HP 12000 HP StorageWorks 12000 Gateway Virtual Library System User Guide (AH81 - Page 252

LAN/WAN. Similar to automigration., Serial Advanced Technology Attachment.

Page 252 highlights

RAID1-level data storage RAID5-level data storage RAID6-level data storage redundancy replication on multiple disks, I/O operations can overlap in a balanced way, improving performance. A RAID that consists of at least two drives that use mirroring (100 percent duplication of the storage of data). There is no striping. Read performance is improved since either disk can be read at the same time. Write performance is the same as for single disk storage. A RAID that provides data striping at the byte level and also stripe error correction information. RAID5 configurations can tolerate one drive failure. Even with a failed drive, the data in a RAID5 volume can still be accessed normally. A RAID that provides data striping at the byte level and also stripe error correction information. RAID6 configurations can tolerate two drive failures. Even with two failed drives, the data in a RAID6 volume can still be accessed normally. RAID6 read performance is similar to RAID5, since all drives can service read operations, but the write performance is lower than that of RAID5 because the parity data must be updated on multiple drives. In a redundant system, if you lose part of the system, it can continue to operate. For example, if you have two power supplies with one that takes over if the other one dies, that's redundancy. The process of writing data to virtual tape, and after the backups are complete, writing the data to another virtual tape, known as the replication target, over the LAN/WAN. Similar to automigration. secondary node SSL certificate SATA SCSI SNMP A computer (node) that provides secondary administrating and control for backup and restore operations on a server cluster, and provides additional storage and multi-pathing capabilities on the system. Secure Sockets Layer certificate. A protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two. Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections. To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol. Serial Advanced Technology Attachment. Small Computer Systems Interface. A standard, intelligent parallel interface for attaching peripheral devices to computers, based on a device-independent protocol. Simple Network Management Protocol. A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, and so on) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, and so on). 252 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264

on multiple disks, I/O operations can overlap in a balanced way, improving
performance.
RAID1-level data
storage
A RAID that consists of at least two drives that use mirroring (100 percent
duplication of the storage of data). There is no striping. Read performance is
improved since either disk can be read at the same time. Write performance is
the same as for single disk storage.
RAID5-level data
storage
A RAID that provides data striping at the byte level and also stripe error correction
information. RAID5 configurations can tolerate one drive failure. Even with a
failed drive, the data in a RAID5 volume can still be accessed normally.
RAID6-level data
storage
A RAID that provides data striping at the byte level and also stripe error correction
information. RAID6 configurations can tolerate two drive failures. Even with two
failed drives, the data in a RAID6 volume can still be accessed normally. RAID6
read performance is similar to RAID5, since all drives can service read operations,
but the write performance is lower than that of RAID5 because the parity data
must be updated on multiple drives.
redundancy
In a redundant system, if you lose part of the system, it can continue to operate.
For example, if you have two power supplies with one that takes over if the other
one dies, that's redundancy.
replication
The process of writing data to virtual tape, and after the backups are complete,
writing the data to another virtual tape, known as the replication target, over the
LAN/WAN. Similar to automigration.
secondary node
A computer (node) that provides secondary administrating and control for backup
and restore operations on a server cluster, and provides additional storage and
multi-pathing capabilities on the system.
SSL certificate
Secure Sockets Layer certificate. A protocol designed to enable applications to
transmit information back and forth securely. Applications that use this protocol
inherently know how to give and receive encryption keys with other applications,
as well as how to encrypt and decrypt data sent between the two.
Some applications that are configured to run SSL include web browsers like
Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and
Outlook Express, FTP (file transfer protocol) programs, etc. These programs are
automatically able to receive SSL connections.
To send an SSL connection, however, or to open a secure connection, your
application must first have an encryption key assigned to it by a Certification
Authority. Once it has a unique key of its own, you can establish a secure
connection with every other application that can "speak" the SSL protocol.
SATA
Serial Advanced Technology Attachment.
SCSI
Small Computer Systems Interface. A standard, intelligent parallel interface for
attaching peripheral devices to computers, based on a device-independent
protocol.
SNMP
Simple Network Management Protocol. A widely used network monitoring and
control protocol. Data is passed from SNMP agents, which are hardware and/or
software processes reporting activity in each network device (hub, router, bridge,
and so on) to the workstation console used to oversee the network. The agents
return information contained in a MIB (Management Information Base), which
is a data structure that defines what is obtainable from the device and what can
be controlled (turned off, on, and so on).
Glossary
252