HP StorageWorks 6000-series Virtual Library System User Guide (AH809-96049, September 2010)

RAID6-level data
storage
A RAID that provides data striping at the byte level and also stripe error correction
information. RAID6 configurations can tolerate two drive failures. Even with two
failed drives, the data in a RAID6 volume can still be accessed normally. RAID6
read performance is similar to RAID5, since all drives can service read operations,
but the write performance is lower than that of RAID5 because the parity data
must be updated on multiple drives.
redundancy In a redundant system, if you lose part of the system, it can continue to operate.
For example, if you have two power supplies with one that takes over if the other
one dies, that's redundancy.
replication The process of writing data to virtual tape, and after the backups are complete,
writing the data to another virtual tape, known as the replication target, over the
LAN/WAN. Similar to automigration.
SSL certificate Secure Sockets Layer certificate. A protocol designed to enable applications to
transmit information back and forth securely. Applications that use this protocol
inherently know how to give and receive encryption keys with other applications,
as well as how to encrypt and decrypt data sent between the two.
Some applications that are configured to run SSL include web browsers like
Internet Explorer and Netscape, mail programs like GroupWise, Outlook, and
Outlook Express, FTP (file transfer protocol) programs, etc. These programs are
automatically able to receive SSL connections.
To send an SSL connection, however, or to open a secure connection, your
application must first have an encryption key assigned to it by a Certification
Authority. Once it has a unique key of its own, you can establish a secure
connection with every other application that can "speak" the SSL protocol.
SATA Serial Advanced Technology Attachment.
SCSI Small Computer Systems Interface. A standard, intelligent parallel interface for
attaching peripheral devices to computers, based on a device-independent
protocol.
SNMP Simple Network Management Protocol. A widely used network monitoring and
control protocol. Data is passed from SNMP agents, which are hardware and/or
software processes reporting activity in each network device (hub, router, bridge,
and so on) to the workstation console used to oversee the network. The agents
return information contained in a MIB (Management Information Base), which
is a data structure that defines what is obtainable from the device and what can
be controlled (turned off, on, and so on).
smart copy A software feature within the automigration process that is under the control of
the backup application and managed via the VLS device's SMI-S interface. This
requires the backup application to support the HP smart copy interface. (Smart
copy is similar to snapshot.)
SMI-S Allows control of the virtual tape library by a connected destination library for
the purpose of implementing automigration. SMI-S support allows applications
attached to the VLS to detect the virtual library configuration and to allow some
users to change the state of the VLS.
SAN Storage area network. A network of storage devices available to one or more
servers.
Glossary344