No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor 9000 V5 7.0.0 SystemReporter User Guide

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


An Ethernet specification that uses the twisted pair cable with the transmission speed as 1000 Mbit/s and the transmission distance as 100 meters.
See Authentication, Authorization and Accounting.
See access control entry.
See Access Control List.
active directory
See Advanced Encryption Standard.
See access key ID.
American National Standards Institute
See Address Resolution Protocol.
See Anti-Virus Agent.
Access Control List (ACL)
A list of entities, together with their access rights, which are authorized to access a resource.
Address Resolution Protocol (ARP)
An Internet Protocol used to map IP addresses to MAC addresses. The ARP protocol enables hosts and routers to determine link layer addresses through ARP requests and responses. The address resolution is a process by which the host converts the target IP address into a target MAC address before transmitting a frame. The basic function of ARP is to use the target equipment's IP address to query its MAC address.
Advanced Encryption Standard (AES)
The AES algorithm is a symmetric grouped password algorithm and one of the most popular symmetric key encription algorithm released by the U.S. National Institute of Standards and Technology (NIST) on November 26, 2001. It is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST). It supersedes the Data Encryption Standard (DES). AES adopts a symmetric-key algorithm for both encrypting and decrypting the data, where the block size is 128 bits and the key size is 128 bits, 192 bits, or 256 bits.
Anti-Virus Agent (AV-Agent)
An agent program installed on the anti-virus server and used to trigger anti-virus software when receiving the anti-virus requests.
Authentication, Authorization and Accounting (AAA)
A mechanism for configuring authentication, authorization, and accounting security services. Authentication refers to the verification of user identities and the related network services; authorization refers to the granting of network services to users according to authentication results; and accounting refers to the tracking of the consumption of network services by users.
access control entry (ACE)
A single entry in an Access Control List, which either denies or grants access to a given resource by one principal (a user or a group of users and/or groups).
access key ID (AK)
An ID that confirms the identity of a user accessing the object-based storage system. One access key ID belongs to only one user, but one user can have multiple access key IDs. The object-based storage system recognizes the users accessing the system by their access key IDs.
A user who has authority to access all EMLCore product management domains. This user has access to the entire network and all management functions.
A module protecting files in storage through third-party anti-virus software.
See basic input/output system.
See Background Job Scheduling.
Background Job Scheduling (BJS)
A background job can be divided into multiple independent subjobs. Each subjob consists of input, processing, and output, and can be scheduled to multiple nodes for concurrent processing.
back-end storage network
In system networking, the network that interconnects storage servers for data interaction is called the back-end storage network.
background job
A job that operates without interaction with the user. Usually, its operation will not affect other jobs. In a distributed system, one background job is assigned to as many nodes as possible for concurrent processing to improve the processing efficiency. Generally, background jobs are asynchronous jobs that do not have a demanding requirement on real-time capability, for example, data consistency verification.
basic input/output system (BIOS)
Firmware stored on the computer motherboard that contains basic input/output control programs, power-on self test (POST) programs, bootstraps, and system setting information. The BIOS provides hardware setting and control functions for the computer.
A container used to store objects. A bucket name must be unique.
See Common Internet File System.
common information model
command-line interface
See cross-origin resource sharing.
See central processing unit.
Capacity node
C nodes apply to Capacity and high-throughput.
Common Internet File System (CIFS)
A network file system access protocol primarily used by Windows clients to communicate file access requests to Windows servers. CIFS was originally called Server Message Block (SMB). Today,other implementations of the CIFS protocol allow other clients and servers to use it for intercommunication and interoperation with Microsoft operating systems.
Consistent Handoff
A data protection mechanism that effectively protects data when a node or disk fails.
Cross-Domain Policy File
A cross-domain policy file allows web pages hosted elsewhere to use client side technologies such as Flash, Java and Silverlight to interact with the Swift API.
cable tie
A tie used to bind cables.
capacity forecasting
A function that estimates future capacity use of a user based on the historical capacity use of the user and provides corresponding advice. This function helps users better estimate and plan capacity management and capacity expansion.
central processing unit (CPU)
The computational and control unit of a computer. The CPU is the device that interprets and executes instructions. The CPU has the ability to fetch, decode, and execute instructions and to transfer information to and from other resources over the computer's main data-transfer path, the bus.
Defines a namespace for objects.
cross-origin resource sharing (CORS)
CORS is a mechanism allowing the resources such as html/js/web service in the current domain to be accessed by other domains after receiving such access requests.
See Dynamic Host Configuration Protocol.
See Dynamic Large Object.
See domain name service.
Disk Defrag
A technology that frees disk space and improves disk performance by clearing disk fragments accumulated in a file system after the file system has been running for a long time.
Dynamic Host Configuration Protocol (DHCP)
A client-server networking protocol. A DHCP server provides configuration parameters specific to the DHCP client host requesting information the host requires to participate on the Internet network. DHCP also provides a mechanism for allocating IP addresses to hosts.
Dynamic Large Object (DLO)
All the object segments need to be in the same container, have a common object name prefix, and sort in the order in which they should be concatenated. Object names are sorted lexicographically as UTF-8 byte strings.
data redundancy
A data protection technology that generates and stores redundant data when storing data. The redundant data can be used for data recovery. This technology enables users to take different reliability measures for different directories to improve system reliability and storage utilization. Users can classify their applications by reliability level and take appropriate protection measures for each classification.
data restoration
A method for retrieving data that is lost due to damage or misoperations.
data scrub
A non-disruptive feature that proactively checks data in the system in the background for errors on hard disks.
data transfer quota
A threshold that limits the amount of data traffic users can use in a specified period.
Deduplication is a specialized data compression technique for eliminating coarse-grained redundant data, typically to improve storage utilization. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored, along with references to the unique copy of data. Deduplication is able to reduce the required storage capacity since only the unique data is stored.
directory service
A type of object-based storage service providing file system-semantics-like HTTP access ports to facilitate upper-layer application development.
domain name service (DNS)
A hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. The DNS distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain.
To obtain data from an upper-layer device or the server.
In an access network, the direction of transmission toward the subscriber end of the link.A direction of message forwarding within a transaction that refers to the direction that requests flow from the user agent client to user agent server.
See electromagnetic compatibility.
Emotion user interface
See equipment serial number.
A LAN technology that uses the carrier sense multiple access with collision detection (CSMA/CD) media access control method. The Ethernet network is highly reliable and easy to maintain. The speed of an Ethernet interface can be 10 Mbit/s, 100 Mbit/s, 1000 Mbit/s, or 10,000 Mbit/s.
A Huawei's next-generation ICT O&M system for the enterprise market and the first cross-field and cross-vendor ICT O&M system of Huawei Enterprise BG. It is designed to centrally manage storage devices, servers, routers, switches, firewalls, WLANs, unified communication, telepresence conferences, and video surveillance. In addition, it is capable of managing a wide range of devices from other vendors.
electromagnetic compatibility (EMC)
A condition which prevails when telecommunications equipment is performing its individually designed function in a common electromagnetic environment without causing or suffering unacceptable degradation due to unintentional electromagnetic interference to or from other equipment in the same environment.
A function used to transform data so as to hide its information content to prevent it's unauthorized use.
engineering label
A mark on a cable, a subrack, or a cabinet for identification.
equipment serial number (ESN)
A string of characters that identify a piece of equipment and ensures correct allocation of a license file to the specified equipment. It is also called "equipment fingerprint".
Federal Communications Commission
fast Ethernet
File Transfer Protocol
file fingerprint
A 128-bit file information summary. To prevent file tampering and damage during transfer, file fingerprints are used to verify data integrity and consistency.
floating IP address
An IP address that a high availability (HA) system uses to communicate with the external system. The active server and standby server have separate IP addresses. For example, the IP address of the active server is IP1 and the IP address of the standby server is IP2. When communicating with the external client, the active or standby server uses IP3, and IP3 is bound to the network adapter of the active server. At this time, the active server has two IP addresses, namely IP1 and IP3. The standby server has only IP2, therefore, it does not provide services to the external client. When an active/standby switchover occurs, the active server releases IP3, and IP3 is bound to the network adapter of the standby server. This is called floating.
front-end service network
In system networking, the network that connects to the customer's service network for data interaction is called the front-end service network.
Gigabit Ethernet
group ID
graphical user interface
global cache
A cache management function that consolidates caches of all nodes in the cluster into a global cache. It makes data cached on any node directly accessible to the other nodes.
ground terminal
A connection terminal on a communication device. It is used to connect the device with ground cables, maintaining a tight connection between the device and the grounding electrode.
See high availability.
hard disk drive
See Hypertext Transfer Protocol Secure.
Hypertext Transfer Protocol Secure (HTTPS)
An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL) for secured transactions. It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data.
high availability (HA)
A scheme in which two modules operate in active/standby mode to achieve high availability. When the active module fails, the standby module automatically takes over the system functions of the active module.
host OS
A host OS is the first OS installed on a machine to enable a machine to support multiple virtual operating systems. A host operating system (OS) is the main OS installed on a computer.
host name
A fully qualified domain name (FQDN) of a functional entity, which is used for routing. It is planned by carriers uniformly.
See Identity and Access Management.
See InfiniBand.
International Electrotechnical Commission
See Institute of Electrical and Electronics Engineers.
IP address
A 32-bit (4-byte) binary number that uniquely identifies a host connected to the Internet. An IP address is expressed in dotted decimal notation, consisting of the decimal values of its 4 bytes, separated with periods; for example, The first three bytes of the IP address identify the network to which the host is connected, and the last byte identifies the host itself.
See Intelligent Platform Management Interface.
independent software vendor
Identity and Access Management (IAM)
A security management service provided by the public cloud system. This service includes identity management, permission management, and access control functions.
InfiniBand (IB)
A switched fabric I/O technology that uses a central InfiniBand switch to set up single connections between remote storage devices, network devices, and servers and to redirect traffic. With a tight structure, InfiniBand greatly improves system performance, reliability, and efficiency and alleviates data congestion between hardware devices.
A piece of quota management software that poses space usage or file quantity limits on directories or users.
A piece of load balancing software for client links. It uses unified domain name access, load balancing, and failover technologies to simplify the process of setting up a connection with a client, improving system performance and reliability.
A piece of automatic storage tiering software that enables policy-driven automatic file migration among multiple levels of storage nodes.
Institute of Electrical and Electronics Engineers (IEEE)
A professional association of electrical and electronics engineers based in the United States, but with membership from numerous other countries. The IEEE focuses on electrical, electronics, and computer engineering, and produces many important technology standards.
Intelligent Platform Management Interface (IPMI)
A specification, developed by Dell, HP, Intel and NEC, for the purpose of improving serviceability of servers. The IPMI provides servers with device management, sensor and event management, user management, fan box and power supply management, and remote maintenance.
Description of a performance feature collected from the managed devices by the performance collector.
See keyboard, video, and mouse.
keyboard, video, and mouse (KVM)
A hardware device installed in the integrated configuration cabinet. KVM serves as the input and output device for the components inside the cabinet. It consists of a screen, a keyboard, and a mouse.
Lucent connector
See Lightweight Directory Access Protocol.
An extended lightweight directory access protocol (LDAP) that supports encryption protocols Transport Layer Security (TLS) and Secure Sockets Layer (SSL).
See LDAP over SSL.
Large Object
Swift has a limit on the size of a single uploaded object; by default this is 5GB. However, the download size of a single object is virtually unlimited with the concept of segmentation. Segments of the larger object are uploaded and a special manifest file is created that, when downloaded, sends all the segments concatenated as a single object.
Lightweight Directory Access Protocol (LDAP)
A network protocol based on TCP/IP, which allows access to a directory system agent (DSA). It involves some reduced functionality from X.500 Directory Access Protocol (DAP) specifications.
A short identifier that is of fixed length and local significance. It is used to uniquely identify the FEC to which a packet belongs. It does not contain topology information. It is carried in the header of a packet and does not contain topology information.
The details about locations of all chunks.
A permission that the vendor provides for the user with a specific function, capacity, and duration of a product. A license can be a file or a serial number. Usually the license consists of encrypted codes. The operation authority granted varies with the level of the license.
See message digest algorithm 5.
See maximum transmission unit.
Mini-Capacity node
M nodes apply to Mini-Capacity applications.
maximum transmission unit (MTU)
The largest packet of data that can be transmitted on a network. MTU size varies, depending on the network-576 bytes on X.25 networks, for example, 1500 bytes on Ethernet, and 17,914 bytes on 16 Mbit/s token ring. Responsibility for determining the size of the MTU lies with the link layer of the network. When packets are transmitted across networks, the path MTU, or PMTU, represents the smallest packet size (the one that all networks can transmit without breaking up the packet) among the networks involved.
message digest algorithm 5 (MD5)
A hash function that is used in a variety of security applications to check message integrity. MD5 processes a variable-length message into a fixed-length output of 128 bits. It breaks up an input message into 512-bit blocks (sixteen 32-bit little-endian integers). After a series of processing, the output consists of four 32-bit words, which are then cascaded into a 128-bit hash number.
Data that provides information about other data. Metadata describes the source, size, format, or other characteristics of data. In the data field, metadata helps to explain the content of a data warehouse.
An action to store a copy of a file to another archive site to release the load of the original site, or to provide an archive site closer to the users geographically.
mounting ear
A piece of angle plate on a rack. The mounting ear has holes that can be used to fix network elements or components.
A software architecture technology. It enables multiple tenants to use the same system or software while separating their data.
network attached storage
Network Data Management Protocol
See network file server.
See not only file system.
Network Time Protocol
See non-volatile dual in-line memory module.
nearline storage
With memory ballooning, memory that was allocated for a virtual machine can be given to another virtual machine without having to shut the machine down. A storage device that stores not frequently accessed data. Such a storage device delivers relatively low performance but features quick addressing and data transfer.
network file server (NFS)
A distributed file system that allows remote file access across a network through the NFS protocol.
non-volatile dual in-line memory module (NVDIMM)
A type of dual in-line memory module. Such a memory module can save data within it upon a system power failure.
not only file system (NOFS)
The local file system of a scale-out NAS system. It can manage one or multiple hard disks and provide file, object, or block interfaces.
See object-based storage service.
See operations per second.
A basic data unit in object-based storage. It consists of object data and object metadata that describes object attributes.
object-based storage service (OBS)
An object-based cloud storage service. It provides data storage of easy extensibility, high security, proven reliability, and high cost efficiency. Users can manage and use objects through HTTP-based interfaces. The object-based storage service (OBS) is applicable to large-scale data storage services, such as the Internet contents (videos, images, photos, books, media, and magazines), web disks, digital media, backup, and archiving.
operations per second (OPS)
The number of operations within a second supported by a storage device. It is a critical storage performance indicator.
optical fiber
A thin filament of glass or other transparent material, through which a signal-encoded light beam may be transmitted using total internal reflection.
See power distribution unit.
See power module.
Performance node
P nodes apply to OPS-intensive applications.
parts replacement
A maintenance operation of removing a faulty part or a part to be examined from a running device and then installing a new part.
A set of policy and charging control rules for controlling a service or multiple services. A policy consists of service flows, conditions, and actions.
power distribution unit (PDU)
A unit that performs AC or DC power distribution.
power module (PM)
The module that converts the external power input into the power supply for internal use. Power modules are classified into AC power modules and DC power modules.
power on
To start up a computer; to begin a cold boot procedure; to turn on the power
A limit that restricts the amount of a resource, suchas disk space, that a user, group or directory structure mayconsume.
redundant array of independent disks
See redirect-on-write.
See recovery point objective.
See recovery time objective.
restriction of the use of certain hazardous substances
recovery point objective (RPO)
RPO is a service switchover policy, minimizing data loss during DR switchover. The data recovery point is used as the objective to ensure that the data used for DR switchover is the latest backup data.
recovery time objective (RTO)
A service switchover policy that ensures the shortest switchover time. It tasks the recovery time point as the objective and ensures that the redundancy machine can take over services as quickly as possible.
redirect-on-write (ROW)
A snapshot implementation technology. During data write, new data is written to the new storage location, whereas the old data serves as the snapshot data.
Amazon Simple Storage Service
See secret access key.
Serial Advanced Technology Attachment
See Secure File Transfer Protocol.
See Static Large Object.
Server Message Block
See Simple Mail Transfer Protocol.
See simple network management protocol.
See State based Redundancy Mechanism.
solid state disk
See Secure Shell.
See Secure Sockets Layer.
Secure File Transfer Protocol (SFTP)
A network protocol designed to provide secure file transfer over SSH.
Secure Shell (SSH)
SSH is a set of network protocols for securing connections between computers, as well as the utility suite that implements these protocols.
Secure Sockets Layer (SSL)
A security protocol that works at a socket layer. This layer exists between the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities.
Simple Mail Transfer Protocol (SMTP)
The TCP/IP protocol which facilitates the transfer of electronic-mail messages, specifies how two systems are to interact, and the format of messages used to control the transfer of electronic mail.
State based Redundancy Mechanism (SRM)
A data protection mechanism that functions based on member status.
Static Large Object (SLO)
This feature is very similar to Dynamic Large Object (DLO) support in that it allows the user to upload many objects concurrently and afterwards download them as a single object. It is different in that it does not rely on eventually consistent container listings to do so. Instead, a user defined manifest of the object segments is used.
OpenStack Object Storage (Swift) is a scalable redundant storage system. Objects and files are written to multiple disk drives spread throughout servers in the data center, with the OpenStack software responsible for ensuring data replication and integrity across the cluster.
secret access key (SAK)
An authentication key for a user to access an object-based storage system. A secret access key and a request header form a set of authentication information for a user. Secret access keys and access key IDs are in one-to-one match.
silent corruption
The tendency of stored data to decay over time. The decay probability is very low, but it increases with storage capacity expansion. This decay is also known as bit corruption or data corruption.
simple network management protocol (SNMP)
An IETF protocol for monitoring and managing systems and devices in a network.The data being monitored and managed is defined by a MIB. The functions supported by the protocol are the request and retrieval of data, the setting or writing of data, and traps that signal the occurrence of events.
snapshot root directory
A directory for which you want to create a snapshot.
space lease service
A self service for tenants to manage and use storage space. A tenant can create sub-tenants, and the sub-tenants own specific logical subsets of the tenant's space, and inherits and adjusts the tenant's storage policy.
storage quota
A threshold that limits the capacity of storage space users can use in a specified period.
See Transmission Control Protocol.
A standard terminal emulation protocol in the TCP/IP protocol stack. Telnet allows users to log in to remote systems and use resources as if they were connected to a local system. Telnet is defined in RFC 854.
Temporary URL
Allows the creation of URLs to provide temporary access to objects. For example, a website may wish to provide a link to download a large object in Swift, but the Swift account has no public access. The website can generate a URL that will provide GET access for a limited time to the resource.
Transmission Control Protocol (TCP)
The protocol within TCP/IP that governs the breakup of data messages into packets to be sent using Internet Protocol (IP), and the reassembly and verification of the complete messages from packets received by IP. A connection-oriented, reliable protocol (reliable in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in the ISO/OSI reference model.
The maximum transmission rate of the tested object (system, equipment, connection, service type) when no packet is discarded. Throughput can be measured with bandwidth.
time zone
A division of the earth's surface, usually extending across 15° of longitude devised such that the standard time is the time at a meridian at the center of the zone.
user interface
user identity
uninterruptible power supply
See Universal Serial Bus.
Universal Serial Bus (USB)
A serial bus standard to interface devices. It was designed for computers such as PCs and the Apple Macintosh, but its popularity has prompted it to also become commonplace on video game consoles and PDAs.
The action of disconnecting a global namespace from the local computer. After the action, the namespace becomes inaccessible.
In an access network, the direction that is far from the subscriber end of the link.A direction of message forwarding within a transaction that refers to the direction that responses flow from the user agent server back to the user agent client.
virtual local area network
See virtual machine.
virtual network controller
virtual hosting
A solution that logically divides some or all services of a server into multiple service units, and these service units are represented as multiple servers to the external. In this way, the server hardware resources are fully utilized. It is applicable to HTTP, FTP, and email applications.
virtual machine (VM)
A software simulation of a complete computer system, which runs in an independent environment and provides all hardware system functions. A physical machine can be virtualized as multiple VMs based on application requirements, which allows multiple operating systems to run on the same physical machine. Each operating system can be virtually partitioned and configured, and users can switch between operating systems.A virtual machine is a software computer that, like a physical computer, runs an operating system and applications. Multiple virtual machines can operate on the same host system concurrently.
See Write Once Read Many.
Write Once Read Many (WORM)
A type of storage, designed for fixed content, that preserves what is written to it in an immutable fashion.Optical disks are an example of WORM storage.
Updated: 2019-02-26

Document ID: EDOC1100067885

Views: 2162

Downloads: 0

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next