摘要:
A plurality of key information items with a fixed constitution are stored in a shared memory of a first storage control system. Each key information item corresponds with each of the types of a second storage control system and includes, in a predetermined location in the key information, an information element that indicates the location of a particular information item among the plurality of information items in the control system information. A microprocessor in a Fibre Channel Adapter of the first storage control system determines whether to form a logical path with the second storage control system on the basis of the key information and the control system information that is received from the second storage control system.
摘要:
A management server and a data migration method enabling a storage apparatus to be replaced while retaining data consistency and without halting access by a host apparatus are proposed.In a computer system which comprises a first primary storage apparatus and a first secondary storage apparatus and a second primary storage apparatus and a second secondary storage apparatus, a first virtual volume of the second primary storage apparatus is externally connected to a first primary volume of the first primary storage apparatus, a total cache-through mode is configured as a cache mode in a case where a read command is supplied by the first host apparatus, unique information for the first primary volume is configured for the first virtual volume, a path to the first primary volume is switched from the first host apparatus to a path via the first virtual volume, and a second primary volume in the second primary storage apparatus is configured to form a copy pair with a second secondary volume in the second secondary storage apparatus.
摘要:
For first write request to a virtual volume, the first storage apparatus performs processing by a method of either a first write processing method that stores write data in a first logical volume associated with the virtual volume as well as transfers a first write request, to the second storage apparatus, for storing the write data in a second logical volume associated with the virtual volume of the second storage apparatus or a second write processing method that transfers a first write request, to the second storage apparatus, then selects a processing method according to a first IO load on a first area of the virtual volume of the first storage apparatus and a second IO load on the first area of the virtual volume of the second storage apparatus to perform a processing for the first write request.
摘要:
Proposed are a computer system and an access restriction method which enable security and reliability to be improved.In a computer system that comprises a first storage apparatus which provides a first logical volume from/to which a host apparatus reads and writes data, and a second storage apparatus which provides a virtual second logical volume obtained by virtualizing the first logical volume of the first storage apparatus, to the host apparatus, first path information which relates to a path from the host apparatus to the second logical volume is registered in the first storage apparatus in association with the first logical volume of the first storage apparatus, and reservation of and access to the first logical volume is granted only for a reservation request and access request with matching path information from the host apparatus.
摘要:
A storage control system is provided where a first host system connected to a first storage controller can issue a control command to a second storage controller connected another host system. The first storage controller is connected to the second storage controller and the command is issued without providing the command to the other host system. The first storage controller has a virtual volume, a memory unit for storing information necessary for mapping the virtual volume to a logical device in the second storage controller, and attribute information for the logical device. The host system identifies the virtual volume as the logical device in the second storage controller and issues a control command to this logical device via the virtual volume.
摘要:
A first storage control system comprises a CHN connected to a LAN CN. The CHN comprises a NAS processor and I/O processor. The I/O processor judges whether all or a portion of block level data is to be stored in either a first storage control system or a second storage control system, on the basis of an I/O allocation control data which indicates which of either the first storage control system or the second storage control system the block level data is to be stored in. On the basis of the result of this judgment, the I/O processor transfers the block level data from the NAS processor, to at least one of the DKA and the CHF connected to the second storage control system.
摘要:
A storage control system is provided where a first host system connected to a first storage controller can issue a control command to a second storage controller connected another host system. The first storage controller is connected to the second storage controller and the command is issued without providing the command to the other host system. The first storage controller has a virtual volume, a memory unit for storing information necessary for mapping the virtual volume to a logical device in the second storage controller, and attribute information for the logical device. The host system identifies the virtual volume as the logical device in the second storage controller and issues a control command to this logical device via the virtual volume.
摘要:
The present invention provides a storage control system that can prevent capacity in a cache memory from being overloaded even when the access performance of a controller in a storage controller to an external storage device in an external storage controller is permanently or temporarily poor.In the storage control system, a first storage controller is connected to a storage device in a second storage controller and the first storage controller is configured to be able to write/read data to/from the storage device in the second storage controller in response to a request from a host device connected to the first storage controller. The first storage controller includes a controller for controlling data transmission and reception between the host device and the storage device in the second storage controller, and a cache memory for temporarily storing the data, and the controller sets a threshold value for storage capacity in the cache memory assigned to the storage device according to the properties of the storage device.
摘要:
Provided is a storage system having a first storage controller and a second storage controller. An actual device of the second storage controller is mapped to a virtual device of the first storage controller. The first storage controller has a port for transmitting control cylinder information to be written in a control information area of the actual device. As the format data to be transmitted from the first storage controller to the second storage controller, it will suffice so as long as control cylinder information is transmitted, and high speed formatting can be performed since it is not necessary to transmit 0 data.
摘要:
Techniques for realizing efficient setting and utilization of configuration including storage volumes in a storage system having an initiator and a target, with a low cost configuration not requiring additional equipment such as a LAN and a server without limitations due to a low-transfer rate network are provided. The storage system has, e.g., an IS serving as an initiator, a TS serving as a target, and a frame relay device R for relaying the communication between the devices. The R has a DB for retaining the configuration information including the configuration of storage volumes in plural devices connected via plural ports, and an exclusive control unit for performing an exclusive control process of the configuration information in the DB upon setting for utilizing the storage volumes among the plural devices. According to update of the configuration of each device, the R updates the configuration information in the DB.