US20010011348A1 - Method and apparatus for detecting system configuration changes - Google Patents
Method and apparatus for detecting system configuration changes Download PDFInfo
- Publication number
- US20010011348A1 US20010011348A1 US09/812,743 US81274301A US2001011348A1 US 20010011348 A1 US20010011348 A1 US 20010011348A1 US 81274301 A US81274301 A US 81274301A US 2001011348 A1 US2001011348 A1 US 2001011348A1
- Authority
- US
- United States
- Prior art keywords
- configuration
- computer system
- computer
- host computer
- logical volume
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
Definitions
- the present invention is directed to a method and apparatus for detecting changes in a configuration of a computer system.
- FIG. 1 An example of such a computer system is shown in FIG. 1, and includes a host computer 1 and a storage system 3 that serves as a system resource accessible by the host computer 1 .
- the storage system 3 includes a plurality of storage devices on which data are stored.
- the storage system 3 includes a plurality of disk drives 5 a and 5 b and a plurality of disk controllers 7 a - 7 b that respectively control access to the disk drives 5 a and 5 b.
- the storage system 3 further includes a plurality of storage bus directors 9 a - d that control communication with the host computer 1 over communication buses 17 a - d.
- Communications buses 17 a - d interface to the storage system 3 through ports 18 a - d.
- the storage system 3 includes an internal bus 13 over which the storage bus directors 9 a - d and the disk controllers 7 a - 7 b communicate.
- the host computer 1 includes a processor 16 and one or more host bus adapters 15 a - d that each controls communication between the processor 16 and the storage system 3 via a corresponding one of the communication buses 17 a - d. It should be appreciated that rather than a single processor 16 , the host computer 1 can include multiple processors. Each of the buses 17 a - d can be any of a number of different types of communication links, with each of the host bus adapters 15 a - d and the storage bus directors 9 a - d being adapted to communicate using an appropriate protocol for the communication bus coupled between them.
- each of the communication buses 17 a - d can be implemented as a SCSI bus, with the directors 9 a - d and adapters 15 a - d each being a SCSI driver.
- communication between the host computer 1 and the storage system 3 can be performed over a Fibre Channel fabric, where the buses 17 a - d are Fibre Channel links.
- each path includes one of the host bus adapters 15 a - d, one of the buses 17 a - d, one of the ports 18 a - d, and one of the storage bus directors 9 a - d in FIG. 1).
- each of the host bus adapters 15 a - d has the ability to access each of the disk drives 5 a - b, through an appropriate storage bus director and disk controller.
- FIG. 2 is a schematic representation of a number of mapping layers that may exist in a computer system such as the one shown in FIG. 1.
- the mapping layers include an application layer 21 which includes application programs executing on the processor 16 of the host computer 1 .
- the application layer 21 will generally refer to data objects used thereby with a label or identifier such as a file name, and will have no knowledge about where the corresponding file is physically stored on the storage system 3 (FIG. 1).
- the host computer 1 also includes a file system and/or logical volume manager (LVM) layer 23 that maps each data object specified by the application layer 21 to a particular logical volume (that the host computer 1 perceives to correspond to an actual physical storage device) wherein the data object is stored.
- LVM logical volume manager
- the file system/LVM layer 23 will generally refer to a logical volume (also referred herein as a “raw storage device”) using a label or identifier that is at least partially descriptive of a physical component of the computer system that is used by the host computer 1 when accessing the logical volume.
- the physically descriptive information may include, for example, information descriptive of the one of the multiple paths via which the logical volume may be accessed, as well as a unique identifier for the raw storage device.
- the device identifier “/dev/dsk/c 0 t 0 d 0 ” may be used to refer to a raw storage device or logical volume accessible at a channel zero (c 0 ) (which can be any of the multiple paths in FIG. 1), and having a target number zero (t 0 ) and a logical unit number (LUN) zero (d 0 ) that together uniquely identify the raw storage device.
- a multi-path mapping layer 25 that maps the logical volume address specified by the file system/LVM layer 23 , through a particular one of the multiple system paths, to the logical volume address to be presented to the storage system 3 .
- the multi-path mapping layer 25 not only specifies a particular logical volume address, but also specifies a particular one of the multiple system paths used to access the specified logical volume.
- the storage system 3 were not an intelligent storage system, the logical volume address specified by the multi-pathing layer 25 would identify a particular raw physical device (e.g., one of the disk drives 5 a - b ) within the storage system 3 .
- the storage system itself may include a further mapping layer 27 , such that the logical volume address passed from the host computer 1 may not correspond directly to an actual physical device (e.g., a disk drive 5 a - b ) in the storage system 3 . Rather, a logical volume specified by the host computer 1 can be spread across multiple physical storage devices (e.g., disk drives 5 a - b ) or multiple logical volumes accessed by the host computer 1 can be stored on a single physical storage device.
- Fibre Channel is a communication protocol that enables computer system components that were previously incapable of communicating to be coupled together in a manner that enables communication therebetween. For example, using Fibre Channel a first computer system resource that communicates using SCSI can communicate with a second computer system resource that communicates using Ethernet.
- FIG. 4 An example of a computer system implemented using Fibre Channel is shown in FIG. 4, wherein a host computer 1 is coupled to a storage system 3 via a Fibre Channel cloud 100 .
- the Fibre Channel cloud 100 can include a number of switching and hub components, such that the host computer 1 and the storage system 3 can communicate with other system components via the cloud 100 .
- the host computer 1 when the computer system of FIG. 4 is brought on line, the host computer 1 will be booted or initialized, and will go through a process of assigning device identifiers (e.g., “/dev/dsk/c 0 t 0 d 0 ” as discussed above), to each raw storage device or logical volume accessible to the host computer through the Fibre Channel cloud 100 .
- device identifiers e.g., “/dev/dsk/c 0 t 0 d 0 ” as discussed above
- the assignment of a particular one of the communication paths 102 a - d as channel c 0 is fairly arbitrary, and is not initially significant, so long as each of the paths 102 a - d is assigned a unique channel number. Referring to the illustrative example shown in FIG.
- the communication path 102 a initially may be assigned channel designation c 0 and communication path 102 b initially may be assigned channel designation c 1 .
- a first logical volume 104 is made visible to the Fibre Channel cloud 100 over a port (not shown) of the storage system 3 that is coupled to path 102 a, and a second logical volume 106 is made visible via a port (not shown) coupled to path 102 b.
- the logical volume 104 may be identified by an operating system on the host computer 1 using a device identifier “/dev/dsk/c 0 t 0 d 0 ,” and the logical volume 106 may be identified using the device identifier “/dev/dsk/c 1 t 0 d 0 ”.
- events can occur that may change the physical configuration of the computer system shown in FIG. 1, which may require a rebooting of the host computer 1 .
- one such reconfiguration change may be caused by a failure of the port on the storage system 3 that is coupled to the path 102 a. If such a failure were to occur, the storage system 3 can be reconfigured so that the logical volume 104 can be exported from the storage system 3 over the port coupled to the path 102 b.
- the host computer 1 would generally need to be rebooted to recognize the reconfigured nature of the computer system.
- the path 102 a will no longer be recognized, such that upon reinitialization, a different channel number may be assigned to each of the paths 102 b - f.
- the path 102 b may be the first channel recognized by the host computer 1 when it reboots, causing this channel to now be identified as channel c 0 .
- the device identifier for logical volume 106 could change to “/dev/dsk/c 0 t 0 d 9 ”
- the device identifier for logical volume 104 could change to “/dev/dsk/c 0 t 1 d 0 ”.
- the file system LVM layer 23 executing on the host computer 1 accesses a particular logical volume using the device identifier assigned by the operating system.
- the device identifier for each of the logical volumes 104 and 106 will have changed between the time when the host computer 1 was initially booted, and the time when it is rebooted following the change in the physical configuration of the system. It should be appreciated that this can cause significant problems for applications executing on the host computer 1 . For example, an application program that is executing on the host computer 1 and that stores a particular data file in logical volume 104 .
- the device identifier previously used by the file system/LVM mapping layer 23 to access logical volume 104 (e.g., “/dev/dsk/c 0 t 0 d 0 ” in the example discussed above) will now, unknown to the application program, actually map to the logical volume 106 . Therefore, when performing reads, the application program will actually read the wrong data, and when performing writes, the application program will be overwriting the wrong data in the storage system 3 .
- One illustrative embodiment of the invention is directed to a method of detecting changes in a configuration of a computer system including a host computer and at least one computer system resource.
- the method comprises steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration.
- Another illustrative embodiment of the invention is directed to a computer readable medium encoded with a program for execution on a host computer in a computer system including the host computer and at least one computer system resource.
- the program when executed on the computer, performs a method of detecting changes in a configuration of the computer system, the method comprising steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration.
- a further illustrative embodiment of the invention is directed to a host computer for use in a computer system including the host computer and at least one computer system resource.
- the host computer comprises: storing means for storing information relating to a reference configuration of the computer system at a first point in time; determining means for determining a current configuration of the computer system at a second point in time; comparing means for comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and providing means for providing an indication when the current configuration of the computer system differs from the reference configuration.
- FIG. 1 is a block diagram of an exemplary computer system on which aspects of the present invention can be implemented
- FIG. 2 is a schematic representation of a number of mapping layers that exist in a known computing system
- FIG. 3 is a block diagram of a host computer including elements suitable for implementing an embodiment of the present invention.
- FIG. 4 is a block diagram of a Fibre Channel computer system.
- a method and apparatus is provided to detect changes in a configuration of a computer system, and to provide an indication that changes to the configuration of the computer system have been detected. This can be done in any number of ways, and the present invention is not limited to any particular implementation.
- information relating to a known configuration of the computer system is stored at a reference point in time. Thereafter (e.g., in response to a rebooting of the host computer), a current configuration of the computer system is determined. The current configuration of the computer system is compared with the reference (stored) configuration of the computer system to determine whether the current configuration differs from the reference configuration, and when it does, an indication of this difference is provided.
- a configuration capture program 30 is provided on the host computer 1 .
- the user may instruct the configuration capture program 30 to collect and store information relating to the then current configuration of the computer system at that reference point in time. As discussed below, this stored information can be used to identify a reference configuration.
- the configuration capture program 30 may store the information descriptive of the reference configuration in any of numerous ways and on any type of storage medium. For example, the information can be stored in a configuration file 32 on an hard disk 34 internal to the host computer 1 .
- the configuration capture program 30 may, for example, collect configuration information descriptive of the current configuration of the computer system in any of numerous ways.
- the configuration capture program 30 may obtain from the operating system 36 of the host computer 1 the unique identifier for each device accessible by the host computer 1 .
- the operating system 36 of the host computer 1 will typically maintain a device directory 38 including information descriptive of each device which the operating system 36 recognizes as being accessible by the host computer.
- Each device identifier typically includes information descriptive of a physical path, port, or link by which the host computer accesses the device.
- the device identifier “/dev/dsk/c 1 t 0 d 0 ” may be the device identifier of a device that is accessed by the host computer 1 on channel number one (c 1 ), and has a target number (t 0 ) and LUN (dO) zero within the storage system 3 .
- the configuration capture program 30 may use the identifier to access the device for the purpose of obtaining additional information pertaining thereto.
- the additional information that the capture program 30 can access for a particular device will vary depending upon the nature of the system resource. Thus, the present invention is not limited to accessing additional information of any particular type.
- the configuration capture program 30 may use a device identifier to access from the storage system 3 information that uniquely identifies the raw storage device or logical volume corresponding thereto.
- each logical volume will typically include a label that is unique within the storage system 3 and identifies the logical volume.
- multiple storage systems 3 may be accessible by the host computer 1 .
- each storage system 3 may also be provided with a unique identifier (e.g., a serial number), such that each logical volume in the computer system can be identified by the serial number of the storage system in which it is included, in conjunction with the unique identifier of the logical volume within that storage system.
- the configuration capture program 30 may store that information in a manner that is associated with the corresponding device identifier that the operating system uses to identify that device in the current configuration of the system. This can be done for each device accessible to the host computer 1 (e.g., for each device in the device directory 38 ). This associated data set can be stored in the configuration file 32 and serves to identify the reference configuration, which can be used for comparison purposes in a manner discussed below.
- the configuration of the computer system will change after the configuration file 32 is saved.
- one of the ports 18 a - d on the storage system 3 may malfunction, causing the port and storage devices normally accessible through that port to become inaccessible to the host computer 1 .
- Another exemplary way in which the configuration of the computer system may change is that the links between the host computer 1 and the storage system 3 may be reconfigured.
- Yet another exemplary way in which the configuration of the computer system may change is that logical volumes within the storage system 3 may be added, removed, or exported through a different port on the same or another storage system, thereby causing the contents of the host computer's operating system device directory 38 to change.
- a logical volume which was previously accessible using a particular channel, target, and LUN will no longer be accessible using that identifier, but rather will be accessible at a different channel, target, and LUN.
- application programs on the host computer 1 will, via the file system/LVM mapping layer 23 , continue to access the logical volume using the old channel, target and LUN identifier, which can cause problems. For example, if no logical volume is accessible at the old channel, target and LUN, any attempt to access the logical volume at that channel, target and old identifier will result in an error.
- changes to the configuration of the computer system are detected and an indication that the configuration of the computer system has changed is provided.
- This detection can be done in numerous ways.
- the host computer 1 can be provided with a configuration comparison program 40 that can compare the current (i.e., at the time the program is run) configuration of the computer system with the reference configuration (stored in the manner discussed above) to determine whether any changes have occurred.
- the configuration comparison program 40 can be executed whenever it is desired to check the configuration of the system.
- the comparison program 40 is executed each time the host computer 1 is rebooted, but it should be appreciated that the present invention is not limited in this respect.
- the configuration comparison program 40 determines a current configuration of the computer system, and compares the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration.
- the configuration comparison program 40 may, for example, determine the current configuration of the computer system in the same manner as that described above with respect to the configuration capture program 30 .
- the configuration comparison program 40 may, for example, compare the current configuration of the computer system with a reference configuration by retrieving the stored information descriptive of the reference configuration from the configuration file 32 .
- the configuration comparison program 40 may detect, for example, whether new devices are present, old devices have been deleted, or existing devices have moved. When doing so, the configuration comparison program 40 may examine the information for both the current and reference configurations that identifies devices in a manner that is not dependent upon the physical configuration of the computer system (e.g., using the storage system serial number and unique logical volume identifier discussed above). Thus, the status of a device is not determined based on the operating system device identifier which is dependent upon the system configuration, but rather, is based upon information that uniquely identifies the device in a manner that is independent of the configuration of the system.
- an indication is provided by the configuration comparison program 40 when the current configuration of the computer system differs from a reference configuration.
- the configuration comparison program may provide an indication when the channel through which a particular logical volume is accessible has changed, when a previously accessible logical volume is no longer accessible, or when any other change to the configuration of the computer system is detected.
- the indication that the current configuration of the computer system differs from the reference configuration may be provided in any manner, and the present invention is not limited to any particular technique.
- a text file descriptive of the differences between the current configuration of the computer system and the reference configuration may be generated.
- the indication may be provided to a human operator by, for example, displaying such a text file on a computer monitor 42 , printing the text file on a printer 44 , or sending the text file to a human operator in an e-mail message via a modem 46 .
- the human operator may use the information contained within the indication provided by the configuration comparison program 40 to determine what steps, if any, to take in response to the changes in the computer system's configuration to avoid system errors.
- the operator may, for example, reconfigure the file system/LVM mapping layer 23 to refer to devices using their new device identifiers.
- the configuration comparison program 40 executes every time the host computer 1 is rebooted, halts the rebooting of the host computer 1 when it is determined that the current configuration of the computer system differs from the reference configuration, and provides an indication that the configuration of the system has changed.
- the configuration comparison program 40 may then allow a human operator to disregard the message and continue the bootup process.
- the configuration comparison program 40 may be implemented to provide an indication of all differences detected between the current configuration of the computer system and the reference configuration, or it may be implemented to provide an indication of only certain types of differences. For example, in a computer system that includes a number of system resources connected to a host computer, in one embodiment of the present invention, the configuration comparison program 40 only provides an indication of differences impacting raw storage devices or logical volumes included in a storage system 3 .
- FIG. 4 The illustrative embodiments of the present invention discussed above have been described in connection with an illustrative system such as that shown in FIG. 4, wherein the computer system includes a host computer 1 and a computer system resource that is a storage system 3 such as that shown in FIG. 1.
- the present invention is not limited in this respect, and that the aspects of the present invention described above can be used in connection with computer systems having numerous other configurations, so that the host computer 1 can determine system configuration changes in connection with numerous system resources other than a storage system 3 .
- Fibre Channel has provided an environment wherein system configuration changes have become more prevalent, such that the embodiments of the present invention discussed above can be advantageous when used in connection with a Fibre Channel system.
- the present invention is not limited in this respect, and can be used in connection with numerous other system configurations that do not employ the Fibre Channel protocol.
- the present invention is not limited to use with any particular computer platform, computer processor, or high-level programming language. Although aspects of the present invention are discussed above as being implemented in a programmed processor, elements of the invention may be implemented in software, hardware, firmware, or any combination thereof. The various elements of the invention, either individually or in combination, may be implemented as a computer program product tangibly embodied in a machine-readable storage device for execution by a computer processor such as the processor 16 shown in FIG. 1.
- a computer processor executing a program (i.e., software or firmware) tangibly embodied on a computer-readable medium to perform functions by operating on input and generating output.
- the computer-readable medium may be a memory in the host computer 1 (FIG. 1), or a transportable medium such as a compact disk, a floppy disk, or a diskette, such that a computer program embodying the aspect of the present invention can be loaded onto any computer.
- the computer program is not limited to any particular embodiment and may, for example, include an application program, foreground or background process, driver, or any combination thereof, executing on a single computer processor or multiple computer processors.
- Computer programming languages suitable for implementing such a system include procedural programming languages, object-oriented programming languages, and any combination thereof.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
Abstract
Method and apparatus for detecting changes in a configuration of a computer system including a host computer and at least one computer system resource. Information relating to a reference configuration of the computer system is stored at a first point in time. A current configuration of the computer system is determined at a second point in time. The current configuration of the computer system is compared with the reference configuration to determine whether the current configuration differs from the reference configuration. An indication is provided when the current configuration of the computer system differs from the reference configuration.
Description
- This application is a continuation of Ser. No. 09/211,311, entitled METHOD AND APPARATUS FOR DETECTING SYSTEM CONFIGURATION CHANGES, filed Dec. 4, 1998, now pending.
- The present invention is directed to a method and apparatus for detecting changes in a configuration of a computer system.
- Many computer systems include one or more host computers and one or more system resources that are accessible thereby. An example of such a computer system is shown in FIG. 1, and includes a
host computer 1 and astorage system 3 that serves as a system resource accessible by thehost computer 1. Thestorage system 3 includes a plurality of storage devices on which data are stored. In the exemplary system shown in FIG. 1, thestorage system 3 includes a plurality ofdisk drives disk controllers 7 a-7 b that respectively control access to the disk drives 5 a and 5 b. Thestorage system 3 further includes a plurality of storage bus directors 9 a-d that control communication with thehost computer 1 over communication buses 17 a-d. Communications buses 17 a-d interface to thestorage system 3 through ports 18 a-d. Finally, thestorage system 3 includes aninternal bus 13 over which the storage bus directors 9 a-d and thedisk controllers 7 a-7 b communicate. - The
host computer 1 includes aprocessor 16 and one or more host bus adapters 15 a-d that each controls communication between theprocessor 16 and thestorage system 3 via a corresponding one of the communication buses 17 a-d. It should be appreciated that rather than asingle processor 16, thehost computer 1 can include multiple processors. Each of the buses 17 a-d can be any of a number of different types of communication links, with each of the host bus adapters 15 a-d and the storage bus directors 9 a-d being adapted to communicate using an appropriate protocol for the communication bus coupled between them. For example, each of the communication buses 17 a-d can be implemented as a SCSI bus, with the directors 9 a-d and adapters 15 a-d each being a SCSI driver. Alternatively, communication between thehost computer 1 and thestorage system 3 can be performed over a Fibre Channel fabric, where the buses 17 a-d are Fibre Channel links. - As shown in the exemplary system of FIG. 1, some computer systems employ multiple paths for communicating between the
host computer 1 and the storage system 3 (e.g., each path includes one of the host bus adapters 15 a-d, one of the buses 17 a-d, one of the ports 18 a-d, and one of the storage bus directors 9 a-d in FIG. 1). In some such systems, each of the host bus adapters 15 a-d has the ability to access each of the disk drives 5 a-b, through an appropriate storage bus director and disk controller. - FIG. 2 is a schematic representation of a number of mapping layers that may exist in a computer system such as the one shown in FIG. 1. The mapping layers include an
application layer 21 which includes application programs executing on theprocessor 16 of thehost computer 1. Theapplication layer 21 will generally refer to data objects used thereby with a label or identifier such as a file name, and will have no knowledge about where the corresponding file is physically stored on the storage system 3 (FIG. 1). In addition, thehost computer 1 also includes a file system and/or logical volume manager (LVM)layer 23 that maps each data object specified by theapplication layer 21 to a particular logical volume (that thehost computer 1 perceives to correspond to an actual physical storage device) wherein the data object is stored. The file system/LVM layer 23 will generally refer to a logical volume (also referred herein as a “raw storage device”) using a label or identifier that is at least partially descriptive of a physical component of the computer system that is used by thehost computer 1 when accessing the logical volume. The physically descriptive information may include, for example, information descriptive of the one of the multiple paths via which the logical volume may be accessed, as well as a unique identifier for the raw storage device. For example, for a SCSI connection, the device identifier “/dev/dsk/c0t0d0” may be used to refer to a raw storage device or logical volume accessible at a channel zero (c0) (which can be any of the multiple paths in FIG. 1), and having a target number zero (t0) and a logical unit number (LUN) zero (d0) that together uniquely identify the raw storage device. - Below the file system/
LVM layer 23 is amulti-path mapping layer 25 that maps the logical volume address specified by the file system/LVM layer 23, through a particular one of the multiple system paths, to the logical volume address to be presented to thestorage system 3. Thus, themulti-path mapping layer 25 not only specifies a particular logical volume address, but also specifies a particular one of the multiple system paths used to access the specified logical volume. - If the
storage system 3 were not an intelligent storage system, the logical volume address specified by themulti-pathing layer 25 would identify a particular raw physical device (e.g., one of the disk drives 5 a-b) within thestorage system 3. However, in an intelligent storage system such as that shown in FIG. 1, the storage system itself may include afurther mapping layer 27, such that the logical volume address passed from thehost computer 1 may not correspond directly to an actual physical device (e.g., a disk drive 5 a-b) in thestorage system 3. Rather, a logical volume specified by thehost computer 1 can be spread across multiple physical storage devices (e.g., disk drives 5 a-b) or multiple logical volumes accessed by thehost computer 1 can be stored on a single physical storage device. - As discussed above, application programs running in the
application layer 21 typically access logical volumes within thestorage system 3 via the file system/LVM layer 23, which uses device identifiers for the logical volumes that include information descriptive of a physical component of the computer system through which the logical volumes are accessed. This can cause problems when changes are made to the physical configuration of the computer system. User flexibility in reconfiguring a computer system has become more and more prevalent with the advent of Fibre Channel. Fibre Channel is a communication protocol that enables computer system components that were previously incapable of communicating to be coupled together in a manner that enables communication therebetween. For example, using Fibre Channel a first computer system resource that communicates using SCSI can communicate with a second computer system resource that communicates using Ethernet. An example of a computer system implemented using Fibre Channel is shown in FIG. 4, wherein ahost computer 1 is coupled to astorage system 3 via a Fibre Channelcloud 100. It should be appreciated that the Fibre Channelcloud 100 can include a number of switching and hub components, such that thehost computer 1 and thestorage system 3 can communicate with other system components via thecloud 100. - It should be appreciated that when the computer system of FIG. 4 is brought on line, the
host computer 1 will be booted or initialized, and will go through a process of assigning device identifiers (e.g., “/dev/dsk/c0t0d0” as discussed above), to each raw storage device or logical volume accessible to the host computer through the Fibre Channelcloud 100. It should be appreciated that the assignment of a particular one of the communication paths 102 a-d as channel c0 is fairly arbitrary, and is not initially significant, so long as each of the paths 102 a-d is assigned a unique channel number. Referring to the illustrative example shown in FIG. 4, during initialization, thecommunication path 102 a initially may be assigned channel designation c0 andcommunication path 102 b initially may be assigned channel designation c1. A firstlogical volume 104 is made visible to the Fibre Channelcloud 100 over a port (not shown) of thestorage system 3 that is coupled topath 102 a, and a secondlogical volume 106 is made visible via a port (not shown) coupled topath 102 b. Thus, during initialization, thelogical volume 104 may be identified by an operating system on thehost computer 1 using a device identifier “/dev/dsk/c0t0d0,” and thelogical volume 106 may be identified using the device identifier “/dev/dsk/c1t0d0”. - It should be appreciated that events can occur that may change the physical configuration of the computer system shown in FIG. 1, which may require a rebooting of the
host computer 1. For example, one such reconfiguration change may be caused by a failure of the port on thestorage system 3 that is coupled to thepath 102 a. If such a failure were to occur, thestorage system 3 can be reconfigured so that thelogical volume 104 can be exported from thestorage system 3 over the port coupled to thepath 102 b. Thus, after reconfiguration of thestorage system 3, thehost computer 1 would generally need to be rebooted to recognize the reconfigured nature of the computer system. In doing so, it should be appreciated that thepath 102 a will no longer be recognized, such that upon reinitialization, a different channel number may be assigned to each of thepaths 102 b-f. For example, thepath 102 b may be the first channel recognized by thehost computer 1 when it reboots, causing this channel to now be identified as channel c0. As a result of this reinitialization, the device identifier forlogical volume 106 could change to “/dev/dsk/c0t0d9”, and the device identifier forlogical volume 104 could change to “/dev/dsk/c0t1d0”. - As discussed above, the file
system LVM layer 23 executing on thehost computer 1 accesses a particular logical volume using the device identifier assigned by the operating system. However, it should be appreciated that as a result of the change to the physical configuration of the computer system, the device identifier for each of thelogical volumes host computer 1 was initially booted, and the time when it is rebooted following the change in the physical configuration of the system. It should be appreciated that this can cause significant problems for applications executing on thehost computer 1. For example, an application program that is executing on thehost computer 1 and that stores a particular data file inlogical volume 104. After the reconfiguration of thestorage system 3 and the resulting reboot of thehost computer 1, the device identifier previously used by the file system/LVM mapping layer 23 to access logical volume 104 (e.g., “/dev/dsk/c0t0d0” in the example discussed above) will now, unknown to the application program, actually map to thelogical volume 106. Therefore, when performing reads, the application program will actually read the wrong data, and when performing writes, the application program will be overwriting the wrong data in thestorage system 3. - It should be appreciated from the foregoing that the use of device identifiers that include information that is dependent upon a physical component of the computer system used to access the logical volume or raw storage device can lead to problems when the system is reconfigured, because the device identifiers for one or more logical volumes can change in a manner that is typically not communicated to the application layer21 (FIG. 2). This can result in the wrong data being accessed for a read or write, or can result in a logical volume becoming inaccessible to an application program which is not capable of accessing the logical volume via its new device identifier.
- One illustrative embodiment of the invention is directed to a method of detecting changes in a configuration of a computer system including a host computer and at least one computer system resource. The method comprises steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration.
- Another illustrative embodiment of the invention is directed to a computer readable medium encoded with a program for execution on a host computer in a computer system including the host computer and at least one computer system resource. The program, when executed on the computer, performs a method of detecting changes in a configuration of the computer system, the method comprising steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration.
- A further illustrative embodiment of the invention is directed to a host computer for use in a computer system including the host computer and at least one computer system resource. The host computer comprises: storing means for storing information relating to a reference configuration of the computer system at a first point in time; determining means for determining a current configuration of the computer system at a second point in time; comparing means for comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and providing means for providing an indication when the current configuration of the computer system differs from the reference configuration.
- FIG. 1 is a block diagram of an exemplary computer system on which aspects of the present invention can be implemented;
- FIG. 2 is a schematic representation of a number of mapping layers that exist in a known computing system;
- FIG. 3 is a block diagram of a host computer including elements suitable for implementing an embodiment of the present invention; and
- FIG. 4 is a block diagram of a Fibre Channel computer system.
- In accordance with one illustrative embodiment of the invention, a method and apparatus is provided to detect changes in a configuration of a computer system, and to provide an indication that changes to the configuration of the computer system have been detected. This can be done in any number of ways, and the present invention is not limited to any particular implementation. In accordance with one embodiment of the invention, information relating to a known configuration of the computer system is stored at a reference point in time. Thereafter (e.g., in response to a rebooting of the host computer), a current configuration of the computer system is determined. The current configuration of the computer system is compared with the reference (stored) configuration of the computer system to determine whether the current configuration differs from the reference configuration, and when it does, an indication of this difference is provided.
- Information relating to a reference configuration of the computer system may be gathered in any of numerous ways, and the present invention is not limited to any particular implementation. In one embodiment of the invention shown in FIG. 3, a
configuration capture program 30 is provided on thehost computer 1. When a user determines that the computer system is configured properly, the user may instruct theconfiguration capture program 30 to collect and store information relating to the then current configuration of the computer system at that reference point in time. As discussed below, this stored information can be used to identify a reference configuration. Theconfiguration capture program 30 may store the information descriptive of the reference configuration in any of numerous ways and on any type of storage medium. For example, the information can be stored in aconfiguration file 32 on anhard disk 34 internal to thehost computer 1. - The
configuration capture program 30 may, for example, collect configuration information descriptive of the current configuration of the computer system in any of numerous ways. For example, theconfiguration capture program 30 may obtain from theoperating system 36 of thehost computer 1 the unique identifier for each device accessible by thehost computer 1. Theoperating system 36 of thehost computer 1 will typically maintain adevice directory 38 including information descriptive of each device which theoperating system 36 recognizes as being accessible by the host computer. Each device identifier typically includes information descriptive of a physical path, port, or link by which the host computer accesses the device. For example, the device identifier “/dev/dsk/c1t0d0” may be the device identifier of a device that is accessed by thehost computer 1 on channel number one (c1), and has a target number (t0) and LUN (dO) zero within thestorage system 3. - Once the
configuration capture program 30 has the device identifier for a device, it may use the identifier to access the device for the purpose of obtaining additional information pertaining thereto. The additional information that thecapture program 30 can access for a particular device will vary depending upon the nature of the system resource. Thus, the present invention is not limited to accessing additional information of any particular type. In accordance with one illustrative embodiment of the invention, it is desirable to retrieve additional information that uniquely identifies the device in a manner that is not dependent upon the physical configuration of the computer system. For example, when the computer system resource is astorage system 3 such as that shown in FIG. 1, theconfiguration capture program 30 may use a device identifier to access from thestorage system 3 information that uniquely identifies the raw storage device or logical volume corresponding thereto. In astorage system 3 such as that shown in FIG. 1, each logical volume will typically include a label that is unique within thestorage system 3 and identifies the logical volume. However, it should be appreciated that in some computer systems,multiple storage systems 3 may be accessible by thehost computer 1. To handle such a system configuration, eachstorage system 3 may also be provided with a unique identifier (e.g., a serial number), such that each logical volume in the computer system can be identified by the serial number of the storage system in which it is included, in conjunction with the unique identifier of the logical volume within that storage system. - After the additional information is retrieved from the device to identify it in a manner that is independent of the physical configuration of the computer system, the
configuration capture program 30 may store that information in a manner that is associated with the corresponding device identifier that the operating system uses to identify that device in the current configuration of the system. This can be done for each device accessible to the host computer 1 (e.g., for each device in the device directory 38). This associated data set can be stored in theconfiguration file 32 and serves to identify the reference configuration, which can be used for comparison purposes in a manner discussed below. - As discussed above, it is possible that the configuration of the computer system will change after the
configuration file 32 is saved. For example, as mentioned previously, one of the ports 18 a-d on thestorage system 3 may malfunction, causing the port and storage devices normally accessible through that port to become inaccessible to thehost computer 1. Another exemplary way in which the configuration of the computer system may change is that the links between thehost computer 1 and thestorage system 3 may be reconfigured. Yet another exemplary way in which the configuration of the computer system may change is that logical volumes within thestorage system 3 may be added, removed, or exported through a different port on the same or another storage system, thereby causing the contents of the host computer's operatingsystem device directory 38 to change. In the case where a logical volume withinstorage system 3 moves, a logical volume which was previously accessible using a particular channel, target, and LUN will no longer be accessible using that identifier, but rather will be accessible at a different channel, target, and LUN. However, as discussed above, application programs on thehost computer 1 will, via the file system/LVM mapping layer 23, continue to access the logical volume using the old channel, target and LUN identifier, which can cause problems. For example, if no logical volume is accessible at the old channel, target and LUN, any attempt to access the logical volume at that channel, target and old identifier will result in an error. Even worse, if a different logical volume is now accessible at that channel, target and LUN, as in the example discussed above, attempts to read from the logical volume will result in reading the wrong data, and attempts to write to the logical volume will result in writing data to the wrong logical volume. - In one illustrative embodiment of the present invention, changes to the configuration of the computer system are detected and an indication that the configuration of the computer system has changed is provided. This detection can be done in numerous ways. For example, the
host computer 1 can be provided with aconfiguration comparison program 40 that can compare the current (i.e., at the time the program is run) configuration of the computer system with the reference configuration (stored in the manner discussed above) to determine whether any changes have occurred. Theconfiguration comparison program 40 can be executed whenever it is desired to check the configuration of the system. In accordance with one embodiment of the invention, thecomparison program 40 is executed each time thehost computer 1 is rebooted, but it should be appreciated that the present invention is not limited in this respect. Theconfiguration comparison program 40 determines a current configuration of the computer system, and compares the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration. Theconfiguration comparison program 40 may, for example, determine the current configuration of the computer system in the same manner as that described above with respect to theconfiguration capture program 30. - The
configuration comparison program 40 may, for example, compare the current configuration of the computer system with a reference configuration by retrieving the stored information descriptive of the reference configuration from theconfiguration file 32. Theconfiguration comparison program 40 may detect, for example, whether new devices are present, old devices have been deleted, or existing devices have moved. When doing so, theconfiguration comparison program 40 may examine the information for both the current and reference configurations that identifies devices in a manner that is not dependent upon the physical configuration of the computer system (e.g., using the storage system serial number and unique logical volume identifier discussed above). Thus, the status of a device is not determined based on the operating system device identifier which is dependent upon the system configuration, but rather, is based upon information that uniquely identifies the device in a manner that is independent of the configuration of the system. - In one illustrative embodiment of the present invention, an indication is provided by the
configuration comparison program 40 when the current configuration of the computer system differs from a reference configuration. For example, the configuration comparison program may provide an indication when the channel through which a particular logical volume is accessible has changed, when a previously accessible logical volume is no longer accessible, or when any other change to the configuration of the computer system is detected. - The indication that the current configuration of the computer system differs from the reference configuration may be provided in any manner, and the present invention is not limited to any particular technique. For example, a text file descriptive of the differences between the current configuration of the computer system and the reference configuration may be generated. The indication may be provided to a human operator by, for example, displaying such a text file on a
computer monitor 42, printing the text file on aprinter 44, or sending the text file to a human operator in an e-mail message via amodem 46. The human operator may use the information contained within the indication provided by theconfiguration comparison program 40 to determine what steps, if any, to take in response to the changes in the computer system's configuration to avoid system errors. The operator may, for example, reconfigure the file system/LVM mapping layer 23 to refer to devices using their new device identifiers. - In one embodiment of the invention, the
configuration comparison program 40 executes every time thehost computer 1 is rebooted, halts the rebooting of thehost computer 1 when it is determined that the current configuration of the computer system differs from the reference configuration, and provides an indication that the configuration of the system has changed. Theconfiguration comparison program 40 may then allow a human operator to disregard the message and continue the bootup process. - The
configuration comparison program 40 may be implemented to provide an indication of all differences detected between the current configuration of the computer system and the reference configuration, or it may be implemented to provide an indication of only certain types of differences. For example, in a computer system that includes a number of system resources connected to a host computer, in one embodiment of the present invention, theconfiguration comparison program 40 only provides an indication of differences impacting raw storage devices or logical volumes included in astorage system 3. - The illustrative embodiments of the present invention discussed above have been described in connection with an illustrative system such as that shown in FIG. 4, wherein the computer system includes a
host computer 1 and a computer system resource that is astorage system 3 such as that shown in FIG. 1. However, it should be appreciated that the present invention is not limited in this respect, and that the aspects of the present invention described above can be used in connection with computer systems having numerous other configurations, so that thehost computer 1 can determine system configuration changes in connection with numerous system resources other than astorage system 3. In addition, as described above, Fibre Channel has provided an environment wherein system configuration changes have become more prevalent, such that the embodiments of the present invention discussed above can be advantageous when used in connection with a Fibre Channel system. However, it should be appreciated that the present invention is not limited in this respect, and can be used in connection with numerous other system configurations that do not employ the Fibre Channel protocol. - It should be understood that the present invention is not limited to use with any particular computer platform, computer processor, or high-level programming language. Although aspects of the present invention are discussed above as being implemented in a programmed processor, elements of the invention may be implemented in software, hardware, firmware, or any combination thereof. The various elements of the invention, either individually or in combination, may be implemented as a computer program product tangibly embodied in a machine-readable storage device for execution by a computer processor such as the
processor 16 shown in FIG. 1. Various steps of embodiments of the invention, such as those described above and illustrated using flow charts, may be performed by a computer processor executing a program (i.e., software or firmware) tangibly embodied on a computer-readable medium to perform functions by operating on input and generating output. The computer-readable medium may be a memory in the host computer 1 (FIG. 1), or a transportable medium such as a compact disk, a floppy disk, or a diskette, such that a computer program embodying the aspect of the present invention can be loaded onto any computer. The computer program is not limited to any particular embodiment and may, for example, include an application program, foreground or background process, driver, or any combination thereof, executing on a single computer processor or multiple computer processors. Computer programming languages suitable for implementing such a system include procedural programming languages, object-oriented programming languages, and any combination thereof. - Having described several embodiments of the invention in detail, various modifications and improvement will readily occur to those skilled in the art. Such modifications and improvements are intended to be within the spirit and scope of the invention. Accordingly, the foregoing description is by way of example only, and is not intended as limiting. The invention is limited only as defined by the following claims and the equivalents thereto.
- What is claimed is:
Claims (1)
1. In a computer system including a host computer and at least one computer system resource, a method of detecting changes in a configuration of the computer system, the method comprising steps of:
(A) storing information relating to a reference configuration of the computer system at a first point in time;
(B) determining a current configuration of the computer system at a second point in time;
(C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and
(D) providing an indication when the current configuration of the computer system differs from the reference configuration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/812,743 US20010011348A1 (en) | 1998-12-14 | 2001-03-20 | Method and apparatus for detecting system configuration changes |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/211,131 US6240511B1 (en) | 1998-12-14 | 1998-12-14 | Method and apparatus for detecting system configuration changes |
US09/812,743 US20010011348A1 (en) | 1998-12-14 | 2001-03-20 | Method and apparatus for detecting system configuration changes |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/211,131 Continuation US6240511B1 (en) | 1998-12-14 | 1998-12-14 | Method and apparatus for detecting system configuration changes |
Publications (1)
Publication Number | Publication Date |
---|---|
US20010011348A1 true US20010011348A1 (en) | 2001-08-02 |
Family
ID=22785697
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/211,131 Expired - Lifetime US6240511B1 (en) | 1998-12-14 | 1998-12-14 | Method and apparatus for detecting system configuration changes |
US09/812,743 Abandoned US20010011348A1 (en) | 1998-12-14 | 2001-03-20 | Method and apparatus for detecting system configuration changes |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/211,131 Expired - Lifetime US6240511B1 (en) | 1998-12-14 | 1998-12-14 | Method and apparatus for detecting system configuration changes |
Country Status (1)
Country | Link |
---|---|
US (2) | US6240511B1 (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6542909B1 (en) * | 1998-06-30 | 2003-04-01 | Emc Corporation | System for determining mapping of logical objects in a computer system |
US7155558B1 (en) * | 2004-07-21 | 2006-12-26 | Vmware, Inc. | Providing access to a raw data storage unit in a computer system |
US20070011373A1 (en) * | 2005-07-11 | 2007-01-11 | Dell Products L.P. | System and method for identifying inoperable connection points in a storage enclosure |
US20070033654A1 (en) * | 2005-08-03 | 2007-02-08 | International Business Machines Corporation | Method, system and program product for versioning access control settings |
US20070169081A1 (en) * | 2005-12-06 | 2007-07-19 | Dell Products L.P. | Method of defining packaging applicability |
US7383294B1 (en) | 1998-06-30 | 2008-06-03 | Emc Corporation | System for determining the mapping of logical objects in a data storage system |
US20120047401A1 (en) * | 2010-08-17 | 2012-02-23 | Hon Hai Precision Industry Co., Ltd. | Test device and test method for testing computing device |
US20120110211A1 (en) * | 2010-10-30 | 2012-05-03 | Lsi Corporation | Management of detected devices coupled to a host machine |
US8914610B2 (en) | 2011-08-26 | 2014-12-16 | Vmware, Inc. | Configuring object storage system for input/output operations |
US9134922B2 (en) | 2009-03-12 | 2015-09-15 | Vmware, Inc. | System and method for allocating datastores for virtual machines |
US20150304167A1 (en) * | 2014-04-22 | 2015-10-22 | International Business Machines Corporation | Accelerating device, connection and service discovery |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6654881B2 (en) * | 1998-06-12 | 2003-11-25 | Microsoft Corporation | Logical volume mount manager |
JP3980768B2 (en) * | 1998-09-02 | 2007-09-26 | 株式会社日立製作所 | Distributed processing system and cooperative method thereof |
US7430668B1 (en) * | 1999-02-15 | 2008-09-30 | Hewlett-Packard Development Company, L.P. | Protection of the configuration of modules in computing apparatus |
US6434697B1 (en) * | 1999-10-06 | 2002-08-13 | Micron Technology, Inc. | Apparatus for savings system configuration information to shorten computer system initialization time |
US6826715B1 (en) * | 1999-10-28 | 2004-11-30 | Hewlett-Packard Development Company, L.P. | Automatic capture and comparison of computer configuration data |
US7203868B1 (en) * | 1999-11-24 | 2007-04-10 | Unisys Corporation | Dynamic monitoring of resources using snapshots of system states |
US6684231B1 (en) * | 1999-11-29 | 2004-01-27 | Microsoft Corporation | Migration of friendly volumes |
US6553387B1 (en) * | 1999-11-29 | 2003-04-22 | Microsoft Corporation | Logical volume configuration data management determines whether to expose the logical volume on-line, off-line request based on comparison of volume epoch numbers on each extents of the volume identifiers |
US6904599B1 (en) * | 1999-11-29 | 2005-06-07 | Microsoft Corporation | Storage management system having abstracted volume providers |
US6883120B1 (en) * | 1999-12-03 | 2005-04-19 | Network Appliance, Inc. | Computer assisted automatic error detection and diagnosis of file servers |
WO2001063424A1 (en) * | 2000-02-24 | 2001-08-30 | Fujitsu Limited | Input/output controller, device identification method, and input/output control method |
US6813686B1 (en) | 2000-06-27 | 2004-11-02 | Emc Corporation | Method and apparatus for identifying logical volumes in multiple element computer storage domains |
US6708265B1 (en) | 2000-06-27 | 2004-03-16 | Emc Corporation | Method and apparatus for moving accesses to logical entities from one storage element to another storage element in a computer storage system |
US6978324B1 (en) * | 2000-06-27 | 2005-12-20 | Emc Corporation | Method and apparatus for controlling read and write accesses to a logical entity |
US7065610B1 (en) | 2000-06-27 | 2006-06-20 | Emc Corporation | Method and apparatus for maintaining inventory of logical volumes stored on storage elements |
US7225191B1 (en) | 2000-06-27 | 2007-05-29 | Emc Corporation | Method and apparatus for verifying storage access requests in a computer storage system with multiple storage elements |
US6842784B1 (en) | 2000-06-27 | 2005-01-11 | Emc Corporation | Use of global logical volume identifiers to access logical volumes stored among a plurality of storage elements in a computer storage system |
US6760828B1 (en) | 2000-06-27 | 2004-07-06 | Emc Corporation | Method and apparatus for using logical volume identifiers for tracking or identifying logical volume stored in the storage system |
US6912548B1 (en) * | 2000-06-27 | 2005-06-28 | Emc Corporation | Logical volume identifier database for logical volumes in a computer storage system |
US6721881B1 (en) * | 2000-09-29 | 2004-04-13 | Dell Products L.P. | System and method for determining if a display device configuration has changed by comparing a current indicator with a previously saved indicator |
US7519731B1 (en) * | 2000-12-01 | 2009-04-14 | Juniper Networks, Inc. | Comparing configuration information for a data forwarding device |
US6901534B2 (en) * | 2002-01-15 | 2005-05-31 | Intel Corporation | Configuration proxy service for the extended firmware interface environment |
US7219189B1 (en) * | 2002-05-31 | 2007-05-15 | Veritas Operating Corporation | Automatic operating system handle creation in response to access control changes |
US7395420B2 (en) * | 2003-02-12 | 2008-07-01 | Intel Corporation | Using protected/hidden region of a magnetic media under firmware control |
JP4305007B2 (en) * | 2003-03-05 | 2009-07-29 | 株式会社日立製作所 | System switching system, processing method therefor, and processing program therefor |
US7487500B1 (en) * | 2003-10-09 | 2009-02-03 | Nortel Networks Limited | System and method for installing and configuring software for a network element in an optical communications network |
US7523097B1 (en) * | 2004-01-13 | 2009-04-21 | Juniper Networks, Inc. | Restoration of archived configurations for a network device |
US20060047855A1 (en) | 2004-05-13 | 2006-03-02 | Microsoft Corporation | Efficient chunking algorithm |
US7430592B2 (en) * | 2004-04-21 | 2008-09-30 | Dell Products L.P. | Method for heterogeneous system configuration |
US20060031425A1 (en) * | 2004-06-07 | 2006-02-09 | Northrop Grumman Corporation | Method for imaging computer systems |
US7640454B1 (en) * | 2004-06-28 | 2009-12-29 | Symantec Operating Corporation | System and method for point-in-time recovery of application resource sets |
US8145601B2 (en) | 2004-09-09 | 2012-03-27 | Microsoft Corporation | Method, system, and apparatus for providing resilient data transfer in a data protection system |
US7631194B2 (en) * | 2004-09-09 | 2009-12-08 | Microsoft Corporation | Method, system, and apparatus for creating saved searches and auto discovery groups for a data protection system |
US7567974B2 (en) | 2004-09-09 | 2009-07-28 | Microsoft Corporation | Method, system, and apparatus for configuring a data protection system |
US7865470B2 (en) * | 2004-09-09 | 2011-01-04 | Microsoft Corporation | Method, system, and apparatus for translating logical information representative of physical data in a data protection system |
US7613787B2 (en) | 2004-09-24 | 2009-11-03 | Microsoft Corporation | Efficient algorithm for finding candidate objects for remote differential compression |
US20060218435A1 (en) * | 2005-03-24 | 2006-09-28 | Microsoft Corporation | Method and system for a consumer oriented backup |
US20070130376A1 (en) * | 2005-12-02 | 2007-06-07 | Samsung Electronics Co., Ltd. | Method and apparatus for setting configuration information |
TW200943052A (en) * | 2008-04-11 | 2009-10-16 | Asustek Comp Inc | System and method for tracking and recording system configurations of electronic devices |
US8074121B2 (en) * | 2009-12-09 | 2011-12-06 | International Business Machines Corporation | Automated information technology error and service request correlation |
US8713356B1 (en) | 2011-09-02 | 2014-04-29 | Emc Corporation | Error detection and recovery tool for logical volume management in a data storage system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5745669A (en) * | 1993-10-21 | 1998-04-28 | Ast Research, Inc. | System and method for recovering PC configurations |
US5913921A (en) * | 1996-07-12 | 1999-06-22 | Glenayre Electronics, Inc. | System for communicating information about nodes configuration by generating advertisements having era values for identifying time reference for which the configuration is operative |
-
1998
- 1998-12-14 US US09/211,131 patent/US6240511B1/en not_active Expired - Lifetime
-
2001
- 2001-03-20 US US09/812,743 patent/US20010011348A1/en not_active Abandoned
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6542909B1 (en) * | 1998-06-30 | 2003-04-01 | Emc Corporation | System for determining mapping of logical objects in a computer system |
US20030130986A1 (en) * | 1998-06-30 | 2003-07-10 | Tamer Philip E. | System for determining the mapping of logical objects in a data storage system |
US6938059B2 (en) | 1998-06-30 | 2005-08-30 | Emc Corporation | System for determining the mapping of logical objects in a data storage system |
US7383294B1 (en) | 1998-06-30 | 2008-06-03 | Emc Corporation | System for determining the mapping of logical objects in a data storage system |
US7155558B1 (en) * | 2004-07-21 | 2006-12-26 | Vmware, Inc. | Providing access to a raw data storage unit in a computer system |
US7269683B1 (en) * | 2004-07-21 | 2007-09-11 | Vm Ware, Inc. | Providing access to a raw data storage unit in a computer system |
US20070011373A1 (en) * | 2005-07-11 | 2007-01-11 | Dell Products L.P. | System and method for identifying inoperable connection points in a storage enclosure |
US8332560B2 (en) * | 2005-07-11 | 2012-12-11 | Dell Products L.P. | System and method for identifying inoperable connection points in a storage enclosure |
US20070033654A1 (en) * | 2005-08-03 | 2007-02-08 | International Business Machines Corporation | Method, system and program product for versioning access control settings |
US8539604B2 (en) | 2005-08-03 | 2013-09-17 | International Business Machines Corporation | Method, system and program product for versioning access control settings |
US20070169081A1 (en) * | 2005-12-06 | 2007-07-19 | Dell Products L.P. | Method of defining packaging applicability |
US7676803B2 (en) * | 2005-12-06 | 2010-03-09 | Dell Products L.P. | Method of defining packaging applicability |
US9134922B2 (en) | 2009-03-12 | 2015-09-15 | Vmware, Inc. | System and method for allocating datastores for virtual machines |
US20120047401A1 (en) * | 2010-08-17 | 2012-02-23 | Hon Hai Precision Industry Co., Ltd. | Test device and test method for testing computing device |
US8738965B2 (en) * | 2010-08-17 | 2014-05-27 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Test method and test device for restarting a computer based on a hardware information comparison and a restart count |
US8738816B2 (en) * | 2010-10-30 | 2014-05-27 | Lsi Corporation | Management of detected devices coupled to a host machine |
US20120110211A1 (en) * | 2010-10-30 | 2012-05-03 | Lsi Corporation | Management of detected devices coupled to a host machine |
US8914610B2 (en) | 2011-08-26 | 2014-12-16 | Vmware, Inc. | Configuring object storage system for input/output operations |
US20150304167A1 (en) * | 2014-04-22 | 2015-10-22 | International Business Machines Corporation | Accelerating device, connection and service discovery |
US10033583B2 (en) * | 2014-04-22 | 2018-07-24 | International Business Machines Corporation | Accelerating device, connection and service discovery |
Also Published As
Publication number | Publication date |
---|---|
US6240511B1 (en) | 2001-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6240511B1 (en) | Method and apparatus for detecting system configuration changes | |
US6931440B1 (en) | Method and apparatus for dynamically determining whether access to a resource connected to a computer has changed and determining how to access the resource with a new identifier | |
US6629189B1 (en) | Method and apparatus for managing target devices in a multi-path computer system | |
US7181553B2 (en) | Method and apparatus for identifying multiple paths to discovered SCSI devices and specific to set of physical path information | |
US7516353B2 (en) | Fall over method through disk take over and computer system having failover function | |
US7934119B2 (en) | Failure recovery method | |
US7596637B2 (en) | Storage apparatus and control method for the same, and computer program product | |
US20020099914A1 (en) | Method of creating a storage area & storage device | |
US20050246491A1 (en) | Storage unit, installation method thereof and installation program therefore | |
US20060155837A1 (en) | Diskless computer operation management system | |
US20030154267A1 (en) | Storage area network methods and apparatus for dynamically enabled storage device masking | |
US8103828B2 (en) | Virtualization method and storage apparatus for a storage system having external connectivity | |
US6356979B1 (en) | System and method for selectively presenting logical storage units to multiple host operating systems in a networked computing system | |
US7478267B2 (en) | Access control device and interface installed in same | |
US7117141B2 (en) | Disk array apparatus setting method, program, information processing apparatus and disk array apparatus | |
US7739543B1 (en) | System and method for transport-level failover for loosely coupled iSCSI target devices | |
US7610295B2 (en) | Method and apparatus for generating persistent path identifiers | |
US6842810B1 (en) | Restricted access devices | |
US6351782B1 (en) | Method of sharing an I/O device between a host operating system and a foreign operating system in a single computer | |
JP2004152275A (en) | Storage area network (san) mapping | |
US20040064828A1 (en) | Supplanting first device objects with second device objects | |
JP2001188716A (en) | Connectivity exchange simulation device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BLUMENAU, STEVEN M.;COHEN, STEVEN;MADDEN, JOHN F. JR.;REEL/FRAME:011628/0955 Effective date: 19981211 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |