No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor BCManager 6.5.0 eReplication User Guide 02

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).


See Advanced Encryption Standard.
See application programming interface.
Advanced Encryption Standard (AES)
The AES algorithm is a symmetric grouped password algorithm and one of the most popular symmetric key encryption algorithms released by the U.S. National Institute of Standards and Technology (NIST) on November 26, 2001. It is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST). It supersedes the Data Encryption Standard (DES). AES adopts a symmetric-key algorithm for both encrypting and decrypting the data, where the block size is 128 bits and the key size is 128 bits, 192 bits, or 256 bits.
An operation that enables a registered subscriber to enter the active state and use services provided by a carrier.
active period
A specific period in the life cycle of a subscriber account. The subscriber account is in Active state within the active period. A subscriber account enters the Active state after being activated. Subscribers whose accounts are in Active state can use the telecommunications services provided by carriers.
alarm dump
A process of transferring the alarms stored in the system memory to other external devices.
alarm notification
When an error occurs, the performance measurement system sends performance alarms to the destination (for example, a file and/or fault management system) designated by users.
application programming interface (API)
An application programming interface is a particular set of rules and specifications that are used for communication between software programs.
automatic backup
A periodic operation of storing data by the system.
See Business Controller & Monitor.
Business Controller & Monitor (BCM)
A unified operation and maintenance management system of the BSS, which monitors the services on the applications in the BSS such as the CBS and CRM and provides comprehensive fault management. The BCM supports centralized and unified network management, such as fast network fault locating, efficient network performance analysis, and quick response to service requirements, to provide good user experience.
background job
A job that operates without interaction with the user. Usually, its operation will not affect other jobs. In a distributed system, one background job is assigned to as many nodes as possible for concurrent processing to improve the processing efficiency. Generally, background jobs are asynchronous jobs that do not have a demanding requirement on real-time capability, for example, data consistency verification.
backup server
A server that runs the backup software, schedules and monitors backup and recovery jobs, manages backup storage and production system, and receives and responds to user requests. A backup server also provides the functions of a backup proxy.
baud rate
The maximum rate of signal state changes per second on a communications circuit. If each signal state change corresponds to a code bit, then the baud rate and the bit rate are the same. It is also possible for signal state changes to correspond to more than one code bit, so the baud rate may be lower than the code bit rate.
See comma separated values.
A computer technology that integrates a set of loosely connected servers to work together so that in many respects they can be viewed as a single system. A cluster is used to improve system stability, reliability, data processing capability, and service capability. For example, a cluster is used to reduce single-point failures, share storage resources, load balances, and improve system performance.
clock source
A device that provides standard time for the NTP configuration.
comma separated values (CSV)
A CSV file is a text file that stores data, generally used as an electronic table or by the database software.
See Data Encryption Standard.
See domain name service.
DR site
See disaster recovery site.
Data Encryption Standard (DES)
A specification for encryption of computer data developed by IBM and adopted by the U.S. government as a standard in 1976. DES uses a 56-bit key.
data backup
A method of copying key data to the backup storage area to prevent data loss in case the original storage area is damaged or a failure occurs.
data restoration
A method for retrieving data that is lost due to damage or misoperations.
digital signature
A message signed with a sender's private key that can be verified by anyone who has access to the sender's public key. Digital signature gives the receiver the reason to believe the message was sent by the claimed sender. A proper implementation of digital signature is computing a message digest for the message sent from the sender to the receiver, and then signing the message digest. The result is called digital signature and is sent to the receiver together with the original message.
disaster recovery site (DR site)
A site where a disaster recovery system resides and provides data backup and disaster recovery for a production system. It can recover services at a production site in the event of a disaster.
domain name service (DNS)
A hierarchical naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participants. The DNS distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain.
To export alarm data from the database to the customized file. The exported data is cleared in the database.
See electronic serial number.
ElasticSearch is a search server based on Lucene. It provides a distributed multi-tenant-capable full-text search engine based on a RESTful web interface. ElasticSearch is developed in Java and is released as open source under the terms of Apache. It is designed for cloud computing to facilitate real-time search. It runs stably and reliably, responds quickly, and is easy to install.
electronic serial number (ESN)
A 32-bit number assigned by the mobile station manufacturer, uniquely identifying the mobile station equipment.
See floating IP address.
FusionStorage is the distributed block storage software designed to meet the storage infrastructure requirements of cloud computing data centers. It can virtualize local solid state disks (SSDs), hard disk drives (HDDs), and other storage media on x86 servers into a large-scale storage pool using the distributed technology. FusionStorage provides standard Small Computer System Interfaces (SCSIs) and Internet Small Computer Systems Interfaces (iSCSIs) for upper-layer applications and VMs.
A security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the internet. Firewalls can be implemented in either hardware or software, or a combination of both.
floating IP address (FIP)
An IP address that a high availability (HA) system uses to communicate with the external system. The active server and standby server have separate IP addresses. For example, the IP address of the active server is IP1 and the IP address of the standby server is IP2. When communicating with the external client, the active or standby server uses IP3, and IP3 is bound to the network adapter of the active server. At this time, the active server has two IP addresses, namely IP1 and IP3. The standby server has only IP2, therefore, it does not provide services to the external client. When an active/standby switchover occurs, the active server releases IP3, and IP3 is bound to the network adapter of the standby server. This is called floating.
A device that receives data via one protocol and transmits it via another.
gray release
In the private cloud scenario of the IT PaaS, gray release is an extension and enhancement of the traditional AB test technology. Gray release scope is determined based on flexible selection policies (such as the user characteristics, quantity, scope, and area). Gray release ensures smooth test and release of software functions with good user experience and overall function stability.
See Hypertext Transfer Protocol Secure.
Hypertext Transfer Protocol Secure (HTTPS)
An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL) for secured transactions. It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security, or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and protection of the privacy and integrity of the exchanged data.
host name
A fully qualified domain name (FQDN) of a functional entity, which is used for routing. It is planned by carriers uniformly.
See Integrated Business Management System.
See Internet Protocol version 4.
See Internet Protocol version 6.
See independent transmission.
Integrated Business Management System (IBMS)
Business management platform of the PTT service. It provides a data synchronization interface for the BOSS so that enterprise administrators and members can perform operations such as registration, deregistration, modification, and query.
Internet Protocol version 4 (IPv4)
The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods and may range from through to Each IPv4 address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork.
Internet Protocol version 6 (IPv6)
An update version of IPv4, which is designed by the Internet Engineering Task Force (IETF) and is also called IP Next Generation (IPng). It is a new version of the Internet Protocol. The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while an IPv6 address has 128 bits.
independent transmission (IT)
A transmission mode in which different RATs connect to the transport network through different independent transmission ports without sharing the transmission resources.
See keyboard, video, and mouse.
Kibana is an open-source data visualization plugin for Elasticsearch. You can use Kibana to search, view, and exchange the data stored in Elasticsearch indexes. Kibana easily provides advanced data analysis and visualization by using charts, tables, and maps.
keyboard, video, and mouse (KVM)
A hardware device installed in the integrated configuration cabinet. KVM serves as the input and output device for the components inside the cabinet. It consists of a screen, a keyboard, and a mouse.
knowledge base
A repository of knowledge about a domain represented in machine-processable form, which may be rules (in which case the knowledge base may be considered as a rule base), facts, or other representations.
See logical volume manager.
link status
The running status of a link, which can be Up, Down, backup, or unknown.
load balancing
The distribution of activity across two or more servers or components in order to avoid overloading any one with too many requests or too much traffic.
logical volume manager (LVM)
Volume management software. It provides the high level disk storage that helps the system administrator allocate storage space for applications and users. Storage volumes under the LVM can be easily changed in size and removed as required. User groups are allowed to manage storage volumes. The administrator is allowed to customize the names of storage volumes.
mail server
A server that can receive and send mails. In the report system, the mail server can forward reports to the external mail boxes of users.
network segment
Part of a network on which all message traffic is common to all nodes; that is, a message broadcast from one node on the segment is received by all other nodes on the segment.
operation log
A list of information about operation events.
Primary backup
A kind of file system backup mode that creates copies (snapshots) for the file system.
A sequence of characters used to prove one's identity. It is used during a login process and should be highly protected.
An independent software unit used for fixing the bugs in software.
planned migration
Data or application migration from a production site to a disaster recovery site due to planned events such as power supply cutoff, system upgrade, or system maintenance.
production site
A site where a production system resides. It is a combination of software and hardware (including computing, network, and storage resources) that supports critical services of an enterprise, company, or institute.
protected group
One or multiple sets of protected objects.
protected object
An object that is under disaster recovery protection. It can be a database, file system, virtual machine, or storage LUN.
quorum server
A server that can provide arbitration services for clusters or HyperMetro to prevent the resource access conflicts of multiple application servers.
RESTful is a software architecture style rather than a standard. It provides a set of software design guidelines and constraints for designing software for interaction between clients and servers. RESTful software is simpler and more hierarchical, and facilitates the implementation of the cache mechanism.
recovery planning
The advance planning and preparations that are necessary to minimize loss and to ensure the availability of an organization's critical information systems after a service disruption or a disaster.
A tool that displays data in a specific format to intuitively present service information.
reverse proxy
A proxy server receives a connection request from the Internet, forwards the request to a server on the internal network, and sends back the result from the server to the client that initiates the connection request on the Internet. The proxy server externally functions as a server, and this process is called reverse proxy.
root certificate
An unsigned public key certificate or a self-signed certificate that identifies the Root Certificate Authority (CA). A root certificate is part of a public key infrastructure scheme.
See Secure File Transfer Protocol.
See Simple Mail Transfer Protocol.
See Simple Network Management Protocol.
See Secure Shell.
Secure File Transfer Protocol (SFTP)
A network protocol designed to provide secure file transfer over SSH.
Secure Shell (SSH)
SSH is a set of network protocols for securing connections between computers, as well as the utility suite that implements these protocols.
Simple Mail Transfer Protocol (SMTP)
The TCP/IP protocol which facilitates the transfer of electronic-mail messages, specifies how two systems are to interact, and the format of messages used to control the transfer of electronic mail.
Simple Network Management Protocol (SNMP)
An IETF protocol for monitoring and managing systems and devices in a network. The data being monitored and managed is defined by a MIB. The functions supported by the protocol are the request and retrieval of data, the setting or writing of data, and traps that signal the occurrence of events.
security policy
A security policy is a set of rules for monitoring the behaviors of terminal users or checking the weaknesses of terminal hosts. Security policies can be divided into policies for terminal security management and terminal user behavior management. The application of security policies improves the security of terminal hosts and regulates terminal users' behaviors of using network resources.
A logical connection used to identify customer requests and responses. A server can identify requests from the same customer by session. A multimedia session is a set of multimedia senders and receivers and the data streams flowing from senders to receivers. A multimedia conference is an example of a multimedia session."" (RFC 2327 [1]) (A session as defined for SDP can comprise one or more RTP sessions.) As defined, a callee can be invited several times, by different calls, to the same session. If SDP is used, a session is defined by the concatenation of the SDP user name, session id, network type, address type, and address elements in the origin field.
A group of IP systems with IP connectivity, which can be achieved independent of SP networks.
A type of smaller network that forms a larger network according to a rule, such as, forming a network according to different districts. This facilitates the management of a large network.
subnet mask
The subnet mask is a binary pattern that is stored in the device and is matched with the IP address. A subnet mask is used by the IP protocol to determine to which network segment packets are destined.
system data backup
Backup of the operating system of the server, which is used to restore the original operating system.
A device that converts voice, sound, text, image, table, data and video from physical display to electronic signals or from electronic signals to physical display. A terminal generates and sends signals (such as telecommunications circuit setup or release) that maintain the normal running state of the telecommunications network, and it receives the call signals of telecommunications switch and transmission.
A kernel object created by the OS. Creating a thread involves creating a thread object and allocating resources for the thread.
A limitation on an amount, scale, or level. Changes will occur when a threshold is reached.
timeout interval
For process control, the time the server waits, when a command cannot be successfully completed, before canceling the command.
The logical layout of the components of a computer system or network and their interconnections. Topology deals with questions of what components are directly connected to other components from the standpoint of being able to communicate. It does not deal with questions of physical location of components or interconnecting cables.The communication infrastructure that provides Fibre Channel communication among a set of PN_Ports (e.g., a Fabric, an Arbitrated Loop, or a combination of the two).
virtual network controller
A VM management system provided by VMware.
virtual machine image
A VM file image that specifies VM compositions and basic configurations and can be used to create a VM. A VM image contains an operating system, applications, VM configurations (such as VM operating system, disks, CPU kernel quantity, and network adapters) for defining the entire set of virtual hardware, and other software required for service running.
Virtualization is a technology that virtualizes a computer into multiple logic computers. Multiple logic computers can work on a computer. The operating systems running on these logic computers can be different, and the applications running on these operating systems work independently. Therefore, the working efficiency of the computer is significantly improved. Software virtualization redefines IT resources to implement dynamic allocation, flexible scheduling, and cross-domain sharing of IT resources. This improves IT resource usage, enables IT resources to become social infrastructure, and serves flexible application requirements in various industries.
A list or register of items that, for one reason or another, are being provided a particular privilege, service, mobility, access or recognition.
Updated: 2019-05-21

Document ID: EDOC1100075861

Views: 14414

Downloads: 70

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next