摘要:
A blade server system includes a plurality of blade slots, a management module, and a plurality of switch modules. The switch modules provide connectivity to a plurality of communications fabrics. At least one switch module includes an integrated redundant array of independent disks (RAID) controller. A storage enclosure may be connected to the switch with the integrated RAID controller without having to include a stand-alone RAID controller, such as in one of the blade slots, and without having to include a RAID controller within the storage enclosure.
摘要:
A blade server system includes a plurality of blade slots, a management module, and a plurality of switch modules. The switch modules provide connectivity to a plurality of communications fabrics. At least one switch module includes an integrated redundant array of independent disks (RAID) controller. A storage enclosure may be connected to the switch with the integrated RAID controller without having to include a stand-alone RAID controller, such as in one of the blade slots, and without having to include a RAID controller within the storage enclosure.
摘要:
An apparatus, system, and method are disclosed for providing a redundant array of inexpensive disks (“RAID”) storage subsystem within a processor blade enclosure. A first RAID controller blade is included and configured to fit in a processor blade enclosure. At least one processor in communication with the first RAID controller blade is included. A disk enclosure blade is provided that includes a plurality of hard disk drives. The disk enclosure blade is configured to fit in the processor blade enclosure and the hard disk drives are in communication with the first RAID controller blade.
摘要:
An apparatus, system, and method are disclosed for providing a redundant array of inexpensive disks (“RAID”) storage subsystem within a processor blade enclosure. A first RAID controller blade is included and configured to fit in a processor blade enclosure. At least one processor in communication with the first RAID controller blade is included. A disk enclosure blade is provided that includes a plurality of hard disk drives. The disk enclosure blade is configured to fit in the processor blade enclosure and the hard disk drives are in communication with the first RAID controller blade.
摘要:
Host port information is pulled directly from the switch before zoning is performed and is organized by chassis as an assist for mapping and masking an entire chassis. A graphical user interface allows a user to select storage by chassis to map and to select servers by chassis to map. The user then applies that mapping such that all servers selected are mapped to all storage selected. The user may repeat this mapping for another set of storage and servers. In a mixed environment, an icon may be shown in the graphical user interface to represent the mix. When the LUN mapping/masking is done, the LUN mapping/masking may be provided to the SAN manager to perform zoning. The LUN mapping/masking defines which host ports see which storage ports.
摘要:
Host port information is pulled directly from the switch before zoning is performed and is organized by chassis as an assist for mapping and masking an entire chassis. A graphical user interface allows a user to select storage by chassis to map and to select servers by chassis to map. The user then applies that mapping such that all servers selected are mapped to all storage selected. The user may repeat this mapping for another set of storage and servers. In a mixed environment, an icon may be shown in the graphical user interface to represent the mix. When the LUN mapping/masking is done, the LUN mapping/masking may be provided to the SAN manager to perform zoning. The LUN mapping/masking defines which host ports see which storage ports.
摘要:
A method and system for emulating a hardware Internet Small Computer System Interface (iSCSI) Host Bus Adapter (HBA) without risking an interruption of communication between a computer and a remote secondary storage device is presented. During normal operations, a (hardware emulating) software iSCSI HBA drives a Network Interface Card (NIC) to afford communication between the computer and the remote secondary storage. If an operating system (OS) anomaly occurs in the computer, the NIC is normally disconnected by the OS. To maintain communication between the computer and the secondary storage device if such an event occurs, a failover network device is called up by the computer's System Management Memory (SMM) Basic Input Output System (BIOS), which allows uninterrupted communication to continue between the computer and remote secondary storage device.
摘要:
An electrical machine, such as a router, switch, hub, etc., includes a housing in which a Primary Backplane and Secondary Backplane are mounted in stacked spaced relationship. A primary Bus is fabricated on the Primary Backplane and a secondary Bus is fabricated on the Secondary Backplane. Connectors with feed through elements provide mechanical support and electrical transmission between the Primary Backplane and Secondary Backplane.
摘要:
An apparatus, system, and method are disclosed for distributing configuration parameters. The present invention includes one or more storage devices configured to store data, a first DHCP server configured to process DHCP messages and redirect communications regarding configuration parameters for the storage devices to a second DHCP server, and a configuration datastore configured to store configuration parameters for the storage devices. The second DHCP server may be configured to process DHCP messages and retrieve configuration parameters for the storage devices from the configuration datastore. In certain embodiments, each storage initiator communicates with the DHCP servers, receives the configuration parameters such as iSCSI parameters, and provides the configuration parameters to one or more storage devices.
摘要:
An apparatus, system, and method are disclosed for automatically verifying access to a multipathed target at boot time. The apparatus is provided with a logic unit containing a plurality of modules configured to functionally execute the necessary steps of identifying a plurality of paths to a target device, automatically selecting one of the plurality of paths to the target device, and verifying access on at least one path to the target device. Beneficially, the disclosed embodiments of the apparatus, system, and method reduce false errors during the boot cycle, improve reliability of the multipathed network, simplify traffic load balancing, and provide for topology mapping for troubleshooting and network metrics. The disclosed embodiments provide a means for verifying multipathed targets automatically, without requiring user assistance, intervention, or interaction.