The described subject matter relates to electronic computing, and more particularly to access control management in tape libraries that provide mass storage.
Storage automation systems, e.g., data cartridge storage systems, typically include a host computer and a data storage device. The data storage device typically comprises a cartridge storage element, input/output components, and a moveable cartridge access component, sometimes referred to as a “picker.” The cartridge storage element stores a plurality of data cartridges in an array, and each data cartridge in the array has an associated storage position within the cartridge storage element.
During operation, the data storage device may receive, from the host computer, a request for retrieval of a specified data cartridge. The storage device determines, based on the request received from the host computer, a data cartridge position for the requested data cartridge. The movable cartridge access device then moves to that position, retrieves the requested cartridge from the cartridge storage element, moves to the position of an input/output component, for example, a data cartridge drive, and loads the data cartridge into the data cartridge drive.
Moreover, the data storage device may also receive, from the host computer, a request to return a previously retrieved data cartridge to the storage element. The storage device determines, based on such a request, to return received from the host computer, a data cartridge position for storing the foregoing data cartridge. The movable cartridge access device then retrieves the data cartridge from the input/output component, moves the data cartridge to the determined data cartridge location and loads the data cartridge into the cartridge storage element.
Typically, the data storage device further comprises a controller, which is configured to receive requests, such as the cartridge retrieval requests described above, from the host computer and manage the operation of the device in response to the requests. During operation of the storage device, the controller may retain operational information that is used by the controller for operation and management of the device. A data storage device may also comprise a separate management controller which is configured to receive requests such as, e.g., configuration settings or cartridge retrieval requests from a management computer or a person at a management console.
Owners or administrators of storage systems may wish to regulate access to resources managed by the storage system.
Described herein are exemplary tape library architectures, and methods for access control management in a cartridge drive system. The methods described herein may be embodied as logic instructions on a computer-readable medium. When executed on a processor, the logic instructions cause a general purpose computing device to be programmed as a special-purpose machine that implements the described methods. The processor, when configured by the logic instructions to execute the methods recited herein, constitutes structure for performing the described methods.
In exemplary embodiments, the architectures and methods may be implemented in tape storage libraries such as the tape storage libraries described in U.S. Pat. Nos. 5,926,341; 6,028,733; or 6,421,306, commonly assigned to the assignee of the present application, the disclosures of which are incorporated by reference herein in their entirety.
The library controller 110 may be implemented as a software module that runs on a general purpose processing unit of the tape library, or as a special-purpose chipset. In some embodiments, library controller 110 may include a processor 112, a memory module 114 and an input/output (I/O) interface 118. Memory module 114 may include an access control module 116, the operation of which is discussed in greater detail below.
In some embodiments the host computer 150 may be connected to the drive controllers and the library controller by another bus. By way of example, the host computer 150 may be connected to the library and drives using SCSI and the library may be connected to the drives using RS422.
The cartridge drive controllers 120 coordinate data transfer to and from the one or more cartridge drives 130a-130b. Cartridge drive controllers 120a and 120b have respective processors 128a and 128b and respective memories 124a and 124b. Processors 128a, 128b may be implemented as general purpose processors that may be configured to execute logic instructions in the respective memories 124a, 124b, or as special purpose processors adapted to implement logic instructions embodied as firmware, or as ASICs. The memories 124a and 124b may be implemented as battery-backed, non-volatile RAMs (NVRAMs). Although only two controllers 120a and 120b are shown and discussed generally herein, aspects of this invention can be extended to other multi-controller configurations where more than two controllers are employed. Further, driver controllers 120 may include access control modules 126, which implement logic to manage access to data on one or more cartridges 132 managed by the system 100.
The cartridge drives 130a, 130b are configured to receive a tape cartridge 132a, 132b, respectively. Input/Output (I/O) operations requested by host computer 150 may be executed against data stored in the respective tape cartridges 132a, 132b.
In some embodiments, tape library 100 may be coupled to a management component 170. Management component 170 may be embodied as an integrated computing device such as, e.g., a blade server implemented on a printed circuit board (PCB) that couples to an expansion slot in tape library 100. Alternatively, management component 170 may be embodied as a stand-alone computing device such as, e.g., a server, coupled to tape library 100 via a communication link, such that management component 170 may be coupled to multiple tape libraries 100.
Management component 170 includes a processor 172, a memory module 174, and an I/O interface 178. Processor 172 may be embodied as a general purpose computer processor. As used herein, the term “processor” means any type of computational element, such as but not limited to, a microprocessor, a microcontroller, a complex instruction set computing (CISC) microprocessor, a reduced instruction set (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, or any other type of processor or processing circuit. Memory 174 may include random access memory (RAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), and the like. Memory 174 may include an operating system to manage operations of management component 170. Operating system 140 may be embodied as a UNIX operating system or any derivative thereof (e.g., Linux, Solaris, etc.) or as a Windows® brand operating system, or other operating systems. The operating system may include (or manage) one or more communication interfaces such as I/O interface 178 to transceive data packets and/or data streams from a remote source. The I/O interface 178 may include a parallel port (e.g., a small computer system interface (SCSI) port), a serial port (e.g., an RS-232C or an RS-422 port) or other type of known or future developed data communication port.
In some embodiments management component 170 includes a removable non-volatile memory component (RNMC) 182 coupled via a socket 180, which provides a conductive connection between the RNMC 182 and other components of the management component 170. The RNMC 182 may store operational data associated with the tape library 100. For example, during a cartridge request and load, process errors may occur. Such errors may include mechanical failures, for example a loading device may malfunction, or software errors. When an error occurs, information for recovery of the tape library 100 is stored to the RNMC 182. As an example, data stored to the RNMC 182 may comprise information describing the position of the various mechanical components (e.g., movable cartridge access device) at the point of failure of the load process. Further, the RNMC 182 can store software and firmware capable of operating or managing the tape library 100 and its sub-components. Further, as described, below, the RNMC 182 may store access control management data for the tape library 100.
Management component 170 may further comprise read-only memory (ROM) 230 and random access memory (RAM) 240. The ROM 230 preferably stores a basic input/output system (BIOS) 232, which enables the management component module 244 to become operable without accessing additional software or firmware. The operation and functionality of BIOS 232 is discussed further below.
Circuit board 205 further comprises a communication interface 220, which in turn comprises one or more ports 222, 224. One of the ports 222 may be utilized to exchange data with the host computer 150. The other port 224 may be used to access information related to a 130a, 130b in tape library 100.
As described above, in some embodiments the management component 170 may be implemented as an integral component of tape library 100. In other embodiments the management component 170 may be integrated as a separate computing device which may be located remote from the storage device and connected to the tape library 100 via a communication network. Further, management component 170 may be coupled to multiple tape libraries which may be co-located in a single facility or may be geographically remote.
As shown by
In some embodiments the PCB 205 comprises a socket 180 to which the RNMC 182 is coupled. RNMC 182 may be implemented as compact flash memory, and the 180 residing on the PCB 205 may comprise smart media card connectors, compact flash card connectors, secure digital card connectors, multi media card connectors, memory stick card connectors, or other known or future-developed chip interfaces that enable insertion and removal of the RNMC 182.
In some embodiments RNMC 182 stores operational data, including, but not limited to error logs 252, system component information 254, and copies of software and/or firmware for various components and/or sub-components of the system.
When an event such as, e.g., a read or write, load/unload, retry or error occurs during operation of the tape library 100, a management interface 134 in cartridge drive 132 detects the event and generates a signal in response to the event. Further, the management interface 134 may write information about the event to the error logs 252 in the RNMC 182, textual or symbolic data indicative of the detected error. In addition, as normal operational events occur, for example when a cartridge is retrieved from the tape library 100 or the cartridge drive 130 or when a read or write begins to a cartridge loaded into the cartridge drive 130, the management interface 134 may write, to the operational history 250, textual or symbolic data indicative of normal events that occur during operation.
A management component module 244 may be configured to periodically perform tests on the tape library 100 and store results of the tests in the RNMC 182. Similarly, the management component module 244 may periodically perform a hardware inventory of the cartridge library 100 to determine if new hardware has been added. If the management component module 244 performs an inventory and discovers new hardware components, then the management component module 244 may download to the system component information 254 of the RNMC 182, data indicative of the new hardware components. Note that the system component information 254 may also comprise serial numbers, warranty information, or maintenance information related various components of the RNMC 182.
The management component module 244 may use the data in the RNMC 182 to determine at what point during a process an error occurred. For example, the operational history 250 may indicate that a cartridge 132 was retrieved upon request, but the error logs 252 may indicate that the cartridge 132 was not loaded into the cartridge drive 130. Therefore, to initiate recovery, the manager logic 100 may retrieve the error log information representing the failed event and, based on this information determine that the first step in the recovery process is to return the cartridge 132 to a storage rack. Thereafter, the cartridge library can operate as normal, waiting for a request for a cartridge 132.
When power is provided to the PCB 205, the BIOS 232 executes at power-up. When the management component module 244 is implemented in software, the logic instructions comprising the management component module 244 may be stored in the RAM 240. Alternatively, the logic instructions comprising the management component module 244 may be stored in the RNMC 182, and the BIOS 232 may be configured to retrieve the logic instructions from the RNMC 182 and write the logic instructions into RAM 93 at power-up. The logic instructions may then be executed by the processing element 210. In addition, other software and/or firmware stored on the RNMC 182 for operating other components of the cartridge library 100 can be loaded and executed.
In some embodiments, a computing device such as, e.g., a computer (not specifically shown) or some other data communication device may be connected to one of the ports 222 of communication interface 220. This computer may be configured with a utility or a graphical user interface (GUI) that enables a user of the laptop to access the data stored on the RNMC 182. For example, a user could copy software and/or firmware revisions for the hardware components of the cartridge library to the RNMC 182, thereby non-invasively updating the software and/or firmware. Note that software and/or firmware upgrades could also be performed by removing the RNMC 182 from the printed circuit board 205, copying software and/or firmware upgrades to the RNMC 182 while the RNMC 182 is detached from the circuit board 205, and reinserting the RNMC 182 into the circuit board 205. The ports 222 can be configured to communicate via RS-232, RS-422, Ethernet, or any other known or future-developed protocols.
Operations for access control management in a cartridge library will be explained with reference to
In some embodiments the at least one access control parameter may identify at least one of a user, a server, a command, or a time. As used herein, the term “user” may correspond to a human user of cartridge library 100, a computer such as, e.g., a host computer 150, or a combination thereof. An access control parameter may also identify a specific resource managed by cartridge library 100. For example, an administrator may enter a set of access control parameters that authorizes a specific user of cartridge library 100 specific command rights over specific storage resources during specific periods of time. Similarly, an administrator may enter a set of access commands that limit a user's ability to perform at least one command on at least one resource of the cartridge library during at least one time period.
At operation 310 the access control parameter input is verified. In some embodiments the access control module 242 performs at least one test on the access data. For example, access control module 242 may perform a test to ensure that the administrator entering the data has appropriate administrative rights to enter the access control parameters. Further, access control module 242 may verify that the resource identified in an access control parameter is a valid resource in the cartridge library 100. For example, an access control parameter may identify a cartridge identifier associated with a specific cartridge or a Logical Unit Number (LUN) associated with a specific segment of storage. Access control module 242 may verify that the specific resource identified in the access control parameters valid within cartridge library 100.
In some embodiments, after the access control parameters are verified, they are sent to the drive controller(s) 120 (operation 315) which, in operation 320, store the access control parameters. For example, the access control module 126 of drive controller(s) 120 may include logic to manage one or more data tables that store access control parameters for cartridge library 100. The data tables may be stored in the memory module 124 of drive controller 120 or in a magnetic or optical storage medium coupled to drive controller 120.
Referring back to
Similarly, in some embodiments the access control parameters may be stored in association with a library controller 110 in lieu of, or in addition to, the drive controller memory 124. For example, at operation 330 the library controller may transmit the access control parameters to a drive controller, and at operation 335 the library controller may store the access control parameters.
In some embodiments, logic operational in one or more of the controllers may use the data table depicted in
Referring to
By contrast, if at least one matching record is located in the data tables, then the access request is compared to the information in the matching record(s) to determine whether the access request is consistent with the access rights defined in the table. For example, the command associated with the access request may be extracted from the service request, and the data table may be searched to determine whether the requester has rights to execute the service request. Further, the time at which the access request was received (or generated) may be determined by obtaining a time stamp associated with the request. The time stamp may be compared with the allowable time references in the data table for the command.
If the information in the data table 400 indicates that the access request is impermissible, then control passes to operation 520 and an error routine is invoked. The error routine may include generating a message which indicates that the user and/or computer which generated an unauthorized access request for resources managed by cartridge library 100. Further, the error routine may include entering the access request into a log such as, e.g., the error log 252 depicted in
If, at operation 515, the access request is permissible, then control passes to operation 530 and the drive controller(s) execute the resource request. If, at operation 535, the resource request is successfully executed, then the data from the resource request is returned to the requester (operation 540). The data may include data resulting from a read operation and/or an acknowledgment indicating the status of a read, write, or copy operation.
By contrast if the resource request is not successfully executed, then control passes to operation 545 and an error routine is invoked. The error routine may include generating a message which indicates that the access request for resources managed by cartridge library 100 was unsuccessful. Further, the error routine may include entering the access request into a log such as, e.g., the error log 252 depicted in
Thus, the operations of
Although the described arrangements and procedures have been described in language specific to structural features and/or methodological operations, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or operations described. Rather, the specific features and operations are disclosed as preferred forms of implementing the claimed present subject matter.
Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least an implementation. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
Thus, although embodiments have been described in language specific to structural features and/or methodological acts, it is to be understood that claimed subject matter may not be limited to the specific features or acts described. Rather, the specific features and acts are disclosed as sample forms of implementing the claimed subject matter.
Number | Name | Date | Kind |
---|---|---|---|
5923876 | Teague | Jul 1999 | A |
6161192 | Lubbers | Dec 2000 | A |
6170063 | Golding | Jan 2001 | B1 |
6295578 | Dimitroff | Sep 2001 | B1 |
6397293 | Shrader | May 2002 | B2 |
6453419 | Flint | Sep 2002 | B1 |
6487636 | Dolphin | Nov 2002 | B1 |
6490122 | Mueller et al. | Dec 2002 | B1 |
6493656 | Houston | Dec 2002 | B1 |
6505268 | Schultz | Jan 2003 | B1 |
6523749 | Reasoner | Feb 2003 | B2 |
6546459 | Rust | Apr 2003 | B2 |
6560673 | Elliott | May 2003 | B2 |
6587962 | Hepner | Jul 2003 | B1 |
6594745 | Grover | Jul 2003 | B2 |
6601187 | Sicola | Jul 2003 | B1 |
6606627 | Guthrie | Aug 2003 | B1 |
6606690 | Padovano | Aug 2003 | B2 |
6609145 | Thompson | Aug 2003 | B1 |
6629108 | Frey | Sep 2003 | B2 |
6629273 | Patterson | Sep 2003 | B1 |
6643795 | Sicola | Nov 2003 | B1 |
6647514 | Umberger | Nov 2003 | B1 |
6658590 | Sicola | Dec 2003 | B1 |
6663003 | Johnson | Dec 2003 | B2 |
6681308 | Dallmann | Jan 2004 | B1 |
6708285 | Oldfield | Mar 2004 | B2 |
6715101 | Oldfield | Mar 2004 | B2 |
6718404 | Reuter | Apr 2004 | B2 |
6718434 | Veitch | Apr 2004 | B2 |
6721902 | Cochran | Apr 2004 | B1 |
6725393 | Pellegrino | Apr 2004 | B1 |
6742020 | Dimitroff | May 2004 | B1 |
6745207 | Reuter | Jun 2004 | B2 |
6763409 | Elliott | Jul 2004 | B1 |
6772231 | Reuter | Aug 2004 | B2 |
6775790 | Reuter | Aug 2004 | B2 |
6795904 | Kamvysselis | Sep 2004 | B1 |
6802023 | Oldfield | Oct 2004 | B2 |
6807605 | Umberger | Oct 2004 | B2 |
6817522 | Brignone | Nov 2004 | B2 |
6823453 | Hagerman | Nov 2004 | B1 |
6839824 | Camble | Jan 2005 | B2 |
6842833 | Phillips | Jan 2005 | B1 |
7085884 | Torrey | Aug 2006 | B2 |
7207041 | Elson et al. | Apr 2007 | B2 |
7386480 | Sarig | Jun 2008 | B2 |
20020004883 | Nguyen et al. | Jan 2002 | A1 |
20020019863 | Reuter | Feb 2002 | A1 |
20020019908 | Reuter | Feb 2002 | A1 |
20020019920 | Reuter | Feb 2002 | A1 |
20020019922 | Reuter | Feb 2002 | A1 |
20020019923 | Reuter | Feb 2002 | A1 |
20020048284 | Moulton | Apr 2002 | A1 |
20020188800 | Tomaszewski | Dec 2002 | A1 |
20030051109 | Cochran | Mar 2003 | A1 |
20030056038 | Cochran | Mar 2003 | A1 |
20030063134 | Lord | Apr 2003 | A1 |
20030074492 | Cochran | Apr 2003 | A1 |
20030079014 | Lubbers | Apr 2003 | A1 |
20030079074 | Sicola | Apr 2003 | A1 |
20030079082 | Sicola | Apr 2003 | A1 |
20030079083 | Lubbers | Apr 2003 | A1 |
20030079102 | Lubbers | Apr 2003 | A1 |
20030079156 | Sicola | Apr 2003 | A1 |
20030084241 | Lubbers | May 2003 | A1 |
20030101318 | Kaga | May 2003 | A1 |
20030110237 | Kitamura | Jun 2003 | A1 |
20030126315 | Tan | Jul 2003 | A1 |
20030126347 | Tan | Jul 2003 | A1 |
20030140191 | McGowen | Jul 2003 | A1 |
20030145045 | Pellegrino | Jul 2003 | A1 |
20030145130 | Schultz | Jul 2003 | A1 |
20030170012 | Cochran | Sep 2003 | A1 |
20030177323 | Popp | Sep 2003 | A1 |
20030187847 | Lubbers | Oct 2003 | A1 |
20030187947 | Lubbers | Oct 2003 | A1 |
20030188085 | Arakawa | Oct 2003 | A1 |
20030188114 | Lubbers | Oct 2003 | A1 |
20030188119 | Lubbers | Oct 2003 | A1 |
20030188153 | Demoff | Oct 2003 | A1 |
20030188218 | Lubbers | Oct 2003 | A1 |
20030188229 | Lubbers | Oct 2003 | A1 |
20030188233 | Lubbers | Oct 2003 | A1 |
20030191909 | Asano | Oct 2003 | A1 |
20030191919 | Sato | Oct 2003 | A1 |
20030196023 | Dickson | Oct 2003 | A1 |
20030212781 | Kaneda | Nov 2003 | A1 |
20030229651 | Mizuno | Dec 2003 | A1 |
20030236953 | Grieff | Dec 2003 | A1 |
20040019740 | Nakayama | Jan 2004 | A1 |
20040024838 | Cochran | Feb 2004 | A1 |
20040024961 | Cochran | Feb 2004 | A1 |
20040030727 | Armangau | Feb 2004 | A1 |
20040030846 | Armangau | Feb 2004 | A1 |
20040049634 | Cochran | Mar 2004 | A1 |
20040078638 | Cochran | Apr 2004 | A1 |
20040078641 | Fleischmann | Apr 2004 | A1 |
20040128404 | Cochran | Jul 2004 | A1 |
20040168034 | Homma et al. | Aug 2004 | A1 |
20040215602 | Cioccarelli | Oct 2004 | A1 |
20040230859 | Cochran | Nov 2004 | A1 |
20040267959 | Cochran | Dec 2004 | A1 |
20050240649 | Elkington | Oct 2005 | A1 |
20080022370 | Beedubail et al. | Jan 2008 | A1 |
Number | Date | Country | |
---|---|---|---|
20080215806 A1 | Sep 2008 | US |