会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Configuration of fibre channel san path
    • 光纤通道路径配置
    • US20050114476A1
    • 2005-05-26
    • US10719179
    • 2003-11-20
    • James ChenPatricia LuChung FungMinh-Ngoc HuynhChristopher SansoneDung DangGail SpearRichard Ripberger
    • James ChenPatricia LuChung FungMinh-Ngoc HuynhChristopher SansoneDung DangGail SpearRichard Ripberger
    • G06F15/177H04L29/08H04L29/12
    • H04L67/1097H04L29/12801H04L61/6004
    • Methods, system and computer program product are provided to configure a path between nodes through a fabric in a fibre channel storage area network (SAN). A node name is provided for a target node on the SAN and a port name is provided for each port in the target node. A relationship is established in a data structure between each port name and a slot in which each port is physically located in the target node. Prior to configuring a path between a source node and a port in the target node, the ports which are physically connected and logged in to the fabric are identified by port address. The port names corresponding to the port addresses are then identified. The port names are used to generate interface_ids of the ports corresponding to the physical slots in which the ports are located. A data structure is created to maintain the relationship between interface_ids and port names. To establish a path connection between a port in the source node and a selected port in the target node, the node name of the target node and the interface_id of the selected port are input to the data structure and the port name of the selected port is output. The port name is then used to obtain the address of the selected port and an I/O session path opened between the source and target nodes.
    • 提供了方法,系统和计算机程序产品,以通过光纤通道存储区域网络(SAN)中的结构来配置节点之间的路径。 为SAN上的目标节点提供节点名称,并为目标节点中的每个端口提供端口名称。 在每个端口名称和每个端口物理上位于目标节点的时隙之间的数据结构中建立关系。 在目标节点中的源节点和端口之间配置路径之前,物理连接并登录到结构的端口由端口地址标识。 然后识别与端口地址对应的端口名称。 端口名称用于生成与端口所在物理槽相对应的端口的接口ID。 创建数据结构以维护interface_ids和端口名称之间的关系。 要在源节点中的端口和目标节点的选定端口之间建立路径连接,将目标节点的节点名称和所选端口的interface_id输入到数据结构,所选端口的端口名称为 输出。 然后使用端口名称来获取所选端口的地址以及在源节点和目标节点之间打开的I / O会话路径。
    • 6. 发明申请
    • Decreased response time for PPRC write operation
    • 减少PPRC写入操作的响应时间
    • US20050114358A1
    • 2005-05-26
    • US10719229
    • 2003-11-20
    • James ChenMinh-Ngoc HuynhMatthew KalosChung Fung
    • James ChenMinh-Ngoc HuynhMatthew KalosChung Fung
    • G06F3/06H04L12/56G06F7/00
    • G06F3/065G06F3/0611G06F3/067G06F3/0689H04L47/10
    • Methods, system and computer program product are provided to improve the efficiency of data transfers in a PPRC environment. Any or all of three features may be implemented, each of which reduces the number of round trips required for the exchange of handshaking, data and control information. A first feature includes disabling the “transfer ready” acknowledgment which normally occurs between a primary storage controller and a secondary storage controller. A second feature includes pre-allocating payload and data buffers in the secondary storage controller. A third feature includes packaging write control information with a write command in an extended command descriptor block (CDB). Such a step eliminated the need for a separate transmission of the write control information. The CDB is transmitted along with a data block from the primary storage controller to the secondary storage controller and placed in the respective, pre-allocated buffers. Data may also be pipelined to the secondary. By decreasing the response time for data transfers, the distance separating the primary and secondary storage controllers may be increased.
    • 提供了方法,系统和计算机程序产品,以提高PPRC环境中数据传输的效率。 可以实现三个特征中的任何一个或全部,每个特征减少交换握手,数据和控制信息所需的往返次数。 第一个功能包括禁用通常在主存储控制器和辅助存储控制器之间发生的“传送就绪”确认。 第二特征包括在副存储控制器中预分配有效载荷和数据缓冲器。 第三个特征包括在扩展命令描述符块(CDB)中用写入命令封装写入控制信息。 这样的步骤消除了对写入控制信息的单独发送的需要。 CDB与来自主存储控制器的数据块一起传送到辅助存储控制器并且被放置在相应的预先分配的缓冲器中。 数据也可以流水线到次级。 通过减少数据传输的响应时间,可以增加分离主存储控制器和辅助存储控制器的距离。
    • 8. 发明申请
    • Method, system, and program for data corruption detection and fault isolation
    • 用于数据损坏检测和故障隔离的方法,系统和程序
    • US20050188279A1
    • 2005-08-25
    • US10752758
    • 2004-01-07
    • Kevin GibbleJames ChenMichael BenhaseMinh-Ngoc Huynh
    • Kevin GibbleJames ChenMichael BenhaseMinh-Ngoc Huynh
    • G06F11/00G06F11/10
    • G06F11/1004G06F11/1064
    • Disclosed is a technique for fault isolation. A first error check is performed on a block of data in storage to determine whether the block of data was corrupted after the block of data was transferred from memory to the storage. When the first error check indicates that the block of data was corrupted, a second error check is performed using the block of data in the memory to determine whether the block of data was corrupted before being transferred from the memory. When the second error check indicates that the block of data was corrupted before being transferred from the memory, it is determined that the block of data was corrupted before being stored in the memory. When the second error check indicates that the block of data was corrupted after being transferred from the memory, it is determined that the block of data was corrupted by at least one of the memory or a formatter that performed the transfer. Additionally disclosed is a technique in which a block of data is transferred from a memory at a first control unit to a memory at a second control unit. At the first control unit, when a second error check at the second control unit indicates that the block of data was corrupted before being transferred from the memory, a third error check is performed on the block of data in memory at the first control unit. When the third error check indicates that the block of data was corrupted, it is determined that the block of data was corrupted at the first control unit. When the third error check indicates that the block of data was not corrupted, it is determined that the block of data was corrupted during transfer from the first control unit to the second control unit.
    • 公开了一种用于故障隔离的技术。 对存储器中的数据块执行第一个错误检查,以确定在数据块从存储器传输到存储器之后数据块是否已损坏。 当第一个错误检查指示数据块被破坏时,使用存储器中的数据块执行第二个错误检查,以确定在从存储器传送之前数据块是否已损坏。 当第二个错误检查指示在从存储器传送之前数据块被破坏时,确定数据块在存储在存储器中之前被破坏。 当第二个错误检查指示在从存储器传送之后数据块被破坏时,确定数据块被执行传送的存储器或格式器中的至少一个损坏。 另外公开了一种技术,其中数据块从第一控制单元的存储器传送到第二控制单元处的存储器。 在第一控制单元处,当第二控制单元的第二错误检查指示在从存储器传送之前数据块被破坏时,对第一控制单元的存储器中的数据块执行第三错误检查。 当第三个错误检查指示数据块被破坏时,确定数据块在第一个控制单元被破坏。 当第三错误检查指示数据块未被破坏时,确定在从第一控制单元传送到第二控制单元期间数据块被破坏。