US20090216976A1 - Computer system allowing any computer to copy any storage area within a storage system - Google Patents
Computer system allowing any computer to copy any storage area within a storage system Download PDFInfo
- Publication number
- US20090216976A1 US20090216976A1 US12/431,385 US43138509A US2009216976A1 US 20090216976 A1 US20090216976 A1 US 20090216976A1 US 43138509 A US43138509 A US 43138509A US 2009216976 A1 US2009216976 A1 US 2009216976A1
- Authority
- US
- United States
- Prior art keywords
- copy
- sub
- group
- host
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims description 46
- 230000001360 synchronised effect Effects 0.000 claims description 16
- 238000004891 communication Methods 0.000 claims description 11
- 238000012545 processing Methods 0.000 description 22
- 238000007726 management method Methods 0.000 description 15
- 238000013523 data management Methods 0.000 description 10
- 238000012546 transfer Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 7
- 230000007704 transition Effects 0.000 description 7
- 230000006870 function Effects 0.000 description 5
- 238000011084 recovery Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0646—Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
- G06F3/065—Replication mechanisms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2064—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring while ensuring consistency
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2056—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring
- G06F11/2071—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant by mirroring using a plurality of controllers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
- G06F3/0637—Permissions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
Definitions
- a technology disclosed in this patent application relates to a storage system and a method for controlling the storage system and more particularly to a storage system and a method for controlling the storage system well suited for copy processing designed for disaster recovery in a large-scale system having a plurality of computers and a plurality of storage devices.
- Each host computer has conventionally copied data stored in local storage areas under its control.
- the storage areas in which the individual host computers can perform the copy function are limited to those storage areas under the control of the local host computer. This is because one host computer cannot handle the storage areas controlled by other host computers.
- One aspect of this invention provides a computer system having a plurality of host computers and a storage system, in which one host computer is capable of collectively performing a copy operation on any desired or all storage areas in the storage system.
- a plurality of storage areas provided by disk devices are divided into groups in advance for definition so that a copy operation can be done by specifying a desired group.
- Each group is a set of sub-groups, each of which is defined for one host computer.
- FIG. 1 is a diagram showing a configuration of a computer system using a storage system of one embodiment.
- FIG. 2 is a table showing a copy group list.
- FIG. 3 is a table showing a sub-copy group list.
- FIG. 4 is a table showing a logical disk list.
- FIG. 5 illustrates a relation among the copy group list, the sub-copy group list and the logical disk list.
- FIG. 6 is a sub-logical disk number table.
- FIG. 7 is a table showing write data management information.
- FIG. 8 is a flow chart showing a copy group generation procedure.
- FIG. 9 is a flow chart showing a sub-copy group generation procedure.
- FIG. 10 is a flow chart showing operations of a main controller and a sub-controller during a copy process.
- FIG. 11 is a flow chart showing a procedure for determining a copy method.
- FIG. 12 illustrates a status transition during the copy process.
- FIG. 13A shows types of setting commands.
- FIG. 13B shows a type of operation command.
- FIG. 1 to FIG. 13 One embodiment of this invention will be described by referring to FIG. 1 to FIG. 13 .
- FIG. 1 a configuration of a computer system using a storage system of this embodiment will be explained.
- FIG. 1 shows a configuration of a computer system using the storage system of this embodiment.
- the computer system comprises a plurality of hosts 10 , 100 ( 100 a , 100 b ), a main controller 1000 , disk devices 1600 ( 1600 a , 1600 b ) connected to the main controller 1000 , a sub-controller 2000 , and disk devices 2600 ( 2600 c , 2600 d ) connected to the sub-controller 2000 .
- the main controller 1000 and the sub-controller 2000 may each be single or two or more in number.
- the number of disk devices connected to these controllers likewise may be one or two or more.
- a storage system including at least one of the storage controllers and the disk devices is referred to as a storage system.
- a storage system comprises the main controller 1000 and the disk devices 1600 ( 1600 a , 1600 b ), another storage system comprises the sub-controller 2000 and the disk devices 2600 ( 2600 c , 2600 d ) in FIG. 1 .
- the main controller 1000 is connected to the host 10 and the hosts 100 a , 100 b via a communication path. In this embodiment, a process of copying from the main controller 1000 to the sub-controller 2000 for disaster recovery will be explained.
- the main controller 1000 has a shared memory 1400 , a cache memory 1200 , a crossbar switch 1300 , host adapters (port adapters) 1100 ( 1100 a , 1100 b , 1100 c ) and disk adapters 1500 ( 1500 a , 1500 b ).
- the shared memory 1400 , the cache memory 1200 , the host adapters 1100 ( 1100 a , 1100 b , 1100 c ) and the disk adapters 1500 ( 1500 a , 1500 b ) are interconnected through the crossbar switch 1300 .
- the disk adapters 1500 are connected to the disk devices 1600 through ports 1530 .
- the disk adapters manage data in the disk devices and transfer data to other devices as required.
- the host adapters 1100 have a processor 1110 , a memory 1130 and an IO port 1120 .
- the host adapters receive an IO request from a host and perform an operation of remote copy to the sub-controller 2000 as required.
- the sub-controller 2000 like the main controller 1000 , has a shared memory 2400 , a cache memory 2200 , a crossbar switch 2300 , a host adapter 2100 and disk adapters 2500 ( 2500 a , 2500 b ).
- the hosts 100 have a processor 120 , a memory 130 and an IO port 110 . Though not shown, the processor, memory and IO port are interconnected through a communication path such as internal bus. Operating systems (OS's) running on individual hosts may differ from one another and IO communication protocols between the hosts and controllers may also differ. Though not shown, the host 10 similarly has a processor, a memory and an IO port, all interconnected through a communication path such as internal bus.
- OS operating systems
- This embodiment enables a plurality of storage areas on the main controller 1000 handled by a plurality of hosts 100 to be copied in a single operation.
- the storage areas are represented in different ways in different systems but in this embodiment they are treated as logical disk devices.
- the logical disk devices (or simply referred to as “logical disks”) are a logical storage area made up of a single or two or more disk devices. More precisely, each of the logical disks may be defined as all or a part of storage areas in one disk device or as a set of (a part or all of) storage areas in individual disk devices.
- the main controller manages and operates the logical disk devices using “copy groups” and “sub-copy groups.”
- the “copy group” is a group of storage areas to be processed by a global copy operation and defined as a set of sub-copy groups.
- the “sub-copy group” refers to those among the storage areas to be processed by the global copy which are specified by individual hosts as an object to be copied.
- a copy group is specified by a system administrator specifying storage areas he or she wants copied.
- a copy group may include storage areas that are handled as a charging unit, a set of storage areas that are divided so as to have an appropriate volume of data for a single copy operation, or storage areas classified by a management section in charge.
- the main controller 1000 manages the copy groups and the sub-copy groups by using a copy group list 1420 , a sub-copy group list 1450 and a logical disk list 1430 . These three lists reside on the shared memory 1400 in the main controller 1000 .
- FIG. 2 shows a copy group list
- FIG. 3 shows a sub-copy group list
- FIG. 4 shows a logical disk list
- FIG. 5 shows a relation among the copy group list, the sub-copy group list and the logical disk list.
- the copy group list is a list of all copy groups defined by the main controller 1000 .
- the copy group list has information on a copy group number, a consistency assurance level, a sub-group list pointer, and a status.
- the “copy group number” is a number that uniquely identifies a copy group of interest.
- the “consistency assurance level” is a criterion that defines a copy operation performed during a copy process and in the event of a fault.
- the consistency means that data in the storage devices are updated in the same order as the data arrives from a host.
- the consistency assurance level is “completely assured”, the consistency (an order in which data is updated to disk devices connected to the sub-controller 2000 ) is assured for all logical disks registered with a copy group.
- the consistency assurance level is “sub-group”, the consistency is assured at the sub-copy group level. When it is “unassured”, the consistency is not assured.
- the “sub-group list pointer” indicates an address of the sub-group list in the shared memory.
- the “status” indicates a current state of the copy group. The consistency assurance level and the status will be described later in more detail.
- the sub-copy group list is a list of sub-copy groups making up a copy group.
- the sub-copy group list has information on a sub-copy group number, a host ID, a copy category, a presence/absence of logical disk list, a logical disk list number/logical disk number, and a status.
- the “sub-copy group number” is a number that uniquely identifies a sub-copy group of interest.
- the “host ID” is information by which the main controller 1000 and the sub-controller 2000 can uniquely identify the host 100 .
- the “copy category” represents a kind of copy function, such as asynchronous remote copy and synchronous remote copy.
- the “asynchronous remote copy” is a copy procedure by which, in response to a copy IO command from a host, the main controller 1000 reports an end of the associated IO operation without waiting for the copy to be finished.
- the “synchronous remote copy” is a copy procedure by which, in response to each copy IO command from a host, the main controller 1000 confirms that the associated copy operation has been performed on the sub-controller 2000 before reporting an end of the IO operation.
- the “availability of logical disk list” indicates whether a sub-copy group of interest in the main controller is made up of multiple logical disks and represented as a list. If “available” is entered in this column, this indicates that the sub-copy group is represented by a logical disk list; and if “not available” is entered, this indicates that the sub-copy group is represented by a single logical disk.
- the sub-copy group of this embodiment is introduced so that, when the copy category is asynchronous remote copy, the consistency of the update order in which a plurality of logical disks are copied can be assured and therefore a fault freeze also assured.
- the “logical disk list number/logical disk number” represents a logical disk list sub-group number or a logical disk number.
- the time this information represents a logical disk list number is when the value of the availability of logical disk list is “available.” When it refers to a logical disk number, the value of the presence/absence of logical disk list must be “not available.”
- the logical disk number means each of serial numbers assigned to logical disks of a fixed size handled by the controller as control units.
- the storage areas in the controller are handled as a set of logical disks and are each assigned a logical disk number.
- the storage areas handled by a host may or may not be of a size equal to the associated logical disks.
- the status represents a current state of a sub-copy group. The detail of the status will be described later.
- the logical disk list of FIG. 4 shows logical disks for each sub-copy group in the form of a list.
- One such logical disk list is allocated to each of those sub-copy groups handled by the copy function of the main controller whose logical disk list availability is “available”.
- the logical disk list shows a logical disk configuration in a sub-copy group.
- An entry 7 A in the logical disk list shows that a sub-copy group with sub-copy group number “1” is made up of three logical disks 1 , 5 , 7 .
- FIG. 5 shows an example case where there are three copy groups in the main controller.
- the copy group list has three registered copy groups.
- Entries 5 A, 5 B, 5 C in the copy group list each indicate by their sub-copy group list pointers locations (in the shared memory) of the sub-copy group lists ( 1450 a , 1450 b , 1450 c ).
- those entries whose logical disk list availability is “available” 6 A, 6 D, 6 F
- FIG. 6 shows a sub-logical disk number table
- FIG. 8 is a flow chart showing a copy group generation procedure.
- FIG. 9 is a flow chart showing a sub-copy group generation procedure.
- the procedure begins with generating copy groups.
- the IO port 1120 in the host adapter 1100 accepts the copy group generation command and informs the processor 1110 that it has received the copy group generation command.
- the command issued by the host 100 to instruct the copy group generation will be detailed later.
- the processor checks if a copy group list 1420 exists in the shared memory 1400 . If the copy group list is found not present (step 210 , no), the processor generates a copy group list (step 220 ).
- the processor adds a new entry to the copy group list (step 230 ).
- the status column for the new entry is set to “suspended”.
- the processor After step 230 , the processor generates a message to indicate that the instruction has successfully been completed and returns it to the host 100 , a source of the instruction (step 235 ).
- the IO port 1120 in the host adapter 1100 accepts the sub-copy group registration command and informs the processor 1110 that it has accepted the sub-copy group registration command.
- a command issued by the host 100 to instruct the sub-copy group registration will be detailed later.
- the processor checks a copy group number to see if a copy group required by the sub-copy group registration command to be registered exists in entries in the copy group list 1420 in the shared memory 1400 . If the entry of interest is found not present in the copy group list, the processor generates an error message indicating that the copy group does not exist in the list and returns it to the source of registration command (step 255 ). If the entry of interest is found to exist in the copy group list (step 250 , yes), a check is made as to whether the specified sub-copy group list exists in the shared memory. This check is based on a presence or absence of a value in a pointer column in the sub-copy group list at the entry in the copy group list.
- step 260 If the sub-copy group list does not exist in the shared memory (step 260 , no) the processor generates a sub-copy group list (step 270 ).
- step 260 If the sub-copy group list exists in the shared memory (step 260 , yes), the processor adds an entry to the sub-copy group list according to the content of the registration command (step 280 ). After the entry has been added to the sub-copy group list, if there are two or more logical disks required by the registration command to be copied (step 290 , yes), a check is made as to whether a logical disk list 1430 exists in the shared memory. If the logical disk list is found not to exist (step 300 , no), the processor creates the logical disk list (step 310 ).
- the processor creates or updates its entries according to the content of the registration command (step 320 ).
- step 320 entries in the sub-logical disk number table 1440 are updated (step 330 ).
- the copy category and the consistency assurance level may be redundantly entered in the sub-logical disk number table for faster access, although this is not an essential step because these information is contained in the copy group list 1420 and the sub-copy group list 1450 .
- the copy group number and the sub-copy group number are used to determine a present state of a fault from the copy group list 1420 and the sub-copy group list 1450 .
- the processor writes in the sub-copy group list pointer of the entry in the copy group list an address where the sub-copy group list is to be stored, creates a message that the registration instruction from the host is successfully completed and returns it to the source of the registration instruction (step 340 ). After the message has been sent, the copy operation can be initiated for the storage areas specified by the group.
- FIG. 7 shows a table of write data management information.
- FIG. 10 is a flow chart showing a sequence of steps performed by the main and sub-controllers during the copy operation.
- FIG. 11 is a flow chart showing a procedure to determine a copy method.
- FIG. 12 is a status transition table for a copy operation.
- the write data management information 1410 , 2410 is held in both the main controller and the sub-controller.
- a write address 9 B is information about an address in logical disk in which the associated write data is to be written (e.g., information on an address of 2 MB area from the head of the logical disk).
- a write data length 9 C is information on a length of the associated write data and is contained in an IO request. 9 A, 9 B and 9 C are all information contained in the write IO request.
- a write time 9 D is time information used to assure a copy order among consecutive write requests. The write time is handled differently according to the copy method and to whether or not it is given by the IO issuing source host 100 . The handling of the write time will be described later.
- a write data pointer 9 E is a pointer in the cache to the associated write data.
- a sub-controller transfer necessity bit 9 F is information indicating that the associated write data needs to be transferred to the sub-controller 2000 .
- the sub-controller transfer necessity bit 9 F is 0.
- the decision as to whether or not the write data transfer is necessary is made by checking a sub-logical disk setting for the entry in the sub-logical disk number table 1440 . That is, if a sub-logical disk is set, the associated necessity bit is set to “necessary”.
- An IO request 150 issued by the host 100 is received by an IO port 120 a in the main controller 1000 .
- the processor 1110 in the host adapter analyzes the IO request. If the request is a write request, the processor stores the write data in the cache memory (step 400 ). Next, the processor 1110 creates write data management information 1410 in the shared memory (step 410 ).
- the processor retrieves a write address from the IO request, stores it in the write data management information, and, if necessary, sets a timer value of the main controller as a write time and also makes appropriate setting on the write data pointer 9 F and the sub-controller transfer necessity bit 9 F (step 420 ).
- a timer in the host 100 may also be used.
- a processing completion is reported to the host 100 , the IO request source.
- the processor 1110 c of the host adapter 1100 c connected to the sub-controller through a communication channel refers to the write data management information 1410 in the shared memory 1400 , retrieves the write data management information 1410 whose write time is oldest and stores it in a memory 1120 c .
- the processor checks the logical disk number 9 A in the retrieved write data management information 1410 .
- the processor refers to the sub-logical disk number table 1440 in the shared memory and retrieves an entry in the table whose logical disk column value matches the logical disk number 9 A and saves it in the memory 1130 c (step 500 ).
- the processor 1110 c refers to the copy category column of the retrieved entry (step 510 ).
- step 510 finds that the copy operation is an asynchronous remote copy (step 520 , yes)
- the processor 1110 c checks a consistency assurance level column of the saved entry (step 530 ). If the consistency assurance level column has a “completely assured” level (step 540 , yes), the consistency group number to be used in the asynchronous remote copy is assigned a group number in a higher digit and 0 in a lower digit (step 560 ).
- step 580 the processing moves to asynchronous copy transmission processing (step 580 ).
- This processing itself is a normal copy operation by the main controller 1000 .
- step 510 finds that the copy method is not an asynchronous remote copy (step 520 , no), a synchronous copy transmission is performed (step 590 ). This processing also is a normal operation by the main controller.
- the copy operation in units of copy groups can be started upon completion of the “copy group generation procedure in controller”.
- the processor 1110 When the main controller 1000 receives a copy start command issued by the host 1000 , the processor 1110 is notified of the reception of the copy start command. The processor 1110 then refers to the copy group list 1420 , the sub-copy group list 1450 , the logical disk list 1430 and the sub-logical disk number table 1440 and starts copying to the sub-controller 2000 . As to a command for instructing a copy start issued by the host 100 , a detailed explanation will be given later.
- a procedure for additionally registering a sub-copy group with the copy group is performed.
- the additional registration can be achieved by performing the procedure shown in FIG. 9 . It is however noted that when the consistency assurance level specified by the copy group list 1420 is a completely assured level and if different copy categories are registered for different sub-copy groups in the same copy group, the consistency level is not assured.
- the host 100 issues a copy suspend command to the main controller 1000 .
- the main controller 1000 upon receiving the copy suspend command, initiates copy suspend processing.
- the copy suspend in units of copy groups changes its operation according to a content of the consistency assurance level specified by the copy group list 1420 . That is, when the consistency level is a “completely assured” level, the consistency of all logical disks registered with the copy group (the order of update to the sub-disk devices) is assured; when the consistency level is a “sub-group” level, the consistency at the sub-copy group level is assured; and when it is “unassured”, the copy suspend that does not assure the consistency is performed.
- the copy suspend with a “completely assured” consistency level is realized as follows.
- the copy suspend is realized by suspending the copy to the sub-controller 2000 of write data registered with the cache memory 1200 .
- the IO command from the host is first stored in the cache 1200 and then successively executed. That is, when a synchronous remote copy suspend command is received by the main controller 1000 , the processor 1110 that received the command stops the transfer of the write data in the cache 1200 to the copy processing. At the same time, the processor performs a copy suspend procedure on the logical disk in question in the copy group.
- the copy suspend procedure takes time because it is performed on a plurality of logical disks. But since, prior to the copy suspend procedure, a step is taken to stop the transfer of write data in the cache to the copy processing, there is no chance of the data moving to the copy processing. After the copy suspend procedure is temporarily halted, the step for stopping the transfer of write data in the cache to the copy processing is canceled.
- a copy suspend with a “sub-group” consistency level is realized as follows.
- the suspend operation is performed on all logical disks registered with the copy group.
- the suspend operation itself is executed by the processor 1110 in the host adapter that accepted the suspend command.
- a copy suspend with an “unassured” consistency level is realized as follows.
- the process is the same as that of the copy suspend with the sub-group consistency level for both the synchronous remote copy and the asynchronous remote copy.
- the unassured copy suspend has the same consistency assurance level as the sub-group assured copy suspend (i.e., the consistency of the volumes or storage areas to be copied on the sub-controller side are assured of the sub-copy group level).
- a difference between the unassured suspend and the sub-group assured suspend lies in the fault operation described later.
- the copy operation causes a shift in the processing even among logical disks in the same copy group.
- the copy operation state may differ from one logical disk to another.
- the main controller 1000 performs a status monitoring.
- the main controller monitors statuses of logical disks in units of sub-copy groups.
- the status monitoring is done, as shown in a copy status transition table of FIG. 12 , by writing in the status column of the sub-copy group list in the main controller 1000 a transition state (transition to steady state, transition to suspend and transition to freeze) when not all the logical disks are in the same state and a current state when all the logical disks are in the same state (freeze 650 , normal 660 , suspend 670 ).
- This writing operation is done by the processor 1110 c in the host adapter 1100 c connected to the sub-controller.
- the main controller 1000 collects the statuses of all sub-copy groups registered with the copy group and determines a “status” of the copy group.
- the process of determining the status of the copy group is the same as that of the sub-copy group.
- the “status” thus determined is written in the status column of the copy group list in the main controller.
- a sub-copy group number 3 has all its registered logical disks 4 , 9 (in 7 C of logical disk list) in a steady state and therefore the status of 6 F is also “steady”. Further, since 6 E and 6 F are all steady, the status of 5 C in the copy group list 1420 is “steady”.
- a fault operation during copy processing differs depending on the consistency assurance level specified in the copy group list 1420 . That is, in the case of “completely assured” level, all the volumes or storage areas registered with the copy group are frozen. In the case of “sub-group” assured level, the associated sub-group is suspended. In the case of “unassured” level, the associated logical disk is suspended.
- a fault operation with “completely assured” level is realized as follows. Since the consistency group is set in a range of copy groups, a fault freeze operation of asynchronous remote copy is realized by performing the conventional fault freeze operation for the asynchronous remote copy. This freeze processing itself is a normal operation by the main controller.
- a fault freeze operation of synchronous remote copy is realized by freezing write data registered with the cache 1200 . This is because in the synchronous remote copy the IO command from the host is first stored in the cache 1200 and then successively executed. That is, when a synchronous remote copy fault is detected by the main controller, the processor 1110 that detected the fault stops the transfer of the write data in the cache 1200 to the copy processing. At the same time the processor performs a procedure for fault freeze of copy processing on the associated logical disks in the copy group. After the procedure for fault freeze of copy is temporarily halted, the procedure for stopping the transfer of write data in the cache to the copy processing is canceled.
- a fault operation with “sub-group” assured level is realized as follows. Since the consistency group is set in a range of sub-copy groups, a fault suspend operation of asynchronous remote copy is realized by performing the conventional fault suspend operation for the asynchronous remote copy. This suspend processing itself is a normal operation by the main controller.
- a fault suspend operation is performed on faulted logical disk pairs registered with the copy group.
- the suspend operation itself is performed by the processor 1110 in the host adapter.
- Commands are defined as external interface of the controller for the host 100 to set and operate copy groups
- These commands can be classified largely into two kinds: a setting command and an operation command.
- the setting command is a command for the host 100 to set copy groups and sub-copy groups in the storage areas (volumes) for information management.
- the operation command is a command to operate the copy groups in the storage areas.
- FIG. 13A shows a format of the setting command.
- FIG. 13B shows a format of the operation command.
- the copy group generation/deletion command 600 shown in FIG. 13A there are a copy group generation/deletion command 600 shown in FIG. 13A and a sub-copy group registration/deregistration command 610 .
- the copy group generation/deletion command 600 and the sub-copy group registration/deregistration command 610 have different formats.
- An “op-code” is a field representing a content of specified operation.
- a “copy source volume information and copy destination volume information” is information to identify a disk device and its volume and includes controller ID and logical disk number.
- An “option” may specify, for example, a consistency assurance level. The option may have two or more specifications.
- the “op-code” field has a code representing “copy group generation”.
- “copy group number” is specified with “1” and “option” is specified with “sub-group” as a consistency assurance level.
- the “op-code” field is given a code representing “sub-copy group registration”.
- the “copy group number” is specified with “1”; the “sub-copy group number” is specified with “1”; the controller ID in the “copy source volume information” is specified with “controller B”; the logical disk number is specified with “1, 5, 7”; and the logical disk number in the “copy destination volume information” is specified with copy destination logical disk numbers to which data of copy source logical disk number “1, 5, 7” is to be copied.
- the “option” is specified with “asynchronous remote copy” as a copy category.
- the host ID can be retrieved from protocol information when a command is received.
- the main controller 1000 When the main controller 1000 receives a sub-copy group registration command from the host, it adds an entry to the sub-copy group list 1450 and sets a value. If there are two or more logical disk numbers in the “copy destination volume information”, entries are added to the logical disk list 1430 and values are set.
- the “logical disk” column in the sub-logical disk number table 1440 is specified with a logical disk number of the “copy source volume information” and the “sub-logical disk” column is specified with a logical disk number of the “copy destination volume information”.
- the main controller 1000 When the main controller 1000 receives a sub-copy group cancel command from the host, it deletes the associated entry from the sub-copy group list 1450 , the logical disk list 1430 and the sub-logical disk number table 1440 .
- the operation command 620 specifies its operation by specifying a copy group.
- “Option” field is specified with, for example, how uncopied data to volumes of sub-controller due to a suspend command is to be handled.
- the option may include two or more specifications. For instance, if a “copy start” command is entered in the “op-code” field, the copy is initiated for the specified copy group. If a “copy suspend” code is entered, the copy operation is temporarily stopped.
- the “copy group number” field is specified with “1” and therefore the copy is started for the copy group number 1 . Then, according to the configuration of FIG. 5 , the logical disks specified by the “logical disk list number/logical disk number” for the sub-copy group number 1 , 2 , 3 belonging to the copy group number 1 become the copy destination logical disks.
- logical disks 1 , 5 , 7 are the copy source logical disks; from the logical disk number of the sub-copy group number 2 , a logical disk 3 becomes the copy source logical disk; and from the logical disk number of the sub-copy group number 3 , a logical disk 11 becomes the copy source logical disk.
- the copy destination logical disks in the sub-controller 2000 that correspond to the copy source logical disks are determined from the sub-logical disk number table 1440 of FIG. 6 and the copy operation is started for the corresponding logical disks.
- Hosts 10 , 100 are identified by the software running on them.
- a host running software for managing the entire computer system (referred to as “system management software”) is called a system management host 10 .
- Hosts running application software are simply called hosts 100 a , 100 b.
- the hosts 100 have software such as storage control software 180 , an application 140 and an agent 160 .
- the storage control software 180 has a module to convert a user request into a command for the controller external interface and a module to execute the storage control program issued by the system management host.
- the agent 160 has a module to operate software on the host 100 according to an instruction from system management software 15 running on the system management host 10 .
- the system management host 10 has software such as system management software 15 .
- the system management software 15 has a module to manage all elements (hosts, main controller) in the computer system. To manage all the elements in the computer system, the system management host is connected to the hosts and the main controller through a communication channel 17 .
- the system management software running on the system management host retrieves from the main controller information on all logical disks in the main controller. It also retrieves from individual hosts information on storage areas under the control of each host and all copy groups and sub-copy groups. Information on logical disks in the sub-controller may be retrieved as follows.
- the system management host 10 issues an instruction to the main controller which in turn communicates with the sub-controller to retrieve the logical disk information.
- the communication channel 17 may be extended not only to the main controller but also to the sub-controller so that the system management host 10 can directly retrieve the information from the sub-controller through the communication channel 17 . Based on these information, the relation among copy groups, sub-copy groups, and volumes and logical disks in each host is built.
- a copy program is created according to a policy dictated by the user.
- policy refers, for instance, to performing a disaster recovery copy at particular time intervals.
- the program may be created directly by the user.
- the program thus generated is sent by the system management software through the agent 160 to a particular host for storing.
- the host that received the program uses an instruction from the agent as a trigger to execute the program.
- the execution of the program mainly acts on the storage control software.
- the storage control software according to the instruction of the program, issues a copy command to the main controller through the external interface.
- the agent links with the application and performs a quiesce procedure. After this procedure is complete, the agent returns a completion response to the system management software.
- the system management software also needs to establish a link with the storage control software for controlling the storage system. This is done to ensure that the copy is performed at an appropriate timing and that when the copy is finished, the control can be transferred to other storage control software.
- the system management software uses the returned completion response as a trigger to issue a command for starting other IO processing, as required, to the agent of the host storing the program. According to the command, the agent issues instruction for starting other IO processing to the storage control software or directly to the program.
- the above embodiment allows any host computer to perform a global backup operation on any arbitrary or entire storage areas in the storage system.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A computer system having a plurality of host computers and a storage system is provided which allows any one host computer to perform a global copy operation on any arbitrary or all storage areas in the storage system. To this end, storage areas provided by the disk devices are grouped into groups by allocating group numbers to a plurality of specified storage areas. The copy operation can be performed by specifying desired groups. Each of the groups is made up of sub-groups and the sub-groups are defined for each computer to assure a consistency of copy order of the sub-groups.
Description
- This is a continuation application of U.S. Ser. No. 11/003,613, filed Dec. 6, 2004, now allowed, the content of which is hereby incorporated by reference into this application.
- The present application claims priority from Japanese application JP2004-003898 filed on Jan. 9, 2004, the content of which is hereby incorporated by reference into this application.
- A technology disclosed in this patent application relates to a storage system and a method for controlling the storage system and more particularly to a storage system and a method for controlling the storage system well suited for copy processing designed for disaster recovery in a large-scale system having a plurality of computers and a plurality of storage devices.
- As volumes of data have been growing, the number of host computers in a computer system and the capacity of a storage system are on the rise. A plurality of host computers are often linked together to process a large volume of data.
- Further, as business functions increase their dependency on an information processing system and damages that can result from data loss become ever more serious, the disaster recovery of data assumes an ever growing importance.
- When a disaster recovery is implemented on a computer system using conventional technologies. Each host computer has conventionally copied data stored in local storage areas under its control.
- Copy functions used in large-scale system are described in detail in “IBM TotalStorage Enterprise Storage Server Implementing ESS Copy Services with IBM eServer zSeries”.
- In a computer system in which a plurality of host computers cooperate with one another, when it is attempted to collectively copy all data stored in storage areas in a storage system controlled by the host computers, the storage areas in which the individual host computers can perform the copy function are limited to those storage areas under the control of the local host computer. This is because one host computer cannot handle the storage areas controlled by other host computers.
- The present invention has been accomplished to solve the above problem. One aspect of this invention provides a computer system having a plurality of host computers and a storage system, in which one host computer is capable of collectively performing a copy operation on any desired or all storage areas in the storage system.
- That is, in the storage system a plurality of storage areas provided by disk devices are divided into groups in advance for definition so that a copy operation can be done by specifying a desired group.
- Each group is a set of sub-groups, each of which is defined for one host computer.
- An update consistency is guaranteed for each group and for each sub-group. Other objects, features and advantages of this invention will become apparent from the description of this specification and the attached drawings.
-
FIG. 1 is a diagram showing a configuration of a computer system using a storage system of one embodiment. -
FIG. 2 is a table showing a copy group list. -
FIG. 3 is a table showing a sub-copy group list. -
FIG. 4 is a table showing a logical disk list. -
FIG. 5 illustrates a relation among the copy group list, the sub-copy group list and the logical disk list. -
FIG. 6 is a sub-logical disk number table. -
FIG. 7 is a table showing write data management information. -
FIG. 8 is a flow chart showing a copy group generation procedure. -
FIG. 9 is a flow chart showing a sub-copy group generation procedure. -
FIG. 10 is a flow chart showing operations of a main controller and a sub-controller during a copy process. -
FIG. 11 is a flow chart showing a procedure for determining a copy method. -
FIG. 12 illustrates a status transition during the copy process. -
FIG. 13A shows types of setting commands. -
FIG. 13B shows a type of operation command. - One embodiment of this invention will be described by referring to
FIG. 1 toFIG. 13 . - First, referring to
FIG. 1 , a configuration of a computer system using a storage system of this embodiment will be explained. -
FIG. 1 shows a configuration of a computer system using the storage system of this embodiment. - The computer system comprises a plurality of
hosts 10, 100 (100 a, 100 b), amain controller 1000, disk devices 1600 (1600 a, 1600 b) connected to themain controller 1000, asub-controller 2000, and disk devices 2600 (2600 c, 2600 d) connected to thesub-controller 2000. - The
main controller 1000 and thesub-controller 2000 may each be single or two or more in number. The number of disk devices connected to these controllers likewise may be one or two or more. - In this specification, a storage system including at least one of the storage controllers and the disk devices is referred to as a storage system. For example, a storage system comprises the
main controller 1000 and the disk devices 1600 (1600 a, 1600 b), another storage system comprises thesub-controller 2000 and the disk devices 2600 (2600 c, 2600 d) inFIG. 1 . - The
main controller 1000 is connected to thehost 10 and thehosts main controller 1000 to thesub-controller 2000 for disaster recovery will be explained. - The
main controller 1000 has a sharedmemory 1400, acache memory 1200, acrossbar switch 1300, host adapters (port adapters) 1100 (1100 a, 1100 b, 1100 c) and disk adapters 1500 (1500 a, 1500 b). - The shared
memory 1400, thecache memory 1200, the host adapters 1100 (1100 a, 1100 b, 1100 c) and the disk adapters 1500 (1500 a, 1500 b) are interconnected through thecrossbar switch 1300. - The disk adapters 1500 are connected to the disk devices 1600 through ports 1530. The disk adapters manage data in the disk devices and transfer data to other devices as required.
- The host adapters 1100 have a processor 1110, a memory 1130 and an IO port 1120. The host adapters receive an IO request from a host and perform an operation of remote copy to the
sub-controller 2000 as required. - The
sub-controller 2000, like themain controller 1000, has a sharedmemory 2400, acache memory 2200, acrossbar switch 2300, ahost adapter 2100 and disk adapters 2500 (2500 a, 2500 b). - The hosts 100 have a
processor 120, amemory 130 and anIO port 110. Though not shown, the processor, memory and IO port are interconnected through a communication path such as internal bus. Operating systems (OS's) running on individual hosts may differ from one another and IO communication protocols between the hosts and controllers may also differ. Though not shown, thehost 10 similarly has a processor, a memory and an IO port, all interconnected through a communication path such as internal bus. - Here, a procedure for generating copy groups and sub-copy groups in the
main controller 1000 will be described. - First, a concept of copy groups and sub-copy groups introduced in this embodiment will be explained.
- This embodiment enables a plurality of storage areas on the
main controller 1000 handled by a plurality of hosts 100 to be copied in a single operation. The storage areas are represented in different ways in different systems but in this embodiment they are treated as logical disk devices. The logical disk devices (or simply referred to as “logical disks”) are a logical storage area made up of a single or two or more disk devices. More precisely, each of the logical disks may be defined as all or a part of storage areas in one disk device or as a set of (a part or all of) storage areas in individual disk devices. - To realize this copy operation, the main controller manages and operates the logical disk devices using “copy groups” and “sub-copy groups.”
- The “copy group” is a group of storage areas to be processed by a global copy operation and defined as a set of sub-copy groups. The “sub-copy group” refers to those among the storage areas to be processed by the global copy which are specified by individual hosts as an object to be copied.
- A copy group is specified by a system administrator specifying storage areas he or she wants copied. For example, a copy group may include storage areas that are handled as a charging unit, a set of storage areas that are divided so as to have an appropriate volume of data for a single copy operation, or storage areas classified by a management section in charge.
- The
main controller 1000 manages the copy groups and the sub-copy groups by using acopy group list 1420, asub-copy group list 1450 and alogical disk list 1430. These three lists reside on the sharedmemory 1400 in themain controller 1000. - Referring to
FIG. 2 toFIG. 5 , these lists will be explained in detail. -
FIG. 2 shows a copy group list. -
FIG. 3 shows a sub-copy group list. -
FIG. 4 shows a logical disk list. -
FIG. 5 shows a relation among the copy group list, the sub-copy group list and the logical disk list. - As shown in
FIG. 2 , the copy group list is a list of all copy groups defined by themain controller 1000. The copy group list has information on a copy group number, a consistency assurance level, a sub-group list pointer, and a status. - The “copy group number” is a number that uniquely identifies a copy group of interest.
- The “consistency assurance level” is a criterion that defines a copy operation performed during a copy process and in the event of a fault. The consistency means that data in the storage devices are updated in the same order as the data arrives from a host. When the consistency assurance level is “completely assured”, the consistency (an order in which data is updated to disk devices connected to the sub-controller 2000) is assured for all logical disks registered with a copy group. When the consistency assurance level is “sub-group”, the consistency is assured at the sub-copy group level. When it is “unassured”, the consistency is not assured.
- The “sub-group list pointer” indicates an address of the sub-group list in the shared memory. The “status” indicates a current state of the copy group. The consistency assurance level and the status will be described later in more detail.
- The sub-copy group list, as shown in
FIG. 3 , is a list of sub-copy groups making up a copy group. - There is a sub-copy group list for each copy group. That is, in the case of
FIG. 2 , the copy group list has three entries. This means that there are three sub-copy group lists. - The sub-copy group list has information on a sub-copy group number, a host ID, a copy category, a presence/absence of logical disk list, a logical disk list number/logical disk number, and a status.
- The “sub-copy group number” is a number that uniquely identifies a sub-copy group of interest.
- The “host ID” is information by which the
main controller 1000 and the sub-controller 2000 can uniquely identify the host 100. The “copy category” represents a kind of copy function, such as asynchronous remote copy and synchronous remote copy. - The “asynchronous remote copy” is a copy procedure by which, in response to a copy IO command from a host, the
main controller 1000 reports an end of the associated IO operation without waiting for the copy to be finished. - The “synchronous remote copy” is a copy procedure by which, in response to each copy IO command from a host, the
main controller 1000 confirms that the associated copy operation has been performed on the sub-controller 2000 before reporting an end of the IO operation. - The “availability of logical disk list” indicates whether a sub-copy group of interest in the main controller is made up of multiple logical disks and represented as a list. If “available” is entered in this column, this indicates that the sub-copy group is represented by a logical disk list; and if “not available” is entered, this indicates that the sub-copy group is represented by a single logical disk.
- The sub-copy group of this embodiment is introduced so that, when the copy category is asynchronous remote copy, the consistency of the update order in which a plurality of logical disks are copied can be assured and therefore a fault freeze also assured.
- Thus, when the copy category is synchronous remote copy, it is assumed that the value of the availability of logical disk list is “not available” and that the sub-copy group is made up of a single logical disk.
- The “logical disk list number/logical disk number” represents a logical disk list sub-group number or a logical disk number. The time this information represents a logical disk list number is when the value of the availability of logical disk list is “available.” When it refers to a logical disk number, the value of the presence/absence of logical disk list must be “not available.” Here, the logical disk number means each of serial numbers assigned to logical disks of a fixed size handled by the controller as control units. The storage areas in the controller are handled as a set of logical disks and are each assigned a logical disk number.
- The storage areas handled by a host may or may not be of a size equal to the associated logical disks. The status represents a current state of a sub-copy group. The detail of the status will be described later.
- The logical disk list of
FIG. 4 shows logical disks for each sub-copy group in the form of a list. One such logical disk list is allocated to each of those sub-copy groups handled by the copy function of the main controller whose logical disk list availability is “available”. The logical disk list shows a logical disk configuration in a sub-copy group. Anentry 7A in the logical disk list, for example, shows that a sub-copy group with sub-copy group number “1” is made up of threelogical disks - These three lists are related to one another as shown in
FIG. 5 . -
FIG. 5 shows an example case where there are three copy groups in the main controller. The copy group list has three registered copy groups.Entries - Next, by referring to
FIG. 6 ,FIG. 8 andFIG. 9 , the procedure for generating copy groups and sub-copy groups will be explained. -
FIG. 6 shows a sub-logical disk number table. -
FIG. 8 is a flow chart showing a copy group generation procedure. -
FIG. 9 is a flow chart showing a sub-copy group generation procedure. - The procedure begins with generating copy groups.
- When the main controller receives a copy group generation command issued by the host 100, the IO port 1120 in the host adapter 1100 accepts the copy group generation command and informs the processor 1110 that it has received the copy group generation command. The command issued by the host 100 to instruct the copy group generation will be detailed later.
- The processor checks if a
copy group list 1420 exists in the sharedmemory 1400. If the copy group list is found not present (step 210, no), the processor generates a copy group list (step 220). - Next, the processor adds a new entry to the copy group list (step 230). The status column for the new entry is set to “suspended”. After
step 230, the processor generates a message to indicate that the instruction has successfully been completed and returns it to the host 100, a source of the instruction (step 235). - Next, sub-copy groups are generated.
- When the main controller receives a sub-copy group registration command issued by the host 100, the IO port 1120 in the host adapter 1100 accepts the sub-copy group registration command and informs the processor 1110 that it has accepted the sub-copy group registration command. A command issued by the host 100 to instruct the sub-copy group registration will be detailed later.
- The processor checks a copy group number to see if a copy group required by the sub-copy group registration command to be registered exists in entries in the
copy group list 1420 in the sharedmemory 1400. If the entry of interest is found not present in the copy group list, the processor generates an error message indicating that the copy group does not exist in the list and returns it to the source of registration command (step 255). If the entry of interest is found to exist in the copy group list (step 250, yes), a check is made as to whether the specified sub-copy group list exists in the shared memory. This check is based on a presence or absence of a value in a pointer column in the sub-copy group list at the entry in the copy group list. - If the sub-copy group list does not exist in the shared memory (
step 260, no) the processor generates a sub-copy group list (step 270). - If the sub-copy group list exists in the shared memory (
step 260, yes), the processor adds an entry to the sub-copy group list according to the content of the registration command (step 280). After the entry has been added to the sub-copy group list, if there are two or more logical disks required by the registration command to be copied (step 290, yes), a check is made as to whether alogical disk list 1430 exists in the shared memory. If the logical disk list is found not to exist (step 300, no), the processor creates the logical disk list (step 310). - When the logical disk list is found to exist, the processor creates or updates its entries according to the content of the registration command (step 320).
- After
step 320, entries in the sub-logical disk number table 1440 are updated (step 330). - The sub-logical disk number table 1440, as shown in
FIG. 6 , is a table that contains information on logical disks in the copy destination sub-controller that match all the logical disks in the controller. By referring to the sub-logical disk number table 1440, it can be determined which logical disk in themain controller 1000 should be copied to which disk in thesub-controller 2000. Thus, this table resides on the controller at all times. For the logical disks that are not covered by the copy operation, the associated entries have “none” in the copy destination controller ID column and in the copy destination logical disk column. - The copy category and the consistency assurance level may be redundantly entered in the sub-logical disk number table for faster access, although this is not an essential step because these information is contained in the
copy group list 1420 and thesub-copy group list 1450. - The copy group number and the sub-copy group number are used to determine a present state of a fault from the
copy group list 1420 and thesub-copy group list 1450. - As a final step, the processor writes in the sub-copy group list pointer of the entry in the copy group list an address where the sub-copy group list is to be stored, creates a message that the registration instruction from the host is successfully completed and returns it to the source of the registration instruction (step 340). After the message has been sent, the copy operation can be initiated for the storage areas specified by the group.
- Here, referring to
FIG. 7 andFIG. 10 toFIG. 12 , the copy operation in thecontroller 1000 will be explained for a normal operation and for an abnormal operation. -
FIG. 7 shows a table of write data management information. -
FIG. 10 is a flow chart showing a sequence of steps performed by the main and sub-controllers during the copy operation. -
FIG. 11 is a flow chart showing a procedure to determine a copy method. -
FIG. 12 is a status transition table for a copy operation. - (1) Operation during Copy Processing
- With the above “copy group generation procedure in controller” complete, the copy operation for each copy group can be initiated.
- Now, a sequence of steps performed by the main controller and the sub-controller during the copy operation will be explained.
- First, let us explain, by referring to
FIG. 7 , about writedata management information main controller 1000 and the sub-controller 2000. - The write
data management information - A
write address 9B is information about an address in logical disk in which the associated write data is to be written (e.g., information on an address of 2 MB area from the head of the logical disk). Awrite data length 9C is information on a length of the associated write data and is contained in an IO request. 9A, 9B and 9C are all information contained in the write IO request. Awrite time 9D is time information used to assure a copy order among consecutive write requests. The write time is handled differently according to the copy method and to whether or not it is given by the IO issuing source host 100. The handling of the write time will be described later. Awrite data pointer 9E is a pointer in the cache to the associated write data. A sub-controllertransfer necessity bit 9F is information indicating that the associated write data needs to be transferred to thesub-controller 2000. In writedata management information 2410 in the sub-controller 2000, the sub-controllertransfer necessity bit 9F is 0. The decision as to whether or not the write data transfer is necessary is made by checking a sub-logical disk setting for the entry in the sub-logical disk number table 1440. That is, if a sub-logical disk is set, the associated necessity bit is set to “necessary”. - Next, a sequence of steps performed during the copy operation will be explained by referring to
FIG. 10 . - An
IO request 150 issued by the host 100 is received by an IO port 120 a in themain controller 1000. Upon receipt of the IO request, the processor 1110 in the host adapter analyzes the IO request. If the request is a write request, the processor stores the write data in the cache memory (step 400). Next, the processor 1110 creates writedata management information 1410 in the shared memory (step 410). - Further, the processor retrieves a write address from the IO request, stores it in the write data management information, and, if necessary, sets a timer value of the main controller as a write time and also makes appropriate setting on the
write data pointer 9F and the sub-controllertransfer necessity bit 9F (step 420). - While in this example the write time uses a timer in the main controller, a timer in the host 100 may also be used. As a last step, a processing completion is reported to the host 100, the IO request source.
- Next, a procedure up to the initiation of a copy transmission by the main controller will be explained. When the transmission procedure is executed by the
main controller 1000, a decision needs to be made first as to which copy method is used. - First, the
processor 1110 c of the host adapter 1100 c connected to the sub-controller through a communication channel refers to the writedata management information 1410 in the sharedmemory 1400, retrieves the writedata management information 1410 whose write time is oldest and stores it in amemory 1120 c. The processor then checks thelogical disk number 9A in the retrieved writedata management information 1410. Based on the retrievedlogical disk number 9A, the processor refers to the sub-logical disk number table 1440 in the shared memory and retrieves an entry in the table whose logical disk column value matches thelogical disk number 9A and saves it in the memory 1130 c (step 500). Theprocessor 1110 c refers to the copy category column of the retrieved entry (step 510). If thestep 510 finds that the copy operation is an asynchronous remote copy (step 520, yes), theprocessor 1110 c checks a consistency assurance level column of the saved entry (step 530). If the consistency assurance level column has a “completely assured” level (step 540, yes), the consistency group number to be used in the asynchronous remote copy is assigned a group number in a higher digit and 0 in a lower digit (step 560). - If the consistency assurance level column has a “sub-group” level (
step 550, yes), the consistency group number is assigned 0 in a lower digit and a sub-group number in a lower digit (step 570). Here, the consistency group represents a range in which a copy order is assured for an asynchronous remote copy from the main controller to the sub-controller. That is, in the operation ofstep 560 the update order is assured in units of copy groups and, in the operation ofstep 570, the update order is assured in units of sub-copy groups. The information on consistency group number is written in each frame of data transmitted from the main controller to the sub-controller, and the sub-controller checks the number of each frame received to assure the update order of data being copied. - After
step 560 or step 570, or when the assurance level is a “unassured” level, the processing moves to asynchronous copy transmission processing (step 580). This processing itself is a normal copy operation by themain controller 1000. - If
step 510 finds that the copy method is not an asynchronous remote copy (step 520, no), a synchronous copy transmission is performed (step 590). This processing also is a normal operation by the main controller. - The copy operation in units of copy groups can be started upon completion of the “copy group generation procedure in controller”.
- When the
main controller 1000 receives a copy start command issued by thehost 1000, the processor 1110 is notified of the reception of the copy start command. The processor 1110 then refers to thecopy group list 1420, thesub-copy group list 1450, thelogical disk list 1430 and the sub-logical disk number table 1440 and starts copying to thesub-controller 2000. As to a command for instructing a copy start issued by the host 100, a detailed explanation will be given later. - Whenever it is desired to add a sub-copy group to the copy group, a procedure for additionally registering a sub-copy group with the copy group is performed. The additional registration can be achieved by performing the procedure shown in
FIG. 9 . It is however noted that when the consistency assurance level specified by thecopy group list 1420 is a completely assured level and if different copy categories are registered for different sub-copy groups in the same copy group, the consistency level is not assured. - (3) Operation during Copy Suspend
- To start a copy suspend, the host 100 issues a copy suspend command to the
main controller 1000. Themain controller 1000, upon receiving the copy suspend command, initiates copy suspend processing. - The copy suspend in units of copy groups changes its operation according to a content of the consistency assurance level specified by the
copy group list 1420. That is, when the consistency level is a “completely assured” level, the consistency of all logical disks registered with the copy group (the order of update to the sub-disk devices) is assured; when the consistency level is a “sub-group” level, the consistency at the sub-copy group level is assured; and when it is “unassured”, the copy suspend that does not assure the consistency is performed. - The copy suspend with a “completely assured” consistency level is realized as follows.
- In the case of the asynchronous remote copy suspend, since the consistency group is set in a range of copy groups as described above, the consistency at the copy group level is assured by performing the conventional suspend operation on the asynchronous remote copy. This suspend operation itself is a normal operation by the
main controller 1000. - In the case of the synchronous remote copy, the copy suspend is realized by suspending the copy to the
sub-controller 2000 of write data registered with thecache memory 1200. This is because in the case of the synchronous remote copy, the IO command from the host is first stored in thecache 1200 and then successively executed. That is, when a synchronous remote copy suspend command is received by themain controller 1000, the processor 1110 that received the command stops the transfer of the write data in thecache 1200 to the copy processing. At the same time, the processor performs a copy suspend procedure on the logical disk in question in the copy group. - The copy suspend procedure takes time because it is performed on a plurality of logical disks. But since, prior to the copy suspend procedure, a step is taken to stop the transfer of write data in the cache to the copy processing, there is no chance of the data moving to the copy processing. After the copy suspend procedure is temporarily halted, the step for stopping the transfer of write data in the cache to the copy processing is canceled.
- A copy suspend with a “sub-group” consistency level is realized as follows.
- In the case of the asynchronous remote copy suspend, since the consistency group is set in a range of sub-copy groups as described above, the consistency at the sub-copy group level is assured by performing the conventional suspend operation on the asynchronous remote copy for each sub-copy group. This suspend operation itself is a normal operation by the
main controller 1000. - In the case of the synchronous remote copy, since the sub-copy group is always set with a single logical disk, the suspend operation is performed on all logical disks registered with the copy group. The suspend operation itself is executed by the processor 1110 in the host adapter that accepted the suspend command.
- A copy suspend with an “unassured” consistency level is realized as follows. In the case of the unassured consistency level, the process is the same as that of the copy suspend with the sub-group consistency level for both the synchronous remote copy and the asynchronous remote copy. As a result, the unassured copy suspend has the same consistency assurance level as the sub-group assured copy suspend (i.e., the consistency of the volumes or storage areas to be copied on the sub-controller side are assured of the sub-copy group level). A difference between the unassured suspend and the sub-group assured suspend lies in the fault operation described later.
- The copy operation causes a shift in the processing even among logical disks in the same copy group. Thus, the copy operation state may differ from one logical disk to another. To manage different states of logical disks in the copy group, the
main controller 1000 performs a status monitoring. - Now, a copy group status management will be explained.
- The main controller monitors statuses of logical disks in units of sub-copy groups. The status monitoring is done, as shown in a copy status transition table of
FIG. 12 , by writing in the status column of the sub-copy group list in the main controller 1000 a transition state (transition to steady state, transition to suspend and transition to freeze) when not all the logical disks are in the same state and a current state when all the logical disks are in the same state (freeze 650, normal 660, suspend 670). This writing operation is done by theprocessor 1110 c in the host adapter 1100 c connected to the sub-controller. Next, themain controller 1000 collects the statuses of all sub-copy groups registered with the copy group and determines a “status” of the copy group. The process of determining the status of the copy group is the same as that of the sub-copy group. The “status” thus determined is written in the status column of the copy group list in the main controller. - Referring to
FIG. 5 , an example procedure for determining the status is described as follows. - Looking at 6F in the sub-copy group list, a
sub-copy group number 3 has all its registeredlogical disks 4, 9 (in 7C of logical disk list) in a steady state and therefore the status of 6F is also “steady”. Further, since 6E and 6F are all steady, the status of 5C in thecopy group list 1420 is “steady”. - When a status of the copy group is notified as requested by the host 100, a status of the associated entry in the copy group list is used.
- A fault operation during copy processing differs depending on the consistency assurance level specified in the
copy group list 1420. That is, in the case of “completely assured” level, all the volumes or storage areas registered with the copy group are frozen. In the case of “sub-group” assured level, the associated sub-group is suspended. In the case of “unassured” level, the associated logical disk is suspended. - A fault operation with “completely assured” level is realized as follows. Since the consistency group is set in a range of copy groups, a fault freeze operation of asynchronous remote copy is realized by performing the conventional fault freeze operation for the asynchronous remote copy. This freeze processing itself is a normal operation by the main controller.
- A fault freeze operation of synchronous remote copy is realized by freezing write data registered with the
cache 1200. This is because in the synchronous remote copy the IO command from the host is first stored in thecache 1200 and then successively executed. That is, when a synchronous remote copy fault is detected by the main controller, the processor 1110 that detected the fault stops the transfer of the write data in thecache 1200 to the copy processing. At the same time the processor performs a procedure for fault freeze of copy processing on the associated logical disks in the copy group. After the procedure for fault freeze of copy is temporarily halted, the procedure for stopping the transfer of write data in the cache to the copy processing is canceled. - A fault operation with “sub-group” assured level is realized as follows. Since the consistency group is set in a range of sub-copy groups, a fault suspend operation of asynchronous remote copy is realized by performing the conventional fault suspend operation for the asynchronous remote copy. This suspend processing itself is a normal operation by the main controller.
- In the case of synchronous remote copy, since the sub-copy group is always set with a single logical disk, a fault suspend operation is performed on faulted logical disk pairs registered with the copy group. The suspend operation itself is performed by the processor 1110 in the host adapter.
- A fault operation with “unassured” level is realized as follows. In the case of synchronous remote copy, the procedure is the same as that for the sub-group assured level. In the case of asynchronous remote copy, a suspend command is issued to the failed logical disk of the sub-copy group. To realized this it is necessary to specify ignoring the consistency assurance of the consistency group when creating the sub-copy group.
- 3. Link between Controller External Interface and System Management Host
- Commands are defined as external interface of the controller for the host 100 to set and operate copy groups
- These commands can be classified largely into two kinds: a setting command and an operation command.
- The setting command is a command for the host 100 to set copy groups and sub-copy groups in the storage areas (volumes) for information management. The operation command is a command to operate the copy groups in the storage areas.
- These commands will be explained by referring to
FIGS. 13A and 13B . -
FIG. 13A shows a format of the setting command. -
FIG. 13B shows a format of the operation command. - Among the setting commands there are a copy group generation/
deletion command 600 shown inFIG. 13A and a sub-copy group registration/deregistration command 610. The copy group generation/deletion command 600 and the sub-copy group registration/deregistration command 610 have different formats. - An “op-code” is a field representing a content of specified operation. A “copy source volume information and copy destination volume information” is information to identify a disk device and its volume and includes controller ID and logical disk number. An “option” may specify, for example, a consistency assurance level. The option may have two or more specifications.
- When generating a copy group, for example, the “op-code” field has a code representing “copy group generation”. In the case of 5A in the
copy group list 1420 ofFIG. 2 , “copy group number” is specified with “1” and “option” is specified with “sub-group” as a consistency assurance level. - When the host issues a copy group generation command, an entry is added to the
copy group list 1420 in the sharedmemory 1400 of themain controller 1000. - Conversely, when the host issues a copy group deletion command, the entry in the
copy group list 1420 that corresponds to the “copy group number” is deleted. - For the sub-copy group registration, the “op-code” field is given a code representing “sub-copy group registration”. In the case of 6A in the
sub-copy group list 1450 ofFIG. 3 , the “copy group number” is specified with “1”; the “sub-copy group number” is specified with “1”; the controller ID in the “copy source volume information” is specified with “controller B”; the logical disk number is specified with “1, 5, 7”; and the logical disk number in the “copy destination volume information” is specified with copy destination logical disk numbers to which data of copy source logical disk number “1, 5, 7” is to be copied. The “option” is specified with “asynchronous remote copy” as a copy category. - The host ID can be retrieved from protocol information when a command is received.
- When the
main controller 1000 receives a sub-copy group registration command from the host, it adds an entry to thesub-copy group list 1450 and sets a value. If there are two or more logical disk numbers in the “copy destination volume information”, entries are added to thelogical disk list 1430 and values are set. - Then, an entry is added to the sub-logical disk number table 1440 and a value is set. The “logical disk” column in the sub-logical disk number table 1440 is specified with a logical disk number of the “copy source volume information” and the “sub-logical disk” column is specified with a logical disk number of the “copy destination volume information”.
- When the
main controller 1000 receives a sub-copy group cancel command from the host, it deletes the associated entry from thesub-copy group list 1450, thelogical disk list 1430 and the sub-logical disk number table 1440. - The
operation command 620 specifies its operation by specifying a copy group. “Option” field is specified with, for example, how uncopied data to volumes of sub-controller due to a suspend command is to be handled. The option may include two or more specifications. For instance, if a “copy start” command is entered in the “op-code” field, the copy is initiated for the specified copy group. If a “copy suspend” code is entered, the copy operation is temporarily stopped. - In the example of 5A in the
copy group list 1420 ofFIG. 5 , the “copy group number” field is specified with “1” and therefore the copy is started for thecopy group number 1. Then, according to the configuration ofFIG. 5 , the logical disks specified by the “logical disk list number/logical disk number” for thesub-copy group number copy group number 1 become the copy destination logical disks. - In this example, from the
logical disk list 1 of thesub-copy group number 1, it is seen thatlogical disks sub-copy group number 2, alogical disk 3 becomes the copy source logical disk; and from the logical disk number of thesub-copy group number 3, alogical disk 11 becomes the copy source logical disk. - The copy destination logical disks in the sub-controller 2000 that correspond to the copy source logical disks are determined from the sub-logical disk number table 1440 of
FIG. 6 and the copy operation is started for the corresponding logical disks. - 3.2 Link with System Management Host
-
Hosts 10, 100 are identified by the software running on them. A host running software for managing the entire computer system (referred to as “system management software”) is called asystem management host 10. Hosts running application software are simply calledhosts - Now, how the system management host and the hosts establish a link with the controller will be explained by referring to
FIG. 1 . - The hosts 100 have software such as
storage control software 180, anapplication 140 and anagent 160. - The
storage control software 180 has a module to convert a user request into a command for the controller external interface and a module to execute the storage control program issued by the system management host. Theagent 160 has a module to operate software on the host 100 according to an instruction fromsystem management software 15 running on thesystem management host 10. Thesystem management host 10 has software such assystem management software 15. Thesystem management software 15 has a module to manage all elements (hosts, main controller) in the computer system. To manage all the elements in the computer system, the system management host is connected to the hosts and the main controller through acommunication channel 17. - The copy operation by the main controller and the sub-controller is performed as follows.
- First, the system management software running on the system management host retrieves from the main controller information on all logical disks in the main controller. It also retrieves from individual hosts information on storage areas under the control of each host and all copy groups and sub-copy groups. Information on logical disks in the sub-controller may be retrieved as follows. The
system management host 10 issues an instruction to the main controller which in turn communicates with the sub-controller to retrieve the logical disk information. Or thecommunication channel 17 may be extended not only to the main controller but also to the sub-controller so that thesystem management host 10 can directly retrieve the information from the sub-controller through thecommunication channel 17. Based on these information, the relation among copy groups, sub-copy groups, and volumes and logical disks in each host is built. Based on this relation thus built, a copy program is created according to a policy dictated by the user. The word “policy” as used here refers, for instance, to performing a disaster recovery copy at particular time intervals. The program may be created directly by the user. The program thus generated is sent by the system management software through theagent 160 to a particular host for storing. The host that received the program uses an instruction from the agent as a trigger to execute the program. The execution of the program mainly acts on the storage control software. The storage control software, according to the instruction of the program, issues a copy command to the main controller through the external interface. - In performing copy, there are times when the updating of data used by the application on each host needs to be halted. The system management software therefore establishes a link with the application on each host and issues at an appropriate timing an application quiesce command to the agent on the host.
- The agent, according to the command, links with the application and performs a quiesce procedure. After this procedure is complete, the agent returns a completion response to the system management software.
- The system management software also needs to establish a link with the storage control software for controlling the storage system. This is done to ensure that the copy is performed at an appropriate timing and that when the copy is finished, the control can be transferred to other storage control software.
- The system management software uses the returned completion response as a trigger to issue a command for starting other IO processing, as required, to the agent of the host storing the program. According to the command, the agent issues instruction for starting other IO processing to the storage control software or directly to the program.
- In a computer system having a plurality of host computers and a storage system, the above embodiment allows any host computer to perform a global backup operation on any arbitrary or entire storage areas in the storage system.
- It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Claims (4)
1. A computer system comprising:
a first storage apparatus providing a plurality of first volumes;
a second storage apparatus coupled to the first storage apparatus and providing a plurality of second volumes storing copy data of the plurality of first volumes by a synchronous remote copy;
a first host computer sending a first write request to the first storage apparatus; and
a second host computer sending a second write request to the first storage apparatus,
wherein the first host computer runs a first operating system and communicates with the first storage apparatus with a first protocol, and
wherein the second host computer runs a second operating system which is different to the first operating system and communicates with the second storage apparatus with a second protocol which is different to the first protocol.
2. A computer system according to claim 1 ,
wherein the first storage apparatus manages a plurality of pair between the plurality of first volumes and the plurality of second volumes, and
wherein the first storage apparatus manages a copy group including the plurality of pair.
3. A remote copy method for a computer system including a first storage system and a second storage system and a first computer and a second computer, comprising:
by the first storage apparatus, providing a plurality of first volumes;
by the second storage apparatus, providing a plurality of second volumes;
by the first host computer, running a first operating system;
by the second host computer, running a second operating system which is different to the first operating system;
by the first host computer, sending a first write request to the first storage apparatus by a first communication protocol;
by a second host computer, sending a second write request to the first storage apparatus by a second communication protocol which is different to the first communication protocol; and
by the first storage apparatus, sending the first write data and the second write data to the second storage apparatus by a synchronous remote copy.
4. A remote copy method according to claim 3 , comprising:
by the first storage apparatus, managing a plurality of pair status between the plurality of first volumes and the plurality of second volumes; and
by the first storage apparatus, managing a copy group status based on the plurality of pair status.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/431,385 US20090216976A1 (en) | 2004-01-09 | 2009-04-28 | Computer system allowing any computer to copy any storage area within a storage system |
US12/969,237 US8589642B2 (en) | 2004-01-09 | 2010-12-15 | Computer system duplicating writes by synchronous remote copy with multiple host computers using heterogeneous operating systems |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004003898A JP4629342B2 (en) | 2004-01-09 | 2004-01-09 | Storage apparatus and control method thereof |
JP2004-003898 | 2004-01-09 | ||
US11/003,613 US7543121B2 (en) | 2004-01-09 | 2004-12-06 | Computer system allowing any computer to copy any storage area within a storage system |
US12/431,385 US20090216976A1 (en) | 2004-01-09 | 2009-04-28 | Computer system allowing any computer to copy any storage area within a storage system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/003,613 Continuation US7543121B2 (en) | 2004-01-09 | 2004-12-06 | Computer system allowing any computer to copy any storage area within a storage system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/969,237 Division US8589642B2 (en) | 2004-01-09 | 2010-12-15 | Computer system duplicating writes by synchronous remote copy with multiple host computers using heterogeneous operating systems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20090216976A1 true US20090216976A1 (en) | 2009-08-27 |
Family
ID=34737171
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/003,613 Expired - Fee Related US7543121B2 (en) | 2004-01-09 | 2004-12-06 | Computer system allowing any computer to copy any storage area within a storage system |
US12/431,385 Abandoned US20090216976A1 (en) | 2004-01-09 | 2009-04-28 | Computer system allowing any computer to copy any storage area within a storage system |
US12/969,237 Expired - Fee Related US8589642B2 (en) | 2004-01-09 | 2010-12-15 | Computer system duplicating writes by synchronous remote copy with multiple host computers using heterogeneous operating systems |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/003,613 Expired - Fee Related US7543121B2 (en) | 2004-01-09 | 2004-12-06 | Computer system allowing any computer to copy any storage area within a storage system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/969,237 Expired - Fee Related US8589642B2 (en) | 2004-01-09 | 2010-12-15 | Computer system duplicating writes by synchronous remote copy with multiple host computers using heterogeneous operating systems |
Country Status (2)
Country | Link |
---|---|
US (3) | US7543121B2 (en) |
JP (1) | JP4629342B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070130432A1 (en) * | 2005-12-06 | 2007-06-07 | Nec Corporation | Storage system for copying data between storage devices, and method of copying data |
US20140082310A1 (en) * | 2012-09-14 | 2014-03-20 | Hitachi, Ltd. | Method and apparatus of storage tier and cache management |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4382602B2 (en) * | 2004-04-23 | 2009-12-16 | 株式会社日立製作所 | Remote copy system |
JP2007047892A (en) | 2005-08-08 | 2007-02-22 | Hitachi Ltd | Computer system and computer system state management method |
JP4835249B2 (en) | 2006-04-26 | 2011-12-14 | 株式会社日立製作所 | Storage system, remote copy, and management method |
US7747830B2 (en) * | 2007-01-05 | 2010-06-29 | Hitachi, Ltd. | Backup system with continuous data protection |
JP5008991B2 (en) | 2007-01-24 | 2012-08-22 | 株式会社日立製作所 | Apparatus and method for controlling data recovery |
JP2008299789A (en) * | 2007-06-04 | 2008-12-11 | Hitachi Ltd | Remote copy system and remote copy control method |
JP5137476B2 (en) | 2007-06-21 | 2013-02-06 | 株式会社日立製作所 | Computer and method for setting backup environment for data used by multiple applications operating in cooperation |
US7822892B2 (en) * | 2007-07-19 | 2010-10-26 | International Business Machines Corporation | Managing the copying of writes from primary storages to secondary storages across different networks |
JP5401041B2 (en) | 2008-02-21 | 2014-01-29 | 株式会社日立製作所 | Storage system and copy method |
US9203900B2 (en) * | 2011-09-23 | 2015-12-01 | Netapp, Inc. | Storage area network attached clustered storage system |
US9229829B2 (en) | 2012-07-25 | 2016-01-05 | GlobalFoundries, Inc. | Synchronous mode replication to multiple clusters |
US10210050B1 (en) * | 2013-12-23 | 2019-02-19 | EMC IP Holding Company LLC | Consistency group driven backup |
US9489132B2 (en) | 2014-10-07 | 2016-11-08 | Pure Storage, Inc. | Utilizing unmapped and unknown states in a replicated storage system |
CN108762686B (en) * | 2018-06-04 | 2021-01-01 | 平安科技(深圳)有限公司 | Data consistency check flow control method and device, electronic equipment and storage medium |
US11422751B2 (en) | 2019-07-18 | 2022-08-23 | Pure Storage, Inc. | Creating a virtual storage system |
US20230018773A1 (en) * | 2021-05-12 | 2023-01-19 | Pure Storage, Inc. | Using Replication To Create Storage Service Tiers |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5948062A (en) * | 1995-10-27 | 1999-09-07 | Emc Corporation | Network file server using a cached disk array storing a network file directory including file locking information and data mover computers each having file system software for shared read-write file access |
US5987506A (en) * | 1996-11-22 | 1999-11-16 | Mangosoft Corporation | Remote access and geographically distributed computers in a globally addressable storage environment |
US20020103943A1 (en) * | 2000-02-10 | 2002-08-01 | Horatio Lo | Distributed storage management platform architecture |
US6895485B1 (en) * | 2000-12-07 | 2005-05-17 | Lsi Logic Corporation | Configuring and monitoring data volumes in a consolidated storage array using one storage array to configure the other storage arrays |
US20050114465A1 (en) * | 2003-11-20 | 2005-05-26 | International Business Machines Corporation | Apparatus and method to control access to logical volumes using one or more copy services |
US6950915B2 (en) * | 2002-06-05 | 2005-09-27 | Hitachi, Ltd. | Data storage subsystem |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09292954A (en) * | 1996-04-26 | 1997-11-11 | Hitachi Ltd | Disk array subsystem configuration definition method |
JP3490266B2 (en) * | 1997-09-26 | 2004-01-26 | 株式会社日立製作所 | Backup system and backup method using disk system and magnetic tape library device |
JP4434407B2 (en) * | 2000-01-28 | 2010-03-17 | 株式会社日立製作所 | Subsystem and integrated system thereof |
US6480970B1 (en) * | 2000-05-17 | 2002-11-12 | Lsi Logic Corporation | Method of verifying data consistency between local and remote mirrored data storage systems |
JP2002007304A (en) * | 2000-06-23 | 2002-01-11 | Hitachi Ltd | Computer system using storage area network and data handling method thereof |
US6810491B1 (en) * | 2000-10-12 | 2004-10-26 | Hitachi America, Ltd. | Method and apparatus for the takeover of primary volume in multiple volume mirroring |
JP4122724B2 (en) * | 2001-04-17 | 2008-07-23 | 株式会社日立製作所 | Data replication method and information processing system |
JP2003296290A (en) * | 2002-04-02 | 2003-10-17 | Hitachi Ltd | Storage device system and data transfer method |
JP4060114B2 (en) * | 2002-04-23 | 2008-03-12 | 株式会社日立製作所 | Program, information processing method, information processing device, and storage device |
JP3957278B2 (en) * | 2002-04-23 | 2007-08-15 | 株式会社日立製作所 | File transfer method and system |
US7293048B2 (en) * | 2003-10-29 | 2007-11-06 | Hewlett-Packard Development Company, L.P. | System for preserving logical object integrity within a remote mirror cache |
-
2004
- 2004-01-09 JP JP2004003898A patent/JP4629342B2/en not_active Expired - Fee Related
- 2004-12-06 US US11/003,613 patent/US7543121B2/en not_active Expired - Fee Related
-
2009
- 2009-04-28 US US12/431,385 patent/US20090216976A1/en not_active Abandoned
-
2010
- 2010-12-15 US US12/969,237 patent/US8589642B2/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5948062A (en) * | 1995-10-27 | 1999-09-07 | Emc Corporation | Network file server using a cached disk array storing a network file directory including file locking information and data mover computers each having file system software for shared read-write file access |
US5987506A (en) * | 1996-11-22 | 1999-11-16 | Mangosoft Corporation | Remote access and geographically distributed computers in a globally addressable storage environment |
US20020103943A1 (en) * | 2000-02-10 | 2002-08-01 | Horatio Lo | Distributed storage management platform architecture |
US6895485B1 (en) * | 2000-12-07 | 2005-05-17 | Lsi Logic Corporation | Configuring and monitoring data volumes in a consolidated storage array using one storage array to configure the other storage arrays |
US6950915B2 (en) * | 2002-06-05 | 2005-09-27 | Hitachi, Ltd. | Data storage subsystem |
US20050114465A1 (en) * | 2003-11-20 | 2005-05-26 | International Business Machines Corporation | Apparatus and method to control access to logical volumes using one or more copy services |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070130432A1 (en) * | 2005-12-06 | 2007-06-07 | Nec Corporation | Storage system for copying data between storage devices, and method of copying data |
US8433862B2 (en) | 2005-12-06 | 2013-04-30 | Nec Corporation | Storage system for adjusting asynchronous copy load based on cache activity rate |
US20140082310A1 (en) * | 2012-09-14 | 2014-03-20 | Hitachi, Ltd. | Method and apparatus of storage tier and cache management |
US8886882B2 (en) * | 2012-09-14 | 2014-11-11 | Hitachi, Ltd. | Method and apparatus of storage tier and cache management |
Also Published As
Publication number | Publication date |
---|---|
US8589642B2 (en) | 2013-11-19 |
JP2005196618A (en) | 2005-07-21 |
JP4629342B2 (en) | 2011-02-09 |
US20050154829A1 (en) | 2005-07-14 |
US7543121B2 (en) | 2009-06-02 |
US20110083033A1 (en) | 2011-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8589642B2 (en) | Computer system duplicating writes by synchronous remote copy with multiple host computers using heterogeneous operating systems | |
CN100430914C (en) | Storage system with virtual resources | |
EP1569120B1 (en) | Computer system for recovering data based on priority of the data | |
US7669022B2 (en) | Computer system and data management method using a storage extent for backup processing | |
CN101571822B (en) | Storage controller and data management method | |
KR100194295B1 (en) | How to update the status of data processing systems and queues | |
US6950915B2 (en) | Data storage subsystem | |
JP5068081B2 (en) | Management apparatus and management method | |
US7809887B2 (en) | Computer system and control method for the computer system | |
EP1150210B1 (en) | Method for duplicating data of storage subsystem and data duplicating system | |
EP1538528B1 (en) | Storage system and replication creation method thereof | |
US8285824B2 (en) | Storage system and data replication method that refuses one or more requests for changing the first logical configuration information until the first storage apparatus and second storage apparatus are synchronized | |
US20040123068A1 (en) | Computer systems, disk systems, and method for controlling disk cache | |
EP1510921A2 (en) | Remote copy storage system | |
US20110153968A1 (en) | Data duplication control method | |
US20060236050A1 (en) | Computer system, computer, and remote copy processing method | |
US8024537B2 (en) | Storage system, remote copy and management method therefor | |
JP5286212B2 (en) | Remote copy control method and system in storage cluster environment | |
EP2144167B1 (en) | Remote file system, terminal device, and server device | |
JP2004334574A (en) | Storage operation management program, operation management method, and management computer | |
JP2002259063A (en) | Storage system capable of backup processing | |
US20080294858A1 (en) | Storage system and data management method | |
JP2850756B2 (en) | Failure recovery method for files in distributed processing system | |
JPH08166909A (en) | Storage controller |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |