摘要:
A method for revocable token identifiers may be employed in a shared storage environment. An access server may generate access tokens and include revocable token identifiers previously obtained from storage devices. When clients present access tokens to storage devices during storage requests, storage devices may check the validity of access tokens by verifying that the revocable token identifiers were previously issued to the access server. An access server may request that the storage device revoke revocable token identifiers. Storage devices may deny any future storage requests including revoked token identifiers. Additionally, an access token may include instructions specifying operations for a storage device to perform in conjunction with a storage request. A trusted server may issue grantor tokens granting permissions for access servers to use when issuing access tokens. An access server may then include such a grantor token in access tokens that it generates and issues to clients.
摘要:
Disclosed is a method implementable by a computer system for maintaining consistency between mirrors of a mirrored data volume. In one embodiment, the method includes the computer system generating first and second write transactions in response to the generation of transaction to write data to a mirrored data volume. The first and second write transactions comprise first and second tags, respectively. The first and second tags relate the first write transaction to the second write transaction. In one embodiment, the first and second tags are identical. After the first and second write transactions are generated, the computer system transmits the first and second write transactions to first and second storage subsystems, respectively. In one embodiment, the first and second storage subsystems store or are configured to store respective mirrors of the data volume. Additionally, each of the first and second storage subsystems include a tag table that stores tags contained in write transactions generated by the computer system. The tag tables can be used to track write transactions received by the first and second storage subsystems.
摘要:
A method and system of providing a virtual transport session is disclosed. According to one embodiment, a virtual transport session is provided by establishing a virtual transport session between an initiator module and a target module across a network, wherein the virtual transport session comprises a transport session. Thereafter, information is transferred between the initiator module and the target module using the virtual transport session. According to another embodiment, establishing a virtual transport session between an initiator module and a target module across a network comprises associating a globally unique identifier to an initiator module.
摘要:
A system using consistent virtual addresses to communicate in cooperative multi-layer virtualization environments includes a volume server, one or more physical storage devices, a front-end layer and a back-end layer of virtualization participants. The volume server may be configured to aggregate storage in the one or more physical storage devices into a logical volume, and to provide configuration information on the logical volume to a front-end virtualization participant and to a back-end virtualization participant. The front-end virtualization participant may be configured to send a storage request including a target virtual address identifying a block of the logical volume to the back-end virtualization participant. The back-end virtualization participant may be configured to use the configuration information to identify a physical data block at a physical storage device corresponding to the target virtual address, and to perform a physical I/O operation on the physical data block.