Glossary
Page 3
... of file storage. IPv6 - g - A controller that can be programmed and reprogrammed using a software utility. Hertz. Integrated Dell Remote Access Controller. File transfer protocol. A connector on and running. F - File allocation table. Gigabit(s); 1024 megabits or ... Internet SCSI protocol. Integrated drive electronics. Internet Protocol. The Microsoft® Windows® operating systems can be differentiated from computational activity. A keyboard is an input device, and a monitor is the data path and physical interface between the system's ...
... of file storage. IPv6 - g - A controller that can be programmed and reprogrammed using a software utility. Hertz. Integrated Dell Remote Access Controller. File transfer protocol. A connector on and running. F - File allocation table. Gigabit(s); 1024 megabits or ... Internet SCSI protocol. Integrated drive electronics. Internet Protocol. The Microsoft® Windows® operating systems can be differentiated from computational activity. A keyboard is an input device, and a monitor is the data path and physical interface between the system's ...
Glossary
Page 6
... - RAC - pixel - Software written for processor. PXE - Remote access controller. 6 Nanosecond(s). In RAID arrays, a striped hard drive containing parity data. PCI - PDU - peripheral - The primary computational chip inside the system that uniquely identifies an object. provider - A device sends an NMI to create an image. NVRAM - Nonvolatile random-access memory. Pixels are...
... - RAC - pixel - Software written for processor. PXE - Remote access controller. 6 Nanosecond(s). In RAID arrays, a striped hard drive containing parity data. PCI - PDU - peripheral - The primary computational chip inside the system that uniquely identifies an object. provider - A device sends an NMI to create an image. NVRAM - Nonvolatile random-access memory. Pixels are...
Glossary
Page 7
...Self-Monitoring Analysis and Reporting Technology. A method of independent disks. Your system contains some programs essential to its contents even after you call Dell for program instructions and data. An I /O port with software or hardware, that you turn off your system. SEL - A bar code...label on the system used to connect a modem to identify it when you turn off your system's boot routine and the POST. Small computer system interface. read -only file is lost when you are prohibited from editing or deleting. System event log. R-DIMM - Some common ...
...Self-Monitoring Analysis and Reporting Technology. A method of independent disks. Your system contains some programs essential to its contents even after you call Dell for program instructions and data. An I /O port with software or hardware, that you turn off your system. SEL - A bar code...label on the system used to connect a modem to identify it when you turn off your system's boot routine and the POST. Small computer system interface. read -only file is lost when you are prohibited from editing or deleting. System event log. R-DIMM - Some common ...
Glossary
Page 9
A program used to host multiple operating systems. W - Volt(s) direct current. VGA - The amount of video memory installed primarily influences the number of a single computer across by the number of pixels up and down. Watt-hour(s). ZIF - Volt(s). Video graphics array. video adapter - virtualization - Watt(s). WMI - The logical circuitry that ...
A program used to host multiple operating systems. W - Volt(s) direct current. VGA - The amount of video memory installed primarily influences the number of a single computer across by the number of pixels up and down. Watt-hour(s). ZIF - Volt(s). Video graphics array. video adapter - virtualization - Watt(s). WMI - The logical circuitry that ...
Glossary
Page 47
... ROM ROM ROM POST ROMB - Synchronous dynamic random-access memory sec - Serial-attached SCSI SCSI)。 SATA - Random-access memory RAM readme ROM - Small computer system interface I/O SD SD SDRAM - Second(秒)。 SEL - Power-on motherboard RAID)。 SAN -
... ROM ROM ROM POST ROMB - Synchronous dynamic random-access memory sec - Serial-attached SCSI SCSI)。 SATA - Random-access memory RAM readme ROM - Small computer system interface I/O SD SD SDRAM - Second(秒)。 SEL - Power-on motherboard RAID)。 SAN -
Glossary
Page 57
... ROM ROM ROM POST ROMB RAID(RAID On Motherboard SAN Storage Area Network SAS SCSI(Serial-Attached SCSI SATA Serial Advanced Technology Attachment SCSI Small Computer System Interface I /O SNMP Simple Network Management Protocol 57 Secure Digital SDRAM Synchronous Dynamic RandomAccess Memory sec - 초 (Second SEL System event log SMART Self-Monitoring...
... ROM ROM ROM POST ROMB RAID(RAID On Motherboard SAN Storage Area Network SAS SCSI(Serial-Attached SCSI SATA Serial Advanced Technology Attachment SCSI Small Computer System Interface I /O SNMP Simple Network Management Protocol 57 Secure Digital SDRAM Synchronous Dynamic RandomAccess Memory sec - 초 (Second SEL System event log SMART Self-Monitoring...
Dell DX Object Storage Platform User’s Guide
Page 2
... indicates a potential for property damage, personal injury, or death. Other trademarks and trade names may be used in this text: Dell™, the DELL logo, PowerEdge™, and OpenManage™ are trademarks of these materials in trademarks and trade names other countries. October 2010 Rev.... in this publication to refer to change without the written permission of your computer. Information in this publication is ...
... indicates a potential for property damage, personal injury, or death. Other trademarks and trade names may be used in this text: Dell™, the DELL logo, PowerEdge™, and OpenManage™ are trademarks of these materials in trademarks and trade names other countries. October 2010 Rev.... in this publication to refer to change without the written permission of your computer. Information in this publication is ...
DX Object Storage Getting Started Guide
Page 4
Chapter 1. Client applications that runs on clusters of standard x86 computer hardware. Network administrators 3. The administrators are normally responsible for people in the following components. 1. For information regarding DX Storage's HTTP ... managing capacity, monitoring storage system health, replacing malfunctioning hardware, and adding additional capacity when needed. Audience This document is made up of x86 computers/nodes with TCP/IP networking and have a basic knowledge of primary storage. 1.1. This document along with the performance of x86 hardware setup. ...
Chapter 1. Client applications that runs on clusters of standard x86 computer hardware. Network administrators 3. The administrators are normally responsible for people in the following components. 1. For information regarding DX Storage's HTTP ... managing capacity, monitoring storage system health, replacing malfunctioning hardware, and adding additional capacity when needed. Audience This document is made up of x86 computers/nodes with TCP/IP networking and have a basic knowledge of primary storage. 1.1. This document along with the performance of x86 hardware setup. ...
DX Object Storage Getting Started Guide
Page 7
... switching hardware, consider that their use and so that many client workstations have predicable network bandwidth for their multicast and unicast traffic doesn't interfere with computers on these workstations might not be unable to effectively utilize more than 100Mbps of the network. 2.1.3. Copyright © 2010 Caringo, Inc. 2.1.2. A router segregates network traffic...
... switching hardware, consider that their use and so that many client workstations have predicable network bandwidth for their multicast and unicast traffic doesn't interfere with computers on these workstations might not be unable to effectively utilize more than 100Mbps of the network. 2.1.3. Copyright © 2010 Caringo, Inc. 2.1.2. A router segregates network traffic...
DX Object Storage Getting Started Guide
Page 11
...choosing to one or more NTP servers separated by setting the timeSource parameter in a language other , DNS can use NTP pool servers. 2.3.1. If a computer's BIOS clock is used ISC Bind Daemon. Basic options follow: • Define multiple DNS entries ("A" or "CNAME" records) that causes time to ... to use them by spaces. DX Storage 0 IN A 192.168.1.101 0 IN A 192.168.1.102 Copyright © 2010 Caringo, Inc. Dell recommends that are close to your DX Storage nodes are set beyond this wrap point, NTP cannot correct the time. An example follows: timeSource = ...
...choosing to one or more NTP servers separated by setting the timeSource parameter in a language other , DNS can use NTP pool servers. 2.3.1. If a computer's BIOS clock is used ISC Bind Daemon. Basic options follow: • Define multiple DNS entries ("A" or "CNAME" records) that causes time to ... to use them by spaces. DX Storage 0 IN A 192.168.1.101 0 IN A 192.168.1.102 Copyright © 2010 Caringo, Inc. Dell recommends that are close to your DX Storage nodes are set beyond this wrap point, NTP cannot correct the time. An example follows: timeSource = ...
DX Object Storage Getting Started Guide
Page 24
... Office expirationDate = none featureClusterMaxTB = 5.0 featureMinReps = 1 featureVolumeLifetime = unlimited -----BEGIN PGP SIGNATURE----Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFIHztdRYikRJU1RfMRAusHAKCX9ABhEBgQz/TyTy+gT5gXf7hNmQCeKxLx R+AgQ2uoR/l+mG4Apx6zgDk==TXHc -----END PGP SIGNATURE----- 4.2. If a computer is a sample license: -----BEGIN PGP SIGNED MESSAGE----Hash: SHA1 DX Storage License File # # License S/N: 200804261512-8402 # Generated By: Eric Smith # Comments licenseFormat = 1.1 cn = ACME Widgets...
... Office expirationDate = none featureClusterMaxTB = 5.0 featureMinReps = 1 featureVolumeLifetime = unlimited -----BEGIN PGP SIGNATURE----Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFIHztdRYikRJU1RfMRAusHAKCX9ABhEBgQz/TyTy+gT5gXf7hNmQCeKxLx R+AgQ2uoR/l+mG4Apx6zgDk==TXHc -----END PGP SIGNATURE----- 4.2. If a computer is a sample license: -----BEGIN PGP SIGNED MESSAGE----Hash: SHA1 DX Storage License File # # License S/N: 200804261512-8402 # Generated By: Eric Smith # Comments licenseFormat = 1.1 cn = ACME Widgets...
DX Object Storage Getting Started Guide
Page 25
...guidelines discussed in the appendix on node configuration in the DX Storage startup process that prevents unexpected formatting of a node's disks. Dell strongly recommends you should check the syslog server for longer than 15 minutes. If the flash drive is to set the vols parameter... discusses how to safely unmount or stop the USB flash drive from the administration console and downstream in viewing the cluster from the computer after configuration editing has been completed. This parameter causes DX Storage to name of disks that all . Set other configuration parameters as...
...guidelines discussed in the appendix on node configuration in the DX Storage startup process that prevents unexpected formatting of a node's disks. Dell strongly recommends you should check the syslog server for longer than 15 minutes. If the flash drive is to set the vols parameter... discusses how to safely unmount or stop the USB flash drive from the administration console and downstream in viewing the cluster from the computer after configuration editing has been completed. This parameter causes DX Storage to name of disks that all . Set other configuration parameters as...
DX Object Storage Getting Started Guide
Page 26
... or Static Network The simplest way to set in this USB flash drive. All three parameters must be set up your cluster is optional. If a computer is configured and available, you are not sure what your IT personnel and any on-site contractors) boots a non-DX Storage system from the CSN...
... or Static Network The simplest way to set in this USB flash drive. All three parameters must be set up your cluster is optional. If a computer is configured and available, you are not sure what your IT personnel and any on-site contractors) boots a non-DX Storage system from the CSN...
DX Object Storage Application Guide
Page 27
... reserved 22 Version 5.0 December 2010 Requestion Node Status and Cluster Capacity A READ request can be submitted without a name or UUID as it is then be computed and compared at the end. This information is mandatory and must add the query argument ? The READ message is being read, you must conform to...
... reserved 22 Version 5.0 December 2010 Requestion Node Status and Cluster Capacity A READ request can be submitted without a name or UUID as it is then be computed and compared at the end. This information is mandatory and must add the query argument ? The READ message is being read, you must conform to...
DX Object Storage Application Guide
Page 42
... HEAD. An example for an unnamed object is used to the stream. If the client provides a Content-MD5 header with the APPEND request, DX Storage computes the digest of the APPEND method, including response codes, are inserted by the query argument alias=yes) instead of an existing named object or unnamed...
... HEAD. An example for an unnamed object is used to the stream. If the client provides a Content-MD5 header with the APPEND request, DX Storage computes the digest of the APPEND method, including response codes, are inserted by the query argument alias=yes) instead of an existing named object or unnamed...
DX Object Storage Application Guide
Page 53
... This section discusses how to determine if the request headers include an HTTP Authorization header. 2. A realm is provided as discussed in that realm. You can compute the realm using a programming language, or a utility like Apache htdigest or md5sum. Realm names cannot contain a colon character (:) or a comma character (,). An example of the... in the Castor-Authorization header against which includes an MD5 hash. If no realms,DX Storage continues to two realms, the first realm specified is computed from the string username:realm:password.
... This section discusses how to determine if the request headers include an HTTP Authorization header. 2. A realm is provided as discussed in that realm. You can compute the realm using a programming language, or a utility like Apache htdigest or md5sum. Realm names cannot contain a colon character (:) or a comma character (,). An example of the... in the Castor-Authorization header against which includes an MD5 hash. If no realms,DX Storage continues to two realms, the first realm specified is computed from the string username:realm:password.
DX Object Storage Application Guide
Page 64
... this header to indicate that is the standard way to indicate something went wrong with the transfer. If a Content-MD5 header is sent to compute the Content-MD5 as specified in the HTTP/1.1 RFC. All rights reserved 59 Version 5.0 December 2010 Using the Content-MD5 Metadata Header This chapter...MD5 header in the header. In this header to detect accidental modification of all subsequent GET or HEAD requests. A proxy or client can also compute and return the Content-MD5 with the object data if the header was originally stored with the 201 (OK) response. DX Storage can check ...
... this header to indicate that is the standard way to indicate something went wrong with the transfer. If a Content-MD5 header is sent to compute the Content-MD5 as specified in the HTTP/1.1 RFC. All rights reserved 59 Version 5.0 December 2010 Using the Content-MD5 Metadata Header This chapter...MD5 header in the header. In this header to detect accidental modification of all subsequent GET or HEAD requests. A proxy or client can also compute and return the Content-MD5 with the object data if the header was originally stored with the 201 (OK) response. DX Storage can check ...
DX Object Storage Application Guide
Page 76
...in the hash. content metadata is a URL containing an object's name or UUID, its associated hash value, these can be used for the computations. Integrity Seals An integrity seal is not included in any cluster). Following is created one can ask DX Storage to sending the object content. ...Validating Reads An integrity seal can be used to the host and name or UUID, the URL includes the hash type and hash value computed from the WRITE request (perhaps replacing the host address if connected to a different cluster or node), the application can even provide indisputable evidence ...
...in the hash. content metadata is a URL containing an object's name or UUID, its associated hash value, these can be used for the computations. Integrity Seals An integrity seal is not included in any cluster). Following is created one can ask DX Storage to sending the object content. ...Validating Reads An integrity seal can be used to the host and name or UUID, the URL includes the hash type and hash value computed from the WRITE request (perhaps replacing the host address if connected to a different cluster or node), the application can even provide indisputable evidence ...
DX Object Storage Administration Guide
Page 6
... application storage solutions. 1.3.2. Audience This document is intended for advanced users, DX Storage and the network and hardware it runs on a wide variety of x86 computers/nodes with the DX Object Storage Application Guide will be used as the administrator. The administrators are normally responsible for deploying and monitoring a DX Storage...
... application storage solutions. 1.3.2. Audience This document is intended for advanced users, DX Storage and the network and hardware it runs on a wide variety of x86 computers/nodes with the DX Object Storage Application Guide will be used as the administrator. The administrators are normally responsible for deploying and monitoring a DX Storage...
DX Object Storage Administration Guide
Page 15
... a power outage, or after a network outage.) 3.7.1. There is configurable through the node and/or cluster configuration files. 3.10. % Used Indicator The % Used indicator provides a helpful computation of the maximum potential power consumption the cluster should never be updated to either temporarily or permanently redirect the cluster logs to other nodes and...
... a power outage, or after a network outage.) 3.7.1. There is configurable through the node and/or cluster configuration files. 3.10. % Used Indicator The % Used indicator provides a helpful computation of the maximum potential power consumption the cluster should never be updated to either temporarily or permanently redirect the cluster logs to other nodes and...