HP 8.20q Fibre Channel Switch User Manual
Page 152
152
stack
A set of up to six switches interconnected through one or more of the four XPAK 10Gb ports.
The stack can be managed as though it were a single switch.
target
The storage-device endpoint of a SCSI session. Initiators request data from targets. Targets are
typically disk-drives, tape-drives, or other media devices. Typically a SCSI peripheral device is
the target, but a host bus adapter may, in some cases, be a target. A target can contain many
LUNs.
A target is a device that responds to a requested by an initiator (the host system). Peripherals
are targets, but for some commands (for example, a SCSI COPY command), the peripheral
may act as an initiator.
target binding
The process in which the HBA driver binds a target ID using a target’s world wide port name
(WWPN) or port ID. This enables the target ID to always connect to the WWPN or port ID
across reboots regardless of SAN reconfigurations.
topology
The collection of components that connect ports. Topologies are also shorthand descriptions of
the physical layouts, or shapes, of networks. A topology defines different aspects of device
connection or configuration—including the kinds of devices that can be configured, the number
of devices, and the way they can be configured. SAN Connection Manager enables you to
save and compare topologies.
Transparent Router
(TR)
Transparent Router provides inter-fabric routing to allow controlled and limited access between
devices on a switch (local) fabric and devices on a remote fabric of other vendor switches.
VC
Virtual Connect
VC-FC
Virtual Connect-Fibre Channel
Virtual Connect
Enterprise Manager
(VCEM)
VCEM centralizes connection management and workload mobility for HP BladeSystem servers
that use Virtual Connect to access LANs, SANs, and converged network infrastructures.
VDS
Virtual Disk Service (VDS) is a set of application programming interfaces (APIs) that provides a
single interface for managing disks. VDS provides an end-to-end solution for managing storage
hardware and disks, and for creating volumes on those disks.
Vraid0
A virtualization technique for EVA storage that provides no data protection. Data host is broken
down into chunks and distributed on the disks comprising the disk group from which the virtual
disk was created. Reading and writing to a Vraid0 virtual disk is very fast and makes the fullest
use of the available storage, but there is no data protection (redundancy) unless there is parity.
Vraid1
A virtualization technique for EVA storage that provides the highest level of data protection. All
data blocks are mirrored or written twice on separate physical disks. For read requests, the
block can be read from either disk, which can increase performance. Mirroring takes the most
storage space because twice the storage capacity must be allocated for a given amount of
data.
Vraid5
A virtualization technique for EVA storage that uses parity striping to provide moderate data
protection. Parity is a data protection mechanism for a striped virtual disk. A striped virtual disk
is one where the data to and from the host is broken down into chunks and distributed on the
physical disks comprising the disk group in which the virtual disk was created. If the striped
virtual disk has parity, another chunk (a parity chunk) is calculated from the set of data chunks
and written to the physical disks. If one of the data chunks becomes corrupted, the data can be
reconstructed from the parity chunk and the remaining data chunks.