摘要:
Described are techniques for performing recovery processing in a data storage system. A providing a flash-based memory is provided with includes cached write data that has not been destaged to a data storage device. It is determined whether said flash-based memory has a threshold amount of storage available thereon. If the flash-based memory does not have the threshold amount of storage available thereon, portions of the cache write data are destaged until said flash-based memory has a threshold amount of storage available thereon. Received data requests are processed in accordance with a first policy different from a second policy used in connection with processing received data requests if said flash-based memory has a threshold amount of storage available thereon.
摘要:
Described are techniques for managing data in a data storage system. While the data storage system is operating in a first mode, portions of cached write data not yet destaged to a data storage device are copied from the volatile memory cache to a first area in a flash-based memory. In response to a vault operation event, the data storage system operates in a second mode in which all remaining portions of cached write data from the volatile memory cache not currently included in the first area are copied to a second area of the flash-based memory.
摘要:
An interface unit connected between a first bus and a second bus, the first bus having connected thereto a memory system and the second bus having connected thereto a plurality of devices which perform read operations directed at the memory system, the interface unit including a buffer memory having an input that is electrically coupled to the first bus for receiving data that is sent from the memory system over the first bus and an output that is electrically coupled to the second bus for delivering data to the second bus for transfer to a requesting device, the requesting device being one of the plurality of devices; a plurality of prefetch size registers equal in number to the plurality of devices, wherein each of the plurality of prefetch size registers stores a number for a different corresponding one of the plurality of devices, wherein the number stored in each of the plurality of prefetch size registers specifies an amount of data that is prefetched from memory in response to a data read request from the corresponding device; and a control unit which in response to a data read request from any one of the plurality of devices prefetches into the buffer a predetermined amount of data from the system memory, the predetermined amount being determined by the number stored in prefetch size register corresponding to the requesting device.
摘要:
A method is used in sizing volatile memory (VM) cache based on flash-based cache usage. A user selection for a flash-based cache is received. Based on the selection, configuration and sizing factors are provided, by a flash based cache driver, to VM cache size determination logic. Based on the configuration and sizing factors and a sizing formula and rules, a requested VM cache size is produced by the VM cache size determination logic. Based on the requested VM cache size, the VM cache is caused, via VM cache resizing logic, to be resized to the requested VM cache size.
摘要:
A method apparatus and computer program product for providing access to host attribute information in a storage area network is disclosed. The storage area network is composed of a plurality of hosts coupled to at least one initiator. Each initiator is coupled to one or more targets and each initiator has an associated identifier. In each host, the identifier of the initiator is related to other host attribute information. The identifier may be, for example, a world wide name. The host attribute information including the identifier is sent from each of the plurality of hosts to the one or more targets and stored in memory of an associated storage array. Either a host or requestor remote from the storage array may request the collected host attribute information from the storage array. A topology of the storage area network may then be formed from the host attribute information of each host.
摘要:
A table utensil comprising handle and a rigid blade portion for use in breaking and opening objects such as the shells surrounding the meat of crab legs. The blade includes an open slot extending along its central axis from its terminal end for a distance of an inch or two. The slot preferably terminates at an opening in the blade portion of greater diameter than the width of the slot.
摘要:
A method apparatus and computer program product for providing access to host attribute information in a storage area network is disclosed. The storage area network is composed of a plurality of hosts coupled to at least one initiator. Each initiator is coupled to one or more targets and each initiator has an associated identifier. In each host, the identifier of the initiator is related to other host attribute information. The identifier may be, for example, a world wide name. The host attribute information including the identifier is sent from each of the plurality of hosts to the one or more targets and stored in memory of an associated storage array. Either a host or requestor remote from the storage array may request the collected host attribute information from the storage array. A topology of the storage area network may then be formed from the host attribute information of each host.
摘要:
Default isolation method assists in correction of a fault in a peer-to-peer communication link between two storage processors. Each processor is associated with a fault indicator which is activated according to the method to guide a technician in replacing the storage processors one at a time to determine the fault with the peer-to-peer communication link. Upon detection of a fault, one of the processors is suspended so that a technician may replace it with a new storage processor. The surviving storage processor detects whether a new storage processor has been replaced. If the peer-to-peer communication link still fails, the surviving processor instructs the peer processor to boot up and then suspends itself. Communications outside of the peer-to-peer communication link can take place between the processors by leaving a message in at least one of the disk drives which is periodically checked by the processors.