HP StorageWorks 300 HP StorageWorks 300 Virtual Library System user guide (AH1 - Page 174

serial ATA SATA, Outlook Express, FTP

Page 174 highlights

redundancy In a redundant system, if you lose part of the system, it can continue to operate. For example, if you have two power supplies with one that takes over if the other one dies, that's redundancy. secondary node A computer (node) that provides secondary administrating and control for backup and restore operations on a server cluster, and provides additional storage and multi-pathing capabilities on the system. When configuring the VLS300, designate the secondary node as such using the letter "s". On the VLS300, nodes 1-7 are secondary nodes. secure sockets layer (SSL) certificate A protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two. Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections. To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol. serial ATA (SATA) disk The evolution of the ATA (IDE) interface that changes the physical architecture from parallel to serial and from primary-secondary (master-slave) to point-to-point. Unlike parallel ATA interfaces that connect two drives; one configured as primary (master), the other as secondary (slave), each SATA drive is connected to its own interface. simple network management protocol (SNMP) A widely used network monitoring and control protocol. Data is passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network. The agents return information contained in a MIB (Management Information Base), which is a data structure that defines what is obtainable from the device and what can be controlled (turned off, on, etc.). small computer systems interface (SCSI) A standard, intelligent parallel interface for attaching peripheral devices to computers, based on a device independent protocol. storage area net- A centrally managed network that allows any-to-any interconnection of servers work (SAN) and storage systems. storage pool Multiple disk arrays logically grouped together from which the dynamic disk filesystem allocates storage. The disk arrays in a VLS are automatically configured into one storage array. tape drive (1) A device that reads data from and writes data onto tape. (2) A software emulation of a tape drive is called a virtual tape drive. virtual tape Also known as a piece of virtual media or a VLS cartridge. A disk drive buffer that emulates one physical tape to the host system and appears to the host backup application as a physical tape. The same application used to back up to tape is used, but the data is stored on disk. Data can be written to and read from the virtual tape, and the virtual tape can be migrated to physical tape. virtual tape drive An emulation of a physical transport in a virtual tape library that looks like a physical tape transport to the host backup application. The data written to the virtual tape drive is really being written to disk. See also virtual tape library. 174 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

redundancy
In a redundant system, if you lose part of the system, it can continue to operate.
For example, if you have two power supplies with one that takes over if the other
one dies, that’s redundancy.
secondary node
A computer (node) that provides secondary administrating and control for
backup and restore operations on a server cluster, and provides additional
storage and multi-pathing capabilities on the system. When con
guring the
VLS300, designate the secondary node as such using the letter “s”. On the
VLS300, nodes 1–7 are secondary nodes.
secure sockets
layer (SSL) certi
-
cate
A protocol designed to enable applications to transmit information back and
forth securely. Applications that use this protocol inherently know how to give
and receive encryption keys with other applications, as well as how to encrypt
and decrypt data sent between the two.
Some applications that are con
gured to run SSL include web browsers like
Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and
Outlook Express, FTP (
le transfer protocol) programs, etc. These programs are
automatically able to receive SSL connections.
To send an SSL connection, however, or to open a secure connection, your
application must
rst have an encryption key assigned to it by a Certi
cation
Authority. Once it has a unique key of its own, you can establish a secure
connection with every other application that can "speak" the SSL protocol.
serial ATA (SATA)
disk
The evolution of the ATA (IDE) interface that changes the physical architecture
from parallel to serial and from primary-secondary (master-slave) to
point-to-point. Unlike parallel ATA interfaces that connect two drives; one
con
gured as primary (master), the other as secondary (slave), each SATA
drive is connected to its own interface.
simple network
management pro-
tocol (SNMP)
A widely used network monitoring and control protocol. Data is passed from
SNMP agents, which are hardware and/or software processes reporting activity
in each network device (hub, router, bridge, etc.) to the workstation console
used to oversee the network. The agents return information contained in a MIB
(Management Information Base), which is a data structure that de
nes what is
obtainable from the device and what can be controlled (turned off, on, etc.).
small computer
systems interface
(SCSI)
A standard, intelligent parallel interface for attaching peripheral devices to
computers, based on a device independent protocol.
storage area net-
work (SAN)
A centrally managed network that allows any-to-any interconnection of servers
and storage systems.
storage pool
Multiple disk arrays logically grouped together from which the dynamic
disk
lesystem allocates storage. The disk arrays in a VLS are automatically
con
gured into one storage array.
tape drive
(1) A device that reads data from and writes data onto tape.
(2) A software emulation of a tape drive is called a virtual tape drive.
virtual tape
Also known as a piece of virtual media or a VLS cartridge. A disk drive buffer
that emulates one physical tape to the host system and appears to the host
backup application as a physical tape. The same application used to back up
to tape is used, but the data is stored on disk.
Data can be written to and read from the virtual tape, and the virtual tape can
be migrated to physical tape.
virtual tape drive
An emulation of a physical transport in a virtual tape library that looks like a
physical tape transport to the host backup application. The data written to the
virtual tape drive is really being written to disk.
See also
virtual tape library.
174
Glossary