摘要:
Disclosed is a technique for maintaining consistency of data. One or more blocks of data identified by a first structure are copied to form a consistent set of data. While not acknowledging completion of write requests to any blocks of data, a second structure is created, wherein the second structure indicates which blocks of data are modified while the consistent set of data is being formed. Also disclosed is a technique for asynchronous copy. Indicators are updated in a first structure for one or more blocks of data, wherein each indicator in the first structure indicates whether a corresponding block of data was modified since the block of data was last sent to remote storage. While copying the blocks of data identified by the indicators in the first structure as having been modified since the blocks of data were last sent to remote storage, indicators in a second structure are updated for the one or more blocks of data, wherein each indicator in the second structure indicates whether a corresponding block of data was modified while a consistent set of data is being formed.
摘要:
Provided are a method, system, and program for forming a consistency group of data. Information is provided on a consistency group relationship indicating a plurality of slave controllers and, for each indicated slave controller, a slave storage unit managed by the slave controller. A command is transmitted to each slave controller in the consistency group relationship to cause each slave controller to transmit data in the slave storage unit to a remote storage in a manner that forms the consistency group. A determination is made as to whether all the slave controllers successfully transmitted the data in the slave storage units that is part of the consistency group to the remote storage.
摘要:
Provided are a method, system, and program for forming a consistency group of data. Information is provided on a consistency group relationship indicating a plurality of slave controllers and, for each indicated slave controller, a slave storage unit managed by the slave controller. A command is transmitted to each slave controller in the consistency group relationship to cause each slave controller to transmit data in the slave storage unit to a remote storage in a manner that forms the consistency group. A determination is made as to whether all the slave controllers successfully transmitted the data in the slave storage units that is part of the consistency group to the remote storage.
摘要:
Disclosed is a method, system, and program for managing metadata in cache. A first policy is used to determine when to remove data from a primary cache, and a second policy is used to determine when to remove data from a metadata cache.
摘要:
Provided are a method, system, and program for forming a consistency group of data. A command is received to form a consistency group with respect to data received at a first storage site that is mirrored to a second storage site. A first data structure is provided indicating updates to the first storage site not included in the consistency group that are received after the command and a second data structure is provided indicating updates to the first storage site in the consistency group to be formed. A command is transmitted to cause data copied to the second storage site that is part of the consistency group to be copied to a third storage site. Indication is received when the data in the second storage site that is part of the consistency group is copied to the third storage site.
摘要:
A target data storage system comprises a peer-to-peer communication link interface for linking the target to a source data storage system, and data storage for storing point in time copy data received from the source via the peer-to-peer communication link interface. Information is established at the target relating logical identification of the point in time copy data to point in time copy data stored at the target and to point in time copy data stored at the source, such that the information references the data storage system having requested point in time copy data. A controller of the target accesses requested point in time copy data at the target if the table indicates that the requested point in time copy data is available at the target; else obtains the requested point in time copy data from the source via the peer-to-peer communication link interface.
摘要:
Method, device and computer program product for determining a characteristic of an identifiable component. The method includes: receiving identification information representative of an identity of components that belong to a group of components, determining at least one characteristic of an identifiable component in response to the received identification information, and performing at least one characteristic responsive operation. The device includes an identifiable component and a component characteristic determiner. The component characteristic determiner is adapted to receive identification information representative of an identity of components that belong to a group of components and to determine at least one characteristic of the identifiable component in response to a relationship between the received identification information and reference identification information. The device is adapted to perform at least one characteristic responsive information.
摘要:
A method to initialize information disposed in an information storage and retrieval system comprising a data cache and one or more information storage media comprising a plurality of addresses. The method receives an initialization command, where that initialization command comprises a range of addresses and, optionally, an initialization pattern, where the plurality of addresses includes the range of addresses. The method forms and saves state information, where that state information includes the initialization pattern, and generates and saves a plurality of indicators, where that plurality of indicators includes an indicator for each track comprising the range of addresses. The method sets each of those indicators to a first value thereby indicating special handling, and provides an ending status signal, such that the receiving step, forming step, generating step, setting step, and providing step are performed substantially synchronously.
摘要:
Provided are a method, system, and program for managing resources in which a local processor sends remote operation requests to be executed by a remote processor having multiple resources. In the illustrated embodiment, the local processor and the remote processor each have a resource manager, each of which maintains a control set for each resource of the remote processor. Each control set of the remote processor resource manager includes a queue for queuing remote operation requests awaiting execution in connection with the resource associated with the control set. Each control set of the local processor resource manager includes a credit counter which keeps track of permissible outstanding remote operation requests. Each local processor control set credit counter is decremented for each remote operation request for the associated resource sent to the remote processor and is incremented for each acknowledgment received from the remote processor. For each remote processor control set, the remote processor resource manager sends an acknowledgment for each remote operation request initiated in connection with the associated resource. For each local processor control set, the local processor resource manager queues remote operation requests if the control set credit counter falls below a threshold after being initialized in accordance with the capacity of the associated remote processor control set queue.
摘要:
Provided is a technique for allocating resources. Reserved resources are allocated to one or more depth levels, wherein the reserved resources form one or more reserved pools. Upon receiving a request for allocation of resources, a depth level from which to allocate resources is determined. A reserved pool is allocated from the determined depth level.