摘要:
A data replication system having a redundant configuration including dual Fiber Channel fabric links interconnecting each of the components of two data storage sites, wherein each site comprises a host computer and associated data storage array, with redundant array controllers and adapters. The system employs the grouping of logical units into ‘association sets’, for logging and failover purposes. The concept of association sets allows the system provides for proper ordering of I/O operations during logging across multiple volumes. In addition, association sets are employed by system to provide failure consistency by causing the group of logical units/volumes to all fail at the same time, ensuring a point in time consistency on the remote site.
摘要:
A data replication system having a redundant configuration including dual Fiber Channel fabric links interconnecting each of the components of two data storage sites, wherein each site comprises a host computer and associated data storage array, with redundant array controllers and adapters. The system employs the grouping of logical units into ‘association sets’, for logging and failover purposes. The concept of association sets allows the system provides for proper ordering of I/O operations during logging across multiple volumes. In addition, association sets are employed by system to provide failure consistency by causing the group of logical units/volumes to all fail at the same time, ensuring a point in time consistency on the remote site.
摘要:
A system which provides a completely redundant configuration including dual Fibre Channel fabric links interconnecting each of the components of two data storage sites, wherein each site comprises a host computer and associated data storage array, with redundant array controllers and adapters. The array controllers perform a command and data logging function which stores all host write commands and data ‘missed’ by the backup storage array during a situation wherein the links between the sites are down, the remote site is down, or where a site failover to the remote site has occurred. Log units are used to store, in order, all commands and data for every transaction which was ‘missed’ by the backup storage array when one of the above system error conditions has occurred. The system provides rapid and accurate recovery of backup data at the remote site by sending all logged commands and data from the logging site over the link to the backup site in order, while avoiding the overhead of a full copy operation.
摘要:
A storage system capable of selectively presenting logical units to one or more host computing systems. The storage system comprises one or more persistent storage devices arranged as logical units; an array controller controlling and coordinating the operations of the persistent storage devices; a memory accessible by the array controller; and a configuration table stored in the memory, the configuration table containing one or more entries governing the interactions between the logical units and the one or more host computing systems. The configuration table contains an entry for each logical unit which the array controller accesses to determine if a particular logical unit should communicate with a particular one of the host computing systems, an entry for each logical unit which the array controller accesses to determine if a particular logical unit should communicate with a particular one of the host computing systems using an internal offset for a logical unit number, and an entry for each logical unit which the array controller accesses to determine if a particular logical unit should communicate with a particular one of the host computing systems using a predetermined host mode.
摘要:
A method for implementing security management in a storage area network by controlling access to network resources. Initially, a resource provider communicates with potential resource users, such as host computers, servers, and workstations, to allow the users to discover the resources available on the storage area network. Resource users that have not previously logged in to a particular resource supply identification information to the resource provider, which places the information in a ‘not yet approved entity’ table. The ‘not yet approved entity’ table is made available to a management station. An administrator, using the management station, then determines whether to authorize use of resources. If access to the requested resource is allowed, the resource user identification information is stored in an ‘approved entity’ table. A login is then allowed by the resource user to the selected resource. Once a resource user has initially logged in, connection information is maintained in the ‘approved entity’ table facilitating subsequent log-in attempts by the resource user.
摘要:
A method for implementing security management in a storage area network by controlling access to network resources. Initially, a resource provider communicates with potential resource users, such as host computers, servers, and workstations, to allow the users to discover the resources available on the storage area network. Resource users that have not previously logged in to a particular resource supply identification information to the resource provider, which places the information in a ‘not yet approved entity’ table. The ‘not yet approved entity’ table is made available to a management station. An administrator, using the management station, then determines whether to authorize use of resources. If access to the requested resource is allowed, the resource user identification information is stored in an ‘approved entity’ table. A login is then allowed by the resource user to the selected resource. Once a resource user has initially logged in, connection information is maintained in the ‘approved entity’ table facilitating subsequent log-in attempts by the resource user.