beautypg.com

HP 8.20q Fibre Channel Switch User Manual

Page 152

background image

152

stack

A set of up to six switches interconnected through one or more of the four XPAK 10Gb ports.

The stack can be managed as though it were a single switch.

target

The storage-device endpoint of a SCSI session. Initiators request data from targets. Targets are

typically disk-drives, tape-drives, or other media devices. Typically a SCSI peripheral device is

the target, but a host bus adapter may, in some cases, be a target. A target can contain many

LUNs.
A target is a device that responds to a requested by an initiator (the host system). Peripherals

are targets, but for some commands (for example, a SCSI COPY command), the peripheral

may act as an initiator.

target binding

The process in which the HBA driver binds a target ID using a target’s world wide port name

(WWPN) or port ID. This enables the target ID to always connect to the WWPN or port ID

across reboots regardless of SAN reconfigurations.

topology

The collection of components that connect ports. Topologies are also shorthand descriptions of

the physical layouts, or shapes, of networks. A topology defines different aspects of device

connection or configuration—including the kinds of devices that can be configured, the number

of devices, and the way they can be configured. SAN Connection Manager enables you to

save and compare topologies.

Transparent Router

(TR)

Transparent Router provides inter-fabric routing to allow controlled and limited access between

devices on a switch (local) fabric and devices on a remote fabric of other vendor switches.

VC

Virtual Connect

VC-FC

Virtual Connect-Fibre Channel

Virtual Connect

Enterprise Manager

(VCEM)

VCEM centralizes connection management and workload mobility for HP BladeSystem servers

that use Virtual Connect to access LANs, SANs, and converged network infrastructures.

VDS

Virtual Disk Service (VDS) is a set of application programming interfaces (APIs) that provides a

single interface for managing disks. VDS provides an end-to-end solution for managing storage

hardware and disks, and for creating volumes on those disks.

Vraid0

A virtualization technique for EVA storage that provides no data protection. Data host is broken

down into chunks and distributed on the disks comprising the disk group from which the virtual

disk was created. Reading and writing to a Vraid0 virtual disk is very fast and makes the fullest

use of the available storage, but there is no data protection (redundancy) unless there is parity.

Vraid1

A virtualization technique for EVA storage that provides the highest level of data protection. All

data blocks are mirrored or written twice on separate physical disks. For read requests, the

block can be read from either disk, which can increase performance. Mirroring takes the most

storage space because twice the storage capacity must be allocated for a given amount of

data.

Vraid5

A virtualization technique for EVA storage that uses parity striping to provide moderate data

protection. Parity is a data protection mechanism for a striped virtual disk. A striped virtual disk

is one where the data to and from the host is broken down into chunks and distributed on the

physical disks comprising the disk group in which the virtual disk was created. If the striped

virtual disk has parity, another chunk (a parity chunk) is calculated from the set of data chunks

and written to the physical disks. If one of the data chunks becomes corrupted, the data can be

reconstructed from the parity chunk and the remaining data chunks.

This manual is related to the following products: