摘要:
Methods, computer systems, and computer program products are provided for managing a storage network system is provided. The storage network system includes a plurality of zones. Each of the plurality of zones includes at least one storage network device. A link-down event associated with one of the storage network devices is detected. One of the plurality of zones is identified is identified as being unused if the zone is not accessed by another of the storage network devices in another of the plurality of zones and if the zone does not access another of the storage network devices in another of the plurality of zones.
摘要:
A SAS expander forms a first path coupling the SAS initiator and a first port of a SAS target together. The first SAS expander notifies the SAS initiator of a virtual expander address instead of a SAS address of the first SAS expander. The first SAS expander notifies the SAS initiator of a virtual target port address, at least instead of a SAS address of the first port of the SAS target. A second SAS expander forms a second path coupling the SAS initiator and a second port of the SAS target together. The second SAS expander notifies the SAS initiator of the virtual expander address instead of a SAS address of the second SAS expander. The second SAS expander notifies the SAS initiator of the virtual target port address, at least instead of a SAS address of the second port of the SAS target.
摘要:
A SAS expander forms a first path coupling the SAS initiator and a first port of a SAS target together. The first SAS expander notifies the SAS initiator of a virtual expander address instead of a SAS address of the first SAS expander. The first SAS expander notifies the SAS initiator of a virtual target port address, at least instead of a SAS address of the first port of the SAS target. A second SAS expander forms a second path coupling the SAS initiator and a second port of the SAS target together. The second SAS expander notifies the SAS initiator of the virtual expander address instead of a SAS address of the second SAS expander. The second SAS expander notifies the SAS initiator of the virtual target port address, at least instead of a SAS address of the second port of the SAS target.
摘要:
In a path determination unit of a SAS expander connected to a SAS initiator and connected via first and second paths to a SAS target, an SSP controller receives an SSP command frame received from the SAS initiator; a requested-data-length manager stores a requested data length of the SSP command frame in a requested-data-length storage unit; and a data-transfer-amount manager selects one of the first and second paths having a smaller one of the data transfer amounts stored in a data-transfer-amount storage unit, and adds the requested data length to the data transfer amount of the selected path. The SSP command frame is transmitted to the SAS target via the selected path. Upon receipt of an SSP response frame responding thereto, the requested data length is deleted from the requested-data-length storage unit, and the requested data length is subtracted from the data transfer amount of the selected path.
摘要:
A device is provided including a first SAS expander coupling a SAS initiator and the first port of a SAS target and a second SAS expander coupling the SAS initiator and the second port of the SAS target. The first SAS expander notifies the SAS initiator of a virtual expander address instead of its SAS address and notifies the SAS initiator of a virtual target port address instead of a SAS address of the first port. The second SAS expander notifies the SAS initiator of the virtual expander address instead of its SAS address, and notifies the SAS initiator of the virtual target port address instead of a SAS address of the second port such that the SAS initiator recognizes a single SAS expander coupled to a wide port of the SAS initiator and that the SAS target is connected to the single SAS expander through a single port.
摘要:
In a path determination unit of a SAS expander connected to a SAS initiator and connected via first and second paths to a SAS target, an SSP controller receives an SSP command frame received from the SAS initiator; a requested-data-length manager stores a requested data length of the SSP command frame in a requested-data-length storage unit; and a data-transfer-amount manager selects one of the first and second paths having a smaller one of the data transfer amounts stored in a data-transfer-amount storage unit, and adds the requested data length to the data transfer amount of the selected path. The SSP command frame is transmitted to the SAS target via the selected path. Upon receipt of an SSP response frame responding thereto, the requested data length is deleted from the requested-data-length storage unit, and the requested data length is subtracted from the data transfer amount of the selected path.
摘要:
When data are transferred to a cache from disk drives, through a back end I/F unit, a redundant code verifier of a data path controller compares write-history information (a Destaging Counter (DC) value) embedded in a redundant code of the data with a DC value embedded in a redundant code of a corresponding parity, thereby verifying whether the data are imprecise. In addition, in a case where the data are updated, the redundant code verifier makes a similar verification when old data to be used for creating a parity are read. When the data are not imprecise, a redundant code generator of the data path controller adds to new data and the parity a redundant code into which a new DC value has been embedded. When the data are imprecise, a controller informs a host of an occurrence of a problem through a front end I/F unit.
摘要:
An apparatus, system, and method are disclosed for accessing redundant data. A verification value module calculates a first verification value for a first redundant memory. In addition, the verification value module calculates a second verification value for a second redundant memory. In one embodiment, a validation module validates the first and second verification values. A selection module accesses the first redundant memory if the first verification value is equivalent to the second verification value. In a certain embodiment, the selection module identifies and accesses the redundant memory with a most advanced generation count if the first and second verification values are valid and are not equivalent.
摘要:
An apparatus, system, and method are disclosed for accessing redundant data. A verification value module calculates a first verification value for a first redundant memory. In addition, the verification value module calculates a second verification value for a second redundant memory. In one embodiment, a validation module validates the first and second verification values. A selection module accesses the first redundant memory if the first verification value is equivalent to the second verification value. In a certain embodiment, the selection module identifies and accesses the redundant memory with a most advanced generation count if the first and second verification values are valid and are not equivalent.
摘要:
When data are transferred to a cache from disk drives, through a back end I/F unit, a redundant code verifier of a data path controller compares write-history information (a Destaging Counter (DC) value) embedded in a redundant code of the data with a DC value embedded in a redundant code of a corresponding parity, thereby verifying whether the data are imprecise. In addition, in a case where the data are updated, the redundant code verifier makes a similar verification when old data to be used for creating a parity are read. When the data are not imprecise, a redundant code generator of the data path controller adds to new data and the parity a redundant code into which a new DC value has been embedded. When the data are imprecise, a controller informs a host of an occurrence of a problem through a front end I/F unit.