Disk control unit and storage system
First Claim
1. A storage controller which accesses a plurality of Internet Small Computer System Interface (iSCSI) devices via a network, the storage controller comprising:
- a processor;
a memory;
a storage device; and
an iSCSI interface to each of the iSCSI devices,wherein the processor accesses each of the iSCSI devices via a router on the network, obtains security information which indicates safety of routes from the iSCSI devices to the storage controller as determined based on a number of incidences on the network for each of the iSCSI devices, or obtains transfer speeds which indicate data transfer speeds to transfer data from the iSCSI devices, said transfer speeds each being a data transfer speed which is expected when accessing one of the iSCSI devices, on the network at the time of test accessing to each iSCSI device or at a time of test accessing to the router, said security information and/or said transfer speeds being obtained when the processor is connected to each iSCSI device,wherein the processor updates ranking information in a device list based on the obtained security information and/or said transfer speeds, selects an optimum iSCSI device on the network based on the ranking information, and establishes connection to the selected iSCSI device via the network,wherein the processor reassigns, if the ranks are updated after selecting the optimum iSCSI device, new ranks to the iSCSI devices according to update information to generate re-ranking information, selects the optimum iSCSI device based on the re-ranking information, and accesses the selected optimum iSCSI device,wherein if an update is not necessary, then a check is performed to determine whether or not device list update information received from an external location exists,wherein if an update is necessary, then the ranks are re-assigned to the devices in accordance with the update information, andwherein if an update depending on the update information is not necessary, then a check is performed to determine whether or not a device request for any one of a device addition, a backup or a remote copy is issued, if a device request is issued, then a connection is established to the iSCSI device with the highest rank and that device is registered, and then the data access is carried out for the optimum device in the device list.
0 Assignments
0 Petitions
Accused Products
Abstract
A disk controller has a front end FC I/F to a host, a back end FC I/F to a magnetic disk, a processor, and a main memory section. The front end I/F and the back end I/F are provided for performing information exchange with a network (connected) device that is connected to a network and manages storage. The main memory section stores registered information expressing an attribution of the network (connected) device, access information including the security and the performance of each network (connected) device through the network, and ranking information assigning a rank to each network (connected) device based on the registered information and the access information. An appropriate network (connected) device is selected from various types of information including the ranking information.
-
Citations
32 Claims
-
1. A storage controller which accesses a plurality of Internet Small Computer System Interface (iSCSI) devices via a network, the storage controller comprising:
-
a processor; a memory; a storage device; and an iSCSI interface to each of the iSCSI devices, wherein the processor accesses each of the iSCSI devices via a router on the network, obtains security information which indicates safety of routes from the iSCSI devices to the storage controller as determined based on a number of incidences on the network for each of the iSCSI devices, or obtains transfer speeds which indicate data transfer speeds to transfer data from the iSCSI devices, said transfer speeds each being a data transfer speed which is expected when accessing one of the iSCSI devices, on the network at the time of test accessing to each iSCSI device or at a time of test accessing to the router, said security information and/or said transfer speeds being obtained when the processor is connected to each iSCSI device, wherein the processor updates ranking information in a device list based on the obtained security information and/or said transfer speeds, selects an optimum iSCSI device on the network based on the ranking information, and establishes connection to the selected iSCSI device via the network, wherein the processor reassigns, if the ranks are updated after selecting the optimum iSCSI device, new ranks to the iSCSI devices according to update information to generate re-ranking information, selects the optimum iSCSI device based on the re-ranking information, and accesses the selected optimum iSCSI device, wherein if an update is not necessary, then a check is performed to determine whether or not device list update information received from an external location exists, wherein if an update is necessary, then the ranks are re-assigned to the devices in accordance with the update information, and wherein if an update depending on the update information is not necessary, then a check is performed to determine whether or not a device request for any one of a device addition, a backup or a remote copy is issued, if a device request is issued, then a connection is established to the iSCSI device with the highest rank and that device is registered, and then the data access is carried out for the optimum device in the device list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 11, 12, 13, 14, 15, 16, 23, 25, 27, 29, 31)
-
-
9. A storage controller which accesses a plurality of Internet Small Computer System Interface (iSCSI) devices via an Internet Protocol (IP) network, the storage controller comprising:
-
a processor; a memory; a storage device; and an iSCSI interface to each of the iSCSI devices, wherein the processor accesses each of the iSCSI devices via a router on the IP network, obtains security information which indicates safety of routes from the iSCSI devices to the storage controller as determined based on a number of incidences on the network for each of the iSCSI devices, or obtains transfer speeds which indicate data transfer speeds to transfer data from the iSCSI devices, said transfer speeds each being a data transfer speed which is expected when accessing one of the iSCSI devices, on the network at the time of test accessing to each iSCSI device or at a time of test accessing to the router, said security information and/or said transfer speeds being obtained when the processor is connected to each iSCSI device, wherein the processor updates ranking information in a device list based on the obtained security information and/or said transfer speeds, selects an optimum iSCSI device on the IP network based on the ranking information, and establishes connection to the selected iSCSI device via the IP network, wherein the processor gathers performance information of each storage device connected to the iSCSI devices, wherein the processor gathers security information of each of the storage devices connected to the iSCSI devices, wherein the processor modifies a list including the storage devices connected to the iSCSI devices based on the performance information and the security information, wherein the processor reassigns, if the ranks are updated after selecting the optimum iSCSI device, new ranks to the iSCSI devices according to update information to generate re-ranking information, selects the optimum iSCSI device based on the re-ranking information, and accesses the selected optimum iSCSI device, wherein if an update is not necessary, then a check is performed to determine whether or not device list update information received from an external location exists, wherein if an update is necessary, then the ranks are re-assigned to the devices in accordance with the update information, and wherein if an update depending on the update information is not necessary, then a check is performed to determine whether or not a device request for any one of a device addition, a backup or a remote copy is issued, if a device request is issued, then a connection is established to the iSCSI device with the highest rank and that device is registered, and then the data access is carried out for the optimum device in the device list. - View Dependent Claims (10, 17, 18, 19, 20, 21, 22, 24, 26, 28, 30, 32)
-
Specification