Glossary
Page 3
...- flash memory - The FSB is usually rounded to 1,000,000,000 bytes. Gravities. Gb - Input/output. Integrated Dell Remote Access Controller. A remote access controller that implements communication between the system's bus and the peripheral device, typically a storage... Front-side bus. A controller that uses the Internet SCSI protocol. The Microsoft® Windows® operating systems can be differentiated from computational activity. File transfer protocol. g - hot-plug - Integrated drive electronics. expansion-card connector - FTP - Gigabit(s); 1024 megabits or ...
...- flash memory - The FSB is usually rounded to 1,000,000,000 bytes. Gravities. Gb - Input/output. Integrated Dell Remote Access Controller. A remote access controller that implements communication between the system's bus and the peripheral device, typically a storage... Front-side bus. A controller that uses the Internet SCSI protocol. The Microsoft® Windows® operating systems can be differentiated from computational activity. File transfer protocol. g - hot-plug - Integrated drive electronics. expansion-card connector - FTP - Gigabit(s); 1024 megabits or ...
Glossary
Page 6
... must format each logical drive with a block of booting a system via a LAN (without a hard drive or bootable diskette). A single point on self-test. The primary computational chip inside the system that provides electrical power to servers and storage systems in rows and columns to signal the processor about hardware errors. Software...
... must format each logical drive with a block of booting a system via a LAN (without a hard drive or bootable diskette). A single point on self-test. The primary computational chip inside the system that provides electrical power to servers and storage systems in rows and columns to signal the processor about hardware errors. Software...
Glossary
Page 7
... - SEL - System event log. service tag - A method of independent disks. RAM - Random-access memory. SAS - Small computer system interface. Redundant array of providing data redundancy. Some common implementations of code in ROM include the program that enables remote networkattached storage...- See also mirroring and striping. R-DIMM - readme file - A text file, usually shipped with software or hardware, that you call Dell for program instructions and data. ROM - Read-only memory. RAID on the system used to connect a modem to the system. Storage ...
... - SEL - System event log. service tag - A method of independent disks. RAM - Random-access memory. SAS - Small computer system interface. Redundant array of providing data redundancy. Some common implementations of code in ROM include the program that enables remote networkattached storage...- See also mirroring and striping. R-DIMM - readme file - A text file, usually shipped with software or hardware, that you call Dell for program instructions and data. ROM - Read-only memory. RAID on the system used to connect a modem to the system. Storage ...
Glossary
Page 9
... capabilities). The logical circuitry that provides (in addition to host multiple operating systems. W - The amount of video memory installed primarily influences the number of a single computer across by the number of pixels up and down. Zero insertion force. 9 Watt-hour(s). VDC - A video adapter may be an expansion card that a program can...
... capabilities). The logical circuitry that provides (in addition to host multiple operating systems. W - The amount of video memory installed primarily influences the number of a single computer across by the number of pixels up and down. Zero insertion force. 9 Watt-hour(s). VDC - A video adapter may be an expansion card that a program can...
Glossary
Page 47
... - Redundant array of independent disks RAID には、RAID 0、RAID 1、RAID 5、 RAID 10 RAID 50 RAM - System event log 47 Small computer system interface I/O SD SD SDRAM - Serial Advanced Technology Attachment SCSI - POST - Remote access controller RAID - Random-access memory RAM readme ROM -
... - Redundant array of independent disks RAID には、RAID 0、RAID 1、RAID 5、 RAID 10 RAID 50 RAM - System event log 47 Small computer system interface I/O SD SD SDRAM - Serial Advanced Technology Attachment SCSI - POST - Remote access controller RAID - Random-access memory RAM readme ROM -
Glossary
Page 57
... ROM ROM ROM POST ROMB RAID(RAID On Motherboard SAN Storage Area Network SAS SCSI(Serial-Attached SCSI SATA Serial Advanced Technology Attachment SCSI Small Computer System Interface I /O SNMP Simple Network Management Protocol 57 Secure Digital SDRAM Synchronous Dynamic RandomAccess Memory sec - 초 (Second SEL System event log SMART Self-Monitoring...
... ROM ROM ROM POST ROMB RAID(RAID On Motherboard SAN Storage Area Network SAS SCSI(Serial-Attached SCSI SATA Serial Advanced Technology Attachment SCSI Small Computer System Interface I /O SNMP Simple Network Management Protocol 57 Secure Digital SDRAM Synchronous Dynamic RandomAccess Memory sec - 초 (Second SEL System event log SMART Self-Monitoring...
Dell DX Object Storage Platform User’s Guide
Page 2
...is subject to hardware or loss of data if instructions are registered trademarks of Dell Inc. CAUTION: A CAUTION indicates potential damage to change without the written permission of your computer. All rights reserved. Red Hat Enterprise Linux® and Enterprise Linux® ...are not followed. Dell Inc. October 2010 Rev. Information in this text: Dell™, the DELL logo, PowerEdge™, and OpenManage™ are ...
...is subject to hardware or loss of data if instructions are registered trademarks of Dell Inc. CAUTION: A CAUTION indicates potential damage to change without the written permission of your computer. All rights reserved. Red Hat Enterprise Linux® and Enterprise Linux® ...are not followed. Dell Inc. October 2010 Rev. Information in this text: Dell™, the DELL logo, PowerEdge™, and OpenManage™ are ...
DX Object Storage Getting Started Guide
Page 4
... hardware setup. Copyright © 2010 Caringo, Inc. DX Storage provides the integrity of primary storage. 1.1. Cluster of x86 computers/nodes with the performance of an archive with one or more physical volumes running DX Storage software 2. Scope This document covers...Storage DX Storage is expected to as the administrator. Storage system administrators 2. Audience This document is made up of standard x86 computer hardware. All rights reserved 1 Version 5.0 December 2010 The administrators are normally responsible for people in -depth administration information, see...
... hardware setup. Copyright © 2010 Caringo, Inc. DX Storage provides the integrity of primary storage. 1.1. Cluster of x86 computers/nodes with the performance of an archive with one or more physical volumes running DX Storage software 2. Scope This document covers...Storage DX Storage is expected to as the administrator. Storage system administrators 2. Audience This document is made up of standard x86 computer hardware. All rights reserved 1 Version 5.0 December 2010 The administrators are normally responsible for people in -depth administration information, see...
DX Object Storage Getting Started Guide
Page 7
... 4 Version 5.0 December 2010 This segregation is important so that DX Storage nodes have predicable network bandwidth for their multicast and unicast traffic doesn't interfere with computers on these workstations to which they are addressed. Additionally, the operating systems and applications running on the rest of bandwidth. Layer 3 Switching and Routing A router...
... 4 Version 5.0 December 2010 This segregation is important so that DX Storage nodes have predicable network bandwidth for their multicast and unicast traffic doesn't interfere with computers on these workstations to which they are addressed. Additionally, the operating systems and applications running on the rest of bandwidth. Layer 3 Switching and Routing A router...
DX Object Storage Getting Started Guide
Page 11
...NTP servers separated by setting the timeSource parameter in the node or cluster configuration files. All rights reserved 8 Version 5.0 December 2010 However, Dell strongly recommends you can be evenly distributed around the cluster. Basic options follow: • Define multiple DNS entries ("A" or "CNAME" ...of first contact be very useful for a DNS entry to use one name. Dell recommends that causes time to communicate with any node in a language other , DNS can use ?" If a computer's BIOS clock is required. An example follows: timeSource = 10.20.40.21...
...NTP servers separated by setting the timeSource parameter in the node or cluster configuration files. All rights reserved 8 Version 5.0 December 2010 However, Dell strongly recommends you can be evenly distributed around the cluster. Basic options follow: • Define multiple DNS entries ("A" or "CNAME" ...of first contact be very useful for a DNS entry to use one name. Dell recommends that causes time to communicate with any node in a language other , DNS can use ?" If a computer's BIOS clock is required. An example follows: timeSource = 10.20.40.21...
DX Object Storage Getting Started Guide
Page 24
... drive, some or all of its disks could be reformatted, leading to boot and initially configure a DX Storage node. Copyright © 2010 Caringo, Inc. 4.1.5. If a computer is a sample license: -----BEGIN PGP SIGNED MESSAGE----Hash: SHA1 DX Storage License File # # License S/N: 200804261512-8402 # Generated By: Eric Smith # Comments licenseFormat = 1.1 cn = ACME Widgets...
... drive, some or all of its disks could be reformatted, leading to boot and initially configure a DX Storage node. Copyright © 2010 Caringo, Inc. 4.1.5. If a computer is a sample license: -----BEGIN PGP SIGNED MESSAGE----Hash: SHA1 DX Storage License File # # License S/N: 200804261512-8402 # Generated By: Eric Smith # Comments licenseFormat = 1.1 cn = ACME Widgets...
DX Object Storage Getting Started Guide
Page 25
...without doing this, the changes might not be saved to use all available volumes on the node. Boot the DX Storage node from the computer after configuration editing has been completed. The easiest way to the node.cfg file. 4.2.2. Multiple reboots in a row indicate there might ... on the USB flash drive. 2. Set the cluster configuration parameter to name of disks that all Copyright © 2010 Caringo, Inc. Dell strongly recommends you should check the syslog server for content storage. To prevent confusion, both in the DX Storage startup process that prevents unexpected...
...without doing this, the changes might not be saved to use all available volumes on the node. Boot the DX Storage node from the computer after configuration editing has been completed. The easiest way to the node.cfg file. 4.2.2. Multiple reboots in a row indicate there might ... on the USB flash drive. 2. Set the cluster configuration parameter to name of disks that all Copyright © 2010 Caringo, Inc. Dell strongly recommends you should check the syslog server for content storage. To prevent confusion, both in the DX Storage startup process that prevents unexpected...
DX Object Storage Getting Started Guide
Page 26
... about the Admin Console, see the DX Object Storage Administration Guide. Attaching a monitor to make sure that no one (including your DX Storage nodes. If a computer is ready to : vols = /dev/sda /dev/sdb For more secure. DHCP or Static Network The simplest way to set vols to perform SNMP operations...
... about the Admin Console, see the DX Object Storage Administration Guide. Attaching a monitor to make sure that no one (including your DX Storage nodes. If a computer is ready to : vols = /dev/sda /dev/sdb For more secure. DHCP or Static Network The simplest way to set vols to perform SNMP operations...
DX Object Storage Application Guide
Page 27
... the final bytes are sent. The content digest is also available on ), as well as follows to return counts for a specific content stream to be computed and compared at the end. A hash mismatch will cause the socket connection to be returned from a DX Storage cluster. validate=yes to a node's IP address...
... the final bytes are sent. The content digest is also available on ), as well as follows to return counts for a specific content stream to be computed and compared at the end. A hash mismatch will cause the socket connection to be returned from a DX Storage cluster. validate=yes to a node's IP address...
DX Object Storage Application Guide
Page 42
... response. The APPEND method returns a response only after a successful APPEND is complete. If the client provides a Content-MD5 header with the APPEND request, DX Storage computes the digest of PUT, and as PUT. If a Content-MD5 header was persisted with the provided MD5 hash. Introduction to APPEND This section discusses general...
... response. The APPEND method returns a response only after a successful APPEND is complete. If the client provides a Content-MD5 header with the APPEND request, DX Storage computes the digest of PUT, and as PUT. If a Content-MD5 header was persisted with the provided MD5 hash. Introduction to APPEND This section discusses general...
DX Object Storage Application Guide
Page 53
You can compute the realm using a programming language, or a utility like Apache htdigest or md5sum. htdigest is granted the privilege. 3. Realm names cannot contain a colon character (:) or a comma ... against which includes an MD5 hash. 5. If no realms,DX Storage continues to determine if the request headers include an HTTP Authorization header. 2. A realm is computed from the string username:realm:password. An example of creating a bucket realm follows: htdigest -c cluster_example_com_bucket cluster.example.com/bucket fred.jones New password: Re-type...
You can compute the realm using a programming language, or a utility like Apache htdigest or md5sum. htdigest is granted the privilege. 3. Realm names cannot contain a colon character (:) or a comma ... against which includes an MD5 hash. 5. If no realms,DX Storage continues to determine if the request headers include an HTTP Authorization header. 2. A realm is computed from the string username:realm:password. An example of creating a bucket realm follows: htdigest -c cluster_example_com_bucket cluster.example.com/bucket fred.jones New password: Re-type...
DX Object Storage Application Guide
Page 64
...that is, not the entire stream). Alternatively, a client could instead include an Expect: Content-MD5 header with the object or not. If the computed and provided hashes do not match, DX Storage returns a 400 (Bad Request) error response, abandons the object, and closes the client connection. For... more information about Range headers, see the Content Metadata appendix. All rights reserved 59 Version 5.0 December 2010 Also, a client can also compute and return the Content-MD5 with the object data if the header was originally stored with a POST or PUT, which causes DX Storage to...
...that is, not the entire stream). Alternatively, a client could instead include an Expect: Content-MD5 header with the object or not. If the computed and provided hashes do not match, DX Storage returns a 400 (Bad Request) error response, abandons the object, and closes the client connection. For... more information about Range headers, see the Content Metadata appendix. All rights reserved 59 Version 5.0 December 2010 Also, a client can also compute and return the Content-MD5 with the object data if the header was originally stored with a POST or PUT, which causes DX Storage to...
DX Object Storage Application Guide
Page 76
... the hash value in the integrity seal. In addition to the host and name or UUID, the URL includes the hash type and hash value computed from the WRITE request (perhaps replacing the host address if connected to a different cluster or node), the application can ask DX Storage to obtain ... Upon receiving such a READ request, DX Storage recomputes the hash of hash algorithm that was stored using the supplied hashtype and compares the computed hash with the computed digest as usual with the hash value in the seal. This can be used for a given name or UUID is created one can request...
... the hash value in the integrity seal. In addition to the host and name or UUID, the URL includes the hash type and hash value computed from the WRITE request (perhaps replacing the host address if connected to a different cluster or node), the application can ask DX Storage to obtain ... Upon receiving such a READ request, DX Storage recomputes the hash of hash algorithm that was stored using the supplied hashtype and compares the computed hash with the computed digest as usual with the hash value in the seal. This can be used for a given name or UUID is created one can request...
DX Object Storage Administration Guide
Page 6
... storage cluster. About this document, the storage system administrator and network administrator roles will be referred to as an addendum to, not a replacement of x86 computers/nodes with SNMP monitoring tools. Cluster administrators 3. The reader is reviewed. TCP/IP network connecting cluster nodes and clients 1.3. Advanced Storage system administrators 2. Overview of...
... storage cluster. About this document, the storage system administrator and network administrator roles will be referred to as an addendum to, not a replacement of x86 computers/nodes with SNMP monitoring tools. Cluster administrators 3. The reader is reviewed. TCP/IP network connecting cluster nodes and clients 1.3. Advanced Storage system administrators 2. Overview of...
DX Object Storage Administration Guide
Page 15
.... 3.7.5. Cluster Name The name of the cluster is configurable through the node and/or cluster configuration files. 3.10. % Used Indicator The % Used indicator provides a helpful computation of cluster available, licensed and total physical space for full details. The indicators include color highlighting as this percentage, the more granular report of DX...
.... 3.7.5. Cluster Name The name of the cluster is configurable through the node and/or cluster configuration files. 3.10. % Used Indicator The % Used indicator provides a helpful computation of cluster available, licensed and total physical space for full details. The indicators include color highlighting as this percentage, the more granular report of DX...