Abstract:
A system includes multiple devices in a storage area network (SAN). Each device includes at least one network port, at least one processor, and a management module. The management module is to receive announcements generated by ports included in an announcement group, where the ports are included in the other devices, and where each announcement includes port metadata for a particular port. The management module is also to determine, based on the announcements, a network mapping of the ports and the devices.
Abstract:
In some examples, fabric driven NVMe subsystem zoning may include receiving, from a non-volatile memory express (NVMe) Name Server (NNS), a zoning specification that includes an indication of a host that is to communicate with a given NVMe subsystem of an NVMe storage domain. Based on the zoning specification, the host may be designated as being permitted to connect to the given NVMe subsystem of the NVMe storage domain. An NVMe connect command may be received from the host. Based on the designation and an analysis of the NVMe connect command, a connection may be established between the given NVMe subsystem of the NVMe storage domain and the host.
Abstract:
Examples herein relate to managing data and network bandwidth. In an example implementation, a method includes monitoring a first location having a local volume and a local gateway and monitoring a second location having a first remote volume and a remote gateway. The method also includes determining a bandwidth requirement for a second remote volume at the second location and configuring the local gateway and the remote gateway for the bandwidth requirement. The method also includes adjusting the local gateway and the remote gateway when the bandwidth requirement changes.
Abstract:
Example implementations relate to end-to-end quality of service in storage area networks. For example, a method includes receiving input at a target from a user, the input to assign a priority level to a logical unit. This may include registering the logical unit priority level at a switch using an in-band communication in response to the priority level being assigned to the logical unit. This can also include instructing a host to implement the priority level using the in-band communication in response to the priority level being assigned to the logical unit. Further, the methods and systems may enforce the priority level with the host, the switch, and the target.
Abstract:
In some examples, a switch includes a plurality of switch ports, and a processor. The processor is to send, through selected switch ports of the plurality of switch ports, respective requests for port information of device ports of a device connected to the selected switch ports, and receive, from the device responsive to the requests, the port information of the device ports. The processor is to identify, from the device ports of the device in response to the received port information, a failover device port for a first device port of the device, and send, to the device, information of the failover device port for the first device port at the device.
Abstract:
An example implementation may relate to a storage area network (SAN) switch and a SAN target device. For example, the SAN target device may issue an in-band diagnostic command to the SAN switch. The SAN target device may receive an in-band data message from the SAN switch in response to the in-band diagnostic command. The in-band data message may include diagnostic data about a port of the storage area network switch and a storage area network device connected to the port.
Abstract:
Examples include registration with a storage networking repository via a network interface device driver independent of a storage initiator. Some examples include registration with a storage networking repository, provision of a state change registration to the storage network device, and acquisition of login information for storage targets from the storage networking repository, each via a network interface device driver and independent of a storage initiator and a storage protocol driver.
Abstract:
Examples disclosed herein relate to migration of data blocks. In an example, data blocks for migration from a source data storage device to a destination data storage device may be identified. A migration priority for each of the data blocks may be determined. The determination may comprise determining a plurality of parameters for each of the data blocks based on an analysis of respective input/output (I/O) operations of the data blocks in relation to a host system. The plurality of parameters may be provided as an input to an input layer of an artificial neural network engine. The input may be processed by a hidden layer of the artificial neural network engine. An output may be provided by an output layer of the artificial neural network engine. In an example, the output may include a migration priority for each of the data blocks.
Abstract:
Examples disclosed herein relate to deployment of an Internet Storage Name Service (iSNS) server on a network device. In an example, a network device may determine that the network device has a highest IP address among network devices in an Internet Small Computer System Interface (iSCSI) network. In response to the determination, network device may deploy a primary Internet Storage Name Service (iSNS) server, and provide an in-band network access between the primary iSNS server and an iSCSI device on the iSCSI network.
Abstract:
Example embodiments relate to protocol agnostic storage access with a software defined network (SDN). A method may include receiving, at a SDN enabled switch, an initialization packet to access a storage volume. The method may include determining, at the SDN enabled switch, a storage protocol used by the initialization packet, adding a protocol tag indicative of the storage protocol to the initialization packet, and sending the initialization packet to a SDN controller. The method may include identifying, at the SDN controller, a storage application based on the protocol tag and sending the initialization packet to the storage application. The storage application may be one of a plurality of storage applications, each associated with a different storage protocol. The method may include performing, by the storage application, protocol-specific tasks.