Storage network system, managing apparatus, managing method and program
First Claim
1. A management computer comprising:
- a memory storing;
(A) toplogical information including identifiers of ports of computers, storage apparatuses, and switches;
a processor, which is configured to;
(B) collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses;
(C) evaluate that a certain access time, from a first port of a first computer to a first volume on a first storage apparatus exceeds a predetermined limit;
(D) search at least one second access path starting from a second port of the first computer to the first volume;
(E) display the at least one second access path along with corresponding data traffic amounts from the second port to the first volume; and
(F) select one second access path based on the displayed data traffic amounts if the estimated data traffic on the selected second access path does not exceed a predetermined amount.
0 Assignments
0 Petitions
Accused Products
Abstract
A management computer includes a memory storing toplogical information including identifiers of ports of computers, storage apparatuses, and switches. The management computer includes a processor, which is configured to: collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; evaluate that a certain access time among the plurality of access times exceeds a predetermined allowable range; search a first access path to which the certain access time corresponds; search at least one second access path starting from a first computer port on the first access path; and search performance information of certain ports which are on the at least one second access path in order to display the searched performance information.
66 Citations
18 Claims
-
1. A management computer comprising:
-
a memory storing; (A) toplogical information including identifiers of ports of computers, storage apparatuses, and switches; a processor, which is configured to; (B) collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; (C) evaluate that a certain access time, from a first port of a first computer to a first volume on a first storage apparatus exceeds a predetermined limit; (D) search at least one second access path starting from a second port of the first computer to the first volume; (E) display the at least one second access path along with corresponding data traffic amounts from the second port to the first volume; and (F) select one second access path based on the displayed data traffic amounts if the estimated data traffic on the selected second access path does not exceed a predetermined amount. - View Dependent Claims (2, 3)
-
-
4. A computer-readable medium comprising code that when executed causes a management computer to:
-
(A) store toplogical information including identifiers of ports of computers, storage apparatuses, and switches; (B) collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; (C) evaluate that a certain access time, from a first port of a first computer to a first volume on a first storage apparatus exceeds a predetermined limit; (D) search at least one second access path starting from a second port of the first computer to the first volume; (E) display the at least one second access path along with corresponding data traffic amounts from the second port to the first volume; and (F) select one second access path based on the displayed data traffic amounts if the estimated data traffic on the selected second access path does not exceed a predetermined amount. - View Dependent Claims (5, 6)
-
-
7. A system comprising:
-
computers; storage apparatuses storing data for the computers; switches coupled to the computers and storage apparatuses; and a management computer configured to; (A) store toplogical information including identifiers of ports of computers, storage apparatuses, and switches; (B) collect a plurality of performance information of the ports, and a plurality of access times from computer ports to the storage apparatuses; (C) evaluate that a certain access time, from a first port of a first computer to a first volume on a first storage apparatus exceeds a predetermined limit; (D) search at least one second access path starting from a second port of the first computer to the first volume; (E) display the at least one second access path along with corresponding data traffic amounts from the second port to the first volume; and (F) select one second access path based on the displayed data traffic amounts if the estimated data traffic on the selected second access path does not exceed a predetermined amount. - View Dependent Claims (8, 9)
-
-
10. A management computer comprising:
-
a memory storing; (A) toplogical information including identifiers of ports of computers, storage apparatuses, and switches; a processor, which is configured to; (B) identify a first port, on a first computer, having an access time, via a first access path, to a first logical volume in a first storage apparatus that exceeds a predetermined limit; (C) display a list of second access paths from a different port of the first computer to the first volume and display data traffic amounts for each of the access paths; (D) select one of the second access paths; (E) estimate traffic amounts for ports on the selected second access path if the first path is to be switched to the selected second access path and determine if any port on the selected second access path would exceed a predetermined traffic amount; and (F) if any port on the selected second access path exceeds the predetermined traffic amount, select another one of the second access paths and the selected second access path and repeat steps (E) and (F). - View Dependent Claims (11, 12)
-
-
13. A computer-readable medium comprising code that when executed causes a management computer to:
-
(A) store toplogical information including identifiers of ports of computers, storage apparatuses, and switches; (B) identify a first port, on a first computer, having an access time, via a first access path, to a first logical volume in a first storage apparatus that exceeds a predetermined limit; (C) display a list of second access paths from a different port of the first computer to the first volume and display data traffic amounts for each of the access paths; (D) select one of the second access paths; (E) estimate traffic amounts for ports on the selected second access path if the first path is to be switched to the selected second access path and determine if any port on the selected second access path would exceed a predetermined traffic amount; and (F) if any port on the selected second access path exceeds the predetermined traffic amount, select another one of the second access paths and the selected second access path and repeat steps (E) and (F). - View Dependent Claims (14, 15)
-
-
16. A system comprising:
-
computers; storage apparatuses storing data for the computers; switches coupled to the computers and storage apparatuses; and a management computer configured to; (A) store toplogical information including identifiers of ports of computers, storage apparatuses, and switches; (B) identify a first port, on a first computer, having an access time, via a first access path, to a first logical volume in a first storage apparatus that exceeds a predetermined limit; (C) display a list of second access paths from a different port of the first computer to the first volume and display data traffic amounts for each of the access paths; (D) select one of the second access paths; (E) estimate traffic amounts for ports on the selected second access path if the first path is to be switched to the selected second access path and determine if any port on the selected second access path would exceed a predetermined traffic amount; (F) if any port on the selected second access path exceeds the predetermined traffic amount, select another one of the second access paths and the selected second access path and repeat steps (E) and (F). - View Dependent Claims (17, 18)
-
Specification