摘要:
Provided are methods, apparatus and computer programs for recovery from failures affecting a server in a data processing environment in which a set of servers controls a client's access to a set of resource instances. Independent of any server failure, the client or a gateway is provided with an identification of both a primary server for accessing the resource and at least one secondary server for use as a backup server for accessing the same resource instance (for example, the same physical storage disk). The client or gateway connects to the primary server to perform resource access operations. Following a failure that affects availability of the primary server, the client or gateway connects to the previously identified secondary server to access the same resource instance. Provision of the identification of at least one backup secondary server (without requiring the ‘trigger’ of a failure) avoids the need to discover a new server as part of the recovery operation following a failure. Release of existing reservations using a reset operation, and re-reservation by the original initiator via a backup server, deals with any dangling reservations.
摘要:
Provided are methods, apparatus and computer programs for recovery from failures affecting a server in a data processing environment in which a set of servers controls a client's access to a set of resource instances. Independent of any server failure, the client or a gateway is provided with an identification of both a primary server for accessing the resource and at least one secondary server for use as a backup server for accessing the same resource instance (for example, the same physical storage disk). The client or gateway connects to the primary server to perform resource access operations. Following a failure that affects availability of the primary server, the client or gateway connects to the previously identified secondary server to access the same resource instance. Provision of the identification of at least one backup secondary server (without requiring the ‘trigger’ of a failure) avoids the need to discover a new server as part of the recovery operation following a failure. Release of existing reservations using a reset operation, and re-reservation by the original initiator via a backup server, deals with any dangling reservations.
摘要:
Methods for recovery from server-failures wherein servers control a communication initiator's access to a set of resources. A probable server failure leads to a communication initiator performing a discovery operation to identify available servers capable of accessing a required resource. A server checks whether any of the servers has failed. If a server has failed, a server other than the failed server sends the communication initiator an identification of the failed server together with a network address of an identified available server. The identified available server configures itself to respond to resource access requests directed to the failed server. The communication initiator establishes a connection to an available server enabling access to the required resource. The available server uses initiator-provided elements to recreate a reservation identifier, so that replacing server can also manage resources that were reserved by the failed server at the time of its failure.
摘要:
A method of initializing a Fibre Channel over Ethernet (FCoE) link between a Fibre Channel over Ethernet node (ENode) and Fibre Channel Forwarders (FCFs) in a network by discovering the presence of FCFs available to the ENode and other FCFs, assigning second MAC addresses to the ENode corresponding to each available FCF, and converting from a management and initialization process using the first MAC address to normal Fibre Channel operation using the second MAC addresses. The implementations described herein may additionally distinguish management and initialization processes from normal Fibre Channel operation using separate Ethertypes.
摘要:
The present invention provides a system, method, and computer program product that enables application instances to pass block mode storage requests directly to a physical I/O adapter without run-time involvement from the local operating system or hypervisor. Specifically, a mechanism for providing and using a linear block address (LBA) translation protection table (TPT) to control out of user space I/O operations is provided. In one aspect of the present invention, the LBATPT includes an adapter protection table that has entries for each portion of a storage device. Entries include access control values which identify whether the entry is valid and what access type operations may be performed on a corresponding portion of a storage device. I/O requests may be checked against these access control values to determine if an application instance that submitted the I/O requests may access the LBAs identified in the I/O requests in the manner requested.
摘要:
A system, method, and computer program product that enables user space middleware or applications to pass file name based storage requests directly to a physical I/O adapter without run-time involvement from the local Operating System (OS) are provided. A mechanism is provided for using a file protection table (FPT) data structure, which may include a file name protection table (FNPT) and file extension protection table (FEPT), to control user space and out of user space Input/Output (I/O) operations. In addition, a doorbell message and processing queue mechanism are provided for notifying the I/O adapter of work requests to be processed by the I/O adapter.
摘要:
A system, method, and computer program product that enables user space middleware or applications to pass file name based storage requests directly to a physical I/O Adapter without run-time involvement from the local Operating System (OS) are provided. A mechanism is provided for using a file protection table (FPT) data structure, which may include a file name protection table (FNPT) and file extension protection table (FEPT), to control user space and out of user space Input/Output (I/O) operations. In addition, a mechanism is provided for managing the FPT based on user space operations to create, query, modify and delete entries in the FPT.
摘要:
A system, method, and computer program product that enables user space middleware or applications to pass I/O storage requests directly to a network attached storage device via a storage server that performs authentication are provided. A mechanism is provided for using a translation protection table (TPT) data structure, which may include a file name protection table (FNPT) and file extension protection table (FEPT), or logical volume protection table (LVPT), to control user space and out of user space Input/Output (I/O) operations. The storage server performs authentication of an application instance's request to open an operating system logical volume and, upon being authenticated, permits the application instance to submit I/O storage requests via the TPT to the opened OS logical volume. I/O storage requests are translated into storage commands using the TPT and the storage commands are encapsulated for transmission via one or more networks to the storage server.
摘要:
The present invention provides a system, method, and computer program product that enables application instances to pass block mode storage requests directly to a physical I/O adapter without run-time involvement from the local operating system or hypervisor. Specifically, a mechanism for providing and using a linear block address (LBA) translation protection table (TPT) to control out of user space I/O operations is provided. In one aspect of the present invention, the LBATPT includes an adapter protection table that has entries for each portion of a storage device and a corresponding LBA table having entries for identifying the linear block addresses associated with an adapter protection table entry. Table entries are correlated with one another using an LBA table pointer. Adapter protection table entries are associated with application instances using a key instance.
摘要:
Provided are a method, system, and program for forwarding a message from a transmitting node. A first message is received encoded using a first communication protocol from the transmitting node, wherein the first message includes a direct reference to a memory location in one node. A determination is made as to whether the first message is directed to a receiving node using a second communication protocol. A second message is generated that is compatible with the second communication protocol, wherein the second message causes an operation to be performed with respect to the direct reference in the first message. The second message is transmitted to the receiving node.