HP MSA 1040 HP MSA 1040 SMU Reference Guide (762784-001, March 2014) - Page 182

Secure Hash Algorithm. A cryptographic hash function., Secure Sockets Layer - sff

Page 182 highlights

replication snapshot A special type of snapshot, created by the remote replication feature, that preserves the state of data of a replication set's primary volume as it existed when the snapshot was created. For a primary volume, the replication process creates a replication snapshot on both the primary system and, when the replication of primary-volume data to the secondary volume is complete, on the secondary system. Replication snapshots are unmappable and are not counted toward a license limit, although they are counted toward the system's maximum number of volumes. A replication snapshot can be exported to a regular, licensed snapshot. See also replication sync point. replication sync point The state of a replication snapshot whose corresponding primary or secondary snapshot exists and contains identical data. For a replication set, four types of sync point are identified: the only replication snapshot that is copy-complete on any secondary system is the "only sync point"; the latest replication snapshot that is copy-complete on any secondary system is the "current sync point"; the latest replication snapshot that is copy-complete on all secondary systems is the "common sync point"; a common sync point that has been superseded by a new common sync point is an "old common sync point." SAS Serial Attached SCSI interface protocol or disk-drive architecture. SC Storage Controller. A processor (located in a controller module) that is responsible for RAID controller functions. The SC is also referred to as the RAID controller. See also EC and MC. SCSI Enclosure Services See SES. secondary volume The volume that is the destination for data in a replication set and that is not accessible to hosts. For disaster recovery purposes, if the primary volume goes offline, a secondary volume can be designated as the primary volume. The secondary volume exists in a secondary vdisk in a secondary (or remote) storage system. The contents of a secondary volume are in a constant state of flux and are not in a consistent state while a replication is in process. Only snapshots that are associated with a secondary volume are data consistent. secret For use with CHAP, a password that is shared between an initiator and a target to enable authentication. secure hash algorithm See SHA. secure shell See SSH. Secure Sockets Layer See SSL. SEEPROM Serial electrically erasable programmable ROM. A type of nonvolatile (persistent if power removed) computer memory used as FRU ID devices. Self-Monitoring See SMART. Analysis and Reporting Technology serial electrically erasable programmable ROM See SEEPROM. Service Location Protocol See SLP. SES SCSI Enclosure Services. The protocol that allows the initiator to communicate with the enclosure using SCSI commands. SFCB Small Footprint CIM Broker. SFF Small form factor. A type of disk drive. SHA Secure Hash Algorithm. A cryptographic hash function. SLP Service Location Protocol. Enables computers and other devices to find services in a local area network without prior configuration. Small Footprint CIM Broker See SFCB. small form factor See SFF. 182 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190

182
Glossary
replication snapshot
A special type of snapshot, created by the remote replication feature, that preserves the
state of data of a replication set's primary volume as it existed when the snapshot was
created. For a primary volume, the replication process creates a replication snapshot on
both the primary system and, when the replication of primary-volume data to the secondary
volume is complete, on the secondary system. Replication snapshots are unmappable and
are not counted toward a license limit, although they are counted toward the system's
maximum number of volumes. A replication snapshot can be exported to a regular,
licensed snapshot.
See also
replication sync point.
replication sync point
The state of a replication snapshot whose corresponding primary or secondary snapshot
exists and contains identical data. For a replication set, four types of sync point are
identified: the only replication snapshot that is copy-complete on any secondary system is
the “only sync point”; the latest replication snapshot that is copy-complete on any
secondary system is the “current sync point”; the latest replication snapshot that is
copy-complete on all secondary systems is the “common sync point”; a common sync point
that has been superseded by a new common sync point is an “old common sync point.”
SAS
Serial Attached SCSI interface protocol or disk-drive architecture.
SC
Storage Controller. A processor (located in a controller module) that is responsible for RAID
controller functions. The SC is also referred to as the RAID controller.
See also
EC and MC.
SCSI Enclosure Services
See
SES.
secondary volume
The volume that is the destination for data in a replication set and that is not accessible to
hosts. For disaster recovery purposes, if the primary volume goes offline, a secondary
volume can be designated as the primary volume. The secondary volume exists in a
secondary vdisk in a secondary (or remote) storage system.
The contents of a secondary volume are in a constant state of flux and are not in a
consistent state while a replication is in process. Only snapshots that are associated with a
secondary volume are data consistent.
secret
For use with CHAP, a password that is shared between an initiator and a target to enable
authentication.
secure hash algorithm
See
SHA.
secure shell
See
SSH.
Secure Sockets Layer
See
SSL.
SEEPROM
Serial electrically erasable programmable ROM. A type of nonvolatile (persistent if power
removed) computer memory used as FRU ID devices.
Self-Monitoring
Analysis and Reporting
Technology
See
SMART.
serial electrically
erasable
programmable ROM
See
SEEPROM.
Service Location
Protocol
See
SLP.
SES
SCSI Enclosure Services. The protocol that allows the initiator to communicate with the
enclosure using SCSI commands.
SFCB
Small Footprint CIM Broker.
SFF
Small form factor. A type of disk drive.
SHA
Secure Hash Algorithm. A cryptographic hash function.
SLP
Service Location Protocol. Enables computers and other devices to find services in a local
area network without prior configuration.
Small Footprint CIM
Broker
See
SFCB.
small form factor
See
SFF.