System and method for host volume mapping for shared storage volumes in multi-host computing environment

A main computer, computer technology, used in memory systems, various digital computer combinations, computer security devices, etc.

Inactive Publication Date: 2002-10-09
IBM CORP
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Therefore, the problem that exists is that in the conventional system 100, each host computer 101 has the right to fully access all logical volumes 100, and there is no structure or measure that can restrict access to specific logical volumes by specific hosts or host groups.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for host volume mapping for shared storage volumes in multi-host computing environment
  • System and method for host volume mapping for shared storage volumes in multi-host computing environment
  • System and method for host volume mapping for shared storage volumes in multi-host computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]The present invention includes methods, apparatus, systems and computer program products for providing controlled access to storage volumes on an inventive storage system controller (eg, hard disk drive array controller 106). The structure, method and computer program product of the present invention, including the controller 106 and the memory subsystem 108 with access control, further solve the access and security problems existing in the traditional system and method, and its practice is to put the array controller on the Access to storage volumes 108, or controlled by the array controller, is restricted to a specific set of host computers identified by a unique identifier, such as a World Wide Name (WWN) 107, identified by the host The network interface of the computer 101 is associated with the host computer 101, or uses other identification means, as long as the identification means is unique among these interconnected devices. The present invention also provides l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a structure and method for controlling access to shared storage devices, such as disk drive memory arrays, in computer systems and networks having multiple host computers (101). A method for controlling access to a hardware device (106) in a computer system having a plurality of computers and at least one hardware device (106) connected to the plurality of computers. The method includes the steps of: associating a locally unique identifier (130) with each of the plurality of computers; and defining in memory a data structure for identifying which of the computers are allowed based on the locally unique identifier accessing the device (190); and querying the data structure to determine whether a requesting one of the computers should be allowed access to the hardware device. In one embodiment, the process of defining the data structure in the memory includes: defining a host computer ID mapping data structure in the memory; defining a port mapping table data structure in the memory that includes a plurality of port mapping table entries; A host identifier list data structure is defined in the memory; a volume permission table data structure is defined in the memory; and a volume number table data structure is defined in the memory.

Description

technical field [0001] Generally, the present invention relates to computer systems and networks having two or more host computers and at least one shared data storage device. More particularly, the present invention relates to structures and methods for controlling access to shared memory in computer systems and networks having multiple host computers, particularly in storage area networks (SANs), which may contribute data to shared data storage Integrity issues. Background technique [0002] Conventional operating systems may often assume that any storage volume or device is "private" and not shared between different host computers. In a distributed computing system, such as a network server system, disk drives, storage volumes, logical volumes or other storage devices may be shared and represent common memory. When a controller responsible for controlling read, write, or other access to storage devices, such as a hard disk array controller (e.g., a RAID controller), is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F13/14G06F3/06G06F12/00G06F12/14G06F21/00G06F21/24
CPCG06F3/0622G06F3/0637G06F3/0689G06F21/62G06F21/6209G06F21/6218G06F21/80G06F21/805G06F2221/2129G06F2221/2141
Inventor W·A·休比斯W·G·德逖孜
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products