Information system having computer and storage apparatus coupled to network

ABSTRACT

The present invention is an information system that includes: a first computer; a first storage apparatus; a first network apparatus, to which the first computer and the first storage apparatus are connected, providing a first fabric service; a second computer; a second storage apparatus; a second network apparatus, to which the second computer and the second storage apparatus are connected, providing a second fabric service; and a network that connects the first network apparatus and the second network apparatus, wherein the first computer accesses the first fabric service, the second computer accesses the second fabric service, and the first storage apparatus and the second storage apparatus access the first fabric service and the second fabric service, respectively.

TECHNICAL FIELD

This invention relates to an information process system that has acomputer and storage apparatus coupled to a network device, as well as aconstruction/operation method of the information process system.Particularly, the present invention relates to a communication pathmanagement method for managing a network path between the computer andthe storage apparatus.

BACKGROUND ART

As a computer system for a data center consolidates more and more, anetwork system serving as the base of the computer system becomes morecomplicated. For this reason, technology for simplifying the networksystem and its management is required. There is a Fibre Channel overEthernet (FCoE) as the simplification technology. FCoE is a standard forencapsulating a Fibre Channel (FC) frame within an Ethernet frame andoperating it on the Ethernet. This technology enables both a networksystem (a communication system using the FC) coupling a computer to astorage apparatus and a network system (a communication system using theEthernet and an IP (Internet Protocol)) coupling a computer to aterminal apparatus or a computer to a computer to be constructed fromphysically the same network apparatus. A reduction in the number ofnetwork interface cards (network adapters)/host bus adapters for thecomputers and storage apparatuses, and a reduction in the number ofnetwork cables and network apparatuses can be expected as the effects ofthe use of this technology.

As a management technology in FCoE, there is disclosed technology forallocating MAC (Media Access Control) addresses to computers or storageapparatuses that transmit the FCoE frame (see Patent Literature 1, forexample).

The FCoE standard is becoming standardized according to the standardsgroup ANSI (American National Standards Institute) and INCITS(International Committee for Information Technology Standards) T11,wherein function models and so on are specified (see Non PatentLiterature 1, for example).

CITATION LIST Patent Literature

-   PTL 1: United States Patent Application Publication No. 2009/0292813

Non Patent Literature

-   NPL 1: ANSI INCITS, “Fibre Channel Backbone-5 (FC-BB-5)” [online]    Internet URL: http://www.t11.org/ftp/t11/pub/fc/bb-5/09-056v5.pdf,    2009

SUMMARY OF INVENTION Technical Problem

The technology described in the abovementioned literature takes intoconsideration managing computers and storage apparatuses, such asallocating MAC addresses to these individual apparatuses, but does nottake into consideration how the communication paths should be managed inthe entire network system where many computers/storage apparatuses aredisposed in a large-scale data center. In a network using FCoE, a fabricservice function is responsible for allocating the MAC addresses and fortransferring an FC frame encapsulated within an FCoE frame. Theperformance of an apparatus having the fabric service function is notinfinite. If the number of computers/storage apparatuses exceeds acertain number, a plurality of the fabric service functions need to bedisposed on the network system. The communication paths between thecomputers and the storage apparatuses need to be managed after thearrangement of the fabric service functions is defined.

Solution to Problem

The present invention was contrived in view of the aforementionedproblems in a large-scale data center in which many computers andstorage apparatuses are disposed. An object of the present invention isto provide a network system in which a plurality of network apparatuseswith fabric service functions are disposed, the network system being amanagement apparatus capable of managing and configuring communicationpaths between the computers and the storage apparatuses.

Another object of the present invention is to provide a managementapparatus that is capable of managing and configuring changes in thecommunication paths between the computers and the storage apparatuses,without changing the configurations of virtual computers operated on thecomputers and logical volumes operated on the storage apparatuses, evenwhen the computers and storage apparatuses are renewed.

In order to achieve the objects described above, an information systemaccording to one aspect of the present invention is an informationsystem, which includes: a first computer; a first storage apparatus; afirst network apparatus coupled to the first computer and the firststorage apparatus and providing a first fabric service; a secondcomputer; a second storage apparatus; a second network apparatus coupledto the second computer and the second storage apparatus and providing asecond fabric service; and a network that couples the first networkapparatus and the second network apparatus, wherein the first computeraccesses the first fabric service, the second computer accesses thesecond fabric service, and the first storage apparatus and the secondstorage apparatus access both the first fabric service and the secondfabric service, respectively.

In order to achieve the objects described above, a management methodaccording to one aspect of the present invention is a management methodthat is performed by a management computer coupled to an informationsystem that includes: a first computer; a first storage apparatus; afirst network apparatus coupled to the first computer and the firststorage apparatus and providing a first fabric service; a secondcomputer; a second storage apparatus; a second network apparatus coupledto the second computer and the second storage apparatus and providing asecond fabric service; and a network that couples both the first networkapparatus and the second network apparatus, wherein the managementcomputer: configures fabric service allocation information forassociating the first fabric service with a first virtual network andassociating the second fabric service with a second virtual network;configures computer allocation information for associating the firstvirtual network with the first computer, associating the second virtualnetwork with the second computer, and associating the first virtualnetwork and the second virtual network with the first storage apparatus;configures storage apparatus allocation information for associating thefirst virtual network and the second virtual network with the firststorage apparatus and associating the first virtual network and thesecond virtual network with the second storage apparatus; and configuresthe first virtual network in the first network apparatus and the secondvirtual network in the first network apparatus such that the firstcomputer accesses the first fabric service, the second computer accessesthe second fabric service, and that the first storage apparatus and thesecond storage apparatus access the first fabric service and the secondfabric service, respectively.

Advantageous Effects of Invention

According to the present invention, even in a large-scale network inwhich a plurality of computers and a plurality of storage apparatusesare coupled to a plurality of network apparatuses, is it possible tocompletely establish communication paths between the computers and thestorage apparatuses. Moreover, the communication paths between thecomputers and the storage apparatuses can be managed and configuredefficiently.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 shows a composition example of a computer system according to anembodiment of the present invention.

FIG. 2 is a functional composition example of a network apparatus.

FIG. 3 is a functional composition example of a computer.

FIG. 4 is a functional composition example of a storage apparatus.

FIG. 5 is a functional composition example of a management computer.

FIG. 6 is a flowchart showing a communication path configurationprocess.

FIG. 7A is an explanatory diagram illustrating an outline ofcommunication path configuration.

FIG. 7B is an explanatory diagram illustrating an outline ofcommunication path configuration.

FIG. 8 is an explanatory diagram of a logical volume allocation table.

FIG. 9 is an explanatory diagram of a fabric service allocation table.

FIG. 10A is an explanatory diagram of a communication interfaceallocation table.

FIG. 10B is an explanatory diagram of a communication interfaceallocation table.

FIG. 11A is an explanatory diagram of a virtual HBA allocation table.

FIG. 11B is an explanatory diagram of a virtual HBA allocation table.

FIG. 12 is a flowchart showing a computer-to-storage apparatuscommunication path configuration process.

FIG. 13 is an explanatory diagram of a VLAN allocation table.

FIG. 14 is a flowchart showing a login process regarding a communicationinterface and virtual HBA.

FIG. 15 is an explanatory diagram of a login process regarding thecommunication interface.

FIG. 16A is an explanatory diagram of a login process regarding thevirtual HBA.

FIG. 16B is an explanatory diagram of a login process regarding thevirtual HBA.

FIG. 17 is an explanatory diagram of an FC ID allocation table.

FIG. 18A is a flowchart showing a VLAN allocation table update process.

FIG. 18B is a flowchart showing a VLAN allocation table update process.

FIG. 19 is a flowchart showing a virtual computer migration process.

FIG. 20 is an explanatory diagram illustrating an outline of the virtualcomputer migration process.

FIG. 21 is a flowchart showing a logical volume migration process.

FIG. 22 is an explanatory diagram illustrating an outline of the logicalvolume migration process.

DESCRIPTION OF EMBODIMENTS

An embodiment of the present invention is described hereinafter withreference to the diagrams.

Note in the following description that a variety of information areillustrated in the form of “kkk tables.” The variety of information maybe expressed using data structures other than the tables. In order toexplain that the information do not depend on the data structures, “kkktables” can also be referred to as “kkk information.”

In addition, in the following description, various target identificationinformation are represented by numbers or identifiers, but variousidentification information that are not represented by numbers oridentifiers may be employed as well.

Moreover, in the following description, the term “program” is used asthe subject in a sentence describing each process. However, because theprogram carries out a certain process by appropriately using a storageresource (a memory, for example) and/or a communication interface device(a communication port, for example) by being executed by a processor (aCPU (Central Processing Unit), for example), the subject of the processmay be “processor.” A process described by the term “program” as thesubject may be carried out by a network apparatus or a managementcomputer. The processor also may include a hardware circuit for carryingout part or all of the processes performed by the processor. A computerprogram may be installed from a program source into each computer. Theprogram source may be, for example, a program distribution server or astorage medium.

Furthermore, in the following description, a management apparatus of acomputer system may be composed of one or more computers. Morespecifically, for example, when a management computer displaysinformation or when the management computer transmits the displayedinformation to a remote computer, the management computer serves as themanagement apparatus. Also, for example, when functions equivalent tothose of the management computer are realized by a plurality ofcomputers, the plurality of computers (may include a display computerwhen the display computer performs the display) serve as the managementapparatus. In this embodiment, the management computer serves as themanagement apparatus.

In the following description, the same reference numerals shown in eachdiagram represent the same elements (or corresponding elements). Forconvenience of description, the elements of the same type arediscriminated from one another, by adding characters and numbers such as(a), (b), (c), (1), (2), (3) and the like to the reference numerals.

In the description hereinbelow, the following abbreviations are used.

(*) A virtual computer is often abbreviated to “VM.”

(*) A communication interface is often abbreviated to “I/F.”

(*) A logical volume is often abbreviated to “LV.”

(*) A fabric service is often abbreviated to “FS.”

(*) A virtual HBA is often abbreviated to “VHBA.”

<System Composition>

FIG. 1 is a diagram showing a composition example of an informationprocess system according to an embodiment of the present invention.

The information process system includes a computer system and amanagement computer 106 for managing the computer system.

The computer system includes a plurality of edge apparatuses 101. Theedge apparatuses 101 are network apparatuses. An external network 107 iscoupled to at least one of the plurality of edge apparatuses 101 (edgeapparatuses 101(e) and 101(f), for example). Furthermore, the managementcomputer 106 is coupled to at least one of the plurality of edgeapparatuses 101.

The computer system includes the edge apparatuses 101, a switchingapparatus 102, computers 104, and storage apparatuses 105. The switchingapparatus 102 is a network apparatus. At least one of these elementsother than the edge apparatuses 101, for instance, may have theplurality of computers 104 and storage apparatuses 105.

The external network 107 may be a standard communication network thattransfers communication packets according to an IP protocol or the like(e.g., the Internet, Intranet, or an integrated communication networkthereof). A terminal apparatus (not shown) that communicates with thecomputers 104 is coupled to the external network 107. The terminalapparatus may be any type of apparatus as long as it has a communicationfunction for transmitting and receiving data to and from the computers104. Examples of the terminal apparatus include a personal computer andsensor.

Integrated apparatuses 109 may be composed of the computers 104, thestorage apparatuses 105 and the edge apparatuses 101. The integratedapparatuses are removable in apparatuses of integrated apparatuses andcoupled to the switching apparatus 102 by using the edge apparatuses 101as interfaces. In FIG. 1 of the present embodiment, each of theintegrated apparatuses 109 includes, but not limited to, two computers104, one storage apparatus 105, and two edge apparatuses 101.

The edge apparatuses 101 and the switching apparatus 102 are thecomponents of a network (internal network 112) in which the computers104 are coupled to the storage apparatuses 105. Transmission/receptionof a communication frame is carried out between the computers 104,between each computer 104 and each storage apparatus 105, or between thestorage apparatuses 105 via the network 112. In the present embodimentthe communication between the apparatuses is based on IEEE 802.3

(Ethernet) standard. Therefore, “communication frame” described in thepresent embodiment is an IEEE 802.3 (Ethernet) based communication frame(or a frame having an Ethernet enhancement function that is becomingstandardized by IEEE 802.1 Data Center Bridging Task Group). Thecommunication between each computer 104 and each storage apparatus 105is based on FCoE (Fibre Channel over Ethernet) according to ANSI T11.Therefore, the communication frame between the computer 104 and thestorage apparatus 105 is based on FCoE, or a format in which an FC(Fibre Channel) frame is encapsulated within an Ethernet frame.

The edge apparatuses 101 and the switching apparatus 102 are capable oflogically dividing the network 112 into a plurality of areas by usingVLANs (Virtual Local Area Network) 110. The VLANs 110 are areas reachedby a communication broadcast frame that is logically separated by theedge apparatuses 101 and the switching apparatus 102. The VLANs 110 arerealized according to a predetermined standard (IEEE 802.1Q, forexample).

The edge apparatuses 101 typically are switch apparatuses. Each edgeapparatus 101 is composed so as to be able to insert a tag (IEEE 802.1Qtag, for example) to the communication frame received from each computer104 or storage apparatus 105. The edge apparatus 101 also can remove thetag from the communication frame that has the tag, and transmit thecommunication frame without the tag to the computer 104 or storageapparatus 105. The edge apparatus 101 provides the computer 104 andstorage apparatus 105 with a communication interface in the network 112.

The switching apparatus 102 is typically a switch apparatus. Theswitching apparatus 102 receives the communication frame having the tagfrom the edge apparatus 101, and transfers this communication frame toany of the edge apparatuses 101 in accordance with a destination addressrecorded in the communication frame. The switching apparatus 102 may becomposed substantially the same as the edge apparatuses 101.

The apparatuses of the information process system shown in FIG. 1 aredescribed hereinafter in detail.

FIG. 2 shows a composition example of the edge apparatus 101.

The edge apparatus 101 includes communication interfaces, a storageresource, and a processor coupled to these communication interfaces andthe storage resource. Specifically, for example, the edge apparatus 101includes the following hardware elements. At least there are a pluralityof the communication interfaces 204.

(*) A CPU 201: Executes programs.

(*) A memory 202: Stores the programs and data used by the programs.

(*) The communication interfaces 204: Coupled to any of the computers104, storage apparatuses 105 and switching apparatus 102 by, forexample, cables.

(*) A switch controller 203: Transfers the communication frame from anyof the computers 104 and the storage apparatuses 105, or from theswitching apparatus 102.

As shown in FIG. 2, the memory 120 stores at least the followingprograms and tables.

(*) A communication frame switch control program 205: Controls switchingof the communication frame (Ethernet frame).

(*) A VLAN configuration program 206: Controls the VLANs 110 andconfigures or updates a VLAN allocation table 212.

(*) A fabric service program 207: Provides fabric services.

(*) A communication frame transfer management table 211: Includes pathinformation used for transferring the Ethernet frame.

(*) A VLAN allocation table 212: Includes information used foridentifying the VLAN 110 to which the communication frame belongs.

(*) An FC ID (Fibre Channel IDentifier) allocation table 213: IncludesWWPNs (World Wide Port Name) of the apparatuses logged into the fabricservices, and FC IDs allocated to the WWPNs.

Note that “WWPN” is an identifier allocated to an FC port in an FCnetwork. In addition, “FC ID” is a unique address used for transferringan FC frame in the FC network.

The fabric services provided by the fabric service program 207 eachinclude at least the following functions.

(*) A fabric server function: A function for allocating MAC (MediaAccess Control) addresses to the apparatuses logged into the fabricservices.

(*) A name server function: A function that allows information on theapparatuses logged into the fabric services to be registered in adatabase, shared by the apparatuses, and used for discovering the otherapparatuses.

Each fabric service provided by the fabric service program 207 is oftenabbreviated to “fabric service 207” hereinafter. Note that logging intothe fabric services means logging into the functions provided by eachfabric service. In the present embodiment, receiving or communicatinginformation between the fabric services is not performed. The MACaddresses are unique identifiers that are allocated to Ethernet ports inan Ethernet network.

FIG. 3 shows a composition example of the computers 104.

The computer 104 is an apparatus that executes programs used by theother computers 104 and the terminal apparatus. The computer 104 hascommunication interfaces, a storage resource, and a processor coupled tothese communication interfaces and the storage resource. Specifically,for example, the computer 104 includes the following hardware elements.

(*) A CPU 301: Executes the programs.

(*) A memory 302: Stores the programs and data used by the programs.

(*) Communication interfaces 303: Communicate with the other computers104 or the storage apparatuses 105.

The communication interfaces 303 are, for example, Ethernet controllers.Each of the communication interfaces 303 may be a converged networkadapter (CNA) in which an adapter for communicating with the computers104 and the adapter for communicating with the storage apparatuses 105are converged.

The memory 302 stores, for example, the following programs.

(*) A virtual computer execution control program 308: Controls theexecution of virtual computers 304.

(*) A virtual computer configuration program 309: Configures the virtualcomputers 304.

(*) A communication interface virtualization program 310: Defines aplurality of WWPNs 801 for one communication interface 303.

(*) A fabric service utilization program 311: Accesses the functionsthat are provided by each fabric service 207 provided by the edgeapparatus 101.

(*) A VLAN configuration program 312: Requests configuration or updateof the VLAN allocation table 212.

(*) A communication path control program 313: Controls a duplicatedcommunication path.

The virtual computers 304 are virtual computers that can have thefunctions equivalent to those of an actual computer. Each of the virtualcomputers 304 includes, for example, the following virtual communicationinterfaces.

(*) A virtual HBA (Host Bus Adapter) 305: A virtual communicationinterface for communicating with the storage apparatus 105 related tothe virtual computer 304, wherein the WWPN is defined.

(*) A virtual NIC (Network Interface Card) 306: A virtual communicationinterface for communicating with the computer 104 related to the virtualcomputer 304.

A usage rate of a CPU configured by the virtual computer configurationprogram 309 may be allocated to the virtual computers 304. Note that thevirtual computers 304 described on the memory 302 logically describevirtual computers that are executed by the virtual computer executioncontrol program 308.

FIG. 4 shows a composition example of one of the storage apparatuses105.

The storage apparatus 105 is an apparatus for storing programs and datathat are used by the computers 104 or the other storage apparatuses 105.The storage apparatus 105 may be a single disk or a so-called disk arrayapparatus with a plurality of disks. The storage apparatus 105 includes,for example, the following hardware elements.

(*) Disks 401: Devices for storing the programs and data, and examplesthereof include hard disk drives (HDD) and solid state drives (SSD).

(*) A storage apparatus controller 430: Controls I/O processes (readingand writing of the programs and data) performed on the plurality ofdisks 401, in response to an input/output request for requestinginput/output of the programs and data, which is issued from the computer104.

In place of the disks 401, other types of physical storage devices maybe employed. One or more logical volumes 402 are configured in one ormore of the disks 401 (for example, a RAID (Redundant Array ofIndependent (or Inexpensive) Disks) group). The programs or data (e.g.,an operating system, application program, or data used by theseprograms) are stored in the disks 401 corresponding to the logicalvolumes 402. For example, as the virtual communication interface, avirtual HBA 407 is related to each logical volume 402. The WWPN isdefined in the virtual HBA 407. Note that the logical volumes 402described on a memory 404 logically describe logical volumes that areprovided by a logical volume control program 409, which is describedhereinafter, and that actual data are stored in the disks.

The storage apparatus controller 430 includes communication interfaces,a storage resource, and a processor coupled to these communicationinterfaces and the storage resource. The storage apparatus controller430 includes, for example, the following hardware elements.

(*) A disk controller 403: Controls the disks 401.

(*) The memory 404: Stores the programs and data used by the programs.

(*) A CPU 405: Executes the programs.

(*) Communication interfaces 406: Ethernet controllers that communicatewith the edge apparatuses 101. Transmit/receive the Ethernet frameduring the communication.

The memory 404 stores, for example, the following programs.

(*) An access process program 408: Executes a read/write requestrequesting reading/writing of the data from/to the logical volumes 402,the request being issued from the computer 104.

(*) The logical volume control program 409: Configures the logicalvolumes 402.

(*) A communication interface virtualization program 410: Defines theplurality of WWPNs 801 for one communication interface 406.

(*) A fabric service utilization program 411: Accesses the functionsthat are provided by the fabric services 207 provided by the edgeapparatus 101.

(*) A VLAN configuration program 412: Requests configuration or updateof the VLAN allocation table 212.

FIG. 5 shows a composition example of the management computer 106.

The management computer 106 is a computer that manages the edgeapparatus 101, switching apparatus 102, computer 104 and storageapparatus 105. The management computer 106 includes communicationinterfaces, a storage source, and a processor coupled to thesecommunication interfaces and the storage resource. The managementcomputer 106 includes, for example, the following hardware elements.

(*) A CPU 501: Executes programs.

(*) A memory 502: Stores the programs and data used by the programs.

(*) Communication interfaces 503: Interfaces, or, for example, Ethernetcontrollers, that are coupled to the edge apparatuses 101.

The memory 502 stores, for example, the following programs and tables.

(*) A virtual computer-to-logical volume communication pathconfiguration program 504: Configures the communication path betweeneach virtual computer 304 and each logical volume 402.

(*) A computer-to-storage apparatus communication path configurationprogram 506: Configures the communication path between the computer 104and the storage apparatus 105.

(*) A computer-to-computer communication path configuration program 507:Configures the communication path between the computers 104.

(*) A communication path QoS configuration program 508: Configures a QoS(Quality of Service) of each communication paths (configures prioritycontrol and bandwidth control).

(*) A virtual computer migration program 509: Migrates each virtualcomputer 304 between the computers 104.

(*) A logical volume migration program 510: Migrates each logical volume402 between the storage apparatuses 105.

(*) A logical volume allocation table 512: Includes information showingthe allocation of each logical volumes 402 of the storage apparatus 105to each virtual computers 304 of the computer 104.

(*) A fabric service allocation table 515: Includes information showingthe allocations of the fabric services 207 to the edge apparatuses 101and the allocations of the VLANs 110 to the fabric services 207.

(*) A communication interface allocation table 516: Includes informationshowing the allocation of the communication interface 303 of thecomputer 104 to each VLAN 110 and the allocation of the communicationinterface 406 of the storage apparatus 105 to each VLAN 110.

(*) A virtual HBA allocation table 517: Includes the information showingthe allocation of the virtual HBA 305 to the communication interface 303within the computer 104 and the allocation of the virtual HBA 407 to thecommunication interface 406 of the storage apparatus 105.

A variety of processes that are performed in the present embodiment aredescribed below. Note that the following description is providedappropriately with reference to FIG. 7A (a diagram showing an example ofa composition between each of the computers 104 and each of the edgeapparatuses 101) and FIG. 7B (a diagram showing an example of acomposition between each of the storage apparatuses 105 and each of theedge apparatuses 101).

<Communication Path Configuration Process>

FIG. 6 is a flowchart showing an example of a process flow of acommunication path configuration process. The management computer 106implements the communication path configuration process. Thecommunication path configuration process is implemented when, forexample, adding more of the computers 104, storage apparatuses 105 orintegrated apparatuses 109 in order to reconstruct the entireinformation process system.

<<Configuration of Communication Path between Virtual Computer andLogical Volume>>

In S601, the management computer 106 (the virtual computer-to-logicalvolume communication path configuration program 504) configures thecommunication path between each virtual computer 304 and each logicalvolume 402.

First, the management computer 106 configures the allocation of thelogical volume 402 to the virtual computer 304. Note that the presentembodiment establishes, but not limited to, a dual fabric composition(duplicated path composition) between the virtual computer 304 and thelogical volume 402. The management computer 106 configures a pluralityof virtual HBAs for the logical volume 402 and the virtual computer 304,and relate the virtual HBAs 305 of the virtual computer 304 to thevirtual HBAs 407 of the logical volume 402.

The management computer 106 uses, for example, the logical volumeallocation table 512 illustrated in FIG. 8, to manage the allocation ofthe logical volume 402 to the virtual computer 304. The logical volumeallocation table 512 shows the allocation of a certain virtual HBA 407of a certain logical volume 402 to a certain virtual HBA 305 of acertain virtual computer 304. In other words, for example, the logicalvolume allocation table 512 includes the following information withrespect to the association between each virtual HBA 305 and each virtualHBA 407, as shown in FIG. 8.

(*) A WWPN 801(a): The WWPN of each virtual HBA 407 related to eachlogical volume 402.

(*) A logical volume ID 802: A unique identifier of each logical volume402.

(*) A WWPN 801(b): The WWPN of each virtual HBA related to each virtualcomputer 304.

(*) A virtual computer ID 803: A unique identifier of each virtualcomputer 304.

This table 512 shows, for example, the allocation of the logical volumes402 to the virtual computers 304 shown in FIGS. 7A and 7B. A duplicatedpath is configured as the dual fabric composition between each logicalvolume 402 and each virtual computer 304.

A manager may define the allocation of the logical volume 402 to thevirtual computer 304, which is the allocation of the WWPN 801(b) to theWWPN 801(a). In the following description, the relation among the WWPN801(a), the logical volume ID 802, the WWPN 801(b), and the virtualcomputer ID 803 is shown in each row 804 in the logical volumeallocation table 512.

In the present embodiment, all of the edge apparatuses 101 provide thefabric services 207. Note that one edge apparatus 101 may provide theplurality of fabric services 207. Furthermore, the VLAN is allocated toeach of the fabric services 207 provided by the edge apparatuses 101.The management computer 106 uses, for example, the fabric serviceallocation table 515 shown in FIG. 9, to manage the fabric services 207provided by the edge apparatuses 101. The management computer 106 alsoallocates one VLAN 110 to one fabric service 207. When the plurality offabric services 207 are set, allocating one VLAN 110 to one fabricservice 207 can eliminate the link among the fabric services 207, aswell as the necessity of a complicated configuration required in thelink among the fabric services 207. Management of the VLAN allocated toeach fabric service 207 can also be performed by using the fabricservice allocation table 515.

The fabric service allocation table 515 shows the allocation of acertain VLAN to the fabric service of a certain edge apparatus. Thefabric service allocation table 515 includes, for example, the followinginformation with respect to each fabric service, as shown in FIG. 9.

(*) A fabric service ID 901: A unique identifier of each fabric service207.

(*) A VLAN ID 902: A unique identifier of the VLAN 110 allocated to thefabric service.

(*) A edge apparatus ID 903: A unique identifier of each of the edgeapparatuses 101 providing the fabric services.

In the following description, the VLAN 110 configured with respect toeach of the fabric services 207 and the edge apparatuses 101 providingthe fabric services 207 are shown in rows 904 in the fabric serviceallocation table 515.

Next, the management computer 106 uses the communication interfaceallocation table 516 to manage the allocation of the communicationinterfaces to the VLANs 110.

The management computer 106 allocates the communication interfaces tothe respective VLANs in accordance with the following communicationinterface allocation rules.

(*) The computer 104 belongs to the VLAN 110 that is allocated to thefabric service provided by the edge apparatus 101 to which this computer104 (itself) is directly coupled (FIG. 7A).

(*) The storage apparatus 105 belongs to the VLANs 110 that areallocated to the fabric services provided by all of the edge apparatuses101 within a network 112. The storage apparatus 105 may belong to theVLAN 110 that is allocated not only to the fabric service provided bythe edge apparatus 101 to which this storage apparatus 105 (itself) isdirectly coupled, but also to the fabric services provided by the edgeapparatuses 101 to which this storage apparatus 105 (itself) is notdirectly coupled (but coupled via the other edge apparatuses 101)(FIG.7B).

When the edge apparatus 101, computer 104, and storage apparatus 105 areprovided as the integrated apparatuses 109, the following rules apply.

(*) The computer 104 belongs to the VLAN 110 that is allocated to thefabric service provided by the edge apparatus 101 in the integratedapparatus 109 to which this computer 104 (itself) belongs.

(*) The storage apparatus 105 belongs to the VLANs 110 that areallocated to the fabric services provided by the edge apparatuses 101within all of the integrated apparatuses 109. The storage apparatus 105may belong to the VLAN 110 that is allocated not only to the fabricservice provided by the edge apparatus 101 within the integratedapparatus 109 to which this storage apparatus 105 (itself) belongs, butalso to the fabric service provided by the edge apparatus 101 of anotherintegrated apparatus 109 on the network, to which this storage apparatus105 (itself) does not belong.

According to the composition described above, the computer 104 canaccess all of the storage apparatuses 105 by accessing one fabricservice provided by the edge apparatus 101 that is coupled to thiscomputer 104 itself.

FIG. 10A shows a composition example of a communication interfaceallocation table 516(a) of the computer 104.

This table 516(a) shows the allocation of a certain communicationinterface of the computer to a certain VLAN. In other words, thecommunication interface allocation table 516(a) includes, for example,the following information with respect to each of the communicationinterfaces 303 of the computer.

(*) A communication interface WWPN 801(d): The WWPN of the certaincommunication interface 303 of the computer 104.

(*) A communication interface MAC address 1001(d): The MAC address ofthe communication interface 303 of the computer 104.

(*) A computer ID 1002: A unique identifier of the computer 104 havingthe communication interface 303.

(*) The VLAN ID 902: A unique identifier of the VLAN 110 allocated tothe communication interface 303.

In accordance with the VLAN allocation rules described above, themanagement computer 106 allocates each communication interface 303 ofthe computer 104 to the VLAN 110 that is allocated to the edge apparatus101 to which this computer 104 (itself) is directly coupled (withoutusing the other edge apparatus). For example, when a communicationinterface 303(a) of a computer 104(a) is directly coupled to a edgeapparatus 101(a), the management computer 106 allocates thecommunication interface 303(a) of the computer 104(a) to a VLAN 110(a)of a fabric service 207(a) configured in the edge apparatus 101(a).

In this manner, the allocation of each communication interface 303 ofthe computer 104 to each VLAN 110 is performed as shown in each row 1003in the communication interface allocation table 516(a).

FIG. 10B shows a composition example of a communication interfaceallocation table 516(b) of the storage apparatus 105.

This table 516(b) shows the allocation of a certain communicationinterface 406 of the storage apparatus 105 to a certain VLAN. In otherwords, the communication interface allocation table 516(b) includes, forexample, the following information with respect to each communicationinterface 406 of the storage apparatus 105.

(*) A communication interface WWPN 801(c): The WWPN of the certaincommunication interface 406 of the storage apparatus 105.

(*) A communication interface MAC address 1001(c): The MAC address ofthe communication interface 406 of the storage apparatus 105.

(*) A storage apparatus ID 1004: A unique identifier of the storageapparatus 105 having the communication interface 406.

(*) The VLAN ID 902: A unique identifier of the VLAN 110 allocated tothe communication interface 406.

In accordance with the VLAN allocation rules, the management computer106 allocates each of the communication interfaces 406 of each storageapparatus 105 to not only the VLAN 110 that is allocated to the edgeapparatus 101 to which this storage apparatus 105 (itself) is directlycoupled, but also the VLAN that is allocated to the edge apparatus 101to which this storage apparatus 105 (itself) is indirectly coupled viaanother edge apparatus. For example, the management computer 106allocates a communication interface 406(a) of a storage apparatus 105(a)to the VLAN 110(a), a communication interface 406(b) to a VLAN 110(b), acommunication interface 406(c) to a VLAN 110(c), and a communicationinterface 406(d) to a VLAN 110(d).

In this manner, the allocation of each communication interface 406 ofthe storage apparatus 105 to each VLAN 110 is performed as shown in eachrow 1005 in the communication interface allocation table 516(b).

Next, the management computer 106 uses the virtual HBA allocation table516 to manage the allocation of the communication interfaces to thecommunication interfaces.

FIG. 11A shows a composition example of a virtual HBA allocation table517(a) of the computer 104.

The virtual HBA allocation table 517(a) shows the allocation of acertain virtual HBA 305 of a certain virtual computer 304 to a certaincommunication interface 303 of the computer 104. The virtual HBAallocation table 517(a) includes the following information with respectto each virtual HBA 305 of the virtual computer 304.

(*) A virtual HBA WWPN 801(b): The WWPN of each virtual HBA 305.

(*) The virtual computer ID 803: A unique identifier of each virtualcomputer to which the corresponding virtual HBA 305 is related.

(*) The communication interface WWPN 801(d): The WWPN of thecommunication interface 303 to which the virtual HBA 305 is allocated.

(*) The computer ID 1002: A unique identifier of the computer 104 thathas the communication interface 303 to which the virtual HBA 305 isrelated.

As shown in FIG. 7A, the virtual HBA 305 of the corresponding virtualcomputer 304 and the communication interface 303 of the computer 104 towhich the virtual computer 304 belongs are coupled to each otherone-on-one. In other words, for example, the management computer 106couples a virtual HBA 305(a) of the virtual computer 304 to thecommunication interface 303(a) of the computer 104(a), and couples avirtual HBA 305(b) of the virtual computer 304 to a communicationinterface 303(b) of the computer 104(a). Therefore, the allocation ofeach virtual HBA 305 to the corresponding communication interface 303 isperformed as shown in each row 1101 in the virtual HBA allocation table517(a).

Here, the communication interface virtualization program 310 defines theplurality of WWPNs 801 with respect to one communication interface 303.This can be realized by using, for example, a technology called “NPIV(N_Port ID Virtualization).

FIG. 11B shows a composition example of a virtual HBA allocation table517(b) of the storage apparatus 105.

The virtual HBA allocation table 517(b) shows the allocation of acertain virtual HBA 407 of a certain logical volume 402 to a certaincommunication interface 406 of the storage apparatus 105. The virtualHBA allocation table 517(b) includes the following information withrespect to each virtual HBA 407 of the corresponding logical volume 402.

(*) A virtual HBA WWPN 801(a): The WWPN of each virtual HBA 407.

(*) The logical volume ID 802: A unique identifier of each logicalvolume 402 to which the corresponding virtual HBA 407 is related.

(*) The communication interface WWPN 801(c): The WWPN of thecommunication interface 406 to which the virtual HBA 407 is allocated.

(*) The storage apparatus ID 1004: A unique identifier of the storageapparatus 105 that has the communication interface 406 to which thevirtual HBA 407 is allocated.

The management computer 106 (the virtual computer-to-logical volumecommunication path configuration program 504) searches for thecommunication interface WWPN 801 corresponding to the WWPN 801(a) of thevirtual HBA 407 of the LV. This is because the virtual HBA 407 of the LVneeds to be allocated to the communication interface of the storageapparatus so as to be able to communicate with the virtual HBA of thecorresponding VM. The flow of this search is as follows, with an exampleof a process for searching for the communication interface WWPN 801corresponding to the WWPN 801(a) of the virtual HBA 407, “407(k)-WWPN.”

(S1) The management computer 106 searches the logical volume allocationtable 512 for the virtual HBA WWPN 801(b) “305(e)-WWPN” for acorresponding VM, by using the WWPN 801(a) of the virtual HBA of the LV,“407(k)-WWPN,” as a key (see a row 805 in FIG. 8).

(S2) The management computer 106 searches the virtual HBA allocationtable 517(a) for the WWPN 801(d) “303(c)-WWPN” of the communicationinterface 303 of the computer 104, by using the WWPN 801(b)“305(e)-WWPN” searched in (S1) above, as a key (see a row 1103 in FIG.11A).

(S3) The management computer 106 searches the communication interfaceallocation table 516(a) for the VLAN ID “101(a),” by using the WWPN801(d) “303(c)-WWPN” searched in (S2) above, as a key (see a row 1006 inFIG. 10A).

(S4) The management computer 106 searches the virtual HBA allocationtable 517(b) for the storage apparatus ID 1004 “105(b),” by using thevirtual HBA WWPN 801(a) “407(k)-WWPN” as a key (see a row 1104 in FIG.11B).

(S5) The management computer 106 searches the communication interfaceallocation table 516(b) for the communication interface WWPN 801(c)“406(e)-WWPN,” by using the VLAN ID 902 “101(a)” searched in (S3) aboveand the storage apparatus ID 1004 “105(b)” searched in (S4) above, askeys (see a row 1007 in FIG. 10B).

As a result of the process described above, the allocation of eachvirtual HBA 407 to each communication interface 406 is obtained as shownin each row 1102 in the virtual HBA allocation table 517(b).

Note here that the communication interface virtualization program 410defines the plurality of WWPNs 801 with respect to one communicationinterface 406. This can be realized by using, for example, a technologycalled “NPIV (N_Port ID Virtualization).

<<Configuration of Communication Path Between Computer and StorageApparatus>>

As described in S602 of FIG. 6, the management computer 106 (thecomputer-to-storage apparatus communication path configuration program506) configures the communication paths between the computers 104 andthe storage apparatuses 105. The detail of S602 is described withreference to a process flow shown in FIG. 12.

In S1202, the management computer 106 refers to the fabric serviceallocation table 515 to perform configuration of the fabric services 207provided to the edge apparatuses 101, and then allocates the VLAN IDs902 to the fabric services 207.

In S1202, the management computer 106 performs configuration on the VLANallocation table 212 of the edge apparatuses 101. Each of the edgeapparatuses within the network has the VLAN allocation table 212. Withreference to this table 212, the edge apparatuses 101 can identify theVLANs 110 to which the communication frames exchanged between thecomputers 104 and the storage apparatuses 105 belong.

Specifically, the management computer 106 extracts the MAC addresses1001 and the VLAN IDs 902 of the communication interfaces from thecommunication interface allocation tables 516(a) and 516(b), and inputsthese values to the VLAN allocation table 212 shown in FIG. 13. The VLANallocation table 212 shows the allocation of a certain VLAN to a certaincommunication interface. For example, the VLAN allocation table 212includes the following information with respect to each communicationinterface between each computer and each storage apparatus.

(*) The MAC addresses 1001: The MAC addresses of the communicationinterfaces.

(*) Protocols 1301: Information that shows communication protocols usedin the communication using the communication interfaces.

(*) The VLAN IDs 902: Unique identifiers of the VLANs allocated to thecommunication interfaces.

Furthermore, when designating the communication protocols, themanagement computer 106 also inputs, as the protocols 1301, values thatexpress the designated communication protocols. When the communicationprotocols are not defined, the management computer 106 inputs “*,” forexample, as a value indicating that the communication protocols are notdefined.

The values of the VLAN allocation table 212 corresponding to those ofthe communication interface allocation tables 516(a) and 516(b) areshown in rows that belong to a range indicated by a reference numeral1302. In other words, the values shown by the reference numeral 1302 areconfigured in the initial configuration.

In S1203, the management computer 106 transmits an instruction to thefabric service utilization program 411 of the storage apparatus 105, tocause the storage apparatus 105 to login to the functions that areprovided by the fabric service 207 that is allocated the VLAN to whichthe storage apparatus belongs. In other words, the storage apparatus 105logs into the fabric services that are provided by all of the edgeapparatuses 101 coupled to the network. In addition to the fabricservice that is provided by the edge apparatus 101 to which this storageapparatus 105 (itself) is directly coupled, the storage apparatus 105also may login to the fabric services that are provided by the edgeapparatuses 101 to which this storage apparatus 105 (itself) is notdirectly coupled (but coupled via the other edge apparatuses 101).

Moreover, in the case of the integrated apparatus, the storage apparatus105 logs into the fabric services that are provided by the edgeapparatuses 101 within all of the integrated apparatuses 109. Inaddition to the fabric service that is provided by the edge apparatus101 within the integrated apparatus 109 to which this storage apparatus105

(itself) belongs, the storage apparatus 105 may login to the fabricservices that are provided by the edge apparatuses 101 within the otherintegrated apparatuses 109 on the network, to which the storageapparatus 105 (itself) does not belong. Note that the managementcomputer 106 uses the logical volume configuration program 409 toconfigure each logical volume 402 beforehand.

FIG. 14 is a flowchart showing an example of a process flow of a loginprocess (S1203) in which the storage apparatus 105 logs into thefunctions provided by the fabric services.

In S1501 to S1503 (see FIG. 15), the management computer 106 sends aninstruction to the fabric service utilization program 411 of the storageapparatus 105, and the fabric service utilization program 411 registersthe WWPNs 801 of the communication interfaces 406 into the name serverfunctions of the fabric services 207 that are allocated the VLANs towhich the WWPNs 801 belong.

In S1401, the management computer 106 refers to the communicationinterface allocation table 516(b) to determine whether all of the WWPNs801 are registered in the name server functions. When the result of thisdetermination is negative (S1404: No), the management computer 106performs S1501 to S1503 for the unregistered WWPNs 801. In other words,the management computer 106 repeatedly performs S1501 to S1503 until allof the WWPNs 801 are registered in the name server functions.

In S1601 and S1602, the management computer 106 sends an instruction tothe fabric service utilization program 411 of the storage apparatus 105,and the fabric service utilization program 411 registers the WWPNs 801of the virtual HBAs 407 into the name server functions of the fabricservices 207 that are allocated the VLANs to which the WWPNs 801 belong.

In S1402, the management computer 106 refers to the virtual HBAallocation table 517(b) to determine whether all of the WWPNs 801(a) areregistered in the name server functions. When the result of thisdetermination is negative (S1402: No), the management computer 106performs S1601 and S1602 for the unregistered WWPNs 801(a). In otherwords, the management computer 106 repeatedly performs S1601 and S1602until all of the WWPNs 801(a) are registered in the name serverfunctions.

The processes of S1501 to S1503, S1601 and S1602 are carried out using aFIP (FCoE Initialization Protocol). The FIP is a protocol forinitializing the FCoE.

First, the processes from S1501 to S1503 are described using FIG. 15.FIG. 15 shows an example of a flow of a process for registering the WWPN801 allocated to the communication interface 406(e) of the storageapparatus 105(b), into the name server function of the fabric service207(a).

In S1501, the storage apparatus 105(b) searches for an available fabricservice 207. Here, the available fabric service means a fabric servicethat is allocated to the VLAN corresponding to the communicationinterface 406(e). For example, the communication interface 406(e)-WWPNis allocated to the VLAN 110(a), and the VLAN 110(a) is allocated to thefabric service 207(a). Thus, the fabric service available to thecommunication interface 406(e)-WWPN is the fabric service 207(a). TheMAC address of the edge apparatus 101 having the available fabricservice 207 is inquired. Specifically, the following steps S1501(a) toS1501(d), for example, are carried out.

In S1501(a), the storage apparatus 105(b) transmits the communicationframe having the following information by means of multicast.

(*) A transmission destination MAC address (DA): Multicast

(*) A transmission source MAC address (SA): “406(e)-MAC,” which is theMAC address of the communication interface 406(e).

(*) “FS MAC=?”: An identifier indicating that the MAC addresses of thefabric services (FS) 207 are inquired.

When the edge apparatus 101(c) receives the communication frame inS1501(b), the VLAN allocation table 212 is referenced based on thereceived communication frame, to determine the VLAN ID 902. Since theedge apparatus 101(c) does not have the available fabric service, thetag (IEEE 802.1Q tag) expressing the VLAN ID “110(a)” is inserted intothe communication frame, and this communication frame is thentransmitted by means of multicast.

Here, the edge apparatuses 101 determine the VLAN IDs 902 only for thecommunication frames received from the storage apparatuses 105 or thecomputers 104. In other words, the edge apparatuses 101 perform a taginsertion process only for transfer frames that are received from thecommunication interfaces 204(a) to 240(p) (FIGS. 7A and 7B) on thestorage apparatuses 105 side or the computers 104 side. Note in thepresent embodiment that, even when the tag is inserted, determination ofthe value of the tag puts priority on the determination of the VLAN IDsperformed by the edge apparatuses 101.

When the edge apparatus 101(a) receives the communication frame inS1501(c), the tag stored in the communication frame is referenced, andthe VLAN 110(a) is extracted. Since the edge apparatus 101(a) has theavailable fabric service 207(a), the available fabric service 207(a)disposed in the VLAN 110(a) responses to the communication frame. Here,“204(q)-MAC” is returned as the MAC address of the fabric service 207(a)(FS MAC) that is used for the communication with the fabric service207(a).

In S1501(d), the edge apparatus 101(c) receives the communication framefrom the edge apparatus 101(a), removes the tag from the receivedcommunication frame, and transmits to the storage apparatus 105(b) thecommunication frame from which the tag is removed. The edge apparatuses101 perform the tag removal process only for the transfer frames thatare transmitted to the communication interfaces 204(a) to 240(p) (FIGS.7A and 7B) on the storage apparatuses 105 side or the computers 104side.

In S1502, the storage apparatus 105(b) acquires the FC ID allocated tothe communication interface 406(e), from the fabric server function ofthe fabric service 207(a) provided by the edge apparatus 101(a). Thestorage apparatus 105(b) also acquires an FC-MAP (FCoE MAC AddressPrefix). Note that the FC ID is a unique address that is used fortransferring an FC frame in the FC network, as described above. TheFC-MAP is 24-bit data defined with respect to each fabric service 207.In other words, the FCMAP varies when each fabric service 207 varies.The storage apparatus 105(b) combines the FC-MAP with the FC ID tocreate a new MAC address of the communication interface 406(e) (FPMA:Fabric Provided MAC Address). The FPMA is also a unique address.Specifically, for example, the following steps S1502(a) to S1502(d) arecarried out in S1502.

In S1502(a), the storage apparatus 105(b) transmits a communicationframe having the following information, to the fabric service 207(a).

(*) The transmission destination MAC address (DA): “204(q)-MAC,” whichis the address of the fabric service 207(a) (the value acquired inS1501).

(*) The transmission source MAC address (SA): “406(e)-MAC,” which is theMAC address of the communication interface 406(e).

(*) “Fabric Login”: An identifier indicating an access request forrequesting access to the fabric server function.

(*) A transmission destination FC ID (FC DID): “Fabric Server” thatexpresses the fabric server function of the fabric service 207(a).

(*) A transmission source FC ID (FC SID): No values.

(*) WWPN: “406(e)-WWPN,” which is the WWPN defined for the communicationinterface 406(e).

In S1502(b), the edge apparatus 101(c) receives the communication frame,as with the case in S1501(b). Then, the edge apparatus 101(c) refers tothe VLAN allocation table 212 to determine the VLAN ID 902 that isallocated to the transmission source MAC address of the receivedcommunication frame. Because the VLAN allocated to the transmissionsource MAC address is not configured in the edge apparatus 101(c), theedge apparatus 101(c) inserts the tag into the communication frame andtransmits to the edge apparatus 101(a) the communication frame intowhich the tag is inserted.

Since the VLAN allocated to the transmission source MAC address of thecommunication frame is configured in the edge apparatus 101(a), thefabric service 207(a) allocates the FC ID “406(e)-FC-ID” to the WWPN ofthe communication interface 406(e) “406(e)-WWPN” and returns thecommunication frame in S1502(c). This communication frame includes the“406(e)-FC-ID” as the transmission destination FC ID (FC DID) and“207(a)-MAP” as the FC-MAP.

In S1502(d), the edge apparatus 101(c) receives the communication framefrom the edge apparatus 101(a), removes the tag from the receivedcommunication frame, and transmits to the storage apparatus 105(b) thecommunication frame from which the tag is removed.

Thereafter, in S1502(d), the storage apparatus 105(b) combines theFC-MAP “207(a)-MAP” with the FC ID “406(e)-FC-ID” that are acquired fromthe fabric service 207(a), to create a new MAC address (FPMA) of thecommunication interface 406(e), “406(e)-FPMA.”

When determining the VLAN ID based on the MAC address of thecommunication interface frame, the VLAN ID cannot be determinedaccurately if the MAC address is changed dynamically. Therefore, inS1503 and the subsequent steps, the transmission source MAC address ofthe communication frame is replaced by the newly created MAC address(FPMA) “406(e)-FPMA.” In other words, the newly created MAC address is aMAC address that is issued by the fabric service 207 and is not changeddynamically.

The present embodiment, therefore, implements a process for notifyingeach edge apparatus 101 of the change of the transmission source MACaddress (S1801), and processes for updating the VLAN allocation table212 (S1802, S1803).

The processes S1801 to S1803 are described using FIG. 18A. Theseprocesses are carried out by the VLAN configuration program 206 of eachedge apparatus 101.

In S1801, the edge apparatus 101(a) transmits the communication framehaving the following information, to the other edge apparatuses 101(b),101(c) and 101(d).

(*) Transmission destination MAC addresses (DA): “ALL_IF-SW_MACs”representing multicast addresses of all edge apparatuses 101.

(*) The transmission source MAC address (SA): “204(q)-MAC,” which is theMAC address of a communication interface 204(q).

(*) “VLAN ADD”: An identifier indicating a data addition request forrequesting addition of data to the VLAN allocation table 212.

(*) VLAN MAC: A value that is registered as the MAC address 1001 in theVLAN allocation table 212.

(*) VLAN Protocols: Values that are registered as the protocols 1301 inthe VLAN allocation table 212 (“FIP”).

(*) VLAN ID: Values that are registered as the VLAN IDs 902 in the VLANallocation table 212 (“110(a)”).

The value “VLAN MAC,” which is the new MAC address (FPMA) of thecommunication interface 406(e), is “406(e)-FPMA.” This value is createdby the edge apparatus 101(a) by combining the FC-MAP “207(a)-MAP” withthe FC ID “406(e)-FC-ID.” The value “VLAN Protocol” may be representedby “*” when no protocols are designated. In addition, “VLAN ID” is theVLAN ID corresponding to “406(e)-MAC” before the change.

In S1802, the edge apparatus 101(a) updates the VLAN allocation table212 of the apparatus 101(a). The edge apparatus 101(a) registers a newrow 1303 (see FIG. 13) into the VLAN allocation table 212, based on thedata obtained in S1801.

In S1803, the edge apparatuses 101(b), 101(c) and 101(d) update the VLANallocation tables 212 of these apparatuses on the basis of the datareceived in S1801, as with the case in S1802.

FIG. 15 is referenced again.

In S1503, the storage apparatus 105(b) registers, in the name serverfunction of the fabric service 207(a), the WWPN defined for thecommunication interface 406(e) and the allocated FC ID. Specifically,the following steps S1503(a) to S1503(d), for example, are carried outin S1503.

In S1503(a), the storage apparatus 105(b) transmits the communicationframe having the following information, to the fabric service 207(a).

(*) The transmission destination MAC address (DA): “204(q)-MAC,” whichis the address of the fabric service 207(a) (the value acquired inS1501).

(*) The transmission source MAC address (SA): “406(e)-FPMA,” which isthe new MAC address allocated to the communication interface 406(e).

(*) “Port Login”: An identifier indicating an access request forrequesting access to the name server function.

(*) The transmission destination FC ID (FC DID): “Name Server”expressing the name server function of the fabric service 207(a).

(*) The transmission source FC ID (FC SID): “406(e)-FC-ID,” which is theFC ID allocated to the communication interface 406(e) (the valueacquired in S1502).

(*) WWPN: “406(e)-WWPN,” which is the WWPN defined for the communicationinterface 406(e).

In S1503(b), the edge apparatus 101(c) receives the communication frameand uses the updated VLAN allocation table 212 to determine the VLAN ID902 of the received communication frame. Since the VLAN that isallocated to the MAC address of the communication frame included in thecommunication protocols is not configured in the edge apparatus 101(c),the edge apparatus 101(c) inserts the tag expressing the VLAN ID intothe communication frame and transmits to the edge apparatus 101(a) thecommunication frame into which the tag is inserted.

In S1503(c), the fabric service 207(a) provided by the edge apparatus101(a) receives the communication frame since the VLAN allocated to thetransmission source MAC address of the communication frame is configuredin the edge apparatus 101(a) and, based on this communication frame,registers the WWPN of the communication interface 406(e) “406(e)-WWPN”and the FC ID “406(e)-FC-ID” into the FC ID allocation table 213 shownin FIG. 17 (see a row 1702). In addition, the fabric service 207(a)returns the communication frame that indicates the successfulregistration. Note that the FC ID allocation table 213 is a tableshowing the allocation of a certain FC ID to a certain WWPN and isupdated each time S1503(c) is performed. This table 213 is a table usedby the name server function of the fabric service 207(a) to manage acorrespondence relation between each WWPN 801 and each FC ID 1701 ofeach logged in apparatus.

In S1503(d), the edge apparatus 101(c) receives the communication framefrom the edge apparatus 101(a), removes the tag from the receivedcommunication frame, and transmits to the storage apparatus 105(b) thecommunication frame from which the tag is removed.

Next, the processes of S1601 and S1602 shown in FIG. 14 are describedwith reference to FIG. 16A. FIG. 16A shows an example of a flow of aprocess for registering, in the name server function of the fabricservice 207(a), the WWPN 801 that is allocated to the virtual HBA 407(k)of the storage apparatus 105(b).

The management computer 106 searches, beforehand, for the MAC address ofthe communication interface 406 to which the virtual HBA 407(k) isallocated. The management computer 106 searches the virtual HBAallocation table 517(b) for the communication interface WWPN 801“406(e)-WWPN” where the virtual HBA WWPN 801(a) corresponds to“407(k)-WWPN” (see the row 1104 in FIG. 11B). The management computer106 further searches the communication interface allocation table 516(b)for the communication interface MAC address 1001 “406(e)-MAC”corresponding to the communication interface WWPN 801 “406(e)-WWPN” (seethe row 1007 in FIG. 10B).

Subsequently, the management computer 106 controls the fabric serviceutilization program 411 of each storage apparatus 105 and executes theprocesses.

In S1601, the storage apparatus 105(b) acquires the FC ID allocated tothe virtual HBA 407(k), from the fabric server function of the fabricservice 207(a). The storage apparatus 105(b) also acquires the FC-MAP(FCoE MAC Address Prefix). This step S1601 is similar to the step S1502.For example, the following steps 1601(a) to S1601(d) are carried out inS1601.

In S1601(a), the storage apparatus 105(b) transmits the communicationframe having the following information, to the fabric service 207(a).

(*) The transmission destination MAC address (DA): “204(q)-MAC,” whichis the address of the fabric service 207(a) (the value acquired inS1501).

(*) The transmission source MAC address (SA): “406(e)-MAC,” which is theMAC address of the communication interface 406(e) (the value searchedabove).

(*) “Fabric Discovery”: An identifier indicating an access request forrequesting access to the fabric server function of the virtual HBA.

(*) The transmission destination FC ID (FC DID): “Fabric Server” thatexpresses the fabric server function of the fabric service 207(a).

(*) The transmission source FC ID (FC SID): No values.

(*) WWPN: “407(k)-WWPN,” which is the WWPN defined for the virtual HBA407(k).

In S1601(b), the edge apparatus 101(c) receives the communication frame,as with the case in S1501(b), and determines the VLAN ID 902 of thereceived communication frame. Since the VLAN that is allocated to thecommunication frame included in the communication protocols is notconfigured in the edge apparatus 101(c), the edge apparatus 101(c)inserts the tag into the communication frame and transmits to the edgeapparatus 101(a) the communication frame into which the tag is inserted.

In S1601(c), when the edge apparatus 101(a) receives the communicationframe, since the VLAN corresponding to the communication frame isconfigured in the edge apparatus 101(a), the allocated fabric service207(a) allocates the FC ID “407(k)-FC-ID” to the WWPN of the virtual HBA407(k), “407(k)-WWPN,” and returns the communication frame. Thiscommunication frame includes “407(k)-FC-ID” as the transmissiondestination FC ID (FC DID) and “207(a)-MAP” as the FC-MAP.

In S1601(d), the edge apparatus 101(c) receives the communication framefrom the edge apparatus 101(a), removes the tag from the receivedcommunication frame, and transmits to the storage apparatus 105(b) thecommunication frame from which the tag is removed.

The storage apparatus 105(b) combines the FC-MAP “207(a)-MAP” with theFC ID “407(k)-FC-ID” that are acquired from the fabric service 207(a),to create a new MAC address (FPMA) of the virtual HBA 407(k),“407(k)-FPMA.”

In S1602 and the subsequent steps, the transmission source MAC addressof the communication frame is replaced by the newly created MAC address(FPMA) “407(k)-FPMA.” Therefore, the process for notifying each edgeapparatus 101 of the change of the transmission source MAC address(S1801), and the processes for updating the VLAN allocation table 212(S1802, S1803) are performed. The edge apparatus 101(a) registers a newrow 1304 (see FIG. 13) in the VLAN allocation table 212.

In S1602, the storage apparatus 105(b) registers the WWPN defined forthe virtual HBA 407(k) and the allocated FC ID, in the name serverfunction of the fabric service 207(a). This step S1602 is similar to thestep S1503. For example, the following steps S1602(a) to S1602(d) arecarried out in S1602.

In S1602(a), the storage apparatus 105(b) transmits the communicationframe having the following information, to the fabric service 207(a).

(*) The transmission destination MAC address (DA): “204(q)-MAC,” whichis the address of the fabric service 207(a) (the value acquired inS1501).

(*) The transmission source MAC address (SA): “407(k)-FPMA,” which isthe MAC address that is newly allocated to the virtual HBA 407(k).

(*) “Port Login”: An identifier indicating an access request forrequesting access to the name server function.

(*) The transmission destination FC ID (FC DID): “Name Server”expressing the name server function of the fabric service 207(a).

(*) The transmission source FC ID (FC SID): “407(k)-FC-ID,” which is theFC ID allocated to the virtual HBA 407(k) (the value acquired in S1601).

(*) WWPN: “406(e)-WWPN,” which is the WWPN defined for the virtual HBA407(k).

In S1602(b), the edge apparatus 101(c) receives the communication frame,determines the VLAN ID 902 of the received communication frame by usingthe updated VLAN allocation table 212, inserts the tag into thecommunication frame, and transmits to the edge apparatus 101(a) thecommunication frame into which the tag is inserted.

In S1602(c), the fabric service 207(a) registers the WWPN of the virtualHBA 407(k), “407(k)-WWPN,” and the FC ID “407(k)-FC-ID” in the FC IDallocation table 213 shown in FIG. 17 (see a row 1703). The fabricservice 207(a) also returns the communication frame that indicates thesuccessful registration.

In S1602(d), the edge apparatus 101(c) receives the communication framefrom the edge apparatus 101(a), removes the tag from the receivedcommunication frame, and transmits to the storage apparatus 105(b) thecommunication frame from which the tag is removed.

The above has described the detail of S1203 shown in FIG. 12.

Next, in S1204, the management computer 106 transmits an instruction tothe fabric service utilization program 311 of the computer 104, to causethe computer 104 to login to the fabric services 207 configured in theedge apparatuses 101. Note that the management computer 106 uses thevirtual computer configuration program 309 to allow each of the virtualcomputers 304 to be activated in the corresponding computer 104,beforehand.

The computer 104 registers the WWPNs 801 of all of the communicationinterfaces 303 and the WWPNs 801 of all of the virtual HBAs 305 in thename server functions of the corresponding fabric services 207 inaccordance with the flow shown in FIG. 15 (the explanation of the detailof this process is omitted as it is the same as the login process of thestorage apparatuses 105 described in S1203).

Furthermore, the management computer 106 configures control of theaccess (zoning) to the FC ID allocation table 213 within each edgeapparatus 101. The management computer 106 also performs LUN (LogicalUnit Number) masking in order to control the access to the logicalvolumes 402 of the storage apparatus 105.

In addition, in response to the operations by the management computer106, the computer 104 acquires the information on the logical volumes402 from the FC ID allocation table 213 of the fabric service 207, inaccordance with an FC protocol. In accordance with the FC protocol, themanagement computer 106 allows an I/O process to be performed betweenthe WWPN 801(b) of the virtual computer 304 and the virtual HBA 801(a)of the logical volume 402 that are registered in the logical volumeallocation management table 512.

<<Configuration of Communication Path Between Computer and Computer>>

In S603 described in FIG. 6, the management computer 106 uses thecomputer-to-computer communication path configuration program 507 toconfigure the paths of communication networks between the computers 104.The management computer 106 configures the VLANs 110 for thecommunication between the computers, and registers the MAC addresses1001, the protocols 1301, and the VLAN IDs 902 allocated thereto, in theVLAN allocation table 212. The management computer 106 performs the sameconfiguration on a communication where the computers 104 are accessedfrom an external terminal apparatus (not shown) via the external network107.

<<Configuration of Communication Path Qos>>

In S604, the management computer 106 uses a communication path QoSconfiguration program 664 to configure the edge apparatuses 101, andcarries out priority control and bandwidth control on the communicationpaths between the computers 104 and the storage apparatus 105 and thecommunication paths between the computer 104 and the other computers104. For example, bandwidths can be ensured by using IEEE 802.1QazEnhanced Transmission Selection (ETS), which is the Ethernet enhancementfunction.

The management computer 106 checks the number of data items registeredin the VLAN allocation table 212 (the number of combinations of the MACaddresses 1001, protocols 1301 and VLAN IDs 902), and computes thenumber of connections between the computers 104, and the number ofconnections between the computers 104 and the storage apparatus 105. Themanagement computer 106 configures bandwidths proportional to the numberof connections between the computers 104 and the number of connectionsbetween the computers 104 and the storage apparatuses 105, with respectto the communications between the computers 104 and the communicationsbetween the computers 104 and the storage apparatuses 105.

A communication path configuration process that is performed whenmigrating each virtual computer 304 between the computers 104 isdescribed next. Thereafter, a communication path configuration processthat is performed when migrating each logical volume 402 between thestorage apparatuses 105 is described. These processes are implemented bythe management computer 106. These processes are implemented whenrenewing the computers 104, the storage apparatuses 105 or theintegrated apparatuses 109.

<Path Configuration Process for Migrating Virtual Computer>

As shown in a process flow of FIG. 19, the virtual computers 304 aremigrated between the computers 104 in response to an instructiontransmitted by the management computer 106 to the virtual computermigration program 509. The following describes the path configurationprocess for migrating the virtual computers, by taking an example inwhich the virtual computer 304(a) coupled to the logical volume 402(a)of the storage apparatus 105(a) is migrated from the computer 104(a) tothe computer 104(d), as shown in FIG. 20. Note that the virtual computerbefore migration is denoted as the virtual computer 304(a) with thevirtual HBAs 305(a), 305(b), and the virtual computer after migration isdenoted as a virtual computer 304(a′) with virtual HBAs 305(a′) and305(b′).

In S1901, the computer 104(a) uses the virtual computer configurationprogram 309 to suspend the virtual computer 304(a) to be migrated.Specifically, for example, the computer 104(a) fixes the condition ofthe virtual computer 304(a) on the memory 302. For example, the computer104(a) prevents the information indicating the condition of the virtualcomputer 304(a) on the memory 302 from being updated.

In S1902, the computer 104(a) transmits to the edge apparatus 101(a) alogout request for requesting the virtual HBA 305(a) of the virtualcomputer 304(a) to log out. In response to this request, the fabricservice 207(a) performs a logout process. As a result, the virtual HBA305(a) of the virtual computer 304(a) logs out from the fabric service207(a).

While the virtual HBA 305(a) of the virtual computer 304(a) is loggedinto the fabric service 207(a) of the edge apparatus 101(a), theinformation of the virtual HBA 305(a) is registered in the followingtables.

(*) The FC ID allocation table 213 of the edge apparatus 101(a).

(*) The VLAN allocation tables 212 of all of the edge apparatuses 101.

Hence, a process for deleting the information of the virtual HBA 305(a)from the abovementioned tables is carried out. This process is describedhereinafter in detail with reference to FIG. 16B.

In S1603, the computer 104(a) deletes the WWPN defined for the virtualHBA 305(a) and the allocated FC ID from the name server function of thefabric service 207(a). Specifically, for example, the following stepsS1603(a) to S1603(d) are carried out in S1603.

In S1603(a), the computer 104(a) transmits the communication framehaving the following information, to the fabric service 207(a).

(*) The transmission destination MAC address (DA): “204(a)-MAC,” whichis the address of the fabric service 207(a).

(*) The transmission source MAC address (SA): “305(a)-FPMA,” which isthe MAC address that is allocated dynamically to the virtual HBA 305(a).

(*) “Port Logout”: An identifier indicating a logout request forrequesting logging out from to the name server function.

(*) The transmission destination FC ID (FC DID): “Name Server”representing the name server function of the fabric service 207(a).

(*) The transmission source FC ID (FC SID): “305(a)-FC-ID,” which is theFC ID allocated to the virtual HBA 305(a).

(*) WWPN: “305(a)-WWPN,” which is the WWPN defined for the virtual HBA305(a).

In S1603(b), the edge apparatus 101(c) determines the VLAN ID 902 of thecommunication frame by using the VLAN allocation table 212 that isupdated dynamically, inserts the tag into the communication frame, andtransmits the communication frame into which the tag is inserted.

In S1603(c), the fabric service 207(a) receives the communication frame,and, based on this communication frame, deletes the WWPN of the virtualHBA 305(a) “305(a)-WWPN” and the FC ID “305(a)-FC-ID” that areregistered in the FC ID allocation table 213. The fabric service 207(a)also returns the communication frame that indicates the successfuldeletion.

In S1603(d), the edge apparatus 101(a) receives the communication frame,removes the tag from the received communication frame, and transmits tothe computer 104(a) the communication frame from which the tag isremoved.

Subsequently, the edge apparatus 101(a) deletes the information on thevirtual HBA 305(a) from the VLAN allocation table 212 of the edgeapparatus 101(a). The information registered in the VLAN allocationtable 212 of the edge apparatus 101(a) is the MAC address (FPMA) that isdynamically created for the virtual HBA 305(a), as described in thelogin process of the virtual HBA in S1601. In order to delete thisaddress from the VLAN allocation table 212, the edge apparatus 101(a)implementes the following processes shown in FIG. 18B. These areexecuted using the VLAN configuration program 206 of the edge apparatus101.

In S1804, the edge apparatus 101(a) transmits the communication framehaving the following information, to the other edge apparatuses 101(b),101(c) and 101(d).

(*) The transmission destination MAC addresses (DA): “ALL_IF-SW_MACs”representing multicast addresses of all edge apparatuses 101.

(*) The transmission source MAC address (SA): “204(q)-MAC,” which is theMAC address of the communication interface 204(q).

(*) “VLAN DEL”: An identifier indicating a data deletion request forrequesting a deletion of data from the VLAN allocation table 212.

(*) VLAN MAC: The MAC address deleted from the VLAN allocation table212.

(*) VLAN Protocols: Values representing the protocols 1301 in the VLANallocation table 212 (“FIP,” but the VLAN protocols may be representedby “*” when no protocols are specified).

(*) VLAN ID: Values representing the VLAN IDs 902 in the VLAN allocationtable 212 (“110(a),” but the value “*” may be used when not specified).

Here, “VLAN MAC” is the MAC address (FPMA) “305(a)-FPMA” that isdynamically created with respect to the communication interface 305(a).This value is created by the edge apparatus 101(a) by combining theFC-MAP “207(a)-MAP” with the FC ID “305(a)-FC-ID.”

In S1805, the edge apparatus 101(a) updates the VLAN allocation table212 of this edge apparatus 101(a). Based on the communication frameobtained in S1804, the edge apparatus 101(a) specifies the relevant rowin the VLAN allocation table 212, and deletes the information shown inthe specified row, from the VLAN allocation table 212.

S1806: Based on the communication frame obtained in S1804, the edgeapparatuses 101(b), 101(c) and 101(d) update the VLAN allocation tables212 thereof, as with the case in S1805.

The computer 104(a) transmits the logout request to the edge apparatus101(b), with regard to the virtual HBA 305(b) as well. The edgeapparatus 101(b) performs a process for deleting the information on thevirtual HBA 305(b), as with the case in the process described above.

FIG. 19 is referenced again.

In S1903, the storage apparatus 105(a) transmits to the edge apparatus101(a) a logout request for requesting the virtual HBA 407(a) of the LV402(a) to log out, and then the fabric service 207(a) performs a logoutprocess. The detail of this process is same as that of S1902. Withregard to the virtual HBA 407(b) as well, the same process is carriedout. As a result, the virtual HBA 407(a) of LV 402(a) of the storageapparatus 105(a) logs out from the fabric service 207(a).

In S1904, the management computer 106 changes the allocations of thevirtual HBAs 407 of the computers 104(a), 104(d) and storage apparatus105(d) to the communication interfaces 406.

Specifically, first, the management computer 106 updates the virtual HBAallocation table 517(a) with respect to the computers 104(a) and 104(d)in response to the migration of the virtual computer 304(a). Themanagement computer 106 changes the communication interface WWPN 801(d)“303(a)-WWPN”, which is allocated the virtual HBA WWPN 801(b)“305(a)-WWPN” (see a row 1105 in FIG. 11A), to the communicationinterface WWPN 801(d) “303(g)-WWPN” (see a row 1107 in FIG. 11A).Similarly, the management computer 106 changes the communicationinterface WWPN 801(d) “303(b)-WWPN,” which is allocated the virtual HBAWWPN 801(b) “305(b)-WWPN” (see a row 1106 in FIG. 11A), to thecommunication interface WWPN 801(d) “303(h)-WWPN” (see a row 1108 inFIG. 11A).

Furthermore, the management computer 106 updates the communicationinterface allocation table 517(b) with respect to the storage apparatus105(a). The management computer 106 uses the virtual computer-to-logicalvolume communication path configuration program 504 to search for a newcommunication interface WWPN corresponding to the virtual HBA WWPN801(a) “407(a)-WWPN” of the storage apparatus 105, in response to theabovementioned changes of the allocations of the virtual HBA 305(a) ofthe virtual computer 304. This search process is same as the searchprocess performed on the virtual HBA allocation table 517(b) in 5601.

Based on the results of this search, the management computer 106 changesthe communication interface WWPN 801(c) “406(a)-WWPN,” which isallocated the virtual HBA WWPN 801(a) “407(a)-WWPN” (see a row 1109 inFIG. 11B), to the communication interface WWPN 801(c) “406(c)-WWPN” (seea row 1111 in FIG. 11B). Similarly, the management computer 106 changesthe communication interface WWPN 801(c) “406(b)-WWPN,” which isallocated the virtual HBA WWPN 801(a) “407(b)-WWPN” (see a row 1110 inFIG. 11B), to the communication interface WWPN 801(c) “406(d)-WWPN” (seea row 1112 in FIG. 11B).

In S1905, the storage apparatus 105(a) transmits a login request withregard to the virtual HBA 407(a) to the edge apparatus 101(c), inresponse to the change of the allocation of the virtual HBA 407(a) tothe communication interface 406(c) in S1904. The fabric service 207(c)of the edge apparatus 101(c) registers the WWPN of the virtual HBA407(a) in the name server function. This process is same as theprocesses described in S1601 and S1602.

Also, the storage apparatus 105(a) transmits a login request with regardto the virtual HBA 407(b) to the edge apparatus 101(d), and carries outthe same process.

In S1906, as with S1905, the computer 104(d) transmits login requestswith regard to the virtual HBAs 305(a′) and 305(b′) to the edgeapparatuses 101(c) and 101(d) respectively, in response to the changesof the allocations of the virtual HBAs 305(a) and 305(b) to thecommunication interface 406 in S1904. In response to this, the edgeapparatuses 101(c) and 101(d) implementes the process.

In S1907, prior to copying the virtual computer 304(a) (S1908), thecomputer 104(a) requests the edge apparatus 101 to allocate a specialVLAN 110(e) for a communication to copy the virtual computer 304(a).This can distinguish the communication to copy the virtual computer304(a) from the other communications and place priorities. The processof adding the VLAN 110(e) is same as the processes described in S1801and S1803.

The computer 104(a) uses the VLAN configuration program 312 to transmitthe communication frame having the following information, to the edgeapparatuses 101.

(*) The transmission destination MAC addresses (DA): “ALL_IF-SW_MACs”representing multicast addresses of all edge apparatuses 101.

(*) The transmission source MAC address (SA): “303(a)-MAC,” which is theMAC address of the communication interface 303(a).

(*) “VLAN ADD”: An identifier indicating a data addition request forrequesting an addition of data to the VLAN allocation table 212.

(*) VLAN MAC: Values representing the MAC addresses 1001 in the VLANallocation table 212 (the MAC address of the communication interface303(a), “303(a)-MAC”).

(*) VLAN Protocols: Values representing the protocols 1301 in the VLANallocation table 212 (“FTP” of a copy protocol (FTP: File TransferProtocol)).

(*) VLAN ID: Values representing the VLAN IDs 902 in the VLAN allocationtable 212 (the ID of a copy VLAN, “110(e)”).

The edge apparatus 101 that receives the communication frame registersan allocation of the VLAN ID “110(e)” in the VLAN allocation table 212(see a row 1305 in FIG. 13). In this case, when the transmission sourceMAC address is “303(a)-MAC” and the protocol is “FTP,” the VLAN ID is“110(e),” but the VLAN ID becomes “110(a)” with a different protocol.

Similarly, the computer 104(b) also uses the VLAN configuration program312 to request the edge apparatus 101 to allocate the VAN ID “110(e)” inthe VLAN allocation table 212 (see a row 1306 in FIG. 13).

In S1908, the computer 104(a) uses the virtual computer configurationprogram 309 to copy the suspended virtual computer 304(a) to thecomputer 104(d).

In S1909, the computer 104(d) resumes the copied virtual computer304(a′) to reactivate it.

In S1910, the management computer 106 confirms that the virtual computer304(a′) is correctly activated on the computer 104(d), and thereaftercauses the computer 104(a) to use the virtual computer configurationprogram 309 to delete the virtual computer 304(a).

After the virtual computer 304(a) is deleted (S1910), in S1911 thecomputer 104(a) requests for a deletion of the allocation of the VLAN110(e) for copying the virtual computer 304(a). The process for deletingthe allocation of the VLAN 110(e) is same as the processes described inS1804 and S1806.

The computer 104(a) uses the VLAN configuration program 312 to transmitthe communication frame having the following information, to the edgeapparatuses 101.

(*) The transmission destination MAC addresses (DA): “ALL_IF-SW_MACs”representing multicast addresses of all edge apparatuses 101.

(*) The transmission source MAC address (SA): “303(a)-MAC,” which is theMAC address of the communication interface 303(a).

(*) “VLAN DEL”: An identifier indicating a data deletion request forrequesting a deletion of data from the VLAN allocation table 212.

(*) VLAN MAC: Values representing the MAC addresses 1001 in the VLANallocation table 212 (the MAC address of the communication interface303(a), “303(a)-MAC”).

(*) VLAN Protocols: Values representing the protocols 1301 in the VLANallocation table 212 (“FIP,” the copy protocol).

(*) VLAN ID: Values representing the VLAN IDs 902 in the VLAN allocationtable 212 (the ID of a copy VLAN, “110(e)”).

The edge apparatus 101 that receives the communication frame deletes,from the VLAN allocation table 212, the information shown in a row thatis specified based on this communication frame (see the row 1305 in FIG.13).

As described above, when moving the VM, the virtual HBA of the VM to bemoved and the virtual HBA of the LV corresponding to the VM to be movedcan be logged out from the functions of the fabric services into whichthese virtual HBAs are logged in, without changing the login conditionsof the computer 104(a), computer 104(d) and storage apparatus 105(a) inthe functions of the fabric services. Then, the VM to be moved and theLV corresponding to this VM can log into the functions of the fabricservice that is provided by the edge apparatus 101 that is directlycoupled to the computer 104(d) to which the VM is moved, whereby acommunication can be established. Therefore, even when the VM is movedto any of the computers, the communication with the corresponding LV canbe restarted by using the functions of the fabric service that isprovided by the edge apparatus 101 that is directly coupled to thecomputer to which the VM is moved.

<Path Configuration Process for Migrating Logical Volume>

As shown in a process flow of FIG. 21, the storage apparatuses 105migrate the logical volumes 402 in response to an instruction sent tothe logical volume migration program 510 by the management computer 106.The following describes a path configuration process for migrating thelogical volumes, by taking an example in which the logical volume 402(a)coupled to the virtual computer 304(a) of the computer 104(d) ismigrated from the storage apparatus 105(a) to the storage apparatus105(b), as shown in FIG. 22. Note that the logical volume beforemigration is denoted as the logical volume 402(a) with the virtual HBAs407(a), 407(b), and the logical volume after migration is denoted as alogical volume 402(a′) with virtual HBAs 407(a′) and 407(b′).

In S2101, the computer 104(d) uses the communication path controlprogram 313 to make only the path between the virtual HBA 305(a′) andthe virtual HBA 407(a) available and the path between the virtual HBA305(b′) and the virtual HBA 407(b) unavailable, in terms of the pathbetween the virtual computer 304(a′) and the logical volume 402(a). Forexample, the computer 104 manages a plurality of paths and furthermanages status information that indicates theavailability/unavailability of each of the paths. Changing the statusinformation of a certain path from the information indicating theunavailability to the information indicating the availability is anexample of “making a path available.”

In S2102, the computer 104(d) uses the virtual computer configurationprogram 309 to lock (suspend) the condition of the virtual computer304(a′) on the memory 302. For example, the computer 104(d) prevents theinformation indicating the condition of the virtual computer 304(a) onthe memory 302 from being updated.

In S2103, the storage apparatus 105(a) transmits to the edge apparatus101(d) a logout request for requesting the virtual HBA 407(b) of the LV402(a) to log out. In response to this request, the fabric service207(d) performs a logout process on the virtual HBA 407(b) of the LV402(a). this process is same as the process of S1902. As a result, thevirtual HBA 407(b) of the LV 402(a) of the storage apparatus 105(a) logsout from the fabric service 207(d).

In S2104, the management computer 106 changes the allocation of thevirtual HBA 407(b) of the storage apparatus 105(a) to the communicationinterface 406(d), to the allocation of the virtual HBA 407(b′) of thestorage apparatus 105(b) to a communication interface 406(h).Accordingly, the management computer 106 updates the virtual HBAallocation table 517(b).

The management computer 106 uses the virtual computer-to-logical volumecommunication path configuration program 504, to search for a newcommunication interface WWPN corresponding to the virtual HBA WWPN801(a) of the storage apparatus 105(b), “407(b′)-WWPN,” in response tothe migration of the logical volume 402(a) from the storage apparatus105(a) to the storage apparatus 105(b). This search process is same asthe process performed on the virtual HBA allocation table 517(b) inS601.

Based on the result of this search, the communication interface WWPN801(c) “406(d)-WWPN,” which is allocated the virtual HBA WWPN 801(a)“407(b)-WWPN” (see the row 1112 in FIG. 11B), is changed to thecommunication interface WWPN 801(c) “406(h)-WWPN.” (see the row 1113 inFIG. 11B).

In S2105, in accordance with the allocation of the virtual HBA 407(b′)to the communication interface 406(h) in S2104, the storage apparatus105(b) transmits a login request with regard to the virtual HBA 407(b′)to the edge apparatus 101(d). In response to this login request, thefabric service 207(d) of the edge apparatus 101(d) performs the loginprocess. This process is same as the process of S1905 (processesdescribed in S1601 and S1602).

In S2106, prior to copying the logical volume 402(a) (S2107), thestorage apparatus 105(a) uses the VLAN configuration program 412 torequest the edge apparatus 101 to allocate a special VLAN 110(f) for acommunication to copy the logical volume 402(a). The edge apparatus 101that receives the request registers an allocation of the VLAN ID“110(f)” in the VLAN allocation table 212. This process is same as theprocess described in S1907.

In S2107, the storage apparatus 105(a) uses the logical volumeconfiguration program 409 to copy the logical volume 402(a) to thestorage apparatus 105(b) (e.g., to copy all the data within the logicalvolume 402(a) to the logical volume within the storage apparatus105(b)). After copying, the logical volume 402(a) within the storageapparatus 105(a) is in synchronization with the copy destination logicalvolume 402(a′) of the storage apparatus 105(b).

In S2108, the computer 104(d) resumes the suspended virtual computer304(a′) to reactivate it.

Simultaneously with resuming the virtual computer 304(a′), in S2109 thecomputer 104(d) uses the communication path control program 313 to makeonly the path between the virtual HBA 305(b′) and the virtual HBA407(b′) available and the path between the virtual HBA 305(a′) and thevirtual HBA 407(a) unavailable.

As a result, the communication path extending from the virtual computer304(a′) to the logical volume 402(a) is switched to the communicationpath extending from the virtual computer 304(a′) to the logical volume402(a′).

In S2110, the storage apparatus 105(a) transmits a logout request withregard to the virtual HBA 407(a) to the edge apparatus 101(c), as withthe case in S2103. In response to this logout request, the fabricservice 207(c) performs the logout process. As a result, the virtual HBA407(a) of the LV 402(a) of the storage apparatus 105(a) logs out fromthe fabric service 207(c).

As with the case of S2104, in S2111 the management computer 106 changesthe allocation of the virtual HBA 407(a) of the storage apparatus 105(a)to the communication interface 406(c), to the allocation of the virtualHBA 407(a′) of the storage apparatus 105(b) to a communication interface406(g). Accordingly, the management computer 106 updates the virtual HBAallocation table 517(b).

In the virtual HBA allocation table 517(b), the communication interfaceWWPN 801(c) “406(c)-WWPN,” which is allocated the virtual HBA WWPN801(a) “407(a)-WWPN” (see the row 1111 in FIG. 11B), is changed to thecommunication interface WWPN 801(c) “406(g)-WWPN” (see a row 1114 inFIG. 11B).

As with the case in S2105, in S2112 the storage apparatus 105(b)transmits a login request with regard to the virtual HBA 407(a′) to theedge apparatus 101(c), in accordance with the allocation of the virtualHBA 407(a′) to the communication interface 406(g) obtained in S2111. Thefabric service 207(c) of the edge apparatus 101(c) performs the loginprocess in response to this login request. As a result, the virtual HBA407(a′) of the LV 402(a′) of the storage apparatus 105(b) logs into thefabric service 207(c).

In S2113, the computer 104(d) uses the communication path controlprogram 313 to make the path between the virtual HBA 305(a′) and thevirtual HBA 407(a′) available.

In S2114, the management computer 106 confirms that the virtual computer304(a′) communicates with the logical volume 402(a′) correctly, andthereafter causes the storage apparatus 105(a) to use the logical volumeconfiguration program 409 to delete the logical volume 402(a).

In S2115, after the logical volume 402(a) is deleted (S2114) the storageapparatus 105(a) uses the VLAN configuration program 412 to request fora deletion of the allocation of the VLAN 110(f) for copying the logicalvolume 402(a). This process is same as the process of S1911.

As described above, when moving the LV, the virtual HBA of the LV to bemoved logs out from the functions of the fabric service into which thisvirtual HBA is logged in, without changing the login conditions of thecomputer 104 and storage apparatus 105 in the functions of the fabricservice. Then, the virtual HBA of the LV can log into the functions ofthe fabric service that is provided by the edge apparatus 101 that isdirectly coupled to the corresponding VM from the storage apparatus 105,whereby a communication can be established. In other words, the VM andthe LV communicate using the fabric service of the edge apparatus 101that is directly coupled to the computer providing the VM. Therefore,when moving only the LV between the storage apparatuses without movingthe VM between the computers, only the LV may log into or out from thefabric service.

The above has described the present embodiment. The present embodimentis as follows. In other words, the network 112 is formed by the edgeapparatuses 101 and the switching apparatus 102. Each of the edgeapparatuses 101 is provided with the fabric services 207. The VLAN 110is allocated to each of the fabric services 207. The computer 104accesses only the fabric services 207 that are configured in the edgeapparatus 101 coupled to the network 112. The storage apparatus 105accesses the fabric services 207 configured in all of the edgeapparatuses 101. The management computer 106 allocates the logicalvolume 402 of the storage apparatus 105 to the virtual computer 304 ofthe computer 104, the communication interface 303 of the computer 104 tothe VLAN 110, the communication interface 406 of the storage apparatus105 to the VLAN 110, the virtual HBA 305 to the communication interface303 of the computer 104, and the virtual HBA 407 to the communicationinterface 406 of the storage apparatus 105. In this manner, thecommunication path extending from the virtual computer 304 of thecomputer 104 to the logical volume 402 of the storage apparatus 105 canbe managed.

In the path management above, without requiring a complicatedconfiguration for linking the plurality of fabric services 207, thecomputer 104 can be coupled to all of the storage apparatuses 105 simplyby accessing only one of the fabric services 207.

In addition, the edge apparatus 101 can change the VLAN allocation table212 in response to the dynamic address change that is generated when thecomputer 104 and the storage apparatus 105 access the fabric services207.

Even when migrating the virtual computer 304 between the computers 104or migrating the logical volume 402 between the storage apparatuses 105,the communication path extending from the virtual computer 304 of thecomputer 104 to the logical volume 402 of the storage apparatus 105 canbe configured. In addition, when migrating the virtual computer 304between the computers 104 and migrating the logical volume 402 betweenthe storage apparatuses 105, the edge apparatus 101 can temporarilychange the VLAN allocation table 212 in response to copying the virtualcomputer 304 and copying the logical volume 402. In this manner, thecommunication paths for migrating the virtual computer 304 and thelogical volume 402 can be configured temporarily.

Therefore, in the present embodiment, the communication paths can beconfigured easily, when expanding or removing the computers 104, storageapparatuses 105 or integrated apparatuses 109.

Moreover, when replacing the computers 104, storage apparatuses 105 orintegrated apparatuses 109 with new apparatuses, the communication pathscan be configured easily without changing the WWPN 801(b) configured forthe virtual computer 304 and the WWPN 801(a) configured for the logicalvolume 402.

An embodiment of the present invention is described above. However, thepresent embodiment is merely an example illustrating the presentinvention and is not to limit the scope of the present invention. Thepresent invention can be implemented in a variety of forms.

REFERENCE SIGNS LIST

-   -   101 Edge apparatus    -   102 Switching apparatus    -   104 Computer    -   105 Storage apparatus    -   106 Management computer    -   107 External network    -   112 Network    -   112 VLAN    -   109 Integrated apparatus

1. An information system, comprising: a first computer; a first storageapparatus; a first network apparatus coupled to the first computer andthe first storage apparatus and providing a first fabric service; asecond computer; a second storage apparatus; a second network apparatuscoupled to the second computer and the second storage apparatus andproviding a second fabric service; and a network that couples the firstnetwork apparatus and the second network apparatus, wherein the firstcomputer accesses the first fabric service, the second computer accessesthe second fabric service, and the first storage apparatus and thesecond storage apparatus access the first fabric service and the secondfabric service, respectively.
 2. An information system according toclaim 1, wherein: the first computer accesses only the first fabricservice that is provided by the first network apparatus to which thefirst computer is coupled; the second computer accesses only the secondfabric service that is provided by the second network apparatus to whichthe second computer is coupled; the first storage apparatus accesses thefirst fabric service that is provided by the first network apparatus towhich the first storage apparatus is coupled, and the second fabricservice that is provided by the second network apparatus to which thefirst storage apparatus is coupled via the first network apparatus andthe network; and the second storage apparatus accesses the second fabricservice that is provided by the second network apparatus to which thesecond storage apparatus is coupled, and the first fabric service thatis provided by the first network apparatus to which the second storageapparatus is coupled via the second network apparatus and the network.3. An information system according to claim 2, wherein: the first fabricservice provided by the first network apparatus is allocated to a firstvirtual network; and the second fabric service provided by the secondnetwork apparatus is allocated to a second virtual network.
 4. Aninformation system according to claim 3, wherein the first fabricservice and the second fabric service do not communicate with eachother.
 5. An information system according to claim 4, wherein: the firstcomputer provides a first virtual computer; the second computer providesa second virtual computer; the first virtual computer accesses the firstfabric service provided by the first network apparatus; and the secondvirtual computer accesses the second fabric service provided by thesecond network apparatus.
 6. An information system according to claim 5,wherein: the first storage apparatus provides a first logical volume;the second storage apparatus provides a second logical volume; the firststorage apparatus registers the first logical volume into a functionthat is provided by a fabric service accessed by a virtual computer towhich the first logical volume corresponds; and the second storageapparatus registers the second logical volume into a function that isprovided by a fabric service accessed by a virtual computer to which thesecond logical volume corresponds.
 7. An information system according toclaim 6, wherein: when the first virtual computer provided by the firstcomputer is moved to the second computer, the first virtual computerlogs out from a function provided by the first fabric service, and logsinto a function of the second fabric service that is provided by thesecond network apparatus coupled to the second computer to which thefirst virtual computer is moved; and a storage apparatus that provides alogical volume related to the first virtual computer logs the logicalvolume out from the function of the first fabric service, and logs intothe function of the second fabric service that is provided by the secondnetwork apparatus connected to the second computer to which the firstvirtual computer is moved.
 8. An information system according to claim7, wherein when the first virtual computer provided by the firstcomputer is moved to the second computer, a third virtual networkdifferent from the first virtual network and the second virtual networkis configured, and the first virtual computer is moved by using thethird virtual network.
 9. An information system according to claim 8,wherein: when the first logical volume provided by the first storageapparatus is moved to the second storage apparatus, the first storageapparatus from which the first logical volume is migrated logs the firstlogical volume out from a function of a fabric service accessed by avirtual computer corresponding to the first logical volume; and thesecond storage apparatus to which the first logical volume is migratedlogs the first logical volume into the function of the fabric serviceaccessed by the virtual computer to which the first logical volumecorresponds.
 10. An information system according to claim 9, whereinwhen the first logical volume provided by the first storage apparatus ismoved to the second storage apparatus, the virtual computercorresponding to the first logical volume does not log out from afunction of a fabric service that is provided by a network apparatusconnected to a computer providing the virtual computer.
 11. Aninformation system according to claim 10, wherein: the first fabricservice has a first fabric server function and a first name serverfunction; and the second fabric service has a second fabric serverfunction and a second name server function.
 12. An information systemaccording to claim 1, wherein: the first computer, the first storageapparatus, and the first network apparatus form a first integratedapparatus; and the second computer, the second storage apparatus, andthe second network apparatus form a second integrated apparatus.
 13. Aninformation system according to claim 12, wherein: the first computeraccesses only the first fabric service that is provided by the firstnetwork apparatus of the first integrated apparatus to which the firstcomputer belongs; the second computer accesses only the second fabricservice that is provided by the second network apparatus of the secondintegrated apparatus to which the second computer belongs; the firststorage apparatus accesses the first fabric service that is provided bythe first network apparatus of the first integrated apparatus to whichthe first storage apparatus belongs, and the second fabric service thatis provided by the second network apparatus of the second integratedapparatus to which the first storage apparatus does not belong; and thefirst storage apparatus accesses the first fabric service that isprovided by the first network apparatus of the first integratedapparatus to which the first storage apparatus belongs, and the secondfabric service that is provided by the second network apparatus of thesecond integrated apparatus to which the first storage apparatus doesnot belong.
 14. A management method that is performed by a managementcomputer connected to an information system that includes: a firstcomputer; a first storage apparatus; a first network apparatus, to whichthe first computer and the first storage apparatus are connected,providing a first fabric service; a second computer; a second storageapparatus; a second network apparatus, to which the second computer andthe second storage apparatus are connected, providing a second fabricservice; and a network that connects the first network apparatus and thesecond network apparatus, wherein the management computer: configuresfabric service allocation information for associating the first fabricservice with a first virtual network and associating the second fabricservice with a second virtual network; configures computer allocationinformation for associating the first virtual network with the firstcomputer, and associating the second virtual network with the secondcomputer; configures storage apparatus allocation information forassociating the first virtual network and the second virtual networkwith the first storage apparatus and associating the first virtualnetwork and the second virtual network with the second storageapparatus; and configures the first virtual network in the first networkapparatus and the second virtual network in the second network apparatussuch that the first computer accesses the first fabric service, thesecond computer accesses the second fabric service, and that the firststorage apparatus and the second storage apparatus access the firstfabric service and the second fabric service, respectively.
 15. Anmanagement method according to claim 14, wherein the management computerconfigures the first virtual network in the first network apparatus andthe second virtual network in the second network apparatus such that thefirst computer accesses only the first fabric service that is providedby the first network apparatus to which the first computer is coupled,the second computer accesses only the second fabric service that isprovided by the second network apparatus to which the second computer iscoupled, the first storage apparatus accesses the first fabric servicethat is provided by the first network apparatus to which the firststorage apparatus is coupled, as well as the second fabric service thatis provided by the second network apparatus to which the first storageapparatus is coupled via the first network apparatus and the network,and that the second storage apparatus accesses the second fabric servicethat is provided by the second network apparatus to which the secondstorage apparatus is coupled, as well as the first fabric service thatis provided by the first network apparatus to which the second storageapparatus is coupled via the second network apparatus and the network.