Claims
- 1. A method for controlling access to a data set by first and second applications wherein the data set is stored in a first data storage facility that is addressable by the first application, said method comprising the steps of:
A) configuring a second data storage facility to correspond to the first data storage facility, B) establishing, in response to a first command, the second data storage facility as a mirror for the first data storage facility thereby to copy the data set to the second data storage facility, and C) in response to a second command:
i) terminating the memory mirror function of the second data storage facility, and ii) enabling the second storage facility to be addressed by the second application whereby the first and second applications thereafter can access the data sets in the first and second data storage facilities respectively and concurrently.
- 2. A method as recited in claim 1 additionally comprising the steps of:
A) monitoring data set changes in the first data storage facility, and B) monitoring data set changes in the second data storage facility.
- 3. A method as recited in claim 2 wherein said method comprises the additional steps, in response to a third command, of:
i) terminating the operation of the second data storage facility in response to the second command; and ii) re-establishing the second data storage facility as a mirror for the first data storage facility.
- 4. A method as recited in claim 3 wherein the first and second data storage facilities are organized into blocks that contain portions of a data set and wherein said monitoring of data set changes in the first data storage facility defines all specific blocks that have been altered, said re-establishment including the step of copying the specified blocks to overwrite corresponding blocks in the second data storage facility.
- 5. A method as recited in claim 2 wherein said method comprises the additional steps in response to a fourth command of:
i) terminating the operation of the second data storage facility in response to the second command; and ii) restoring the data from the second storage facility to the first data storage facility.
- 6. A method as recited in claim 5 wherein the first and second data storage facilities store data in a plurality of blocks, said restoring of the contents of the second data storage facility to the first data storage facility including the step of setting the first storage facility so that said monitoring step detects invalid indications for each data block in the first data storage facility and copying data blocks from the second data storage facility to the first data storage facility while updating the data set changes as they occur.
- 7. A method as recited in claim 2 wherein said method comprises the additional steps in response to a fifth command of:
i) terminating the operation of the second data storage facility in response to the second command; and ii) restoring selected data from the second storage facility to the first data storage facility, in response to the monitored data set changes in the second data storage facility.
- 8. A method as recited in claim 7 wherein the first and second data storage facilities store data in a plurality of blocks, said restoring of the contents of the second data storage facility to the first data storage facility including the step of restoring blocks that said monitoring of the data set in the second data storage facility indicates were changed by the second application.
- 9. A method as recited in claim 1 wherein each of the first and second data storage facilities comprises first and second logical volumes on first and second disk drives, respectively, each of the disk drives connecting through a corresponding device controller wherein said method comprises the additional steps of responding to commands in by altering the ready status of the first and second logical volumes with respect to the first and second applications.
- 10. A method as recited in claim 1 wherein the first data storage facility comprises at least one mirror storage device and wherein the second data storage facility comprises a storage device that is responsive to commands from two locations, said response to the first command enabling a communications path with the second application and inhibiting communications with the first application and said response to the second command enabling communications with the first application and disabling communications with the second application.
CROSS REFERENCE TO A RELATED APPLICATION
[0001] This is a continuation-in-part of copending application for U.S. Letters Patent Ser. No. 08/656,035 filed May 31, 1996 for a Method and Apparatus for Independent Operation of a Remote Data Facility, which application is assigned to the same assignee as this invention.
Continuations (2)
|
Number |
Date |
Country |
Parent |
09597404 |
Jun 2000 |
US |
Child |
10228783 |
Aug 2002 |
US |
Parent |
08842953 |
Apr 1997 |
US |
Child |
09597404 |
Jun 2000 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
08656035 |
May 1996 |
US |
Child |
08842953 |
Apr 1997 |
US |