摘要:
In a storage apparatus and its control method including multiple first virtual volumes to be provided to a host system and multiple pools each having a memory capacity, and equipped with a function of dynamically allocating a storage area to the first virtual volumes from the pools associated with the first virtual volumes in accordance with the usage status of the first virtual volumes, the unused capacity in each of the pools is managed, and, when the unused capacity of one of the pools falls below a predetermined threshold value, a part of the unused capacity of the other pools is allocated to the one pool. It is thereby possible to realize a highly reliable storage apparatus and its control method.
摘要:
The present invention performs appropriate archive management using a device that allows random access. An archive managing part 1B reads out files stored in an on-line volume 5A at a timing determined by the respective file type, and stores these files in a specified volume among archive volumes 5B1 and 5B2. A retention term is designated for each set of file data, and respective retention terms are also set for the respective volumes 5B1 and 5B2. The file data is stored in a volume having a retention term that matches the retention term of the file data. The respective volumes 5B1 and 5B2 are set in a device that allows random access such as a hard disk or the like. The areas in which data is written into the respective volumes 5B1 and 5B2 are managed as write prohibited areas by means of pointers P. As a result, the respective volumes 5B1 and 5B2 are used as a so-called WORM device.
摘要:
A disk subsystem provided with a cache has a capability of executing writing of data of discontinuous dirty blocks on a cache memory into a disk and reading of data of discontinuous empty blocks on the cache memory through the effect of just one DMA transfer. When the dirty data discontinuously ranged on a cache segment is written on the disk, the microprocessor provides a bit-map to a harddisk controller (HDC) as control information for data transfer. If an i-th bit of the bit-map is "1", the HDC operates to write the i-th block data sent from a direct memory access controller (DMAC) onto the corresponding sector of the disk. If the i-th bit is "0", the microprocessor serves to stop the write of the data and control a read/write head to wait until it passes the corresponding sector.
摘要:
Provided is a storage system capable of simply and promptly changing the operation of a storage subsystem as a stand-alone system and the operation of a storage subsystem as a virtual storage system. This storage system is able to set a first mode that operates as a stand-alone system and a second mode that operates as a virtual storage system from a management apparatus to each of the multiple storage subsystems.
摘要:
A disk array apparatus, which has redundant data arranged in a distributing layout by record includes apparatus for speeding up redundant data updating processing during later updating, apparatus and a read head and write head securely mounted on a single actuator. In operation, old parity data is read out by the read head and then is used to generate new, updated parity data. The updated parity data is written into the record where the old parity data was held within one turn of the disk after the old parity data has been read out.
摘要:
A computer system including a plurality of shared resources to be used exclusively by a plurality of tasks. Upon occurrence of an interrupt, execution of the task running at that time is suspended to allow the interrupt task to be executed. After execution of the interrupt task, one of the tasks remaining in the execution waiting state is selected for execution. A method of scheduling tasks with priority to the task locking a shared resource includes the steps of registering a task identifier of a task being executed upon locking of the task to a resource, invalidating the registered identifier of the task when that task releases the shared resource from the locked state, deciding whether or not a valid task identifier representing the task which was running by locking the shared resource is registered when a task to be executed next is to be selected after execution of the interrupt task, and selecting the task designated by the task identifier, if registered, to thereby select the task as the one to be executed with priority.
摘要:
A plurality of storage devices with different functions and storage pools with different attributes are automatically associated with each other.A controller: divides a plurality of storage devices into a first storage device(s) which has an encryption function and a second storage device(s) which does not have the encryption function; manages each storage device by associating it with encryption function information indicating whether the encryption function exists or not; manages a first storage pool with a first attribute and a second storage pool with a second attribute by using attribute information; manages a plurality of logical volumes by associating a first logical volume, to which a first physical volume belonging to the first storage pool is allocated, and a second logical volume, to which a second physical volume belonging to the second storage pool is allocated, with encryption attribute information indicating whether the encryption attribute exists or not; and allocating the first storage device(s) as the first physical volume to the first storage pool and the second storage device(s) as the second physical volume to the second storage pool on the basis of the encryption attribute information and the encryption function information.
摘要:
An archive management that allows random access. An archive managing part reads out files stored in an on-line volume at a timing determined by the respective file type, and stores these files in a specified volume among archive volumes. A retention term is designated for each set of file data, and respective retention terms are also set for the respective volumes. The file data is stored in a volume having a retention term that matches the retention term of the file data. The respective volumes are set in a device that allows random access. The areas in which data is written into the respective volumes are managed as write prohibited areas by pointers such that the respective volumes are used as a WORM device.
摘要:
Data in a storage area to be returned from among storage areas of a storage system is deleted without fail, thereby ensuring data security.When a user's storage-on-demand management program 24 is activated in response to a return request from user A's console terminal 18, the return request is transferred via a communication network 14 to a server 16, and a provider's storage on-demand management program 30 makes a request to a storage management program 32 for volume initialization and data deletion. After the storage management program 32 issues a volume initialization command after receiving the above request, a control program 76 is activated to initialize the designated volume. Subsequently, the user A's volume access right is deleted by the processing executed by the provider's storage-on-demand management program 30, and it is reported to the console terminal 18 that the volume initialization and the volume separation have been conducted.
摘要:
A plurality of storage devices with different functions and storage pools with different attributes are automatically associated with each other.A controller: divides a plurality of storage devices into a first storage device(s) which has an encryption function and a second storage device(s) which does not have the encryption function; manages each storage device by associating it with encryption function information indicating whether the encryption function exists or not; manages a first storage pool with a first attribute and a second storage pool with a second attribute by using attribute information; manages a plurality of logical volumes by associating a first logical volume, to which a first physical volume belonging to the first storage pool is allocated, and a second logical volume, to which a second physical volume belonging to the second storage pool is allocated, with encryption attribute information indicating whether the encryption attribute exists or not; and allocating the first storage device(s) as the first physical volume to the first storage pool and the second storage device(s) as the second physical volume to the second storage pool on the basis of the encryption attribute information and the encryption function information.