Patent application number | Description | Published |
20080205300 | CHECKING AND REPAIRING A NETWORK CONFIGURATION - Disclosed is a technique for correcting a configuration problem. The configuration problem is detected. It is determined whether there is at least one solution for the configuration problem in a knowledge data store. When it is determined that there is at least one solution in the knowledge data store, automatically selecting a solution to solve the configuration problem. When said solution can be automatically applied, automatically applying said solution. When said solution cannot be automatically applied, notifying a user. | 08-28-2008 |
20080209015 | CHECKING AND REPAIRING A NETWORK CONFIGURATION - A technique for performing configuration checking of a network is provided. A network data store is scanned for at least one transaction. At least one event is generated for the transaction. At least one configuration policy is associated with the event. The configuration policy is compared with configuration data associated with the event. It is determined whether the configuration policy has been violated based on the comparison. | 08-28-2008 |
20090013015 | SYSTEM AND ARTICLE OF MANUFACTURE FOR TRANSPARENT AUTONOMIC DATA REPLICATION IMPROVING ACCESS PERFORMANCE FOR A STORAGE AREA NETWORK AWARE FILE SYSTEM - Techniques are provided for distributing data. It is determined that a source storage device is becoming a bottleneck. One or more blocks to be moved from the source storage device to one or more other storage devices are identified. The one or more other storage devices are selected. Copy services are used to move the blocks from the source storage device to the one or more other storage devices. A metadata store is updated with locations of the blocks that have been moved. | 01-08-2009 |
20090043980 | ARTICLE OF MANUFACTURE AND SYSTEM FOR AUTONOMIC DATA CACHING AND COPYING ON A STORAGE AREA NETWORK AWARE FILE SYSTEM USING COPY SERVICES - Techniques are provided for processing a request. When the request is to read a data unit, information regarding the closest physical block locations is returned. When the request is to write to the data unit, information regarding one or more source block locations is returned, wherein the write is applied to one or more source blocks of the data unit. When a number of requests for the data unit exceed a threshold level and at least one quality of a service policy is not being met, a copy of the one or more source blocks of the data unit is created at a location selected based on proximity to at least one client computer from which the number of requests are high. | 02-12-2009 |
Patent application number | Description | Published |
20090193142 | Method to Allow a Host to Replace Logical Path Resources it Owns - A method for replacing logical path resources, a host is able to replace a logical path it owns with a new logical path. Such a system is especially applicable when the condition of “out of resources” has been reached for a port. With this system, a host is guaranteed that it can replace a logical path it owns with a new logical path. It is not necessary for a control unit to have reached its maximum number of logical paths per port. A host is able to replace one logical path with a new logical path any time. | 07-30-2009 |
20100023801 | Method to recover from ungrouped logical path failures - A system and method for recovering from a single logical path failure. More specifically, although a host has not grouped its logical paths, the host knows which logical paths it has available. When a host detects a logical path failure, the host enters a path discovery mode of operation. If the host continues to detect a logical path failure while operating in the logical path discovery mode of operation, the host removes the logical path from a logical path mask, and the host does not use the removed logical path again. In the case of ungrouped logical paths, the host aborts its process because it does not have more paths available to continue its process. Additionally, in certain embodiments, a pseudo path group for ungrouped logical paths is created. | 01-28-2010 |
20130024586 | VERIFICATION OF HARDWARE CONFIGURATION - A method for verifying an input/output (I/O) hardware configuration is provided. Data from an input/output data set (IOCDS) is extracted for building a verification command. The IOCDS contains hardware requirements that define at least software devices associated with a logical control unit (LCU). The verification command is processed. The verification command includes a software device address range associated with a logical control unit (LCU) of the I/O hardware. The LCU utilizes a first logical path. The software device address range utilizing the first logical path is compared with an existing software device address range utilizing at least one additional logical path. The verification command is accepted if the software device address range and the existing software device address range match. | 01-24-2013 |
Patent application number | Description | Published |
20090037676 | DYNAMIC TIMER CONFIGURATION FOR MONITORING A LONG BUSY STATE IN A REMOTE MIRROR AND COPY ENVIRONMENT - A system is disclosed that includes a host system to issue a write command, a primary storage controller to write data to a primary volume, and a secondary storage controller to mirror the data to a secondary volume. In the event the secondary storage controller is unable to mirror the data due to a busy state, a busy signal may be sent to the primary storage controller. The primary storage controller may initiate a timer in the event it receives the busy signal, and, in the event the busy state does not end before expiration of the timer, notify the host system that the primary and secondary volumes are in a suspended state. To alter the duration of the timer, the host system may be configured to dynamically alter the duration of the timer by sending a command to the primary storage controller. | 02-05-2009 |
20090037677 | DYNAMIC TIMER CONFIGURATION FOR TASK MONITORING IN A REMOTE MIRROR AND COPY ENVIRONMENT - A system is disclosed that includes a host system to issue a write command, a primary storage device to write data to a primary volume, and a secondary storage device to mirror the data to a secondary volume. A task timer may be initiated upon sending the data from the primary storage device to the secondary storage device. The secondary storage device may also send an acknowledge signal to the primary storage device in the event it successfully mirrors the data to the secondary volume. In the event the acknowledge signal is not received before the timer expires, the primary storage device may notify the host system that the primary and secondary volumes are in a suspended state. To alter the duration of the timer, the host system may be further configured to dynamically alter the duration of the timer by sending a command to the primary storage device. | 02-05-2009 |
20090177911 | APPARATUS, SYSTEM, AND METHOD TO PREVENT QUEUE STALLING - An apparatus, system, and method are disclosed to prevent queue stalling. The apparatus to prevent queue stalling is provided with a plurality of modules configured to functionally execute the necessary steps of detecting a connection failure on a first logical path, wherein the first logical path is associated with a first entry in a queue, and wherein the first logical path is configured to define a communication path between an entity associated with a first entry in the queue and a queue manager, scanning the queue to identify a second entry associated with a second logical path in response to the connection failure, and advancing the second entry to a position within the queue that is ahead of the first entry. These modules in the described embodiments include a detection module, a scanning module, and an advancing module. | 07-09-2009 |
20090187891 | VERIFICATION OF INPUT/OUTPUT HARDWARE CONFIGURATION - A method for verifying an input/output (I/O) hardware configuration is provided. A verification command is processed. The verification command includes a software device address range associated with a logical control unit (LCU) of the I/O hardware. The LCU utilizes a first logical path. The software device address range utilizing the first logical path is compared with an existing software device address range utilizing at least one additional logical path. The verification command is accepted if the software device address range and the existing software device address range match. | 07-23-2009 |
20090199187 | CONCURRENT EXECUTION OF MULTIPLE PRIMITIVE COMMANDS IN COMMAND LINE INTERFACE - A method to concurrently execute multiple primitive commands in a command line interface (CLI) is provided. Each of a plurality of signal parameters is designated for each of a plurality of primitive commands. The plurality of primitive commands is encapsulated into a header CLI command. The CLI command is executed. | 08-06-2009 |
20100023802 | Method to recover from logical path failures - A system and method for recovering from logical path failures is set forth. More specifically, when a host detects a logical path failure, the host enters a path discovery mode of operation. If the host continues to detect a logical path failure while operating in the logical path discovery mode of operation, the host removes the logical path from a logical path mask, and the host does not use the removed logical path again. Additionally, the system and method facilitates recovery of the failed logical paths by using a plurality of logical path masks. A first mask is referred to as an intermediate failure logical path mask and a second mask is referred to as a permanent failure logical path mask. | 01-28-2010 |