WO2001020470A1 - System and method for host volume mapping for shared storage volumes in a multi-host computing environment - Google Patents
System and method for host volume mapping for shared storage volumes in a multi-host computing environment Download PDFInfo
- Publication number
- WO2001020470A1 WO2001020470A1 PCT/US2000/020312 US0020312W WO0120470A1 WO 2001020470 A1 WO2001020470 A1 WO 2001020470A1 US 0020312 W US0020312 W US 0020312W WO 0120470 A1 WO0120470 A1 WO 0120470A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data structure
- host
- computers
- memory
- hardware device
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
- G06F21/805—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0622—Securing storage systems in relation to access
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0683—Plurality of storage devices
- G06F3/0689—Disk arrays, e.g. RAID, JBOD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Definitions
- This invention pertains generally to computer systems and networks having two or more host computers and at least one shared data storage device. More particularly, the invention pertains to structure and method for controlling access to shared storage in computer systems and networks having a plurality of host computers that may create data integrity issues for the shared data storage, particularly in a Storage Area Network (SAN).
- SAN Storage Area Network
- BACKGROUND Conventional operating systems may typically assume that any storage volume or device is "private" and not shared among different host computers.
- a distributed computing system such as a network server system
- a disk drive, a storage volume, a logical volume, or other storage device may be shared and represent common storage.
- a controller responsible for controlling read, write, or other access to the storage device such as a hard disk array controller (for example a RAID controller) is attached to the plurality of host computers, such as through a SCSI Bus, Fibre Channel Loop, or other storage device interface
- problems may arise because one or more of these plurality of host computers may overwrite or otherwise corrupt information needed for the correct operation of another different host computer system.
- This problem is particularly prevalent when the plurality of host computers is formed from a heterogeneous mixture or collection of different host computers having different operating systems, but this problem also exists for homogeneous mixtures or collections of host computer systems.
- one type of operating system (such as for example, the Unix operating system of a computer made by Sun Microsystems) requires special information at specific addresses on the storage device, while a different type of operating system (such as for example, a computer utilizing the Windows NT operating system made by Microsoft) may require that any attached storage have special identifying information written to the same or an overlapping address on the same storage device.
- the second type (Windows NT) will overwrite the information needed by the first type (Unix) of computer, and from the perspective of the Unix computer, the storage will be corrupt and unusable.
- a problem situation can also frequently arise when the host system 101 has similar or the same hardware and the same operating system, that is, for homogeneous combinations of host systems.
- the Microsoft NT 4.0 operating system could represent such as problem on either homogeneous or heterogeneous hardware.
- Each host computer (computer A and computer B) will write a special identifying "tag" to each disk of the shared storage array. Whichever computer is the last to write to the disk or shared storage array will be the "winner” as its "tag” or “signature” will remain intact after the last write operation, and the other hosts will act, and be treated like, they have never seen the storage array or members of the array before.
- computer A formats a disk
- another computer B also subsequently formats the same disk, computer A's format and data is now corrupt. This latter scenario is independent of similarities or disparities in the host's operating systems.
- FIG. 1 we now describe an exemplary distributed computing system 100 having first, second, and third host computers 101 (101-1 , 101-2, 101-3) coupled to an array controller 104 which in turn is coupled to a storage subsystem
- logical volumes 108 formed from one or more logical volumes, here shown as an array of logical disk drive storage volumes (108-1 , 108-2, 108-3, ..., 108-N).
- these logical volumes 108 may correspond to physical hard disk drive devices, or to groups of such physical hard disk drive devices.
- the three host computers 101-1 , 101-2, and 101-3 are coupled to array controller 104 via a Fibre Channel Loop
- Fibre Channel Loop 120 communications channel, and the logical volumes 108 of the storage subsystem are coupled to the array controller 104 via an appropriate channel 122, such as for example either a Fibre Channel Loop communications channel or a parallel SCSI communications channel.
- an appropriate channel 122 such as for example either a Fibre Channel Loop communications channel or a parallel SCSI communications channel.
- SCSI protocols are frequently used in addition to the Fibre Channel physical layer and related protocols and standards.
- Fibre Channel Loop 120 is advantageous for interconnections of the host computers because of the flexibility and extensibility of this type interface to a large number of host computers and also, with respect to the inventive structure and method, for the existing support of World Wide Number (WWN) identification.
- WWN World Wide Number
- array controller 104 divides the storage into a number of logical volumes 108. These volumes are accessed through a Logical Unit Number (LUN) addressing scheme as is common in SCSI protocol based storage systems, including SCSI protocol based Fibre Channel Loop physical layer configurations.
- LUN refers to a logical unit or logical volume, or in the context of a SCSI protocol based device or system, to a SCSI logical unit or SCSI logical volume.
- Each of the host computers 101 of the system 100 has an operating system as is known in the art.
- the operating system such as Windows NT
- Windows NT on any single host will attempt to mount all of the logical storage volumes 108 that it detects are physically connected when host 101 boots, such as during host system power-up or reset. As a result, any data on any one of the logical volumes 108 can be accessed by the operating system.
- new disk storage additional logical volume
- the operating system including the Windows NT 4.0 operating system
- This identifying signature typically includes information that allows the particular operating system (such as Windows NT) to uniquely identify the storage device(s).
- the format and content of such signatures are not important to the invention except that they exist, are usually established by the vendor of the particular operating system (e.g. Microsoft Corporation for Windows NT), and are known in the art. Hence the specific content and location of these signatures are not described further here.
- a particular area on a storage device is reserved for the signature, but the implementation is specific to particular operating systems and installations.
- different host installations may cause problems.
- the size of the storage, the operating system, the version and/or revision of the operating system, and the like may differ from host to host.
- one operating system may place important data in an area normally reserved for other reasons in a different operating system or in a different installation of that same operating system. Therefore, although an area may be reserved for Windows NT, it is unfortunately problematic that another Windows NT system will write a separate signature in the same area.
- the location of the signature is usually fixed.
- the subsequently written Unix signature will corrupt the earlier signature and other data.
- the signature itself may subsequently be overwritten by data from another host computer during a normal write operation. Overwriting can happen at any time, but is most likely during a format or initialization process. In either event, it is clear that the information stored on the physical device and or logical volume will be corrupted.
- each host computer 101 has complete access to all of the Logical Volumes 108, and no structure or procedure is available for restricting access to a particular logical volume by a particular host or group of hosts.
- the invention provides structure and method for controlling access to a shared storage device, such as a disk drive storage array, in computer systems and networks having a plurality of host computers.
- the invention provides such a method for controlling access to a hardware device in a computer system having a plurality of computers and at least one hardware device connected to the plurality of computers.
- the method comprises associating a locally unique identifier with each the plurality of computers, defining a data structure in a memory identifying which particular ones of the computers based on the locally unique identifier may be granted access to the device; and querying the data structure to determine if a requesting one of the computers should be granted access to the hardware device.
- the procedure for defining the data structure in memory includes defining a host computer ID map data structure in the memory; defining a port mapping table data structure comprising a plurality of port mapping table entries in the memory; defining a host identifier list data structure in the memory; defining a volume permission table data structure in the memory; and defining a volume number table data structure in the memory.
- the memory is a memory of a memory controller controlling the hardware device, and the hardware device is a logical volume of a storage subsystem.
- the invention also provides an inventive controller structure, and a computer program product implementing the inventive method.
- FIG. 1 is an illustration showing an embodiment of a distributed computing system having a plurality of host computers coupled to an array of logical storage volumes though a Fiber Channel Loop and an a disk array controller.
- FIG. 2 is an illustration showing an embodiment of the inventive Host Volume Mapping structure including various data structures used for the inventive structure and method.
- FIG. 3 is a diagrammatic flow-chart illustration showing an embodiment of the Access Control and Validation Procedure of the Host Volume Mapping method.
- the invention includes method, apparatus, system, and computer program product for providing controlled access to storage volume(s) on an inventive storage system controller, such as a hard disk drive array controller 106.
- inventive structure, method, and computer program product including controller 106 and storage subsystem 108 having access controls, further solves the access and security problem of conventional systems and methods by limiting access to a volume of storage 108 on, or controlled by, the array controller 106 to a specific set of host computers 101 , as identified by a unique identifier (for example the World
- WWN Wide Name
- the invention also provides limited security control of data, where access to data must be limited or shielded from other users of the system. Further, the inventive method accomplishes this task with a minimal number of searches and overhead, and with minimal performance degradation. Where a particular host has two or more interfaces to the controller, including for example a host having multiple host bus adapters each having a unique ID, access may advantageously be further controlled based on the interface ID instead of, or in addition to, the host ID.
- the inventive structure and method are particularly suitable for situations where one or more data storage array controllers are attached to multiple host computers (or to a single host having multiple interfaces) with a controller that will request data transactions with the storage devices, such as for example a Redundant Array of Independent Disk (RAID) storage device array.
- RAID Redundant Array of Independent Disk
- Heterogeneity of the operating system may more likely result in corrupted data.
- HVM Host-to-Volume Mapping
- SAN Storage Area Network
- the Host-to-Volume Mapping (HVM) feature is desirably implemented as a software and/or firmware computer program product executing in a processor or CPU within the controller 106 and utilize data structures defined in a memory associated with the processor to alter the operation of the controller.
- controller 106 of the invention may differ from conventional controller 104; however, the invention may also be used with conventional controller suitably modified to provide the characteristics described herein.
- the inventive computer program product may be stored and executed in controllers having a fibre channel host interface and appropriate memory for defining and storing the inventive data structures, such as for example, the Mylex Corporation DACSF, DACFF, and DACFFX controllers, as well as other controllers.
- controllers having a fibre channel host interface and appropriate memory for defining and storing the inventive data structures, such as for example, the Mylex Corporation DACSF, DACFF, and DACFFX controllers, as well as other controllers.
- Aspects of controller design for certain exemplary Mylex Corporation controllers are described in the DACSX / DACSF / DACFL / DACFF OEM System Reference Manual Firmware Version 5.0 - Mylex Corporation Part Number 771992-04 (Mylex Corporation of Fremont, California and Boulder, Colorado), and herein incorporated by reference.
- each Logical Volume 108 may be configured to be visible to a single one of host computers 101 , (for example to host 101-2 only) or to a selected group or set of host computers (for example to hosts 101-1 and 101-2 only.)
- host computers 101 for example to host 101-2 only
- a selected group or set of host computers for example to hosts 101-1 and 101-2 only.
- one simple HVM configuration would allow host computer 101-1 access to Logical Volume 108-1 only, host computer 101-2 access to logical volume 108-2 only, and host computer 101-3 access to logical volume 108-3 only; even though all hosts 101 and all logical volumes 108 are physically connected to the controller.
- controller 106 uses novel data structures and a node name, such as the World Wide Name (WWN), associated with each fibre channel loop 120 device, including a Fibre Channel Host Bus Adapter installed in each host computer 101 , to uniquely identify the host computers that have logged into controller 106.
- WWN World Wide Name
- a node is one or a collection of more than one port and that a Node Name generally refers to a Wold Wide Name (WWN) identifier associated with a node.
- WWN Wold Wide Name
- Port Name is a World Wide Name identifier associated with a port, for example a port at which a host or a logical volume couples to controller 106.
- the inventive HVM structure, method, and computer program product provides a solution to the afore described shared access problem by utilizing a unique host identifier (host node name identifier) in conjunction with other structures and procedures to control access to storage on each logical volume.
- host node name identifier As the use of a host node name identifier is important to the operation of the invention, and as World Wide Names (WWNs) are an existing useful type of host node name identifier particularly for Fibre Channel Loop connected hosts and controllers, we briefly describe some attributes of WWN before proceeding with a more detailed description of HVM.
- WWN World Wide Names
- each device on the loop 120 including each host 101 by virtue of a
- Fiber Channel Host Bus Adapter has a unique identifier, referred to as its World Wide Name (WWN) 107.
- WWN 107 are known in the art, particularly for Fibre Channel devices, and we only describe in detail aspects of the WWN that are useful in understanding the structure and operation of the invention.
- a World Wide Name is a 64-bit identifier (8-byte), with a 60-bit value preceded by a 4-bit Network Address Authority Identifier (NAAI), used to uniquely identify devices, nodes, or ports, including for example a Host Bus Adapter (HBA), for connecting a host computer 101 to a Fibre Channel communications loop 120.
- This WWN 107 is unique for each fibre channel device, usually in the form of a number (serial number) that the manufacturer registers with the appropriate standards committee through the process defined as a part of the Fibre Channel standards specification. It is unique to each fibre channel connect device manufactured. For example the fiber channel interface card or host bus adaptor (HBA) in each host has a unique WWN.
- the WWN 107 is used to uniquely identify each host computer 101 connected to the Fibre Channel loop 120, or more specifically each Host Bus Adapter (HBA) coupling the fibre channel bus 120 to the processor and memory system in the host computer.
- HBA Host Bus Adapter
- WWNs to allow access to a volume of storage based on the WWN 107.
- at least some embodiments of the invention may be implemented in existing hardware, while other embodiments benefit from or require specific controller hardware not provided in conventional controllers.
- Fibre channel loops 120 and the WWN 107 associated with such Fibre channel loops the invention is not limited to such Fibre-channel loops or to WWNs as the only host node identifier, and can be used with alternative communication channel strategies and protocols and/or with different host node identifiers, such as for example for parallel SCSI channels and SCSI IDs, although this would not represent a preferred configuration due to the limited number of SCSI addresses (15) and the limited physical distance (usually about 6 meters) between the SCSI devices, neither of which limitations are present in a Fibre Channel implementation.
- various computing node identifiers may be envisioned for computers and storage volumes interconnected over the Internet or world wide web.
- HVM Host Volume Mapping
- Logical Volumes 108 may be coupled to controller 106 using either Fibre Channel Arbitrated Loop 122, or where sufficient to support the number of units and the cable length limitations, via parallel SCSI chain. Logical volumes 108 may be configured as RAID or other storage subsystems as are known in the art.
- HVM structure and method may be applied to any situation where controlling access to one device by another device is desired, hence while we describe controlling access to the logical storage volumes 108 by each host computer to preserve data integrity, the inventive method may readily be applied to controlling access to any other computer peripheral devices for any other reason. For example, access to color printers and CD-ROM recording devices may be restricted from particular computers where monetary payments for use of the relatively expensive computer peripheral has not been made, or for security reasons, to name but a few situations where controlling access may be desired.
- FIG. 2a shows controller 106 and its relationship to host computers 101 and logical volumes 108, and further including a top-level illustration of the data structures defined in NVRAM 182 of the controller.
- FIG. 2b shows additional detail of the data structure.
- the phrase "data transaction" as used here refers to information transfers between a host 101 and the array controller 106 and includes such typical operations as reading and writing data to the array controller 106.
- a data transaction starts or is initiated by a host computer 101 when it issues a data transfer command (typically read or write request) over the fibre channel bus 120.
- Each logical volume 108 in the storage array is assigned or associated with a volume data structure 140, one element of which is a Volume WWN Table (VNT) 130.
- VNT tables (130-1 , 130-2, ..., 130-N) may be thought of as separate small tables or as a single larger table, but in any event provide a VNT data structure used in subsequent search or query operations. (We will later expand the description of the concept of the Volume data Structure to encompass a Volume Permission Table 160.)
- Logical Volume 108-1 is associated with VNT 130-1
- Logical Volume 108-2 is associated with VNT 130-2
- Logical volume 108- N is associated with VNT 130-N.
- VNT tables are stored as a part of controller 106 configuration data stored in a non-volatile memory (NVRAM) 182 of controller 106 and desirably on the disks (logical volumes) associated with that controller 106.
- NVRAM non-volatile memory
- This configuration typically referred to as a "Configuration on Disk” (COD) can be accessed (written and read) by vendor unique direct commands which permit the storage volume array 108 to be initially configured and/or reconfigured as necessary.
- COD Configuration on Disk
- Each Volume WWN Table 130 has a finite number of entries at any given time, one entry for each WWN that is permitted to access its associated logical volume 108. But, while the size or number of entries in any one Volume WWN Table
- the volume WWN Table 130 is finite at any given time, the finite number corresponding to the number of fibre channel devices (hosts or HBAs) that are permitted to access the volume, the size of the Volume WWN Table is not fixed and can be expanded when necessary to any size so as to accommodate the required number of fibre channel device entries, limited only in a practical sense by the memory available to store the entries.
- the zero value serves as an indication that all hosts may have access to that particular logical volume.
- a host computer 101 desiring to access a logical volume 108 controlled by controller 106 must login or otherwise identify its access request.
- Host 101 first logs in to the logical volume storage array 108 via controller 106, then makes requests to access a specific logical volume. Aspects of this login are a conventional part of the fibre channel arbitrated loop protocol and not described here in detail. (See Fibre Channel Arbitrated Loop Protocol Standard and Fibre Channel Physical and Signaling Interface, which are herein incorporated by reference.)
- the array controller 106 is notified that a host 101 is attempting to connect to the logical volume(s) 108 and the unique
- controller 106 identifies a Host Index (HI) 151 for that host based on the received Loop ID 152.
- the Host Index 151 functions or operates as a pointer to allow simplified access to information stored in the Host WWN List 153 as well as indirectly into the Volume WWN Tables (VNT) 130 and Volume Permission Tables (VPT) 194 as described in greater detail below.
- the Host Index consists of 4 bits, so that at least 16 different hosts can be uniquely identified, while other embodiments provide a larger number of bits and permit a greater number of hosts to be uniquely identified.
- Host WWN List 153 data structure defined in memory (NVRAM) 182 of controller 106 and indexed by a Host Index 151.
- Host WWN List 153 includes indexed storage for up to 256 (numbered 0-255) host WWN 107 entries in a linear list.
- Storage locations in Host WWN List 153 that are empty are indicated by "FF.FF.FF.FF.FF.FF.FF.FF".
- Loop ID Map List 155 maps each Loop ID 152 to a Host Index 151 as illustrated in FIG. 2b.
- the Loop IDs 152 in consecutive memory storage locations are consecutive numbers (the pointer), while the Host Index 151 values are not consecutive and are represented by two-byte hexadecimal values.
- the Host ID Map list 155 is queried by the Host Loop ID 152 pointer.
- the Host Loop ID 152 associated with a particular received command 109 is the value "23", and therefore serves as a pointer or index into Host ID Map Table 155 to select entry Loop ID number 23 (actually the 24 th entry beginning from entry zero) of the Host ID Map 155.
- Host ID Map 155 entry number 23 contains the Host Index "01 h" which in turn serves as a pointer or index into Host WWN List 153 to select the WWN 107 associated with that Host Index, in this case the second entry starting from location zero, here the WWN
- controller 106 maintains only one Host WWN
- the procedure is able to validate or alternatively deny access to a host attempting the login.
- Volume Mapping is a process where a controller 106 maps a particular Fibre Channel (as identified by the I/O processor on which the command is received), Fibre Channel Loop ID, and SCSI LUN to a particular Logical Volume.
- a SCSI LUN is a path to a logical volume of storage.
- HVM “Host-to-Volume Mapping” extends the concept, method, and structure of Volume Mapping (VM) by allowing a particular Host (identified by the Fibre Channel,
- Fibre Channel Loop ID and SCSI LUN
- HVM Fibre Channel Loop ID
- SCSI LUN Fibre Channel Loop ID
- the Volume Mapping feature maintains a Volume Mapping Table in the form of a Port Mapping Table 190 for controller 106, port 114, Fibre Channel I/O
- Logical Volume 108 This allows a specific Logical Volume to appear as a different LUN on each host port 114.
- Allowing a specific logical volume to appear as a different LUN on each host port is advantageous because it permits great flexibility in allowing host access to the logical volume, and for a HVM environment described in greater detail hereinafter, this feature is particularly advantageous because the permitted flexibility allows storage volume mapping to a heterogeneous collection of host computers with heterogeneous operating systems.
- Each of these systems will have specific requirements for mapping storage and accommodating these different storage mapping requirements advantageously relies on the ability to map storage in a variety of different ways.
- volume Mapping is to break up the storage capacity of the physical disc drives connected to the array controller into "Logical Volumes", then to control the host computer's access to these logical volumes by assigning an access path to each logical volume and checking to verify that an attempted access path is valid.
- the access path consists of a host-to-controller Port 114 (i.e., which Host I/O Processor 184), the SCSI ID (or fibre loop ID) of the Host Processor 184, and the SCSI LUN Number of the read or write command.
- the Port Mapping Table Entries 191 contained within the Port Mapping Table 190 are advantageously instantiated for each controller 106, each host channel 184, and each logical volume 108 as illustrated in FIG. 2b, and defines how each host port 114 and host port I/O controller 184 connects through array controller 106 to each logical volume 108.
- the Port Mapping Table 190 contains a plurality of Port Mapping Table entries 191 , one entry for each controller 106, Host I/O processor 184, and Logical Volume 108 combination.
- Each Port Mapping Table entry 191 includes an 8-bit (1-byte) Target ID 192 containing the loop ID of the Logical Volume on this port, an 8-bit (1-byte) LUN 193 containing the LUN number for the logical volume on this port to which the command is directed (also referred to as the target loop ID), a 32-byte Volume Permission Table 194, and a Flag Bit 195 field (8-bits) storing various flag indicators.
- the flag bits have specific functions. If a "Valid” flag (bit 6) is clear then all hosts are granted access to the logical volume. If the "Valid” flag bit (bit 6) is set “1" and the Volume Permission Table is also all zeros, then no hosts will have access to the logical volume.
- the Port Mapping Table Entries 191 are advantageously instantiated for the controller 106 in a single controller, or for each controller in the case of a multi- controller (e.g. duplex-controller) configuration, for each host channel, and for each logical volume.
- the controller 106 maintains a
- a controller 106 may typically have a plurality of host ports 114 and disk drive ports
- I/O processors 184, 185 at each port.
- the I/O processors such as host I/O processors, Fibre Channel I/O processors 184, 185 can be the same type, but these are segregated into host ports 184 (for communication with the host computer) or disk ports 185 (for communication with the disks.)
- an Intelligent SCSI Processor (ISP) chip is used for Fibre Channel I/O Processors 184, 185.
- the ISP processor chip is manufactured by Q-Logic Corporation and is available from Q-Logic Corporation of 3545 Harbor Blvd, Costa Mesa, CA 92626. Several variations of ISP chips are manufactured by Q-Logic in the "ISP product family”.
- Controller 106 uses the LUN number requested by the host and the identity of the host-to-controller port 114, 115 (or 184, 185) at which the command was received, both of which are produced by the ISP with command, to determine which
- Fibre Channel protocol chips such as ISP
- Controller 106 uses the Volume WWN Table 130 to determine allowed and disallowed access to a specific logical volume by any particular host computer. If a host computer 101 sends a new command to controller 106, the controller validates the WWN, controller port, and LUN against data in the table 130 prior to servicing the host command. If the WWN, LUN, and host-to-controller port information are valid for the Logical Volume, the command requested by the host is completed normally. However, if the WWN, LUN, and host-to-controller port combination are not valid for the logical volume, the requested command is not completed normally and a status is returned indicating that the particular logical volume is not supported.
- program code implemented as firmware 301 provides that a host command that cannot be validated is completed with a "Check Condition” status, with the sense key set to "Illegal Request (05h)” and the sense code set to "Logical Unit Not Supported (25h)".
- HVM Host Volume Mapping
- each particular logical volume 108 is permitted by disk array controller 106 only when the WWN of the particular host computer requesting data from the particular logical volume 108 is contained in the
- N Volume WWN Table 130 associated with the particular logical volume 108.
- the WWN must be present in the table, and if it is present and the host has logged onto the array, only a check of the Volume Permission Table is further required to validate access.
- N Volume WWN Tables 130 (130-1 , 130- 2, 130-3, ..., 130-N) are provided in the system. If all volumes may be accessed by the identical set of host computers, each of the N Volume WWN Tables will contain the same list of host WWNs; however, the contents of the N Volume WWN Tables 130 for the logical volumes will generally differ when different volumes are available for access by different hosts.
- array controller 106 searches all of the Volume WWN Tables 130 associated with each logical volume (that is Tables 130-1 , 130-2, ..., 130-N) to determine which, if any, of the logical volumes the requesting host has permission to access.
- a host will have permission to access a logical volume when that host's world wide name appears in the Volume WWN Table 130 associated with that logical volume and will not have permission to access a logical volume when that host's world wide name does not appear in the table.
- the array controller controls access.
- the Volume Permission Table 194 is generated as the search proceeds and is kept as a part of the Port Mapping Table 190.
- the Volume Permission Table 194 includes a Permission Indicator 195 that indicates whether the particular host with HI has permission to access data on the logical volume. These VPT 194 are also illustrated in FIG. 2b and identify which host (based on the Host Index 151 ) have permission to access and which do not.
- the Volume Permission Table 194 entry for the particular host (as identified by that host's HI) will be set to either "true” (equal to 1 ) or "false” (equal to 0) depending on the outcome of the search. For example, if the Volume WWN Table 130 search identifies that a host should be allowed access to a particular logical volume (when that host's WWN appears in the Volume WWN Table 130 associated with that volume), the Volume Permission Table 194 entry (Permission Flag 195) for that host (as identified by the HI) will be set to "true” or "1", indicating that the host has access to that logical volume. On the other hand, if the query identifies that the host's WWN does not appear, the Volume Permission Table 194 entry (Permission Flag 195) for that host
- the HI 151 for the requesting host is determined by controller 106 based on that host's Fibre channel Loop ID 152 which is returned by the Fibre channel I/O processor 184 along with detailed information that fully defines the operation, including the LUN to which the read or write request is addressed. If the request is not a Vendor Unique command (which might indicate an attempt to configure or reconfigure a volume and require special handling), the array controller 106 examines the Volume Permission Table 194 for that HI and for that logical volume. If the permission indicator associated with that HI is true ("1"), the request is executed normally.
- the read, write, or other access request is executed using the normal procedure for reading or writing data to or from the logical volume.
- the permission indicator associated with that HI and for the logical volume to which the request is addressed is false ("0"), then the read or write command is rejected back to the host computer from which it was sent with an error condition.
- the controller 106 should also verify that the logical volume is mapped to the controller port on which the command was received. As there can be multiple host-to-controller ports 114, 184; and a logical volume can be mapped to any single one of the ports, to any selected plurality of the port, or to none of the ports; the controller 106 should assure that the logical volume can be accessed through the particular host-to-controller port on which the command was received. The controller should also verify that the logical volume is mapped to the Logical Unit Number (LUN) of the command. Since each port can have many logical units as defined in the SCSI and Fibre Channel specifications, this allows one port to access many devices.
- LUN Logical Unit Number
- the controller should verify that the WWN is valid for this logical volume, as already described.
- These procedures allow the host 101 and read and write data when access is permitted, and to identify that a logical volume 108 is present in the array and in the computing system 100 and mapped to that Logical Unit Number (LUN), but does not allow the data on that logical volume to be accessed and potentially altered when access is not permitted.
- LUN Logical Unit Number
- Providing a capability for the host system to identify the presence of the logical volume and mapped to a particular Logical Unit Number is desirable because conformity with SCSI standards is desirable and it is required by the SCSI protocol to allow any host computer to determine what storage is available, and what the parameters of that storage all (size, transfer capacity, etc.).
- the configuration of the array controller(s) 106 is stored on a special reserved area on the disks, this is referred to as "Configuration on Disk” (COD).
- COD Configuration on Disk
- the replacement controller can retrieve the original configuration from the disk and automatically restore it rather than having to figure out its configuration information during a separate and time consuming reconfiguration procedure.
- Configuration on Disk (COD) space is limited, the maximum number of connected hosts may be limited, for example, to some number of hosts, such as to sixteen hosts. In other embodiments where COD is not limited, the maximum number of connected hosts parameter may be set to 256 entries so as to allow a sufficient number of entries for a fully populated loop in accordance with the fibre channel specification.
- firmware in array controller 106 uses the Host ID Map 155 to translate from a host computer's fibre channel loop ID 152 to the correct Volume WWN Table 130 entry. This allows hosts 101 to change their particular fibre channel loop ID 152 without affecting the Volume WWN Table 130.
- a Host ID Map 155 is maintained for each fibre channel port on array controller 106.
- the maximum number of fibre channel host node (WWN) names that can be accommodated is set to 256 to allow any loop ID in the range of 0 to 255.
- the firmware executing in the controller 106 retrieves the login information from all hosts 101 on the loop 120. From the login information, the firmware constructs the Volume WWN Table 130 as well as the Host ID Map Table 155. These two tables in tandem provide the firmware the capability to correctly translate the loop ID 152 embedded in a new command from the fibre protocol chip (e.g. ISP chip) to the Host Index 151 , which in turn identifies a host 101 with a specific WWN 107.
- the fibre protocol chip e.g. ISP chip
- the loop ID 152 is mapped to the host WWN 107 by: (i) first mapping the loop ID 152 to the Host Index 151 , and (ii) then mapping the Host Index 151 to the host WWN 107.
- This approach is advantageous because only a small (minimum) number of searches and comparisons are needed to determine if a particular host should be granted access to a logical volume.
- Step 302 the Controller 106 searches for the WWN 107 of the host attempting the login in the Host WWN List 153 (Step 305). If the WWN of the controller attempting the login is found (Step 306), the position of the host's WWN 107 in the Host WWN List 153 is the Host Index 151.
- the WWN 107 of the host attempting the login is added to the end of the Host WWN List 153 (Step 307) and that position is the Host Index 151.
- the Host Index 151 is then placed into the Host ID Map 155 at the position indicated by the host's
- the controller 106 then collects the following information from the Fibre Channel I/O Processor 184: the controller (Step 309), the I/O Processor on which the request was made (Step 310), and the Logical volume for which the command was targeted (Step 311 ). (The process of collecting this information is typically unique to the particular hardware that implements the Fibre
- Step 312 This information allows the controller 106 to identify the correct Port Map Table 191 (Step 312), which contains the Volume Permission Table 194 for that logical volume 108.
- the controller 106 searches the Volume Name Table 130 associated with that LUN to determine if that host attempting the login is allowed to access that logical volume 108 (Step 313). If a matching host WWN 107 is found in the Volume Name Table 130 for that logical volume 108, the controller 106 sets the Volume Permission Table 194 entry pointed to by the Host Index 151 to "true” or "1" (Step 315). If a matching WWN is not found for that logical volume 108, the controller 106 sets the Volume Permission Table 194 entry pointed to by HI to "false” or "0" (Step 314).
- Controller 106 waits for a host access request (e.g. a command) to be received.
- a host access request for example, a read or write command, or an Inquiry or Vendor Unique command
- controller 106 determines the command type (Step 302). Once a command is received, controller 106 determines the type of command to be an I/O command (such as a Read Command or a Write
- Step 303 a Vendor Unique Command or Inquiry Command
- controller 106 determines the identity of the controller in which the command was received (Step 317), the host port of the command (Step 318), and the LUN and corresponding logical volume to which the command is addressed (Step 319).
- the proper Port Mapping Table is located based on the controller, host port I/O processor, and logical volume (Step 320); and the Host Index in the Host ID map is identified based on the Target ID of the command (Step 321 ).
- Controller 106 then examines the Volume Permission Table 194 at the position pointed to by the Host Index of the command to determine if the position stores a "1" bit (true) or a "0" bit (false) (Step 322). If the Permission Indicator value is true, access to the logical volume is permitted and controller 106 processes the command normally (Step 325). The process then completes and returns (Step 326). If the value is false, access to the logical volume is not permitted, controller 106 responds with an error condition (Step 324), such as an error condition indicating that storage space is not available for that logical volume, and the process completes and returns (Step 326).
- an error condition such as an error condition indicating that storage space is not available for that logical volume
- the request is not an I/O command but instead either an Inquiry Command or a Vendor Unique command
- the response depends on the type of command. If the request is a Vendor Unique command, controller 106 processes the command normally, and returns (Step 304).
- Host-to-Volume Mapping is an enhancement and extension of the Volume Mapping (VM) capability of the array controller already described, and maintains a port mapping data structure on a per logical volume basis.
- per logical volume basis we mean that the port mapping data structure is instantiated for each logical volume.
- HVM enhancement we provide the host's WWN as a further access path qualifier.
- the inventive procedure 300 is advantageously implemented as a computer program product 301 defined and stored in the memory, usually NVRAM 182, of controller 106 and optionally stored in memory of a host or on other storage media and downloadable to the controller.
- the program product 301 or executable portions thereof, is moved from memory 182 to RAM 181 associated with processor 180 of controller 106, and is executed by the Processor 180 within the controller.
- Processor Memory 181-182 refers to RAM, ROM, NVRAM and combinations thereof.
- Data to be sent between the host computer 101 and the logical volumes or disk drives 108 is buffered in the Data Cache Memory 186 which is accessed though the PCI Bus Interface and Memory Controller 183, though other interfaces may be used.
- the Fiber Channel I/O Processors 184 (184-1, 184-2, 184-3, ..., 184-M) send and receive data from the host computers 101 and buffer this data in the Data Cache
- Fibre Channel or SCSI I/O Processors 185 (185-1, 185-2, ..., 185-N) send and receive data from the logical volumes or disk drives 108 and buffer this data in the Data Cache Memory 186.
- Processor 180 coordinates the activities of all of the I/O processors 184-185, and handles scheduling of tasks including read and write tasks, and error handling.
- the inventive method minimizes the number of required searches at least in part because an efficiently organized and structured Volume data structure 142 including Volume Permission Table 194 associated with each logical volume was built (or updated) at login. In the embodiment of the invention described here, it is only necessary to examine one byte (one-bit) before access privileges can be verified and a read or write operation can be scheduled.
- volume Permission Table 194 A less efficient implementation of this functionality might be provided within the invention without the Volume Permission Table 194, but then a separate search of the Volume WWN Table would be required for every read and write command received. For example, there would be a requirement to search through and compare up to 16 entries at 8 bytes per entry of all the Volume WWN Tables 130 for each and every read and write operation. No data transfers would occur until these comparisons were complete and would impose significant limitations and increase response time and reduce throughput for the entire system. In the preferred embodiment of the invention, a search is only required at login and thereafter access privileges are determined very quickly using the Volume Permission Table 194.
- a Logical Volume maps to a single LUN only on a specific host port; (ii) a Logical Volume maps to the same LUN for all hosts that are granted access to the Logical Device in the Volume Permission Table (or Host Index Bit Map); (iii) a Logical Volume may map to different LUNs on a different controller or different host port; and (iv) multiple Logical Volumes may map to LUN 0 (or any other LUN) on a single host port, provided that there is no overlap of the Volume Permission Table (or Host Index Bit Map) for the Logical Devices.
- Vendor Unique commands allow the system 100 to be configured, and are not usually logical volume dependent. In this way, an array controller 106 that is not configured as part of the system 100 can be configured or re-configured to operate correctly with the unique WWNs 107 of the hosts 101 in the system 100. Configuring the controller to operate correctly with the logical volume 108 and with the unique storage requirements of the hosts 101 involves building a configurations data structure, and passing that data structure to the array controller through a
- a user on the host computer (any of the host computers 101 connected to the controller 106) builds a configuration data structure in the hosts internal memory. (This process may also be automated based on information collected or available from other sources.)
- the host computer transfers that configuration data structure to the array controller 106 though the Write Configuration variant of a Vendor Unique command. Controller 106 acknowledges the successful receipt of the command by returning a good SCSI status to the host in response to the Vendor Unique command.
- the array controller writes the configuration data to all of the disks (logical volumes) attached to the controller.
- the host issues a Reset Controller Vendor Unique command to the array controller that causes the controller to reset and restart.
- the controller 106 is configured as specified by the data in the configuration structure.
- An Inquiry command is a command that allows the host computer to determine if any data storage space is available for a specific SCSI Logical Unit and allows the host to determine the transfer characteristics for that SCSI logical unit. It returns specific information detailing the storage capacity of a SCSI LUN, the transfer capability of the LUN, serial numbers, and other information.
- a Vendor Unique command is a command that allows the unique characteristics of the array controller (for example, those characteristics not defined in the SCSI or Fibre channel specifications and therefore possibly not available via standard SCSI or Fibre Channel commands or protocols) to be determined and set as well as allowing other special operations to the storage array 108.
- This special treatment allows a controller that is not configured to be re-configured to operate correctly with the attached hosts.
- Vendor Unique type commands include the Set Configuration command and the Read Configuration command for reading and setting the array controller's configuration, and the Pass Through Operation command which allows the host direct access to the disk devices attached to the controller. These commands are known in the art and not described here in greater detail, except as necessary to describe special handing related to the invention.
- the array controller 106 will return conventional Inquiry Data, and will indicate whether or not that host has access to the logical unit (and hence the logical volume. If the host does not have access to the logical volume, the controller will return the Inquiry Data with the Peripheral Qualifier set as an indicator to indicate that the array is capable of supporting a device on this SCSI logical unit, but that no device is currently connected to this SCSI logical unit.
- Inquiry commands are handled in this way in part because the SCSI specification states that a SCSI LUN should always return Inquiry Data.
- Inquiry data is status data about the SCSI device, and has nothing to do with data stored on that device. It is an issue for the command and the host to determine if the device has any storage, and to determine what the device is capable of, for example, how fast it can transfer data.
- the SCSI protocol runs on top of the Fibre channel layer, so this description is applicable to both parallel SCSI and Fibre channel implementations of the invention. Where conformity with the SCSI specification is not required, alternative procedures may be substituted.
- the controller completes the command normally, reporting only the LUNs accessible by the host requesting the command.
- a Report LUNs command returns information that details which SCSI Logical Units are available to the host on that fibre channel at that SCSI address.
- the array controller will assert an error condition and deny access.
- the error condition may be asserted by setting a SCSI Check Condition status for that command, and returning SCSI Sense Data with the Sense
- Host-to-Volume Mapping advantageously uses several particular Vendor Unique direct commands. These are referred to here as Host-to-Volume Mapping (HVM) Direct Commands.
- a direct command is a SCSI Vendor Unique Command that allows configuration data to be sent and received by the array controller.
- Direct Commands include: Read LUN Map, Write LUN Map, and Read Volume WWN Table.
- the Read LUN Map command returns to the host, Volume Mapping information maintained by array controller 106.
- the host needs Volume Mapping information from the controller in order to display the current configuration of the logical volume array to the user.
- the mapping information is stored in the logical volume Port Mapping Table data structure defined in the configuration data of the controller. This data is stored in the non-volatile memory of the array controller 106, and preferably in special reserved areas (COD) of the disk drive as well.
- the Read LUN Map command is sent using Vendor Unique Direct Command opcode (20h) in the controller firmware. An exemplary command format is illustrated in Table I.
- Table I Exemplary Read LUN Map Vendor Unique Direct Command CDB Format.
- the LUN field contains the logical unit number of the CDB, and is ignored.
- the Direct Command Opcode (DCM P OP CODE) is the command to be executed
- MDACIOCTL_READLUNMAP (D1 h) is the specific command value for the Read LUN Map command.
- the Logical Volume Number (Most Significant Bits - MSB and Least Significant Bits - LSB) specifies the device number of the Logical Volume whose information is to be reported.
- the Allocation Length indicates the number of bytes the initiator has allocated for returned information. If the length is zero, no data is transferred and this is not treated as an error condition. The controller terminates the data phase when it has completed the transfer of the requested number of bytes or all returned Volume Mapping information, whichever is less. All Reserved fields and Control Byte (which is ignored here) should be 0.
- Error conditions for the Read LUN Map command include standard SCSI responses for an error, including that an invalid Logical Volume number was specified.
- the controller will also respond to a SCSI Check Condition Status, such as will occur when a non-existent logical volume is specified in the command.
- the Write LUN Map Vendor Unique Direct command allows an initiator, such as a host computer, to create or change the Host-to-Volume Mapping (HVM) information used by the controller.
- HVM Host-to-Volume Mapping
- This data format reflects the Port Mapping Table data structure.
- An exemplary WriteLUN Map Direct Command CDB Format is illustrated in Table II.
- Table II Exemplary Write LUN Map Direct Command CDB Format.
- the operation code (DCMD OP CODE) field value for the write LUN map (MDACIOCTL_WRITELUNMAP) (D2h) specifies the direct command to write the
- the Logical Volume Number specifies the device number of the logical device whose information is to be reported.
- the Allocation Length indicates the number of bytes the initiator is going to send to the controller. If the length is zero, no data is transferred and this is not treated as an error condition. All Reserved fields and Control Byte must be 0. Error conditions for the Write LUN Map include standard SCSI responses for an error, including that an invalid or non-existent Logical Volume number was specified.
- the Read Volume WWN Table command returns the Volume WWN Table maintained by the controller.
- the data returned by this command provides a translation from a host's physical WWN to the Host Index used internally by the controller and by the Read/Write LUN Map commands. This information is necessary when the host computer constructs the information for the configuration sent during a Write LUN Map command.
- An exemplary CDB for Read Volume WWN Table Vendor Unique Direct Command is illustrated in Table III.
- the operation code field (DCMD OP CODE) labeled field read host WWN field (READ_HOST_WWN_TABLE) specifies the direct command to read the host WWN table.
- This command may be adapted to return a desired number of bytes of data per host supported. The number of bytes returned are usually determined by the particular host computer. It should be ready to accept the data the controller sends, so it needs to have enough memory space available to store the data. This may typically vary from computer to computer. For example in one embodiment of the invention, the command returns twelve bytes of data per host, while in another embodiment of the invention, the command returns 192 bytes of data per host supported, and in yet another embodiment of the invention, the firmware in which this command is implemented returns 3072 bytes of data per host supported.
- External configuration programs such as GAM (Global Array Manager) or RAIDfx can use the data from the Read Volume WWN Table command to determine some limited information regarding the fibre host cabling topology.
- Hosts available for assignment in the HVM should be displayed by their respective WWN for fibre channel topologies.
- the concept of the Host Index may normally be hidden from the end-user, as the assignment of host indexes is arbitrary, with the Host Index having no fixed relation to the physical host. Once Host Indexes are assigned, they remain fixed until the configuration is cleared.
- a simple graphical representation of the host cabling and connection topology may optionally also be provided to the user to aid the end-user in properly determining a viable Host-to-Volume Mapping (HVM) strategy.
- External configuration programs may also be provided with a
- probe for attached storage through other hosts on a network to enable the configuration program to associate the actual network name of the attached hosts with their respective WWN.
- Translation and conversion procedures may optionally be provided for legacy systems and configurations that were implemented prior to HVM.
- HVM Host-to-Volume Mapping
- HVM Host-to-Volume Mapping
- Volumes based upon the identity of the host requesting a command, and the specific command sent.
- the controller always responds to a SCSI Inquiry command from any host and to any LUN with good status. If the host does not have access to the Logical
- the controller returns the Inquiry data with the Peripheral Qualifier set to indicate that the target is capable of supporting the specified device type on this
- the controller If the host does have access to the Logical Volume, the controller returns its normal Inquiry data.
- the SCSI Report LUNs command is always supported on LUN 0, regardless of the host sending the command or the controller port the command was received on. The controller returns information only about the LUNs that the host requesting the command has access. For the SCSI Request Sense command, if a host does not have access to the addressed LUN, the controller returns sense data with the sense key set to Illegal Request and the additional sense code set to Logical Unit Not
- the inventive structure and method support a variety of different multiple host configurations, including Multiple HBAs in the same NT host, Multiple NT hosts, Multiple HBAs in the same IRIX host, and Multiple hosts having mixed operating systems (for example, IRIX and NT).
- the inventive structure and method may also be used in an Internet configuration or with any interconnected network of host computer systems and/or devices such as wide area networks (WANs) and storage area networks (SANs). While the external communication net increases in speed, the storage area network speed stays about 10 times faster. Furthermore, while we describe a structure and method that is based upon the WWN of a fiber channel device, other unique identifiers may be used, for example the serial number that is imbedded in certain host computer processor chips, such as the Intel Pentium III microprocessor chips. These and other identifiers may alternatively be used.
- WANs bandwidth of external nets
- SANs storage area nets
- the structures, procedures, and methods described here may be implemented for distributed storage on the Internet or on other interconnected networks of host computers, storage devices, information appliances, and the like, much in the manner that web pages on the Internet are distributed and linked.
- executable mediums including a memory device and other mediums different than a memory device such as a random access memory.
- Other types of executable mediums can be used, such as but not limited to, a computer readable storage medium which can be any memory device, compact disc, hard magnetic disk, ROM, RAM, CR-ROM disc, DVD, optical media, magneto- optical media, or floppy disk.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU64946/00A AU6494600A (en) | 1999-09-13 | 2000-07-26 | System and method for host volume mapping for shared storage volumes in a multi-host computing environment |
EP00952203A EP1221100A4 (en) | 1999-09-13 | 2000-07-26 | System and method for host volume mapping for shared storage volumes in a multi-host computing environment |
JP2001523980A JP2003509773A (en) | 1999-09-13 | 2000-07-26 | System and method for host volume mapping for shared storage volumes in a multiple host computing environment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/394,220 US6343324B1 (en) | 1999-09-13 | 1999-09-13 | Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices |
US09/394,220 | 1999-09-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001020470A1 true WO2001020470A1 (en) | 2001-03-22 |
Family
ID=23558051
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2000/020312 WO2001020470A1 (en) | 1999-09-13 | 2000-07-26 | System and method for host volume mapping for shared storage volumes in a multi-host computing environment |
Country Status (6)
Country | Link |
---|---|
US (1) | US6343324B1 (en) |
EP (1) | EP1221100A4 (en) |
JP (1) | JP2003509773A (en) |
CN (1) | CN1168020C (en) |
AU (1) | AU6494600A (en) |
WO (1) | WO2001020470A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1276034A2 (en) * | 2001-07-13 | 2003-01-15 | Hitachi, Ltd. | Security for logical unit in storage subsystem |
WO2003005209A2 (en) * | 2001-06-14 | 2003-01-16 | Cable & Wireless Internet Services, Inc. | Secured shared storage architecture |
US7567980B2 (en) | 2003-12-16 | 2009-07-28 | Alpine Electronics, Inc. | Removable recording medium and file control method therefor |
US7657727B2 (en) | 2000-01-14 | 2010-02-02 | Hitachi, Ltd. | Security for logical unit in storage subsystem |
US7734781B2 (en) | 2001-07-09 | 2010-06-08 | Savvis Communications Corporation | Methods and systems for shared storage virtualization |
US8055734B2 (en) | 2008-08-15 | 2011-11-08 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US8095757B2 (en) | 2000-05-24 | 2012-01-10 | Hitachi, Ltd. | Method and apparatus for controlling access to storage device |
US8103829B2 (en) * | 2003-06-25 | 2012-01-24 | Commvault Systems, Inc. | Hierarchical systems and methods for performing storage operations in a computer network |
US8275950B2 (en) | 1997-05-29 | 2012-09-25 | Hitachi, Ltd. | Fiber channel connection storage controller |
US8560742B2 (en) | 2008-06-10 | 2013-10-15 | Virtensys Limited | Methods of providing access to I/O devices |
US8700587B2 (en) | 2000-01-14 | 2014-04-15 | Hitachi, Ltd. | Security method and system for storage subsystem |
WO2016050315A1 (en) * | 2014-10-02 | 2016-04-07 | Hitachi Data Systems Engineering UK Limited | Method and an apparatus, and related computer-program products, for managing access request in multi-tenancy environments |
US9384206B1 (en) * | 2013-12-26 | 2016-07-05 | Emc Corporation | Managing data deduplication in storage systems |
Families Citing this family (613)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6370571B1 (en) | 1997-03-05 | 2002-04-09 | At Home Corporation | System and method for delivering high-performance online multimedia services |
US7529856B2 (en) * | 1997-03-05 | 2009-05-05 | At Home Corporation | Delivering multimedia services |
US7209972B1 (en) | 1997-10-30 | 2007-04-24 | Commvault Systems, Inc. | High speed data transfer mechanism |
US7581077B2 (en) * | 1997-10-30 | 2009-08-25 | Commvault Systems, Inc. | Method and system for transferring data in a storage operation |
US6418478B1 (en) | 1997-10-30 | 2002-07-09 | Commvault Systems, Inc. | Pipelined high speed data transfer mechanism |
US5941972A (en) * | 1997-12-31 | 1999-08-24 | Crossroads Systems, Inc. | Storage router and method for providing virtual local storage |
USRE42761E1 (en) | 1997-12-31 | 2011-09-27 | Crossroads Systems, Inc. | Storage router and method for providing virtual local storage |
US7277941B2 (en) | 1998-03-11 | 2007-10-02 | Commvault Systems, Inc. | System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device |
US7739381B2 (en) * | 1998-03-11 | 2010-06-15 | Commvault Systems, Inc. | System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services |
US7756986B2 (en) * | 1998-06-30 | 2010-07-13 | Emc Corporation | Method and apparatus for providing data management for a storage system coupled to a network |
US7165152B2 (en) * | 1998-06-30 | 2007-01-16 | Emc Corporation | Method and apparatus for managing access to storage devices in a storage system with access control |
US8234477B2 (en) * | 1998-07-31 | 2012-07-31 | Kom Networks, Inc. | Method and system for providing restricted access to a storage medium |
US9361243B2 (en) | 1998-07-31 | 2016-06-07 | Kom Networks Inc. | Method and system for providing restricted access to a storage medium |
US7082462B1 (en) * | 1999-03-12 | 2006-07-25 | Hitachi, Ltd. | Method and system of managing an access to a private logical unit of a storage system |
JP3837953B2 (en) * | 1999-03-12 | 2006-10-25 | 株式会社日立製作所 | Computer system |
US6845395B1 (en) * | 1999-06-30 | 2005-01-18 | Emc Corporation | Method and apparatus for identifying network devices on a storage network |
US7035880B1 (en) * | 1999-07-14 | 2006-04-25 | Commvault Systems, Inc. | Modular backup and retrieval system used in conjunction with a storage area network |
US7395282B1 (en) * | 1999-07-15 | 2008-07-01 | Commvault Systems, Inc. | Hierarchical backup and retrieval system |
US7389311B1 (en) * | 1999-07-15 | 2008-06-17 | Commvault Systems, Inc. | Modular backup and retrieval system |
JP2001093226A (en) * | 1999-09-21 | 2001-04-06 | Sony Corp | Information communication system and method, and information communication device and method |
US6678733B1 (en) * | 1999-10-26 | 2004-01-13 | At Home Corporation | Method and system for authorizing and authenticating users |
US6671776B1 (en) * | 1999-10-28 | 2003-12-30 | Lsi Logic Corporation | Method and system for determining and displaying the topology of a storage array network having multiple hosts and computer readable medium for generating the topology |
US6944654B1 (en) * | 1999-11-01 | 2005-09-13 | Emc Corporation | Multiple storage array control |
US6557058B1 (en) * | 1999-12-01 | 2003-04-29 | Iomega Corporation | Method and apparatus of sustained sequential data transfer in a media drive |
US7424529B2 (en) * | 1999-12-10 | 2008-09-09 | International Business Machines Corporation | System using host bus adapter connection tables and server tables to generate connection topology of servers and controllers |
US6564228B1 (en) * | 2000-01-14 | 2003-05-13 | Sun Microsystems, Inc. | Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network |
US6658436B2 (en) | 2000-01-31 | 2003-12-02 | Commvault Systems, Inc. | Logical view and access to data managed by a modular data and storage management system |
US7434219B2 (en) * | 2000-01-31 | 2008-10-07 | Commvault Systems, Inc. | Storage of application specific profiles correlating to document versions |
US7003641B2 (en) | 2000-01-31 | 2006-02-21 | Commvault Systems, Inc. | Logical view with granular access to exchange data managed by a modular data and storage management system |
US7155481B2 (en) | 2000-01-31 | 2006-12-26 | Commvault Systems, Inc. | Email attachment management in a computer system |
WO2001063424A1 (en) * | 2000-02-24 | 2001-08-30 | Fujitsu Limited | Input/output controller, device identification method, and input/output control method |
US7343413B2 (en) * | 2000-03-21 | 2008-03-11 | F5 Networks, Inc. | Method and system for optimizing a network by independently scaling control segments and data flow |
US8380854B2 (en) * | 2000-03-21 | 2013-02-19 | F5 Networks, Inc. | Simplified method for processing multiple connections from the same client |
US6647387B1 (en) * | 2000-04-27 | 2003-11-11 | International Business Machine Corporation | System, apparatus, and method for enhancing storage management in a storage area network |
US7114020B1 (en) * | 2000-04-28 | 2006-09-26 | Hewlett-Packard Development Company, L.P. | Software mechanism for unique identification of SCSI device |
US6671789B1 (en) * | 2000-05-04 | 2003-12-30 | International Business Machines Corporation | Method and apparatus for determining unknown relationships between storage devices and storage device enclosures |
US6922685B2 (en) * | 2000-05-22 | 2005-07-26 | Mci, Inc. | Method and system for managing partitioned data resources |
US6745207B2 (en) * | 2000-06-02 | 2004-06-01 | Hewlett-Packard Development Company, L.P. | System and method for managing virtual storage |
US6775790B2 (en) * | 2000-06-02 | 2004-08-10 | Hewlett-Packard Development Company, L.P. | Distributed fine-grained enhancements for distributed table driven I/O mapping |
US7065610B1 (en) | 2000-06-27 | 2006-06-20 | Emc Corporation | Method and apparatus for maintaining inventory of logical volumes stored on storage elements |
US6842784B1 (en) | 2000-06-27 | 2005-01-11 | Emc Corporation | Use of global logical volume identifiers to access logical volumes stored among a plurality of storage elements in a computer storage system |
US6813686B1 (en) * | 2000-06-27 | 2004-11-02 | Emc Corporation | Method and apparatus for identifying logical volumes in multiple element computer storage domains |
US7225191B1 (en) * | 2000-06-27 | 2007-05-29 | Emc Corporation | Method and apparatus for verifying storage access requests in a computer storage system with multiple storage elements |
US6708265B1 (en) | 2000-06-27 | 2004-03-16 | Emc Corporation | Method and apparatus for moving accesses to logical entities from one storage element to another storage element in a computer storage system |
US6760828B1 (en) | 2000-06-27 | 2004-07-06 | Emc Corporation | Method and apparatus for using logical volume identifiers for tracking or identifying logical volume stored in the storage system |
US6912548B1 (en) * | 2000-06-27 | 2005-06-28 | Emc Corporation | Logical volume identifier database for logical volumes in a computer storage system |
US6978324B1 (en) | 2000-06-27 | 2005-12-20 | Emc Corporation | Method and apparatus for controlling read and write accesses to a logical entity |
US6625747B1 (en) * | 2000-06-30 | 2003-09-23 | Dell Products L.P. | Computer storage system and failover method |
JP2002041440A (en) * | 2000-07-13 | 2002-02-08 | Internatl Business Mach Corp <Ibm> | Computer system, bus interface and its controlling method |
US6775230B1 (en) * | 2000-07-18 | 2004-08-10 | Hitachi, Ltd. | Apparatus and method for transmitting frames via a switch in a storage area network |
JP4039794B2 (en) * | 2000-08-18 | 2008-01-30 | 富士通株式会社 | Multipath computer system |
US6985963B1 (en) * | 2000-08-23 | 2006-01-10 | At Home Corporation | Sharing IP network resources |
US7222176B1 (en) * | 2000-08-28 | 2007-05-22 | Datacore Software Corporation | Apparatus and method for using storage domains for controlling data in storage area networks |
JP2002132549A (en) * | 2000-10-23 | 2002-05-10 | Hitachi Ltd | Control method of logical volume, service using the method and computer readable record medium recording the service |
US7260636B2 (en) * | 2000-12-22 | 2007-08-21 | Emc Corporation | Method and apparatus for preventing unauthorized access by a network device |
US6968463B2 (en) * | 2001-01-17 | 2005-11-22 | Hewlett-Packard Development Company, L.P. | System for controlling access to resources in a storage area network |
JP4087072B2 (en) * | 2001-01-25 | 2008-05-14 | 株式会社日立製作所 | Storage system and virtual private volume control method |
US20020103913A1 (en) * | 2001-01-26 | 2002-08-01 | Ahmad Tawil | System and method for host based target device masking based on unique hardware addresses |
US20020112043A1 (en) * | 2001-02-13 | 2002-08-15 | Akira Kagami | Method and apparatus for storage on demand service |
US6820212B2 (en) * | 2001-02-20 | 2004-11-16 | Digi-Data Corporation | RAID system having channel capacity unaffected by any single component failure |
CA2439692A1 (en) * | 2001-03-01 | 2002-09-12 | Storeage Networking Technologies | Storage area network (san) security |
US20020129230A1 (en) * | 2001-03-08 | 2002-09-12 | Sun Microsystems, Inc. | Method, System, and program for determining system configuration information |
US7284271B2 (en) | 2001-03-14 | 2007-10-16 | Microsoft Corporation | Authorizing a requesting entity to operate upon data structures |
US7024662B2 (en) * | 2001-03-14 | 2006-04-04 | Microsoft Corporation | Executing dynamically assigned functions while providing services |
US7302634B2 (en) * | 2001-03-14 | 2007-11-27 | Microsoft Corporation | Schema-based services for identity-based data access |
US20020133535A1 (en) * | 2001-03-14 | 2002-09-19 | Microsoft Corporation | Identity-centric data access |
US7539747B2 (en) * | 2001-03-14 | 2009-05-26 | Microsoft Corporation | Schema-based context service |
US20020161852A1 (en) * | 2001-03-15 | 2002-10-31 | International Business Machines Corporation | System and method for fibre channel tracking of SCSI identifiers in unknown configurations |
US6895453B2 (en) * | 2001-03-15 | 2005-05-17 | International Business Machines Corporation | System and method for improved handling of fiber channel remote devices |
US6684266B2 (en) * | 2001-03-16 | 2004-01-27 | International Business Machines Corporation | Storage area network (SAN) fibre channel arbitrated loop (FCAL) multi-system multi-resource storage enclosure and method for performing enclosure maintenance concurrent with device operations |
JP2002288108A (en) * | 2001-03-28 | 2002-10-04 | Hitachi Ltd | External storage device |
US7058858B2 (en) * | 2001-04-23 | 2006-06-06 | Hewlett-Packard Development Company, L.P. | Systems and methods for providing automated diagnostic services for a cluster computer system |
US6754753B2 (en) * | 2001-04-27 | 2004-06-22 | International Business Machines Corporation | Atomic ownership change operation for input/output (I/O) bridge device in clustered computer system |
US7216362B1 (en) * | 2001-05-10 | 2007-05-08 | Advanced Micro Devices, Inc. | Enhanced security and manageability using secure storage in a personal computer system |
DE10124767A1 (en) * | 2001-05-21 | 2002-12-12 | Infineon Technologies Ag | Arrangement for processing data processing processes and method for determining the optimal access strategy |
US6732104B1 (en) * | 2001-06-06 | 2004-05-04 | Lsi Logic Corporatioin | Uniform routing of storage access requests through redundant array controllers |
TW560678U (en) * | 2001-06-15 | 2003-11-01 | Accusys Inc | Floppy disk array device having large storage capacity |
JP4032670B2 (en) * | 2001-06-21 | 2008-01-16 | 株式会社日立製作所 | Storage device system for authenticating host computer |
US6990530B1 (en) * | 2001-06-29 | 2006-01-24 | Sun Microsystems, Inc. | Method and apparatus for fault isolation on network loops |
CA2453082A1 (en) * | 2001-07-06 | 2003-01-16 | Computer Associates Think, Inc. | Systems and methods of information backup |
ES2185496B1 (en) * | 2001-07-17 | 2005-06-01 | Universidad Politecnica De Valencia | ONLINE EQUIPMENT AND METHOD FOR THE DETECTION, DETERMINATION OF THE EVOLUTION AND QUANTIFICATION OF MICROBIAL BIOMASS AND OTHER SUBSTANCES THAT ABSORB THROUGHOUT THE SPECTRUM OF LIGHT DURING THE DEVELOPMENT OF BIOTECHNOLOGICAL PROCESSES. |
WO2003017682A2 (en) * | 2001-08-13 | 2003-02-27 | Qualcomm, Incorporated | Application level access privilege to a storage area on a computer device |
US7783727B1 (en) * | 2001-08-30 | 2010-08-24 | Emc Corporation | Dynamic host configuration protocol in a storage environment |
US7472231B1 (en) | 2001-09-07 | 2008-12-30 | Netapp, Inc. | Storage area network data cache |
US7330892B2 (en) * | 2001-09-07 | 2008-02-12 | Network Appliance, Inc. | High-speed data transfer in a storage virtualization controller |
US7171434B2 (en) * | 2001-09-07 | 2007-01-30 | Network Appliance, Inc. | Detecting unavailability of primary central processing element, each backup central processing element associated with a group of virtual logic units and quiescing I/O operations of the primary central processing element in a storage virtualization system |
US7346623B2 (en) | 2001-09-28 | 2008-03-18 | Commvault Systems, Inc. | System and method for generating and managing quick recovery volumes |
EP1442387A4 (en) | 2001-09-28 | 2008-01-23 | Commvault Systems Inc | System and method for archiving objects in an information store |
US7243229B2 (en) * | 2001-10-02 | 2007-07-10 | Hitachi, Ltd. | Exclusive access control apparatus and method |
US7139818B1 (en) | 2001-10-04 | 2006-11-21 | Cisco Technology, Inc. | Techniques for dynamic host configuration without direct communications between client and server |
US6920494B2 (en) * | 2001-10-05 | 2005-07-19 | International Business Machines Corporation | Storage area network methods and apparatus with virtual SAN recognition |
US6697924B2 (en) * | 2001-10-05 | 2004-02-24 | International Business Machines Corporation | Storage area network methods and apparatus for identifying fiber channel devices in kernel mode |
US20090161568A1 (en) * | 2007-12-21 | 2009-06-25 | Charles Kastner | TCP data reassembly |
US7716330B2 (en) * | 2001-10-19 | 2010-05-11 | Global Velocity, Inc. | System and method for controlling transmission of data packets over an information network |
WO2003046721A1 (en) * | 2001-11-23 | 2003-06-05 | Commvault Systems, Inc. | Selective data replication system and method |
US7603518B2 (en) | 2005-12-19 | 2009-10-13 | Commvault Systems, Inc. | System and method for improved media identification in a storage device |
US8346733B2 (en) | 2006-12-22 | 2013-01-01 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library |
US20030101155A1 (en) * | 2001-11-23 | 2003-05-29 | Parag Gokhale | Method and system for scheduling media exports |
US7584227B2 (en) * | 2005-12-19 | 2009-09-01 | Commvault Systems, Inc. | System and method for containerized data storage and tracking |
US20030101160A1 (en) * | 2001-11-26 | 2003-05-29 | International Business Machines Corporation | Method for safely accessing shared storage |
JP2003204327A (en) * | 2001-12-28 | 2003-07-18 | Hitachi Ltd | Management method of computer system, management program, storage device, and display apparatus |
JP2003208269A (en) * | 2002-01-10 | 2003-07-25 | Hitachi Ltd | Secondary storage device having security mechanism and its access control method |
JP4109874B2 (en) * | 2002-02-05 | 2008-07-02 | キヤノン株式会社 | Information processing apparatus, control method therefor, program, and recording medium |
JP3993773B2 (en) * | 2002-02-20 | 2007-10-17 | 株式会社日立製作所 | Storage subsystem, storage control device, and data copy method |
US20030172069A1 (en) * | 2002-03-08 | 2003-09-11 | Yasufumi Uchiyama | Access management server, disk array system, and access management method thereof |
US7024593B1 (en) * | 2002-03-18 | 2006-04-04 | Emc Corporation | End-to-end checksumming for database environments |
US7003642B2 (en) * | 2002-04-17 | 2006-02-21 | Dell Products L.P. | System and method for controlling access to storage in a distributed information handling system |
JP2003316713A (en) * | 2002-04-26 | 2003-11-07 | Hitachi Ltd | Storage device system |
US6792486B1 (en) * | 2002-04-30 | 2004-09-14 | Western Digital Ventures, Inc. | System and method for managing information storage among plural disk drives |
JP4220724B2 (en) * | 2002-05-21 | 2009-02-04 | 株式会社日立製作所 | Storage device |
US7219189B1 (en) * | 2002-05-31 | 2007-05-15 | Veritas Operating Corporation | Automatic operating system handle creation in response to access control changes |
US20030229689A1 (en) * | 2002-06-06 | 2003-12-11 | Microsoft Corporation | Method and system for managing stored data on a computer network |
US9886309B2 (en) | 2002-06-28 | 2018-02-06 | Microsoft Technology Licensing, Llc | Identity-based distributed computing for device resources |
US7230929B2 (en) * | 2002-07-22 | 2007-06-12 | Qlogic, Corporation | Method and system for dynamically assigning domain identification in a multi-module fibre channel switch |
US7154886B2 (en) * | 2002-07-22 | 2006-12-26 | Qlogic Corporation | Method and system for primary blade selection in a multi-module fiber channel switch |
US9787524B1 (en) * | 2002-07-23 | 2017-10-10 | Brocade Communications Systems, Inc. | Fibre channel virtual host bus adapter |
US7616631B2 (en) * | 2002-08-14 | 2009-11-10 | Lsi Corporation | Method and apparatus for debugging protocol traffic between devices in integrated subsystems |
US7711844B2 (en) * | 2002-08-15 | 2010-05-04 | Washington University Of St. Louis | TCP-splitter: reliable packet monitoring methods and apparatus for high speed networks |
US8060643B2 (en) * | 2002-08-30 | 2011-11-15 | Hewlett-Packard Development Company, L.P. | Method and apparatus for dynamically managing bandwidth for clients in a storage area network |
US7586944B2 (en) | 2002-08-30 | 2009-09-08 | Hewlett-Packard Development Company, L.P. | Method and system for grouping clients of a storage area network according to priorities for bandwidth allocation |
WO2004023317A1 (en) | 2002-09-09 | 2004-03-18 | Commvault Systems, Inc. | Dynamic storage device pooling in a computer system |
US7397768B1 (en) | 2002-09-11 | 2008-07-08 | Qlogic, Corporation | Zone management in a multi-module fibre channel switch |
CA2499073C (en) | 2002-09-16 | 2013-07-23 | Commvault Systems, Inc. | Combined stream auxiliary copy system and method |
AU2003272457A1 (en) | 2002-09-16 | 2004-04-30 | Commvault Systems, Inc. | System and method for blind media support |
US20040064461A1 (en) * | 2002-10-01 | 2004-04-01 | Subramaniyam Pooni | Method and arrangement for dynamic detection of SCSI devices on linux host |
AU2003279847A1 (en) * | 2002-10-07 | 2004-05-04 | Commvault Systems, Inc. | System and method for managing stored data |
US6886141B1 (en) * | 2002-10-07 | 2005-04-26 | Qlogic Corporation | Method and system for reducing congestion in computer networks |
JP4185346B2 (en) * | 2002-10-18 | 2008-11-26 | 株式会社日立製作所 | Storage apparatus and configuration setting method thereof |
JP2004157637A (en) | 2002-11-05 | 2004-06-03 | Hitachi Ltd | Storage management method |
US7319669B1 (en) | 2002-11-22 | 2008-01-15 | Qlogic, Corporation | Method and system for controlling packet flow in networks |
EP1573568A4 (en) * | 2002-12-18 | 2008-05-14 | Emc Corp | Automated media library configuration |
US7457906B2 (en) * | 2003-01-21 | 2008-11-25 | Nextio, Inc. | Method and apparatus for shared I/O in a load/store fabric |
US7219183B2 (en) * | 2003-01-21 | 2007-05-15 | Nextio, Inc. | Switching apparatus and method for providing shared I/O within a load-store fabric |
US7617333B2 (en) * | 2003-01-21 | 2009-11-10 | Nextio Inc. | Fibre channel controller shareable by a plurality of operating system domains within a load-store architecture |
US7502370B2 (en) * | 2003-01-21 | 2009-03-10 | Nextio Inc. | Network controller for obtaining a plurality of network port identifiers in response to load-store transactions from a corresponding plurality of operating system domains within a load-store architecture |
US7953074B2 (en) * | 2003-01-21 | 2011-05-31 | Emulex Design And Manufacturing Corporation | Apparatus and method for port polarity initialization in a shared I/O device |
US7174413B2 (en) * | 2003-01-21 | 2007-02-06 | Nextio Inc. | Switching apparatus and method for providing shared I/O within a load-store fabric |
US7664909B2 (en) | 2003-04-18 | 2010-02-16 | Nextio, Inc. | Method and apparatus for a shared I/O serial ATA controller |
US8102843B2 (en) | 2003-01-21 | 2012-01-24 | Emulex Design And Manufacturing Corporation | Switching apparatus and method for providing shared I/O within a load-store fabric |
US8346884B2 (en) | 2003-01-21 | 2013-01-01 | Nextio Inc. | Method and apparatus for a shared I/O network interface controller |
US7512717B2 (en) * | 2003-01-21 | 2009-03-31 | Nextio Inc. | Fibre channel controller shareable by a plurality of operating system domains within a load-store architecture |
US7917658B2 (en) * | 2003-01-21 | 2011-03-29 | Emulex Design And Manufacturing Corporation | Switching apparatus and method for link initialization in a shared I/O environment |
US7698483B2 (en) * | 2003-01-21 | 2010-04-13 | Nextio, Inc. | Switching apparatus and method for link initialization in a shared I/O environment |
US8032659B2 (en) | 2003-01-21 | 2011-10-04 | Nextio Inc. | Method and apparatus for a shared I/O network interface controller |
US7493416B2 (en) * | 2003-01-21 | 2009-02-17 | Nextio Inc. | Fibre channel controller shareable by a plurality of operating system domains within a load-store architecture |
US7046668B2 (en) | 2003-01-21 | 2006-05-16 | Pettey Christopher J | Method and apparatus for shared I/O in a load/store fabric |
US7103064B2 (en) * | 2003-01-21 | 2006-09-05 | Nextio Inc. | Method and apparatus for shared I/O in a load/store fabric |
US7836211B2 (en) * | 2003-01-21 | 2010-11-16 | Emulex Design And Manufacturing Corporation | Shared input/output load-store architecture |
US7188209B2 (en) * | 2003-04-18 | 2007-03-06 | Nextio, Inc. | Apparatus and method for sharing I/O endpoints within a load store fabric by encapsulation of domain information in transaction layer packets |
JP4226350B2 (en) * | 2003-02-17 | 2009-02-18 | 株式会社日立製作所 | Data migration method |
US7356574B2 (en) * | 2003-02-25 | 2008-04-08 | Hewlett-Packard Development Company, L.P. | Apparatus and method for providing dynamic and automated assignment of data logical unit numbers |
US7440949B1 (en) * | 2003-03-31 | 2008-10-21 | Emc Corporation | System and method for configuring a host for operationally cooperating with data storage system |
US7426726B1 (en) * | 2003-03-31 | 2008-09-16 | Emc Corporation | System and method for configuring a host for operationally cooperating with data storage system and including selective host adapter settings |
AU2004227949B9 (en) | 2003-04-03 | 2010-07-22 | Commvault Systems, Inc. | System and method for dynamically performing storage operations in a computer network |
WO2004090789A2 (en) | 2003-04-03 | 2004-10-21 | Commvault Systems, Inc. | System and method for extended media retention |
US20050039069A1 (en) * | 2003-04-03 | 2005-02-17 | Anand Prahlad | Remote disaster data recovery system and method |
US7631351B2 (en) * | 2003-04-03 | 2009-12-08 | Commvault Systems, Inc. | System and method for performing storage operations through a firewall |
WO2004090872A2 (en) * | 2003-04-03 | 2004-10-21 | Commvault Systems, Inc. | Method and system for controlling a robotic arm in a storage device |
US7817583B2 (en) * | 2003-04-28 | 2010-10-19 | Hewlett-Packard Development Company, L.P. | Method for verifying a storage area network configuration |
US9712613B2 (en) * | 2003-04-29 | 2017-07-18 | Brocade Communications Systems, Inc. | Fibre channel fabric copy service |
US7805525B2 (en) * | 2003-04-30 | 2010-09-28 | Hewlett-Packard Development Company, L.P. | System and method for processing fibre channel (FC) layer service requests in an FC network |
US7359975B2 (en) * | 2003-05-22 | 2008-04-15 | International Business Machines Corporation | Method, system, and program for performing a data transfer operation with respect to source and target storage devices in a network |
US7093120B2 (en) * | 2003-05-29 | 2006-08-15 | International Business Machines Corporation | Method, apparatus, and program for performing boot, maintenance, or install operations on a storage area network |
JP4329412B2 (en) * | 2003-06-02 | 2009-09-09 | 株式会社日立製作所 | File server system |
US7085884B2 (en) * | 2003-06-30 | 2006-08-01 | Hewlett-Packard Development Company, L.P. | System and method for storing operational data of a storage automation device to a removable nonvolatile memory component |
JP4537022B2 (en) * | 2003-07-09 | 2010-09-01 | 株式会社日立製作所 | A data processing method, a storage area control method, and a data processing system that limit data arrangement. |
US7525910B2 (en) * | 2003-07-16 | 2009-04-28 | Qlogic, Corporation | Method and system for non-disruptive data capture in networks |
US7388843B2 (en) * | 2003-07-16 | 2008-06-17 | Qlogic, Corporation | Method and apparatus for testing loop pathway integrity in a fibre channel arbitrated loop |
US7463646B2 (en) * | 2003-07-16 | 2008-12-09 | Qlogic Corporation | Method and system for fibre channel arbitrated loop acceleration |
US7620059B2 (en) * | 2003-07-16 | 2009-11-17 | Qlogic, Corporation | Method and apparatus for accelerating receive-modify-send frames in a fibre channel network |
US7355966B2 (en) * | 2003-07-16 | 2008-04-08 | Qlogic, Corporation | Method and system for minimizing disruption in common-access networks |
US7453802B2 (en) * | 2003-07-16 | 2008-11-18 | Qlogic, Corporation | Method and apparatus for detecting and removing orphaned primitives in a fibre channel network |
US7152132B2 (en) * | 2003-07-16 | 2006-12-19 | Qlogic Corporation | Method and apparatus for improving buffer utilization in communication networks |
US7471635B2 (en) * | 2003-07-16 | 2008-12-30 | Qlogic, Corporation | Method and apparatus for test pattern generation |
US7447224B2 (en) * | 2003-07-21 | 2008-11-04 | Qlogic, Corporation | Method and system for routing fibre channel frames |
US7512067B2 (en) * | 2003-07-21 | 2009-03-31 | Qlogic, Corporation | Method and system for congestion control based on optimum bandwidth allocation in a fibre channel switch |
US7684401B2 (en) * | 2003-07-21 | 2010-03-23 | Qlogic, Corporation | Method and system for using extended fabric features with fibre channel switch elements |
US7630384B2 (en) * | 2003-07-21 | 2009-12-08 | Qlogic, Corporation | Method and system for distributing credit in fibre channel systems |
US7477655B2 (en) * | 2003-07-21 | 2009-01-13 | Qlogic, Corporation | Method and system for power control of fibre channel switches |
US7558281B2 (en) * | 2003-07-21 | 2009-07-07 | Qlogic, Corporation | Method and system for configuring fibre channel ports |
US7573909B2 (en) * | 2003-07-21 | 2009-08-11 | Qlogic, Corporation | Method and system for programmable data dependant network routing |
US7406092B2 (en) * | 2003-07-21 | 2008-07-29 | Qlogic, Corporation | Programmable pseudo virtual lanes for fibre channel systems |
US7894348B2 (en) * | 2003-07-21 | 2011-02-22 | Qlogic, Corporation | Method and system for congestion control in a fibre channel switch |
US7420982B2 (en) * | 2003-07-21 | 2008-09-02 | Qlogic, Corporation | Method and system for keeping a fibre channel arbitrated loop open during frame gaps |
US7430175B2 (en) | 2003-07-21 | 2008-09-30 | Qlogic, Corporation | Method and system for managing traffic in fibre channel systems |
US7466700B2 (en) * | 2003-07-21 | 2008-12-16 | Qlogic, Corporation | LUN based hard zoning in fibre channel switches |
US7522529B2 (en) * | 2003-07-21 | 2009-04-21 | Qlogic, Corporation | Method and system for detecting congestion and over subscription in a fibre channel network |
US7522522B2 (en) * | 2003-07-21 | 2009-04-21 | Qlogic, Corporation | Method and system for reducing latency and congestion in fibre channel switches |
US7580354B2 (en) * | 2003-07-21 | 2009-08-25 | Qlogic, Corporation | Multi-speed cut through operation in fibre channel switches |
US7583597B2 (en) * | 2003-07-21 | 2009-09-01 | Qlogic Corporation | Method and system for improving bandwidth and reducing idles in fibre channel switches |
US7525983B2 (en) * | 2003-07-21 | 2009-04-28 | Qlogic, Corporation | Method and system for selecting virtual lanes in fibre channel switches |
US7646767B2 (en) * | 2003-07-21 | 2010-01-12 | Qlogic, Corporation | Method and system for programmable data dependant network routing |
CN1318941C (en) * | 2003-08-05 | 2007-05-30 | 华为技术有限公司 | Port polling selection method |
JP4437650B2 (en) * | 2003-08-25 | 2010-03-24 | 株式会社日立製作所 | Storage system |
US20050050226A1 (en) * | 2003-08-26 | 2005-03-03 | Nils Larson | Device mapping based on authentication user name |
US7352701B1 (en) | 2003-09-19 | 2008-04-01 | Qlogic, Corporation | Buffer to buffer credit recovery for in-line fibre channel credit extension devices |
US7058758B2 (en) * | 2003-10-16 | 2006-06-06 | International Business Machines Corporation | Load balancing to support tape and disk subsystems on shared fibre channel adapters |
JP4257783B2 (en) * | 2003-10-23 | 2009-04-22 | 株式会社日立製作所 | Logically partitionable storage device and storage device system |
US7277995B2 (en) * | 2003-10-29 | 2007-10-02 | Dot Hill Systems Corporation | Storage controller and method for performing host access control in the host interface adapter |
US7613748B2 (en) | 2003-11-13 | 2009-11-03 | Commvault Systems, Inc. | Stored data reverification management system and method |
CA2548542C (en) * | 2003-11-13 | 2011-08-09 | Commvault Systems, Inc. | System and method for performing a snapshot and for restoring data |
CA2544063C (en) * | 2003-11-13 | 2013-09-10 | Commvault Systems, Inc. | System and method for combining data streams in pilelined storage operations in a storage network |
WO2005050385A2 (en) | 2003-11-13 | 2005-06-02 | Commvault Systems, Inc. | System and method for performing integrated storage operations |
US7440982B2 (en) * | 2003-11-13 | 2008-10-21 | Commvault Systems, Inc. | System and method for stored data archive verification |
WO2005050382A2 (en) * | 2003-11-13 | 2005-06-02 | Commvault Systems, Inc. | System and method for data storage and tracking |
WO2005050381A2 (en) * | 2003-11-13 | 2005-06-02 | Commvault Systems, Inc. | Systems and methods for performing storage operations using network attached storage |
JP4307964B2 (en) * | 2003-11-26 | 2009-08-05 | 株式会社日立製作所 | Access restriction information setting method and apparatus |
JP2005165441A (en) * | 2003-11-28 | 2005-06-23 | Hitachi Ltd | Storage controller and method for controlling storage controller |
JP4333370B2 (en) * | 2004-01-08 | 2009-09-16 | 株式会社日立製作所 | Data processing system |
US20050154800A1 (en) * | 2004-01-13 | 2005-07-14 | Ofir Zohar | Command serialization |
JP2005215943A (en) * | 2004-01-29 | 2005-08-11 | Hitachi Ltd | Connection control system for disk device |
US7564789B2 (en) * | 2004-02-05 | 2009-07-21 | Qlogic, Corporation | Method and system for reducing deadlock in fibre channel fabrics using virtual lanes |
US7480293B2 (en) * | 2004-02-05 | 2009-01-20 | Qlogic, Corporation | Method and system for preventing deadlock in fibre channel fabrics using frame priorities |
JP4441286B2 (en) * | 2004-02-10 | 2010-03-31 | 株式会社日立製作所 | Storage system |
CN100416517C (en) * | 2004-02-23 | 2008-09-03 | 深圳市朗科科技有限公司 | Method in use for managing data access between storing devices and equipment of host computer |
US7451302B2 (en) * | 2004-03-10 | 2008-11-11 | Hewlett-Packard Development Company, L.P. | System and method for managing configuration data for a multi-cell computer system |
JP2005267008A (en) | 2004-03-17 | 2005-09-29 | Hitachi Ltd | Method and system for storage management |
US7130971B2 (en) * | 2004-03-30 | 2006-10-31 | Hitachi, Ltd. | Assuring genuineness of data stored on a storage device |
JP2005301708A (en) | 2004-04-13 | 2005-10-27 | Hitachi Ltd | Storage device system and software management method in same system |
US7930377B2 (en) | 2004-04-23 | 2011-04-19 | Qlogic, Corporation | Method and system for using boot servers in networks |
US20050240727A1 (en) * | 2004-04-23 | 2005-10-27 | Shishir Shah | Method and system for managing storage area networks |
JP2005316574A (en) * | 2004-04-27 | 2005-11-10 | Hitachi Ltd | Computer identifier collecting and managing device, method and program |
WO2005109212A2 (en) * | 2004-04-30 | 2005-11-17 | Commvault Systems, Inc. | Hierarchical systems providing unified of storage information |
US8266406B2 (en) * | 2004-04-30 | 2012-09-11 | Commvault Systems, Inc. | System and method for allocation of organizational resources |
US7669190B2 (en) | 2004-05-18 | 2010-02-23 | Qlogic, Corporation | Method and system for efficiently recording processor events in host bus adapters |
JP4575028B2 (en) * | 2004-05-27 | 2010-11-04 | 株式会社日立製作所 | Disk array device and control method thereof |
JP2006004081A (en) * | 2004-06-16 | 2006-01-05 | Toshiba Corp | Av apparatus and its control method |
JP2006011541A (en) * | 2004-06-22 | 2006-01-12 | Hitachi Ltd | Information recording method in computer system including computer and shared storage device |
US7228364B2 (en) * | 2004-06-24 | 2007-06-05 | Dell Products L.P. | System and method of SCSI and SAS hardware validation |
US7404020B2 (en) * | 2004-07-20 | 2008-07-22 | Qlogic, Corporation | Integrated fibre channel fabric controller |
US9264384B1 (en) | 2004-07-22 | 2016-02-16 | Oracle International Corporation | Resource virtualization mechanism including virtual host bus adapters |
US20060026458A1 (en) * | 2004-07-30 | 2006-02-02 | Knight Frederick E | Storage device identification replication |
US7743180B2 (en) * | 2004-08-10 | 2010-06-22 | International Business Machines Corporation | Method, system, and program for managing path groups to an input/output (I/O) device |
WO2006023948A2 (en) * | 2004-08-24 | 2006-03-02 | Washington University | Methods and systems for content detection in a reconfigurable hardware |
US7577772B2 (en) * | 2004-09-08 | 2009-08-18 | Qlogic, Corporation | Method and system for optimizing DMA channel selection |
US20060064531A1 (en) * | 2004-09-23 | 2006-03-23 | Alston Jerald K | Method and system for optimizing data transfer in networks |
US7593997B2 (en) * | 2004-10-01 | 2009-09-22 | Qlogic, Corporation | Method and system for LUN remapping in fibre channel networks |
US7676611B2 (en) * | 2004-10-01 | 2010-03-09 | Qlogic, Corporation | Method and system for processing out of orders frames |
US8295299B2 (en) * | 2004-10-01 | 2012-10-23 | Qlogic, Corporation | High speed fibre channel switch element |
US7380030B2 (en) * | 2004-10-01 | 2008-05-27 | Qlogic, Corp. | Method and system for using an in-line credit extender with a host bus adapter |
US20060224846A1 (en) | 2004-11-05 | 2006-10-05 | Amarendran Arun P | System and method to support single instance storage operations |
WO2006053050A2 (en) * | 2004-11-08 | 2006-05-18 | Commvault Systems, Inc. | System and method for performing auxiliary storage operations |
US8775823B2 (en) | 2006-12-29 | 2014-07-08 | Commvault Systems, Inc. | System and method for encrypting secondary copies of data |
US8959299B2 (en) | 2004-11-15 | 2015-02-17 | Commvault Systems, Inc. | Using a snapshot as a data source |
US8832706B2 (en) | 2006-12-22 | 2014-09-09 | Commvault Systems, Inc. | Systems and methods of data storage management, such as dynamic data stream allocation |
US7694038B2 (en) * | 2004-11-17 | 2010-04-06 | International Business Machines Corporation | Maintaining and using nexus information on a host, port and device connection |
US7398335B2 (en) * | 2004-11-22 | 2008-07-08 | Qlogic, Corporation | Method and system for DMA optimization in host bus adapters |
US20060130137A1 (en) * | 2004-12-10 | 2006-06-15 | Storage Technology Corporation | Method for preventing data corruption due to improper storage controller connections |
US7164425B2 (en) * | 2004-12-21 | 2007-01-16 | Qlogic Corporation | Method and system for high speed network application |
US7519058B2 (en) * | 2005-01-18 | 2009-04-14 | Qlogic, Corporation | Address translation in fibre channel switches |
US8799466B2 (en) * | 2005-01-31 | 2014-08-05 | Hewlett-Packard Development Company, L.P. | Method and apparatus for automatic verification of a network access control construct for a network switch |
CN100337218C (en) * | 2005-02-23 | 2007-09-12 | 北京邦诺存储科技有限公司 | Data managing method for network storage system and network storage system constituted thereby |
US7568056B2 (en) * | 2005-03-28 | 2009-07-28 | Nvidia Corporation | Host bus adapter that interfaces with host computer bus to multiple types of storage devices |
US7231480B2 (en) * | 2005-04-06 | 2007-06-12 | Qlogic, Corporation | Method and system for receiver detection in PCI-Express devices |
JP2006293863A (en) * | 2005-04-13 | 2006-10-26 | Hitachi Ltd | Disk array device and control method thereof |
US20060242401A1 (en) * | 2005-04-22 | 2006-10-26 | Digi International Inc. | Recognition of devices connected to a console server |
US8112605B2 (en) * | 2005-05-02 | 2012-02-07 | Commvault Systems, Inc. | System and method for allocation of organizational resources |
US20060253658A1 (en) * | 2005-05-04 | 2006-11-09 | International Business Machines Corporation | Provisioning or de-provisioning shared or reusable storage volumes |
US7840755B2 (en) * | 2005-05-24 | 2010-11-23 | Lsi Corporation | Methods and systems for automatically identifying a modification to a storage array |
JP4400515B2 (en) * | 2005-06-13 | 2010-01-20 | 日本電気株式会社 | Storage system, storage device, logical disk connection relation changing method and program |
JP4698316B2 (en) * | 2005-07-15 | 2011-06-08 | 株式会社日立製作所 | Access path management method and program |
US9813283B2 (en) | 2005-08-09 | 2017-11-07 | Oracle International Corporation | Efficient data transfer between servers and remote peripherals |
US7602906B2 (en) * | 2005-08-25 | 2009-10-13 | Microsoft Corporation | Cipher for disk encryption |
US8166175B2 (en) * | 2005-09-12 | 2012-04-24 | Microsoft Corporation | Sharing a port with multiple processes |
JP2007087240A (en) * | 2005-09-26 | 2007-04-05 | Hitachi Computer Peripherals Co Ltd | Network storage system utilizing rfid, and network storage system construction method |
US20070079092A1 (en) * | 2005-10-03 | 2007-04-05 | Junichi Hara | System and method for limiting access to a storage device |
US7380074B2 (en) * | 2005-11-22 | 2008-05-27 | International Business Machines Corporation | Selecting storage clusters to use to access storage |
US7734593B2 (en) * | 2005-11-28 | 2010-06-08 | Commvault Systems, Inc. | Systems and methods for classifying and transferring information in a storage network |
US7822749B2 (en) * | 2005-11-28 | 2010-10-26 | Commvault Systems, Inc. | Systems and methods for classifying and transferring information in a storage network |
JP4671353B2 (en) * | 2005-12-14 | 2011-04-13 | 株式会社日立製作所 | Storage apparatus and control method thereof |
US7606844B2 (en) | 2005-12-19 | 2009-10-20 | Commvault Systems, Inc. | System and method for performing replication copy storage operations |
US20200257596A1 (en) | 2005-12-19 | 2020-08-13 | Commvault Systems, Inc. | Systems and methods of unified reconstruction in storage systems |
US7457790B2 (en) * | 2005-12-19 | 2008-11-25 | Commvault Systems, Inc. | Extensible configuration engine system and method |
US7620710B2 (en) | 2005-12-19 | 2009-11-17 | Commvault Systems, Inc. | System and method for performing multi-path storage operations |
US7818262B2 (en) * | 2005-12-19 | 2010-10-19 | Commvault Systems, Inc. | System and method for providing a flexible licensing system for digital content |
US7651593B2 (en) | 2005-12-19 | 2010-01-26 | Commvault Systems, Inc. | Systems and methods for performing data replication |
US7617262B2 (en) * | 2005-12-19 | 2009-11-10 | Commvault Systems, Inc. | Systems and methods for monitoring application data in a data replication system |
US8572330B2 (en) | 2005-12-19 | 2013-10-29 | Commvault Systems, Inc. | Systems and methods for granular resource management in a storage network |
US20070166674A1 (en) * | 2005-12-19 | 2007-07-19 | Kochunni Jaidev O | Systems and methods for generating configuration metrics in a storage network |
AU2006331932B2 (en) * | 2005-12-19 | 2012-09-06 | Commvault Systems, Inc. | Systems and methods for performing data replication |
US7962709B2 (en) * | 2005-12-19 | 2011-06-14 | Commvault Systems, Inc. | Network redirector systems and methods for performing data replication |
US20110010518A1 (en) | 2005-12-19 | 2011-01-13 | Srinivas Kavuri | Systems and Methods for Migrating Components in a Hierarchical Storage Network |
US8661216B2 (en) * | 2005-12-19 | 2014-02-25 | Commvault Systems, Inc. | Systems and methods for migrating components in a hierarchical storage network |
US8930496B2 (en) * | 2005-12-19 | 2015-01-06 | Commvault Systems, Inc. | Systems and methods of unified reconstruction in storage systems |
US7617253B2 (en) * | 2005-12-19 | 2009-11-10 | Commvault Systems, Inc. | Destination systems and methods for performing data replication |
US7636743B2 (en) * | 2005-12-19 | 2009-12-22 | Commvault Systems, Inc. | Pathname translation in a data replication system |
US7543125B2 (en) * | 2005-12-19 | 2009-06-02 | Commvault Systems, Inc. | System and method for performing time-flexible calendric storage operations |
JP4792958B2 (en) * | 2005-12-21 | 2011-10-12 | 日本電気株式会社 | Data control system, shared disk device, and disk access restriction switching method used therefor |
JP2007219571A (en) * | 2006-02-14 | 2007-08-30 | Hitachi Ltd | Storage controller and storage system |
US7461195B1 (en) | 2006-03-17 | 2008-12-02 | Qlogic, Corporation | Method and system for dynamically adjusting data transfer rates in PCI-express devices |
US7921185B2 (en) * | 2006-03-29 | 2011-04-05 | Dell Products L.P. | System and method for managing switch and information handling system SAS protocol communication |
US7707338B1 (en) * | 2006-04-06 | 2010-04-27 | Marvell International Ltd. | WWN table management system and method |
US8880812B1 (en) * | 2010-03-31 | 2014-11-04 | Marvell International Ltd. | WWN table management systems and methods |
JP4901310B2 (en) * | 2006-05-31 | 2012-03-21 | 株式会社日立製作所 | Storage control device and command execution number control method for storage control device |
US8726242B2 (en) | 2006-07-27 | 2014-05-13 | Commvault Systems, Inc. | Systems and methods for continuous data replication |
US20080201223A1 (en) * | 2006-09-19 | 2008-08-21 | Lutnick Howard W | Products and processes for providing information services |
US20080077638A1 (en) * | 2006-09-21 | 2008-03-27 | Microsoft Corporation | Distributed storage in a computing environment |
US7539783B2 (en) * | 2006-09-22 | 2009-05-26 | Commvault Systems, Inc. | Systems and methods of media management, such as management of media to and from a media storage library, including removable media |
US7792789B2 (en) | 2006-10-17 | 2010-09-07 | Commvault Systems, Inc. | Method and system for collaborative searching |
US7882077B2 (en) * | 2006-10-17 | 2011-02-01 | Commvault Systems, Inc. | Method and system for offline indexing of content and classifying stored data |
US8655914B2 (en) | 2006-10-17 | 2014-02-18 | Commvault Systems, Inc. | System and method for storage operation access security |
US7613816B1 (en) | 2006-11-15 | 2009-11-03 | Qlogic, Corporation | Method and system for routing network information |
US8370442B2 (en) | 2008-08-29 | 2013-02-05 | Commvault Systems, Inc. | Method and system for leveraging identified changes to a mail server |
US7613947B1 (en) * | 2006-11-30 | 2009-11-03 | Netapp, Inc. | System and method for storage takeover |
WO2008070688A1 (en) * | 2006-12-04 | 2008-06-12 | Commvault Systems, Inc. | Systems and methods for creating copies of data, such as archive copies |
JP4997950B2 (en) * | 2006-12-11 | 2012-08-15 | 富士通株式会社 | Network management system, network management program, and network management method |
US20080147878A1 (en) * | 2006-12-15 | 2008-06-19 | Rajiv Kottomtharayil | System and methods for granular resource management in a storage network |
US8677091B2 (en) | 2006-12-18 | 2014-03-18 | Commvault Systems, Inc. | Writing data and storage system specific metadata to network attached storage device |
US20080228771A1 (en) | 2006-12-22 | 2008-09-18 | Commvault Systems, Inc. | Method and system for searching stored data |
US8312323B2 (en) * | 2006-12-22 | 2012-11-13 | Commvault Systems, Inc. | Systems and methods for remote monitoring in a computer network and reporting a failed migration operation without accessing the data being moved |
US7840537B2 (en) | 2006-12-22 | 2010-11-23 | Commvault Systems, Inc. | System and method for storing redundant information |
US20080155205A1 (en) * | 2006-12-22 | 2008-06-26 | Parag Gokhale | Systems and methods of data storage management, such as dynamic data stream allocation |
US7734669B2 (en) * | 2006-12-22 | 2010-06-08 | Commvault Systems, Inc. | Managing copies of data |
US8719809B2 (en) * | 2006-12-22 | 2014-05-06 | Commvault Systems, Inc. | Point in time rollback and un-installation of software |
US7831566B2 (en) * | 2006-12-22 | 2010-11-09 | Commvault Systems, Inc. | Systems and methods of hierarchical storage management, such as global management of storage operations |
US8290808B2 (en) * | 2007-03-09 | 2012-10-16 | Commvault Systems, Inc. | System and method for automating customer-validated statement of work for a data storage environment |
JP2008226040A (en) * | 2007-03-14 | 2008-09-25 | Hitachi Ltd | Information processor and command multiplexing degree control method |
US8788750B2 (en) * | 2007-04-27 | 2014-07-22 | Hewlett-Packard Development Company, L.P. | Managing resources in cluster storage systems |
US8032702B2 (en) * | 2007-05-24 | 2011-10-04 | International Business Machines Corporation | Disk storage management of a tape library with data backup and recovery |
CN103279181A (en) * | 2007-08-28 | 2013-09-04 | Commvault系统公司 | Power management of data processing resources, such as power adaptive management of data storage operations |
US8706976B2 (en) | 2007-08-30 | 2014-04-22 | Commvault Systems, Inc. | Parallel access virtual tape library and drives |
US8396838B2 (en) * | 2007-10-17 | 2013-03-12 | Commvault Systems, Inc. | Legal compliance, electronic discovery and electronic document handling of online and offline copies of data |
US7774465B1 (en) | 2007-11-28 | 2010-08-10 | Netapp, Inc. | High-speed data transfer in a storage virtualization controller |
US8028062B1 (en) * | 2007-12-26 | 2011-09-27 | Emc Corporation | Non-disruptive data mobility using virtual storage area networks with split-path virtualization |
US7836174B2 (en) * | 2008-01-30 | 2010-11-16 | Commvault Systems, Inc. | Systems and methods for grid-based data scanning |
US8296301B2 (en) | 2008-01-30 | 2012-10-23 | Commvault Systems, Inc. | Systems and methods for probabilistic data classification |
US7991860B2 (en) | 2008-04-07 | 2011-08-02 | Hitachi, Ltd. | Method and apparatus for HBA migration |
JP4623126B2 (en) * | 2008-04-14 | 2011-02-02 | 株式会社日立製作所 | Data processing system |
US8806053B1 (en) | 2008-04-29 | 2014-08-12 | F5 Networks, Inc. | Methods and systems for optimizing network traffic using preemptive acknowledgment signals |
US8769048B2 (en) | 2008-06-18 | 2014-07-01 | Commvault Systems, Inc. | Data protection scheduling, such as providing a flexible backup window in a data protection system |
US9128883B2 (en) * | 2008-06-19 | 2015-09-08 | Commvault Systems, Inc | Data storage resource allocation by performing abbreviated resource checks based on relative chances of failure of the data storage resources to determine whether data storage requests would fail |
US8352954B2 (en) | 2008-06-19 | 2013-01-08 | Commvault Systems, Inc. | Data storage resource allocation by employing dynamic methods and blacklisting resource request pools |
US9098495B2 (en) * | 2008-06-24 | 2015-08-04 | Commvault Systems, Inc. | Application-aware and remote single instance data management |
US8219524B2 (en) * | 2008-06-24 | 2012-07-10 | Commvault Systems, Inc. | Application-aware and remote single instance data management |
US8484162B2 (en) | 2008-06-24 | 2013-07-09 | Commvault Systems, Inc. | De-duplication systems and methods for application-specific data |
US8335776B2 (en) * | 2008-07-02 | 2012-12-18 | Commvault Systems, Inc. | Distributed indexing system for data storage |
US8166263B2 (en) | 2008-07-03 | 2012-04-24 | Commvault Systems, Inc. | Continuous data protection over intermittent connections, such as continuous data backup for laptops or wireless devices |
JP5147584B2 (en) * | 2008-07-23 | 2013-02-20 | 株式会社日立製作所 | Command execution method by storage subsystem and controller |
US8015343B2 (en) * | 2008-08-08 | 2011-09-06 | Amazon Technologies, Inc. | Providing executing programs with reliable access to non-local block data storage |
US8307177B2 (en) * | 2008-09-05 | 2012-11-06 | Commvault Systems, Inc. | Systems and methods for management of virtualization data |
US8725688B2 (en) | 2008-09-05 | 2014-05-13 | Commvault Systems, Inc. | Image level copy or restore, such as image level restore without knowledge of data object metadata |
US20100070474A1 (en) | 2008-09-12 | 2010-03-18 | Lad Kamleshkumar K | Transferring or migrating portions of data objects, such as block-level data migration or chunk-based data migration |
US20100070466A1 (en) * | 2008-09-15 | 2010-03-18 | Anand Prahlad | Data transfer techniques within data storage devices, such as network attached storage performing data migration |
US9015181B2 (en) | 2008-09-26 | 2015-04-21 | Commvault Systems, Inc. | Systems and methods for managing single instancing data |
WO2010036754A1 (en) | 2008-09-26 | 2010-04-01 | Commvault Systems, Inc. | Systems and methods for managing single instancing data |
US8566444B1 (en) | 2008-10-30 | 2013-10-22 | F5 Networks, Inc. | Methods and system for simultaneous multiple rules checking |
US9178842B2 (en) | 2008-11-05 | 2015-11-03 | Commvault Systems, Inc. | Systems and methods for monitoring messaging applications for compliance with a policy |
US8412677B2 (en) | 2008-11-26 | 2013-04-02 | Commvault Systems, Inc. | Systems and methods for byte-level or quasi byte-level single instancing |
US8204859B2 (en) | 2008-12-10 | 2012-06-19 | Commvault Systems, Inc. | Systems and methods for managing replicated database data |
US9495382B2 (en) * | 2008-12-10 | 2016-11-15 | Commvault Systems, Inc. | Systems and methods for performing discrete data replication |
US8046460B1 (en) * | 2009-01-23 | 2011-10-25 | Hewlett-Packard Development Company, L.P. | Automatic server deployment using a pre-provisioned logical volume |
US8434131B2 (en) | 2009-03-20 | 2013-04-30 | Commvault Systems, Inc. | Managing connections in a data storage system |
US8401996B2 (en) | 2009-03-30 | 2013-03-19 | Commvault Systems, Inc. | Storing a variable number of instances of data objects |
US8578120B2 (en) | 2009-05-22 | 2013-11-05 | Commvault Systems, Inc. | Block-level single instancing |
US8612439B2 (en) * | 2009-06-30 | 2013-12-17 | Commvault Systems, Inc. | Performing data storage operations in a cloud storage environment, including searching, encryption and indexing |
US8930306B1 (en) | 2009-07-08 | 2015-01-06 | Commvault Systems, Inc. | Synchronized data deduplication |
US9973446B2 (en) | 2009-08-20 | 2018-05-15 | Oracle International Corporation | Remote shared server peripherals over an Ethernet network for resource virtualization |
US8719767B2 (en) | 2011-03-31 | 2014-05-06 | Commvault Systems, Inc. | Utilizing snapshots to provide builds to developer computing devices |
US8706867B2 (en) | 2011-03-31 | 2014-04-22 | Commvault Systems, Inc. | Realtime streaming of multimedia content from secondary storage devices |
US9092500B2 (en) | 2009-09-03 | 2015-07-28 | Commvault Systems, Inc. | Utilizing snapshots for access to databases and other applications |
US8433682B2 (en) | 2009-12-31 | 2013-04-30 | Commvault Systems, Inc. | Systems and methods for analyzing snapshots |
US8595191B2 (en) * | 2009-12-31 | 2013-11-26 | Commvault Systems, Inc. | Systems and methods for performing data management operations using snapshots |
US10157280B2 (en) | 2009-09-23 | 2018-12-18 | F5 Networks, Inc. | System and method for identifying security breach attempts of a website |
US8868961B1 (en) | 2009-11-06 | 2014-10-21 | F5 Networks, Inc. | Methods for acquiring hyper transport timing and devices thereof |
US9313047B2 (en) | 2009-11-06 | 2016-04-12 | F5 Networks, Inc. | Handling high throughput and low latency network data packets in a traffic management device |
US10721269B1 (en) | 2009-11-06 | 2020-07-21 | F5 Networks, Inc. | Methods and system for returning requests with javascript for clients before passing a request to a server |
US8688907B2 (en) * | 2009-11-25 | 2014-04-01 | Cleversafe, Inc. | Large scale subscription based dispersed storage network |
US20190056998A1 (en) * | 2009-11-25 | 2019-02-21 | International Business Machines Corporation | Large scale dispersed storage network using set top boxes and centralized control |
US20180239673A1 (en) * | 2009-11-25 | 2018-08-23 | International Business Machines Corporation | Large scale dispersed storage network using wireless devices and centralized control |
US8442983B2 (en) * | 2009-12-31 | 2013-05-14 | Commvault Systems, Inc. | Asynchronous methods of data classification using change journals and other data structures |
US8202205B2 (en) * | 2010-02-09 | 2012-06-19 | GoBe Healthy, LLC | Omni-directional exercise device |
US8504517B2 (en) * | 2010-03-29 | 2013-08-06 | Commvault Systems, Inc. | Systems and methods for selective data replication |
US8725698B2 (en) | 2010-03-30 | 2014-05-13 | Commvault Systems, Inc. | Stub file prioritization in a data replication system |
US8504515B2 (en) | 2010-03-30 | 2013-08-06 | Commvault Systems, Inc. | Stubbing systems and methods in a data replication environment |
US8352422B2 (en) | 2010-03-30 | 2013-01-08 | Commvault Systems, Inc. | Data restore systems and methods in a replication environment |
US8402118B2 (en) * | 2010-04-09 | 2013-03-19 | International Business Machines Corporation | Intelligent LUN generation and management |
US8489656B2 (en) | 2010-05-28 | 2013-07-16 | Commvault Systems, Inc. | Systems and methods for performing data replication |
TW201145034A (en) * | 2010-06-01 | 2011-12-16 | Etron Technology Inc | System of realizing multi-port storages based on a UASP protocol of a USB specification version 3.0 and method thereof |
US11449394B2 (en) | 2010-06-04 | 2022-09-20 | Commvault Systems, Inc. | Failover systems and methods for performing backup operations, including heterogeneous indexing and load balancing of backup and indexing resources |
US9141625B1 (en) | 2010-06-22 | 2015-09-22 | F5 Networks, Inc. | Methods for preserving flow state during virtual machine migration and devices thereof |
US10015286B1 (en) | 2010-06-23 | 2018-07-03 | F5 Networks, Inc. | System and method for proxying HTTP single sign on across network domains |
US9495119B1 (en) * | 2010-07-08 | 2016-11-15 | EMC IP Holding Company LLC | Static load balancing for file systems in a multipath I/O environment |
US8908545B1 (en) | 2010-07-08 | 2014-12-09 | F5 Networks, Inc. | System and method for handling TCP performance in network access with driver initiated application tunnel |
US8347100B1 (en) | 2010-07-14 | 2013-01-01 | F5 Networks, Inc. | Methods for DNSSEC proxying and deployment amelioration and systems thereof |
US9083760B1 (en) | 2010-08-09 | 2015-07-14 | F5 Networks, Inc. | Dynamic cloning and reservation of detached idle connections |
US8630174B1 (en) | 2010-09-14 | 2014-01-14 | F5 Networks, Inc. | System and method for post shaping TCP packetization |
US8886981B1 (en) | 2010-09-15 | 2014-11-11 | F5 Networks, Inc. | Systems and methods for idle driven scheduling |
US8463909B1 (en) | 2010-09-15 | 2013-06-11 | F5 Networks, Inc. | Systems and methods for managing server resources |
US8804504B1 (en) | 2010-09-16 | 2014-08-12 | F5 Networks, Inc. | System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device |
US9331963B2 (en) | 2010-09-24 | 2016-05-03 | Oracle International Corporation | Wireless host I/O using virtualized I/O controllers |
US8577851B2 (en) | 2010-09-30 | 2013-11-05 | Commvault Systems, Inc. | Content aligned block-based deduplication |
US9244779B2 (en) | 2010-09-30 | 2016-01-26 | Commvault Systems, Inc. | Data recovery operations, such as recovery from modified network data management protocol data |
WO2012045023A2 (en) | 2010-09-30 | 2012-04-05 | Commvault Systems, Inc. | Archiving data objects using secondary copies |
EP2622469B1 (en) | 2010-09-30 | 2019-11-13 | Commvault Systems, Inc. | Efficient data management improvements, such as docking limited-feature data management modules to a full-featured data management system |
US8578109B2 (en) | 2010-09-30 | 2013-11-05 | Commvault Systems, Inc. | Systems and methods for retaining and using data block signatures in data protection operations |
WO2012058486A2 (en) | 2010-10-29 | 2012-05-03 | F5 Networks, Inc. | Automated policy builder |
US9554276B2 (en) | 2010-10-29 | 2017-01-24 | F5 Networks, Inc. | System and method for on the fly protocol conversion in obtaining policy enforcement information |
US9020900B2 (en) | 2010-12-14 | 2015-04-28 | Commvault Systems, Inc. | Distributed deduplicated storage system |
US9116850B2 (en) | 2010-12-14 | 2015-08-25 | Commvault Systems, Inc. | Client-side repository in a networked deduplicated storage system |
US8627467B2 (en) | 2011-01-14 | 2014-01-07 | F5 Networks, Inc. | System and method for selectively storing web objects in a cache memory based on policy decisions |
US9021198B1 (en) | 2011-01-20 | 2015-04-28 | Commvault Systems, Inc. | System and method for sharing SAN storage |
US10135831B2 (en) | 2011-01-28 | 2018-11-20 | F5 Networks, Inc. | System and method for combining an access control system with a traffic management system |
US8849762B2 (en) | 2011-03-31 | 2014-09-30 | Commvault Systems, Inc. | Restoring computing environments, such as autorecovery of file systems at certain points in time |
US8719264B2 (en) | 2011-03-31 | 2014-05-06 | Commvault Systems, Inc. | Creating secondary copies of data based on searches for content |
US9246819B1 (en) | 2011-06-20 | 2016-01-26 | F5 Networks, Inc. | System and method for performing message-based load balancing |
US8463948B1 (en) * | 2011-07-01 | 2013-06-11 | Intel Corporation | Method, apparatus and system for determining an identifier of a volume of memory |
US8595460B2 (en) * | 2011-08-26 | 2013-11-26 | Vmware, Inc. | Configuring object storage system for input/output operations |
US9372827B2 (en) | 2011-09-30 | 2016-06-21 | Commvault Systems, Inc. | Migration of an existing computing system to new hardware |
US9461881B2 (en) | 2011-09-30 | 2016-10-04 | Commvault Systems, Inc. | Migration of existing computing systems to cloud computing sites or virtual machines |
US9116633B2 (en) | 2011-09-30 | 2015-08-25 | Commvault Systems, Inc. | Information management of virtual machines having mapped storage devices |
US9836340B2 (en) * | 2011-10-03 | 2017-12-05 | International Business Machines Corporation | Safe management of data storage using a volume manager |
US9270766B2 (en) | 2011-12-30 | 2016-02-23 | F5 Networks, Inc. | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof |
US9015519B2 (en) * | 2012-01-31 | 2015-04-21 | Symantec Corporation | Method and system for cluster wide adaptive I/O scheduling by a multipathing driver |
JP2013164820A (en) * | 2012-02-13 | 2013-08-22 | Fujitsu Ltd | Evaluation support method, evaluation support program, and evaluation support apparatus |
US10230566B1 (en) | 2012-02-17 | 2019-03-12 | F5 Networks, Inc. | Methods for dynamically constructing a service principal name and devices thereof |
US9172753B1 (en) | 2012-02-20 | 2015-10-27 | F5 Networks, Inc. | Methods for optimizing HTTP header based authentication and devices thereof |
US9231879B1 (en) | 2012-02-20 | 2016-01-05 | F5 Networks, Inc. | Methods for policy-based network traffic queue management and devices thereof |
US9471578B2 (en) | 2012-03-07 | 2016-10-18 | Commvault Systems, Inc. | Data storage system utilizing proxy device for storage operations |
US9298715B2 (en) | 2012-03-07 | 2016-03-29 | Commvault Systems, Inc. | Data storage system utilizing proxy device for storage operations |
US10157184B2 (en) | 2012-03-30 | 2018-12-18 | Commvault Systems, Inc. | Data previewing before recalling large data files |
US9639297B2 (en) | 2012-03-30 | 2017-05-02 | Commvault Systems, Inc | Shared network-available storage that permits concurrent data access |
US9529871B2 (en) | 2012-03-30 | 2016-12-27 | Commvault Systems, Inc. | Information management of mobile device data |
US9262496B2 (en) | 2012-03-30 | 2016-02-16 | Commvault Systems, Inc. | Unified access to personal data |
US9020890B2 (en) | 2012-03-30 | 2015-04-28 | Commvault Systems, Inc. | Smart archiving and data previewing for mobile devices |
US9063938B2 (en) | 2012-03-30 | 2015-06-23 | Commvault Systems, Inc. | Search filtered file system using secondary storage, including multi-dimensional indexing and searching of archived files |
US8950009B2 (en) | 2012-03-30 | 2015-02-03 | Commvault Systems, Inc. | Information management of data associated with multiple cloud services |
US9342537B2 (en) | 2012-04-23 | 2016-05-17 | Commvault Systems, Inc. | Integrated snapshot interface for a data storage system |
WO2013163648A2 (en) | 2012-04-27 | 2013-10-31 | F5 Networks, Inc. | Methods for optimizing service of content requests and devices thereof |
US8892523B2 (en) | 2012-06-08 | 2014-11-18 | Commvault Systems, Inc. | Auto summarization of content |
US9218375B2 (en) | 2012-06-13 | 2015-12-22 | Commvault Systems, Inc. | Dedicated client-side signature generator in a networked storage system |
US9083550B2 (en) | 2012-10-29 | 2015-07-14 | Oracle International Corporation | Network virtualization over infiniband |
US9672521B1 (en) * | 2012-12-07 | 2017-06-06 | The Boeing Company | Reformatting legacy system work orders with highlighted process compliance |
US9223597B2 (en) | 2012-12-21 | 2015-12-29 | Commvault Systems, Inc. | Archiving virtual machines in a data storage system |
US20140181085A1 (en) | 2012-12-21 | 2014-06-26 | Commvault Systems, Inc. | Data storage system for analysis of data across heterogeneous information management systems |
US10379988B2 (en) | 2012-12-21 | 2019-08-13 | Commvault Systems, Inc. | Systems and methods for performance monitoring |
US20140181044A1 (en) | 2012-12-21 | 2014-06-26 | Commvault Systems, Inc. | Systems and methods to identify uncharacterized and unprotected virtual machines |
US9633216B2 (en) | 2012-12-27 | 2017-04-25 | Commvault Systems, Inc. | Application of information management policies based on operation with a geographic entity |
US9021452B2 (en) | 2012-12-27 | 2015-04-28 | Commvault Systems, Inc. | Automatic identification of storage requirements, such as for use in selling data storage management solutions |
US9069799B2 (en) | 2012-12-27 | 2015-06-30 | Commvault Systems, Inc. | Restoration of centralized data storage manager, such as data storage manager in a hierarchical data storage system |
US9378035B2 (en) | 2012-12-28 | 2016-06-28 | Commvault Systems, Inc. | Systems and methods for repurposing virtual machines |
US9633022B2 (en) | 2012-12-28 | 2017-04-25 | Commvault Systems, Inc. | Backup and restoration for a deduplicated file system |
US10346259B2 (en) | 2012-12-28 | 2019-07-09 | Commvault Systems, Inc. | Data recovery using a cloud-based remote data recovery center |
US20140196039A1 (en) | 2013-01-08 | 2014-07-10 | Commvault Systems, Inc. | Virtual machine categorization system and method |
US9262435B2 (en) | 2013-01-11 | 2016-02-16 | Commvault Systems, Inc. | Location-based data synchronization management |
US9633033B2 (en) | 2013-01-11 | 2017-04-25 | Commvault Systems, Inc. | High availability distributed deduplicated storage system |
US20140201151A1 (en) | 2013-01-11 | 2014-07-17 | Commvault Systems, Inc. | Systems and methods to select files for restoration from block-level backup for virtual machines |
US9886346B2 (en) | 2013-01-11 | 2018-02-06 | Commvault Systems, Inc. | Single snapshot for multiple agents |
US9286110B2 (en) | 2013-01-14 | 2016-03-15 | Commvault Systems, Inc. | Seamless virtual machine recall in a data storage system |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
US9459968B2 (en) | 2013-03-11 | 2016-10-04 | Commvault Systems, Inc. | Single index to query multiple backup formats |
US20140281545A1 (en) | 2013-03-12 | 2014-09-18 | Commvault Systems, Inc. | Multi-layer embedded encryption |
US20140297953A1 (en) * | 2013-03-31 | 2014-10-02 | Microsoft Corporation | Removable Storage Device Identity and Configuration Information |
US9201809B2 (en) * | 2013-05-14 | 2015-12-01 | Globalfoundries Inc. | Accidental shared volume erasure prevention |
CN104346310B (en) * | 2013-08-05 | 2018-01-02 | 豪威科技(上海)有限公司 | A kind of high-performance I2C slaves data exchange circuit and method |
US20150074536A1 (en) | 2013-09-12 | 2015-03-12 | Commvault Systems, Inc. | File manager integration with virtualization in an information management system, including user control and storage management of virtual machines |
US10187317B1 (en) | 2013-11-15 | 2019-01-22 | F5 Networks, Inc. | Methods for traffic rate control and devices thereof |
US9158462B2 (en) * | 2014-01-09 | 2015-10-13 | International Business Machines Corporation | Tape volume access block having data set information stored therein |
US10949382B2 (en) | 2014-01-15 | 2021-03-16 | Commvault Systems, Inc. | User-centric interfaces for information management systems |
US9753812B2 (en) | 2014-01-24 | 2017-09-05 | Commvault Systems, Inc. | Generating mapping information for single snapshot for multiple applications |
US9632874B2 (en) | 2014-01-24 | 2017-04-25 | Commvault Systems, Inc. | Database application backup in single snapshot for multiple applications |
US9639426B2 (en) | 2014-01-24 | 2017-05-02 | Commvault Systems, Inc. | Single snapshot for multiple applications |
US9495251B2 (en) | 2014-01-24 | 2016-11-15 | Commvault Systems, Inc. | Snapshot readiness checking and reporting |
US10324897B2 (en) | 2014-01-27 | 2019-06-18 | Commvault Systems, Inc. | Techniques for serving archived electronic mail |
US10169121B2 (en) | 2014-02-27 | 2019-01-01 | Commvault Systems, Inc. | Work flow management for an information management system |
US9648100B2 (en) | 2014-03-05 | 2017-05-09 | Commvault Systems, Inc. | Cross-system storage management for transferring data across autonomous information management systems |
US9633056B2 (en) | 2014-03-17 | 2017-04-25 | Commvault Systems, Inc. | Maintaining a deduplication database |
US10380072B2 (en) | 2014-03-17 | 2019-08-13 | Commvault Systems, Inc. | Managing deletions from a deduplication database |
US9811427B2 (en) | 2014-04-02 | 2017-11-07 | Commvault Systems, Inc. | Information management by a media agent in the absence of communications with a storage manager |
US9823978B2 (en) | 2014-04-16 | 2017-11-21 | Commvault Systems, Inc. | User-level quota management of data objects stored in information management systems |
US9740574B2 (en) | 2014-05-09 | 2017-08-22 | Commvault Systems, Inc. | Load balancing across multiple data paths |
CN104883380B (en) * | 2014-05-12 | 2018-06-05 | 陈杰 | The method and device of storage volume configuration |
US9848045B2 (en) | 2014-05-27 | 2017-12-19 | Commvault Systems, Inc. | Offline messaging between a repository storage operation cell and remote storage operation cells via an intermediary media agent |
US10015143B1 (en) | 2014-06-05 | 2018-07-03 | F5 Networks, Inc. | Methods for securing one or more license entitlement grants and devices thereof |
US9760446B2 (en) | 2014-06-11 | 2017-09-12 | Micron Technology, Inc. | Conveying value of implementing an integrated data management and protection system |
US11838851B1 (en) | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
US20160019317A1 (en) | 2014-07-16 | 2016-01-21 | Commvault Systems, Inc. | Volume or virtual machine level backup and generating placeholders for virtual machine files |
JP6185668B2 (en) * | 2014-07-25 | 2017-08-23 | 株式会社日立製作所 | Storage device |
US9852026B2 (en) | 2014-08-06 | 2017-12-26 | Commvault Systems, Inc. | Efficient application recovery in an information management system based on a pseudo-storage-device driver |
US11249858B2 (en) | 2014-08-06 | 2022-02-15 | Commvault Systems, Inc. | Point-in-time backups of a production application made accessible over fibre channel and/or ISCSI as data sources to a remote application by representing the backups as pseudo-disks operating apart from the production application and its host |
US10122630B1 (en) | 2014-08-15 | 2018-11-06 | F5 Networks, Inc. | Methods for network traffic presteering and devices thereof |
US10042716B2 (en) | 2014-09-03 | 2018-08-07 | Commvault Systems, Inc. | Consolidated processing of storage-array commands using a forwarder media agent in conjunction with a snapshot-control media agent |
US9774672B2 (en) | 2014-09-03 | 2017-09-26 | Commvault Systems, Inc. | Consolidated processing of storage-array commands by a snapshot-control media agent |
US9405928B2 (en) | 2014-09-17 | 2016-08-02 | Commvault Systems, Inc. | Deriving encryption rules based on file content |
US9710465B2 (en) | 2014-09-22 | 2017-07-18 | Commvault Systems, Inc. | Efficiently restoring execution of a backed up virtual machine based on coordination with virtual-machine-file-relocation operations |
US9417968B2 (en) | 2014-09-22 | 2016-08-16 | Commvault Systems, Inc. | Efficiently restoring execution of a backed up virtual machine based on coordination with virtual-machine-file-relocation operations |
US9436555B2 (en) | 2014-09-22 | 2016-09-06 | Commvault Systems, Inc. | Efficient live-mount of a backed up virtual machine in a storage management system |
US9600692B2 (en) * | 2014-10-17 | 2017-03-21 | International Business Machines Corporation | Storage system security |
US9444811B2 (en) | 2014-10-21 | 2016-09-13 | Commvault Systems, Inc. | Using an enhanced data agent to restore backed up data across autonomous storage management systems |
US9575673B2 (en) | 2014-10-29 | 2017-02-21 | Commvault Systems, Inc. | Accessing a file system using tiered deduplication |
US10776209B2 (en) | 2014-11-10 | 2020-09-15 | Commvault Systems, Inc. | Cross-platform virtual machine backup and replication |
US9448731B2 (en) | 2014-11-14 | 2016-09-20 | Commvault Systems, Inc. | Unified snapshot storage management |
US9648105B2 (en) | 2014-11-14 | 2017-05-09 | Commvault Systems, Inc. | Unified snapshot storage management, using an enhanced storage manager and enhanced media agents |
US20160142485A1 (en) | 2014-11-19 | 2016-05-19 | Commvault Systems, Inc. | Migration to cloud storage from backup |
US9983936B2 (en) | 2014-11-20 | 2018-05-29 | Commvault Systems, Inc. | Virtual machine change block tracking |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US9665292B2 (en) * | 2015-01-08 | 2017-05-30 | Dell Products, Lp | System and method for providing consistent metadata for RAID solutions |
US9898213B2 (en) | 2015-01-23 | 2018-02-20 | Commvault Systems, Inc. | Scalable auxiliary copy processing using media agent resources |
US9904481B2 (en) | 2015-01-23 | 2018-02-27 | Commvault Systems, Inc. | Scalable auxiliary copy processing in a storage management system using media agent resources |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US10313243B2 (en) | 2015-02-24 | 2019-06-04 | Commvault Systems, Inc. | Intelligent local management of data stream throttling in secondary-copy operations |
US10956299B2 (en) | 2015-02-27 | 2021-03-23 | Commvault Systems, Inc. | Diagnosing errors in data storage and archiving in a cloud or networking environment |
JP6529304B2 (en) * | 2015-03-25 | 2019-06-12 | 株式会社日立ソリューションズ | Access control system and access control method |
US9928144B2 (en) | 2015-03-30 | 2018-03-27 | Commvault Systems, Inc. | Storage management of data using an open-archive architecture, including streamlined access to primary data originally stored on network-attached storage and archived to secondary storage |
US10834065B1 (en) | 2015-03-31 | 2020-11-10 | F5 Networks, Inc. | Methods for SSL protected NTLM re-authentication and devices thereof |
US10339106B2 (en) | 2015-04-09 | 2019-07-02 | Commvault Systems, Inc. | Highly reusable deduplication database after disaster recovery |
US10311150B2 (en) | 2015-04-10 | 2019-06-04 | Commvault Systems, Inc. | Using a Unix-based file system to manage and serve clones to windows-based computing clients |
US11350254B1 (en) | 2015-05-05 | 2022-05-31 | F5, Inc. | Methods for enforcing compliance policies and devices thereof |
US10505818B1 (en) | 2015-05-05 | 2019-12-10 | F5 Networks. Inc. | Methods for analyzing and load balancing based on server health and devices thereof |
US10324914B2 (en) | 2015-05-20 | 2019-06-18 | Commvalut Systems, Inc. | Handling user queries against production and archive storage systems, such as for enterprise customers having large and/or numerous files |
US20160350391A1 (en) | 2015-05-26 | 2016-12-01 | Commvault Systems, Inc. | Replication using deduplicated secondary copy data |
US9563514B2 (en) | 2015-06-19 | 2017-02-07 | Commvault Systems, Inc. | Assignment of proxies for virtual-machine secondary copy operations including streaming backup jobs |
US10084873B2 (en) | 2015-06-19 | 2018-09-25 | Commvault Systems, Inc. | Assignment of data agent proxies for executing virtual-machine secondary copy operations including streaming backup jobs |
US10275320B2 (en) | 2015-06-26 | 2019-04-30 | Commvault Systems, Inc. | Incrementally accumulating in-process performance data and hierarchical reporting thereof for a data stream in a secondary copy operation |
US10089196B2 (en) * | 2015-07-14 | 2018-10-02 | Shannon Systems Ltd. | Methods for reconfiguring a storage controller when control logic fails and apparatuses using the same |
US9766825B2 (en) | 2015-07-22 | 2017-09-19 | Commvault Systems, Inc. | Browse and restore for block-level backups |
US10101913B2 (en) | 2015-09-02 | 2018-10-16 | Commvault Systems, Inc. | Migrating data to disk without interrupting running backup operations |
US10176036B2 (en) | 2015-10-29 | 2019-01-08 | Commvault Systems, Inc. | Monitoring, diagnosing, and repairing a management database in a data storage management system |
US11757946B1 (en) | 2015-12-22 | 2023-09-12 | F5, Inc. | Methods for analyzing network traffic and enforcing network policies and devices thereof |
US20170192868A1 (en) | 2015-12-30 | 2017-07-06 | Commvault Systems, Inc. | User interface for identifying a location of a failed secondary storage device |
JP6516875B2 (en) * | 2016-01-08 | 2019-05-22 | 株式会社日立製作所 | Integration platform, server, and failover method |
US10404698B1 (en) | 2016-01-15 | 2019-09-03 | F5 Networks, Inc. | Methods for adaptive organization of web application access points in webtops and devices thereof |
US10797888B1 (en) | 2016-01-20 | 2020-10-06 | F5 Networks, Inc. | Methods for secured SCEP enrollment for client devices and devices thereof |
US11178150B1 (en) | 2016-01-20 | 2021-11-16 | F5 Networks, Inc. | Methods for enforcing access control list based on managed application and devices thereof |
US10565067B2 (en) | 2016-03-09 | 2020-02-18 | Commvault Systems, Inc. | Virtual server cloud file system for virtual machine backup from cloud operations |
US10296368B2 (en) | 2016-03-09 | 2019-05-21 | Commvault Systems, Inc. | Hypervisor-independent block-level live browse for access to backed up virtual machine (VM) data and hypervisor-free file-level recovery (block-level pseudo-mount) |
US10503753B2 (en) | 2016-03-10 | 2019-12-10 | Commvault Systems, Inc. | Snapshot replication operations based on incremental block change tracking |
US11349763B1 (en) * | 2016-03-16 | 2022-05-31 | Dell Products L.P. | Avoiding failures in sending data to the cloud due to performance gradient |
CN107203329B (en) * | 2016-03-17 | 2020-12-01 | 伊姆西Ip控股有限责任公司 | Storage management method and equipment |
US10791088B1 (en) | 2016-06-17 | 2020-09-29 | F5 Networks, Inc. | Methods for disaggregating subscribers via DHCP address translation and devices thereof |
US10346248B2 (en) | 2016-06-23 | 2019-07-09 | Red Hat Israel, Ltd. | Failure resistant volume creation in a shared storage environment |
US10417102B2 (en) | 2016-09-30 | 2019-09-17 | Commvault Systems, Inc. | Heartbeat monitoring of virtual machines for initiating failover operations in a data storage management system, including virtual machine distribution logic |
US10540516B2 (en) | 2016-10-13 | 2020-01-21 | Commvault Systems, Inc. | Data protection within an unsecured storage environment |
US10162528B2 (en) | 2016-10-25 | 2018-12-25 | Commvault Systems, Inc. | Targeted snapshot based on virtual machine location |
US10152251B2 (en) | 2016-10-25 | 2018-12-11 | Commvault Systems, Inc. | Targeted backup of virtual machine |
US11063758B1 (en) | 2016-11-01 | 2021-07-13 | F5 Networks, Inc. | Methods for facilitating cipher selection and devices thereof |
US10922189B2 (en) | 2016-11-02 | 2021-02-16 | Commvault Systems, Inc. | Historical network data-based scanning thread generation |
US10389810B2 (en) | 2016-11-02 | 2019-08-20 | Commvault Systems, Inc. | Multi-threaded scanning of distributed file systems |
US10505792B1 (en) | 2016-11-02 | 2019-12-10 | F5 Networks, Inc. | Methods for facilitating network traffic analytics and devices thereof |
US10678758B2 (en) | 2016-11-21 | 2020-06-09 | Commvault Systems, Inc. | Cross-platform virtual machine data and memory backup and replication |
US11496438B1 (en) | 2017-02-07 | 2022-11-08 | F5, Inc. | Methods for improved network security using asymmetric traffic delivery and devices thereof |
US10838821B2 (en) | 2017-02-08 | 2020-11-17 | Commvault Systems, Inc. | Migrating content and metadata from a backup system |
US10740193B2 (en) | 2017-02-27 | 2020-08-11 | Commvault Systems, Inc. | Hypervisor-independent reference copies of virtual machine payload data based on block-level pseudo-mount |
US10459666B2 (en) | 2017-03-03 | 2019-10-29 | Commvault Systems, Inc. | Using storage managers in respective data storage management systems for license distribution, compliance, and updates |
US10791119B1 (en) | 2017-03-14 | 2020-09-29 | F5 Networks, Inc. | Methods for temporal password injection and devices thereof |
US11032350B2 (en) | 2017-03-15 | 2021-06-08 | Commvault Systems, Inc. | Remote commands framework to control clients |
US10949308B2 (en) | 2017-03-15 | 2021-03-16 | Commvault Systems, Inc. | Application aware backup of virtual machines |
US10812266B1 (en) | 2017-03-17 | 2020-10-20 | F5 Networks, Inc. | Methods for managing security tokens based on security violations and devices thereof |
US20180276022A1 (en) | 2017-03-24 | 2018-09-27 | Commvault Systems, Inc. | Consistent virtual machine replication |
US10891069B2 (en) | 2017-03-27 | 2021-01-12 | Commvault Systems, Inc. | Creating local copies of data stored in online data repositories |
US11108858B2 (en) | 2017-03-28 | 2021-08-31 | Commvault Systems, Inc. | Archiving mail servers via a simple mail transfer protocol (SMTP) server |
US10776329B2 (en) | 2017-03-28 | 2020-09-15 | Commvault Systems, Inc. | Migration of a database management system to cloud storage |
US11074138B2 (en) | 2017-03-29 | 2021-07-27 | Commvault Systems, Inc. | Multi-streaming backup operations for mailboxes |
US10387073B2 (en) | 2017-03-29 | 2019-08-20 | Commvault Systems, Inc. | External dynamic virtual machine synchronization |
US11074140B2 (en) | 2017-03-29 | 2021-07-27 | Commvault Systems, Inc. | Live browsing of granular mailbox data |
US11010261B2 (en) | 2017-03-31 | 2021-05-18 | Commvault Systems, Inc. | Dynamically allocating streams during restoration of data |
US10552294B2 (en) | 2017-03-31 | 2020-02-04 | Commvault Systems, Inc. | Management of internet of things devices |
US10853195B2 (en) | 2017-03-31 | 2020-12-01 | Commvault Systems, Inc. | Granular restoration of virtual machine application data |
US11294786B2 (en) | 2017-03-31 | 2022-04-05 | Commvault Systems, Inc. | Management of internet of things devices |
US11221939B2 (en) | 2017-03-31 | 2022-01-11 | Commvault Systems, Inc. | Managing data from internet of things devices in a vehicle |
US10931662B1 (en) | 2017-04-10 | 2021-02-23 | F5 Networks, Inc. | Methods for ephemeral authentication screening and devices thereof |
TWI652592B (en) * | 2017-04-20 | 2019-03-01 | 周宏建 | Storage device and access control method thereof |
US10972453B1 (en) | 2017-05-03 | 2021-04-06 | F5 Networks, Inc. | Methods for token refreshment based on single sign-on (SSO) for federated identity environments and devices thereof |
US10984041B2 (en) | 2017-05-11 | 2021-04-20 | Commvault Systems, Inc. | Natural language processing integrated with database and data storage management |
US11122042B1 (en) | 2017-05-12 | 2021-09-14 | F5 Networks, Inc. | Methods for dynamically managing user access control and devices thereof |
US11343237B1 (en) | 2017-05-12 | 2022-05-24 | F5, Inc. | Methods for managing a federated identity environment using security and access control data and devices thereof |
US10664352B2 (en) | 2017-06-14 | 2020-05-26 | Commvault Systems, Inc. | Live browsing of backed up data residing on cloned disks |
US11122083B1 (en) | 2017-09-08 | 2021-09-14 | F5 Networks, Inc. | Methods for managing network connections based on DNS data and network policies and devices thereof |
US10831409B2 (en) * | 2017-11-16 | 2020-11-10 | International Business Machines Corporation | Volume reconfiguration for virtual machines |
US10307649B1 (en) | 2017-12-06 | 2019-06-04 | Acushnet Company | Multi-material iron golf club head |
US10742735B2 (en) | 2017-12-12 | 2020-08-11 | Commvault Systems, Inc. | Enhanced network attached storage (NAS) services interfacing to cloud storage |
US10831591B2 (en) | 2018-01-11 | 2020-11-10 | Commvault Systems, Inc. | Remedial action based on maintaining process awareness in data storage management |
US10795927B2 (en) | 2018-02-05 | 2020-10-06 | Commvault Systems, Inc. | On-demand metadata extraction of clinical image data |
US10642886B2 (en) | 2018-02-14 | 2020-05-05 | Commvault Systems, Inc. | Targeted search of backup data using facial recognition |
US10740022B2 (en) | 2018-02-14 | 2020-08-11 | Commvault Systems, Inc. | Block-level live browsing and private writable backup copies using an ISCSI server |
US10877928B2 (en) | 2018-03-07 | 2020-12-29 | Commvault Systems, Inc. | Using utilities injected into cloud-based virtual machines for speeding up virtual machine backup operations |
US10789387B2 (en) | 2018-03-13 | 2020-09-29 | Commvault Systems, Inc. | Graphical representation of an information management system |
US11658995B1 (en) | 2018-03-20 | 2023-05-23 | F5, Inc. | Methods for dynamically mitigating network attacks and devices thereof |
US11044200B1 (en) | 2018-07-06 | 2021-06-22 | F5 Networks, Inc. | Methods for service stitching using a packet header and devices thereof |
US10891198B2 (en) | 2018-07-30 | 2021-01-12 | Commvault Systems, Inc. | Storing data to cloud libraries in cloud native formats |
US11159469B2 (en) | 2018-09-12 | 2021-10-26 | Commvault Systems, Inc. | Using machine learning to modify presentation of mailbox objects |
CN109257377A (en) * | 2018-11-02 | 2019-01-22 | 浪潮电子信息产业股份有限公司 | A kind of block device access control method, device and equipment |
US11010258B2 (en) | 2018-11-27 | 2021-05-18 | Commvault Systems, Inc. | Generating backup copies through interoperability between components of a data storage management system and appliances for data storage and deduplication |
US11200124B2 (en) | 2018-12-06 | 2021-12-14 | Commvault Systems, Inc. | Assigning backup resources based on failover of partnered data storage servers in a data storage management system |
US10860443B2 (en) | 2018-12-10 | 2020-12-08 | Commvault Systems, Inc. | Evaluation and reporting of recovery readiness in a data storage management system |
US11698727B2 (en) | 2018-12-14 | 2023-07-11 | Commvault Systems, Inc. | Performing secondary copy operations based on deduplication performance |
US20200192572A1 (en) | 2018-12-14 | 2020-06-18 | Commvault Systems, Inc. | Disk usage growth prediction system |
KR102648790B1 (en) * | 2018-12-19 | 2024-03-19 | 에스케이하이닉스 주식회사 | Data storage device and operating method thereof |
US10996974B2 (en) | 2019-01-30 | 2021-05-04 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data, including management of cache storage for virtual machine data |
US10768971B2 (en) | 2019-01-30 | 2020-09-08 | Commvault Systems, Inc. | Cross-hypervisor live mount of backed up virtual machine data |
KR20200099882A (en) * | 2019-02-15 | 2020-08-25 | 에스케이하이닉스 주식회사 | Memory controller and operating method thereof |
US20200327017A1 (en) | 2019-04-10 | 2020-10-15 | Commvault Systems, Inc. | Restore using deduplicated secondary copy data |
US11366723B2 (en) | 2019-04-30 | 2022-06-21 | Commvault Systems, Inc. | Data storage management system for holistic protection and migration of serverless applications across multi-cloud computing environments |
US11463264B2 (en) | 2019-05-08 | 2022-10-04 | Commvault Systems, Inc. | Use of data block signatures for monitoring in an information management system |
US11269734B2 (en) | 2019-06-17 | 2022-03-08 | Commvault Systems, Inc. | Data storage management system for multi-cloud protection, recovery, and migration of databases-as-a-service and/or serverless database management systems |
US11308034B2 (en) | 2019-06-27 | 2022-04-19 | Commvault Systems, Inc. | Continuously run log backup with minimal configuration and resource usage from the source machine |
US11561866B2 (en) | 2019-07-10 | 2023-01-24 | Commvault Systems, Inc. | Preparing containerized applications for backup using a backup services container and a backup services container-orchestration pod |
US11042318B2 (en) | 2019-07-29 | 2021-06-22 | Commvault Systems, Inc. | Block-level data replication |
US11442896B2 (en) | 2019-12-04 | 2022-09-13 | Commvault Systems, Inc. | Systems and methods for optimizing restoration of deduplicated data stored in cloud-based storage resources |
US11467753B2 (en) | 2020-02-14 | 2022-10-11 | Commvault Systems, Inc. | On-demand restore of virtual machine data |
US11321188B2 (en) | 2020-03-02 | 2022-05-03 | Commvault Systems, Inc. | Platform-agnostic containerized application data protection |
US11422900B2 (en) | 2020-03-02 | 2022-08-23 | Commvault Systems, Inc. | Platform-agnostic containerized application data protection |
US11005936B1 (en) * | 2020-03-10 | 2021-05-11 | Mediatek Inc. | Security mechanism for multi-client access to a single storage device through a single controller |
US11442768B2 (en) | 2020-03-12 | 2022-09-13 | Commvault Systems, Inc. | Cross-hypervisor live recovery of virtual machines |
US11099956B1 (en) | 2020-03-26 | 2021-08-24 | Commvault Systems, Inc. | Snapshot-based disaster recovery orchestration of virtual machine failover and failback operations |
US11429289B2 (en) * | 2020-03-27 | 2022-08-30 | Intel Corporation | Memory map protection mechanism |
US11748143B2 (en) | 2020-05-15 | 2023-09-05 | Commvault Systems, Inc. | Live mount of virtual machines in a public cloud computing environment |
US11687424B2 (en) | 2020-05-28 | 2023-06-27 | Commvault Systems, Inc. | Automated media agent state management |
US11494417B2 (en) | 2020-08-07 | 2022-11-08 | Commvault Systems, Inc. | Automated email classification in an information management system |
US11314687B2 (en) | 2020-09-24 | 2022-04-26 | Commvault Systems, Inc. | Container data mover for migrating data between distributed data storage systems integrated with application orchestrators |
US11656951B2 (en) | 2020-10-28 | 2023-05-23 | Commvault Systems, Inc. | Data loss vulnerability detection |
US11604706B2 (en) | 2021-02-02 | 2023-03-14 | Commvault Systems, Inc. | Back up and restore related data on different cloud storage tiers |
US11593223B1 (en) | 2021-09-02 | 2023-02-28 | Commvault Systems, Inc. | Using resource pool administrative entities in a data storage management system to provide shared infrastructure to tenants |
US11809285B2 (en) | 2022-02-09 | 2023-11-07 | Commvault Systems, Inc. | Protecting a management database of a data storage management system to meet a recovery point objective (RPO) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4207609A (en) * | 1978-05-08 | 1980-06-10 | International Business Machines Corporation | Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access system |
US4970640A (en) * | 1987-08-28 | 1990-11-13 | International Business Machines Corporation | Device initiated partial system quiescing |
US5222217A (en) * | 1989-01-18 | 1993-06-22 | International Business Machines Corporation | System and method for implementing operating system message queues with recoverable shared virtual storage |
US5915088A (en) * | 1996-12-05 | 1999-06-22 | Tandem Computers Incorporated | Interprocessor messaging system |
Family Cites Families (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3757225A (en) * | 1972-03-16 | 1973-09-04 | Telebeam Corp | Communication system |
US4837680A (en) * | 1987-08-28 | 1989-06-06 | International Business Machines Corporation | Controlling asynchronously operating peripherals |
US5301290A (en) * | 1990-03-14 | 1994-04-05 | International Business Machines Corporation | Method for minimizing lock processing while ensuring consistency among pages common to local processor caches and a shared external store |
JP2575543B2 (en) * | 1990-04-04 | 1997-01-29 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Simultaneous access management method |
US5577209A (en) * | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
US5339427A (en) * | 1992-03-30 | 1994-08-16 | International Business Machines Corporation | Method and apparatus for distributed locking of shared data, employing a central coupling facility |
US5428796A (en) * | 1992-08-26 | 1995-06-27 | International Business Machines Corporation | System and method for regulating access to direct access storage devices in data processing systems |
US5692128A (en) * | 1993-06-23 | 1997-11-25 | Microtest, Inc. | Computer network with reliable and efficient removable media services |
CA2137488C (en) * | 1994-02-18 | 1998-09-29 | Richard I. Baum | Coexecuting method and means for performing parallel processing in conventional types of data processing systems |
US5613139A (en) * | 1994-05-11 | 1997-03-18 | International Business Machines Corporation | Hardware implemented locking mechanism for handling both single and plural lock requests in a lock message |
US5761669A (en) * | 1995-06-06 | 1998-06-02 | Microsoft Corporation | Controlling access to objects on multiple operating systems |
US5768623A (en) * | 1995-09-19 | 1998-06-16 | International Business Machines Corporation | System and method for sharing multiple storage arrays by dedicating adapters as primary controller and secondary controller for arrays reside in different host computers |
JP3011886B2 (en) * | 1996-06-06 | 2000-02-21 | 川崎重工業株式会社 | Transfer box transporter |
US5802178A (en) * | 1996-07-30 | 1998-09-01 | Itt Industries, Inc. | Stand alone device for providing security within computer networks |
WO1998006036A1 (en) * | 1996-08-02 | 1998-02-12 | Transoft Corporation | Method and apparatus for allowing distributed control of shared resources |
US6073218A (en) * | 1996-12-23 | 2000-06-06 | Lsi Logic Corp. | Methods and apparatus for coordinating shared multiple raid controller access to common storage devices |
US5933824A (en) * | 1996-12-23 | 1999-08-03 | Lsi Logic Corporation | Methods and apparatus for locking files within a clustered storage environment |
US5956723A (en) * | 1997-03-21 | 1999-09-21 | Lsi Logic Corporation | Maintaining identifier information in a memory using unique identifiers as a linked list |
US6212636B1 (en) * | 1997-05-01 | 2001-04-03 | Itt Manufacturing Enterprises | Method for establishing trust in a computer network via association |
US5968182A (en) * | 1997-05-12 | 1999-10-19 | International Business Machines Corporation | Method and means for utilizing device long busy response for resolving detected anomalies at the lowest level in a hierarchical, demand/response storage management subsystem |
JP3228182B2 (en) * | 1997-05-29 | 2001-11-12 | 株式会社日立製作所 | Storage system and method for accessing storage system |
US6057981A (en) * | 1997-09-23 | 2000-05-02 | Seagate Technology, Inc. | Product information identification in a head disc assembly |
US6038563A (en) * | 1997-10-31 | 2000-03-14 | Sun Microsystems, Inc. | System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects |
US6154714A (en) * | 1997-11-17 | 2000-11-28 | Heuristic Physics Laboratories | Method for using wafer navigation to reduce testing times of integrated circuit wafers |
US5940828A (en) * | 1997-11-18 | 1999-08-17 | International Business Machines Corporation | Locking contention resolution for shared resources |
US6029023A (en) * | 1997-12-03 | 2000-02-22 | Minolta Co., Ltd. | Image forming apparatus operating in color mode and monochrome mode |
US6029168A (en) * | 1998-01-23 | 2000-02-22 | Tricord Systems, Inc. | Decentralized file mapping in a striped network file system in a distributed computing environment |
US6061753A (en) * | 1998-01-27 | 2000-05-09 | Emc Corporation | Apparatus and method of accessing target devices across a bus utilizing initiator identifiers |
US6012067A (en) * | 1998-03-02 | 2000-01-04 | Sarkar; Shyam Sundar | Method and apparatus for storing and manipulating objects in a plurality of relational data managers on the web |
US6233618B1 (en) * | 1998-03-31 | 2001-05-15 | Content Advisor, Inc. | Access control of networked data |
US6209023B1 (en) | 1998-04-24 | 2001-03-27 | Compaq Computer Corporation | Supporting a SCSI device on a non-SCSI transport medium of a network |
US6195703B1 (en) * | 1998-06-24 | 2001-02-27 | Emc Corporation | Dynamic routing for performance partitioning in a data processing network |
US6151331A (en) * | 1998-09-23 | 2000-11-21 | Crossroads Systems, Inc. | System and method for providing a proxy FARP for legacy storage devices |
US6148414A (en) * | 1998-09-24 | 2000-11-14 | Seek Systems, Inc. | Methods and systems for implementing shared disk array management functions |
-
1999
- 1999-09-13 US US09/394,220 patent/US6343324B1/en not_active Expired - Lifetime
-
2000
- 2000-07-26 EP EP00952203A patent/EP1221100A4/en not_active Withdrawn
- 2000-07-26 JP JP2001523980A patent/JP2003509773A/en active Pending
- 2000-07-26 WO PCT/US2000/020312 patent/WO2001020470A1/en active Application Filing
- 2000-07-26 AU AU64946/00A patent/AU6494600A/en not_active Abandoned
- 2000-07-26 CN CNB008127980A patent/CN1168020C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4207609A (en) * | 1978-05-08 | 1980-06-10 | International Business Machines Corporation | Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access system |
US4970640A (en) * | 1987-08-28 | 1990-11-13 | International Business Machines Corporation | Device initiated partial system quiescing |
US5222217A (en) * | 1989-01-18 | 1993-06-22 | International Business Machines Corporation | System and method for implementing operating system message queues with recoverable shared virtual storage |
US5915088A (en) * | 1996-12-05 | 1999-06-22 | Tandem Computers Incorporated | Interprocessor messaging system |
Non-Patent Citations (1)
Title |
---|
See also references of EP1221100A4 * |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8275950B2 (en) | 1997-05-29 | 2012-09-25 | Hitachi, Ltd. | Fiber channel connection storage controller |
US8583877B2 (en) | 1997-05-29 | 2013-11-12 | Hitachi, Ltd. | Fiber channel connection storage controller |
US7657727B2 (en) | 2000-01-14 | 2010-02-02 | Hitachi, Ltd. | Security for logical unit in storage subsystem |
US8700587B2 (en) | 2000-01-14 | 2014-04-15 | Hitachi, Ltd. | Security method and system for storage subsystem |
US8195904B2 (en) | 2000-05-24 | 2012-06-05 | Hitachi, Ltd. | Method and apparatus for controlling access to storage device |
US8095757B2 (en) | 2000-05-24 | 2012-01-10 | Hitachi, Ltd. | Method and apparatus for controlling access to storage device |
WO2003005209A3 (en) * | 2001-06-14 | 2004-02-12 | Cable & Wireless Internet Serv | Secured shared storage architecture |
US7693970B2 (en) | 2001-06-14 | 2010-04-06 | Savvis Communications Corporation | Secured shared storage architecture |
WO2003005209A2 (en) * | 2001-06-14 | 2003-01-16 | Cable & Wireless Internet Services, Inc. | Secured shared storage architecture |
US7734781B2 (en) | 2001-07-09 | 2010-06-08 | Savvis Communications Corporation | Methods and systems for shared storage virtualization |
JP4651230B2 (en) * | 2001-07-13 | 2011-03-16 | 株式会社日立製作所 | Storage system and access control method to logical unit |
EP1276034A3 (en) * | 2001-07-13 | 2008-01-23 | Hitachi, Ltd. | Security for logical unit in storage subsystem |
JP2003030053A (en) * | 2001-07-13 | 2003-01-31 | Hitachi Ltd | Storage subsystem having security function for each logical unit |
EP1276034A2 (en) * | 2001-07-13 | 2003-01-15 | Hitachi, Ltd. | Security for logical unit in storage subsystem |
US8103829B2 (en) * | 2003-06-25 | 2012-01-24 | Commvault Systems, Inc. | Hierarchical systems and methods for performing storage operations in a computer network |
US7567980B2 (en) | 2003-12-16 | 2009-07-28 | Alpine Electronics, Inc. | Removable recording medium and file control method therefor |
US8560742B2 (en) | 2008-06-10 | 2013-10-15 | Virtensys Limited | Methods of providing access to I/O devices |
US8966135B2 (en) | 2008-06-10 | 2015-02-24 | Micron Technology, Inc. | Methods of providing access to I/O devices |
US8055734B2 (en) | 2008-08-15 | 2011-11-08 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US9060008B2 (en) | 2008-08-15 | 2015-06-16 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US9280295B2 (en) | 2008-08-15 | 2016-03-08 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US9684451B2 (en) | 2008-08-15 | 2017-06-20 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US9910595B2 (en) | 2008-08-15 | 2018-03-06 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US10241679B2 (en) | 2008-08-15 | 2019-03-26 | International Business Machines Corporation | Mapping of logical volumes to host clusters |
US9384206B1 (en) * | 2013-12-26 | 2016-07-05 | Emc Corporation | Managing data deduplication in storage systems |
WO2016050315A1 (en) * | 2014-10-02 | 2016-04-07 | Hitachi Data Systems Engineering UK Limited | Method and an apparatus, and related computer-program products, for managing access request in multi-tenancy environments |
US10318194B2 (en) | 2014-10-02 | 2019-06-11 | Hitachi Vantara Corporation | Method and an apparatus, and related computer-program products, for managing access request in multi-tenancy environments |
Also Published As
Publication number | Publication date |
---|---|
JP2003509773A (en) | 2003-03-11 |
AU6494600A (en) | 2001-04-17 |
CN1373874A (en) | 2002-10-09 |
CN1168020C (en) | 2004-09-22 |
EP1221100A1 (en) | 2002-07-10 |
EP1221100A4 (en) | 2007-07-18 |
US6343324B1 (en) | 2002-01-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6343324B1 (en) | Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices | |
US7865626B2 (en) | Raid storage subsystem using read connection information command to request WWN information for server table and adapter connection table | |
US7366808B2 (en) | System, method and apparatus for multiple-protocol-accessible OSD storage subsystem | |
US8006310B2 (en) | Disk control unit | |
US7596637B2 (en) | Storage apparatus and control method for the same, and computer program product | |
US7130978B2 (en) | Method and apparatus for controlling access to storage device | |
JP3993773B2 (en) | Storage subsystem, storage control device, and data copy method | |
US6931440B1 (en) | Method and apparatus for dynamically determining whether access to a resource connected to a computer has changed and determining how to access the resource with a new identifier | |
US7558930B2 (en) | Write protection in a storage system allowing both file-level access and volume-level access | |
JP4990505B2 (en) | Storage control device and storage system | |
US20040088513A1 (en) | Controller for partition-level security and backup | |
US20020083339A1 (en) | Method and apparatus for preventing unauthorized access by a network device | |
US6356979B1 (en) | System and method for selectively presenting logical storage units to multiple host operating systems in a networked computing system | |
US6810396B1 (en) | Managed access of a backup storage system coupled to a network | |
JP3744248B2 (en) | Fiber channel connected storage subsystem and access method thereof | |
US7293152B1 (en) | Consistent logical naming of initiator groups | |
US7610295B2 (en) | Method and apparatus for generating persistent path identifiers | |
US6842810B1 (en) | Restricted access devices | |
US7114020B1 (en) | Software mechanism for unique identification of SCSI device | |
US8996802B1 (en) | Method and apparatus for determining disk array enclosure serial number using SAN topology information in storage area network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2001 523980 Kind code of ref document: A Format of ref document f/p: F |
|
WWE | Wipo information: entry into national phase |
Ref document number: 008127980 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000952203 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2000952203 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |