[Services] Acronym for Infrastructure as a Service.
[Network] Acronym for Internet Control Message Protocol.
[Storage System] Acronym for Integrated Drive Electronics.
[General] A property of an operation in which the same result is obtained no matter how many times the operation is performed.
In an environment with a single writer, writing a block of data to a disk is an idempotent operation, whereas writing a block of data to a tape is not, because writing a block of data twice to the same tape results in two adjacent copies of the block.
[Data Security] The process of determining the unique identity of an entity.
[Data Security] Representation of an actual user (or application or service or device).
[Storage System] A state in which a storage system is serving no user-initiated I/O requests, but is ready to service them upon arrival with normal latency.
Storage systems may perform extensive system-initiated I/O during idle periods as they execute routine background housekeeping tasks.
[Data Security] Acronym for Intrusion Detection System.
[Network] [Standards] Acronym for Internet Engineering Task Force.
[Fibre Channel] A field that is not interpreted by its receiver.
[Network] [Data Security] Acronym for Internet Key Exchange.
[iSCSI] Acronym for iSCSI Management API.
[Data Management] Acronym for Information Lifecycle Management.
[Storage System] A form of addressing usually used with tapes in which the data’s address is inferred from the form of the access request.
Tape commands that do not include an explicit block address but implicitly specify the next or previous block from the current tape position, from which the block address must be inferred by the device. See explicit addressing.
[SCSI] Synonym for entry/exit slot.
[Data Recovery] Acronym for Incremental Mirror Resynchronization.
[Storage System] Deprecated synonym for inline data deduplication.
[Computer System] Virtualization functions or services that are in the data path.
In a system that implements in-band virtualization, virtualization services such as address mapping are performed by the same functional components used to read or write data. See out-of-band virtualization
[Data Security] An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies. [NIST FIPS 200]
[Standards] Shorthand for International Committee for Information Technology Standards.
INCITS is one of about 100 standards organizations accredited by ANSI to prepare national standards and make recommendations to ANSI concerning international standards. INCITS assigns technical committees to prepare standards associated with information technology, including JPEG, computer security, biometric information, SCSI (Technical Committee T10), Fibre Channel (Technical Committee T11), and many more.
The INCITS T10 Technical Committee is the standards development committee accredited by INCITS to develop SCSI standards for communication between from host devices (initiators) to storage device controllers (targets).
The INCITS T11 Technical Committee is the standards development committee accredited by INCITS to develop standards related to Fibre Channel, related serial storage interfaces, and certain storage management interfaces.
[Data Recovery] Any backup in which only data objects modified since the time of some previous backup are copied.
Incremental mirror resynchronization requires that a list of changes to the original set of data since moment of splitting be kept. When the split mirror is rejoined to its original set of volumes, only the data items identified in the list are copied from the original to the split mirror (rather than the entire contents of the devices).
[Data Management] Data that is interpreted within a context such as an application or a process.
Information assurance encompasses system reliability and strategic risk management, and includes providing for restoration of information systems using protection, detection, and reaction capabilities.
[Data Management] The policies, processes, practices, services and tools used to align the business value of information with the most appropriate and cost-effective infrastructure from the time information is created through its final disposition.
Information is aligned with business requirements through management policies and service levels associated with applications, metadata and data.
[Data Management] The discipline and function of oversight and control of information resources.
[Data Management] The processes associated with managing information as it progresses through various lifecycle states associated with a Business Process.
These services exploit information about data content and relationships in making decisions. Examples include records management and content management applications.
[Data Management] A repository-independent definition of entities (i.e., objects) and the relationships and interactions between these entities.
[Management] The category of resources that exclusively encompass information services.
[Management] A set of functions that treat data within an interpretation context.
[Data Security] The entire infrastructure, organization, personnel and components for the collection, processing, storage, transmission, display, dissemination and disposition of information.
[General] All aspects of information creation, access, use, storage, transport and management.
The term Information Technology addresses all aspects of computer and storage systems, networks, users and software in an enterprise.
2. [SCSI] A delimited and sequenced set of information in a format appropriate for transport by the service delivery subsystem.
A SCSI IU may contain a command, data, response, or task management request.
[Computer System] Virtualization implemented in the storage fabric, in separate devices designed for the purpose, or in network devices.
Examples are separate devices or additional functions in existing devices that aggregate multiple individual file system appliances or block storage subsystems into one such virtual service, functions providing transparent block or file system mirroring functions, or functions that provide new security or management services.
[Services] Delivery over a network of an appropriately configured virtual computing environment, based on a request for a given service level.
Typically, IaaS is either self-provisioned or provisionless and is billed based on consumption.
[Fibre Channel] A process within a Routing Function that translates the D_ID, translates embedded N_Port_IDs and stores the Exchange context if needed, adds the IFR_Header and Enc_Header if needed, and then forwards the frame to the next hop Routing Function or Egress Routing Function.
[Computer System] The cost of a system expressed in terms of the number and type of components it contains.
The concept of inherent cost allows technology-based comparisons of disk subsystem alternatives by expressing cost in terms of number of disks, ports, modules, fans, power supplies, cabinets, etc. Because it is inexpensively reproducible, software is generally assumed to have negligible inherent cost.
The initial relative offset need not be zero.
1. [Fibre Channel] The startup and initial configuration of a device, element, system, piece of software or network.
1. [Computer System] The system component that originates an I/O command over an I/O interconnect.
[iSCSI] The unique identifier that an initiator assigns to its end point of the session.
[Storage System] Data deduplication performed before writing the deduplicated data.
[File System] A persistent data structure in a UNIX or UNIX-like file system that describes the location of some or all of the disk blocks allocated to the file.
[General] The creation of an instance of a class or object oriented abstraction.
[Computer System] A type of hardware interface widely used to connect hard disks, CD-ROMs and tape drives to a PC, but also used in other systems.
The IDE interface is officially known as the ATA specification.
[Data Security] Property of protecting the accuracy and completeness of assets.
[Storage System] Synonym for storage controller.
[Network] A high-performance standards-based I/O interconnect.
[Fibre Channel] The entire interconnection of Fabrics and Inter-Fabric Routers.
[Computer System] A physical facility by which system elements and devices are connected together and through which they can communicate with each other.
I/O buses and networks are both interconnects.
An interface connector consists of both a receptacle and a plug.
[Fibre Channel] A process within a Routing Function that validates the frame headers, updates the IFR_Header, removes and adds a new Enc_Header, then forwards the frame to the next hop Routing Function.
[Fibre Channel] A Fibre Channel class of service that provides a full bandwidth dedicated Class 1 connection, but allows connectionless Class 2 and Class 3 traffic to share the link during intervals when bandwidth is unused.
[Standards] A worldwide federation of national standards bodies from more than 145 countries; a non-governmental organization whose work results in international agreements that are published as International Standards and other types of ISO documents.
[Network] [Data Security] [Standards] A large open international community of network designers, operators, vendors, and researchers concerned with evolution and smooth operation of the Internet.
[Computer System] The ability of systems to work with or use data and protocols from other systems.
[Computer System] A hardware or software signal that causes a computer to stop executing its instruction stream and switch to another stream.
Software interrupts are triggered by application or other programs. Hardware interrupts are caused by external events, to notify software so it can deal with the events. The ticking of a clock, completion or reception of a transmission on an I/O interconnect or network, application attempts to execute invalid instructions or reference data for which they do not have access rights, and failure of some aspect of the computer hardware itself are all common causes of hardware interrupts.
[Computer System] A human-activated switch present on some intelligent devices that is used to generate interrupts.
Interrupt switches are usually used for debugging purposes.
[Fibre Channel] A Fibre Channel specification for copper cabling that allows up to 13m total cable length within a single enclosure, which may contain multiple devices.
[Data Security] A deliberate or accidental set of events that potentially causes unauthorized access to, activity against, and/or activity in, an information technology (IT) system.
[Data Security] The process of identifying that an intrusion has been attempted, is occurring, or has occurred.
[Data Security] A technical system that is used to identify and respond to intrusions in IT systems.
[Computer System] Shorthand for input/output.
I/O is the process of moving data between a computer system’s main memory and an external device or interface such as a storage device, display, printer, or network connected to other computer systems. This encompasses reading, or moving data into a computer system’s memory, and writing, or moving data from a computer system’s memory to another location.
In the context of storage subsystems, I/O adapters are contrasted with embedded storage controllers, that not only adapt between buses and interconnects, but also perform transformations such as device fan-out, data caching, and RAID. host bus adapters (HBAs) and Ethernet NICs are types of I/O adapters.
[Computer System] Any resource in the I/O path (e.g., device driver, host bus adapter, I/O interconnect, intelligent controller, or disk) whose performance limits the performance of a storage subsystem as a whole.
[Computer System] Synonym for I/O interconnect.
[Computer System] Synonym for I/O adapter.
[Computer System] A host computer software component (usually part of an operating system) whose function is to control the operation of peripheral controllers or adapters attached to the host computer.
I/O drivers manage communication and data transfer between applications and I/O devices, using host bus adapters as agents. In some cases, drivers participate in data transfer, although this is rare with disk and tape drivers, since most host bus adapters and controllers contain specialized hardware to perform data transfers.
[Computer System] A characterization of applications that describes how strongly their performance depends on the performance of the I/O subsystem that provides their I/O services.
I/O intensive applications may be either data transfer intensive or I/O request intensive or both.
[Computer System] Any path used to transfer data and control information between components of an I/O subsystem.
An I/O interconnect consists of wiring (either cable or backplane), connectors, and all associated electrical drivers, receivers, transducers, and other required electronic components. I/O interconnects are typically optimized for the transfer of data, and tend to support more restricted configurations than networks. See channel, device channel, network.
The requests that comprise an I/O load include both user I/O and host overhead I/O, such as swapping, paging, and file system activity.
[Computer System] Synonym for load balancing.
[Computer System] A read, write, or control function performed to, from or within a computer system.
See I/O request.
1. [Storage System] The ratio of maximum IOPS deliverable by a system, to the input power required to deliver those IOPS.
2. [Storage System] The ratio of maximum bandwidth readable or writable by a system, to the input power required to achieve that bandwidth.
[Computer System] A request by an application to read or write a specified amount of data.
[Computer System] A collective term for the set of devices and software components that operate together to provide data transfer services.
A storage subsystem is one type of I/O subsystem.
[Storage System] I/O Operations per second.
IOPS and read/write loads are not specified in this definition. Care must be taken when comparing systems that the I/O load used is as identical as possible. Comparisons of these quantities when I/O sizes and load mix are different may not be very meaningful.
[Network] Acronym for Internet Protocol.
[Network] [Data Security] A suite of cryptographic algorithms, protocols and procedures used to protect information, authenticate communications, control access, and provide non-repudiation at the IP layer.
[Computer System] Acronym for Intelligent Peripheral Interface.
[Network] [Data Security] Shorthand for IP Security.
[Storage System] Acronym for Internet Small Computer Systems Interface.
When a session has multiple connections, all connections in a session must use the portals in a single iSCSI Portal Group.
All portals in the group have the same iSCSI Portal Group Tag.
A session can contain one or more connections.
[iSCSI] Acronym for Initiator Session Identifier.
[iSCSI] Acronym for Internet Storage Name Service.
[iSNS] Grouping of storage nodes for facilitating discovery and login control of these nodes.
[Standards] Acronym for International Organization for Standardization.
[General] Acronym for Information Technology.
[Data Security] All aspects related to defining, achieving, and maintaining confidentiality, integrity, availability, non-repudiation, accountability, authenticity, and reliability of information assets. [ISO/IEC 1335]