摘要:
Provided is a method of controlling a computer system which includes a host computer and one or more storage systems coupled to the host computer via a network, wherein the first processor executes an application job which executes data I/O in a logical storage area; the second processor executes a management job which executes the data I/O in the logical storage area; the method comprising: judging whether at lest one of resources of the computer system used for the data I/O of the application job is also used for the data I/O of the executed management job when performance of the application job drops below a predetermined threshold; and displaying information indicating the executed management job when it is judged that at least one of the resources used for the data I/O of the application job is also used for the data I/O of the executed management job.
摘要:
Provided is a method of controlling a computer system which includes a host computer and one or more storage systems coupled to the host computer via a network, wherein the first processor executes an application job which executes data I/O in a logical storage area; the second processor executes a management job which executes the data I/O in the logical storage area; the method comprising: judging whether at lest one of resources of the computer system used for the data I/O of the application job is also used for the data I/O of the executed management job when performance of the application job drops below a predetermined threshold; and displaying information indicating the executed management job when it is judged that at least one of the resources used for the data I/O of the application job is also used for the data I/O of the executed management job.
摘要:
A system is provided for building, operating, and managing a virtual network which integrates the configuration, the operation, and the management of plural information devices connected to a network. The system includes agents for operating, and managing information devices in the respective devices, a physical manager for building, operating, and managing the information devices, and a logical manager for logically building, operating, and managing the information devices. The agent operates to control the settings and the change of the information device in which the agent is mounted and communicates the information with the physical manager. The physical manager operates to manage the agent of each information device and communicates the information with a user and the logical manager. The logical manager operates to build, operate, and manage the directory services, the users, and so forth and, when these directories and user are newly set or changed, to communicate the information about the new settings and the change with the physical manager.
摘要:
In a computer system in which a storage unit is accessed by a host computer, protection key information for each of a plurality of areas of a storage volume, is stored into the storage volume mounted in the storage unit. When the storage volume is mounted on the storage unit, the storage unit reads out protection key information stored in the storage volume and stores it into a memory provided in the storage unit. When an access request for one of the plurality of areas of the storage volume is received from the host computer, the access request is collated with the protection key information stored in the memory relating to the requested area, and the access request is permitted or inhibited in accordance with the collating result.
摘要:
The service use requirement issue from the user is rejected by holding the threshold value for starting and releasing the service reject in response to the load in the side for providing the information communication service and multicasting the service reject information including the device in the users who do not issue the service requirement using the route with which each user transmits the requirement to the information communication service system when a load in the side for providing the information communication service becomes high and it is determined that the service reject is started. As explained above, when an information service system such as the shopping service system is placed in the overload condition, the service use requirement can be rejected from the user side device to ease the load of the service provision system.
摘要:
A method for use in a network having a plurality of host computers, at least one communication control processor (CCP) commonly connected to the host computers, and a plurality of resources connected to the CCP. According to the method, if a resource is to be added to or deleted from the network, an operator designates a reconfiguration directory including at least one reconfiguration designating data for defining a relation between the network and a resource to be changed. Each host computer is assigned a reconfiguration command. In response to this reconfiguration command, each host computer reconfigures its own network configuration definition information in accordance with the defined reconfiguration designating data within the designated reconfiguration directory. If the designated reconfiguration directory contains the reconfiguration designating data related to a resource to be connected to the CCP, a host computer operating as a master, issues a control command to the CCP in conformity with the reconfiguration designating data in order to reconfigure the network configuration definition information of the CCP.