US20010011348A1 - Method and apparatus for detecting system configuration changes - Google Patents

Method and apparatus for detecting system configuration changes Download PDF

Info

Publication number
US20010011348A1
US20010011348A1 US09/812,743 US81274301A US2001011348A1 US 20010011348 A1 US20010011348 A1 US 20010011348A1 US 81274301 A US81274301 A US 81274301A US 2001011348 A1 US2001011348 A1 US 2001011348A1
Authority
US
United States
Prior art keywords
configuration
computer system
computer
host computer
logical volume
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/812,743
Inventor
Steven Blumenau
Steven Cohen
John Madden
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EMC Corp
Original Assignee
EMC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EMC Corp filed Critical EMC Corp
Priority to US09/812,743 priority Critical patent/US20010011348A1/en
Assigned to EMC CORPORATION reassignment EMC CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLUMENAU, STEVEN M., COHEN, STEVEN, MADDEN, JOHN F. JR.
Publication of US20010011348A1 publication Critical patent/US20010011348A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Definitions

  • the present invention is directed to a method and apparatus for detecting changes in a configuration of a computer system.
  • FIG. 1 An example of such a computer system is shown in FIG. 1, and includes a host computer 1 and a storage system 3 that serves as a system resource accessible by the host computer 1 .
  • the storage system 3 includes a plurality of storage devices on which data are stored.
  • the storage system 3 includes a plurality of disk drives 5 a and 5 b and a plurality of disk controllers 7 a - 7 b that respectively control access to the disk drives 5 a and 5 b.
  • the storage system 3 further includes a plurality of storage bus directors 9 a - d that control communication with the host computer 1 over communication buses 17 a - d.
  • Communications buses 17 a - d interface to the storage system 3 through ports 18 a - d.
  • the storage system 3 includes an internal bus 13 over which the storage bus directors 9 a - d and the disk controllers 7 a - 7 b communicate.
  • the host computer 1 includes a processor 16 and one or more host bus adapters 15 a - d that each controls communication between the processor 16 and the storage system 3 via a corresponding one of the communication buses 17 a - d. It should be appreciated that rather than a single processor 16 , the host computer 1 can include multiple processors. Each of the buses 17 a - d can be any of a number of different types of communication links, with each of the host bus adapters 15 a - d and the storage bus directors 9 a - d being adapted to communicate using an appropriate protocol for the communication bus coupled between them.
  • each of the communication buses 17 a - d can be implemented as a SCSI bus, with the directors 9 a - d and adapters 15 a - d each being a SCSI driver.
  • communication between the host computer 1 and the storage system 3 can be performed over a Fibre Channel fabric, where the buses 17 a - d are Fibre Channel links.
  • each path includes one of the host bus adapters 15 a - d, one of the buses 17 a - d, one of the ports 18 a - d, and one of the storage bus directors 9 a - d in FIG. 1).
  • each of the host bus adapters 15 a - d has the ability to access each of the disk drives 5 a - b, through an appropriate storage bus director and disk controller.
  • FIG. 2 is a schematic representation of a number of mapping layers that may exist in a computer system such as the one shown in FIG. 1.
  • the mapping layers include an application layer 21 which includes application programs executing on the processor 16 of the host computer 1 .
  • the application layer 21 will generally refer to data objects used thereby with a label or identifier such as a file name, and will have no knowledge about where the corresponding file is physically stored on the storage system 3 (FIG. 1).
  • the host computer 1 also includes a file system and/or logical volume manager (LVM) layer 23 that maps each data object specified by the application layer 21 to a particular logical volume (that the host computer 1 perceives to correspond to an actual physical storage device) wherein the data object is stored.
  • LVM logical volume manager
  • the file system/LVM layer 23 will generally refer to a logical volume (also referred herein as a “raw storage device”) using a label or identifier that is at least partially descriptive of a physical component of the computer system that is used by the host computer 1 when accessing the logical volume.
  • the physically descriptive information may include, for example, information descriptive of the one of the multiple paths via which the logical volume may be accessed, as well as a unique identifier for the raw storage device.
  • the device identifier “/dev/dsk/c 0 t 0 d 0 ” may be used to refer to a raw storage device or logical volume accessible at a channel zero (c 0 ) (which can be any of the multiple paths in FIG. 1), and having a target number zero (t 0 ) and a logical unit number (LUN) zero (d 0 ) that together uniquely identify the raw storage device.
  • a multi-path mapping layer 25 that maps the logical volume address specified by the file system/LVM layer 23 , through a particular one of the multiple system paths, to the logical volume address to be presented to the storage system 3 .
  • the multi-path mapping layer 25 not only specifies a particular logical volume address, but also specifies a particular one of the multiple system paths used to access the specified logical volume.
  • the storage system 3 were not an intelligent storage system, the logical volume address specified by the multi-pathing layer 25 would identify a particular raw physical device (e.g., one of the disk drives 5 a - b ) within the storage system 3 .
  • the storage system itself may include a further mapping layer 27 , such that the logical volume address passed from the host computer 1 may not correspond directly to an actual physical device (e.g., a disk drive 5 a - b ) in the storage system 3 . Rather, a logical volume specified by the host computer 1 can be spread across multiple physical storage devices (e.g., disk drives 5 a - b ) or multiple logical volumes accessed by the host computer 1 can be stored on a single physical storage device.
  • Fibre Channel is a communication protocol that enables computer system components that were previously incapable of communicating to be coupled together in a manner that enables communication therebetween. For example, using Fibre Channel a first computer system resource that communicates using SCSI can communicate with a second computer system resource that communicates using Ethernet.
  • FIG. 4 An example of a computer system implemented using Fibre Channel is shown in FIG. 4, wherein a host computer 1 is coupled to a storage system 3 via a Fibre Channel cloud 100 .
  • the Fibre Channel cloud 100 can include a number of switching and hub components, such that the host computer 1 and the storage system 3 can communicate with other system components via the cloud 100 .
  • the host computer 1 when the computer system of FIG. 4 is brought on line, the host computer 1 will be booted or initialized, and will go through a process of assigning device identifiers (e.g., “/dev/dsk/c 0 t 0 d 0 ” as discussed above), to each raw storage device or logical volume accessible to the host computer through the Fibre Channel cloud 100 .
  • device identifiers e.g., “/dev/dsk/c 0 t 0 d 0 ” as discussed above
  • the assignment of a particular one of the communication paths 102 a - d as channel c 0 is fairly arbitrary, and is not initially significant, so long as each of the paths 102 a - d is assigned a unique channel number. Referring to the illustrative example shown in FIG.
  • the communication path 102 a initially may be assigned channel designation c 0 and communication path 102 b initially may be assigned channel designation c 1 .
  • a first logical volume 104 is made visible to the Fibre Channel cloud 100 over a port (not shown) of the storage system 3 that is coupled to path 102 a, and a second logical volume 106 is made visible via a port (not shown) coupled to path 102 b.
  • the logical volume 104 may be identified by an operating system on the host computer 1 using a device identifier “/dev/dsk/c 0 t 0 d 0 ,” and the logical volume 106 may be identified using the device identifier “/dev/dsk/c 1 t 0 d 0 ”.
  • events can occur that may change the physical configuration of the computer system shown in FIG. 1, which may require a rebooting of the host computer 1 .
  • one such reconfiguration change may be caused by a failure of the port on the storage system 3 that is coupled to the path 102 a. If such a failure were to occur, the storage system 3 can be reconfigured so that the logical volume 104 can be exported from the storage system 3 over the port coupled to the path 102 b.
  • the host computer 1 would generally need to be rebooted to recognize the reconfigured nature of the computer system.
  • the path 102 a will no longer be recognized, such that upon reinitialization, a different channel number may be assigned to each of the paths 102 b - f.
  • the path 102 b may be the first channel recognized by the host computer 1 when it reboots, causing this channel to now be identified as channel c 0 .
  • the device identifier for logical volume 106 could change to “/dev/dsk/c 0 t 0 d 9 ”
  • the device identifier for logical volume 104 could change to “/dev/dsk/c 0 t 1 d 0 ”.
  • the file system LVM layer 23 executing on the host computer 1 accesses a particular logical volume using the device identifier assigned by the operating system.
  • the device identifier for each of the logical volumes 104 and 106 will have changed between the time when the host computer 1 was initially booted, and the time when it is rebooted following the change in the physical configuration of the system. It should be appreciated that this can cause significant problems for applications executing on the host computer 1 . For example, an application program that is executing on the host computer 1 and that stores a particular data file in logical volume 104 .
  • the device identifier previously used by the file system/LVM mapping layer 23 to access logical volume 104 (e.g., “/dev/dsk/c 0 t 0 d 0 ” in the example discussed above) will now, unknown to the application program, actually map to the logical volume 106 . Therefore, when performing reads, the application program will actually read the wrong data, and when performing writes, the application program will be overwriting the wrong data in the storage system 3 .
  • One illustrative embodiment of the invention is directed to a method of detecting changes in a configuration of a computer system including a host computer and at least one computer system resource.
  • the method comprises steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration.
  • Another illustrative embodiment of the invention is directed to a computer readable medium encoded with a program for execution on a host computer in a computer system including the host computer and at least one computer system resource.
  • the program when executed on the computer, performs a method of detecting changes in a configuration of the computer system, the method comprising steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration.
  • a further illustrative embodiment of the invention is directed to a host computer for use in a computer system including the host computer and at least one computer system resource.
  • the host computer comprises: storing means for storing information relating to a reference configuration of the computer system at a first point in time; determining means for determining a current configuration of the computer system at a second point in time; comparing means for comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and providing means for providing an indication when the current configuration of the computer system differs from the reference configuration.
  • FIG. 1 is a block diagram of an exemplary computer system on which aspects of the present invention can be implemented
  • FIG. 2 is a schematic representation of a number of mapping layers that exist in a known computing system
  • FIG. 3 is a block diagram of a host computer including elements suitable for implementing an embodiment of the present invention.
  • FIG. 4 is a block diagram of a Fibre Channel computer system.
  • a method and apparatus is provided to detect changes in a configuration of a computer system, and to provide an indication that changes to the configuration of the computer system have been detected. This can be done in any number of ways, and the present invention is not limited to any particular implementation.
  • information relating to a known configuration of the computer system is stored at a reference point in time. Thereafter (e.g., in response to a rebooting of the host computer), a current configuration of the computer system is determined. The current configuration of the computer system is compared with the reference (stored) configuration of the computer system to determine whether the current configuration differs from the reference configuration, and when it does, an indication of this difference is provided.
  • a configuration capture program 30 is provided on the host computer 1 .
  • the user may instruct the configuration capture program 30 to collect and store information relating to the then current configuration of the computer system at that reference point in time. As discussed below, this stored information can be used to identify a reference configuration.
  • the configuration capture program 30 may store the information descriptive of the reference configuration in any of numerous ways and on any type of storage medium. For example, the information can be stored in a configuration file 32 on an hard disk 34 internal to the host computer 1 .
  • the configuration capture program 30 may, for example, collect configuration information descriptive of the current configuration of the computer system in any of numerous ways.
  • the configuration capture program 30 may obtain from the operating system 36 of the host computer 1 the unique identifier for each device accessible by the host computer 1 .
  • the operating system 36 of the host computer 1 will typically maintain a device directory 38 including information descriptive of each device which the operating system 36 recognizes as being accessible by the host computer.
  • Each device identifier typically includes information descriptive of a physical path, port, or link by which the host computer accesses the device.
  • the device identifier “/dev/dsk/c 1 t 0 d 0 ” may be the device identifier of a device that is accessed by the host computer 1 on channel number one (c 1 ), and has a target number (t 0 ) and LUN (dO) zero within the storage system 3 .
  • the configuration capture program 30 may use the identifier to access the device for the purpose of obtaining additional information pertaining thereto.
  • the additional information that the capture program 30 can access for a particular device will vary depending upon the nature of the system resource. Thus, the present invention is not limited to accessing additional information of any particular type.
  • the configuration capture program 30 may use a device identifier to access from the storage system 3 information that uniquely identifies the raw storage device or logical volume corresponding thereto.
  • each logical volume will typically include a label that is unique within the storage system 3 and identifies the logical volume.
  • multiple storage systems 3 may be accessible by the host computer 1 .
  • each storage system 3 may also be provided with a unique identifier (e.g., a serial number), such that each logical volume in the computer system can be identified by the serial number of the storage system in which it is included, in conjunction with the unique identifier of the logical volume within that storage system.
  • the configuration capture program 30 may store that information in a manner that is associated with the corresponding device identifier that the operating system uses to identify that device in the current configuration of the system. This can be done for each device accessible to the host computer 1 (e.g., for each device in the device directory 38 ). This associated data set can be stored in the configuration file 32 and serves to identify the reference configuration, which can be used for comparison purposes in a manner discussed below.
  • the configuration of the computer system will change after the configuration file 32 is saved.
  • one of the ports 18 a - d on the storage system 3 may malfunction, causing the port and storage devices normally accessible through that port to become inaccessible to the host computer 1 .
  • Another exemplary way in which the configuration of the computer system may change is that the links between the host computer 1 and the storage system 3 may be reconfigured.
  • Yet another exemplary way in which the configuration of the computer system may change is that logical volumes within the storage system 3 may be added, removed, or exported through a different port on the same or another storage system, thereby causing the contents of the host computer's operating system device directory 38 to change.
  • a logical volume which was previously accessible using a particular channel, target, and LUN will no longer be accessible using that identifier, but rather will be accessible at a different channel, target, and LUN.
  • application programs on the host computer 1 will, via the file system/LVM mapping layer 23 , continue to access the logical volume using the old channel, target and LUN identifier, which can cause problems. For example, if no logical volume is accessible at the old channel, target and LUN, any attempt to access the logical volume at that channel, target and old identifier will result in an error.
  • changes to the configuration of the computer system are detected and an indication that the configuration of the computer system has changed is provided.
  • This detection can be done in numerous ways.
  • the host computer 1 can be provided with a configuration comparison program 40 that can compare the current (i.e., at the time the program is run) configuration of the computer system with the reference configuration (stored in the manner discussed above) to determine whether any changes have occurred.
  • the configuration comparison program 40 can be executed whenever it is desired to check the configuration of the system.
  • the comparison program 40 is executed each time the host computer 1 is rebooted, but it should be appreciated that the present invention is not limited in this respect.
  • the configuration comparison program 40 determines a current configuration of the computer system, and compares the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration.
  • the configuration comparison program 40 may, for example, determine the current configuration of the computer system in the same manner as that described above with respect to the configuration capture program 30 .
  • the configuration comparison program 40 may, for example, compare the current configuration of the computer system with a reference configuration by retrieving the stored information descriptive of the reference configuration from the configuration file 32 .
  • the configuration comparison program 40 may detect, for example, whether new devices are present, old devices have been deleted, or existing devices have moved. When doing so, the configuration comparison program 40 may examine the information for both the current and reference configurations that identifies devices in a manner that is not dependent upon the physical configuration of the computer system (e.g., using the storage system serial number and unique logical volume identifier discussed above). Thus, the status of a device is not determined based on the operating system device identifier which is dependent upon the system configuration, but rather, is based upon information that uniquely identifies the device in a manner that is independent of the configuration of the system.
  • an indication is provided by the configuration comparison program 40 when the current configuration of the computer system differs from a reference configuration.
  • the configuration comparison program may provide an indication when the channel through which a particular logical volume is accessible has changed, when a previously accessible logical volume is no longer accessible, or when any other change to the configuration of the computer system is detected.
  • the indication that the current configuration of the computer system differs from the reference configuration may be provided in any manner, and the present invention is not limited to any particular technique.
  • a text file descriptive of the differences between the current configuration of the computer system and the reference configuration may be generated.
  • the indication may be provided to a human operator by, for example, displaying such a text file on a computer monitor 42 , printing the text file on a printer 44 , or sending the text file to a human operator in an e-mail message via a modem 46 .
  • the human operator may use the information contained within the indication provided by the configuration comparison program 40 to determine what steps, if any, to take in response to the changes in the computer system's configuration to avoid system errors.
  • the operator may, for example, reconfigure the file system/LVM mapping layer 23 to refer to devices using their new device identifiers.
  • the configuration comparison program 40 executes every time the host computer 1 is rebooted, halts the rebooting of the host computer 1 when it is determined that the current configuration of the computer system differs from the reference configuration, and provides an indication that the configuration of the system has changed.
  • the configuration comparison program 40 may then allow a human operator to disregard the message and continue the bootup process.
  • the configuration comparison program 40 may be implemented to provide an indication of all differences detected between the current configuration of the computer system and the reference configuration, or it may be implemented to provide an indication of only certain types of differences. For example, in a computer system that includes a number of system resources connected to a host computer, in one embodiment of the present invention, the configuration comparison program 40 only provides an indication of differences impacting raw storage devices or logical volumes included in a storage system 3 .
  • FIG. 4 The illustrative embodiments of the present invention discussed above have been described in connection with an illustrative system such as that shown in FIG. 4, wherein the computer system includes a host computer 1 and a computer system resource that is a storage system 3 such as that shown in FIG. 1.
  • the present invention is not limited in this respect, and that the aspects of the present invention described above can be used in connection with computer systems having numerous other configurations, so that the host computer 1 can determine system configuration changes in connection with numerous system resources other than a storage system 3 .
  • Fibre Channel has provided an environment wherein system configuration changes have become more prevalent, such that the embodiments of the present invention discussed above can be advantageous when used in connection with a Fibre Channel system.
  • the present invention is not limited in this respect, and can be used in connection with numerous other system configurations that do not employ the Fibre Channel protocol.
  • the present invention is not limited to use with any particular computer platform, computer processor, or high-level programming language. Although aspects of the present invention are discussed above as being implemented in a programmed processor, elements of the invention may be implemented in software, hardware, firmware, or any combination thereof. The various elements of the invention, either individually or in combination, may be implemented as a computer program product tangibly embodied in a machine-readable storage device for execution by a computer processor such as the processor 16 shown in FIG. 1.
  • a computer processor executing a program (i.e., software or firmware) tangibly embodied on a computer-readable medium to perform functions by operating on input and generating output.
  • the computer-readable medium may be a memory in the host computer 1 (FIG. 1), or a transportable medium such as a compact disk, a floppy disk, or a diskette, such that a computer program embodying the aspect of the present invention can be loaded onto any computer.
  • the computer program is not limited to any particular embodiment and may, for example, include an application program, foreground or background process, driver, or any combination thereof, executing on a single computer processor or multiple computer processors.
  • Computer programming languages suitable for implementing such a system include procedural programming languages, object-oriented programming languages, and any combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Stored Programmes (AREA)

Abstract

Method and apparatus for detecting changes in a configuration of a computer system including a host computer and at least one computer system resource. Information relating to a reference configuration of the computer system is stored at a first point in time. A current configuration of the computer system is determined at a second point in time. The current configuration of the computer system is compared with the reference configuration to determine whether the current configuration differs from the reference configuration. An indication is provided when the current configuration of the computer system differs from the reference configuration.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of Ser. No. 09/211,311, entitled METHOD AND APPARATUS FOR DETECTING SYSTEM CONFIGURATION CHANGES, filed Dec. 4, 1998, now pending. [0001]
  • FIELD OF THE INVENTION
  • The present invention is directed to a method and apparatus for detecting changes in a configuration of a computer system. [0002]
  • DESCRIPTION OF THE RELATED ART
  • Many computer systems include one or more host computers and one or more system resources that are accessible thereby. An example of such a computer system is shown in FIG. 1, and includes a [0003] host computer 1 and a storage system 3 that serves as a system resource accessible by the host computer 1. The storage system 3 includes a plurality of storage devices on which data are stored. In the exemplary system shown in FIG. 1, the storage system 3 includes a plurality of disk drives 5 a and 5 b and a plurality of disk controllers 7 a-7 b that respectively control access to the disk drives 5 a and 5 b. The storage system 3 further includes a plurality of storage bus directors 9 a-d that control communication with the host computer 1 over communication buses 17 a-d. Communications buses 17 a-d interface to the storage system 3 through ports 18 a-d. Finally, the storage system 3 includes an internal bus 13 over which the storage bus directors 9 a-d and the disk controllers 7 a-7 b communicate.
  • The [0004] host computer 1 includes a processor 16 and one or more host bus adapters 15 a-d that each controls communication between the processor 16 and the storage system 3 via a corresponding one of the communication buses 17 a-d. It should be appreciated that rather than a single processor 16, the host computer 1 can include multiple processors. Each of the buses 17 a-d can be any of a number of different types of communication links, with each of the host bus adapters 15 a-d and the storage bus directors 9 a-d being adapted to communicate using an appropriate protocol for the communication bus coupled between them. For example, each of the communication buses 17 a-d can be implemented as a SCSI bus, with the directors 9 a-d and adapters 15 a-d each being a SCSI driver. Alternatively, communication between the host computer 1 and the storage system 3 can be performed over a Fibre Channel fabric, where the buses 17 a-d are Fibre Channel links.
  • As shown in the exemplary system of FIG. 1, some computer systems employ multiple paths for communicating between the [0005] host computer 1 and the storage system 3 (e.g., each path includes one of the host bus adapters 15 a-d, one of the buses 17 a-d, one of the ports 18 a-d, and one of the storage bus directors 9 a-d in FIG. 1). In some such systems, each of the host bus adapters 15 a-d has the ability to access each of the disk drives 5 a-b, through an appropriate storage bus director and disk controller.
  • FIG. 2 is a schematic representation of a number of mapping layers that may exist in a computer system such as the one shown in FIG. 1. The mapping layers include an [0006] application layer 21 which includes application programs executing on the processor 16 of the host computer 1. The application layer 21 will generally refer to data objects used thereby with a label or identifier such as a file name, and will have no knowledge about where the corresponding file is physically stored on the storage system 3 (FIG. 1). In addition, the host computer 1 also includes a file system and/or logical volume manager (LVM) layer 23 that maps each data object specified by the application layer 21 to a particular logical volume (that the host computer 1 perceives to correspond to an actual physical storage device) wherein the data object is stored. The file system/LVM layer 23 will generally refer to a logical volume (also referred herein as a “raw storage device”) using a label or identifier that is at least partially descriptive of a physical component of the computer system that is used by the host computer 1 when accessing the logical volume. The physically descriptive information may include, for example, information descriptive of the one of the multiple paths via which the logical volume may be accessed, as well as a unique identifier for the raw storage device. For example, for a SCSI connection, the device identifier “/dev/dsk/c0t0d0” may be used to refer to a raw storage device or logical volume accessible at a channel zero (c0) (which can be any of the multiple paths in FIG. 1), and having a target number zero (t0) and a logical unit number (LUN) zero (d0) that together uniquely identify the raw storage device.
  • Below the file system/[0007] LVM layer 23 is a multi-path mapping layer 25 that maps the logical volume address specified by the file system/LVM layer 23, through a particular one of the multiple system paths, to the logical volume address to be presented to the storage system 3. Thus, the multi-path mapping layer 25 not only specifies a particular logical volume address, but also specifies a particular one of the multiple system paths used to access the specified logical volume.
  • If the [0008] storage system 3 were not an intelligent storage system, the logical volume address specified by the multi-pathing layer 25 would identify a particular raw physical device (e.g., one of the disk drives 5 a-b) within the storage system 3. However, in an intelligent storage system such as that shown in FIG. 1, the storage system itself may include a further mapping layer 27, such that the logical volume address passed from the host computer 1 may not correspond directly to an actual physical device (e.g., a disk drive 5 a-b) in the storage system 3. Rather, a logical volume specified by the host computer 1 can be spread across multiple physical storage devices (e.g., disk drives 5 a-b) or multiple logical volumes accessed by the host computer 1 can be stored on a single physical storage device.
  • As discussed above, application programs running in the [0009] application layer 21 typically access logical volumes within the storage system 3 via the file system/LVM layer 23, which uses device identifiers for the logical volumes that include information descriptive of a physical component of the computer system through which the logical volumes are accessed. This can cause problems when changes are made to the physical configuration of the computer system. User flexibility in reconfiguring a computer system has become more and more prevalent with the advent of Fibre Channel. Fibre Channel is a communication protocol that enables computer system components that were previously incapable of communicating to be coupled together in a manner that enables communication therebetween. For example, using Fibre Channel a first computer system resource that communicates using SCSI can communicate with a second computer system resource that communicates using Ethernet. An example of a computer system implemented using Fibre Channel is shown in FIG. 4, wherein a host computer 1 is coupled to a storage system 3 via a Fibre Channel cloud 100. It should be appreciated that the Fibre Channel cloud 100 can include a number of switching and hub components, such that the host computer 1 and the storage system 3 can communicate with other system components via the cloud 100.
  • It should be appreciated that when the computer system of FIG. 4 is brought on line, the [0010] host computer 1 will be booted or initialized, and will go through a process of assigning device identifiers (e.g., “/dev/dsk/c0t0d0” as discussed above), to each raw storage device or logical volume accessible to the host computer through the Fibre Channel cloud 100. It should be appreciated that the assignment of a particular one of the communication paths 102 a-d as channel c0 is fairly arbitrary, and is not initially significant, so long as each of the paths 102 a-d is assigned a unique channel number. Referring to the illustrative example shown in FIG. 4, during initialization, the communication path 102 a initially may be assigned channel designation c0 and communication path 102 b initially may be assigned channel designation c1. A first logical volume 104 is made visible to the Fibre Channel cloud 100 over a port (not shown) of the storage system 3 that is coupled to path 102 a, and a second logical volume 106 is made visible via a port (not shown) coupled to path 102 b. Thus, during initialization, the logical volume 104 may be identified by an operating system on the host computer 1 using a device identifier “/dev/dsk/c0t0d0,” and the logical volume 106 may be identified using the device identifier “/dev/dsk/c1t0d0”.
  • It should be appreciated that events can occur that may change the physical configuration of the computer system shown in FIG. 1, which may require a rebooting of the [0011] host computer 1. For example, one such reconfiguration change may be caused by a failure of the port on the storage system 3 that is coupled to the path 102 a. If such a failure were to occur, the storage system 3 can be reconfigured so that the logical volume 104 can be exported from the storage system 3 over the port coupled to the path 102 b. Thus, after reconfiguration of the storage system 3, the host computer 1 would generally need to be rebooted to recognize the reconfigured nature of the computer system. In doing so, it should be appreciated that the path 102 a will no longer be recognized, such that upon reinitialization, a different channel number may be assigned to each of the paths 102 b-f. For example, the path 102 b may be the first channel recognized by the host computer 1 when it reboots, causing this channel to now be identified as channel c0. As a result of this reinitialization, the device identifier for logical volume 106 could change to “/dev/dsk/c0t0d9”, and the device identifier for logical volume 104 could change to “/dev/dsk/c0t1d0”.
  • As discussed above, the file [0012] system LVM layer 23 executing on the host computer 1 accesses a particular logical volume using the device identifier assigned by the operating system. However, it should be appreciated that as a result of the change to the physical configuration of the computer system, the device identifier for each of the logical volumes 104 and 106 will have changed between the time when the host computer 1 was initially booted, and the time when it is rebooted following the change in the physical configuration of the system. It should be appreciated that this can cause significant problems for applications executing on the host computer 1. For example, an application program that is executing on the host computer 1 and that stores a particular data file in logical volume 104. After the reconfiguration of the storage system 3 and the resulting reboot of the host computer 1, the device identifier previously used by the file system/LVM mapping layer 23 to access logical volume 104 (e.g., “/dev/dsk/c0t0d0” in the example discussed above) will now, unknown to the application program, actually map to the logical volume 106. Therefore, when performing reads, the application program will actually read the wrong data, and when performing writes, the application program will be overwriting the wrong data in the storage system 3.
  • It should be appreciated from the foregoing that the use of device identifiers that include information that is dependent upon a physical component of the computer system used to access the logical volume or raw storage device can lead to problems when the system is reconfigured, because the device identifiers for one or more logical volumes can change in a manner that is typically not communicated to the application layer [0013] 21 (FIG. 2). This can result in the wrong data being accessed for a read or write, or can result in a logical volume becoming inaccessible to an application program which is not capable of accessing the logical volume via its new device identifier.
  • SUMMARY
  • One illustrative embodiment of the invention is directed to a method of detecting changes in a configuration of a computer system including a host computer and at least one computer system resource. The method comprises steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration. [0014]
  • Another illustrative embodiment of the invention is directed to a computer readable medium encoded with a program for execution on a host computer in a computer system including the host computer and at least one computer system resource. The program, when executed on the computer, performs a method of detecting changes in a configuration of the computer system, the method comprising steps of: (A) storing information relating to a reference configuration of the computer system at a first point in time; (B) determining a current configuration of the computer system at a second point in time; (C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and (D) providing an indication when the current configuration of the computer system differs from the reference configuration. [0015]
  • A further illustrative embodiment of the invention is directed to a host computer for use in a computer system including the host computer and at least one computer system resource. The host computer comprises: storing means for storing information relating to a reference configuration of the computer system at a first point in time; determining means for determining a current configuration of the computer system at a second point in time; comparing means for comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and providing means for providing an indication when the current configuration of the computer system differs from the reference configuration. [0016]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of an exemplary computer system on which aspects of the present invention can be implemented; [0017]
  • FIG. 2 is a schematic representation of a number of mapping layers that exist in a known computing system; [0018]
  • FIG. 3 is a block diagram of a host computer including elements suitable for implementing an embodiment of the present invention; and [0019]
  • FIG. 4 is a block diagram of a Fibre Channel computer system. [0020]
  • DETAILED DESCRIPTION
  • In accordance with one illustrative embodiment of the invention, a method and apparatus is provided to detect changes in a configuration of a computer system, and to provide an indication that changes to the configuration of the computer system have been detected. This can be done in any number of ways, and the present invention is not limited to any particular implementation. In accordance with one embodiment of the invention, information relating to a known configuration of the computer system is stored at a reference point in time. Thereafter (e.g., in response to a rebooting of the host computer), a current configuration of the computer system is determined. The current configuration of the computer system is compared with the reference (stored) configuration of the computer system to determine whether the current configuration differs from the reference configuration, and when it does, an indication of this difference is provided. [0021]
  • Information relating to a reference configuration of the computer system may be gathered in any of numerous ways, and the present invention is not limited to any particular implementation. In one embodiment of the invention shown in FIG. 3, a [0022] configuration capture program 30 is provided on the host computer 1. When a user determines that the computer system is configured properly, the user may instruct the configuration capture program 30 to collect and store information relating to the then current configuration of the computer system at that reference point in time. As discussed below, this stored information can be used to identify a reference configuration. The configuration capture program 30 may store the information descriptive of the reference configuration in any of numerous ways and on any type of storage medium. For example, the information can be stored in a configuration file 32 on an hard disk 34 internal to the host computer 1.
  • The [0023] configuration capture program 30 may, for example, collect configuration information descriptive of the current configuration of the computer system in any of numerous ways. For example, the configuration capture program 30 may obtain from the operating system 36 of the host computer 1 the unique identifier for each device accessible by the host computer 1. The operating system 36 of the host computer 1 will typically maintain a device directory 38 including information descriptive of each device which the operating system 36 recognizes as being accessible by the host computer. Each device identifier typically includes information descriptive of a physical path, port, or link by which the host computer accesses the device. For example, the device identifier “/dev/dsk/c1t0d0” may be the device identifier of a device that is accessed by the host computer 1 on channel number one (c1), and has a target number (t0) and LUN (dO) zero within the storage system 3.
  • Once the [0024] configuration capture program 30 has the device identifier for a device, it may use the identifier to access the device for the purpose of obtaining additional information pertaining thereto. The additional information that the capture program 30 can access for a particular device will vary depending upon the nature of the system resource. Thus, the present invention is not limited to accessing additional information of any particular type. In accordance with one illustrative embodiment of the invention, it is desirable to retrieve additional information that uniquely identifies the device in a manner that is not dependent upon the physical configuration of the computer system. For example, when the computer system resource is a storage system 3 such as that shown in FIG. 1, the configuration capture program 30 may use a device identifier to access from the storage system 3 information that uniquely identifies the raw storage device or logical volume corresponding thereto. In a storage system 3 such as that shown in FIG. 1, each logical volume will typically include a label that is unique within the storage system 3 and identifies the logical volume. However, it should be appreciated that in some computer systems, multiple storage systems 3 may be accessible by the host computer 1. To handle such a system configuration, each storage system 3 may also be provided with a unique identifier (e.g., a serial number), such that each logical volume in the computer system can be identified by the serial number of the storage system in which it is included, in conjunction with the unique identifier of the logical volume within that storage system.
  • After the additional information is retrieved from the device to identify it in a manner that is independent of the physical configuration of the computer system, the [0025] configuration capture program 30 may store that information in a manner that is associated with the corresponding device identifier that the operating system uses to identify that device in the current configuration of the system. This can be done for each device accessible to the host computer 1 (e.g., for each device in the device directory 38). This associated data set can be stored in the configuration file 32 and serves to identify the reference configuration, which can be used for comparison purposes in a manner discussed below.
  • As discussed above, it is possible that the configuration of the computer system will change after the [0026] configuration file 32 is saved. For example, as mentioned previously, one of the ports 18 a-d on the storage system 3 may malfunction, causing the port and storage devices normally accessible through that port to become inaccessible to the host computer 1. Another exemplary way in which the configuration of the computer system may change is that the links between the host computer 1 and the storage system 3 may be reconfigured. Yet another exemplary way in which the configuration of the computer system may change is that logical volumes within the storage system 3 may be added, removed, or exported through a different port on the same or another storage system, thereby causing the contents of the host computer's operating system device directory 38 to change. In the case where a logical volume within storage system 3 moves, a logical volume which was previously accessible using a particular channel, target, and LUN will no longer be accessible using that identifier, but rather will be accessible at a different channel, target, and LUN. However, as discussed above, application programs on the host computer 1 will, via the file system/LVM mapping layer 23, continue to access the logical volume using the old channel, target and LUN identifier, which can cause problems. For example, if no logical volume is accessible at the old channel, target and LUN, any attempt to access the logical volume at that channel, target and old identifier will result in an error. Even worse, if a different logical volume is now accessible at that channel, target and LUN, as in the example discussed above, attempts to read from the logical volume will result in reading the wrong data, and attempts to write to the logical volume will result in writing data to the wrong logical volume.
  • In one illustrative embodiment of the present invention, changes to the configuration of the computer system are detected and an indication that the configuration of the computer system has changed is provided. This detection can be done in numerous ways. For example, the [0027] host computer 1 can be provided with a configuration comparison program 40 that can compare the current (i.e., at the time the program is run) configuration of the computer system with the reference configuration (stored in the manner discussed above) to determine whether any changes have occurred. The configuration comparison program 40 can be executed whenever it is desired to check the configuration of the system. In accordance with one embodiment of the invention, the comparison program 40 is executed each time the host computer 1 is rebooted, but it should be appreciated that the present invention is not limited in this respect. The configuration comparison program 40 determines a current configuration of the computer system, and compares the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration. The configuration comparison program 40 may, for example, determine the current configuration of the computer system in the same manner as that described above with respect to the configuration capture program 30.
  • The [0028] configuration comparison program 40 may, for example, compare the current configuration of the computer system with a reference configuration by retrieving the stored information descriptive of the reference configuration from the configuration file 32. The configuration comparison program 40 may detect, for example, whether new devices are present, old devices have been deleted, or existing devices have moved. When doing so, the configuration comparison program 40 may examine the information for both the current and reference configurations that identifies devices in a manner that is not dependent upon the physical configuration of the computer system (e.g., using the storage system serial number and unique logical volume identifier discussed above). Thus, the status of a device is not determined based on the operating system device identifier which is dependent upon the system configuration, but rather, is based upon information that uniquely identifies the device in a manner that is independent of the configuration of the system.
  • In one illustrative embodiment of the present invention, an indication is provided by the [0029] configuration comparison program 40 when the current configuration of the computer system differs from a reference configuration. For example, the configuration comparison program may provide an indication when the channel through which a particular logical volume is accessible has changed, when a previously accessible logical volume is no longer accessible, or when any other change to the configuration of the computer system is detected.
  • The indication that the current configuration of the computer system differs from the reference configuration may be provided in any manner, and the present invention is not limited to any particular technique. For example, a text file descriptive of the differences between the current configuration of the computer system and the reference configuration may be generated. The indication may be provided to a human operator by, for example, displaying such a text file on a [0030] computer monitor 42, printing the text file on a printer 44, or sending the text file to a human operator in an e-mail message via a modem 46. The human operator may use the information contained within the indication provided by the configuration comparison program 40 to determine what steps, if any, to take in response to the changes in the computer system's configuration to avoid system errors. The operator may, for example, reconfigure the file system/LVM mapping layer 23 to refer to devices using their new device identifiers.
  • In one embodiment of the invention, the [0031] configuration comparison program 40 executes every time the host computer 1 is rebooted, halts the rebooting of the host computer 1 when it is determined that the current configuration of the computer system differs from the reference configuration, and provides an indication that the configuration of the system has changed. The configuration comparison program 40 may then allow a human operator to disregard the message and continue the bootup process.
  • The [0032] configuration comparison program 40 may be implemented to provide an indication of all differences detected between the current configuration of the computer system and the reference configuration, or it may be implemented to provide an indication of only certain types of differences. For example, in a computer system that includes a number of system resources connected to a host computer, in one embodiment of the present invention, the configuration comparison program 40 only provides an indication of differences impacting raw storage devices or logical volumes included in a storage system 3.
  • The illustrative embodiments of the present invention discussed above have been described in connection with an illustrative system such as that shown in FIG. 4, wherein the computer system includes a [0033] host computer 1 and a computer system resource that is a storage system 3 such as that shown in FIG. 1. However, it should be appreciated that the present invention is not limited in this respect, and that the aspects of the present invention described above can be used in connection with computer systems having numerous other configurations, so that the host computer 1 can determine system configuration changes in connection with numerous system resources other than a storage system 3. In addition, as described above, Fibre Channel has provided an environment wherein system configuration changes have become more prevalent, such that the embodiments of the present invention discussed above can be advantageous when used in connection with a Fibre Channel system. However, it should be appreciated that the present invention is not limited in this respect, and can be used in connection with numerous other system configurations that do not employ the Fibre Channel protocol.
  • It should be understood that the present invention is not limited to use with any particular computer platform, computer processor, or high-level programming language. Although aspects of the present invention are discussed above as being implemented in a programmed processor, elements of the invention may be implemented in software, hardware, firmware, or any combination thereof. The various elements of the invention, either individually or in combination, may be implemented as a computer program product tangibly embodied in a machine-readable storage device for execution by a computer processor such as the [0034] processor 16 shown in FIG. 1. Various steps of embodiments of the invention, such as those described above and illustrated using flow charts, may be performed by a computer processor executing a program (i.e., software or firmware) tangibly embodied on a computer-readable medium to perform functions by operating on input and generating output. The computer-readable medium may be a memory in the host computer 1 (FIG. 1), or a transportable medium such as a compact disk, a floppy disk, or a diskette, such that a computer program embodying the aspect of the present invention can be loaded onto any computer. The computer program is not limited to any particular embodiment and may, for example, include an application program, foreground or background process, driver, or any combination thereof, executing on a single computer processor or multiple computer processors. Computer programming languages suitable for implementing such a system include procedural programming languages, object-oriented programming languages, and any combination thereof.
  • Having described several embodiments of the invention in detail, various modifications and improvement will readily occur to those skilled in the art. Such modifications and improvements are intended to be within the spirit and scope of the invention. Accordingly, the foregoing description is by way of example only, and is not intended as limiting. The invention is limited only as defined by the following claims and the equivalents thereto. [0035]
  • What is claimed is: [0036]

Claims (1)

1. In a computer system including a host computer and at least one computer system resource, a method of detecting changes in a configuration of the computer system, the method comprising steps of:
(A) storing information relating to a reference configuration of the computer system at a first point in time;
(B) determining a current configuration of the computer system at a second point in time;
(C) comparing the current configuration of the computer system with the reference configuration to determine whether the current configuration differs from the reference configuration; and
(D) providing an indication when the current configuration of the computer system differs from the reference configuration.
US09/812,743 1998-12-14 2001-03-20 Method and apparatus for detecting system configuration changes Abandoned US20010011348A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/812,743 US20010011348A1 (en) 1998-12-14 2001-03-20 Method and apparatus for detecting system configuration changes

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/211,131 US6240511B1 (en) 1998-12-14 1998-12-14 Method and apparatus for detecting system configuration changes
US09/812,743 US20010011348A1 (en) 1998-12-14 2001-03-20 Method and apparatus for detecting system configuration changes

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/211,131 Continuation US6240511B1 (en) 1998-12-14 1998-12-14 Method and apparatus for detecting system configuration changes

Publications (1)

Publication Number Publication Date
US20010011348A1 true US20010011348A1 (en) 2001-08-02

Family

ID=22785697

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/211,131 Expired - Lifetime US6240511B1 (en) 1998-12-14 1998-12-14 Method and apparatus for detecting system configuration changes
US09/812,743 Abandoned US20010011348A1 (en) 1998-12-14 2001-03-20 Method and apparatus for detecting system configuration changes

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/211,131 Expired - Lifetime US6240511B1 (en) 1998-12-14 1998-12-14 Method and apparatus for detecting system configuration changes

Country Status (1)

Country Link
US (2) US6240511B1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6542909B1 (en) * 1998-06-30 2003-04-01 Emc Corporation System for determining mapping of logical objects in a computer system
US7155558B1 (en) * 2004-07-21 2006-12-26 Vmware, Inc. Providing access to a raw data storage unit in a computer system
US20070011373A1 (en) * 2005-07-11 2007-01-11 Dell Products L.P. System and method for identifying inoperable connection points in a storage enclosure
US20070033654A1 (en) * 2005-08-03 2007-02-08 International Business Machines Corporation Method, system and program product for versioning access control settings
US20070169081A1 (en) * 2005-12-06 2007-07-19 Dell Products L.P. Method of defining packaging applicability
US7383294B1 (en) 1998-06-30 2008-06-03 Emc Corporation System for determining the mapping of logical objects in a data storage system
US20120047401A1 (en) * 2010-08-17 2012-02-23 Hon Hai Precision Industry Co., Ltd. Test device and test method for testing computing device
US20120110211A1 (en) * 2010-10-30 2012-05-03 Lsi Corporation Management of detected devices coupled to a host machine
US8914610B2 (en) 2011-08-26 2014-12-16 Vmware, Inc. Configuring object storage system for input/output operations
US9134922B2 (en) 2009-03-12 2015-09-15 Vmware, Inc. System and method for allocating datastores for virtual machines
US20150304167A1 (en) * 2014-04-22 2015-10-22 International Business Machines Corporation Accelerating device, connection and service discovery

Families Citing this family (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6654881B2 (en) * 1998-06-12 2003-11-25 Microsoft Corporation Logical volume mount manager
JP3980768B2 (en) * 1998-09-02 2007-09-26 株式会社日立製作所 Distributed processing system and cooperative method thereof
US7430668B1 (en) * 1999-02-15 2008-09-30 Hewlett-Packard Development Company, L.P. Protection of the configuration of modules in computing apparatus
US6434697B1 (en) * 1999-10-06 2002-08-13 Micron Technology, Inc. Apparatus for savings system configuration information to shorten computer system initialization time
US6826715B1 (en) * 1999-10-28 2004-11-30 Hewlett-Packard Development Company, L.P. Automatic capture and comparison of computer configuration data
US7203868B1 (en) * 1999-11-24 2007-04-10 Unisys Corporation Dynamic monitoring of resources using snapshots of system states
US6684231B1 (en) * 1999-11-29 2004-01-27 Microsoft Corporation Migration of friendly volumes
US6553387B1 (en) * 1999-11-29 2003-04-22 Microsoft Corporation Logical volume configuration data management determines whether to expose the logical volume on-line, off-line request based on comparison of volume epoch numbers on each extents of the volume identifiers
US6904599B1 (en) * 1999-11-29 2005-06-07 Microsoft Corporation Storage management system having abstracted volume providers
US6883120B1 (en) * 1999-12-03 2005-04-19 Network Appliance, Inc. Computer assisted automatic error detection and diagnosis of file servers
WO2001063424A1 (en) * 2000-02-24 2001-08-30 Fujitsu Limited Input/output controller, device identification method, and input/output control method
US6813686B1 (en) 2000-06-27 2004-11-02 Emc Corporation Method and apparatus for identifying logical volumes in multiple element computer storage domains
US6708265B1 (en) 2000-06-27 2004-03-16 Emc Corporation Method and apparatus for moving accesses to logical entities from one storage element to another storage element in a computer storage system
US6978324B1 (en) * 2000-06-27 2005-12-20 Emc Corporation Method and apparatus for controlling read and write accesses to a logical entity
US7065610B1 (en) 2000-06-27 2006-06-20 Emc Corporation Method and apparatus for maintaining inventory of logical volumes stored on storage elements
US7225191B1 (en) 2000-06-27 2007-05-29 Emc Corporation Method and apparatus for verifying storage access requests in a computer storage system with multiple storage elements
US6842784B1 (en) 2000-06-27 2005-01-11 Emc Corporation Use of global logical volume identifiers to access logical volumes stored among a plurality of storage elements in a computer storage system
US6760828B1 (en) 2000-06-27 2004-07-06 Emc Corporation Method and apparatus for using logical volume identifiers for tracking or identifying logical volume stored in the storage system
US6912548B1 (en) * 2000-06-27 2005-06-28 Emc Corporation Logical volume identifier database for logical volumes in a computer storage system
US6721881B1 (en) * 2000-09-29 2004-04-13 Dell Products L.P. System and method for determining if a display device configuration has changed by comparing a current indicator with a previously saved indicator
US7519731B1 (en) * 2000-12-01 2009-04-14 Juniper Networks, Inc. Comparing configuration information for a data forwarding device
US6901534B2 (en) * 2002-01-15 2005-05-31 Intel Corporation Configuration proxy service for the extended firmware interface environment
US7219189B1 (en) * 2002-05-31 2007-05-15 Veritas Operating Corporation Automatic operating system handle creation in response to access control changes
US7395420B2 (en) * 2003-02-12 2008-07-01 Intel Corporation Using protected/hidden region of a magnetic media under firmware control
JP4305007B2 (en) * 2003-03-05 2009-07-29 株式会社日立製作所 System switching system, processing method therefor, and processing program therefor
US7487500B1 (en) * 2003-10-09 2009-02-03 Nortel Networks Limited System and method for installing and configuring software for a network element in an optical communications network
US7523097B1 (en) * 2004-01-13 2009-04-21 Juniper Networks, Inc. Restoration of archived configurations for a network device
US20060047855A1 (en) 2004-05-13 2006-03-02 Microsoft Corporation Efficient chunking algorithm
US7430592B2 (en) * 2004-04-21 2008-09-30 Dell Products L.P. Method for heterogeneous system configuration
US20060031425A1 (en) * 2004-06-07 2006-02-09 Northrop Grumman Corporation Method for imaging computer systems
US7640454B1 (en) * 2004-06-28 2009-12-29 Symantec Operating Corporation System and method for point-in-time recovery of application resource sets
US8145601B2 (en) 2004-09-09 2012-03-27 Microsoft Corporation Method, system, and apparatus for providing resilient data transfer in a data protection system
US7631194B2 (en) * 2004-09-09 2009-12-08 Microsoft Corporation Method, system, and apparatus for creating saved searches and auto discovery groups for a data protection system
US7567974B2 (en) 2004-09-09 2009-07-28 Microsoft Corporation Method, system, and apparatus for configuring a data protection system
US7865470B2 (en) * 2004-09-09 2011-01-04 Microsoft Corporation Method, system, and apparatus for translating logical information representative of physical data in a data protection system
US7613787B2 (en) 2004-09-24 2009-11-03 Microsoft Corporation Efficient algorithm for finding candidate objects for remote differential compression
US20060218435A1 (en) * 2005-03-24 2006-09-28 Microsoft Corporation Method and system for a consumer oriented backup
US20070130376A1 (en) * 2005-12-02 2007-06-07 Samsung Electronics Co., Ltd. Method and apparatus for setting configuration information
TW200943052A (en) * 2008-04-11 2009-10-16 Asustek Comp Inc System and method for tracking and recording system configurations of electronic devices
US8074121B2 (en) * 2009-12-09 2011-12-06 International Business Machines Corporation Automated information technology error and service request correlation
US8713356B1 (en) 2011-09-02 2014-04-29 Emc Corporation Error detection and recovery tool for logical volume management in a data storage system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5745669A (en) * 1993-10-21 1998-04-28 Ast Research, Inc. System and method for recovering PC configurations
US5913921A (en) * 1996-07-12 1999-06-22 Glenayre Electronics, Inc. System for communicating information about nodes configuration by generating advertisements having era values for identifying time reference for which the configuration is operative

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6542909B1 (en) * 1998-06-30 2003-04-01 Emc Corporation System for determining mapping of logical objects in a computer system
US20030130986A1 (en) * 1998-06-30 2003-07-10 Tamer Philip E. System for determining the mapping of logical objects in a data storage system
US6938059B2 (en) 1998-06-30 2005-08-30 Emc Corporation System for determining the mapping of logical objects in a data storage system
US7383294B1 (en) 1998-06-30 2008-06-03 Emc Corporation System for determining the mapping of logical objects in a data storage system
US7155558B1 (en) * 2004-07-21 2006-12-26 Vmware, Inc. Providing access to a raw data storage unit in a computer system
US7269683B1 (en) * 2004-07-21 2007-09-11 Vm Ware, Inc. Providing access to a raw data storage unit in a computer system
US20070011373A1 (en) * 2005-07-11 2007-01-11 Dell Products L.P. System and method for identifying inoperable connection points in a storage enclosure
US8332560B2 (en) * 2005-07-11 2012-12-11 Dell Products L.P. System and method for identifying inoperable connection points in a storage enclosure
US20070033654A1 (en) * 2005-08-03 2007-02-08 International Business Machines Corporation Method, system and program product for versioning access control settings
US8539604B2 (en) 2005-08-03 2013-09-17 International Business Machines Corporation Method, system and program product for versioning access control settings
US20070169081A1 (en) * 2005-12-06 2007-07-19 Dell Products L.P. Method of defining packaging applicability
US7676803B2 (en) * 2005-12-06 2010-03-09 Dell Products L.P. Method of defining packaging applicability
US9134922B2 (en) 2009-03-12 2015-09-15 Vmware, Inc. System and method for allocating datastores for virtual machines
US20120047401A1 (en) * 2010-08-17 2012-02-23 Hon Hai Precision Industry Co., Ltd. Test device and test method for testing computing device
US8738965B2 (en) * 2010-08-17 2014-05-27 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Test method and test device for restarting a computer based on a hardware information comparison and a restart count
US8738816B2 (en) * 2010-10-30 2014-05-27 Lsi Corporation Management of detected devices coupled to a host machine
US20120110211A1 (en) * 2010-10-30 2012-05-03 Lsi Corporation Management of detected devices coupled to a host machine
US8914610B2 (en) 2011-08-26 2014-12-16 Vmware, Inc. Configuring object storage system for input/output operations
US20150304167A1 (en) * 2014-04-22 2015-10-22 International Business Machines Corporation Accelerating device, connection and service discovery
US10033583B2 (en) * 2014-04-22 2018-07-24 International Business Machines Corporation Accelerating device, connection and service discovery

Also Published As

Publication number Publication date
US6240511B1 (en) 2001-05-29

Similar Documents

Publication Publication Date Title
US6240511B1 (en) Method and apparatus for detecting system configuration changes
US6931440B1 (en) Method and apparatus for dynamically determining whether access to a resource connected to a computer has changed and determining how to access the resource with a new identifier
US6629189B1 (en) Method and apparatus for managing target devices in a multi-path computer system
US7181553B2 (en) Method and apparatus for identifying multiple paths to discovered SCSI devices and specific to set of physical path information
US7516353B2 (en) Fall over method through disk take over and computer system having failover function
US7934119B2 (en) Failure recovery method
US7596637B2 (en) Storage apparatus and control method for the same, and computer program product
US20020099914A1 (en) Method of creating a storage area & storage device
US20050246491A1 (en) Storage unit, installation method thereof and installation program therefore
US20060155837A1 (en) Diskless computer operation management system
US20030154267A1 (en) Storage area network methods and apparatus for dynamically enabled storage device masking
US8103828B2 (en) Virtualization method and storage apparatus for a storage system having external connectivity
US6356979B1 (en) System and method for selectively presenting logical storage units to multiple host operating systems in a networked computing system
US7478267B2 (en) Access control device and interface installed in same
US7117141B2 (en) Disk array apparatus setting method, program, information processing apparatus and disk array apparatus
US7739543B1 (en) System and method for transport-level failover for loosely coupled iSCSI target devices
US7610295B2 (en) Method and apparatus for generating persistent path identifiers
US6842810B1 (en) Restricted access devices
US6351782B1 (en) Method of sharing an I/O device between a host operating system and a foreign operating system in a single computer
JP2004152275A (en) Storage area network (san) mapping
US20040064828A1 (en) Supplanting first device objects with second device objects
JP2001188716A (en) Connectivity exchange simulation device

Legal Events

Date Code Title Description
AS Assignment

Owner name: EMC CORPORATION, MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BLUMENAU, STEVEN M.;COHEN, STEVEN;MADDEN, JOHN F. JR.;REEL/FRAME:011628/0955

Effective date: 19981211

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION