摘要:
A computer system to prevent intervention and falsification by setting encrypted transfer between a host computer and a first storage device that provides a virtual volume and between the first storage device and second and third storage devices that provide a real volume corresponding to the virtual volume. A management computer specifies the second and third storage device that provide the real volume corresponding to the virtual volume by providing a volume corresponding to the virtual volume used by a host computer in which encrypted transfer becomes necessary, and setting the encrypted transfer to communication between the first storage device and the second and third storage devices, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer in the first storage device.
摘要:
Disclosed is to prevent an intervention and falsification by setting encrypted transfer between a host computer and a storage device that provides a virtual volume and between the storage device that provides the virtual volume and a storage device that provides a real volume corresponding to the virtual volume. A management computer 1 specifies storage devices 3b and 3c that provide a real volume corresponding to a virtual volume by providing a volume corresponding to the virtual volume used by a host computer 3 in which encrypted transfer becomes necessary, sets the encrypted transfer to communication between a storage device 3a that provides the virtual volume and the specified storage devices 3b and 3c that provide the real volume corresponding to the virtual volume, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer 2 in the storage device 3a that provides the virtual volume.
摘要:
A computer system to prevent intervention and falsification by setting encrypted transfer between a host computer and a first storage device that provides a virtual volume and between the first storage device and second and third storage devices that provide a real volume corresponding to the virtual volume. A management computer specifies the second and third storage device that provide the real volume corresponding to the virtual volume by providing a volume corresponding to the virtual volume used by a host computer in which encrypted transfer becomes necessary, and setting the encrypted transfer to communication between the first storage device and the second and third storage devices, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer in the first storage device.
摘要:
A computer system to prevent intervention and falsification by setting encrypted transfer between a host computer and a first storage device that provides a virtual volume and between the first storage device and second and third storage devices that provide a real volume corresponding to the virtual volume. A management computer specifies the second and third storage device that provide the real volume corresponding to the virtual volume by providing a volume corresponding to the virtual volume used by a host computer in which encrypted transfer becomes necessary, and setting the encrypted transfer to communication between the first storage device and the second and third storage devices, makes a reconnection thereof, and also sets the encrypted transfer to an I/O port used for the communication with the host computer in the first storage device.
摘要:
In a system which manages path information and status of network with respect to a path being used for access to a storage apparatus and has a redundant path, when a fault occurs in the network, whether or not the path can be recovered by rerouting in network apparatuses is discriminated, thereby performing proper path switching. Construction information and the path information of the network are managed as information of the path which is being used for a storage access by a management server. Further, when the access path is made redundant, the management server obtains fault information in the network and information showing whether or not the path is being reconstructed from the network apparatuses, thereby discriminating the necessity of the path switching. If the path switching is necessary, the management server notifies a host computer and the storage apparatus of it and each apparatus executes a switching process.
摘要:
To provide a storage connection changing method for a storage management system of setting and releasing an external connection between a primary storage system and an external storage system in a storage system, the storage management system includes a computer, the primary storage system, the external storage system, a network device, and a management device which manages the computer, the primary storage system, the external storage system, and the network device. The management device obtains a communication group information for limiting a communicable range between the computer and the storage systems from the network device, upon receiving of a request for changing an external connection state, And the management device generates a communication group information after the changing of the external connection state based on the request for changing the external connection state and the obtained communication group information.
摘要:
The present invention decreases the burden of operation required for specifying the continuity status and the cause of failure of a network storage device. A host computer accepts the specification of the device identifier, that is an identifier of the network storage device in the host protocol which positions in a higher hierarchy than the network communication protocol, and a volume identifier, that is an identifier of the volume. Then based on the specified device identifier, the host computer specifies the network identifier, that is an identifier of the network storage device in the network communication protocol. And continuity is confirmed in the network communication protocol in which the specified network identifier is the destination. Also continuity is confirmed in the host protocol in which the device identifier is the destination. And the volume specified by the volume identifier is accessed.
摘要:
The invention provides a management system solving the problems of the storage area network shared among plural devices, which was incapable of guaranteeing communication performances due to varied response time, and which required unstable time for accessing volumes. The storage area network management system comprises plural information processing devices 21, plural storage devices 41, a network with plural network equipments 31 to which is configured a network bandwidth used for communication between information processing devices 21 and storage devices 41, and a management device 1, wherein management device 1 comprises a data storage device 10 for storing a connection structure information and a performance information of paths of the network equipments 31 and a performance information and a capacity information of storage devices 41, and a storage selection means 13 for selecting a storage device 41 for allocating a volume to information processing device 21, and upon allocating a volume to information processing device 21, storage selection means 13 selects, based on the information stored in data storage device 10, storage device 41 fulfilling the performance and the volume capacity required by information processing device 21 and also having on its path network equipment 31 to which is configured the network bandwidth required for the communication with information processing device 21.
摘要:
Provided is a priority control method for controlling a priority of data transmission in a computer system including a storage system that has a plurality of volumes, a host computer that uses the volumes, a management computer that sets a priority of data transmission between each volume and the host computer, and a network that is composed of a network device controls the priority of data transmission and provides a connection path between the storage system and the host computer. Executed in the method are a first step of obtaining from the storage system information on a first priority assigned to each volume in the storage system and a capacity of a cache memory allocated to each volume, a second step of determining a second priority of the volume on the connection path through the network by referring the obtained information, a third step of notifying the host computer of the determined second priority, a fourth step of obtaining identification of the connection path corresponding to the determined second priority of the volume, and a fifth step of setting the obtained identification to the network device.
摘要:
Storage groups are generated using group information previously set to a switch 3. In a group information acquisition step, group information, which is previously set to the switch 3 and relates to computers 4 and storage devices 5, is acquired from the switch 3, and the acquired group information is stored in a storing means 16. In a node information acquisition step, node information required for connecting to a network is acquired from each of the computers 4 and the storage devices 5, and acquired node information is stored in the storing means 16. In a group generation step, the storage groups are generated based on the group information stored in the storing means 16. And, in a registration step, the generated storage groups and the node information stored in the storing means 16 are registered at a storage name solving server 2.