Compute Blade Built-In LAN Switch Module Software Manual Operation Commands, Vol

Total Page:16

File Type:pdf, Size:1020Kb

Compute Blade Built-In LAN Switch Module Software Manual Operation Commands, Vol Compute Blade Built-in LAN Switch Module Software Manual Operation Commands, Vol. 1 Ver.10.5 and 10.7 and 11.6 compatible BSLANSW-S003X-50 MK-99COM094-01 HITACHI Applicable product This manual describes model Compute Blade Built in LAN Switch Module. It also describes Built in LAN Switch Module software Ver.10.5 and Ver.10.7 and 11.6 functions. Software functions supported by software OS-L3A and OS-L3SA is also described. ------------------------------------------------------------------- The BladeSymphony server name has been changed to Hitachi Compute Blade. If you are using BladeSymphony based server products, substitute references to Hitachi Compute Blade with BladeSymphony. This manual describes as substitution product code GV-BE2LSW1X1-Y for GV-BE2LSW1XR-Y and GV-BE2LSW2X1-Y for GV-BE2LSW2XR-Y. If you use OS-L3SA, please add the prefix of ‘0/’ to the interface number of gigabitethernet to be specified by some commands. ------------------------------------------------------------------- Caution when exporting The necessary procedures are to be adopted when exporting this product after first confirming the regulations of the Foreign Exchange and Foreign Trade Law, U.S. export control related regulations, etc. If any questions remains, please consult with our sales department. Trademarks Cisco is a registered trademark of U.S. Cisco Systems, Inc. in the U.S. and other countries. Ethernet is a product name of the Xerox Corp. IPX is a trademark of Novell,Inc. Microsoft is a registered trademark of the Microsoft Corp. in the U.S. and other countries. Octpower is a trademark of NEC Corporation. UNIX is a registered trademark in the U.S. and other countries exclusively licensed by X/Open Company Limited. Windows is a registered trademark of the Microsoft Corp. in the U.S. and other countries. Other company names and product names are trademarks or registered trademarks of their respective companies. Thoroughly read and store this manual Read and thoroughly understand safety-related explanations before using this product. Keep this manual in a location close at hand for easy reference. Note The contents of this manual may be modified at any time for improvement without notice. Issue date Jan. 2014 (8th edition) BSLANSW-S003X-50 Copyright Copyright (c) Hitachi, Ltd. 2006 - 2014. All rights reserved. Summary of amendments 8th edition Integrated the description of all switch model. In addition to the following changes, minor editorial corrections have been made. [Ver. 11.6] Location Changes 8 Software Version and System Status Check • New parameter:loopback was added to show tcpdump (tcpdump)command 9 Power Saving Functionality • This chapter was added 21 Ring Protocol • The following commands was added: clear axrp preempt-delay 22 IGMP/MLD snooping • New marameter was added to the following commands: show igmp-snooping show mld-snooping 23 Filtering • New marameter was added to the following commands: show access-filter clear access-filter 26 Web Authentication • The following commands was added: clear web-authentication dead-interval-timer 27 MAC Authentication • The following commands was added: clear web-authentication dead-interval-timer 28 DHCP Snooping • This chapter was added 29 GSRP • The following commands was added: clear gsrp forced-shift 7th edition Addtion of some product code. 6th edition The BladeSymphony server name has been changed to Hitachi Compute Blade. 5th edition Model Name addition 4th edition In addition to the above changes, minor editorial corrections have been made. [Ver. 10.7] Location Changes 8 Software Version and System Status Check • Description of the " show version" command is modified. • show tech-support command "Table 8-11 show tech-support command display" was added to a description of the link errors. 14 Dump Information • Description of the " show dumpfile" command is modified. 16 Ethernet • Note on the server models is added to the inactivate command. • Description of the following commands are changed. • show interfaces • show port 19 VLAN • Description of the configuration parameter is added to the " show vlan" command. 20 Spanning Tree • Description of the following commands are changed. • show spanning-tree • show spanning-tree statistics • show spanning-tree port-count 26 Web Authentication • The list of operation log messages of the " show web-authentication logging" command is modified. 27 MAC Authentication • This chapter was added. 29 GSRP • Description of the " show gsrp" commands are changed. 33 L2 Loop Detection • This chapter was added. [Ver. 10.5.A.A] Location Changes 8 Software Version and System Status Check • The description concerning the explanation of "ssss....ssss" of "H/W" of "show version" was changed. 15 Management port • This chapter was added. 16 Ethernet • The description of 10GBASE-R was added. 19 VLAN • The description related to the Ring Protocol was added to "show vlan" command. 20 Spanning Tree • "active" parameter for "show spanning-tree" command was added. • "show spanning-tree port-count" command was added. 21 Ring Protocol • This chapter was added. 22 IGMP/MLD snooping • The description of IGMPv3 was added. 26 Web Authentication • This chapter was added. 31 uplink-failover • This chapter was added. 32 IEEE802.3ah/UDLD • This chapter was added. 35 sFlow • This chapter was added. In addition to the above changes, minor editorial corrections have been made. [Ver. 10.5.A] Unreleased [Ver. 10.5] Unreleased [Ver. 10.4] Unreleased [Ver. 10.3] Unreleased [Ver. 10.2] No Change Introduction Introduction Intended products and software versions This manual describes models Compute Blade Built-in LAN Switch Module. It also describes the functions of Compute Blade Built-in LAN Switch Module’s software Ver. 10.5 and 10.7 and 11.6. Software functions supported by software OS-L3A and OS-L3SA is also described. Please read the manual carefully and thoroughly understand the instructions and cautions contained herein before operating the device. Keep the manual in a location close at hand for easy reference when necessary. A common function to all models is described in this manual as long as it doesn't refuse especially. When use Compute Blade 2000 and 500, please read the description of Compute Blade 320 to Compute Blade 2000 or 500. A peculiar function to Compute Blade 2000 and 500 or either Compute Blade 320 is shown respectively by the following marks. [CB 2000]: It is a function that supports it by the model of Compute Blade 2000 and 500. It is a function not to support in the model of Compute Blade 320 or a description that doesn't correspond. [CB 320]: It is a function that supports it by the model of Compute Blade 320. It is a function not to support in the model of Compute Blade 2000 and 500, or a description that doesn't correspond. [OS-L3A]: It is a function that supports it by OS-L3A for Compute Blade 320, 2000 and 500 LAN switch module. [OS-L3SA]: It is a function that supports it by OS-L3SA for Compute Blade 500 1Gbps(40 port) LAN switch module. Correction of this manual Contents in this manual may be corrected in the "Release note" and "Manual correction document" provided with software. Intended users Applicable users are system managers who develop and operate network systems using this system. In addition, an understanding of the following is assumed. • Basic knowledge of network system management Sequence of manual perusal Manuals to be referenced according to the flow of tasks from installation and setup to daily operations are indicated below. I Introduction Conventions: abbreviations AC Alternating Current ACK ACKnowledge ADSL Asymmetric Digital Subscriber Line ALG Application Level Gateway ANSI American National Standards Institute ARP Address Resolution Protocol AS Autonomous System AUX Auxiliary BGP Border Gateway Protocol II Introduction BGP4 Border Gateway Protocol - version 4 BGP4+ Multiprotocol Extensions for Border Gateway Protocol - version 4 bit/s bits per second, usually abbreviated as bps. BPDU Bridge Protocol Data Unit BRI Basic Rate Interface CDP Cisco Discovery Protocol CIDR Classless Inter-Domain Routing CIR Committed Information Rate CIST Common and Internal Spanning Tree CLNP ConnectionLess Network Protocol CLNS ConnectionLess Network System CONS Connection Oriented Network System CRC Cyclic Redundancy Check CSMA/CD Carrier Sense Multiple Access with Collision Detection CSNP Complete Sequence Numbers PDU CST Common Spanning Tree DA Destination Address DC Direct Current DCE Data Circuit terminating Equipment DHCP Dynamic Host Configuration Protocol DIS Draft International Standard/Designated Intermediate System DNS Domain Name System DR Designated Router DSAP Destination Service Access Point DSCP Differentiated Services Code Point DTE Data Terminal Equipment DVMRP Distance Vector Multicast Routing Protocol E-Mail Electronic Mail EAP Extensible Authentication Protocol EAPOL EAP Over LAN EFM Ethernet in the First Mile ES End System FAN Fan Unit FCS Frame Check Sequence FDB Filtering DataBase FTTH Fiber To The Home GBIC GigaBit Interface Converter GSRP Gigabit Switch Redundancy Protocol HMAC Keyed-Hashing for Message Authentication IANA Internet Assigned Numbers Authority ICMP Internet Control Message Protocol ICMPv6 Internet Control Message Protocol version 6 ID Identifier IEC International Electrotechnical Commission IEEE Institute of Electrical and Electronics Engineers, Inc. IETF the Internet Engineering Task Force IGMP Internet Group Management Protocol IP Internet Protocol IPCP IP Control Protocol IPv4 Internet Protocol version
Recommended publications
  • Networker Jukebox Control Command Nsrjb
    Maintenance Procedures NSRJB ( 8 ) NAME nsrjb − NetWorker jukebox control command SYNOPSIS nsrjb [ −C ][−j name ][−s server ][−v ][−f device ][−S slots | −T Ta gs | volume names ] nsrjb −L [ −j name ][−s server ][−gimnqvG ][−Y | −N ][−R | −B ][−b pool ][−f device | −J hostname ][−e forev er ][−c capacity ][−o mode ][−S slots | −T tags | volume names ] nsrjb −l [ −j name ][−s server ][−nvqrG ][−R [ −b pool ]][−f device | −J hostname ][−S slot | −T tags | volume names ] nsrjb −u [ −j name ][−s server ][−qv ][−f device ][−S slot | −T tags | volume names ] nsrjb −I [ −j name ][−s server ][−Evpq ][−I | −f device ][−S slots | −T tags | volume_names ] nsrjb −p [ −j name ][−s server ][−vq ][−f device ][−S slot | −T tag | volume name ] nsrjb −o mode [ −j name ][−s server ][−Y ][−S slots | −T tags | volume names ] nsrjb −H [ −j name ][−s server ][−EHvp ] nsrjb −h [ −j name ][−s server ][−v ] nsrjb −U uses [ −j name ][−s server ][−S slots | −T tags ] nsrjb −V [ −j name ][−s server ] nsrjb −d [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots ][−T tags ][volume names ] nsrjb −w [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots | −T tags | volume names ] nsrjb −a [ −j name ][−s server ][−vd ][−T tags |[−T tags ] volume names ] nsrjb −x [ −j name ][−s server ][−vwX ][−T tags | −S slots ] nsrjb −F [ −j name ][−s server ][−v ] −f device DESCRIPTION The nsrjb program manages resources in two broad classes of jukeboxes, remotely managed jukeboxes and locally managed jukeboxes. Remotely managed jukeboxes are controlled through an external agent.
    [Show full text]
  • Command Control Interface Command Reference
    Command Control Interface Command Reference Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Contents Product Version Getting Help MK-90RD7009-19 © 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries.
    [Show full text]
  • U.S. EPA, Pesticide Product Label, COMMAND 4E HERBICIDE, 09/02
    Don carlson, Ph.D. FMC corporation Agricultural Chemical Group 1735 Market street Philadelphia, PA 1910 3 Dear Dr. Carlson: Subject: Camand 4 EC Herbi,lde EPA Reg. No. 279-30~1 RE: Amended Labeling (tillage/nQ-tillage directions) Your Submission Dated August 13, 1992 ~he labeling refprred to above, submitted in connection with registration under the Federal Insecticide, Fungicide, and Rodenticide Act, as amended, is acceptable. A stamped copy is enclosed for your records. Sincerely yours, Robert J. Taylor Product I'anager (25) Fungicide-Herbicide Branch Registration Division (H7505C) CONCURRENCES SYMBOL;: l/7.)~.$P" ............... ... .................. ................. ................. ................................................... ::N£AM~, '%f:1; .... ........................................................................................................................ OFFICIAL FILE COPY _ i2 a a all a an a. .a $A 4SQS4 4t P ) ) Code 1139 Net Contents Command®4 E Herbicide For Agricultural or Commercial Use Only NOT FOR SALE OR USE IN CAUFORNIA EPA Reg. No. 279-3071 EPA Est. 279- Active Ingredient: By Wt. Clomazone: 2-(2-Chlorophenyl)methyl-4. 4-dimethyl-3-isoxazolidinone •...........••••..... 44.4% Inert Ingredients: .........•..............•......... 55.6% 100.0% Contains 4 pounds 01 active ingredient per gallon U.S. Patent No. 4.405,357 KEEP OUT OF REACH OF CHILDREN CAUTION FIRST AID " In SyH: Flush with plenty 0/ water. Get medical attention as AtlL.C OF CONTENTS 'Ossible. ' aI inlormations an pages 1-4 belore referring 10 specific ; swallowed: Drink prompUy large quatltities 01 crop use. alcohol. Do nol ind~'C8 vomiting. cau a physician, " Inh8led: Remove to fresh air. " Page lion. prelerably mouth·to-mouth.·. possible. ~~.::::::::::::::::::::::::::::::::::::::::::::: 1 Precautionary Statements ............................ ... 1 " on akin: Wash Skin Diredions lor Use ....................................... 1 allention. ~ and ~ ...............•.......•.......•... 2 For Emergency f!prayer CIeanuo ......................................
    [Show full text]
  • Weed Control Guide for Ohio, Indiana and Illinois
    Pub# WS16 / Bulletin 789 / IL15 OHIO STATE UNIVERSITY EXTENSION Tables Table 1. Weed Response to “Burndown” Herbicides .............................................................................................19 Table 2. Application Intervals for Early Preplant Herbicides ............................................................................... 20 Table 3. Weed Response to Preplant/Preemergence Herbicides in Corn—Grasses ....................................30 WEED Table 4. Weed Response to Preplant/Preemergence Herbicides in Corn—Broadleaf Weeds ....................31 Table 5. Weed Response to Postemergence Herbicides in Corn—Grasses ...................................................32 Table 6. Weed Response to Postemergence Herbicides in Corn—Broadleaf Weeds ..................................33 2015 CONTROL Table 7. Grazing and Forage (Silage, Hay, etc.) Intervals for Herbicide-Treated Corn ................................. 66 OHIO, INDIANA Table 8. Rainfast Intervals, Spray Additives, and Maximum Crop Size for Postemergence Corn Herbicides .........................................................................................................................................................68 AND ILLINOIS Table 9. Herbicides Labeled for Use on Field Corn, Seed Corn, Popcorn, and Sweet Corn ..................... 69 GUIDE Table 10. Herbicide and Soil Insecticide Use Precautions ......................................................................................71 Table 11. Weed Response to Herbicides in Popcorn and Sweet Corn—Grasses
    [Show full text]
  • Cheatsheet V2.4.Pdf
    ! ! 2.4!Edition! Cross!reference!processes!with!various!lists:! Scan!a!block!of!code!in!process!or!kernel!memory! psxview! for!imported!APIs:! ! impscan!! Show!processes!in!parent/child!tree:! !!!!Hp/HHpid=PID!!!!!!!!!Process!ID!! pstree! !!!!Hb/HHbase=BASE!!!Base!address!to!scan! & !!!!Hs/HHsize=SIZE!!!!!!!Size!to!scan!from!start!of!base! Process&Information& ! ! Logs&/&Histories& Specify!–o/HHoffset=OFFSET!or!Hp/HHpid=1,2,3!! ! ! Recover!event!logs!(XP/2003):! Display!DLLs:! evtlogs!! ! ! dlllist! !!!!HS/HHsaveHevt!!!!!!!!!!!!!!!!!!!!Save!raw!event!logs! Development!build!and!wiki:! ! !!!!HD/HHdumpHdir=PATH!!!Write!to!this!directory! github.com/volatilityfoundation!! Show!command!line!arguments:! ! ! cmdline! Recover!command!history:! Download!a!stable!release:! ! cmdscan!and!consoles!! volatilityfoundation.org!! Display!details!on!VAD!allocations:! ! ! vadinfo![HHaddr]! Recover!IE!cache/Internet!history:! Read!the!book:! ! iehistory!! artofmemoryforensics.com! Dump!allocations!to!individual!files:! ! ! vaddump!HHdumpHdir=PATH![HHbase]! Show!running!services:! Development!Team!Blog:! ! svcscan!! http://volatilityHlabs.blogspot.com!! Dump!all!valid!pages!to!a!single!file:! !!!!Hv/HHverbose!!!!Show!ServiceDll!from!registry! ! memdump!HHdumpHdir=PATH! ! (Official)!Training!Contact:! ! Networking&Information& Display!open!handles:! [email protected]!! ! handles!! ! Active!info!(XP/2003):! !!!!Ht/HHobjectHtype=TYPE!!!Mutant,!File,!Key,!etc…! Follow:!@volatility! connections!and!sockets!! !!!!Hs/HHsilent!!!!!!!!!!!!!!!!!!!!!!!!!!!Hide!unnamed!handles!
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • Command Control Interface Command Reference Error Codes
    Command Control Interface 01-43-03-01 Command Reference This document describes and provides instructions for using the Command Control Interface (CCI) software to configure and perform operations on the Hitachi RAID storage systems. Hitachi Virtual Storage Platform G series and F series Hitachi Virtual Storage Platform Hitachi Unified Storage VM Hitachi Universal Platform V/VM MK-90RD7009-33 October 2017 © 2010, 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively, “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.HitachiVantara.com/ en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements.
    [Show full text]
  • LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS
    LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS Commands,Rules for naming files in DOS and Types of files Operating System Operating system is a set of software that controls and manages hardware and basic system operations for a computer. The operating system loads programs into the computer's memory, runs these programs, and manages peripherals like disks and printers. Example: Disk Operating System (DOS) Windows LINUX Mac UNIX Disk Operating System (DOS) • In the 1980s or early 1990s, the operating system that shipped with most PCs was a version of the Disk Operating System (DOS) created by Microsoft: MS-DOS. • MS-DOS is a disk-based, single-user, single-task and character based user interface (CUI) operating system. Goto MSDOS from Windows Operating System: Click Start Button Choose Program Choose Accessories Click Command Prompt as shown below: Or Click Start Button Choose Run Type cmd in the Open tab as shown below: Command Prompt will get displayed as shown: The DOS commands can be entered in the command prompt and executed. Some Examples of DOS commands DIR Command The dir command allows you to see the available files in the current and/or parent directories. Examples: 1. DIR Lists all files and directories in the directory that you are currently in. 2. dir /w If information on the date / time and other information on the files are not needed, then this command can be used to list just the files and directories going horizontally, taking as little as space needed. 3. dir /on List the files in alphabetical order by the names of the files.
    [Show full text]
  • Introduction: DOS (Disk Operating System) Is an Oldest Type of Operating System
    DOS (Disk Operating System) 1 Introduction: DOS (Disk Operating System) is an oldest type of Operating System. Disk Operating System is abbreviated as DOS. DOS is a CUI type of Operating System. In computer science, a generic term describing any operating system is system software which is loaded from disk devices when the system is started or rebooted. DOS is a single-tasking, single-user operating system with a command-line interface. DOS acts on commands. Because DOS is ready to perform when given proper command hence, it is also known as Command Prompt. Commands are certain words of English language or short form of English words. The meaning of these word or short form is already known to DOS. Since, DOS recognized these words and hence acts accordingly. These words and short forms of the English words are better known as commands. Internal Command:-Those commands which are already stored in the “Command.Com” file of DOS are known as internal commands. For example, CLS, VOL, TIME, DATE, COPY etc External Command:-Those commands which are not included in the command.com file of DOS rather included in other files of DOS are known as external commands. It is formatted according to programme. For example, TREE, FORMAT, MODE etc Some Internal Commands:- 1. CLS To clear the screen. \>cls 2. DIR To view the directory and files C:\>Dir 3. DATE To View and change the date C:\>Date Current date is: 01-01-2008 Enter new date (mm/dd/yy):21-03-2009 4. TIME To view and change the time.
    [Show full text]
  • SVC and Storwize V7000 Replication Family Services Chapter 4
    Front cover IBM System Storage SAN Volume Controller and Storwize V7000 Replication Family Services Describes new Replication Family Services functionality Provides server integration examples Includes scripting examples Jon Tate Rafael Vilela Dias Ivaylo Dikanarov Jim Kelly Peter Mescher ibm.com/redbooks International Technical Support Organization IBM System Storage SAN Volume Controller and Storwize V7000 Replication Family Services March 2013 SG24-7574-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2013) This edition applies to IBM System Storage SAN Volume Controller and IBM System Storage Storwize V7000 Replication Family Services at an SVC Version6.4 code level. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Summary of changes. xiii March 2013, Third Edition . xiii Preface . .xv The team who wrote this book . .xv Now you can become a published author, too! . xvii Comments welcome. xviii Stay connected to IBM Redbooks . xviii Chapter 1. Introduction to Replication Family Services . 1 1.1 FlashCopy . 2 1.2 Metro Mirror and Global Mirror . 2 1.2.1 Global Mirror with Change Volumes . 2 1.3 Volume Mirroring function . 2 1.3.1 Stretched Cluster Volume Mirroring . 3 Chapter 2. Planning for Replication Family Services . 5 2.1 High-level design. 6 2.1.1 Defining your project . 6 2.1.2 Functional requirements . 6 2.1.3 Non-functional requirements. 7 2.1.4 Prior to implementation .
    [Show full text]
  • Santricity 11.30 Maintaining a Storage Array Using the Command
    SANtricity® 11.30 Maintaining a Storage Array using the Command Line Interface August 2016 | 215-11215_A0 [email protected] Table of Contents | 3 Contents Deciding whether to use this guide ............................................................. 5 About the command line interface .............................................................. 6 Structure of a CLI command ....................................................................................... 6 Interactive mode .............................................................................................. 7 Command line parameters ............................................................................... 8 CLI command wrapper syntax ...................................................................... 12 Naming conventions .................................................................................................. 14 Formatting CLI commands ....................................................................................... 15 Formatting rules for script commands ...................................................................... 15 Formatting CLI commands in Windows PowerShell ................................................ 17 Usage examples ......................................................................................................... 17 Exit status .................................................................................................................. 19 Using curl commands with the E2800 storage array ................................................
    [Show full text]
  • Getting Started Tutorial
    Getting Started Tutorial Getting Started Tutorial Lantern Bracket Problem • This tutorial will walk you through a simple topology optimization problem where we will design a bracket for mounting a lantern to a wall. • The design domain is shown in the bottom image. The two holes at the top are where the bracket will mount to the wall and the hole where the red arrow is pointing is where the load from the weight of the lantern will be applied. Getting Started Tutorial Create a New Model • Choose File->New->Model in the menu • Choose New Model then Next • Choose Create From Template then Next • Enter Lantern as the Model Name • Choose the Sierra SD Templates-> Structural Dynamics-> Topology Optimization template and then Finish Getting Started Tutorial Create the Design Domain (1) • At the CUBIT> command prompt copy and paste the following (see Hint on next slide): • brick x 5.5 y 5.5 z 5 • webcut volume all with plane zplane offset .5 • webcut volume all with plane zplane offset -.5 • brick x 1 y 5 z 1 • vol 4 move -2.25 .25 0 • subtract vol 4 from vol 2 • brick x 5.5 y 1.5 z 1 • vol 5 move -.5 2 0 • sub 5 from 2 • webcut volume 2 with sheet extended from surface 48 • webcut volume 6 with sheet extended from surface 45 • cylinder radius .125 height 10 • vol 8 copy rotate 90 about x • vol 9 move -2.25 0 0 • sub 9 from Volume 2 • vol 8 rotate 90 about y • vol 8 move 0 2.375 0 • vol 8 copy move 0 -.75 0 • sub 10 8 from 6 • These are CUBIT commands that create the cad model representation of the design domain in which the optimized design can exist.
    [Show full text]