No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor UltraPath for vSphere V100R008C50 User Guide 06

This document covers the functions, features, installation, configuration, upgrade, uninstallation, maintenance, troubleshooting, and FAQs of OceanStor UltraPath for vSphere (UltraPath forvSphere). UltraPath for vSphere is the multipathing software developed by HuaweiTechnologies Co., Ltd (Huawei for short). The document aims at helping users to be fully familiar with UltraPath for vSphere and its use.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).




AC power module

The module that transfers the external AC power supply into the power supply for internal use.

Application server

A service processing node (a computer device) in the network. Application programs of data services are run on the application server.

Asynchronous remote replication

A kind of remote replication. When the data on the primary site is updated, the data does not need to be updated on the mirroring site synchronously to finish the update. In this way, performance is not reduced due to data mirroring.





A periodic operation performed on the data stored in the database for the purposes of database recovery in case that the database is faulty. The backup also refers to data synchronization between active and standby boards.


A range of transmission frequencies a transmission line or channel can carry in a network. In fact, the bandwidth is the difference between the highest and lowest frequencies in the transmission line or channel. The greater the bandwidth, the faster the data transfer rate.

Baud rate

The number of times per second the signal can change on a transmission line. Commonly, the transmission line uses only two signal states, making the baud rate equal to the number of bits per second that can be transferred. The underlying transmission technique may use some of the bandwidth, so it may not be the case that user data transfers at the line's specified bit rate.

Bit error

An incompatibility between a bit in a transmitted digital signal and the corresponding bit in the received digital signal.

Bit error rate

Ratio of received bits that contain errors. BER is an important index used to measure the communications quality of a network.


Bonding can bind multiple independent physical network ports into a logical port, which ensures the high availability of server network connections and improving network performance.




Cache hit ratio

The ratio of directly accessed I/O from Cache to all the I/O operation during the read operation.

Cache prefetch strategy

According to the operation in which data has been read or is being read, the required data is read from a disk into the cache in advance.

Captive Screw

After the screw is loosened, screw caps and bolts are not disconnected from the main body.


A method to periodically verify the identity of the peer using a 3-way handshake. During the establishment of a link, the authenticator sends a "challenge" message to the peer. The peer responds with a value calculated using a "one-way hash" function. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged. CHAP provides protection against playback attack.


A snapshot technology. The source data is completely copied to generate a data duplicate; therefore the duplicate needs the storage space as the same size as the source data. It is also called clone. In the VIS system, it is also called third-mirror break-off snapshot.


A mechanism adopted to improve the system performance. Several devices of the same type form a cluster. The exterior of a cluster is some like a kind of equipment. In the interior of a cluster, the nodes share the load.


A technology for ensuring data security and integrity in a storage system. It is used to store the mission-critical data of the system.

Coffer disk

Disks that build up the coffer.

Command device

A special LUN through which the host can send inband commands to storage devices.

Constant prefetch

A cache prefetch strategy. The size of the data to be prefetched is the size as set. This strategy applies to the applications that require reading data of a fixed size in a certain order. An example is the streaming media demanded by multiple subscribers who use the same bit rate.


The core module that processes services in a storage system. It contains physical components such as system-level CPUs and memory.

Controller enclosure

An enclosure that accommodates controllers and provides storage services. It is the core component of a storage system, and generally consists of components such as controllers, power supplies, and fans.


A state of pair. The state indicates that the source LUN data is being synchronized to the target LUN.

Coordinator Point Server

A server can provide the arbitration service. The server can provide arbitration service for cluster system or HyperCluster, to avoid resource conflict access from different application servers.

Continued Mirror

After storage controller became fault, a method of data in the LUN to write mirror into other storage controller, while ensure data integrity and uninterrupted operation host services.



Data compression

Encoding data to take up less storage space and less bandwidth for transmission.

Data deduplication

A specialized data compression technique for eliminating coarse-grained redundant data, typically to improve storage utilization. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored, along with references to the unique copy of data. Deduplication is able to reduce the required storage capacity since only the unique data is stored.

Data flow

A process that involves processing the data extracted from the source system, such as filtering, integration, calculation, and summary, finding and solving data inconsistency, and deleting invalid data so that the processed data meets the requirements of the destination system for the input data.

Data migration

It is the process to cleanse and transform history data, and then load them to the new system.

Data source

A system, database, or file that can make BOs persistent. A data source can be a database instance or a database user.

Data switch

A data switch used for interconnections between controllers.

Dirty data

The data that is stored temporarily on cache and has not been written onto disks.

Disaster recovery

A system deployment solution aiming at reducing loss in disasters. A set of disaster recovery system that is the same as the production system is deployed as a backup to store the production data when a fault occurs in the production system. The applications are switched over to the disaster recovery system before the production system recovers. After the production system recovers, the applications are switched back to the production system.

Disk array

A set of disks from one or more commonly accessible disk subsystem. These disks are combined and controlled by the control software. The control software provides the storage capacity of these disks for hosts as one or more virtual disks.

Disk Domain

A combination of disks. A disk domain consists of the same type or different types of disks. Disk domains are isolated from each other. Therefore, services carried by different disk domains do not affect each other in terms of performance and faults (if any).

Disk location

The process of locating a hard disk, that is, determining the enclosure ID and slot ID of the hard disk in the storage system.

Disk enclosure

It consists of the following parts in redundancy: expansion module, hard disk, power module, and fan module. System capacity can be expanded by cascading multiple disk enclosures.

Disk utilization

The percentage of used capacity in the total available capacity.




eDevLUN (external device LUN)

Logic space created by third-party storage systems.


Two controllers in one enclosure are called Engine.


Connecting a storage system to more disk enclosures through connection cables, thus expanding the capacity of the storage system.

Expander module

A component used for expanding.





The automatic substitution of a functionally equivalent system component for a failed one. The term failover is most often applied to intelligent controllers connected to the same storage devices and host computers. If one of the controllers fails, failover occurs, and the survivor takes over its I/O load.

Field replaceable unit

A unit that can function as a circuit board, part, or component of an electronic device. It can be quickly and easily removed from a personal computer or other electronic devices. If an FRU becomes faulty, users can replace it with a new one instead of sending the entire product or system for maintenance.

File Engine

The component in a unified storage systems that provides file-level service.


The programmable software part in a hardware component. A firmware is a part of hardware, but is scalable as software.

Front-end host port

The port that connects the controller enclosure to the service side and transfers service data. There are three types of front-end host ports: SAS, FC, and iSCSI.





A device that connects two network segments using different protocols. It is used to translate the data in the two network segments.

Global system for mobile communications

The second-generation mobile networking standard defined by European Telecommunications Standards Institute (ETSI). It is aimed at designing a standard for global mobile phone networks. The standard allows a subscriber to use a phone globally. GSM consists of three main parts: mobile switching subsystem (MSS), base station subsystem (BSS), and mobile station (MS).




Hard disk

A non-volatile storage device that stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Hard disks generally offer more storage and quicker access to data than floppy disks do.

Hard disk tray

The tray that bears the hard disk.

Hard quota

The value to limit the space used in quota configuration. If the space used arrives hard quota, file operation is not allowed to continue.


Heartbeats are the packets, requiring no acknowledgement, transmitted between two devices. The device can judge the validity status of the peer device. Heartbeat supports node communication, fault diagnosis, and event triggering.

Hit ratio

The ratio of directly accessed I/Os from cache to all I/Os.

Hot swap

A technology used to replace system components without shutting down the system, which improves the reliability and maintainability of a system.


A self-protective property of the data built in storage device.


A value-added service of storage system. The HyperCluster refers to provide storage services with two datasets on two storage array as one dataset, to achieve the applications load balancing and transferring without interruption when there is a fault.





Data movement process between memory and peripheral devices in the computer system. I/O is a collective name, indicating the operations reading data into the memory and writing data to other places from computer memory.

Inband management

Inband management means that the management control information of the network and the carrier service information of the user network are transferred through the same logical channel. Inband management enables users to manage storage arrays through commands. Management commands are sent through service channels, that is, I/O write and read channels. The advantages of inband management include high speed, stable transfer, and no additional management network ports required.


A system component that can initiate an I/O operation on an I/O bus or on a network.

Intelligent prefetch

A cache prefetch strategy. The system software calculates a proper size of prefetched data. This strategy applies to a read application involving a single bit stream or to the situations where you do not know whether the data is read in a certain order. An example is reading or writing a file.

Interface module

A field replaceable module that accommodates the service or management ports.




Load balance

A method of adjusting the system, application components and data to averagely distribute the applied I/O or computing requests for physical resources of the system.

Load the file system in mini mode

A method of restoring the user data in an offline file system.

Logical unit

The entity is located inside the SCSI object, and can execute I/O commands. After a SCSI I/O command is sent to an object, the logic unit inside the object executes this command. Usually, each SCSI physical disk has one logic unit. A tape drive and array controller may have multiple logic units, which process different I/O commands. Each logic unit inside an array controller corresponds to a virtual disk.

Logical unit number

The number of a logical disk that the host can access.

LUN formating

The process of writing 0 bits in the data area on the logical drive and generating related parity bits so that the logical drive can be in the ready state.

LUN mapping

The storage system maps LUNs to ASs so that the ASs can access the storage reorganization.

LUN migration

A method for the data in the LUN to migrate between different physical storage space while ensuring data integrity and uninterrupted operation host services.

LUN copy

The function of copying the original LUN data to one or multiple target LUNs.




Maintenance terminal

The computer that is connected through a serial port or management network port and maintains the storage system.

Management network

An entity that provides a means to transmit and process the information related to network management.

Management network port

The network port on the controller enclosure that is connected to the maintenance terminal. It is provided for the remote maintenance terminal.





A managed device in the network. For a device with a single frame, one node stands for one device. For a device with multiple frames, one node stands for one frame of the device.




Out-of-band management

A management mode used during out-of-band networking. In the out-of-band management mode, the management and control information of the network and the bearer service information of the user network are transmitted through different logical channels.

Owning controller of a LUN

The controller that can prior access a certain LUN.

Owning controller

The controller that can prior access a certain LUN or file system in an array.




Power failure protection

When the external power failure occurs, the AC PEM depends on the battery for power supply, which ensures the integrity of the dirty data in cache.


When the system monitors that a member disk in a RAID group is to fail, the system copies the data on the disk to a hot spare disk in advance. This technology is called pre-copy.

Primary backup

A kind of backup mode for file system, means that create a copy (snapshot) for filesystem.

Primary restore

A kind of restore mode for file system, means that restore a copy (snapshot) to filesystem.

Primary storage controller

The controller that plays a leading role in controlling the management is the primary storage controller. It can perform relevant management operations on the controller enclosure.

Primary/Secondary switchover

A process for the conversion of the primary/secondary relationship.

Prior controller

For the application server LUN, prior controller means that the working controller is the owner controller of the corresponding array LUN.



Quota tree

A first-level directory of file system that can be managed with quota.




RAID level

The application of different redundant types to a logical drive. A RAID level improves the fault tolerance or performance of the logical drive but reduces the available capacity of the logical drive. You must specify a RAID level for each logical drive.


The process of restoring the data saved on a faulty member disk in a RAID group.


The scheme to add more than one channels, elements or parts that have the same functions with the counterparts in the system or device at a critical place. When a fault occurs, the system or device can work well, and the reliability is then improved.

Remote replication

A core technology for disaster recovery and a foundation that implements remote data synchronization and disaster recovery. This technology remotely maintains a set of data mirror through the remote data connection function of the storage devices that are separated in different places. Even when a disaster occurs, the data backup on the remote storage device is not affected. Remote replication can be divided into synchronous remote replication and asynchronous remote replication by whether the host that requires mirrors needs the confirmation information of the remote replication site.

Reverse synchronizing

The process of restoring data from the redundancy machine (RM) when the services of the production machine (PM) are recovering.


The path that network traffic takes from its source to its destination. In a TCP/IP network, each IP packet is routed independently. Routes can change dynamically.





A collection of data statements used to perform an operation.

Secondary backup

A kind of backup mode for file system, means that backup the data of the primary file system to the remote file system on the secondary array.

Secondary restore

A kind of restore mode for file system, means that restore the data of the secondary file system to the primary file system on the secondary array.

Secondary controller

(1) A controller that backs up service and management data of the primary controller in a clustered system. When the primary controller fails, the secondary controller is upgraded to the primary controller and takes over the management and services of the controller enclosure. (2) A controller that backs up the management data of the primary controller in a block-level array. When the primary controller fails, the secondary controller is upgraded to the primary controller and takes over the management of the system.

Serial port

An input/output location (channel) that sends and receives data to and from a computer's CPU or a communications device one bit at a time. Serial ports are used for serial data communication and as interfaces with some peripheral devices, such as mice and printers.

Service data

The user and/or network information required for the normal functioning of services.

Service network port

The network port that is used to store services.

SFP optical transceiver

A component that can make data conversion between optical signals and electrical signals and that can receive and transfer data.

Simple network management protocol

A network management protocol of TCP/IP. It enables remote users to view and modify the management information of a network element. This protocol ensures the transmission of management information between any two points. The polling mechanism is adopted to provide basic function sets. According to SNMP, agents, which can be hardware as well as software, can monitor the activities of various devices on the network and report these activities to the network console workstation. Control information about each device is maintained by a management information block.

Single point of failure

A type of failure. Data transmission over a network is stopped and cannot be recovered automatically if a single point failure occurs. The point can be an interface, a board, a device, or a link.

Small computer system interface

A set of standards for physically connecting and transferring data between computers and peripheral devices. SCSI is most commonly used for hard disks and tape drives, but it can connect a wide range of other devices, including scanners, and optical drive.

Smart tenancy

A feature of Huawei storage system. With Smart Tenancy, multiple virtual storage systems can be created in one physical storage system, which allows tenants to share the same storage system hardware resource without affecting data security and privacy of each other. This feature achieves more flexible, easy-to-manage and low-cost shared storage in a multi-protocol unified storage architecture.


A data backup technology through which a fully usable copy of a data object can be quickly generated. The duplicate contains the image of the data object at a point in time.

Snapshot copy

A copy of the snapshot LUN, which is also a snapshot LUN.

Soft quota

The value to alarm space usage in quota configuration. After used space arrives this value, an alarm triggered; if space used from above this value becomes lower than, the previous alarm eliminated.

Source LUN

The LUN where the original data is located.

Storage Pool Shrinking

A method of shrinking the total capacity of Storage Pool.

Storage system

An integrated system. It consists of the following parts: controller, storage array, host bus adapter, physical connection between storage units, and all control software.

Storage unit

An abstract definition of backup storage media for storing backup data. The storage unit is connected with actual storage media, used to back up data.

Streaming media

The media by which content is transmitted continuously with the streaming method in real time. Streaming media ensure high-quality playback effects at low bandwidth by integrating with the following technologies: data collection, data compression, encoding, storage, transmission, terminal playback, and network communication.


The set of strips at corresponding locations of each member extent of a disk array which uses striped data mapping. The strips in a stripe are associated with each other in a way (e.g., relative extent block addresses) that allows membership in the stripe to be quickly and uniquely determined by a computational algorithm. Parity RAID uses stripes to map virtual disk block addresses to member extent block addresses.


A type of smaller networks that form a larger network according to a rule, for example, according to different districts. This facilitates the management of the large network.

Subnet mask

The technique used by the IP protocol to determine which network segment packets are destined for. The subnet mask is a binary pattern that is stored in the device and is matched with the IP address.

Synchronous remote replication

A kind of remote replication. When the data on the primary site is updated, the data must be synchronously updated on the mirroring site before the update is complete. In this way, the data that is stored on both the primary and mirroring sites can be synchronized.





A system component that can receive SCSI I/O operation commands.

Target LUN

The LUN on which target data resides.


A property of SmartTenancy, which represents a virtual storage system in a physical one. The private and independent logical resource of a tenant mainly includes disk domain space, LUN, file system and ports. Tenants get complete storage services, but also remain resource and network isolation with other tenants, which avoids interference.

Thin provisioning

A mechanism that offers on-demand allocation of storage space.

Thin LUN

The thin LUN is a logic disk that can be accessed by hosts. The thin LUN dynamically allocates storage resources from the thin pool according to the actual capacity requirements of users.

Timing Snapshot

To create snapshots periodically to continuously protect data.


The configuration or layout of a network formed by the connections between devices on a local area network (LAN) or between two or more LANs.




User datagram protocol

A TCP/IP standard protocol that allows an application program on one device to send a datagram to an application program on another. User Datagram Protocol (UDP) uses IP to deliver datagram. UDP provides application programs with the unreliable connectionless packet delivery service. There is a possibility that UDP messages will be lost, duplicated, delayed, or delivered out of order. The destination device does not confirm whether a data packet is received.

User interface

The space in which users interact with a machine.




Variable prefetch

A cache prefetch strategy. The size of the data to be prefetched is the multiple for prefetching multiplied by the length of a read command.

This strategy applies to the applications that require reading data of variable size in a certain order or to the situations where multiple subscribers read data concurrently but no fixed prefetch size can be set, because the amount of pre-read data cannot be judged. An example is the streaming media demanded by multiple subscribers who use different bit rates.


A property of SmartTenancy. In Huawei SmartTenancy, a tenant is called a vStore, which represents a virtual storage system.




Working controller

The controller that reads data from and writes data onto LUNs or file systems in a storage array.

Write back

A caching technology in which the completion of a write request is signaled as soon as the data is in cache, and actual writing to non-volatile media occurs at a later time. Write back includes an inherent risk that an application will take some action predicated on the write completion signal, and a system failure before the data is written to non-volatile media will cause media contents to be inconsistent with that subsequent action. For this reason, good write back implementations include mechanisms to preserve cache contents across system failures (including power failures) and to flush the cache at system restart time.

Write through

A caching technology in which the completion of a write request is not signaled until data is safely stored on non-volatile media. Write performance with the write through technology is approximately that of a non-cached system, but if the data written is also held in cache, subsequent read performance may be dramatically improved.





A Fibre Channel switch function that is similar to the VLAN function for Ethernet switches. It logically allocates the devices including hosts and storage systems on a SAN to different zones. In this way, the devices in different zones cannot directly access each other over a Fibre Channel network, implementing device isolation on the SAN.

Updated: 2019-03-06

Document ID: EDOC1000105152

Views: 42336

Downloads: 783

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next