摘要:
Provided are a method, system, and article of manufacture for assigning alias addresses to base addresses. An assignment is provided of base addresses to the devices, wherein the base addresses are used to access the devices assigned to the base addresses. An assignment is provided of a plurality of alias addresses to an alias address pool. The alias addresses in the alias address pool are capable of being dynamically assigned to the devices to service I/O requests to the devices. An Input/Output (I/O) request to access one target device comprising one of the devices is processed. A determination is made as to whether the base address assigned to the target device is available. One alias address is assigned to the target device in response to determining that the base address is not available. The I/O request is issued to the assigned alias address to transmit the request to the target device.
摘要:
Provided are a method, system, and program for reassigning storage volumes from a failed processing system to a surviving processing system. A first processing system detects a failure of a second processing system. The first processing system determines device groups of storage devices managed by the failed second processing system and determines for each determined device group, hosts that connect to storage devices in the device group. The first processing system sends, for each device group, a unit check to each determined host indicating failure of each device group through one storage device in the device group to which the determined host connects. The determined hosts execute instructions to terminate any I/O operations in progress on the storage devices in the device group in response to the unit check indicating failure of one storage device in the device group and issue, a command to one storage device for the device group to end the busy condition.
摘要:
An apparatus, system, and method are disclosed for accessing a preferred path through a storage controller. A request module receives a request from a host to identify a preferred path from the host to a control unit image. A response module reports the preferred path to the host. A connection module connects the host through the preferred path to the control unit image. In one embodiment, a detection module detects a failure of a first interconnection module comprising the preferred path. The connection module may re-connect the host to the control unit image through a non-preferred path comprising a second interconnection module in response to the failure of the first interconnection module.
摘要:
A communication-path management system includes a path-detection component for identifying all communications paths between a host computer, through a controller, to a data storage device. Once identified, the communication paths are incorporated into a logical-path mask. The path-detection component recognizes each path as either preferred or non-preferred based on latency, bandwidth, availability, or other user-defined criteria and divides the logical-path mask into a preferred path subset and a non-preferred path subset. If a valid path exists in the preferred path subset, all communications from the host computer to the data storage device transit paths belonging to this subset. Otherwise, active control is given to the non-preferred path subset. A channel subsystem manages actual communication based on resource allocation and contention using the currently active subset.
摘要:
Provided are a method, system, and article of manufacture for providing an address format compatible with different addressing formats used for addressing different sized address spaces. An address format is used in an operating system to address storage space in a storage device comprising a first region and a second region of storage space. A first group of applications uses the address format to only address the storage space in the first region and is not coded to use the address format to access the second region and a second group of applications uses the address format to address the storage space in the first and second regions.
摘要:
A computer Input/Output system having a fabric, a control unit (CU) and a host computer including a channel, the channel having a channel port connected by a first link to a channel neighbor port of the fabric, and the control unit having a CU port connected by a second link to a CU neighbor port on the fabric. Then an error is detected in the link or protocol between the channel and the control unit, error data are reported to the channel by the channel, the channel port, the channel neighbor port, the control unit, the CU port and the CU neighbor port and sent to the channel. The error data are provided to the host computer for analysis.
摘要:
An apparatus, system, and method are disclosed for concurrently relocating a RAID array. The apparatus includes an identification module, a designation module, and an implementation module. The identification module identifies an availability of a physical device within a donor arrayed storage device to offload a source drive of a relocation enclosure. The designation module designates an available physical device as a target drive and thereby designate the target drive and the source drive as a linked pair;. The implementation module implements a mirroring relationship between the target drive and the source drive. The apparatus, system, and method provide a dynamic relocation of the raid array, minimizing system downtime and maximizing efficient utilization of system resources.
摘要:
A method to control access to logical volumes disposed in one or more information storage and retrieval systems when using copy service relationships. The method provides a first information storage and retrieval system, a second information storage and retrieval system, and a plurality of host computers capable of communicating with the first information storage and retrieval system. The method forms (N) host computer group, and assigns each of the plurality of host computers to the a host computer group. The method forms (N) logical volume groups, and assigns one or more of the plurality of first logical volumes to a logical volume group. The method receives a request from a host computer assigned to the (i)th host computer group to establish a copy service relationship between a source logical volume and a target logical volume. The method determines if both the source and target logical volumes are assigned to the (i)th logical volume group. If both the source and target logical volumes are assigned to the (i)th logical volume group, then the method establishes the requested copy service relationship.
摘要:
A method to control access to logical volumes disposed in an information storage and retrieval system using parallel access volumes. The method provides an information storage and retrieval system comprising a plurality of logical volumes, and a plurality of host computers, where each host computers is capable of communicating with the information storage and retrieval system. The method creates a parallel access volume having an alias, and persistently associates that parallel access volume with an original base logical volume, where the original base logical volume may be assigned to one of (N) logical volume groups. If the original base logical volume is assigned to the (i)th logical volume group, the method permits each host computers assigned to the (i)th host computer group to access the original base logical volume, or the current base logical volume, associated with the parallel access volume.
摘要:
A method to control access to logical volumes. The method provides a plurality of host computers and an information storage and retrieval system comprising a plurality of logical volumes. The method forms (N) host computer groups, assigns one or more of the host computers to the (i)th host computer group, such that each host computer assigned to (i)th host computer group is not assigned to any other of the (N) host computer groups. The method forms (N) logical volume groups, assigns one or more logical volumes to the (i)th logical volume group, such that each of the logical volumes assigned to the (i)th logical volume group is not assigned to any other of the (N) logical volume groups. The method maintains a database associating the (i)th host computer group with the (i)th logical volume group, and permits a host computer assigned to the (i)th host computer group to access a logical volume assigned to the (i)th logical volume group.