HP 12000 HP 12200 Gateway Virtual Library System User Guide (BW403-10001, June - Page 197

Serial Advanced Technology Attachment., RAID1-level data

Page 197 highlights

RAID1-level data storage RAID5-level data storage RAID6-level data storage redundancy replication S SAN SATA SCSI secondary node smart copy SMI-S SNMP SSL certificate storage pool T tape drive A RAID that consists of at least two drives that use mirroring (100 percent duplication of the storage of data). There is no striping. Read performance is improved since either disk can be read at the same time. Write performance is the same as for single disk storage. A RAID that provides data striping at the byte level and also stripe error correction information. RAID5 configurations can tolerate one drive failure. Even with a failed drive, the data in a RAID5 volume can still be accessed normally. A RAID that provides data striping at the byte level and also stripe error correction information. RAID6 configurations can tolerate two drive failures. Even with two failed drives, the data in a RAID6 volume can still be accessed normally. RAID6 read performance is similar to RAID5, since all drives can service read operations, but the write performance is lower than that of RAID5 because the parity data must be updated on multiple drives. In a redundant system, if you lose part of the system, it can continue to operate. For example, if you have two power supplies with one that takes over if the other one dies, that's redundancy. The process of writing data to virtual tape, and after the backups are complete, writing the data to another virtual tape, known as the replication target, over the LAN/WAN. Similar to automigration. Storage area network. A network of storage devices available to one or more servers. Serial Advanced Technology Attachment. Small Computer Systems Interface. A standard, intelligent parallel interface for attaching peripheral devices to computers, based on a device-independent protocol. A computer (node) that provides secondary administrating and control for backup and restore operations on a server cluster, and provides additional storage and multi-pathing capabilities on the system. A software feature within the automigration process that is under the control of the backup application and managed via the VLS device's SMI-S interface. This requires the backup application to support the HP smart copy interface. (Smart copy is similar to snapshot.) Allows control of the virtual tape library by a connected destination library for the purpose of implementing automigration. SMI-S support allows applications attached to the VLS to detect the virtual library configuration and to allow some users to change the state of the VLS. Simple Network Management Protocol. A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, and so on) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, and so on). Secure Sockets Layer certificate. A protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two. Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections. To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol. Multiple disk arrays logically grouped together from which the dynamic disk filesystem allocates storage. The disk arrays in a VLS are automatically configured into one storage array. (1) A device that reads data from and writes data onto tape. 197

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

RAID1-level data
storage
A RAID that consists of at least two drives that use mirroring (100 percent duplication of the
storage of data). There is no striping. Read performance is improved since either disk can be
read at the same time. Write performance is the same as for single disk storage.
RAID5-level data
storage
A RAID that provides data striping at the byte level and also stripe error correction information.
RAID5 configurations can tolerate one drive failure. Even with a failed drive, the data in a RAID5
volume can still be accessed normally.
RAID6-level data
storage
A RAID that provides data striping at the byte level and also stripe error correction information.
RAID6 configurations can tolerate two drive failures. Even with two failed drives, the data in a
RAID6 volume can still be accessed normally. RAID6 read performance is similar to RAID5, since
all drives can service read operations, but the write performance is lower than that of RAID5
because the parity data must be updated on multiple drives.
redundancy
In a redundant system, if you lose part of the system, it can continue to operate. For example, if
you have two power supplies with one that takes over if the other one dies, that's redundancy.
replication
The process of writing data to virtual tape, and after the backups are complete, writing the data
to another virtual tape, known as the replication target, over the LAN/WAN. Similar to
automigration.
S
SAN
Storage area network. A network of storage devices available to one or more servers.
SATA
Serial Advanced Technology Attachment.
SCSI
Small Computer Systems Interface. A standard, intelligent parallel interface for attaching peripheral
devices to computers, based on a device-independent protocol.
secondary node
A computer (node) that provides secondary administrating and control for backup and restore
operations on a server cluster, and provides additional storage and multi-pathing capabilities on
the system.
smart copy
A software feature within the automigration process that is under the control of the backup
application and managed via the VLS device's SMI-S interface. This requires the backup application
to support the HP smart copy interface. (Smart copy is similar to snapshot.)
SMI-S
Allows control of the virtual tape library by a connected destination library for the purpose of
implementing automigration. SMI-S support allows applications attached to the VLS to detect the
virtual library configuration and to allow some users to change the state of the VLS.
SNMP
Simple Network Management Protocol. A widely used network monitoring and control protocol.
Data is passed from SNMP agents, which are hardware and/or software processes reporting
activity in each network device (hub, router, bridge, and so on) to the workstation console used
to oversee the network. The agents return information contained in a MIB (Management Information
Base), which is a data structure that defines what is obtainable from the device and what can be
controlled (turned off, on, and so on).
SSL certificate
Secure Sockets Layer certificate. A protocol designed to enable applications to transmit information
back and forth securely. Applications that use this protocol inherently know how to give and
receive encryption keys with other applications, as well as how to encrypt and decrypt data sent
between the two.
Some applications that are configured to run SSL include web browsers like Internet Explorer and
Netscape, mail programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer
protocol) programs, etc. These programs are automatically able to receive SSL connections.
To send an SSL connection, however, or to open a secure connection, your application must first
have an encryption key assigned to it by a Certification Authority. Once it has a unique key of
its own, you can establish a secure connection with every other application that can "speak" the
SSL protocol.
storage pool
Multiple disk arrays logically grouped together from which the dynamic disk filesystem allocates
storage. The disk arrays in a VLS are automatically configured into one storage array.
T
tape drive
(1) A device that reads data from and writes data onto tape.
197