摘要:
When an active data copy process relative to a logical storage device is performed without involving a computer, an access permission/rejection of the computer to the logical storage device is checked by referring to a correspondence between WWN of the computer and a logical storage device identifier LUN to thereby determine whether an access to a copy source logical storage device and a copy destination logical storage device is permitted or not. It is therefore possible to prevent an outflow of illegal data from a storage subsystem to be caused by an active copy instruction command.
摘要:
When an active data copy process relative to a logical storage device is performed without involving a computer, an access permission/rejection of the computer to the logical storage device is checked by referring to a correspondence between WWN of the computer and a logical storage device identifier LUN to thereby determine whether an access to a copy source logical storage device and a copy destination logical storage device is permitted or not. It is therefore possible to prevent an outflow of illegal data from a storage subsystem to be caused by an active copy instruction command.
摘要:
When an active data copy process relative to a logical storage device is performed without involving a computer, an access permission/rejection of the computer to the logical storage device is checked by referring to a correspondence between WWN of the computer and a logical storage device identifier LUN to thereby determine whether an access to a copy source logical storage device and a copy destination logical storage device is permitted or not. It is therefore possible to prevent an outflow of illegal data from a storage subsystem to be caused by an active copy instruction command.
摘要:
A backup processing method for backing up data to be used by a data-processing computer system comprises selecting resources in a usable state from a plurality of resources necessary for the data to be used by the data-processing computer system, selecting switches in a usable state from a plurality of switches needed to form routes among said selected resources, and executing backup processing by using the secured resources and routes when the resources and routes necessary for backing up data to be used by the data processing computer system are secured to form multiple backup subsystems.
摘要:
When a logical volume in a first storage box is transferred to a second storage box, information of an access object such as a network communication protocol possessed by a host which communicates with the first storage box is changed to change a network route for accessing the transferred logical volume. Logical volume transfer is notified from the first storage box to the host by using an ICMP Redirection Error message or the ARP protocol.
摘要:
The data up to a point of time whereat failure has occurred will be restored at high speed at a remote site without imposing any burden on a host. The first storage system on the master side processes an I/O request from the host, and as a result of I/O processing to the second storage system on the remote side, transmits the update data. The second storage system retains data received from the first storage system as update log data. The host transmits a command for settling a state of an application to the first storage system as data, and the first storage system transmits the data to the second storage system. The host and the second storage system both retain an identifier corresponding to the command, and relate the identifier to the log data. Thereby, the host designates the identifier at any given time, whereby the second storage system restores the data at any given time.
摘要:
The data up to a point of time whereat failure has occurred will be restored at high speed at a remote site without imposing any burden on a host. The first storage system on the master side processes an I/O request from the host, and as a result of I/O processing to the second storage system on the remote side, transmits the update data. The second storage system retains data received from the first storage system as update log data. The host transmits a command for settling a state of an application to the first storage system as data, and the first storage system transmits the data to the second storage system. The host and the second storage system both retain an identifier corresponding to the command, and relate the identifier to the log data. Thereby, the host designates the identifier at any given time, whereby the second storage system restores the data at any given time.
摘要:
When a logical volume in a first storage box is transferred to a second storage box, information of an access object such as a network communication protocol possessed by a host which communicates with the first storage box is changed to change a network route for accessing the transferred logical volume. Logical volume transfer is notified from the first storage box to the host by using an ICMP Redirection Error message or the ARP protocol.
摘要:
The present invention provides techniques, including a method and system, for relocating data between storage systems. In one embodiment of the present invention a host collects usage information from a plurality of storage systems, and determines the relocation destination LU for data stored in the LU to be relocated. The host alters an LU logical position name table that determines matching between the logical position names of data and LUs. It also carries out data relocation between storage subsystems by shifting data stored in an origin LU to be relocated to a destination LU. In another embodiment relocation of files is provided.
摘要:
A storage subsystem that has detected the necessity of the data relocation determines whether the data relocation is possible or not from one storage unit to another within the particular storage subsystem. A virtualization device is notified in the case where the data relocation in the particular subsystem is impossible. The manager of the virtualization device gives an inquiry to the storage subsystems as to whether any one of them can become a relocation destination or not. A storage subsystem determines, based on the related information, whether the data relocation requested is possible or not within the particular storage subsystem. In the case where such a relocation is possible, the copying process is carried out for data relocation from one storage subsystem to another in compliance with an instruction from the virtualization device.