You are here
Online SNIA Dictionary
[Computer System]
Abbreviation for input/output.
[Computer System]
An adapter that converts between the timing and protocol requirements of a system's memory bus and those of an I/O interconnect or network.
In the context of storage subsystems, I/O adapters are contrasted with embedded storage controllers, that not only adapt between buses and interconnects, but also perform transformations such as device fan-out, data caching, and RAID. Host bus adapters (HBAs) and Ethernet NICs are types of I/O adapters.
[Computer System]
Any resource in the I/O path that limits data transfer capacity of a system.
Examples of resources that may limit the data transfer capacity of a system include a device driver, host bus adapter, I/O interconnect, intelligent controller, and disk.
[Computer System]
Synonym for I/O interconnect.
[Computer System]
A host computer software component (usually part of an operating system) whose function is to control the operation of peripheral controllers or adapters attached to the host computer.
I/O drivers manage communication and data transfer between applications and I/O devices.
[Computer System]
A characterization of an application that describes how strongly performance depends on the performance of the I/O subsystem that provides I/O services to the application.
I/O intensive applications may be either data transfer intensive or I/O request intensive or both.
[Computer System]
Any path used to transfer data and control information between components of an I/O subsystem.
An I/O interconnect consists of cables, connectors, and all associated transmitters, receivers, and other required components. I/O interconnects are typically optimized for the transfer of data. See channel, device channel, network.
[Computer System]
A metric of I/O requests made to an I/O subsystem over a period of time.
[Computer System]
Load balancing of I/O.
[Computer System]
A read, write, or control function performed to, from or within a computer system.
See I/O request.
[Storage System]
1. The ratio of maximum IOPS deliverable by a system, to the input power required to deliver those IOPS.
2. The ratio of data transfer rate readable or writable by a system, to the input power required to achieve that data transfer rate.
[Computer System]
A request by an application to read or write a specified amount of data.
In the context of real and virtual disks, I/O requests specify the transfer of a number of blocks of data. See I/O operation.
[Computer System]
A set of devices and software components that operate together to provide data services.
A storage subsystem is one type of I/O subsystem.
[Network]
The first generation of a hardware bus typically used to connect management related devices to a system.
[Hardware]
The second generation of a hardware bus typically used to connect management related devices to a system.
[Services]
Acronym for Infrastructure as a Service.
[Network]
Acronym for Internet Control Message Protocol.
[Storage System]
Acronym for Integrated Drive Electronics.
[General]
A property of an operation in which the same result is obtained no matter how many times the operation is repeated.
[Computer System]
A property of an operation in which a single effect occurs no matter how many times the operation is invoked.
[Data Security]
The process of determining the unique identity of an entity.
[Data Security]
Representation of an actual user (or application or service or device).
An example is the assignment of the user name joej (the identity) to represent the human user Joe Jones for purposes of authentication and authorization.
[Storage System]
A state in which a storage system is serving no user-initiated I/O requests, but is ready to service them upon arrival with normal latency.
Storage systems may perform extensive system-initiated I/O during idle periods as they execute routine background housekeeping tasks.
[Energy]
The power consumption of a system that is idle.
[Network]
In a data stream using 8B/10B encoding, an ordered set of four transmission characters normally transmitted between frames to indicate that no data is being transmitted.
[Data Security]
Acronym for Intrusion Detection System.
[Network] [Standards]
Acronym for Internet Engineering Task Force.
[Network] [Fibre Channel]
A gateway-to-gateway protocol that provides fibre channel fabric services to fibre channel devices over a TCP/IP network.
[Network] [Data Security]
Acronym for Internet Key Exchange.
[Data Management]
Acronym for Information Lifecycle Management.
[iSCSI]
Acronym for iSCSI Management API.
[Storage System]
A form of addressing, usually used with tapes, in which the data's address is inferred from the form of the access request.
Tape commands that do not include an explicit block address but implicitly specify the next or previous block from the current tape position, from which the block address must be inferred by the device. See explicit addressing.
[SCSI]
Synonym for entry/exit slot.
[Network]
Transmission of a separate data stream, such as management information, over the same medium as the primary data stream.
See out-of-band.
[Storage System]
Deprecated synonym for inline data deduplication.
[Data Security]
An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies. [NIST FIPS 200]
[Data Security]
A method of sanitization that reduces a storage device or element to ash, in an approved facility. [ISO/IEC 27040]
[SCSI] [Standards]
The INCITS SCSI Storage Interfaces Technical Committee (INCITS TC T10).
The INCITS T10 Technical Committee is the standards development committee accredited by INCITS to develop SCSI standards for communication between from host devices (initiators) to storage device controllers (targets).
[Fibre Channel] [Standards]
The INCITS Fibre Channel Interfaces Technical Committee.
The INCITS T11 Technical Committee is the standards development committee accredited by INCITS to develop standards related to Fibre Channel, related serial storage interfaces, and certain storage management interfaces.
[Standards]
The INCITS ATA Storage Interfaces Technical Committee.
The INCITS T13 Technical Committee is the standards development committee accredited by INCITS to develop ATA standards for communication between a host and a storage device.
[Data Recovery]
A backup of data objects modified since a previous backup.
Incremental backup is a collective term for cumulative incremental backups and differential incremental backups. See full backup.
[Storage System]
A disk array whose data mapping is such that different member disks can execute multiple application I/O requests concurrently.
[Computer System]
An industry standard, channel-based, switched fabric interconnect architecture for server and storage connectivity
The committee standardizing InfiniBand™ is the InfiniBand® Trade Association.
[Fibre Channel]
A term indicating that at the FC-2 level, the amount of buffering available at the Sequence Recipient is assumed to be unlimited.
Buffer overrun must be prevented by each ULP by choosing an appropriate amount of buffering per sequence based on its maximum transfer unit size.
[Data Management]
Data that is interpreted within a context such as an application or a process.
[Data Security]
Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation.
Information assurance encompasses system reliability and strategic risk management, and includes providing for restoration of information systems using protection, detection, and reaction capabilities.
A frame header field indicating the category to which the frame payload belongs (e.g., Solicited Data, Unsolicited Data, Solicited Control and Unsolicited Control).
[Data Management]
The policies, processes, practices, services and tools used to align the business value of information with the most appropriate infrastructure from the time information is created through its final disposition.
Information is aligned with business requirements through management policies and service levels associated with applications, metadata and data.
[Data Management]
The discipline and function of oversight and control of information resources.
[Data Management]
The processes associated with managing information as it progresses through various lifecycle states associated with a business process.
These services exploit information about data content and relationships in making decisions. Examples include records management and content management applications.
[Data Management]
A repository-independent definition of entities (objects) and the relationships and interactions between these entities.
The CIM schemas are an example of an information model. An information model differs from a data model, which is repository-specific.
[Management]
The category of resources that exclusively encompass information services.
[Data Security]
Preservation of confidentiality, integrity and availability of information. [ISO/IEC 27000:2018]
In addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.
[Management]
A set of functions that treat data within an interpretation context.
[Data Security]
The entire infrastructure, organization, personnel and components for the collection, processing, storage, transmission, display, dissemination and disposition of information.
[General]
All aspects of digital information creation, access, use, storage, transport and management.
The term Information Technology addresses all aspects of computer and storage systems, networks, users and software in an enterprise.
[SCSI] [Fibre Channel]
- [SCSI] A delimited and sequenced set of information in a format appropriate for transport by the service delivery subsystem.
A SCSI IU may contain a command, data, response, or task management request.
- [Fibre Channel] A related collection of data specified by FC-4 to be transferred as a single FC-2 sequence.
[Services]
Delivery over a network of an appropriately configured virtual computing environment, based on a request for a given service level.
Typically, Infrastructure as a Service (IaaS) is either self-provisioned or provisionless and is billed based on consumption.
[Computer System]
Virtualization implemented in the storage fabric, in separate devices designed for the purpose, or in network devices.
Examples are separate devices or additional functions in existing devices that aggregate multiple individual file system appliances or block storage subsystems into one such virtual service, functions providing transparent block or file system mirroring functions, or functions that provide new security or management services.
A process within a Routing Function that translates the D-ID, translates embedded N-Port-IDs and stores the Exchange context if needed, adds the IFR-Header and Enc-Header if needed, and then forwards the frame to the next hop Routing Function or Egress Routing Function.
[Network]
The relative offset of the block or sub-block transmitted by the first frame in a sequence, specified by an upper layer protocol.
The initial relative offset need not be zero.
[Fibre Channel] [Computer System]
- [Computer System] The startup and initial configuration of a device, element, system, piece of software or network.
- [Fibre Channel] For FC-1, the period beginning with power on and continuing until the transmitter and receiver at that level become operational.
[SCSI] [Computer System]
1. [Computer System] The system component that originates an I/O command over an I/O interconnect.
2. [SCSI] The endpoint that originates a SCSI I/O command sequence.
I/O adapters, network interface cards, and intelligent I/O interconnect control ASICs are typical initiators. See LUN, originator, target, target port identifier.
[Fibre Channel]
NVMe-Port that is the NVMe host port for an NVMe-oF/FC association.
[SCSI]
The interconnect address of an initiator.
[iSCSI]
The unique identifier that an initiator assigns to its end point of the session.
When combined with the iSCSI Initiator Name, the Initiator Session Identifier provides a worldwide unique name for its SCSI Initiator Port.
[Storage System]
Data deduplication performed before writing the deduplicated data.
[File System]
A persistent data structure in a UNIX or UNIX-like file system that describes the location of some or all of the disk blocks allocated to a file.
The process of moving data between a computer system's main memory and an external device or interface.
Input/output (I/O) encompasses reading, or moving data into a computer system's memory from another location, and writing, or moving data from a computer system's memory to another location. Example locations include storage device, display, printer, or network connected to another computer system.
[General]
The creation of an instance of a class or object oriented abstraction.
[Computer System]
A type of hardware interface formerly used to connect hard disks, CD-ROMs and tape drives to a PC.
The IDE interface is defined by the ATA specification.
[Data Security]
Property of accuracy and completeness. [ISO/IEC 27000:2018]
[Computer System]
A device for handling requests that includes a processor or sequencer programmed to autonomously process a substantial portion of requests.
A storage controller is an example of an intelligent controller.
[Computer System]
A computer, storage controller, storage device, or appliance.
[Management]
A protocol used to perform management and monitoring operations on a system independent of the host system components.
The entire interconnection of Fabrics and Inter-Fabric Routers.
A device that performs Inter-Fabric Routing and consists of a Routing Function, Translate Domain switches, and Front Domain switches.
The process of forwarding frames through a specific Routing Function, including the translation of N_Port_IDs.
[Computer System]
A physical means by which system elements and devices are connected together and through which they can communicate with each other.
I/O buses and networks are examples of interconnects.
[Network]
An optical or electrical connector that connects the media to the transmitter or receiver.
An interface connector consists of a receptacle and a plug.
A process within a Routing Function that validates the frame headers, updates the IFR-Header, removes and adds a new Enc_Header, then forwards the frame to the next hop Routing Function.
A Fibre Channel class of service that provides a full data transfer capacity dedicated Class 1 connection, but allows connectionless Class 2 and Class 3 traffic to share the link during intervals when data transfer capacity is unused.
[Standards]
A worldwide federation of national standards bodies.
A non-governmental organization, covering more than 145 countries, whose work results in international agreements that are published as International Standards and other types of ISO documents.
[Network] [Data Security] [Standards]
The community concerned with evolution and operation of the Internet.
The IETF is the standards body responsible for Internet standards called RFCs, including SNMP, TCP/IP and policy for QoS. The IETF has a web site at www.ietf.org.
[Network] [Data Security]
A protocol specified by the IETF that performs mutual authentication between two parties and establishes an IKE Security Association (SA) that includes shared secret information that can be used to efficiently establish SAs for Encapsulating Security Payload (ESP) or Authentication Header (AH) and a set of cryptographic algorithms to be used by the SAs to protect the traffic that they carry.
IKEv2 is defined in RFC-4306.
IKE Version 2 (IKEv2) is not compatible with Version 1.
[Network]
A standard protocol that provides connectionless, best effort delivery of datagrams across heterogeneous physical networks.
[Storage System]
A transport protocol that provides for the SCSI protocol to be carried over a TCP based IP network, standardized by the Internet Engineering Task Force and described in RFCs 791, 1122, 2003, and 3720.
[Computer System]
The ability of systems to work with or use data and protocols from other systems.
[Computer System]
A hardware or software signal that causes a computer to stop executing its instruction stream and switch to another stream.
Software interrupts are triggered by application or other programs. Hardware interrupts are caused by external events, to notify software so it can deal with the events.
A Fibre Channel specification for copper cabling that allows up to 13m total cable length within a single enclosure, which may contain multiple devices.
[Data Security]
Unauthorized access to a network or a network-connected system, that is, deliberate or accidental unauthorized access to information systems, to include malicious activity against information systems, or unauthorized use of resources within information systems. [ISO/IEC 27039:2015]
[Data Security]
The process of identifying that an intrusion has been attempted, is occurring, or has occurred.
[Data Security]
Technical system that is used to identify that an intrusion has been attempted, is occurring, or has occurred and possibly respond to intrusions in information systems and networks. [ISO/IEC 27039:2015]
[Storage System]
Shorthand for I/O Operations per second.
IOPs can also be the plural of IOP (short for I/O operation), depending on context.
[Energy]
Input/Output operations per second per watt.
IOPS/W is a metric for evaluating storage I/O performance per unit of power.
[Network]
Acronym for Internet Protocol.
[Network] [Data Security]
A suite of cryptographic algorithms, protocols and procedures used to protect information, authenticate communications, control access, and provide non-repudiation at the IP layer.
The two key protocols in IPsec are the Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols.
[Hardware]
Acronym for Intelligent Platform Management Interface.
[Network] [Data Security]
Shorthand for IP security.
[Storage System]
Acronym for internet Small Computer Systems Interface.
[iSCSI]
A SCSI device using an iSCSI service delivery subsystem, in other words an iSCSI-specific transport mechanism for SCSI commands and responses.
[iSCSI]
The initiator in an iSCSI Device.
[iSCSI]
A SCSI initiator port used for iSCSI.
[iSCSI]
The layer that builds/receives iSCSI Protocol Data Units and relays/receives them to/from one or more TCP connections that form an iSCSI session.
[iSCSI]
A component of an iSCSI Network Entity that has a TCP/IP address and can be used by a node within that component for connections to another iSCSI Node.
An Initiator iSCSI Network Portal is identified by its IP address. A target iSCSI Network Portal is identified by its IP address and listening TCP port.
[iSCSI]
A single iSCSI Initiator Node or iSCSI Target Node.
[iSCSI]
A set of iSCSI Network Portals within an iSCSI Node.
When a session has multiple connections, all connections in a session must use the portals in a single iSCSI Portal Group.
[iSCSI]
A tag identifying all portals in an iSCSI Portal Group.
[iSCSI]
Block-level Storage Area Network over TCP/IP using the iSCSI protocol.
[iSCSI]
The top level relationship between a specific iSCSI Initiator Node and iSCSI Target Node, equivalent to the I_T nexus.
A session contains one or more connections.
[iSCSI]
A unique identifier for a session between an iSCSI Initiator Node and iSCSI Target Node.
[iSCSI]
The worldwide unique name of an iSCSI Target Node.
[iSCSI]
A SCSI target port used for iSCSI.
[iSCSI]
Acronym for Initiator Session Identifier.
[iSCSI]
Acronym for Internet Storage Name Service.
[iSCSI]
Grouping of storage nodes for facilitating discovery and login control of these nodes.
[Standards]
Acronym for International Organization for Standardization.
[General]
Acronym for Information Technology.
[Data Security]
All aspects related to defining, achieving, and maintaining confidentiality, integrity, availability, non-repudiation, accountability, authenticity, and reliability of information assets.
[General]
Acronym for Information Unit.
[Network] [Storage System]
The Internet Wide Area Remote Direct Memory Access Protocol.
See IETF RFC 7306.
[SCSI]
A relationship specified in SAM between a SCSI initiator port and a SCSI target port.
Advancing Storage and Information Technology
Explore, discover, share, and meet other like-minded industry members. Get ahead, stay ahead, and create industry curves. Become a SNIA member today!
SNIA International
Discover SNIA
SNIA Blogs
Site Map | Contact Us | Privacy Policy | Chat provider: LiveChat