SANRAD I3.1.1205 User Manual

Page 17

Advertising
background image

Table of Contents

xi

Figure 5-2.

Re-routing Storage Access with Off-line V-Switch ...................................................... 5-4

Figure 5-3.

Cluster with Neighbor IP Addresses............................................................................ 5-7

Figure 6-1.

Physical Storage used in Examples ............................................................................ 6-2

Figure 6-2.

Transparent Volume 1 ................................................................................................. 6-7

Figure 6-3.

Partitioning a Physical Volume .................................................................................... 6-8

Figure 6-4.

Disk 1 before Subdisk.................................................................................................. 6-9

Figure 6-5.

Disk 1 with 1 Subdisk................................................................................................. 6-10

Figure 6-6.

Disk 1 with 2 Subdisks............................................................................................... 6-11

Figure 6-7.

Simple Volume Block Distribution.............................................................................. 6-12

Figure 6-8.

Simple Volume 1........................................................................................................ 6-13

Figure 6-9.

Concatenated Volume Block Distribution .................................................................. 6-14

Figure 6-10.

Concatenated Volume 1 .......................................................................................... 6-15

Figure 6-11.

Striped Volume Block Distribution ........................................................................... 6-16

Figure 6-12.

Striped Volume 1 ..................................................................................................... 6-18

Figure 6-13.

Mirrored Volume Block Distribution ......................................................................... 6-19

Figure 6-14.

Mirrored Volume 1 ................................................................................................... 6-20

Figure 6-15.

RAID 10 Volume Block Distribution ......................................................................... 6-22

Figure 6-16.

First Mirrored Volume of RAID 10 ........................................................................... 6-23

Figure 6-17.

Second Mirrored Volume of RAID 10 ...................................................................... 6-24

Figure 6-18.

Striped Volume of RAID 10 ..................................................................................... 6-25

Figure 7-1.

iSCSI Target Access.................................................................................................... 7-3

Figure 7-2.

Identity A’s iSCSI Initiators .......................................................................................... 7-3

Figure 7-3.

Identity B’s iSCSI Initiators .......................................................................................... 7-4

Figure 7-4.

Identity C’s iSCSI Initiator ............................................................................................ 7-4

Figure 7-5.

Identities Coupled with Targets ................................................................................... 7-5

Figure 7-6.

Access Rights per Identity-Target Pair ........................................................................ 7-6

Figure 7-7.

iSCSI Initiator in Two Different Identities ..................................................................... 7-7

Figure 7-8.

Identity with iSCSI Initiators and Credentials............................................................... 7-8

Figure 7-9.

Modifying Default Identities ......................................................................................... 7-9

Figure 7-10.

Creating a Target..................................................................................................... 7-12

Figure 7-11.

Creating an Identity.................................................................................................. 7-17

Figure 7-12.

Adding an Initiator.................................................................................................... 7-19

Figure 7-13.

Adding a Second Initiator ........................................................................................ 7-20

Figure 7-14.

Assigning Credentials .............................................................................................. 7-22

Figure 7-15.

Adding Another Set of Credentials .......................................................................... 7-23

Figure 7-16.

Sending a CHAP Authentication Challenge ............................................................ 7-25

Figure 7-17.

Logging in to a RADIUS Server............................................................................... 7-27

Figure 7-18.

Connecting a Target and Identity ............................................................................ 7-29

Figure 7-19.

Exposing a Volume.................................................................................................. 7-32

Figure 8-1.

Adding Another Child to a Mirror ................................................................................. 8-5

Figure 8-2.

Creating a Mirror to Add Data Redundancy ................................................................ 8-6

Figure 8-3.

Adding Sim6 to Mir4 .................................................................................................... 8-7

Figure 8-4.

1

st

Snapshot Created ................................................................................................... 8-8

Figure 8-5.

1

st

Write to Source and Update to 1

st

Snapshot .......................................................... 8-9

Figure 8-6.

1

st

Snapshot............................................................................................................... 8-11

Figure 8-7.

Update to 1

st

Snapshot & 1

st

Write to Source............................................................ 8-11

Figure 8-8.

2

nd

Snapshot Created, Update to 1

st

Snapshot & 2

nd

Snapshot and Write to Source8-12

Figure 8-9.

3

rd

Snapshot Created, Update to 1

st

& 2

nd

Snapshot and Write to Source................ 8-13

Figure 8-10.

Removing a Child from a Mirror............................................................................... 8-17

Figure 8-11.

Breaking a Mirror ..................................................................................................... 8-18

Advertising