Identifier module integrity

ABSTRACT

Methods, systems, apparatuses, and arrangements enable an identifier module of a storage system to be rendered unusable upon removal from the storage system. In an exemplary identifier module implementation, the identifier module includes an identifier data space that is capable of receiving an identifier and a breakable apparatus that is adapted to break and render the identifier module unusable upon removal of the identifier module from a storage system. The identifier module may be adapted for removable attachment to the storage system. In an exemplary storage system implementation, the storage system includes one or more memory units that are capable of storing information and at least one interface that is adapted to receive an identifier module. The at least one interface includes a disrupter apparatus that is adapted to break and render unusable an identifier module upon removal of such an identifier module from the at least one interface.

TECHNICAL FIELD

This disclosure relates in general to the field of informationprocessing systems, and in particular, by way of example but notlimitation, to enabling the on-line repair of identifier modules inhighly-reliable storage systems of information processing systems.

BACKGROUND

Internet commerce companies, and increasingly businesses in general,entrust their business-critical information to highly-reliableinformation processing systems. These information processing systemstypically include arrays of disk drives that store the business-criticalinformation. These disk drives are also designed to be highly reliable.In an information processing system, a computer usually processes thebusiness-critical information while in communication with the diskdrives over a coupling such as a network. In order to communicate withthe disk drives over the network, the disk drives have traditionallybeen identified using a network address or similar.

SUMMARY

Methods, systems, apparatuses, and arrangements enable an identifiermodule of a storage system to be rendered unusable upon removal from thestorage system. In an exemplary identifier module implementation, theidentifier module includes an identifier data space that is capable ofreceiving an identifier and a breakable apparatus that is adapted tobreak and render the identifier module unusable upon removal of theidentifier module from a storage system. The identifier module may beadapted for removable attachment to the storage system. In an exemplarystorage system implementation, the storage system includes one or morememory units that are capable of storing information and at least oneinterface that is adapted to receive an identifier module. The at leastone interface includes a disruptor apparatus that is adapted to breakand render unusable an identifier module upon removal of such anidentifier module from the at least one interface. Various alternativeimplementations for identifier modules, identifiers, breakableapparatuses, storage systems, memory units, interfaces, disruptorapparatuses, etc. are described. Exemplary methods for building andutilizing identifier modules are also described.

BRIEF DESCRIPTION OF THE DRAWINGS

In the Drawings, like numerals are used for like and/or correspondingfeatures, aspects, and components of the various FIGS. 1–9.

FIG. 1 illustrates an exemplary information processing system having astorage system.

FIGS. 2–4 are exemplary storage systems illustrating memory units andidentifier modules.

FIG. 5 is a storage system that illustrates an exemplary disruptorapparatus of the storage system and/or memory unit and an exemplarybreakable apparatus of an identifier module.

FIG. 6 illustrates an exemplary implementation of an identifier moduleand an interface therefor.

FIG. 7 illustrates another exemplary implementation of an identifiermodule and an interface therefor.

FIG. 8 is a flow diagram that illustrates an exemplary method forbuilding an identifier module.

FIG. 9 is a flow diagram that illustrates an exemplary method forutilizing an identifier module.

DETAILED DESCRIPTION

FIG. 1 illustrates an exemplary information processing system 100 havinga storage system 102. Information processing system 100 represents aninformation processing system that is, for example, highly-reliable andmay be suitable for handling mission-critical information for acorporate, government, or other enterprise. However, informationprocessing system 100 may be employed in any environment in whichreliability is necessary or desirable. If intended for highly-reliableapplications, information processing system 100 generally includes (i)redundancies to facilitate continued functioning even when a physicalpart or other aspect malfunctions and (ii) the ability to be repairedwhile the system remains fully or at least partially functional (e.g.,on-line).

The storage system 102 may be constructed using any available memorytechnology. These memory technologies include magnetic disk drives,magneto-optical disk drives, solid-state memory devices such as flashmemory, and so forth. However, storage system 102 is usually constructedof disk drives that are formed into an array of disk drives. Such anarray may form a redundant array of independent/inexpensive disks (aRAID), a Fibre Channel storage system, and so forth. Other fast and/orreliable storage systems may alternatively be used to realize a storagesystem 102.

In a highly-reliable storage system 102, there is usually at least oneredundant part for each part or set of parts in the system.Consequently, when a “standard” part fails, the redundant or “backup”part assumes the functions and responsibilities of the standard part. Inthis manner, the storage system may continue to function at somepredetermined, albeit possibly reduced, level of performance. “Standard”parts and “backup” parts may be identical from a functional orspecifications perspective. Which part of one or more parts isconsidered the “backup” may also depend on which part was most recentlyreplaced and the backup “part” may actually be distributed excesscapacity. Additionally, the standard part can typically be replaced witha new standard part while the storage system is on-line and continuingto function at some predetermined level of performance.

Information processing system 100 also includes a computer 104 that iscapable of processing the information stored or to-be-stored at storagesystem 102. Computer 104 may be any specialized or general-purposeprocessing device including, but not limited to, a personal computer(PC), a mainframe computer, a workstation computer, a network of anysuch computers, and so forth. Computer 104 may operate under anyspecialized or general-purpose operating system, including but notlimited to, Unix®, Microsoft Windows®, Linux®, Macintosh®, and so forth.

Computer 104 may be in communication with storage system 102 over any ofone or more couplings. These couplings include one or more connections106 and one or more networks 108. Connection 106 represents relativelydirect couplings such as Universal Serial Bus (USB) connectors,Ethernet-based connectors, Bluetooth A) connectors, other (e.g.,proprietary or non-proprietary) higher-speed point-to-point connectors,and so forth. Network 108 represents relatively less direct couplingssuch as a Local Area Network (LAN), the Internet, other (e.g.,proprietary or non-proprietary) higher-speed networks, and so forth.Computer 104 is thus able to access storage system 102 over network 108and/or connections 106.

FIGS. 2–4 are exemplary storage systems 102A–102C illustrating memoryunits 202 and identifier modules 204. Each of storage systems 102A–102Cincludes one or more memory units 202 and one or more identifier modules204. Each memory unit 202 corresponds, for example, to a subset of thememory storage capability of the storage system 102. Hence, each memoryunit 202 may correspond to a disk drive or similar memory device. Eachidentifier module 204 includes, for example, an identifier that enablescomputer 104 (of FIG. 1) to locate/access/communicate with storagesystem 102. Identifier modules 204 may be constructed of any suitablematerial or materials such as metal, plastic, printed circuit board(PCB), some combination thereof, and so forth. Exemplary identifiermodules 204 are described in greater detail further below, especiallywith reference to FIGS. 5–7.

Storage systems 102A–102C illustrate exemplary implementations of ageneral storage system 102. Each of storage systems 102A–102Cillustrates a different combination of, and numbers of, memory units 202and identifier modules 204. Storage system 102A includes one memory unit202 and one identifier module 204. As such, identifier module 204 may beinterfacing with and/or associated with either or both of storage system102A and memory unit 202.

Storage system 102B includes multiple memory units 202A, 202B, . . .202N and one identifier module 204. In this implementation, identifiermodule 204 is more likely to be interfacing with and/or associated withstorage system 102B. Similarly, an identifier (not explicitly shown inFIG. 3) of identifier module 204 is more likely to represent the entirestorage system 102B as opposed to any particular individual memory unit202 of memory units 202A, 202B, . . . 202N.

Storage system 102C includes multiple memory units 202A, 202B, . . .202N and multiple identifier modules 204A, 204B, . . . 204N. In thisimplementation, identifier modules 204A, 204B, . . . 204N are morelikely to be interfacing with and/or associated with respectiveindividual ones of memory units 202A, 202B, . . . 202N. Similarly, eachidentifier of identifier modules 204A, 204B, . . . 204N is more likelyto represent a respective individual memory unit 202 of memory units202A, 202B, . . . 202N as opposed to the entire storage system 102C.

For any such storage system 102, it should be understood that for eachidentifier module 204 that is illustrated, an un-illustratedbackup/redundant identifier module 204 may be present forhigh-reliability purposes. Alternatively, there may be onebackup/redundant identifier module 204, or at least fewer than aone-to-one correspondence of backup/redundant identifier modules 204, ineach such storage system 102. Also, each identifier module 204 may bemore closely associated with, and actually interfacing with, either theentire storage system 102 or an individual memory unit 202.

FIG. 5 is a storage system 102 that illustrates an exemplary disruptorapparatus 502 of storage system 102 and/or memory unit 202 and anexemplary breakable apparatus 504 of identifier module 204. Generally,disrupter apparatus 502 acts to physically/mechanically disrupt theusability of identifier module 204 by breaking breakable apparatus 504upon removal of identifier module 204 from storage system 102. Althoughnot shown in FIG. 5, an interface may be used to (removably) attachidentifier module 204 to storage system 102 and/or memory unit 202.

Disruptor apparatus 502 is a physical/mechanical apparatus that isadapted to render identifier module 204 unusable for its intendedpurpose of providing an identity to storage system 102 or a memory unit202 thereof. Disruptor apparatus 502 may be part of and/or more closelyassociated with either of storage system 102 or memory unit 202, asindicated by the dashed line extending therefrom. For example, ifidentifier module 204 is attached to memory unit 202, then disruptorapparatus 502 may be part of memory unit 202. Alternatively, ifidentifier module 204 is attached to storage system 102, then disrupterapparatus 502 may be part of storage system 102. Exemplary disruptorapparatuses 502 are described further below especially with reference toFIGS. 6 and 7.

Breakable apparatus 504 is a physical/mechanical apparatus that isadapted to be broken by disruptor apparatus 502 automatically uponphysical removal of identifier module 204 from storage system 102.Breaking breakable apparatus 504 renders identifier module 204 unusablefor its intended purpose of being removably attached to storage system102 and providing an identity thereto. However, even after removal,identifier module 204 may still be separately accessible for testing anddiagnostic purposes. It should be noted that when an identifier module204 is removably attached to a memory unit 202, which is physically orlogically part of a storage system 102, the identifier module 204 mayalso be considered as attached to the storage system 102. Exemplarybreakable apparatuses 504 are described further below especially withreference to FIGS. 6 and 7.

In addition to one or more breakable apparatuses 504, identifier module204 also includes an identifier data space 506A. Identifier data space506A is a memory location or portion that is capable of holding anidentifier, such as an identifier 506B. Identifier data space 506A isrealized, for example, as a writable or rewritable memory, such as flashmemory, electrically programmable read-only memory (EPROM), electricallyerasable PROM (EEPROM), some other non-volatile (e.g., solid state)memory, and so forth. Identifier data space 506A may also be realized asvolatile random access memory (RAM), but RAM has a reduced measure ofrobustness. Identifier data space 506A may be incorporated into its ownintegrated circuit (IC) or into an IC of identifier module 204 that isalso responsible for other function(s).

Identifier 506B is usable as an identity for a memory unit 202 and/orthe entire storage system 102. Hence, computer 104 (of FIG. 1) mayaddress or otherwise access storage system 102, or a unit thereof, usingidentifier 506B. Identifier 506B varies depending on the mechanism usedto access storage system 102. Identifier 506B may be, for example, anInternet Protocol (IP) address, an Ethernet address, a proprietarynetwork address, an address that comports with a Fibre Channel storagesystem (e.g., a node worldwide name (WWN)), and so forth.

Information parameters 508 represent parameters of storage system 102(and/or units thereof) that may be used by computer 104 for accessing,optimizing, reconfiguring, etc. storage system 102. For example, for aFibre Channel storage system, information parameters 508 may includemode page(s) of the storage system that reflect the behavior thereof.Although not specifically so illustrated in FIG. 5, informationparameters 508 may include an information parameters data space forholding information parameters as well as the actual informationparameters. Information parameters 508 may be incorporated into theirown IC or into an IC of identifier module 204 that is also responsiblefor other function(s). For example, a single IC may be capable ofstoring both identifier 506B and information parameters 508.

FIG. 6 illustrates an exemplary implementation 600 that includes anidentifier module 204 and an interface 602 therefor. Interface 602 ispart of, or otherwise associated with, either of storage system 102 ormemory unit 202. Alternatively, interface 602 may be associated withboth storage system 102 and memory unit 202, especially in animplementation such as storage system 102A (of FIG. 2). Interface 602may be integral with or otherwise attached to either of storage system102 or memory unit 202. In the particular implementation 600 asillustrated in FIG. 6, interface 602 comprises an insertion feature 602.

Insertion feature 602 is adapted to receive identifier module 204 viainsertion, and identifier module 204 is adapted for insertion intoinsertion feature 602. Thus, identifier module 204 may be removablyattached to insertion feature 602, and consequently storage system 102or memory unit 202, via insertion. During installation, identifiermodule 204 with at least an identifier data space 506A is inserted intoinsertion feature 602 along the direction of arrow 604. Duringde-installation, identifier module 204 is removed from insertion feature602 in the direction opposite of arrow 604. Insertion feature 602 mayfully or partially enclose identifier module 204 after insertion, inwhich case insertion feature 602 may also be considered an enclosure.

Implementation 600 also includes a trace 504A, a portion of PCB 504B,and arms 502A. Trace 504A and portion of PCB 504B comprise exemplarybreakable apparatuses 504, and arms 502A comprise exemplary disrupterapparatuses 502. However, only one such breakable apparatus 504A or 504Bmay be present. Furthermore, although two arms 502A are illustrated inFIG. 6, only one arm 502A (and only one corresponding breakableapparatus 504) need be present.

Trace 504A may be a critical trace. In this context, a critical trace ona substrate such as a PCB that is severed or otherwise damaged/destroyedrenders identifier module 204 no longer capable of providing anidentifier 506B (not explicitly shown in FIG. 6) from identifier dataspace 506A to or for storage system 102. Similarly, if portion of PCB504B is ripped away or otherwise damaged/destroyed, identifier module204 is no longer capable of providing an identifier 506B from identifierdata space 506A to or for storage system 102. Identifier module 204 maybecome unusable from destruction of portion of PCB 504B because, forexample, a critical trace is destroyed/damaged, identifier module 204 isphysically unable to be properly inserted into insertion feature 602,and so forth.

Arms 502A may be constructed in any of a myriad of fashions and usingvarious materials. For example, arms 502A may be formed from the samematerial as is used to make insertion feature 602, such as metal orplastic. Two exemplary designs for arms 502A are described.

For a first design, arms 502A may extend from the floor of insertionfeature 602 in a rising, curving manner that points towards identifiermodule 204 prior to insertion. As identifier module 204 is inserted,arms 502A are deflected upward (and/or a PCB portion of identifiermodule 204 is deflected downward) and over critical trace 504A and intoslots (e.g., gaps, notches, etc.) 606. A leading edge point that hasbeen smoothed for each of arms 502A enables arms 502A to pass over trace504A. However, a sharp underside and/or abrupt trailing edge of arms502A rips or otherwise damages/destroys trace 504A when identifiermodule 204 is removed from insertion feature 602. The PCB of identifiermodule 204 may be a flex circuit to facilitate breaking of trace 504A.Also, arms 502A and/or portion of PCB 504B may be designed so thatportion of PCB 504B is ripped away under this design of arms 502A duringremoval of identifier module 204. Ripping away of portion of PCB 504B,however, does create debris during removal of identifier module 204.

A second exemplary design for arms 502A entails their rising from thefloor of insertion feature 602 such that they point away from identifiermodule 204 prior to insertion. Under this design, arms 502A are capableof deflecting downward into the floor of insertion feature 602 (and/orthe PCB of identifier module 204 is capable of deflecting upward).Identifier module 204 may therefore be safely inserted into insertionfeature 602 so that arms 502A pop up and into slots 606 because arms502A are designed to be depressed by a movement of identifier module 204along the direction of arrow 604. However, when identifier module 204 isremoved from insertion feature 602, arms 502A do not deflect downwardbecause they are designed to not be depressed by a movement ofidentifier module 204 along the direction opposite of arrow 604.Consequently, arms 502A rip out portion of PCB 504B and/or trace 504Aduring removal of identifier module 204.

In an implementation in which the PCB of identifier module 204 isadapted to deflect, arms 502A may be designed such that a leading edgethereof that points toward identifier module 204 prior to insertionexhibits a gentle rise. Conversely, a trailing edge of identifier module204 that points away from identifier module 204 prior to insertionexhibits a sharp or dramatic rise (e.g., a wall) so that the PCB ofidentifier module 204 is not inclined to be deflected. Consequently,arms 502A deflect the PCB of identifier module 204 upward withoutdamaging it during insertion and rip out portion of PCB 504B and/ortrace 504A during removal. The interaction between (i) arms 502A and(ii) trace 504A and/or portion of PCB 504B therefore renders identifiermodule 204 unusable automatically upon removal of identifier module 204from interface 602.

FIG. 7 illustrates an exemplary implementation 700 that includes anidentifier module 204 and an interface 702 therefor. Interface 702includes a restraining feature 702A and an upper and lower bulkhead702B. Interface 702 is part of, or otherwise associated with, either ofstorage system 102 or memory unit 202. Alternatively, interface 702 maybe associated with both storage system 102 and memory unit 202,especially in an implementation such as storage system 102A (of FIG. 2).Interface 702 may be integral with or otherwise attached to either ofstorage system 102 or memory unit 202. In the particular implementation700 as illustrated in FIG. 7, interface 702 comprises a supportingfeature 702.

Generally, supporting feature 702 is adapted to receive identifiermodule 204 and to support identifier module 204. Identifier module 204is adapted to be supported by supporting feature 702. Specifically,identifier module 204 may be removably attached to supporting feature702, and consequently storage system 102 or memory unit 202, via asecurement using securement feature 704. Securement feature 704 includesa bolt 704A and a nut 704B. Alternatively, securement feature 704 may bea screw, a latch, or a similar implement. In some implementations,securement feature 704 may be considered as part of supporting feature702, or more generally as part of any given interface 602/702.

During installation, identifier module 204 with at least an identifierdata space 506A is supported by supporting feature 702 and securedthereto using securement feature 704. Specifically, identifier module204 is placed under and/or against restraining feature 702A and on topof and/or against upper bulkhead 702B. Also, bolt 704A is insertedthrough identifier module 204 and both upper and lower bulkheads 702B.Nut 704B is placed around bolt 704A and tightened against the lowerbulkhead 702B. During de-installation, the securement feature 704 iswithdrawn and identifier module 204 is removed from supporting feature702.

Implementation 700 also includes an electronic component 504C and a pawl502B. Electronic component 504C comprises another exemplary breakableapparatus 504, and pawl 502B comprises another exemplary disruptorapparatus 502. Although only one each of electronic component 504C andpawl 502B are illustrated in FIG. 7, more than one of either or both ofelectronic component 504C and pawl 502B may alternatively beimplemented.

Also, other types of breakable apparatuses 504 and disruptor apparatuses502 may be implemented with any of the implementations, including thoseillustrated in FIGS. 5–7. Furthermore, other combinations of theillustrated breakable apparatuses 504 and disruptor apparatuses 502 maybe employed. For example, a pawl 502B may be adapted to interact with(e.g., rotatably destroy/damage) a trace 504A and/or a portion of PCB504B; also, one or more arms 502A may be adapted to interact with (e.g.,damage/destroy through ripping, etc.) an electronic component 504C.

Electronic component 504C is, for example, an IC that is operational onidentifier module 204. Such an IC may include identifier data space506A, an information parameters space for information parameters 508,other functional features of identifier module 204, some combinationthereof, and so forth. In this described implantation, damaging ordestroying electronic component 504C, including by dislodging it,renders identifier module 204 unusable for its intended purpose. Inother words, identifier module 204 is unable to provide an identifier506B for or to a storage system 102 if electronic component 504C isdamaged/destroyed. However, it may be that one or more components and/orfunctions of identifier module 204 are still available through aseparate testing or diagnostic procedure.

In operation, bolt 704A is inserted through identifier module 204 andupper bulkhead 702B while pawl 502B is compressed into the shank of bolt704A. After insertion, pawl 502B separates away from the shank of bolt704A under the force of a spring or similar mechanism. Pawl 502B comesto rest against (e.g., under or on the side of) electronic component504C. Upon withdrawal of bolt 704A, pawl 502B destroys or otherwisedamages electronic component 504C, especially as bolt 704A, andconsequentially pawl 502B, is rotated. Instead of resting againstelectronic component 504C, pawl 502B may alternatively come to rest in adifferent position such that electronic component 504C is neverthelessdestroyed or otherwise damaged by pawl 502B as bolt 704A is withdrawn.The interaction between (i) pawl 502B and (ii) electronic component 504Ctherefore renders identifier module 204 unusable automatically uponremoval of identifier module 204 from interface 702.

The methods of FIGS. 8–9 are illustrated in flow diagrams that aredivided into multiple method blocks. However, the order in which themethods are described is not intended to be construed as a limitation,and any number of the described method blocks can be combined in anyorder to implement one or more methods related to identifier moduleconstruction and use. Furthermore, although the methods of FIGS. 8–9 aredescribed below in the context of the implementations described abovewith reference to FIGS. 1–7 where applicable, the methods can beimplemented with any suitable apparatuses and in any configuration.

FIG. 8 is a flow diagram 800 that illustrates an exemplary method forbuilding an identifier module. Flow diagram 800 includes two (2) methodblocks 802 and 804. At block 802, an identifier module that has abreakable apparatus is constructed. For example, an identifier module204 with a breakable apparatus 504 may be constructed using a PCB. Thebreakable apparatus 504 may be one or more of a trace 504A, a portion ofPCB 504B, an electronic component 504C, and so forth.

At block 804, an identifier data space is added to the identifiermodule. For example, an identifier data space 506A may be added to theidentifier module 204. This may be accomplished by soldering orotherwise connecting an IC having a memory location for an identifier506B to the PCB. The actions of blocks 802 and 804 may be performed in amyriad of alternative manners and orders. For example, if the electroniccomponent 504C that comprises the breakable apparatus 504 includes theidentifier data space 506A, then method blocks 802 and 804 may beperformed substantially simultaneously. Also, an IC that includes theidentifier data space 506A may be connected to a PCB of the identifiermodule 204 prior to the trace 504A being applied to the PCB.

FIG. 9 is a flow diagram 900 that illustrates an exemplary method forutilizing an identifier module. Flow diagram 900 includes five (5)method blocks 902–910. Flow diagram 900 is directed to installing,using, and removing an identifier module, such as identifier module 204as described herein, with a highly-reliable storage system that iscapable of on-line repair.

When such a highly-reliable storage system is originally manufactured,two identifier modules are typically included. These two identifiermodules may be considered as a “main” identifier module and a“backup/redundant” identifier module. Each of the two identifier modulesmay store the same unique identifier to provide an identity to thestorage system. For example, in a Fibre Channel storage system, theunique identifier may comprise a node World Wide Name (WWN) identifier.Eventually, either the “main” identifier module or the“backup/redundant” identifier module may malfunction and need to bereplaced. In this context, it need not matter which identifier module isconsidered “main” and which is considered a “backup”, for either one mayneed to be replaced by a new identifier module while the system ison-line.

At block 902, an identifier module is physically installed. For example,an identifier module 204 may be removably attached to an interface602/702 that is associated with an individual memory unit 202 and/or theoverall storage system 102. After the identifier module 204 has beenbuilt, and prior to its attachment to a storage system, the identifiermodule 204 need not have an identifier 506B stored in an identifier dataspace 506A. Thus, any two unused identifier modules may beinterchangeable and/or identical. Furthermore, unused identifier modulesare unable to corrupt the integrity of an identity scheme inasmuch asthey have not yet been assigned an identifier.

At block 904, an identifier is stored into an identifier data space ofthe identifier module. For example, an identifier 506B that is stillstored in the functioning identifier module (e.g., the backup or themain identifier module) is also stored in the identifier data space 506Aof the newly installed identifier module 204. Additionally, theinformation parameters 508 (if any) from the functioning identifiermodule may also be transferred, copied, etc. to the newly-installedidentifier module 204. Actions for method blocks 902 and 904 may beperformed while the storage system 102 is on-line.

At block 906, the identifier stored in the identifier data space of thenewly-installed identifier module is used for identification of thestorage system. For example, the computer 104 (of FIG. 1) may access thestorage system 102 for storage and/or retrieval of information over theconnections 106 and/or the networks 108 using the identifier 506B of theidentifier module 204 that is stored in the identifier data space 506A.

At block 908, a malfunction in the newly-installed identifier module isdetected. For example, the identifier 506B and/or the informationparameters 508 may become inaccessible, damaged, corrupted, and soforth. In response, at block 910, the malfunctioning identifier modulemay be physically removed from the storage system. As indicated by theasterisked portion of block 910, this physical removal causes theidentifier module to be automatically physically damaged/destroyed.

Such physical damage/destruction of the identifier module 204 can causethe identifier 506B to become inaccessible, can prevent re-attachment ofthe identifier module 204, some combination thereof, and so forth.Exemplary apparatus implementations for automatically causing suchphysical effects are described above. The actions of blocks 906, 908,and 910 may also be performed while the storage system is on-line. Afterremoval of a previous identifier module, a new identifier module may beinstalled as described above beginning with reference to block 902.

Besides using identifier data space 506A to hold an identifier 506B suchas a network address or similar, as is described above along with otherimplementations, identifier 506B of identifier data space 506A mayalternatively or additionally include one or more other identifications.For example, identifier 506B may comprise information for signaturecards, which enable the printing of legitimate negotiable instrumentssuch as checks on printers having a proper and/or authentic signaturecard attached thereto. Thus, an identifier 506B may include signatureidentification, and identifier module 204 may comprise a signature cardand/or a signature card function. In such an implementation, a printer(not shown) that is adapted to receive an identifier module 204 includesa disruptor apparatus 502. A printer that includes memory and provides atemporary or permanent storage function may be considered a storagesystem, and a printer may also access an identifier module 204 through astorage system 102 or other electronic device.

As another example, identifier 506B may comprise information for alicensing program whereby the indicia regarding which licenses are heldby a user of a printer or storage system 102 are stored on an identifiermodule 204. A software application for a printer or storage system 102can have a certain total number of modules/components from which a usermay elect to secure licenses for only a limited subset thereof. Thelicensing indicia permit access to the limited subset and effectivelyexclude access to the remainder of the total number ofmodules/components. The software can also be licensed on an applicationby application basis, or any other programming unit granularity. Thus,an identifier 506B may include licensing identification, and identifiermodule 204 may comprise a licensing card and/or provide a licensingfunction. In this implementation, too, a printer that is adapted toreceive the identifier module 204 includes a disrupter apparatus 502.

In cases where absolute uniqueness of an identifier 506B is not ofparamount importance, the identification of identifier 506B as stored inidentifier data space 506A may be provided to identifier module 204prior to installation at a storage system or printer, such as uponmanufacturing, sale, and/or initialization of the identifier module 204.

Although implementation(s) of apparatuses, methods, systems, andarrangements have been illustrated in the accompanying Drawings anddescribed in the foregoing Detailed Description, it will be understoodthat the present invention is not limited to the implementation(s)explicitly disclosed, but is capable of numerous rearrangementsmodifications, substitutions, etc. without departing from the spirit andscope set forth and defined by the following claims.

1. An identifier module comprising: an identifier data space that iscapable of receiving an identifier; and a breakable apparatus that isadapted to break and render the identifier module unusable upon removalof the identifier module from a storage system; wherein the identifiermodule is adapted for removable attachment to the storage system.
 2. Theidentifier module of claim 1, wherein the identifier data spacecomprises a memory location.
 3. The identifier module of claim 1,wherein the identifier data space comprises at least one of analphanumeric identifier, a network address, and a node worldwide name(WWN) identity.
 4. The identifier module of claim 1, wherein theidentifier data space comprises at least one of licensing identificationand signature identification.
 5. The identifier module of claim 1,wherein the identifier data space comprises at least part of anintegrated circuit (IC).
 6. The identifier module of claim 1, whereinthe identifier data space is further capable of providing the identifierafter receiving the identifier.
 7. The identifier module of claim 1,wherein the breakable apparatus comprises at least one of a printedcircuit board (PCB) portion, a trace on a PCB, and an electroniccomponent.
 8. The identifier module of claim 1, wherein the identifiermodule is further adapted for removable attachment to the storage systemat an interface that is associated with the storage system.
 9. Theidentifier module of claim 1, wherein the identifier module is furtheradapted for removable attachment to the storage system at an interfacethat is associated with a memory unit of the storage system.
 10. Theidentifier module of claim 1, wherein the identifier module is adaptedfor removable attachment to the storage system via at least one ofinsertion and securement.
 11. The identifier module of claim 10, whereinthe securement comprises at least one of a screw, a nut/boltcombination, and a latch.
 12. The identifier module of claim 1, furthercomprising: an information parameters space that is capable of receivingone or more information parameters that correspond to at least onememory unit of the storage system.
 13. The identifier module of claim12, wherein the information parameters space and the identifier dataspace are located on a single electronic component.
 14. The identifiermodule of claim 12, wherein the information parameters space and theidentifier data space are located on different electronic components.15. A storage system comprising: one or more memory units that arecapable of storing information; and at least one interface that isadapted to receive an identifier module, the at least one interfaceincluding a disruptor apparatus that is adapted to break and renderunusable the identifier module upon removal of the identifier modulefrom the at least one interface.
 16. The storage system of claim 15,wherein the storage system comprises a Fibre Channel storage system. 17.The storage system of claim 15, wherein the one or more memory unitscomprise one or more disk drives.
 18. The storage system of claim 15,wherein the storage system comprises at least one configuration selectedfrom the group comprising: a configuration in which the one or morememory units comprise one memory unit and the at least one interfacecomprises one interface; a configuration in which the one or more memoryunits comprise a plurality of memory units and the at least oneinterface comprises one interface; and a configuration in which the oneor more memory units comprise a plurality of memory units and the atleast one interface comprises a plurality of interfaces.
 19. The storagesystem of claim 15, further comprising: at least one identifier modulethat is adapted for removable attachment to the at least one interface.20. The storage system of claim 15, further comprising: at least oneidentifier module that is adapted for removable attachment to the atleast one interface, the at least one identifier module including abreakable apparatus that is adapted to break and render the at least oneidentifier module unusable upon removal of the at least one identifiermodule from the at least one interface.
 21. The storage system of claim15, further comprising: at least one identifier module that is adaptedfor removable attachment to the at least one interface, the at least oneidentifier module including a breakable apparatus that is adapted tointeract with the disrupter apparatus of the at least one interface. 22.The storage system of claim 15, further comprising: at least onesecurement feature that is adapted to secure the identifier module tothe at least one interface.
 23. The storage system of claim 15, whereinthe disruptor apparatus comprises at least one of a metallic arm, aflexible arm, a nonflexible arm, and a rotatable pawl.
 24. The storagesystem of claim 15, wherein the at least one interface comprises atleast one of a supporting feature and an insertion feature.
 25. Thestorage system of claim 15, wherein the at least one interface isassociated with at least one of the one or more memory units.
 26. Thestorage system of claim 15, wherein the at least one interface isassociated with the storage system.
 27. A system comprising: one or morememory units that are capable of storing information; an identifiermodule, the identifier module including a breakable apparatus and anidentifier data space that is capable of receiving an identifier; and atleast one interface that is capable of receiving the identifier module,the at least one interface including a disruptor apparatus that isadapted to break the breakable apparatus of the identifier module uponremoval of the identifier module from the at least one interface;wherein breaking the breakable apparatus renders the identifier moduleunusable.
 28. The system of claim 27, wherein the system comprises astorage system.
 29. The system of claim 27, wherein the system comprisesan information processing system.
 30. The system of claim 27, whereinthe system comprises an information processing system that includes atleast one of (i) a computer and (ii) one or more coupling mechanisms.31. The system of claim 27, further comprising: a plurality ofidentifier modules, each identifier module of the plurality ofidentifier modules including a breakable apparatus and an identifierdata space that is capable of receiving an identifier.
 32. The system ofclaim 27, wherein the identifier module is interfacing with the at leastone interface; and wherein the identifier data space includes anidentifier.
 33. The system of claim 32, wherein the identifier comprisesa node worldwide name (WWN).
 34. An identifier module comprising: anidentifier data space that is capable of receiving an identifier; and abreakable apparatus that is adapted to break and render the identifierdata space inaccessible upon removal of the identifier module from aninterface of a storage system.
 35. The identifier module of claim 34,wherein the identifier data space is rendered inaccessible to thestorage system through the interface after breakage of the breakableapparatus.
 36. The identifier module of claim 35, wherein the identifierdata space is still accessible through diagnostic equipment afterbreakage of the breakable apparatus.
 37. The identifier module of claim34, wherein the identifier data space comprises at least one oflicensing identification and signature identification.
 38. A storagesystem comprising: one or more memory units that are capable of storinginformation; and a disruptor apparatus that is adapted to break andrender unusable an identifier module upon removal of the identifiermodule from the storage system.
 39. The storage system of claim 38,wherein the disrupter apparatus comprises at least one of an arm and apawl.
 40. The storage system of claim 38, wherein the one or more memoryunits comprise a plurality of memory units; and wherein the storagesystem comprises a Fibre Channel storage system.
 41. An identityarrangement comprising: identifying means for holding an identifier; andbreakable means for breaking the identity arrangement upon removal ofthe identity arrangement from a storage system.
 42. The identityarrangement of claim 41, wherein the identifying means comprises amemory location.
 43. The identity arrangement of claim 41, wherein theidentity arrangement is adapted for removable attachment to the storagesystem.
 44. The identity arrangement of claim 41, wherein the breakablemeans comprises a mechanical breaking point that renders the identityarrangement unusable with the storage system upon breaking.
 45. Theidentity arrangement of claim 41, wherein the breakable means comprisesat least one of a printed circuit board (PCB) portion, a trace on a PCB,and an electronic component.
 46. The identity arrangement of claim 41,wherein the identifier comprises at least one of an alphanumericidentifier, a network address, a node worldwide name (WWN) identity,licensing identification, and signature identification.
 47. A storagearrangement comprising: memory means for storing information; andinterface means for receiving an identifier module, the interface meansincluding disruptor means for disrupting the functionality of theidentifier module upon removal of the identifier module from theinterface means.
 48. The storage arrangement of claim 47, wherein thememory means comprises one or more disk drives.
 49. The storagearrangement of claim 47, wherein the interface means comprises at leastone of (i) insertion means for receiving the identifier module viainsertion and (ii) supporting means for receiving and supporting theidentifier module.
 50. The storage arrangement of claim 47, wherein thedisruptor means comprises at least one of (i) ripping means for rippingat least one of a trace, an electronic component, and a printed circuitboard (PCB) portion of the identifier module and (ii) rotating means fordamaging at least one of the trace, the electronic component, and thePCB portion of the identifier module.
 51. A method for building anidentifier module, the method comprising actions of: constructing anidentifier module having a breakable apparatus, the breakable apparatusdesigned to break upon extracting the identifier module from a storagesystem; and adding an identifier data space to the identifier module.52. The method of claim 51, wherein the actions of constructing andadding are performed at least partially simultaneously.
 53. The methodof claim 51, wherein the action of constructing comprises: providing aprinted circuit board (PCB); and creating the breakable apparatus inconjunction with the PCB.
 54. The method of claim 51, furthercomprising: storing an identifier in the identifier data space.
 55. Themethod of claim 54, wherein the action of storing comprises: storing atleast one of licensing identification and signature identification inthe identifier data space.
 56. A method for utilizing an identifiermodule, the method comprising actions of: physically removing anidentifier module from a storage system; and automatically physicallydamaging the identifier module such that it becomes unusable during theaction of physically removing the identifier module.
 57. The method ofclaim 56, wherein the action of physically removing an identifier modulecomprises at least one action of: de-inserting the identifier modulefrom the storage system; un-supporting the identifier module from thestorage system; and un-securing the identifier module from the storagesystem.
 58. The method of claim 56, wherein the action of automaticallyphysically damaging the identifier module comprises at least one actionof: damaging or disconnecting an electronic component; damaging ordissecting a trace on a printed circuit board (PCB); and damaging ordestroying a portion of the PCB.
 59. The method of claim 56, wherein themethod is performed while the storage system is on-line.
 60. A methodfor utilizing an identifier module, the method comprising actions of:physically installing an identifier module to a storage system;detecting a malfunction of the identifier module; and automaticallyphysically damaging the identifier module such that the identifiermodule becomes unusable with the storage system upon physically removingthe identifier module from the storage system.
 61. The method of claim60, further comprising: storing an identifier into an identifier dataspace of the identifier module; and using the identifier foridentification of at least part of the storage system in a network. 62.The method of claim 61, wherein the action of storing an identifiercomprises: storing a node worldwide name (WWN) identifier into theidentifier data space of the identifier module.
 63. The method of claim60, wherein the method is performed while the storage system is on-line.64. The method of claim 60, further comprising: physically installinganother identifier module to the storage system; storing an identifierinto an identifier data space of the another identifier module; andusing the identifier from the another identifier module foridentification of at least part of the storage system in a network. 65.The method of claim 64, wherein the action of storing an identifiercomprises: transferring a copy of the identifier from an identifier dataspace of the identifier module to the identifier data space of theanother identifier module.