No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor 9000 V100R001C01 Planning Guide 07

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


An Ethernet specification that uses the twisted pair cable with the transmission speed as 1000 Mbit/s and the transmission distance as 100 meters.
See access control entry.
See Access Control List.
active directory
See Address Resolution Protocol.
Access Control List (ACL)
A list of entities, together with their access rights, which are authorized to access a resource.
Address Resolution Protocol (ARP)
An Internet Protocol used to map IP addresses to MAC addresses. The ARP protocol enables hosts and routers to determine link layer addresses through ARP requests and responses. The address resolution is a process by which the host converts the target IP address into a target MAC address before transmitting a frame. The basic function of ARP is to use the target equipment's IP address to query its MAC address.
access control entry (ACE)
A single entry in an Access Control List, which either denies or grants access to a given resource by one principal (a user or a group of users and/or groups).
A number that identifies the location of a device in a network or the location on the hard disk or the memory, such as the IPv4 address or IPv6 address of a network entity.
A user who has authority to access all EMLCore product management domains. This user has access to the entire network and all management functions.
See Common Internet File System.
command-line interface
See central processing unit.
"A collection of computers that are interconnected (typically at high speeds) for the purpose of improving reliability, availability, serviceability, load balancing and/or performance.Often, clustered computers have access to a common pool of storage, and run special software to coordinate the component computers' activities."
Common Internet File System (CIFS)
A network file system access protocol primarily used by Windows clients to communicate file access requests to Windows servers. CIFS was originally called Server Message Block (SMB). Today,other implementations of the CIFS protocol allow other clients and servers to use it for intercommunication and interoperation with Microsoft operating systems.
Free-standing and self-supporting enclosure for housing electrical and/or electronic equipment. It is usually fitted with doors and/or side panels which may or may not be removable.
central processing unit (CPU)
The computational and control unit of a computer. The CPU is the device that interprets and executes instructions. The CPU has the ability to fetch, decode, and execute instructions and to transfer information to and from other resources over the computer's main data-transfer path, the bus.
See domain name service.
data redundancy
A data protection technology that generates and stores redundant data when storing data. The redundant data can be used for data recovery. This technology enables users to take different reliability measures for different directories to improve system reliability and storage utilization. Users can classify their applications by reliability level and take appropriate protection measures for each classification.
data restoration
A method for retrieving data that is lost due to damage or misoperations.
domain name service (DNS)
A hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. The DNS distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain.
A LAN technology that uses the carrier sense multiple access with collision detection (CSMA/CD) media access control method. The Ethernet network is highly reliable and easy to maintain. The speed of an Ethernet interface can be 10 Mbit/s, 100 Mbit/s, 1000 Mbit/s, or 10,000 Mbit/s.
file share
Switchover of data between NFS, SMB, and HTTPS, which implements file transmission.
A security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet. Firewalls can be implemented in either hardware or software, or a combination of both.
group ID
graphical user interface
A device that receives data via one protocol and transmits it via another.
high-bandwidth node
A storage hardware component that meets demanding capacity and bandwidth requirements.
IP address
A 32-bit (4-byte) binary number that uniquely identifies a host connected to the Internet. An IP address is expressed in dotted decimal notation, consisting of the decimal values of its 4 bytes, separated with periods; for example, The first three bytes of the IP address identify the network to which the host is connected, and the last byte identifies the host itself.
See Intelligent Platform Management Interface.
A piece of load balancing software for client links. It uses unified domain name access, load balancing, and failover technologies to simplify the process of setting up a connection with a client, improving system performance and reliability.
A piece of automatic storage tiering software that enables policy-driven automatic file migration among multiple levels of storage nodes.
Intelligent Platform Management Interface (IPMI)
A specification, developed by Dell, HP, Intel and NEC, for the purpose of improving serviceability of servers. The IPMI provides servers with device management, sensor and event management, user management, fan box and power supply management, and remote maintenance.
See Lightweight Directory Access Protocol.
Lightweight Directory Access Protocol (LDAP)
A network protocol based on TCP/IP, which allows access to a directory system agent (DSA). It involves some reduced functionality from X.500 Directory Access Protocol (DAP) specifications.
load balancing
The distribution of activity across two or more servers or components in order to avoid overloading any one with too many requests or too much traffic.
See message digest algorithm 5.
message digest algorithm 5 (MD5)
A hash function that is used in a variety of security applications to check message integrity. MD5 processes a variable-length message into a fixed-length output of 128 bits. It breaks up an input message into 512-bit blocks (sixteen 32-bit little-endian integers). After a series of processing, the output consists of four 32-bit words, which are then cascaded into a 128-bit hash number.
Data that provides information about other data. Metadata describes the source, size, format, or other characteristics of data. In the data field, metadata helps to explain the content of a data warehouse.
Network Time Protocol
See non-volatile dual in-line memory module.
non-volatile dual in-line memory module (NVDIMM)
A type of dual in-line memory module. Such a memory module can save data within it upon a system power failure.
optical fiber
A thin filament of glass or other transparent material, through which a signal-encoded light beam may be transmitted using total internal reflection.
optical interface
A component that connects several transmit or receive units.
redundant array of independent disks
serial attached SCSI
See security function policy.
See Secure Shell.
See Secure Sockets Layer.
Secure Shell (SSH)
SSH is a set of network protocols for securing connections between computers, as well as the utility suite that implements these protocols.
Secure Sockets Layer (SSL)
A security protocol that works at a socket layer. This layer exists between the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities.
security function policy (SFP)
A security strategy adopted to implement the functions required by the security factors of the security subsystem of the network (SSON).
The maximum transmission rate of the tested object (system, equipment, connection, service type) when no packet is discarded. Throughput can be measured with bandwidth.
time zone
A division of the earth's surface, usually extending across 15° of longitude devised such that the standard time is the time at a meridian at the center of the zone.
user identity
virtual local area network
Updated: 2018-10-27

Document ID: EDOC1000042140

Views: 7884

Downloads: 122

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next