods may comprise oxidizing or reducing a first portion of polynucleotides which comprise the sample nucleotide sequence; treating the oxidized or reduced first portion and a second portion of polynucleotides with bisulfite; sequencing the polynucleotides in the first and second portions of the population following steps ii) and iii) to produce first and second nucleotide sequences, respectively and; identifying the residue in the first and second nucleotide sequences which corresponds to a cytosine residue in the sample nucleotide sequence. These methods may be useful, for example in the analysis of genomic DNA and/or of RNA.
Abstract:
A method for tracking resizing and recreation of volumes in a block-based snapshot backup program. In an embodiment, a record ID is associated with a major and minor number assigned to each volume to be backed up. The record ID maintains a unique reference to the bitmap corresponding to a backed up volume in case the minor number is reused by the volume manager driver during a recreate operation. The length of the volume to be maintained is maintained and compared to the length of the to track any resizing of the volume by the volume manager. In the event of any resizing or recreation, the original bitmap can be replaced with an updated bitmap to ensure proper backup of the resized or recreated volumes.