The invention relates to an apparatus and method to control access to logical volumes disposed in one or more information storage and retrieval systems when establishing, using, and/or terminating one or more copy service relationships comprising two or more of those logical volumes.
In hierarchical computer storage systems, fast and intensively used storage are paired with arrays of slower and less frequently accessed data devices. One example of high-speed, expensive memory is a direct access storage device file buffer (DASD). Slower storage devices include tape drives and disk drive arrays. Such tape drives and/or disk drive arrays are often located in an information storage and retrieval system, sometimes referred to as an automated media storage library.
Information storage and retrieval systems are known for providing cost effective access to large quantities of stored information, such as backup computer files. Generally, such information storage and retrieval systems include information storage media, such as a plurality of tape cartridges, a plurality of optical cartridges, a plurality of disk arrays, a plurality of electronic storage media, and the like. By electronic storage media, Applicants mean a device such as a PROM, EPROM, EEPROM, Flash PROM, and the like. A number of different companies manufacture automated media storage libraries today, each model displaying various different features. One example is the IBM TotalStorage® Enterprise Storage Server.
Storage area networks (SANs) are dedicated networks that connect one or more hosts or servers to storage devices and subsystems, such as an automated media library. SANs may utilize an appliance, such as a networked attached storage device (“NASD”) to provide for management of the SAN.
It is desirable to maintain copies of computer files, i.e. to maintain “backups.” In certain embodiments, files are copied to one or more logical volumes disposed in the same information storage and retrieval system. In other embodiments, files are copied to one or more logical volumes disposed in both a first information storage and retrieval system and in a second information storage and retrieval system, where the first storage system is geographically separated from the second storage system. Data disaster recovery solutions include various “peer-to-peer” copy routines where data is backed-up not only remotely, but also continuously (either synchronously or asynchronously).
What is needed is a method to control access to logical volumes disposed in one or more information storage and retrieval systems when establishing, maintaining, and/or terminating various copy service relationships between two or more of those logical volumes, where multiple host computers owned by differing persons have access rights to one or more of those logical volumes.
Applicants' invention includes an apparatus and method to control access to logical volumes disposed in one or more information storage and retrieval systems when using copy service relationships. The method provides a first information storage and retrieval system comprising a plurality of first logical volumes, a second information storage and retrieval system comprising a plurality of second logical volumes, and a providing a plurality of host computers capable of communicating with the first information storage and retrieval system.
The method forms (N) host computer groups, and assigning each of the plurality of host computers to a host computer group. The method forms (N) logical volume groups, and assigns one or more of the plurality of first logical volumes to a logical volume group.
The method receives a request from a host computer assigned to the (i)th host computer group to establish a copy service relationship between a source logical volume and a target logical volume. The method determines if the source logical volume is assigned to the (i)th logical volume group. If the source logical volume is assigned to the (i)th logical volume group, then the method determines if the target logical volume is assigned to the (i)th logical volume group. If both the source and target logical volumes are assigned to the (i)th logical volume group, then the method establishes the requested copy service relationship.
The invention will be better understood from a reading of the following detailed description taken in conjunction with the drawings in which like reference designators are used to designate like elements, and in which:
Referring to the illustrations, like numerals correspond to like parts depicted in the Figures. The invention will be described as embodied in a data processing system.
System 200 further includes configuration interface 290. In certain embodiments, configuration interface 290 is integral with information storage and retrieval system 250. In the illustrated embodiment of
The illustrated embodiments of
Host computer 210 comprises a computer system, such as a mainframes personal computer, workstation, and combinations thereof, including an operating system 212 such as Windows, AIX, Unix, MVS, LINUX, etc. (Windows is a registered trademark of Microsoft Corporation; AIX is a registered trademark and MVS is a trademark of IBM Corporation; and UNIX is a registered trademark in the United States and other countries licensed exclusively through The Open Group.) In certain embodiments, host computer 210 further includes a second operating system 218 such as, for example, Windows, AIX, Unix, MVS, LINUX, etc.
In certain embodiments, host computer 210 includes a storage management program 214. The storage management program 214 in the host computer 210 may include the functionality of storage management type programs known in the art that manage the transfer of data to a data storage and retrieval system, such as the IBM DFSMS implemented in the IBM MVS operating system.
Storage management program 214 may include known storage management program functions, such as recall and migration. The storage management program 214 may be implemented within the operating system 212 of the host computer 210 or as a separate, installed application program 216. Alternatively, storage management program 214 may include device drivers, backup software, application programs 216, and the like.
Host computer 220 comprises a computer system, such as a mainframe, personal computer, workstation, and combinations thereof, including an operating system 222 such as Windows, AIX, Unix, MVS, LINUX, etc. In certain embodiments, host computer 220 further includes a second operating system 228 such as, for example, Windows, AIX, Unix, MVS, LINUX, etc.
In certain embodiments, host computer 220 includes a storage management program 224. The storage management program 224 in the host computer 220 may include the functionality of storage management type programs known in the art that manage the transfer of data to a data storage and retrieval system, such as the IBM DFSMS implemented in the IBM MVS operating system.
Storage management program 224 may include known storage management program functions, such as recall and migration. The storage management program 224 may be implemented within the operating system 222 of the host computer 220 or as a separate, installed application program 226. Alternatively, storage management program 214 may include device drivers, backup software, application programs 226, and the like.
Host computer 230 comprises a computer system, such as a mainframe, personal computer, workstation, and combinations thereof, including an operating system 232 such as Windows, AIX, Unix, MVS, LINUX, etc. In certain embodiments, host computer 230 further includes a second operating system 238 such as, for example, Windows, AIX, Unix, MVS, LINUX, etc.
In certain embodiments, host computer 230 includes a storage management program 234. The storage management program 234 in the host computer 230 may include the functionality of storage management type programs known in the art that manage the transfer of data to a data storage and retrieval system, such as the IBM DFSMS implemented in the IBM MVS operating system.
Storage management program 234 may include known storage management program functions, such as recall and migration. The storage management program 234 may be implemented within the operating system 232 of the host computer 210 or as a separate, installed application program 236. Alternatively, storage management program 234 may include device drivers, backup software, application programs 236, and the like.
In the illustrated embodiment of
In the illustrated embodiment of
In the illustrated embodiment of
SAN 240 comprises a storage area network, and includes NASD 245. NASD 245 includes controller 246 and memory 247.
SAN 240 is capable of communicating with information storage and retrieval system 250 via a plurality of communication links 270. In the illustrated embodiment of
In the illustrated embodiment of
In the illustrated embodiment of
In the illustrated embodiment of
In the illustrated embodiments of
Information storage and retrieval system 260 includes controller 268 and non-volatile memory 269. In the illustrated embodiments of
Information storage and retrieval system 250 is capable of communicating with information storage and retrieval system 260 via a plurality of communication links 280. In the illustrated embodiments of
In certain embodiments, the logical volumes disposed in Applicants' first and/or second information storage and retrieval system are written to one or more DASD device. In a certain embodiments, the logical volumes disposed in Applicants' first and/or second information storage and retrieval system are written to one or more hard disks. In certain embodiments, the logical volumes disposed in Applicants' first and/or second information storage and retrieval system are written to one or more hard disks, where those hard disks are configured in one or more hard disk arrays. In certain embodiments, the logical volumes disposed in Applicants' first and/or second information storage and retrieval system are written to one or more magnetic tapes.
In certain embodiments, Applicants' first and/or second information storage and retrieval system 250 and/or 260, respectively, comprise an automated media library comprising a plurality of tape cartridges, one or more robotic accessors, and one or more tape drives. U.S. Pat. No. 5,970,030, assigned to the common assignee herein, describes such an automated media library and is hereby incorporated by reference. In certain embodiments, Applicants' first and/or second information storage and retrieval system 250 and/or 260, respectively, comprise a virtual tape system. U.S. Pat. No. 6,269,423, assigned to the common assignee herein, describes such a virtual tape system, and is hereby incorporated by reference. In certain embodiments, Applicants' first and/or second information storage and retrieval system 250 and/or 260, respectively, comprise information storage and retrieval system 100 (
Referring now to
Information storage and retrieval system 100 further includes a plurality of host adapters 102-105, 107-110, 112-115, and 117-120, disposed in four host bays 101, 106, 111, and 116. Each host adapter may comprise one or more Fibre Channel ports, FICON ports, ESCON ports, or SCSI ports. Other embodiments may have host adapters comprising ports supporting other protocols known to those skilled in the art. Each host adapter is connected to both clusters through one or more Common Platform Interconnect buses 121 and 150 such that each cluster can handle I/O from any host adapter.
Processor portion 130 includes processor 132 and cache 134. Processor portion 140 includes processor 142 and cache 144. I/O portion 160 includes non-volatile storage (“NVS”) 162 and NVS batteries 164. I/O portion 170 includes NVS 172 and NVS batteries 174.
I/O portion 160 further comprises a plurality of device adapters, such as device adapters 165, 166, 167, and 168, and sixteen disk drives organized into two disk arrays, namely array “A” and array “B”. In certain embodiments, hard disk arrays “A” and “B” utilize a RAID protocol. As those skilled in the art will appreciate, a RAID (Redundant Array of Independent Disks) rank combines multiple inexpensive disk drives into an array of disk drives to obtain performance, capacity and reliability that exceeds that of a single large drive.
In certain embodiments, arrays “A” and “B” comprise what is sometimes called a JBOD array, i.e. “Just a Bunch Of Disks” where the array is not configured according to RAID. The illustrated embodiment of
Hard disk array “A” includes disk drives 181, 182, 183, 184, 191, 192, and 193. Hard disk array “B” includes disk drives 185, 186, 187, 188, 195, 196, 197, and 198. In the illustrated embodiment of
Referring again to
In certain embodiments, the storage system which includes information storage and retrieval system 250, information storage and retrieval system 260, configuration interface 290, and optionally one or more storage area networks, such as storage area network 240, is owned by a fourth person. In certain embodiments, that fourth person differs from the first person, the second person, and/or the third person. In order to limit the access by the first person, and/or the second person, and/or the third person, to some but not all the logical volumes disposed in information storage and retrieval system 250, the fourth person must implement an apparatus and method to control access to the logical volumes disposed in information storage and retrieval system 250.
Applicants' invention includes a method to control access to logical volumes disposed in one or more information storage and retrieval systems when establishing, using, and/or terminating, one or more copy service relationships comprising one or more of the logical volumes disposed in a first information storage and retrieval system, such as information storage and retrieval system 250, and/or one or more logical volumes disposed in a second information storage and retrieval system 260.
In certain embodiments, the first logical volume and the second logical volume are both disposed in Applicants' first information storage and retrieval system. In these embodiments, the available copy service relationships include a FlashCopy relationship or a Concurrent Copy relationship.
In certain embodiments, a first logical volume, i.e. a source logical volume, is disposed in Applicants' first information storage and retrieval system, and a second logical volume, i.e. the target logical volume, is disposed in Applicants' second information storage and retrieval system. In these embodiments, the available copy service relationships include a remote FlashCopy relationship, a peer-to-peer remote copy (“PPRC”) relationship, or an extended remote copy (“XRC”) relationship.
Applicants' FlashCopy copy service provides a point-in-time copy of all or a portion of a logical volume, sometimes referred to as a T0 copy, with almost instant availability for the host computer of both the source and target volumes. As soon as a FlashCopy establish command relationship is issued, Applicants' information storage and retrieval system, such as information storage and retrieval system 250, establishes a FlashCopy relationship between the target volume, such as for example volume 254 (
During a subsequent background copy operation, destaging algorithms manage the copy process. Applicants' information storage and retrieval system, using the metadata structure created during the establish, keeps track of which data has been copied from the source logical volume to the target logical volume, and manages the integrity of both copies.
In certain embodiments, a FlashCopy session exists from the time the FlashCopy relationship is established until all the designated data has been copied from the source volume to the target volume. In other embodiments, the FlashCopy service relationship exists until expressly terminated.
Applicants' Concurrent Copy service provides a point-in-time copy of data concurrent with normal application processing, In certain embodiments, Applicants' Concurrent Copy service utilizes System Data Mover (“SDM”) algorithms disposed in IBM's DFSMS program, such as program 214 (
Using a Concurrent Copy relationship, Applicants' method generates a copy or a dump of data while an application, such as for example, application 216 (
A Concurrent Copy session comprises a single invocation of a Concurrent Copy relationship. A session may include one or more data sets or volumes, on the same information storage and retrieval system or across different information storage and retrieval system. Applicants' information storage and retrieval system, such as information storage and retrieval system 250, assigns a unique session ID to each Concurrent Copy session. Applicants' storage system uses this session ID to identify and coordinate all host and storage system resources associated with a particular Concurrent Copy session.
When an application, such as for example application 226 (
Applicants' Extended Remote Copy (“XRC”) service utilizes the SDM described above, where that copy service maintains a copy of data asynchronously at a remote location, and can be implemented over unlimited distances. XRC will copy primary volumes from a primary storage site to secondary volumes at the secondary storage site. The primary volume and its corresponding secondary volume makes an XRC volume pair.
Applicants' peer-to-peer remote copy (“PPRC”) service enables the mirroring of information disposed in a primary site, such as information storage and retrieval system 250 (
IBM publication SG24-5680-02, entitled IBM TotalStorage ENTERPRISE STORAGE SERVER IMPLEMENTING ESS COPY SERVICES WITH IBM eSERVER zSERIES, September 2003, describes Applicants' FlashCopy copy service, remote FlashCopy copy service, various PPRC copy services, and XRC service, and is hereby incorporated by reference.
Applicants' invention includes a method to control access to logical volumes disposed in one or more information storage and retrieval system when establishing, using, or terminating one or more copy service relationships comprising two or more of those logical volumes.
In step 310, Applicant's method provides a plurality of host computers, such as host computers 210, 220, 230, where each of those host computers are capable of communicating with Applicants' first information storage and retrieval system.
In step 320, Applicant's method forms (N) host computer groups, where (N) is equal to or greater than 1. In certain embodiments, one or more of those host computer groups includes one host computer. In certain embodiments, one or more of those host computer groups includes two or more host computers. In certain embodiments, step 320 is performed by a storage system owner and/or operator, such as the owner and/or operator of information storage and retrieval system 250 (
In step 330, Applicants' method assigns each host computer capable of communicating with the first information storage and retrieval system to one of the (N) host computer groups, such that an assigned host computer is only assigned to one of the (N) host computer groups. In certain embodiments, step 330 is performed by a storage system owner and/or operator, such as the owner and/or operator of information storage and retrieval system 250 (
In step 340, Applicants' method forms (N) logical volume groups, such that a logical volume is only assigned, if at all, to one of those (N) logical volume groups. Using Applicants' method, a host computer assigned to the (i)th host computer group has access rights to logical volumes assigned to the (i)th logical volume group. In certain embodiments, step 340 is performed by a storage system owner and/or operator, such as the owner and/or operator of information storage and retrieval system 250 (
In step 350, Applicants' storage system receives a request from a host computer to establish a copy service relationship between a first logical volume, i.e. a source volume, and a second logical volume, i.e. a target volume. In certain embodiments, the first logical volume and the second logical volume are both disposed in one first information storage and retrieval system. In these embodiments, the copy service relationship requested in step 350 may comprise a FlashCopy relationship or a Concurrent Copy relationship.
In certain embodiments, the first logical volume is disposed in a first information storage and retrieval system, such as information storage and retrieval system 250 (
In step 355, Applicants' method determines that the requesting host computer is assigned to the (i)th host computer group. In certain embodiments, step 360 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 360 is performed by a controller, such as controller 242 (
In step 360, Applicants' method determines if the first logical volume, i.e. the source volume, is assigned to the (i)th logical volume group. In certain embodiments, step 360 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 360 is performed by a controller, such as controller 242 (
If Applicant' method determines that the first logical volume is not assigned to the (i)th logical volume, then the method transitions from step 360 to step 380 wherein the method does not establish the requested copy services relationship. Alternatively, if Applicants' method determines that the first logical volume is assigned to the (i)th logical volume, then the method transitions from step 360 to step 370 wherein the method determines if the second logical volume is assigned to the (i)th logical volume group. In certain embodiments, step 370 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 370 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 370 that the second logical volume is not assigned to the (i)th logical volume group, then the method transitions from step 370 to step 380 wherein the method denies the request to establish the copy service relationship of step 350 and ends. In certain embodiments, step 380 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 380 is performed by a controller, such as controller 242 (
Alternatively, if Applicants' method determines in step 370 that the second logical volume is assigned to the (i)th logical volume group, then the method transitions from step 370 to step 390 wherein the method established the requested copy services relationship. In certain embodiments, step 390 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 390 is performed by a controller, such as controller 242 (
For example, if both the source volume and the target volume are assigned to the (i)th logical volume group, then the (i)th host computer group has access rights to both the source volume and the target volume, and in step 390 Applicants' method establishes the requested copy services relationship. Alternatively, if the source volume is assigned to the (i)th logical volume group, and the target volume is assigned to the (j)th logical volume group, where (i) does not equal (j), then Applicants' method denies the request to establish a copy services relationship between the source and target volumes.
If Applicants' method determines in step 420 that the logical volume designated in the request of step 410 is not in a copy services relationship, then the method transitions from step 420 to step 425 wherein the method performs the requested assign or unassign. In certain embodiments, step 425 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 425 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 420 that the logical volume designated in the request of step 410 is in a copy services relationship, then the method transitions from step 420 to step 430 wherein method determines if the request of step 410 includes assigning a logical volume in a copy services relationship. In certain embodiments, step 430 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 430 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 430 that the request of step 410 comprises assigning a logical volume in an established copy service relationship, then the method transitions from step 430 to step 435 wherein the method denies the request to assign the logical volume. In certain embodiments, step 435 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 435 is performed by a controller, such as controller 242 (
If the logical volume designated in the request of step 410 is in a copy services relationship, and if that request does not comprise assigning that logical volume, then the request of step 410 comprises unassigning a logical volume in a copy services relationship. If Applicants' method determines in step 430 that the request of step 410 does not comprise assigning a logical volume in a copy services relationship, then the method transitions from step 430 to step 440 wherein the method determines whether to complete and terminate the copy services relationship before unassigning the designated logical volume. In certain embodiments, step 440 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 440 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 440 to complete and terminate the copy services relationship before unassigning the designated logical volume, then the method transitions from step 440 to step 442 wherein the method completes the copy session comprising the requested copy services relationship of step 350 (
Applicants' method transitions from step 442 to step 444 wherein the method terminates the copy service relationship established in step 390 (
Applicants' method transitions from step 444 to step 446 wherein the method unassigns the logical volume designated in the request of step 410. In certain embodiments, step 446 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 446 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 440 not to complete and terminate the copy services relationship before unassigning the logical volume designated in step 410, then the method transitions from step 440 to step 450 wherein the method determines whether to terminate the copy services relationship before completing the copy session.
If Applicants' method determines in step 450 not to terminate the copy services relationship before completing the copy session, then the method transitions from step 450 to step 460 wherein the method does not unassign the volume(s) recited in the request of step 410. If Applicants' method determines in step 450 to terminate the copy services relationship before completing the copy session, then the method transitions from step 450 to step 452 wherein the method terminates the copy services relationship even if the copy session is not completed. Depending on the copy service established in step 390, terminating that relationship before completing the copy session implementing that copy service could result in data loss. Therefore, in certain embodiments step 452 must be performed by the storage system owner/operator.
Applicants' method transitions from step 452 to step 454 wherein the method unassigns the source volume and/or the target volume. In certain embodiments, step 454 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 454 is performed by a controller, such as controller 242 (
In certain embodiments, Applicants' method transitions from step 350 (
If Applicants' method determines in step 505 that the requested copy service of step 350 (
Only the storage system owner/operator can access configuration interface 290. Therefore, a request to establish a copy services relationship between a first logical volume disposed in a first information storage and retrieval system and a second logical volume disposed in a second information storage and retrieval system provided by a configuration interface is necessarily provided by the storage system owner/operator. Prior to making such a request, the storage system owner/operator will verify that host computers having access rights to the first logical volume also have access rights to the second logical volume.
If Applicants' method determines in step 510 that the request of step 350 to establish a PPRC copy service relationship was not provided by a configuration interface, then Applicants' method transitions from step 510 to step 515 wherein the method denies the request of step 350. In certain embodiments, step 515 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 515 is performed by a controller, such as controller 242 (
Alternatively, if Applicants' method determines in step 510 that the request of step 350 to establish a PPRC copy service relationship was provided by a configuration interface, then Applicants' method transitions from step 510 to step 520 wherein the method establishes the requested PPRC copy service relationship. In certain embodiments, step 520 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 520 is performed by a controller, such as controller 242 (
In certain embodiments, Applicants' method in step 525 receives a request to terminate the PPRC relationship established in step 520. Applicants' method transitions from step 525 to step 530 wherein the method determines if the request to terminate a PPRC relationship in step 525 was provided by a configuration interface. In certain embodiments, step 530 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 530 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 530 that the request of step 525 to terminate a PPRC copy service relationship established in step 520 was not provided by a configuration interface, then Applicants' method transitions from step 530 to step 535 wherein the method denies the request of step 525. In certain embodiments, step 535 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 535 is performed by a controller, such as controller 242 (
Alternatively, if Applicants' method determines in step 530 that the request of step 325 to terminate a PPRC copy service relationship was provided by a configuration interface, then Applicants' method transitions from step 530 to step 540 wherein the method terminates the PPRC copy service relationship established in step 520. In certain embodiments, step 540 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 540 is performed by a controller, such as controller 242 (
If Applicant' method determines in step 505 that the requested copy service relationship of step 350 (
If Applicants' method determines in step 545 that the requested copy service relationship comprises a remote FlashCopy service relationship, then the method transitions from step 545 to step 550 wherein the method determines if the request of step 350 to establish a remote FlashCopy service relationship was provided by a configuration interface. In certain embodiments, step 550 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 550 is performed by a controller, such as controller 242 (
Therefore, if Applicants' method determines in step 550 that the request of step 350 to establish a remote FlashCopy service relationship was not provided by a configuration interface, then Applicants' method transitions from step 550 to step 555 wherein the method denies the request of step 350 and ends. In certain embodiments, step 555 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 555 is performed by a controller, such as controller 242 (
Alternatively, if Applicants' method determines in step 550 that the request of step 350 to establish a FlashCopy service relationship was provided by a configuration interface, then Applicants' method transitions from step 550 to step 560 wherein the method establishes the requested remote FlashCopy service relationship. In certain embodiments, step 560 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 560 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 545 that the requested copy service relationship of step 350 (
If Applicants' method determines in step 565 that the requested copy service relationship comprises an XRC service relationship, then the method transitions from step 565 to step 570 wherein the method denies the request of step 350 to establish an XRC service relationship. In certain embodiments, step 570 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 570 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 565 that the requested copy service relationship does not comprises an XRC service relationship, then the method transitions from step 565 to step 575 wherein the method determines if the request of step 350 includes adding new source and/or new target volumes to an existing Concurrent Copy session. In certain embodiments, step 575 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 575 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 575 that the request of step 350 includes adding new source and/or new target volumes to an existing Concurrent Copy session, then the method transitions from step 575 to step 580 wherein the method determines if the new source volumes and if the new target volumes are assigned to the same logical volume group as the source/target volumes in the existing Concurrent Copy session. In certain embodiments, step 580 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 580 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 580 that the one or more new source volumes and/or the one or more new target volumes are assigned to the same logical volume group as the source/target volumes in the existing Concurrent Copy session, then the method transitions from step 580 to step 590 wherein the method adds the new source volumes and/or new target volumes to the existing Concurrent Copy session. In certain embodiments, step 590 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 590 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 580 that the one or more new source volumes and/or the one or more new target volumes are not assigned to the same logical volume group as the source/target volumes in the existing Concurrent Copy session, then the method transitions from step 580 to step 585 wherein the method denies the request to add the new source volumes and/or new target volumes to the existing Concurrent Copy session. In certain embodiments, step 585 is performed by a controller, such as controller 258, disposed in Applicants' information storage and retrieval system. In certain embodiments, step 585 is performed by a controller, such as controller 242 (
If Applicants' method determines in step 575 that the request of step 350 does not include adding one or more new source volumes, and/or adding one or more new target volumes, to an existing Concurrent Copy session, then Applicants' method transitions from step 575 to step 360 and continues.
The embodiments of Applicants' method recited in
In certain embodiments, Applicants' invention includes instructions residing in non-volatile memory 259 (
While the preferred embodiments of the present invention have been illustrated in detail, it should be apparent that modifications and adaptations to those embodiments may occur to one skilled in the art without departing from the scope of the present invention as set forth in the following claims.