Systems, apparatus, and methods for identifying stored data that may be accessed by a host entity and providing data management services
First Claim
Patent Images
1. A method of determining information relating to data stored in a network, the method comprising:
- receiving from a storage system a first identifier associated with a first port of the storage system, by a device located in a path between the storage system and a switch in a network;
using the first identifier to spoof the first port of the storage system during a first communication with the switch;
receiving, from a host server connected to the switch, a request to register a second port of the host server, the request including a second identifier associated with the second port;
using the second identifier to spoof the second port of the host server during a second communication with the storage system; and
receiving from the storage system information identifying data which is stored in the storage system and to which the second port of the host server has access.
1 Assignment
0 Petitions
Accused Products
Abstract
A first device in a network, having a first port, receives an identifier of a second port of a second device in the network, the network comprising a host entity, a switch, and a storage system. The first port of the first device spoofs the second port of the second device, during a communication with the switch. The first device receives information identifying a third port of a third device in the network that is zoned to the second port of the second device. The device identifies data stored in the storage system that may be accessed by the host entity, based at least on the information.
-
Citations
42 Claims
-
1. A method of determining information relating to data stored in a network, the method comprising:
-
receiving from a storage system a first identifier associated with a first port of the storage system, by a device located in a path between the storage system and a switch in a network; using the first identifier to spoof the first port of the storage system during a first communication with the switch; receiving, from a host server connected to the switch, a request to register a second port of the host server, the request including a second identifier associated with the second port; using the second identifier to spoof the second port of the host server during a second communication with the storage system; and receiving from the storage system information identifying data which is stored in the storage system and to which the second port of the host server has access. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of determining information related to data stored in a network, the method comprising:
-
identifying, by a device located in a path between a switch port of a switch and an initiator port of a host entity, an initiator world wide port name of the initiator port, in a registration procedure; adding the initiator world wide port name to a first device port of the device; transmitting, to the switch, a request for information identifying a port that is associated with the initiator world wide port name; receiving, from the switch, a target world wide port name of a target port of a storage system that is associated with the initiator port; and identifying a storage volume in the storage system that is associated with the initiator port, based on the target world wide port name and the initiator world wide port name. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of obtaining information relating to data stored in a network, the method comprising:
-
receiving, by a first device in a network, the first device having a first port, an identifier of a second port of a second device in the network, the network comprising a host entity, a switch, and a storage system; spoofing, by the first port of the first device, the second port of the second device during a communication with the switch; receiving, by the first device, information identifying a third port of a third device in the network that is zoned to the second port of the second device; identifying, based at least on the information, data which is stored in the storage system and to which the host entity has access. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A device located in a path between a switch port of a switch and an initiator port of a host entity, the device comprising:
-
a first device port; a memory storing computer program instructions; and a processor configured to execute the computer program instructions which, when executed on the processor, cause the processor to perform operations comprising; identifying an initiator world wide port name of the initiator port, in a registration procedure; adding the initiator world wide port name to the first device port; transmitting, to the switch, a request for information identifying a port that is associated with the initiator world wide port name; receiving, from the switch, a target world wide port name of a target port of a storage system that is associated with the initiator port; and identifying a storage volume in the storage system that is associated with the initiator port, based on the target world wide port name and the initiator world wide port name. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
-
34. A device located in a network, the network comprising a host entity, a switch, and a storage system, the device comprising:
-
a first port; a memory storing computer program instructions; and a processor configured to execute the computer program instructions which, when executed on the processor, cause the processor to perform operations comprising; receiving an identifier of a second port of a second device in the network; spoofing, by the first port, the second port of the second device during a communication with the switch; receiving information identifying a third port of a third device in the network that is zoned to the second port of the second device; and identifying, based at least on the information, data which is stored in the storage system and to which the host entity has access. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42)
-
Specification