Glossary
3958 DD1   This original server has been available since August 2008. This server is based on the IBM System x3850 M2 Type 7141. When it i used as a server in the TS7650G, its machine type and model are 3958 DD1. This this machine type and model is no longer supported.
3958 DD3   This is a higher performance server, which has been available since March 2009. This server is based on the IBM System x3850 M2 Type 7233. When used as a server in the TS7650G, its machine type and model are 3958 DD3. This this machine type and model is no longer supported.
3958 DD4   This is a newer, higher performance server, which has been available since December 2010. This server is based on the IBM System x3850 X5 Type 7145-AC1. When used as a server in the TS7650G, its machine type and model are 3958 DD4. Use this machine type and model for service purposes.
3958 DD5   This is a higher performance server, which has been available since May 2012. This server is based on the IBM System x7145 model. When used as a server in the TS7650G, its machine type and model are 3958 DD5. Use this machine type and model for service purposes.
3958 DD6  This is the newest server available since March 2016, it was introduced with ProtecTIER Version 3.4. This server is a 2u platform based on two Intel Xeon Processor E5-2695 v2 (12 cores, 2.4 GHz), it comes with 128 GB RAM (8x 16 GB DDR3 at 1866 MHz).
asynchronously parallel system   A system in which the backed up data does not return to the host (and out to file) in the same order each time.
Backup, Recovery, and Media Services for IBM i (BRMS)   Helps you implement a disciplined approach to managing your backups, and provides you with an orderly way to retrieve lost or damaged data. BRMS also enables you to track all of your backup media from creation to expiration
BRMS policies    A set of defaults that is commonly used (for example, device or media class). Generally used defaults are in the BRMS system policy. Backup-related defaults are in the BRMS backup policy.
chown    The chown command (abbreviation for change owner) is used on UNIX based systems to change the owner of a file. In most implementations, it can be run by only the superuser to prevent users from simply changing the ownership of files randomly.
compaction (data compaction)    The reduction of the number of data elements, bandwidth, cost, and time for the generation, transmission, and storage of data without loss of information by eliminating unnecessary redundancy.
Common Internet System (CIFS)   ProtecTIER emulates Windows file system behavior and presents a virtualized hierarchy of file systems, directories, and files to Windows CIFS clients. When configured for FSI-CIFS, ProtecTIER emulates a network-attached storage (NAS) backup target that can use both HyperFactor and ProtecTIER native replication bandwidth reduction techniques for storing and replicating deduplicated data.
concurrent saves and restores    The ability to save or restore different objects from a single library or directory to multiple backup devices or different libraries or directories to multiple backup devices at the same time from different jobs.
control group   A group of items (for example, libraries or stream files) to back up, and the attributes that are associated with how to back them up.
CSV file (.csv)    Comma-separated value file, sometimes called comma-delimited. This type of file is a specially formatted plain text file that stores spreadsheet or basic database-style information in a simple format, with one record on each line, and each field in that record separated by a comma. CSV files are used by ProtecTIER Manager as a simple way to transfer a large volume of database information between programs. This type of file can be imported into most spreadsheet programs.
deduplication    A data compression technique in which redundant data is eliminated. The technique improves storage usage and can also be applied to network data transferals to reduce the number of bytes that must be sent across a link.
direct attachment    Refers to a digital storage system that is directly attached to a server or workstation, without a storage network in between.
dirty bit    A dirty bit is a flag that indicates whether an attribute must be updated. This situation occurs when a bit in a memory cache or virtual memory is changed by a processor but is not updated in storage.
dirty bit technology    The ProtecTIER system uses a “dirty-bit” feature/technology and cartridges are marked as in-sync after the data finishes replicating from the primary to the secondary site, so that at the time of synchronization, the local cartridges and their DR site replicas are identical.
disaster recovery (DR)    The process of recovering production site data at a DR location. Disaster recovery is useful if a disaster occurs or a situation occurs where the production (or primary) site goes offline.
disk controller    The disk controller for the TS7650 Appliance is IBM Feature Code 3708: 4.8 TB Fibre Channel Disk Controller. Use this feature code for service purposes.
factoring ratio   The ratio of nominal capacity to physical capacity in the ProtecTIER repository. For example, if you have 100 TB of user data (nominal capacity) and it is stored on 10 TB of physical capacity, your factoring ratio is 10:1.
File System Interface (FSI)   The File System Interface (FSI) presents ProtecTIER as a network-attached storage backup and recovery target that can use the HyperFactor algorithm and ProtecTIER native replication bandwidth reduction techniques for storing and replicating deduplicated data. The FSI configuration option enables ProtecTIER to present disk repository storage as a virtualized hierarchy of file systems.
disk expansion unit    The disk expansion unit for the TS7650 Appliance is IBM Feature Code 3707: 4.8 TB Fibre Channel Disk Expansion Unit. Use this feature code for service purposes.
failback     The procedure for replicating updated cartridges, new or old, from the DR site to the original (or restored) production site to bring it up to date in case it was down, or lost and rebuilt.
hub    The hub (target server) is connected, through your Ethernet replication network, to one or more spokes (source servers). The hub stores backup images of the data repositories, file system configurations, and other system settings that are on the spokes. If there is a spoke failure, the stored image can be easily retrieved from the hub and transmitted to the spoke. This action restores the spoke to its previous configuration with minimal data loss
IBM Tivoli Assist On-site (AOS)    IBM Tivoli Assist On-site (AOS) is a web-based tool that enables a remote support representative from IBM to view or control the management node desktop. For more information, see the Assist On-site web page: http://www.ibm.com/support/assistonsite
IP address    Internet Protocol address. A numerical label that is assigned to each device that participates in a computer network.
load throttling    Load throttling is a process that helps avoid dangerous overload situations. Load throttling limits the number of permitted incoming connections, enabling resources to be allocated to all processes.
logical partition (LPAR)    A division of a computer's processors, memory, and storage into multiple sets of resources so that each set of resources can be operated independently with its own operating system instance and applications. The number of LPARs that can be created depends on the system's processor model and resources that are available.
logical unit number (LUN)    A number that is used to identify a logical unit that is a device that is addressed by Fibre Channel. A LUN can be used with any device that supports read/write operations, such as a tape drive, but is most often used to refer to a logical disk that is created on a SAN.
LUN masking    An authorization process that makes a LUN available to some hosts and unavailable to other hosts. LUN masking is used in the ProtecTIER product as a precaution against servers corrupting disks that belong to other servers. By masking (hiding) LUNs from a specific server (or servers), you effectively tell those servers that the LUN does not exist, and those servers cannot corrupt the disks in the LUN.
media    A tape cartridge (volume) that holds saved data.
media class    A logical grouping of media with similar physical, logical, or both of these characteristics (for example, density).
media identifier    A name that is given to a physical piece of media.
Network File System (NFS)    ProtecTIER emulates UNIX file system behavior and presents a virtualized hierarchy of file systems, directories, and files to UNIX based clients using the NFS protocol. When configured for FSI-NFS, ProtecTIER emulates a network-attached storage (NAS) backup target that can use both HyperFactor and ProtecTIER Native Replication bandwidth reduction techniques for storing and replicating deduplicated data.
nominal capacity of the repository   The physical space and expected factoring ratio.
nominal data    The original amount of backed-up data before you apply the ProtecTIER deduplication factor.
OpenStorage (OST)    Enables the ProtecTIER product to be integrated with NetBackup to provide backup-to-disk without using a Virtual Tape Library (VTL) emulation.
Note: The OST interface is no longer supported with version 3.4.
parallel saves and restores    The ability to save or restore a single object or library or directory across multiple backup devices from the same job.
peak throughput    The maximum of the ProtecTIER server capabilities.
principality     The privilege to write to a cartridge (set to read/write mode). The principality of each cartridge belongs to only one repository in the grid. By default, the principality belongs to the repository where the cartridge was created.
ptcli    ProtecTIER command-line interface.
ProtecTIER    When used alone, this expression points to the IBM patented deduplication solution based on HyperFactor. Depending on the context, it can mean the family of products, a specific device, or just the deduplication engine.
RAID 10    Many storage controllers enable RAID levels to be nested. The elements of a RAID can be either individual drives or RAIDs themselves. Therefore, a RAID 10 (or RAID 1+0) is a configuration in which multiple drives are first combined into multiple RAID arrays. Each RAID 1 array is treated as a single drive. These arrays are then combined into a single RAID 0 array.
RAID 6    The RAID 6 architecture supports block-level striping with double distributed parity. It provides fault tolerance of two drive failures; the array continues to operate with up to two failed drives. This situation makes larger RAID groups more practical, especially for high-availability systems. This situation becomes increasingly important as large-capacity drives lengthen the time that is needed to recover from the failure of a single drive. Single-parity RAID levels are vulnerable to data loss until the failed drive is replaced and its data rebuilt. Double parity gives more time to rebuild the array without the data being at risk if another drive fails before the rebuild is complete.
reclamation    The Tivoli Storage Manager process that frees up space on tapes, and returns empty tapes to the scratch pool. Reclamation is accomplished by deleting expired data from tapes and moving any unexpired data to other tapes to more efficiently use tape space.
recovery point objective (RPO)   How much lag time is acceptable for a backup that is written to virtual tape in Site A to be replicated to Site B.
redundant array of independent disks (RAID)    A storage technology that combines multiple disk drive components into a logical unit. Data is distributed across the drives in one of several ways (RAID levels). The physical drives are said to be in a RAID array, which is accessed by the operating system as one single drive. The different schemes or architectures are named by the word RAID followed by a number (for example, RAID 0 or RAID 1).
redundant host connection    The duplication of connections, or two or more paths that connect two objects in a network. The intention of redundancy is to increase the reliability of the system, or to provide a backup or failsafe if one of the connections fails.
remote cloning    The process of using a secondary (DR) site to clone cartridges. ProtecTIER replication enables users to offload tape cloning to their secondary site.
replication    A process that transfers logical objects, such as cartridges, from one ProtecTIER repository to another one.
replication grid    A set of repositories that shares a common ID and can potentially transmit and receive logical objects through replication.
replication grid ID   A number (0 - 63) that identifies a replication grid in an organization.
replication grid member    A repository that is a member in a replication grid.
Replication Manager    The utility in the ProtecTIER Manager GUI through which you can set replication policies, define replication time frame windows, delete replication activities, and much more.
replication pairs   Two repositories in a replication grid that replicate from one to another.
replication policy   A policy made up of rules that define a set of objects (for example, VTL cartridges) from a source repository to be replicated to a target repository.
replication rate control (RRC)    A built-in resource-governing mechanism. RRC gives precedence to backup and restore requests and throttles down replication traffic whenever backup and restore activity increases above an idle state. When the backup and restore workload drops below that idle threshold, RRC returns to the default priority. The RRC determines the maximum replication rate for both system states, IDLE and BUSY, based on the performance limits set by the user.
replication time frame    A scheduled period for replication to take place for all policies.
replication window   The time frame during which replication runs.
repository    A warehouse to store data for safekeeping.
repository unique ID (RID)    A number that uniquely identifies the repository. The RID is created from the replication grid ID and the repository internal ID in the grid.
SAN fabric    The hardware that connects workstations and servers to storage devices in a SAN is referred to as a fabric. The SAN fabric enables any server to connect to any storage device through Fibre Channel switching.
shelf   A container of VTL cartridges in a ProtecTIER repository.
SLA    Service level agreement.
spoke    The spokes are the servers that process and store the information that is generated during daily business operations. The stored information is then replicated to a hub, according to a user-defined replication policy.
storage area network (SAN)    A dedicated network that provides access to consolidated, block-level data storage. SANs make storage devices, such as disk arrays and tape libraries, accessible to servers so that the devices appear similar to locally attached devices to the operating system.
storage checkpoint    Storage checkpoints are pointers added to the backup stream so that if the backup fails, a rerun of the backup starts from the last storage checkpoint, rather than the beginning of the stream.
system console    The system console is an IBM TS3000 System Console (TSSC). It is the console used with a keyboard to issue commands to the server through the CLI, and monitors the functions of the server. The TS3000 combined with the keyboard is commonly referred to as the KVM (keyboard, video, monitor).
 
Note: The TS7650G DD6 and the TS7620 ProtecTIER Appliance Express do not support TSSC.
TS7600    When used alone, this term signifies the IBM family of virtualization solutions that operate on the ProtecTIER platform.
Virtual Tape Library (VTL)   The ProtecTIER VTL service that emulates traditional tape libraries.
visibility switching   The automated process that transfers the visibility of a VTL cartridge from its master to its replica and vice versa.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.21.46.92