摘要:
In an information storage system having at least a storage medium which includes a plurality of storage areas. Each storage area is associated with one logical drive. Using a control device and in conjunction with an I/O control device and a memory, the system can process coexisting code and image information to permit a designated logical drive to access an area of the storage areas that corresponds to the designated logical drive according to correspondence relation information.
摘要:
An electronic file equipment which duplicates stocked image data and which permits the image data to be accessed at high speed. Using a console, an operator instructs a control device to register an optical disk housed in an optical disk library. The control device reads image data stored in the pertinent optical disk through an optical disk library I/O control unit, and stores the read image data in a disk array through a disk array I/O control unit. In addition, information which indicates the corresponding relation between the pertinent optical disk and the image data stored in the disk array is generated and is stored in the disk array along with the image data.
摘要:
In a staging method and system for an unrewritable storage medium such as an optical disk in which the updating or deletion of stored information is possible only by annotatively recording information concerning the updating or deletion, information stored in the medium before any alteration or charge including addition, updating and deletion is made to the medium is staged on a staging file while positions of the read or staged information are stored on a management file. Thereafter, the last end of the information staged on the staging file is detected by referring to the information positions stored on the management file. Then, information concerning the addition is additionally recorded at a location on the staging file after the previously staged information while information concerning the updating or deletion is used to update or delete the information on the staging file at a location indicated by the information concerning the updating or deletion.
摘要:
According to the present invention, techniques for performing security functions in computer storage subsystems in order to prevent illegal access by the host computers according to logical unit (LU) identity are provided. In representative embodiments management tables can be used to disclose the Logical Unit in the storage subsystem to the host computers in accordance with the users operational needs. In a specific embodiment, accessibility to a storage subsystem resource can be decided when an Inquiry Command is received, providing systems and apparatus wherein there is no further need to repeatedly determine accessibility for subsequent accesses to the Logical Unit. Many such embodiments can maintain relatively high performance, while providing robust security for each LU.
摘要:
Mapping tables are for stipulating information for primarily identifying computers, information for identifying a group of the computers and a logical unit number permitting access from the host computer inside storage subsystem, in accordance with arbitrary operation method by a user, and for giving them to host computer. The invention uses management table inside the storage subsystem and allocates logical units inside the storage subsystem to a host computer group arbitrarily grouped by a user in accordance with the desired form of operation of the user, can decide access approval/rejection to the logical unit inside the storage subsystem in the group unit and at the same time, can provide the security function capable of setting interface of connection in the group unit under single port of storage subsystem without changing existing processing, limitation and other functions of computer.
摘要:
Mapping tables are for stipulating information for primarily identifying computers, information for identifying a group of the computers and a logical unit number permitting access from the host computer inside storage subsystem, in accordance with arbitrary operation method by a user, and for giving them to host computer. The invention uses management table inside the storage subsystem and allocates logical units inside the storage subsystem to a host computer group arbitrarily grouped by a user in accordance with the desired form of operation of the user, can decide access approval/rejection to the logical unit inside the storage subsystem in the group unit and at the same time, can provide the security function capable of setting interface of connection in the group unit under single port of storage subsystem without changing existing processing, limitation and other functions of computer.
摘要:
A plurality of storage devices, provided in a storage system, comprise not less than two member storage devices, which are storage devices provided as members of a RAID group, and a spare storage device, which is not a member of the RAID group. A controller, provided in the storage system, uses the spare storage device to carry out the changing of the RAID level of the RAID group from a first RAID level to a second RAID level.
摘要:
A first storage control device is provided with a virtual LU for showing a logical volume possessed by a second storage control device as if it were its own volume. When data processing requested from a host device is, for example, a specific processing of large load (such as direct backup, logical volume copy, and so on), whether or not the requested processing can be executed by the second storage control device is judged. When it is executable, a command is transmitted to the second storage control device to make it take over the processing.
摘要:
Tables (FIGS. 11 and 12) for stipulating information (WWN: WorldWide Name) for primarily identifying computers, information (GID: Group ID) for identifying a group of the computers and a logical unit number (LUN) permitting access from the host computer inside storage subsystem, in accordance with arbitrary operation method by a user, and for giving them to host computer. The invention uses management table inside the storage subsystem and gives logical unit inside storage subsystem to host computer group arbitrarily grouped by a user in accordance with the desired form of operation of the user, can decide access approval/rejection to the logical unit inside the storage subsystem in the group unit and at the same time, can provide the security function capable of setting interface of connection in the group unit under single port of storage subsystem without changing existing processing, limitation and other functions of computer.
摘要:
According to the present invention, techniques for performing security functions in computer storage subsystems in order to prevent illegal access by the host computers according to logical unit (LU) identity are provided. In representative embodiments management tables can be used to disclose the Logical Unit in the storage subsystem to the host computers in accordance with the users operational needs. In a specific embodiment, accessibility to a storage subsystem resource can be decided when an Inquiry Command is received, providing systems and apparatus wherein there is no further need to repeatedly determine accessibility for subsequent accesses to the Logical Unit. Many such embodiments can maintain relatively high performance, while providing robust security for each LU.