TOPSIS Strategy for Multi-Attribute Decision Making with Trapezoidal Neutrosophic Numbers

Total Page:16

File Type:pdf, Size:1020Kb

TOPSIS Strategy for Multi-Attribute Decision Making with Trapezoidal Neutrosophic Numbers Neutrosophic Sets and Systems Volume 19 Article 6 1-1-2018 TOPSIS Strategy for Multi-Attribute Decision Making with Trapezoidal Neutrosophic Numbers Pranab Biswas Surapati Pramanik Bibhas C. Giri Follow this and additional works at: https://digitalrepository.unm.edu/nss_journal Recommended Citation Biswas, Pranab; Surapati Pramanik; and Bibhas C. Giri. "TOPSIS Strategy for Multi-Attribute Decision Making with Trapezoidal Neutrosophic Numbers." Neutrosophic Sets and Systems 19, 1 (2019). https://digitalrepository.unm.edu/nss_journal/vol19/iss1/6 This Article is brought to you for free and open access by UNM Digital Repository. It has been accepted for inclusion in Neutrosophic Sets and Systems by an authorized editor of UNM Digital Repository. For more information, please contact [email protected]. Neutrosophic Sets and Systems, Vol. 19, 2018 29 University of New Mexico TOPSIS Strategy for Multi-Attribute Decision Making with Trapezoidal Neutrosophic Numbers Pranab Biswas1, Surapati Pramanik2, and Bibhas C. Giri3 1Department of Mathematics, Jadavpur University, Kolkata-700032, India. E-mail: [email protected] 2* Department of Mathematics, Nandalal B.T. College, Panpur, Narayanpur-743126, India. E-mail: [email protected] 3 Department of Mathematics, Jadavpur University, Kolkata-700032, India. E-mail: [email protected] *Corresponding author: [email protected] Abstract. Technique for Order Preference by Similarity to the maximum deviation strategy, we develop an optimiza- Ideal Solution (TOPSIS) is a popular strategy for Multi- tion model to obtain the weight of the attributes. Then we Attribute Decision Making (MADM). In this paper, we develop an extended TOPSIS strategy to deal with extend the TOPSIS strategy of MADM problems in trape- MADM with single-valued trapezoidal neutrosophic num- zoidal neutrosophic number environment. The attribute bers. To illustrate and validate the proposed TOPSIS strat- values are expressed in terms of single-valued trapezoidal egy, we provide a numerical example of MADM problem. neutrosophic numbers. The weight information of attrib- ute is incompletely known or completely unknown. Using Keywords: Single-valued trapezoidal neutrosophic number, multi-attribute decision making, TOPSIS. 1 Introduction extended the TOPSIS strategy for MCDM problem in intu- itionistic fuzzy environment. Zhao [25] also studied TOP- Multi-attribute decision making (MADM) plays an im- SIS strategy for MADM under interval intuitionistic fuzzy portant role in decision making sciences. MADM is a pro- environment and utilized the strategy in teaching quality cess of finding the best alternative that has the highest de- evaluation. Xu [19] proposed TOPSIS strategy for hesitant gree of satisfaction over the predefined conflicting attributes. fuzzy multi-attribute decision making with incomplete The preference values of alternatives are generally assessed weight information. quantitatively and qualitatively according to the nature of attributes. When the preference values are imprecise, inde- However fuzzy sets, intuitionistic fuzzy sets, hesitant fuzzy terminate or incomplete, the decision maker feels comfort to sets have some limitations to express indeterminate and in- evaluate the alternatives in MADM in terms of fuzzy sets complete information in decision making process. Recently, [1], intuitionistic fuzzy sets [2], hesitant fuzzy sets [3], neu- single valued neutrosophic set (SVNS) [26] has been suc- trosophic sets [4], etc., rather than crisp sets. A large number cessfully applied in MADM or multi-attribute group deci- of strategies has been developed for MADM problems such sion [27-37]. SVNS [26] and interval neutrosophic set (INS) as technique for order preference by similarity to ideal solu- [38], and other hybrid neutrosophic sets have caught atten- tion (TOPSIS) [5], PROMETHEE [6], VIKOR [7], ELEC- tion of the researchers for developing TOPSIS strategy. TRE [7, 8], AHP [9], etc. MADM problem has been studied Biswas et al. [39] developed TOPSIS strategy for multi-at- extensively in fuzzy environment [10-14], intuitionistic tribute group decision making (MAGDM) for single valued fuzzy environment [15-22]. neutrosophic environment. Sahin et al. [40] proposed an- other TOPSIS strategy for supplier selection in neutrosophic TOPSIS [5] is one of the sophisticated strategy for solving environment. Chi and Liu developed TOPSIS strategy to MADM. The main idea of TOPSIS is that the best alterna- deal with interval neutrosophic sets in MADM problems. tive should have the shortest distance from the positive ideal Zhang and Wu [41] proposed TOPSIS strategies for MCDM solution (PIS) and the farthest distance from the negative in single valued neutrosophic environment and interval neu- ideal solution (NIS), simultaneously. Since its proposition, trosophic set environment where the information about cri- researchers have extended the TOPSIS strategy to deal with terion weights are incompletely known or completely un- different environment. Chen [23] extended the TOPSIS known. Ye [42] put forward TOPSIS strategy for MAGDM strategy for solving multi-criteria decision making with single-valued neutrosophic linguistic numbers. Peng et (MCDM) problems in fuzzy environment. Boran et al. [24] al. [43] presented multi-attributive border approximation area comparison (MBAC), TOPSIS, and similarity measure Pranab Biswas, Surapati Pramanik, and Bibhas C. Giri: TOPSIS strategy for MADM with trapezoidal neutrosophic numbers 30 Neutrosophic Sets and Systems, Vol. 19; 2018 approaches for neutrosophic MADM. Pramanik et al. [44] x a) w a x b, extended TOPSIS strategy for MADM in neutrosophic soft ba expert set environment. Different TOPSIS strategies [45-49] w b x c, have been studied in different hybrid neutrosophic set envi- A ()x ()d x w ronment. c x d, Single valued trapezoidal neutrosophic number (SVTrNN ) dc [50, 51] is another extension of single-valued neutrosophic 0 otherwise sets. SVTrNN presents the situation, in which each element is characterized by trapezoidal number that has truth mem- where 푎, 푏, 푐, 푑 are real number satisfying 푎 ≤ 푏 ≤ 푐 ≤ 푑 bership degree, indeterminate membership degree, and fal- and 푤 is the membership degree. sity membership degree. Recently, Deli and Şubaş [52] pro- Definition 3.[4] Let 푋 be a universe of discourse. An posed a ranking strategy of single valued neutrosophic num- neutrosophic sets 퐴 over 푋 is defined by ber and utilized this strategy in MADM problems. Biswas et A{, x T (),(),()| x I x F x x X } al. [53] also proposed value and ambiguity based ranking AAA (2) strategy of single valued trapezoidal neutrosophic number whereTx(), Ix()and Fx() are real standard or non- and applied it to MADM. A A A However, TOPSIS strategy of MADM has not been studied standard subsets of ] 0,1 [ that is TA (x) : X ] 0,1 [ , earlier with trapezoidal neutrosophic numbers, although I A (x) : X ] 0,1 [ and FA (x) : X ] 0,1 [. The these numbers effectively deal with uncertain information in membership functions satisfy the following properties: MADM model. In this study, our objective is to develop an TIF MADM model, where the attribute values assume the form 0AAA (x) (x) (x) 3 . of SVTrNNs and the weight information of attribute is in- Definition 4. [26] Let 푋 be a universe of discourse. A completely known or completely unknown. The existing single-valued neutrosophic set 퐴̃ in 푋 is given by TOPSIS strategy of MADM cannot handle with such situa- tions. Therefore, we need to extend the TOPSIS strategy in (3) SVTrNN environment. where TA( x ): X [0,1] , IA( x ): X [0,1] and To develop the model, we consider the following sections: F( x ): X [0,1] with the condition Section 2 presents a preliminaries of fuzzy sets, neutro- A sophic sets, single-valued neutrosophic sets, and single-val- 0TAAA ( x ) I ( x ) F ( x ) 3 for all xX . ued trapezoidal neutrosophic number IFS, SVNS. Section 3 The functions TxA , IxA and FxA represent, contains the extended TOPSIS strategy for MADM with respectively, the truth membership function, the SVTrNNs. Section 4 presents an illustrative example. Fi- indeterminacy membership function and the falsity nally, Section 5 presents conclusion and future direction re- membership function of the element to the set A. search. Definition 5. [50, 51] Let a is a single valued trapezoidal 2 Preliminaries neutrosophic trapezoidal number (SVNTrN). Then its truth In this section, we review some basic definitions of fuzzy membership function is sets, neutrosophic sets, single-valued neutrosophic sets, and x a) t a a x b, single-valued trapezoidal neutrosophic number. ba t b x c Definition 1. X a , [1] Let be a universe of discourse, then a Txa () 퐴 ()d x ta fuzzy set is defined by c x d, A{ x , ( x ) | x X } (1) dc A which is characterized by a membership function 0 otherwise A :X [0,1], where A()x is the degree of membership of the element x to the set A . Its indeterminacy membership function is Definition 2. [54,55] A generalized trapezoidal fuzzy number 퐴 denoted by 퐴 = (푎, 푏, 푐, 푑; 푤) is described as a fuzzy subset of the real number ℝ with membership function 휇퐴 which is defined by Pranab Biswas, Surapati Pramanik, and Bibhas C. Giri: TOPSIS strategy for MADM with trapezoidal neutrosophic numbers Neutrosophic Sets and Systems, Vol. 19, 2018 31 Proof: b x ( x a ia a x b, ( ) ba i. The distance measure 푑 푎̃1, 푎̃2 is obviously non-neg- ative. If 푎̃ ≈ 푎̃ that is for 푎 = 푎 , 푏 = 푏 , 푐 = i b x c, 1 2 1 2 1 2 1 a 푐 , 푑 = 푑 , 푡 = 푡 푖 = 푖 , 푓
Recommended publications
  • Networker Jukebox Control Command Nsrjb
    Maintenance Procedures NSRJB ( 8 ) NAME nsrjb − NetWorker jukebox control command SYNOPSIS nsrjb [ −C ][−j name ][−s server ][−v ][−f device ][−S slots | −T Ta gs | volume names ] nsrjb −L [ −j name ][−s server ][−gimnqvG ][−Y | −N ][−R | −B ][−b pool ][−f device | −J hostname ][−e forev er ][−c capacity ][−o mode ][−S slots | −T tags | volume names ] nsrjb −l [ −j name ][−s server ][−nvqrG ][−R [ −b pool ]][−f device | −J hostname ][−S slot | −T tags | volume names ] nsrjb −u [ −j name ][−s server ][−qv ][−f device ][−S slot | −T tags | volume names ] nsrjb −I [ −j name ][−s server ][−Evpq ][−I | −f device ][−S slots | −T tags | volume_names ] nsrjb −p [ −j name ][−s server ][−vq ][−f device ][−S slot | −T tag | volume name ] nsrjb −o mode [ −j name ][−s server ][−Y ][−S slots | −T tags | volume names ] nsrjb −H [ −j name ][−s server ][−EHvp ] nsrjb −h [ −j name ][−s server ][−v ] nsrjb −U uses [ −j name ][−s server ][−S slots | −T tags ] nsrjb −V [ −j name ][−s server ] nsrjb −d [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots ][−T tags ][volume names ] nsrjb −w [ −j name ][−s server ][−v ][−N ][−Y ][−P ports ][−S slots | −T tags | volume names ] nsrjb −a [ −j name ][−s server ][−vd ][−T tags |[−T tags ] volume names ] nsrjb −x [ −j name ][−s server ][−vwX ][−T tags | −S slots ] nsrjb −F [ −j name ][−s server ][−v ] −f device DESCRIPTION The nsrjb program manages resources in two broad classes of jukeboxes, remotely managed jukeboxes and locally managed jukeboxes. Remotely managed jukeboxes are controlled through an external agent.
    [Show full text]
  • Command Control Interface Command Reference
    Command Control Interface Command Reference Hitachi Virtual Storage Platform G1000 Hitachi Unified Storage VM Hitachi Virtual Storage Platform Hitachi Universal Storage Platform V/VM FASTFIND LINKS Contents Product Version Getting Help MK-90RD7009-19 © 2010-2014 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. Hitachi, Ltd., reserves the right to make changes to this document at any time without notice and assumes no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. Some of the features described in this document might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Data Systems Corporation at https://portal.hds.com. Notice: Hitachi, Ltd., products and services can be ordered only under the terms and conditions of the applicable Hitachi Data Systems Corporation agreements. The use of Hitachi, Ltd., products is governed by the terms of your agreements with Hitachi Data Systems Corporation. Notice on Export Controls. The technical data and technology inherent in this Document may be subject to U.S. export control laws, including the U.S. Export Administration Act and its associated regulations, and may be subject to export or import regulations in other countries.
    [Show full text]
  • U.S. EPA, Pesticide Product Label, COMMAND 4E HERBICIDE, 09/02
    Don carlson, Ph.D. FMC corporation Agricultural Chemical Group 1735 Market street Philadelphia, PA 1910 3 Dear Dr. Carlson: Subject: Camand 4 EC Herbi,lde EPA Reg. No. 279-30~1 RE: Amended Labeling (tillage/nQ-tillage directions) Your Submission Dated August 13, 1992 ~he labeling refprred to above, submitted in connection with registration under the Federal Insecticide, Fungicide, and Rodenticide Act, as amended, is acceptable. A stamped copy is enclosed for your records. Sincerely yours, Robert J. Taylor Product I'anager (25) Fungicide-Herbicide Branch Registration Division (H7505C) CONCURRENCES SYMBOL;: l/7.)~.$P" ............... ... .................. ................. ................. ................................................... ::N£AM~, '%f:1; .... ........................................................................................................................ OFFICIAL FILE COPY _ i2 a a all a an a. .a $A 4SQS4 4t P ) ) Code 1139 Net Contents Command®4 E Herbicide For Agricultural or Commercial Use Only NOT FOR SALE OR USE IN CAUFORNIA EPA Reg. No. 279-3071 EPA Est. 279- Active Ingredient: By Wt. Clomazone: 2-(2-Chlorophenyl)methyl-4. 4-dimethyl-3-isoxazolidinone •...........••••..... 44.4% Inert Ingredients: .........•..............•......... 55.6% 100.0% Contains 4 pounds 01 active ingredient per gallon U.S. Patent No. 4.405,357 KEEP OUT OF REACH OF CHILDREN CAUTION FIRST AID " In SyH: Flush with plenty 0/ water. Get medical attention as AtlL.C OF CONTENTS 'Ossible. ' aI inlormations an pages 1-4 belore referring 10 specific ; swallowed: Drink prompUy large quatltities 01 crop use. alcohol. Do nol ind~'C8 vomiting. cau a physician, " Inh8led: Remove to fresh air. " Page lion. prelerably mouth·to-mouth.·. possible. ~~.::::::::::::::::::::::::::::::::::::::::::::: 1 Precautionary Statements ............................ ... 1 " on akin: Wash Skin Diredions lor Use ....................................... 1 allention. ~ and ~ ...............•.......•.......•... 2 For Emergency f!prayer CIeanuo ......................................
    [Show full text]
  • Weed Control Guide for Ohio, Indiana and Illinois
    Pub# WS16 / Bulletin 789 / IL15 OHIO STATE UNIVERSITY EXTENSION Tables Table 1. Weed Response to “Burndown” Herbicides .............................................................................................19 Table 2. Application Intervals for Early Preplant Herbicides ............................................................................... 20 Table 3. Weed Response to Preplant/Preemergence Herbicides in Corn—Grasses ....................................30 WEED Table 4. Weed Response to Preplant/Preemergence Herbicides in Corn—Broadleaf Weeds ....................31 Table 5. Weed Response to Postemergence Herbicides in Corn—Grasses ...................................................32 Table 6. Weed Response to Postemergence Herbicides in Corn—Broadleaf Weeds ..................................33 2015 CONTROL Table 7. Grazing and Forage (Silage, Hay, etc.) Intervals for Herbicide-Treated Corn ................................. 66 OHIO, INDIANA Table 8. Rainfast Intervals, Spray Additives, and Maximum Crop Size for Postemergence Corn Herbicides .........................................................................................................................................................68 AND ILLINOIS Table 9. Herbicides Labeled for Use on Field Corn, Seed Corn, Popcorn, and Sweet Corn ..................... 69 GUIDE Table 10. Herbicide and Soil Insecticide Use Precautions ......................................................................................71 Table 11. Weed Response to Herbicides in Popcorn and Sweet Corn—Grasses
    [Show full text]
  • Cheatsheet V2.4.Pdf
    ! ! 2.4!Edition! Cross!reference!processes!with!various!lists:! Scan!a!block!of!code!in!process!or!kernel!memory! psxview! for!imported!APIs:! ! impscan!! Show!processes!in!parent/child!tree:! !!!!Hp/HHpid=PID!!!!!!!!!Process!ID!! pstree! !!!!Hb/HHbase=BASE!!!Base!address!to!scan! & !!!!Hs/HHsize=SIZE!!!!!!!Size!to!scan!from!start!of!base! Process&Information& ! ! Logs&/&Histories& Specify!–o/HHoffset=OFFSET!or!Hp/HHpid=1,2,3!! ! ! Recover!event!logs!(XP/2003):! Display!DLLs:! evtlogs!! ! ! dlllist! !!!!HS/HHsaveHevt!!!!!!!!!!!!!!!!!!!!Save!raw!event!logs! Development!build!and!wiki:! ! !!!!HD/HHdumpHdir=PATH!!!Write!to!this!directory! github.com/volatilityfoundation!! Show!command!line!arguments:! ! ! cmdline! Recover!command!history:! Download!a!stable!release:! ! cmdscan!and!consoles!! volatilityfoundation.org!! Display!details!on!VAD!allocations:! ! ! vadinfo![HHaddr]! Recover!IE!cache/Internet!history:! Read!the!book:! ! iehistory!! artofmemoryforensics.com! Dump!allocations!to!individual!files:! ! ! vaddump!HHdumpHdir=PATH![HHbase]! Show!running!services:! Development!Team!Blog:! ! svcscan!! http://volatilityHlabs.blogspot.com!! Dump!all!valid!pages!to!a!single!file:! !!!!Hv/HHverbose!!!!Show!ServiceDll!from!registry! ! memdump!HHdumpHdir=PATH! ! (Official)!Training!Contact:! ! Networking&Information& Display!open!handles:! [email protected]!! ! handles!! ! Active!info!(XP/2003):! !!!!Ht/HHobjectHtype=TYPE!!!Mutant,!File,!Key,!etc…! Follow:!@volatility! connections!and!sockets!! !!!!Hs/HHsilent!!!!!!!!!!!!!!!!!!!!!!!!!!!Hide!unnamed!handles!
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • Command Control Interface Command Reference Error Codes
    Command Control Interface 01-43-03-01 Command Reference This document describes and provides instructions for using the Command Control Interface (CCI) software to configure and perform operations on the Hitachi RAID storage systems. Hitachi Virtual Storage Platform G series and F series Hitachi Virtual Storage Platform Hitachi Unified Storage VM Hitachi Universal Platform V/VM MK-90RD7009-33 October 2017 © 2010, 2017 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for commercial purposes without the express written permission of Hitachi, Ltd., or Hitachi Vantara Corporation (collectively, “Hitachi”). Licensee may make copies of the Materials provided that any such copy is: (i) created as an essential step in utilization of the Software as licensed and is used in no other manner; or (ii) used for archival purposes. Licensee may not make any other copies of the Materials. "Materials" mean text, data, photographs, graphics, audio, video and documents. Hitachi reserves the right to make changes to this Material at any time without notice and assumes no responsibility for its use. The Materials contain the most current information available at the time of publication. Some of the features described in the Materials might not be currently available. Refer to the most recent product announcement for information about feature and product availability, or contact Hitachi Vantara Corporation at https://support.HitachiVantara.com/ en_us/contact-us.html. Notice: Hitachi products and services can be ordered only under the terms and conditions of the applicable Hitachi agreements.
    [Show full text]
  • LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS
    LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS Commands,Rules for naming files in DOS and Types of files Operating System Operating system is a set of software that controls and manages hardware and basic system operations for a computer. The operating system loads programs into the computer's memory, runs these programs, and manages peripherals like disks and printers. Example: Disk Operating System (DOS) Windows LINUX Mac UNIX Disk Operating System (DOS) • In the 1980s or early 1990s, the operating system that shipped with most PCs was a version of the Disk Operating System (DOS) created by Microsoft: MS-DOS. • MS-DOS is a disk-based, single-user, single-task and character based user interface (CUI) operating system. Goto MSDOS from Windows Operating System: Click Start Button Choose Program Choose Accessories Click Command Prompt as shown below: Or Click Start Button Choose Run Type cmd in the Open tab as shown below: Command Prompt will get displayed as shown: The DOS commands can be entered in the command prompt and executed. Some Examples of DOS commands DIR Command The dir command allows you to see the available files in the current and/or parent directories. Examples: 1. DIR Lists all files and directories in the directory that you are currently in. 2. dir /w If information on the date / time and other information on the files are not needed, then this command can be used to list just the files and directories going horizontally, taking as little as space needed. 3. dir /on List the files in alphabetical order by the names of the files.
    [Show full text]
  • Introduction: DOS (Disk Operating System) Is an Oldest Type of Operating System
    DOS (Disk Operating System) 1 Introduction: DOS (Disk Operating System) is an oldest type of Operating System. Disk Operating System is abbreviated as DOS. DOS is a CUI type of Operating System. In computer science, a generic term describing any operating system is system software which is loaded from disk devices when the system is started or rebooted. DOS is a single-tasking, single-user operating system with a command-line interface. DOS acts on commands. Because DOS is ready to perform when given proper command hence, it is also known as Command Prompt. Commands are certain words of English language or short form of English words. The meaning of these word or short form is already known to DOS. Since, DOS recognized these words and hence acts accordingly. These words and short forms of the English words are better known as commands. Internal Command:-Those commands which are already stored in the “Command.Com” file of DOS are known as internal commands. For example, CLS, VOL, TIME, DATE, COPY etc External Command:-Those commands which are not included in the command.com file of DOS rather included in other files of DOS are known as external commands. It is formatted according to programme. For example, TREE, FORMAT, MODE etc Some Internal Commands:- 1. CLS To clear the screen. \>cls 2. DIR To view the directory and files C:\>Dir 3. DATE To View and change the date C:\>Date Current date is: 01-01-2008 Enter new date (mm/dd/yy):21-03-2009 4. TIME To view and change the time.
    [Show full text]
  • Compute Blade Built-In LAN Switch Module Software Manual Operation Commands, Vol
    Compute Blade Built-in LAN Switch Module Software Manual Operation Commands, Vol. 1 Ver.10.5 and 10.7 and 11.6 compatible BSLANSW-S003X-50 MK-99COM094-01 HITACHI Applicable product This manual describes model Compute Blade Built in LAN Switch Module. It also describes Built in LAN Switch Module software Ver.10.5 and Ver.10.7 and 11.6 functions. Software functions supported by software OS-L3A and OS-L3SA is also described. ------------------------------------------------------------------- The BladeSymphony server name has been changed to Hitachi Compute Blade. If you are using BladeSymphony based server products, substitute references to Hitachi Compute Blade with BladeSymphony. This manual describes as substitution product code GV-BE2LSW1X1-Y for GV-BE2LSW1XR-Y and GV-BE2LSW2X1-Y for GV-BE2LSW2XR-Y. If you use OS-L3SA, please add the prefix of ‘0/’ to the interface number of gigabitethernet to be specified by some commands. ------------------------------------------------------------------- Caution when exporting The necessary procedures are to be adopted when exporting this product after first confirming the regulations of the Foreign Exchange and Foreign Trade Law, U.S. export control related regulations, etc. If any questions remains, please consult with our sales department. Trademarks Cisco is a registered trademark of U.S. Cisco Systems, Inc. in the U.S. and other countries. Ethernet is a product name of the Xerox Corp. IPX is a trademark of Novell,Inc. Microsoft is a registered trademark of the Microsoft Corp. in the U.S. and other countries. Octpower is a trademark of NEC Corporation. UNIX is a registered trademark in the U.S. and other countries exclusively licensed by X/Open Company Limited.
    [Show full text]
  • SVC and Storwize V7000 Replication Family Services Chapter 4
    Front cover IBM System Storage SAN Volume Controller and Storwize V7000 Replication Family Services Describes new Replication Family Services functionality Provides server integration examples Includes scripting examples Jon Tate Rafael Vilela Dias Ivaylo Dikanarov Jim Kelly Peter Mescher ibm.com/redbooks International Technical Support Organization IBM System Storage SAN Volume Controller and Storwize V7000 Replication Family Services March 2013 SG24-7574-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Third Edition (March 2013) This edition applies to IBM System Storage SAN Volume Controller and IBM System Storage Storwize V7000 Replication Family Services at an SVC Version6.4 code level. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Summary of changes. xiii March 2013, Third Edition . xiii Preface . .xv The team who wrote this book . .xv Now you can become a published author, too! . xvii Comments welcome. xviii Stay connected to IBM Redbooks . xviii Chapter 1. Introduction to Replication Family Services . 1 1.1 FlashCopy . 2 1.2 Metro Mirror and Global Mirror . 2 1.2.1 Global Mirror with Change Volumes . 2 1.3 Volume Mirroring function . 2 1.3.1 Stretched Cluster Volume Mirroring . 3 Chapter 2. Planning for Replication Family Services . 5 2.1 High-level design. 6 2.1.1 Defining your project . 6 2.1.2 Functional requirements . 6 2.1.3 Non-functional requirements. 7 2.1.4 Prior to implementation .
    [Show full text]
  • Santricity 11.30 Maintaining a Storage Array Using the Command
    SANtricity® 11.30 Maintaining a Storage Array using the Command Line Interface August 2016 | 215-11215_A0 [email protected] Table of Contents | 3 Contents Deciding whether to use this guide ............................................................. 5 About the command line interface .............................................................. 6 Structure of a CLI command ....................................................................................... 6 Interactive mode .............................................................................................. 7 Command line parameters ............................................................................... 8 CLI command wrapper syntax ...................................................................... 12 Naming conventions .................................................................................................. 14 Formatting CLI commands ....................................................................................... 15 Formatting rules for script commands ...................................................................... 15 Formatting CLI commands in Windows PowerShell ................................................ 17 Usage examples ......................................................................................................... 17 Exit status .................................................................................................................. 19 Using curl commands with the E2800 storage array ................................................
    [Show full text]