10400455-002
©2008-14 Overland Storage, Inc.
284
SnapScale/RAINcloudOS 4.1 Administrator’s Guide
GL - Master Glossary & Acronym List
SMB
Short for
Server Message Block
. A protocol for Windows clients. SMB uses the TCP/IP protocol.
It is viewed as a complement to the existing Internet application protocols such as FTP and
HTTP. With SMB, you can access local server files, obtain read-write privileges to local server
files, share files with other clients, and restore connections automatically if the network fails.
SMTP
Short for
Simple Mail Transfer Protocol
. A TCP/IP protocol used for sending and receiving
email.
SNMP
Short for
Simple Network Management Protocol
. A system to monitor and manage network
devices such as computers, routers, bridges, and hubs. SNMP views a network as a collection
of cooperating, communicating devices, consisting of managers and agents.
SSH
Short for
Secure Shell
. A service that provides a remote console for special system
administration and customer support access to the server. SSH is similar to telnet but more
secure, providing strong encryption so that no passwords cross the network in clear text.
SSL
Short for
Secure Sockets Layer
. A protocol for managing the security of a message sent on the
Internet. It is a type of technology that provides data encryption, server authentication,
message integrity, and client authentication for any TCP/IP connection.
Standalone
A network bonding mode which treats each port as a separate interface. This configuration
should be used only in multihomed environments in which network storage resources must
reside on two separate subnets.
Static IP Address
An IP address defined by the system administrator rather than by an automated system, such
as DHCP.
Storage Area Network
See
.
Subnet Mask
A portion of a network that shares a common address component. On TCP/IP networks,
subnets are all devices with IP addresses that have the same prefix.
Target
A target is a device (peripheral) that responds to an operation requested by an initiator (host
system). Although peripherals are generally targets, a peripheral may be required to act
temporarily as an initiator for some commands (for example, SCSI COPY command).
Targets are embedded in iSCSI storage controllers. They are the software that makes the
RAID storage available to host computers, making it appear just like any other sort of disk
drive.