12.07.2015 Views

IBM Tivoli Storage Manager for UNIX and Linux Backup-Archive ...

IBM Tivoli Storage Manager for UNIX and Linux Backup-Archive ...

IBM Tivoli Storage Manager for UNIX and Linux Backup-Archive ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

subscriptionIn a <strong>Tivoli</strong> environment, the process ofidentifying the subscribers that theprofiles are distributed to. For <strong>Tivoli</strong><strong>Storage</strong> <strong>Manager</strong>, a subscription is theprocess by which a managed serverreceives configuration in<strong>for</strong>mationassociated with a particular profile on aconfiguration manager. See also managedserver, configuration manager, <strong>and</strong> profile.Systems Network Architecture (SNA)The description of the logical structure,<strong>for</strong>mats, protocols, <strong>and</strong> operationalsequences <strong>for</strong> transmitting in<strong>for</strong>mationthrough <strong>and</strong> controlling the configuration<strong>and</strong> operation of networks.system privilege classA privilege class that gives anadministrator the authority to issue allserver comm<strong>and</strong>s. See also privilege class.Ttape libraryA set of equipment <strong>and</strong> facilities thatsupport an installation’s tapeenvironment. The tape library can includetape storage racks, mechanisms <strong>for</strong>automatic tape mounting, a set of tapedrives, <strong>and</strong> a set of related tape volumesmounted on those drives.tape volume prefixThe high-level-qualifier of the file nameor the data set name in the st<strong>and</strong>ard tapelabel.target nodeA client node <strong>for</strong> which other client nodes(called agent nodes) have been grantedproxy authority. The proxy authorityallows the agent nodes to per<strong>for</strong>moperations such as backup <strong>and</strong> restore onbehalf of the target node, which owns thedata.TCA See trusted communications agent.TCP/IPSee Transmission Control Protocol/InternetProtocol.threshold migrationThe process of moving files from a localfile system to <strong>Tivoli</strong> <strong>Storage</strong> <strong>Manager</strong>storage based on the high <strong>and</strong> lowthresholds that are defined <strong>for</strong> the filesystem. Contrast with dem<strong>and</strong> migration,selective migration, <strong>and</strong> migration job.throughputIn storage management, the total bytes inthe workload, excluding overhead, thatare backed up or restored, divided byelapsed time.timeoutA time interval that is allotted <strong>for</strong> anevent to occur or complete be<strong>for</strong>eoperation is interrupted.timestamp control modeA mode that determines whethercomm<strong>and</strong>s preserve the access time <strong>for</strong> afile or set it to the current time.<strong>Tivoli</strong> <strong>Storage</strong> <strong>Manager</strong> comm<strong>and</strong> scriptA sequence of <strong>Tivoli</strong> <strong>Storage</strong> <strong>Manager</strong>administrative comm<strong>and</strong>s that are storedin the database of the <strong>Tivoli</strong> <strong>Storage</strong><strong>Manager</strong> server. The script can run fromany interface to the server. The script caninclude substitution <strong>for</strong> comm<strong>and</strong>parameters <strong>and</strong> conditional logic.Transmission Control Protocol/Internet Protocol(TCP/IP)An industry-st<strong>and</strong>ard, nonproprietary setof communication protocols that providesreliable end-to-end connections betweenapplications over interconnected networksof different types.transparent recallThe process that is used to automaticallyrecall a file to a workstation or file serverwhen the file is accessed. See also recallmode. Contrast with selective recall.trusted communications agent (TCA)A program that h<strong>and</strong>les the sign-onpassword protocol when clients usepassword generation.UUCS-2 A 2-byte (16-bit) encoding scheme basedon ISO/IEC specification 10646-1. UCS-2defines three levels of implementation:Level 1-No combining of encodedelements allowed; Level 2-Combining ofencoded elements is allowed only <strong>for</strong>Thai, Indic, Hebrew, <strong>and</strong> Arabic; Level3-Any combination of encoded elementsare allowed.UNC See Universal Naming Convention name.Glossary 557

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!