摘要:
In a storage area network (SAN), when a host accesses a storage system, the host is certified to restrict any unauthorized access. The storage system includes an access setting section and a certifying section to restrict accesses from respective hosts. When a host accesses data on a disk, the host issues an inquiry to a file server program of a host to receive information of a physical location of a file containing the data on the disk. The host accesses the disk according to the information. Simultaneously, the file server program allows, by a disk management program, the access to the area specified by the access request from the host.
摘要:
A database update method for a computer system having a host computer and a storage sub-system where a database is maintained is disclosed. The storage sub-system includes first and second storage units containing duplicated data. The host computer accesses the first storage unit for data reading and the second storage unit for data writing. If incomplete processing to read is in process when an access request for data writing occurs, the host computer commands the stop of volume duplication of the first and second storage units and issues a write request. In response to this command, data is stored into only the second storage unit. Upon the completion of both read and write processing, the host computer commands the restart of volume duplication of the first and second control units to reflect the data stored into the second storage unit in the first storage unit.
摘要:
In a segment coil manufacturing method for manufacturing a segmented coil by bending a flat rectangular conductor using a forming die so that the segmented coil has a circular arc section, a crank section, and a protrusion-shaped section, the forming die includes an outer peripheral surface forming upper die, an inner peripheral surface forming upper die, an inner peripheral surface forming lower die, and an outer peripheral surface forming lower die, and the method includes forming the circular arc section, the crank section, and the protrusion-shaped section while holding at least two surfaces of the outer peripheral surfaces of the flat rectangular conductor by the outer peripheral surface forming upper die, the inner peripheral surface forming upper die, the inner peripheral surface forming lower die, and the outer peripheral surface forming lower die.
摘要:
By incorporating a referral mechanism, a failover method and system for remotely mirrored clustered file servers enables a client computer to transparently access a remotely mirrored file system during a failover of a first NAS (network attached storage) storing the file system. The first NAS is clustered with a second NAS that takes over the IP address of the first NAS on failover. A mirroring relationship is established between the first NAS and a third NAS whereby a copy of the file system is replicated to the third NAS. A referral is created on the second NAS, such that an access attempt from the client computer for accessing the first file system that is directed to the second NAS following IP address takeover from the first NAS after failover is referred to the third NAS by the referral to enable the client computer to access the copy of the file system.
摘要:
One code (a compressed redundant code) is created based on a plurality of first redundant codes, each created on the basis of a plurality of data units, and this compressed redundant code is written to a nonvolatile storage area. This compressed redundant code is used to restore either a data element constituting a multiple-failure data, or a first redundant code corresponding to the multiple-failure data, which is stored in an unreadable sub-storage area of a partially failed storage device, and to restore the data element constituting the multiple-failure data which is stored in a sub-storage area of a completely failed storage device, based on the restored either data element or first redundant code, and either another data element constituting the multiple-failure data or the first redundant code corresponding to the multiple-failure data.
摘要:
In a storage system, a server apparatus and a storage apparatus are provided, while the server apparatus is connected via a LAN to one, or plural sets of computers so as to accept an access request of file data issued from the computers, whereas the storage apparatus is connected via a wide area network to the server apparatus so as to store thereinto the file data. A communication between the computers and the server apparatus is carried out by employing a network file protocol, whereas a communication between the server apparatus and the storage apparatus is performed by employing a block device protocol. The server apparatus and the storage apparatus are connected via the respective security protecting apparatus to the wide area network.
摘要:
Proposed is an apparatus and method of preventing the leakage of information from an external storage apparatus even when such external storage apparatus is stolen or accessed from an unauthorized host computer. This external storage apparatus accessible from a host computer or another external storage apparatus via a network encrypts or decrypts data written from a host computer to be stored in the storage area, sends a request for existence confirmation to the host computer or the other external storage apparatus every predetermined period of time, and zeroizes an encryption key to be used in the encryption calculation for encrypting or decrypting data to be performed by the encryption calculation unit based on the result of a response from the host computer or the other external storage apparatus in reply to the request.
摘要:
By incorporating a referral mechanism, a failover method and system for remotely mirrored clustered file servers enables a client computer to transparently access a remotely mirrored file system during a failover of a first NAS (network attached storage) storing the file system. The first NAS is clustered with a second NAS that takes over the IP address of the first NAS on failover. A mirroring relationship is established between the first NAS and a third NAS whereby a copy of the file system is replicated to the third NAS. A referral is created on the second NAS, such that an access attempt from the client computer for accessing the first file system that is directed to the second NAS following IP address takeover from the first NAS after failover is referred to the third NAS by the referral to enable the client computer to access the copy of the file system.
摘要:
A storage system 1 including multiple slots for loading a block I/O interface controller, a file I/O interface controller, and any other kinds of interface controllers that are combined freely. The storage system 1 includes a management table that manages fail-over-enabled devices by grouping those devices in accordance with the interface type and the domain to which each device belongs; an information table that directs a fail-over procedure; and fail-over controlling means that takes over the processing of a failed interface controller belonging to a fail-over-enabled group. The fail-over system offers several modalities for monitoring failures, selecting takeover controllers and restoring functionality. Storage system 1 solves conventional problems by providing a system that can mount a plurality of file systems, and that resists multiple failures detected in a fail-over server.
摘要:
In a storage system, a server apparatus and a storage apparatus are provided, while the server apparatus is connected via a LAN to one, or plural sets of computers so as to accept an access request of file data issued from the computers, whereas the storage apparatus is connected via a wide area network to the server apparatus so as to store thereinto the file data. A communication between the computers and the server apparatus is carried out by employing a network file protocol, whereas a communication between the server apparatus and the storage apparatus is performed by employing a block device protocol. The server apparatus and the storage apparatus are connected via the respective security protecting apparatus to the wide area network.