摘要:
A method for performing a data exchange between an initiator and a receiver in a fiber channel protocol (FCP) is provided. A control flag is set in a write command to indicate the presence of an identifier. The identifier is copied into a command descriptor block (CDB) of the write command and appended to a data frame. The write command and data frame, including the identifier, is sent from the initiator to the receiver.
摘要:
Provided are a method, system, and program monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
摘要:
Provided are a method, system, and program for copying tracks between a primary controller and secondary controller. A track is received from the primary controller that is part of a copy job comprising a sequence of tracks to copy along with a sequence number of the received track and a context number identifying computational resources in the primary controller used to transmit the track, sequence number, and context number. The context number and sequence number transmitted with the track are used to determine if a track preceding the received track was written to storage. The secondary-controller writes the received track to storage if the track preceding the received track was written to storage.
摘要:
Provided are a method, system, and program monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
摘要:
A method is disclosed to transfer information from a first information storage and retrieval system to a second information storage and retrieval system. The method provides a first information storage and retrieval system comprising a first track size and a plurality of first tracks, and a second information storage and retrieval system comprising a second track size and a plurality of second tracks. The method determines if the first track size is greater than the second track size. If the method determines that the first track size is greater than said second track size, then the method sets a ratio (R) equal to the first track size divided by the second track size, provides the (i)th first track from the first information storage and retrieval system to the second information storage and retrieval system, provides (R) second tracks, and maps the (i)th first track onto the (R) second tracks.
摘要:
Provided are a method, system, and program monitoring paths between a first controller and second controller. A determination is made as to whether one path has been unavailable for a predetermined time period in response to detecting that the path is unavailable. Indication is made that the path is in a first failed state if the path has been unavailable for more than the predetermined time period and indication is made that the path is in a second failed state if the path has not been unavailable for the predetermined time period.
摘要:
A method is disclosed to transfer information from a first information storage and retrieval system to a second information storage and retrieval system. The method provides a first information storage and retrieval system comprising a first track size and a plurality of first tracks, and a second information storage and retrieval system comprising a second track size and a plurality of second tracks. The method determines if the first track size is greater than the second track size. If the method determines that the first track size is greater than said second track size, then the method sets a ratio (R) equal to the first track size divided by the second track size, provides the (i)th first track from the first information storage and retrieval system to the second information storage and retrieval system, provides (R) second tracks, and maps the (i)th first track onto the (R) second tracks.
摘要:
Disclosed is a technique for assigning priorities. A request to manipulate data is received. A type of the request is determined. A priority is assigned to the request based on the type of the request.
摘要:
Provided are a system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port. The first data path is terminated from the first port to the second port in response to receiving the application layer logout at the second port.
摘要:
Provided are a method, system and article of manufacture for bidirectional data transfer. In certain embodiments a link layer login is sent from a first port to a second port. Subsequently, an application layer login is sent from the first port to the second port to establish a first data path, wherein the first data path is from the first port to the second port. Subsequently, another application layer login is sent from the second port to the first port to establish a second data path, wherein the second data path is from the second port to the first port. In certain other embodiments, a first data path is established from a first port to a second port. A determination is made at the first port, whether the second port has a second data path established from the second port to the first port. An application layer logout is sent from the first port to the second port, in response to determining that the second port has the second data path established from the second port to the first port. The first data path is terminated from the first port to the second port in response to receiving the application layer logout at the second port.