Glossary

This glossary provides terms and definitions for the IBM Spectrum Protect product family.

The following cross-references are used in this glossary:
  • See refers you from a nonpreferred term to the preferred term or from an abbreviation to the spelled-out form.
  • See also refers you to a related or contrasting term.
A B C D E F G H I J K L M N O P Q R S T U V W

A

absolute mode
In storage management, a backup copy-group mode that specifies that a file or directory is considered for incremental backup even if the file or directory has not changed since the last backup. See also mode, modified mode.
access control list (ACL)
In computer security, a list associated with an object that identifies all the subjects that can access the object and their access rights.
access mode
An attribute of a storage pool or a storage volume that specifies whether the server can write to or read from the storage pool or storage volume.
ACK
See acknowledgment.
acknowledgment (ACK)
The transmission of acknowledgment characters as a positive response to a data transmission.
ACL
See access control list.
activate
To validate the contents of a policy set and then make it the active policy set.
active-data pool
A named set of storage pool volumes that contain only active versions of client backup data. See also server storage, storage pool, storage pool volume.
active file system
A file system to which space management has been added. With space management, tasks for an active file system include automatic migration, reconciliation, selective migration, and recall. See also inactive file system.
active policy set
The activated policy set that contains the policy rules currently in use by all client nodes assigned to the policy domain. See also policy domain, policy set.
active version
The most recent backup copy of a file stored. The active version of a file cannot be deleted until a backup process detects that the user has either replaced the file with a newer version or has deleted the file from the file server or workstation. See also backup version, inactive version.
activity log
A log that records normal activity messages that are generated by the server. These messages include information about server and client operations, such as the start time of sessions or device I/O errors.
adaptive subfile backup
A type of backup that sends only changed portions of a file to the server, instead of sending the entire file. Adaptive subfile backup reduces network traffic and increases the speed of the backup.
administrative client
A program that runs on a file server, workstation, or mainframe that administrators use to control and monitor the server. See also backup-archive client.
administrative command schedule
A database record that describes the planned processing of an administrative command during a specific time period. See also central scheduler, client schedule, schedule.
administrative privilege class
See privilege class.
administrative session
A period of time during which an administrator user ID communicates with a server to perform administrative tasks. See also client node session, session.
administrator
A person responsible for administrative tasks such as access authorization and content management. Administrators can also grant levels of authority to users.
agent node
A client node that has been granted proxy authority to perform operations on behalf of another client node, which is the target node.
aggregate
An object, stored in one or more storage pools, consisting of a group of logical files that are packaged together. See also logical file, physical file.
aggregate data transfer rate
A performance statistic that indicates the average number of bytes that were transferred per second while processing a given operation.
application client
A program that is installed on a system to protect an application. The server provides backup services to an application client.
archive
To copy programs, data, or files to another storage media, usually for long-term storage or security. See also retrieve.
archive copy
A file or group of files that was archived to server storage.
archive copy group
A policy object containing attributes that control the generation, destination, and expiration of archived files. See also copy group.
archive-retention grace period
The number of days that the storage manager retains an archived file when the server is unable to rebind the file to an appropriate management class. See also bind.
association
The defined relationship between a client node and a client schedule. An association identifies the name of a schedule, the name of the policy domain to which the schedule belongs, and the name of a client node that starts scheduled operations.
audit
To check for logical inconsistencies between information that the server has and the actual condition of the system. The storage manager can audit information about items such as volumes, libraries, and licenses. For example, when a storage manager audits a volume, the server checks for inconsistencies between information about backed-up or archived files that are stored in the database and the actual data that are associated with each backup version or archive copy in server storage.
authentication rule
A specification that another user can use to either restore or retrieve files from storage.
authority
The right to access objects, resources, or functions. See also privilege class.
authorization rule
A specification that permits another user to either restore or retrieve a user's files from storage.
authorized user
A user who has administrative authority for the client on a workstation. This user changes passwords, performs open registrations, and deletes file spaces.
AutoFS
See automounted file system.
automatic detection
A feature that detects, reports, and updates the serial number of a drive or library in the database when the path from the local server is defined.
automatic migration
The process that is used to automatically move files from a local file system to storage, based on options and settings that are chosen by a root user on a workstation. See also demand migration, threshold migration.
automounted file system (AutoFS)
A file system that is managed by an automounter daemon. The automounter daemon monitors a specified directory path, and automatically mounts the file system to access data.

B

backup-archive client
A program that runs on a workstation or file server and provides a means for users to back up, archive, restore, and retrieve files. See also administrative client.
backup copy group
A policy object containing attributes that control the generation, destination, and expiration of backup versions of files. A backup copy group belongs to a management class. See also copy group.
backup retention grace period
The number of days the storage manager retains a backup version after the server is unable to rebind the file to an appropriate management class.
backup set
A portable, consolidated group of active versions of backup files that are generated for a backup-archive client.
backup set collection
A group of backup sets that are created at the same time and which have the same backup set name, volume names, description, and device classes. The server identifies each backup set in the collection by its node name, backup set name, and file type.
backup version
A file or directory that a client node backed up to storage. More than one backup version can exist in storage, but only one backup version is the active version. See also active version, copy group, inactive version.
bind
To associate a file with a management class name. See also archive-retention grace period, management class, rebind.
bucket
Cloud storage container.

C

cache
To place a duplicate copy of a file on random access media when the server migrates a file to another storage pool in the hierarchy.
cache file
A snapshot of a logical volume created by Logical Volume Snapshot Agent. Blocks are saved immediately before they are modified during the image backup and their logical extents are saved in the cache files.
CAD
See client acceptor daemon.
central scheduler
A function that permits an administrator to schedule client operations and administrative commands. The operations can be scheduled to occur periodically or on a specific date. See also administrative command schedule, client schedule.
client
A software program or computer that requests services from a server. See also server.
client acceptor
A service that serves the Java™ applet for the web client to web browsers. On Windows systems, the client acceptor is installed and run as a service. On AIX®, UNIX, and Linux systems, the client acceptor is run as a daemon.
client acceptor daemon (CAD)
See client acceptor.
client domain
The set of drives, file systems, or volumes that the user selects to back up or archive data, using the backup-archive client.
client node
A file server or workstation on which the backup-archive client program has been installed, and which has been registered to the server.
client node session
A session in which a client node communicates with a server to perform backup, restore, archive, retrieve, migrate, or recall requests. See also administrative session.
client option set
A group of options that are defined on the server and used on client nodes in conjunction with client options files.
client options file
An editable file that identifies the server and communication method, and provides the configuration for backup, archive, hierarchical storage management, and scheduling.
client-polling scheduling mode
A method of operation in which the client queries the server for work. See also server-prompted scheduling mode.
client schedule
A database record that describes the planned processing of a client operation during a specific time period. The client operation can be a backup, archive, restore, or retrieve operation, a client operating system command, or a macro. See also administrative command schedule, central scheduler, schedule.
client/server
Pertaining to the model of interaction in distributed data processing in which a program on one computer sends a request to a program on another computer and awaits a response. The requesting program is called a client; the answering program is called a server.
client system-options file
A file, used on AIX, UNIX, or Linux system clients, containing a set of processing options that identify the servers to be contacted for services. This file also specifies communication methods and options for backup, archive, hierarchical storage management, and scheduling. See also client user-options file, options file.
client user-options file
A file that contains the set of processing options that the clients on the system use. The set can include options that determine the server that the client contacts, and options that affect backup operations, archive operations, hierarchical storage management operations, and scheduled operations. This file is also called the dsm.opt file. For AIX, UNIX, or Linux systems, see also client system-options file. See also client system-options file, options file.
clone mode
In IBM Spectrum® Protect Plus, one of several modes that can be used to restore data. Clone mode creates a virtual machine copy for use over an extended period. The virtual machine copy is used for data mining or reproduction of a test environment.
closed registration
A registration process in which only an administrator can register workstations as client nodes with the server. See also open registration.
cloud-container storage pool
A storage pool that a server uses to store data in cloud storage. The cloud storage can be located on premises or off premises. See also container storage pool, directory-container storage pool, storage pool.
collocation
The process of keeping all data belonging to a single-client file space, a single client node, or a group of client nodes on a minimal number of sequential-access volumes within a storage pool. Collocation can reduce the number of volumes that must be accessed when a large amount of data must be restored.
collocation group
A user-defined group of client nodes whose data is stored on a minimal number of volumes through the process of collocation.
commit point
A point in time when data is considered to be consistent.
communication method
The method by which a client and server exchange information. See also Transmission Control Protocol/Internet Protocol.
communication protocol
A set of defined interfaces that permit computers to communicate with each other.
compression
A function that removes repetitive characters, spaces, strings of characters, or binary data from the data being processed and replaces characters with control characters. Compression reduces the amount of storage space that is required for data. See also inline compression.
configuration manager
A server that distributes configuration information, such as policies and schedules, to managed servers according to their profiles. Configuration information can include policy and schedules. See also enterprise configuration, managed server, profile.
container
A data storage location, for example, a file, directory, or device. See also container storage pool.
container-copy storage pool
A storage pool that a server uses to store copies of extents from directory-container storage pools. The copies are used to repair damage in a directory-container storage pool. Container-copy storage pools use sequential media such as tape. See also directory-container storage pool.
container storage pool
A primary storage pool that a server uses to store data. Data is stored in containers in file system directories or in cloud storage. Data is deduplicated, if necessary, as the server writes it to the storage pool. See also cloud-container storage pool, container, directory-container storage pool.
conversation
A connection between two programs over a session that allows them to communicate with each other while processing a transaction.
copy backup
A full backup in which the transaction log files are not deleted so that backup procedures that use incremental or differential backups are not disrupted.
copy group
A policy object containing attributes that control how backup versions or archive copies are generated, where backup versions or archive copies are initially located, and when backup versions or archive copies expire. A copy group belongs to a management class. See also archive copy group, backup copy group, backup version, management class.
copy storage pool
A named set of volumes that contain copies of files that reside in primary storage pools. Copy storage pools are used only to back up the data that is stored in primary storage pools. A copy storage pool cannot be a destination for a backup copy group, an archive copy group, or a management class (for space-managed files). See also destination, primary storage pool, server storage, storage pool, storage pool volume.

D

daemon
A program that runs unattended to perform continuous or periodic functions, such as network control.
damaged file
A physical file in which read errors have been detected.
database backup series
One full backup of the database, plus up to 32 incremental backups made since that full backup. Each full backup that is run starts a new database backup series. A number identifies each backup series. See also database snapshot, full backup.
database snapshot
A complete backup of the entire database to media that can be taken off-site. When a database snapshot is created, the current database backup series is not interrupted. A database snapshot cannot have incremental database backups associated with it. See also database backup series, full backup.
data center
In a virtualized environment, a container that holds hosts, clusters, networks, and data stores.
data deduplication
A method of reducing storage needs by eliminating redundant data. Only one instance of the data is retained on storage media. Other instances of the same data are replaced with a pointer to the retained instance. See also inline data deduplication, postprocess data deduplication.
data manager server
A server that collects metadata information for client inventory and manages transactions for the storage agent over the local area network. The data manager server informs the storage agent with applicable library attributes and the target volume identifier.
data mover
A device that moves data on behalf of the server. A network-attached storage (NAS) file server is a data mover.
data storage-management application-programming interface (DSMAPI)
A set of functions and semantics that can monitor events on files, and manage and maintain the data in a file. In an HSM environment, a DSMAPI uses events to notify data management applications about operations on files, stores arbitrary attribute information with a file, supports managed regions in a file, and uses DSMAPI access rights to control access to a file object.
data store
In a virtualized environment, the location where virtual machine data is stored.
deduplication
See data deduplication.
default management class
A management class that is assigned to a policy set. This class is used to govern backed up or archived files when a file is not explicitly associated with a specific management class through the include-exclude list.
demand migration
The process that is used to respond to an out-of-space condition on a file system for which hierarchical storage management (HSM) is active. Files are migrated to server storage until space usage drops to the low threshold that was set for the file system. If the high threshold and low threshold are the same, one file is migrated. See also automatic migration, selective migration, threshold migration.
destination
A copy group or management class attribute that specifies the primary storage pool to which a client file will be backed up, archived, or migrated. See also copy storage pool.
device class
A named set of characteristics that are applied to a group of storage devices. Each device class has a unique name and represents a device type of disk, file, optical disk, or tape.
device configuration file
  1. For a server, a file that contains information about defined device classes, and, on some servers, defined libraries and drives. The information is a copy of the device configuration information in the database.
  2. For a storage agent, a file that contains the name and password of the storage agent, and information about the server that is managing the SAN-attached libraries and drives that the storage agent uses.
directory-container storage pool
A storage pool that a server uses to store data in containers in storage pool directories. Data that is stored in a directory-container storage pool can use either inline or client-side data deduplication. See also cloud-container storage pool, container storage pool, container-copy storage pool, storage pool.
disaster recovery manager (DRM)
A function that assists in preparing and using a disaster recovery plan file for the server.
disaster recovery plan
A file that is created by the disaster recover manager (DRM) that contains information about how to recover computer systems if a disaster occurs and scripts that can be run to perform some recovery tasks. The file includes information about the software and hardware that is used by the server, and the location of recovery media.
domain
A grouping of client nodes with one or more policy sets, which manage data or storage resources for the client nodes. See also policy domain.
DRM
See disaster recovery manager.
DSMAPI
See data storage-management application-programming interface.
dynamic serialization
Copy serialization in which a file or folder is backed up or archived on the first attempt regardless of whether it changes during a backup or archive. See also shared dynamic serialization, shared static serialization, static serialization.

E

EA
See extended attribute.
EB
See exabyte.
EFS
See Encrypted File System.
Encrypted File System (EFS)
A file system that uses file system-level encryption.
enterprise configuration
A method of setting up servers so that the administrator can distribute the configuration of one of the servers to the other servers, using server-to-server communication. See also configuration manager, managed server, profile, subscription.
enterprise logging
The process of sending events from a server to a designated event server. The event server routes the events to designated receivers, such as to a user exit. See also event.
error log
A data set or file that is used to record error information about a product or system.
estimated capacity
The available space, in megabytes, of a storage pool.
event
An occurrence of significance to a task or system. Events can include completion or failure of an operation, a user action, or the change in state of a process. See also enterprise logging, receiver.
event record
A database record that describes actual status and results for events.
event server
A server to which other servers can send events for logging. The event server routes the events to any receivers that are enabled for the sending server's events.
exabyte (EB)
For processor, real and virtual storage capacities and channel volume, 2 to the power of 60 or 1 152 921 504 606 846 976 bytes. For disk storage capacity and communications volume, 1 000 000 000 000 000 000 bytes.
exclude
The process of identifying files in an include-exclude list. This process prevents the files from being backed up or migrated whenever a user or schedule enters an incremental or selective backup operation. A file can be excluded from backup, from space management, or from both backup and space management.
exclude-include list
See include-exclude list.
expiration
The process by which files, data sets, or objects are identified for deletion because their expiration date or retention period has passed.
expiring file
A migrated or premigrated file that has been marked for expiration and removal from storage. If a stub file or an original copy of a premigrated file is deleted from a local file system, or if the original copy of a premigrated file is updated, the corresponding migrated or premigrated file is marked for expiration the next time reconciliation is run.
extend
To increase the portion of available space that can be used to store database or recovery log information.
extended attribute (EA)
Names or value pairs that are associated with files or directories. There are three classes of extended attributes: user attributes, system attributes, and trusted attributes.
extent
The part of a file that is created during the data-deduplication process. Extents are compared with other file extents to identify duplicates.
external library
A collection of drives that is managed by the media-management system other than the storage management server.

F

file access time
On AIX, UNIX, or Linux systems, the time when the file was last accessed.
file age
For migration prioritization purposes, the number of days since a file was last accessed.
file device type
A device type that specifies the use of sequential access files on disk storage as volumes.
file server
A dedicated computer and its peripheral storage devices that are connected to a local area network that stores programs and files that are shared by users on the network.
file space
A logical space in server storage that contains a group of files that have been backed up or archived by a client node, from a single logical partition, file system, or virtual mount point. Client nodes can restore, retrieve, or delete their file spaces from server storage. In server storage, files belonging to a single file space are not necessarily stored together.
file space ID (FSID)
A unique numeric identifier that the server assigns to a file space when it is stored in server storage.
file state
The space management mode of a file that resides in a file system to which space management has been added. A file can be in one of three states: resident, premigrated, or migrated. See also migrated file, premigrated file, resident file.
file system migrator (FSM)
A kernel extension that intercepts all file system operations and provides any space management support that is required. If no space management support is required, the operation is passed to the operating system, which performs its normal functions. The file system migrator is mounted over a file system when space management is added to the file system.
file system state
The storage management mode of a file system that resides on a workstation on which the hierarchical storage management (HSM) client is installed. A file system can be in one of these states: native, active, inactive, or global inactive.
frequency
A copy group attribute that specifies the minimum interval, in days, between incremental backups.
FSID
See file space ID.
FSM
See file system migrator.
full backup
The process of backing up the entire server database. A full backup begins a new database backup series. See also database backup series, database snapshot, incremental backup.
fuzzy backup
A backup version of a file that might not accurately reflect what is currently in the file because the file was backed up at the same time as it was being modified.
fuzzy copy
A backup version or archive copy of a file that might not accurately reflect the original contents of the file because it was backed up or archived the file while the file was being modified.

G

GB
See gigabyte.
General Parallel File System (GPFS)
A high-performance shared-disk file system that can provide data access from nodes in a clustered system environment. See also information lifecycle management.
gigabyte (GB)
For processor storage, real and virtual storage, and channel volume, two to the power of 30 or 1,073,741,824 bytes. For disk storage capacity and communications volume, 1,000,000,000 bytes.
global inactive state
The state of all file systems to which space management has been added when space management is globally deactivated for a client node.
globally unique identifier (GUID)
An algorithmically determined number that uniquely identifies an entity within a system. See also Universally Unique Identifier.
GPFS
See General Parallel File System.
GPFS node set
A mounted, defined group of GPFS file systems.
group backup
The backup of a group containing a list of files from one or more file space origins.
GUID
See globally unique identifier.

H

hierarchical storage management (HSM)
A function that automatically distributes and manages data on disk, tape, or both by regarding devices of these types and potentially others as levels in a storage hierarchy that range from fast, expensive devices to slower, cheaper, and possibly removable devices. The objectives are to minimize access time to data and maximize available media capacity. See also hierarchical storage management client, recall, storage hierarchy.
hierarchical storage management client (HSM client)
A client program that works with the server to provide hierarchical storage management (HSM) for a system. See also hierarchical storage management, management class.
HSM
See hierarchical storage management.
HSM client
See hierarchical storage management client.

I

IBM Spectrum Protect command script
A sequence of IBM Spectrum Protect administrative commands that are stored in the database of the IBM Spectrum Protect server. The script can run from any interface to the server. The script can include substitution for command parameters and conditional logic. See also macro file, script.
ILM
See information lifecycle management.
image
A file system or raw logical volume that is backed up as a single object.
image backup
A backup of a full file system or raw logical volume as a single object.
inactive file system
A file system for which space management has been deactivated. See also active file system.
inactive version
A backup version of a file that is either not the most recent backup version, or that is a backup version of a file that no longer exists on the client system. Inactive backup versions are eligible for expiration processing according to the management class assigned to the file. See also active version, backup version.
include-exclude file
A file containing statements to determine the files to back up and the associated management classes to use for backup or archive. See also include-exclude list.
include-exclude list
A list of options that include or exclude selected files for backup. An exclude option identifies files that should not be backed up. An include option identifies files that are exempt from the exclusion rules or assigns a management class to a file or a group of files for backup or archive services. See also include-exclude file.
incremental backup
The process of backing up files or directories, or copying pages in the database, that are new or changed since the last full or incremental backup. See also selective backup.
individual mailbox restore
See mailbox restore.
information lifecycle management (ILM)
A policy-based file-management system for storage pools and file sets. See also General Parallel File System.
inline compression
A method for reducing storage space. Repetitive characters, spaces, strings of characters, or binary data is removed as data is written to a container storage pool. See also compression.
inline data deduplication
A method of reducing storage needs by eliminating redundant data. The data is deduplicated as it is written to a container storage pool. See also data deduplication, postprocess data deduplication.
inode
The internal structure that describes the individual files on AIX, UNIX, or Linux systems. An inode contains the node, type, owner, and location of a file.
inode number
A number specifying a particular inode file in the file system.
instant access
An operation that creates a temporary virtual machine and application data for backup verification, but does not restore the virtual machine.
IP address
A unique address for a device or logical unit on a network that uses the Internet Protocol standard.

J

job file
A generated file that contains configuration information for a migration job. The file is XML format and can be created and edited in the hierarchical storage management (HSM) client for Windows client graphical user interface. See also migration job.
journal-based backup
A method for backing up Windows clients and AIX clients that exploits the change notification mechanism in a file to improve incremental backup performance by reducing the need to fully scan the file system.
journal daemon
On AIX, UNIX, or Linux systems, a program that tracks change activity for files residing in file systems.
journal service
In Microsoft Windows, a program that tracks change activity for files residing in file systems.

K

KB
See kilobyte.
kilobyte (KB)
For processor storage, real and virtual storage, and channel volume, 2 to the power of 10 or 1,024 bytes. For disk storage capacity and communications volume, 1,000 bytes.

L

LAN
See local area network.
LAN-free data movement
The movement of client data between a client system and a storage device on a storage area network (SAN), bypassing the local area network.
LAN-free data transfer
See LAN-free data movement.
leader data
Bytes of data, from the beginning of a migrated file, that are stored in the file's corresponding stub file on the local file system. The amount of leader data that is stored in a stub file depends on the stub size that is specified.
library
  1. A repository for demountable recorded media, such as magnetic disks and magnetic tapes.
  2. A collection of one or more drives, and possibly robotic devices (depending on the library type), which can be used to access storage volumes.
library client
A server that uses server-to-server communication to access a library that is managed by another storage management server. See also library manager.
library manager
A server that controls device operations when multiple storage management servers share a storage device. See also library client.
local
  1. Pertaining to a device, file, or system that is accessed directly from a user system, without the use of a communication line.
  2. For hierarchical storage management products, pertaining to the destination of migrated files that are being moved. See also remote.
local area network (LAN)
A network that connects several devices in a limited area (such as a single building or campus) and that can be connected to a larger network.
local shadow volume
Data that is stored on shadow volumes localized to a disk storage subsystem.
LOFS
See loopback virtual file system.
logical file
A file that is stored in one or more server storage pools, either by itself or as part of an aggregate. See also aggregate, physical file, physical occupancy.
logical occupancy
The space that is used by logical files in a storage pool. This space does not include the unused space created when logical files are deleted from aggregate files, so it might be less than the physical occupancy. See also physical occupancy.
logical unit number (LUN)
In the Small Computer System Interface (SCSI) standard, a unique identifier used to differentiate devices, each of which is a logical unit (LU).
logical volume
A portion of a physical volume that contains a file system.
logical volume backup
A backup of a file system or logical volume as a single object.
Logical Volume Snapshot Agent (LVSA)
Software that can act as the snapshot provider for creating a snapshot of a logical volume during an online image backup.
loopback virtual file system (LOFS)
A file system that is created by mounting a directory over another local directory, also known as mount-over-mount. A LOFS can also be generated using an automounter.
LUN
See logical unit number.
LVSA
See Logical Volume Snapshot Agent.

M

macro file
A file that contains one or more IBM Spectrum Protect administrative commands, which can be run only from an administrative client using the MACRO command. See also IBM Spectrum Protect command script.
mailbox restore
A function that restores Microsoft Exchange Server data (from IBM® Data Protection for Microsoft Exchange backups) at the mailbox level or mailbox-item level.
managed object
A definition in the database of a managed server that was distributed to the managed server by a configuration manager. When a managed server subscribes to a profile, all objects that are associated with that profile become managed objects in the database of the managed server.
managed server
A server that receives configuration information from a configuration manager using a subscription to one or more profiles. Configuration information can include definitions of objects such as policy and schedules. See also configuration manager, enterprise configuration, profile, subscription.
management class
A policy object that users can bind to each file to specify how the server manages the file. The management class can contain a backup copy group, an archive copy group, and space management attributes. See also bind, copy group, hierarchical storage management client, policy set, rebind.
maximum transmission unit (MTU)
The largest block that can be sent on a given physical medium in a single frame. For example, the maximum transmission unit for Ethernet is 1500 bytes.
MB
See megabyte.
media server
In a z/OS® environment, a program that provides access to z/OS disk and tape storage for IBM Spectrum Protect servers that run on operating systems other than z/OS.
megabyte (MB)
For processor storage, real and virtual storage, and channel volume, 2 to the 20th power or 1,048,576 bytes. For disk storage capacity and communications volume, 1,000,000 bytes.
metadata
Data that describes the characteristics of data; descriptive data.
migrate
To move data to another location, or an application to another computer system.
migrated file
A file that has been copied from a local file system to storage. For HSM clients on UNIX or Linux systems, the file is replaced with a stub file on the local file system. On Windows systems, creation of the stub file is optional. See also file state, premigrated file, resident file, stub file.
migration
The process of moving data from one computer system to another, or an application to another computer system.
migration job
A specification of files to migrate, and actions to perform on the original files after migration. See also job file, threshold migration.
migration threshold
High and low capacities for storage pools or file systems, expressed as percentages, at which migration is set to start and stop.
mirroring
The process of writing the same data to multiple disks at the same time. The mirroring of data protects it against data loss within the database or within the recovery log.
mode
A copy group attribute that specifies whether to back up a file that has not been modified since the last time the file was backed up. See also absolute mode, modified mode.
modified mode
In storage management, a backup copy-group mode that specifies that a file or directory is considered for incremental backup only if it has changed since the last backup. A file or directory is considered changed if the date, size, owner, or permissions have changed. See also absolute mode, mode.
mount limit
The maximum number of volumes that can be simultaneously accessed from the same device class. The mount limit determines the maximum number of mount points. See also mount point.
mount point
A logical drive through which volumes are accessed in a sequential access device class. For removable media device types, such as tape, a mount point is a logical drive associated with a physical drive. For the file device type, a mount point is a logical drive associated with an I/O stream. See also mount limit.
mount retention period
The maximum number of minutes that the server retains a mounted sequential-access media volume that is not being used before it dismounts the sequential-access media volume.
mount wait period
The maximum number of minutes that the server waits for a sequential-access volume mount request to be satisfied before canceling the request.
MTU
See maximum transmission unit.

N

Nagle algorithm
An algorithm that reduces congestion of TCP/IP networks by combining smaller packets and sending them together.
named pipe
A type of interprocess communication that permits message data streams to pass between peer processes, such as between a client and a server.
NAS file server
See network-attached storage file server.
NAS file server node
See NAS node.
NAS node
A client node that is a network-attached storage (NAS) file server. Data for the NAS node is transferred by a NAS file server that is controlled by the network data management protocol (NDMP). A NAS node is also called a NAS file server node.
native file system
A file system that is locally added to the file server and is not added for space management. The hierarchical storage manager (HSM) client does not provide space management services to the file system.
native format
A format of data that is written to a storage pool directly by the server. See also non-native data format.
NDMP
See Network Data Management Protocol.
NetBIOS (Network Basic Input/Output System)
A standard interface to networks and personal computers that is used on local area networks to provide message, print-server, and file-server functions. Application programs that use NetBIOS do not have to handle the details of LAN data link control (DLC) protocols.
network-attached storage file server (NAS file server)
A dedicated storage device with an operating system that is optimized for file-serving functions. A NAS file server can have the characteristics of both a node and a data mover.
Network Basic Input/Output System
See NetBIOS.
Network Data Management Protocol (NDMP)
A protocol that allows a network storage-management application to control the backup and recovery of an NDMP-compliant file server, without installing vendor-acquired software on that file server.
network data-transfer rate
A rate that is calculated by dividing the total number of bytes that are transferred by the data transfer time. For example, this rate can be the time that is spent transferring data over a network.
node
A computer, virtual machine, or application that is registered to a server and that backs up or archives data to the server.
node name
A unique name that identifies a computer, virtual machine, or application to a server. See also node.
node privilege class
A privilege class that gives an administrator the authority to remotely access backup-archive clients for a specific client node or for all clients in a policy domain. See also privilege class.
non-native data format
A format of data that is written to a storage pool that differs from the format that the server uses for operations. See also native format.

O

offline volume backup
A backup in which the volume is locked so that no other system applications can access it during the backup operation.
onboard vSnap server
A vSnap server that is installed and registered by default with the IBM Spectrum Protect Plus virtual appliance. See also vSnap server.
online volume backup
A backup in which the volume is available to other system applications during the backup operation.
open registration
A registration process in which users can register their workstations as client nodes with the server. See also closed registration.
operator privilege class
A privilege class that gives an administrator the authority to disable or halt the server, enable the server, cancel server processes, and manage removable media. See also privilege class.
options file
A file that contains processing options. See also client system-options file, client user-options file.
originating file system
The file system from which a file was migrated. When a file is recalled, it is returned to its originating file system.
orphaned stub file
A file for which no migrated file can be found on the server that the client node is contacting for space management services. For example, a stub file can be orphaned when the client system-options file is modified to contact a server that is different than the one to which the file was migrated.

P

packet
In data communication, a sequence of binary digits, including data and control signals, that are transmitted and switched as a composite whole.
page
A defined unit of space on a storage medium or within a database volume.
partial-file recall mode
A recall mode that causes the hierarchical storage management (HSM) function to read just a portion of a migrated file from storage, as requested by the application accessing the file.
password generation
A process that creates and stores a new password in an encrypted password file when the old password expires. Automatic generation of a password prevents password prompting.
path
An object that defines a one-to-one relationship between a source and a destination. Using the path, the source accesses the destination. Data can flow from the source to the destination, and back. An example of a source is a data mover (such as a network-attached storage [NAS] file server), and an example of a destination is a tape drive.
pattern-matching character
See wildcard character.
physical file
A file that is stored in one or more storage pools, consisting of either a single logical file, or a group of logical files that are packaged together as an aggregate. See also aggregate, logical file, physical occupancy.
physical occupancy
The amount of space that is used by physical files in a storage pool. This space includes the unused space that is created when logical files are deleted from aggregates. See also logical file, logical occupancy, physical file.
plug-in
A separately installable software module that adds function to an existing program, application, or interface.
policy domain
A grouping of policy users with one or more policy sets, which manage data or storage resources for the users. The users are client nodes that are associated with the policy domain. See also active policy set, domain.
policy privilege class
A privilege class that gives an administrator the authority to manage policy objects, register client nodes, and schedule client operations for client nodes. Authority can be restricted to certain policy domains. See also privilege class.
policy set
A group of rules in a policy domain. The rules specify how data or storage resources are automatically managed for client nodes in the policy domain. Rules can be contained in management classes. See also active policy set, management class.
postprocess data deduplication
A method of reducing storage needs by eliminating redundant data. The data is first written to the storage pool, the duplicate data is identified, and then space is reclaimed in the storage pool. See also data deduplication, inline data deduplication.
premigrated file
A file that has been copied to server storage, but has not been replaced with a stub file on the local file system. An identical copy of the file resides both on the local file system and in server storage. Premigrated files occur on UNIX and Linux file systems to which space management has been added. See also file state, migrated file, resident file.
premigrated files database
A database that contains information about each file that has been premigrated to server storage.
premigration
The process of copying files that are eligible for migration to server storage, but leaving the original file intact on the local file system.
premigration percentage
A space management setting that controls whether the next eligible candidates in a file system are premigrated following threshold or demand migration.
primary site
A physical or virtual site that is made up of hardware, network, and storage resources. Typically, production operations run at the primary site. Data can be replicated to a secondary site for disaster recovery and failover operations. See also secondary site.
primary storage pool
A named set of volumes or containers that the server uses to store backup versions of files, archive copies of files, and files migrated from client nodes. See also copy storage pool, server storage, storage pool, storage pool volume.
privilege class
A level of authority that is granted to an administrator. The privilege class determines which administrative tasks the administrator can perform. See also authority, node privilege class, operator privilege class, policy privilege class, storage privilege class, system privilege class.
production mode
In IBM Spectrum Protect Plus, one of several modes that can be used to restore data. Production mode enables recovery from data loss and disaster scenarios by creating a recovery image of one or more virtual machines and applications. This operation can take place at a primary production site or at a recovery site.
profile
A named group of configuration information that can be distributed from a configuration manager when a managed server subscribes. Configuration information can include registered administrator IDs, policies, client schedules, client option sets, administrative schedules, storage manager command scripts, server definitions, and server group definitions. See also configuration manager, enterprise configuration, managed server.
profile association
On a configuration manager, the defined relationship between a profile and an object such as a policy domain. Profile associations define the configuration information that is distributed to a managed server when it subscribes to the profile.
protected site
See primary site.

Q

quota
  1. For HSM on AIX, UNIX, or Linux systems, the limit (in megabytes) on the amount of data that can be migrated and premigrated from a file system to server storage.
  2. For HSM on Windows systems, a user-defined limit to the space that is occupied by recalled files.

R

randomization
The process of distributing schedule start times for different clients within a specified percentage of the schedule's startup window.
raw logical volume
A portion of a physical volume that is comprised of unallocated blocks and has no journaled file system (JFS) definition. A logical volume is read/write accessible only through low-level I/O functions.
rebind
To associate all backed-up versions of a file with a new management class name. For example, a file that has an active backup version is rebound when a later version of the file is backed up with a different management class association. See also bind, management class.
recall
To copy a migrated file from server storage back to its originating file system using the hierarchical storage management client. See also selective recall.
receiver
A server repository that contains a log of server and client messages as events. For example, a receiver can be a file exit, a user exit, or the server console and activity log. See also event.
reclamation
The process of consolidating the remaining data from many sequential-access volumes onto fewer, new sequential-access volumes.
reclamation threshold
The percentage of space that a sequential-access media volume must have before the server can reclaim the volume. Space becomes reclaimable when files are expired or are deleted.
reconciliation
The process of ensuring consistency between the original data repository and the larger system where the data is stored for backup. Examples of larger systems where the data is stored for backup are storage servers or other storage systems. During the reconciliation process, data that is identified as no longer needed is removed.
recovery log
A log of updates that are about to be written to the database. The log can be used to recover from system and media failures. The recovery log consists of the active log (including the log mirror) and archive logs.
recovery site
See secondary site.
register
To define a client node or administrator ID that can access the server.
registry
A repository that contains access and configuration information for users, systems, and software.
remote
For hierarchical storage management products, pertaining to the origin of migrated files that are being moved. See also local.
resident file
On a Windows system, a complete file on a local file system that might also be a migrated file because a migrated copy can exist in server storage. On a UNIX or Linux system, a complete file on a local file system that has not been migrated or premigrated, or that has been recalled from server storage and modified.
restore
To copy information from its backup location to the active storage location for use. For example, to copy information from server storage to a client workstation.
retention
The amount of time, in days, that inactive backed-up or archived files are kept in the storage pool before they are deleted. Copy group attributes and default retention grace periods for the domain define retention.
retrieve
To copy archived information from the storage pool to the workstation for use. The retrieve operation does not affect the archive version in the storage pool. See also archive.
root user
A system user who operates without restrictions. A root user has the special rights and privileges needed to perform administrative tasks.

S

SAN
See storage area network.
schedule
A database record that describes client operations or administrative commands to be processed. See also administrative command schedule, client schedule.
scheduling mode
The type of scheduling operation for the server and client node that supports two scheduling modes: client-polling and server-prompted.
scratch volume
A labeled volume that is either blank or contains no valid data, that is not defined, and that is available for use. See also volume.
script
A series of commands, combined in a file, that carry out a particular function when the file is run. Scripts are interpreted as they are run. See also IBM Spectrum Protect command script.
secondary site
A physical or virtual site that is made up of the hardware, network, and storage resources that support the recovery needs of the primary site. When a failure occurs at the primary site, operations can continue at the secondary site. See also primary site.
Secure Sockets Layer (SSL)
A security protocol that provides communication privacy. With SSL, client/server applications can communicate in a way that is designed to prevent eavesdropping, tampering, and message forgery.
selective backup
The process of backing up certain files or directories from a client domain. The files that are backed up are those that are not excluded in the include-exclude list. The files must meet the requirement for serialization in the backup copy group of the management class that is assigned to each file. See also incremental backup.
selective migration
The process of copying user-selected files from a local file system to server storage and replacing the files with stub files on the local file system. See also demand migration, threshold migration.
selective recall
The process of copying user-selected files from server storage to a local file system. See also recall, transparent recall.
serialization
The process of handling files that are modified during backup or archive processing. See also shared dynamic serialization, shared static serialization, static serialization.
server
A software program or computer that processes requests from other software programs or computers, which are called clients. A server can also process requests from other servers. See also node, client/server.
server options file
A file that contains settings that control various server operations. These settings affect such things as communications, devices, and performance.
server-prompted scheduling mode
A client/server communication technique where the server contacts the client node when tasks must be done. See also client-polling scheduling mode.
server storage
The primary, copy, and active-data storage pools that are used by the server to store user files such as backup versions, archive copies, and files migrated from hierarchical storage management client nodes (space-managed files). See also active-data pool, container storage pool, copy storage pool, primary storage pool, storage pool volume, volume.
service level agreement policy (SLA policy)
In IBM Spectrum Protect Plus, a predefined or user-defined set of rules that apply to backup operations. Administrators can use a policy as a template to customize backup processes.
session
A logical or virtual connection between two stations, software programs, or devices on a network that allows the two elements to communicate and exchange data for the duration of the session. See also administrative session.
session resource usage
The amount of wait time, processor time, and space that is used or retrieved during a client session.
shadow copy
A snapshot of a volume. The snapshot can be taken while applications on the system continue to write data to the volumes.
shadow volume
The data stored from a snapshot of a volume. The snapshot can be taken while applications on the system continue to write data to the volumes.
shared dynamic serialization
A value for serialization that specifies that a file must not be backed up or archived if it is being modified during the operation. The backup-archive client retries the backup or archive operation a number of times; if the file is being modified during each attempt, the backup-archive client will back up or archive the file on its last try. See also dynamic serialization, serialization, shared static serialization, static serialization.
shared library
A library device that is used by multiple storage manager servers.
shared static serialization
A copy-group serialization value that specifies that a file must not be modified during a backup or archive operation. The client attempts to retry the operation a number of times. If the file is in use during each attempt, the file is not backed up or archived. See also dynamic serialization, serialization, shared dynamic serialization, static serialization.
SLA policy
See service level agreement policy.
snapshot
An image backup type that consists of a point-in-time view of a volume.
space-managed file
A file that is migrated from a client node by the hierarchical storage management (HSM) client. The HSM client recalls the file to the client node on demand.
space management
See hierarchical storage management.
space monitor daemon
A daemon that checks space usage on all file systems for which space management is active, and automatically starts threshold migration when space usage on a file system equals or exceeds its high threshold.
sparse file
A file that is created with a length greater than the data it contains, leaving empty spaces for the future addition of data.
special file
On AIX, UNIX, or Linux systems, a file that defines devices for the system, or temporary files that are created by processes. There are three basic types of special files: first-in, first-out (FIFO); block; and character.
SSL
See Secure Sockets Layer.
stabilized file space
A file space that exists on the server but not on the client.
stanza
A group of lines in a file that together have a common function or define a part of the system. Stanzas are usually separated by blank lines or colons, and each stanza has a name.
startup window
A time period during which a schedule must be initiated.
static serialization
A copy-group serialization value that specifies that a file must not be modified during a backup or archive operation. If the file is in use during the first attempt, the backup-archive client cannot back up or archive the file. See also dynamic serialization, serialization, shared dynamic serialization, shared static serialization.
storage agent
A program that enables the backup and restoration of client data directly to and from storage attached to a storage area network (SAN).
storage area network (SAN)
A dedicated storage network tailored to a specific environment, combining servers, systems, storage products, networking products, software, and services.
storage hierarchy
A logical order of primary storage pools, as defined by an administrator. The order is typically based on the speed and capacity of the devices that the storage pools use. The storage hierarchy is defined by identifying the next storage pool in a storage pool definition. See also storage pool.
storage pool
A set of storage volumes or containers that is the destination that is used to store client data. See also active-data pool, cloud-container storage pool, copy storage pool, directory-container storage pool, primary storage pool, storage hierarchy.
storage pool volume
A volume that has been assigned to a storage pool. See also active-data pool, copy storage pool, primary storage pool, server storage, volume.
storage privilege class
A privilege class that gives an administrator the authority to control how storage resources for the server are allocated and used, such as monitoring the database, the recovery log, and server storage. See also privilege class.
stub
A shortcut on the Windows file system that is generated by the hierarchical storage management (HSM) client for a migrated file that allows transparent user access. A stub is the sparse file representation of a migrated file, with a reparse point attached.
stub file
A file that replaces the original file on a local file system when the file is migrated to storage. A stub file contains the information that is necessary to recall a migrated file from server storage. It also contains additional information that can be used to eliminate the need to recall a migrated file. See also migrated file, resident file.
stub file size
The size of a file that replaces the original file on a local file system when the file is migrated to server storage. The size that is specified for stub files determines how much leader data can be stored in the stub file. The default for stub file size is the block size defined for a file system minus 1 byte.
subscription
In a storage environment, the process of identifying the subscribers to which the profiles are distributed. See also enterprise configuration, managed server.
system privilege class
A privilege class that gives an administrator the authority to issue all server commands. See also privilege class.

T

tape library
A set of equipment and facilities that support an installation's tape environment. The tape library can include tape storage racks, mechanisms for automatic tape mounting, a set of tape drives, and a set of related tape volumes mounted on those drives.
tape volume prefix
The high-level-qualifier of the file name or the data set name in the standard tape label.
target node
A client node for which other client nodes (called agent nodes) have been granted proxy authority. The proxy authority allows the agent nodes to perform operations such as backup and restore on behalf of the target node, which owns the data.
TCA
See trusted communications agent.
TCP/IP
See Transmission Control Protocol/Internet Protocol.
test mode
In IBM Spectrum Protect Plus, one of several modes that can be used to restore data. Test mode creates temporary virtual machines on a scheduled, repeatable basis without affecting production environments. The virtual machines can be used for development, testing, and verification activities.
threshold migration
The process of moving files from a local file system to server storage based on the high and low thresholds that are defined for the file system. See also automatic migration, demand migration, migration job, selective migration.
throughput
In storage management, the total bytes in the workload, excluding overhead, that are backed up or restored, divided by elapsed time.
timeout
A time interval that is allotted for an event to occur or complete before operation is interrupted.
tombstone object
A small subset of attributes of a deleted object. The tombstone object is retained for a specified period, and at the end of the specified period, the tombstone object is permanently deleted.
Transmission Control Protocol/Internet Protocol (TCP/IP)
An industry-standard, nonproprietary set of communication protocols that provides reliable end-to-end connections between applications over interconnected networks of different types. See also communication method.
transparent recall
The process that is used to automatically recall a migrated file to a workstation or file server when the file is accessed. See also selective recall.
trusted communications agent (TCA)
A program that handles the sign-on password protocol when clients use password generation.

U

UCS-2
A 2-byte (16-bit) encoding scheme based on ISO/IEC specification 10646-1. UCS-2 defines three levels of implementation: Level 1-No combining of encoded elements allowed; Level 2-Combining of encoded elements is allowed only for Thai, Indic, Hebrew, and Arabic; Level 3-Any combination of encoded elements is allowed.
UNC
See Universal Naming Convention.
Unicode
A character encoding standard that supports the interchange, processing, and display of text that is written in the common languages around the world, plus many classical and historical texts.
Unicode-enabled file space
A file space with a name that follows the Unicode standard and is compatible with any locale on multilingual workstations.
Universally Unique Identifier (UUID)
The 128-bit numeric identifier that is used to ensure that two components do not have the same identifier. See also globally unique identifier.
Universal Naming Convention (UNC)
The server name and network name combined. These names together identify the resource on the domain.
UTF-8
Unicode Transformation Format, 8-bit encoding form, which is designed for ease of use with existing ASCII-based systems. The CCSID value for data in UTF-8 format is 1208.
UUID
See Universally Unique Identifier.

V

VADP proxy
See VMware vStorage API for Data Protection proxy.
validate
To check a policy set for conditions that can cause problems if that policy set becomes the active policy set. For example, the validation process checks whether the policy set contains a default management class.
version
A backup copy of a file stored in server storage. The most recent backup copy of a file is the active version. Earlier copies of the same file are inactive versions. The number of versions retained by the server is determined by the copy group attributes in the management class.
virtual file space
A representation of a directory on a network-attached storage (NAS) file system as a path to that directory.
virtual mount point
A directory branch of a file system that is defined as a virtual file system. The virtual file system is backed up to its own file space on the server. The server processes the virtual mount point as a separate file system, but the client operating system does not.
virtual volume
An archive file on a target server that represents a sequential media volume to a source server.
VMware vStorage API for Data Protection proxy (VADP proxy)
In IBM Spectrum Protect Plus, a vStorage API for Data Protection (VADP) server that enables load sharing and load balancing for jobs in Linux environments. A backup environment can have one or more VADP proxies.
volume
A discrete unit of storage on disk, tape or other data recording medium that supports some form of identifier and parameter list, such as a volume label or input/output control. See also scratch volume, server storage, storage pool, storage pool volume.
volume history file
A file that contains information about volumes that have been used by the server for database backups and for export of administrator, node, policy, or server data. The file also has information about sequential-access storage pool volumes that have been added, reused, or deleted. The information is a copy of volume information that is recorded in the server database.
Volume Shadow Copy Service (VSS)
A set of Microsoft application-programming interfaces (APIs) that are used to create shadow copy backups of volumes, exact copies of files, including all open files, and so on.
vSnap server
A server that is the primary backup destination for the snapshots that are created by IBM Spectrum Protect Plus. A backup environment can have one or more vSnap servers. See also vSnap storage pool.
vSnap storage pool
A set of disks that are attached to a vSnap server and that are used to store backups. See also vSnap server.
VSS
See Volume Shadow Copy Service.
VSS Backup
A backup operation that uses Microsoft Volume Shadow Copy Service (VSS) technology. The backup operation produces an online snapshot (point-in-time consistent copy). This copy can be stored on local shadow volumes or on server storage.
VSS Fast Restore
An operation that restores data from a local snapshot. The snapshot is the VSS backup that resides on a local shadow volume. The restore operation retrieves the data by using a file-level copy method.
VSS Instant Restore
An operation that restores data from a local snapshot. The snapshot is the VSS backup that resides on a local shadow volume. The restore operation retrieves the data by using a hardware assisted restore method (for example, a FlashCopy® operation).
VSS offloaded backup
A backup operation that uses a Microsoft Volume Shadow Copy Service (VSS) hardware provider (installed on an alternate system) to move data to the server. This type of backup operation shifts the backup load from the production system to another system.
VSS Restore
A function that uses a Microsoft Volume Shadow Copy Service (VSS) software provider to restore snapshots that reside on server storage. The snapshots were created by a VSS Backup and are restored to their original location.

W

wildcard character
A special character such as an asterisk (*) or a question mark (?) that can be used to represent one or more characters. Any character or set of characters can replace the wildcard character.
workload partition (WPAR)
A partition within a single operating system instance.
workstation
A terminal or personal computer at which a user can run applications and that is usually connected to a mainframe or a network.
worldwide name (WWN)
A 64-bit, unsigned name identifier that is unique.
WPAR
See workload partition.
WWN
See worldwide name.