HP StorageWorks 6000 HP StorageWorks 6000-series Virtual Library System User G - Page 346

serial ATA SATA, protocol SNMP

Page 346 highlights

RAID A RAID volume consists of more than one drive, but appears to the operating system to be a single logical disk. RAID improves performance by disk striping, which involves partitioning each drive's storage space into units. By placing data on multiple disks, I/O operations can overlap in a balanced way, improving performance. RAID 1-level data storage Consists of at least two drives that use mirroring (100% duplication of the storage of data). There is no disk striping. Read performance is improved since either disk can be read at the same time. Write performance is the same as for single disk storage. RAID 5-level data storage Provides data disk striping at the byte level and also disk stripe error correction information. RAID 5 configurations can tolerate one drive failure. Even with a failed drive, the data in a RAID 5 volume can still be accessed normally. RAID 6-level data storage Provides data disk striping at the byte level and also disk stripe error correction information. RAID 6 configurations can tolerate two drive failures. Even with two failed drives, the data in a RAID 6 volume can still be accessed normally. RAID 6 read performance is similar to RAID 5, since all drives can service read operations, but the write performance is lower than that of RAID 5 because the parity data must be updated on multiple drives. redundancy In a redundant system, if you lose part of the system, it can continue to operate. For example, if you have two power supplies with one that takes over if the other one dies, that's redundancy. replication Similar to automigration. Data is written to virtual tape, and after the backups are complete, the data is written to another virtual tape, known as the replication target, over the LAN/WAN. secure sockets layer (SSL) certificate serial ATA (SATA) disk simple network management protocol (SNMP) A protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two. Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections. To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol. The evolution of the ATA (IDE) interface that changes the physical architecture from parallel to serial and from primary-secondary (master-slave) to point-to-point. Unlike parallel ATA interfaces that connect two drives; one configured as primary (master), the other as secondary (slave), each SATA drive is connected to its own interface. A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.). 346 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358

RAID
A RAID volume consists of more than one drive, but appears to the operating
system to be a single logical disk. RAID improves performance by disk striping,
which involves partitioning each drive's storage space into units. By placing data
on multiple disks, I/O operations can overlap in a balanced way, improving
performance.
RAID 1-level data
storage
Consists of at least two drives that use mirroring (100% duplication of the storage
of data). There is no disk striping. Read performance is improved since either
disk can be read at the same time. Write performance is the same as for single
disk storage.
RAID 5-level data
storage
Provides data disk striping at the byte level and also disk stripe error correction
information. RAID 5 configurations can tolerate one drive failure. Even with a
failed drive, the data in a RAID 5 volume can still be accessed normally.
RAID 6-level data
storage
Provides data disk striping at the byte level and also disk stripe error correction
information. RAID 6 configurations can tolerate two drive failures. Even with two
failed drives, the data in a RAID 6 volume can still be accessed normally. RAID
6 read performance is similar to RAID 5, since all drives can service read
operations, but the write performance is lower than that of RAID 5 because the
parity data must be updated on multiple drives.
redundancy
In a redundant system, if you lose part of the system, it can continue to operate.
For example, if you have two power supplies with one that takes over if the other
one dies, that's redundancy.
replication
Similar to automigration. Data is written to virtual tape, and after the backups
are complete, the data is written to another virtual tape, known as the replication
target, over the LAN/WAN.
secure sockets
layer (SSL)
certificate
A protocol designed to enable applications to transmit information back and
forth securely. Applications that use this protocol inherently know how to give
and receive encryption keys with other applications, as well as how to encrypt
and decrypt data sent between the two.
Some applications that are configured to run SSL include web browsers like
Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and
Outlook Express, FTP (file transfer protocol) programs, etc. These programs are
automatically able to receive SSL connections.
To send an SSL connection, however, or to open a secure connection, your
application must first have an encryption key assigned to it by a Certification
Authority. Once it has a unique key of its own, you can establish a secure
connection with every other application that can "speak" the SSL protocol.
serial ATA (SATA)
disk
The evolution of the ATA (IDE) interface that changes the physical architecture
from parallel to serial and from primary-secondary (master-slave) to point-to-point.
Unlike parallel ATA interfaces that connect two drives; one configured as primary
(master), the other as secondary (slave), each SATA drive is connected to its own
interface.
simple network
management
protocol (SNMP)
A widely used network monitoring and control protocol. Data is passed from
SNMP agents, which are hardware and/or software processes reporting activity
in each network device (hub, router, bridge, etc.) to the workstation console used
to oversee the network. The agents return information contained in a MIB
(Management Information Base), which is a data structure that defines what is
obtainable from the device and what can be controlled (turned off, on, etc.).
Glossary
346