Flylib.com
Fibre Channel for Mass Storage
Fibre Channel for Mass Storage
ISBN: B000OHG7EW
EAN: 2147483647
Year: 1999
Pages: 53
Authors:
Ralph H. Thornburgh
BUY ON AMAZON
Fibre Channel for Mass Storage
Table of Contents
Copyright
List of Figures
Preface
What this book is about
Who should read this book?
Why is this book needed?
How to use this book
At a Glance
Acknowledgements
About the Author
Chapter 1. Overview of Fibre Channel for Mass Storage
1.1 Current Mass Storage Architectures
1.2 What is Fibre Channel?
1.3 Fibre Channel for Mass Storage
1.4 Advantages of Fibre Channel for Mass Storage
1.5 Basic Terms
1.6 Topologies
Chapter 2. Fibre Channel Functional Levels and Protocols
2.1 Functional Levels
2.2 FC-0: The Physical Layer
2.3 FC-1: The Transmission Protocol Level
2.4 FC-2: Framing Protocol
2.5 FC-3: Common Services
2.6 FC-4: Mapping
2.7 Upper Level Protocols
2.8 Classes of Service
Chapter 3. Fibre Channel Arbitrated Loop (FC-AL)
3.1 FC-AL Characteristics
3.2 Operations of the FC-AL
3.3 Hubs
3.4 Topologies
Chapter 4. Addressing
4.1 The Addressing Limitations of HP-UX
4.2 Addressing Methods for HP-UX
Chapter 5. Hewlett-Packard Fibre Channel Products
5.1 CONTROLLER IC s
5.2 Fibre Channel Adapter for the K-Class Systems
5.3 Fibre Channel Adapter for the T-Class Systems
5.4 Fibre Channel Adapter for the D-Class Systems
5.5 Fibre Channel Adapter for the V-Class Systems
5.6 Fibre Channel Arbitrated Loop Hub
5.7 High Availability Fibre Channel Disk Array
5.8 SCSI Multiplexer
5.9 FC Switch
5.10 Typical Hewlett-Packard FC Topologies
Chapter 6. Fibre Channel Futures
6.1 Future Enhancements
6.2 Sources for More Information Regarding Fibre Channel
Glossary
References
Fibre Channel for Mass Storage
ISBN: B000OHG7EW
EAN: 2147483647
Year: 1999
Pages: 53
Authors:
Ralph H. Thornburgh
BUY ON AMAZON
Absolute Beginner[ap]s Guide to Project Management
Variance Responses
Options for Issue Log
Best Practices
Keys to Better Project Team Performance
Methods for Ending a Contract or a Project
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
Why Risk Assessment
Preparing the Final Report
IT Security Architecture and Framework
Notice
Introduction to 80x86 Assembly Language and Computer Architecture
Parts of a Computer System
Branching and Looping
Bit Manipulation
The Assembly Process
Floating-Point Arithmetic
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Working with Fields
Working with Operators
How to Add Field Validation
Display Documents in a View by Year and Month
Adding Value into the Future
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 312 Cabinets, Cutout Boxes, and Meter Socket Enclosures
Article 332 Mineral-Insulated, Metal-Sheathed Cable Type MI
Article 500 Hazardous (Classified) Locations, Classes I, II, and III, Divisions 1 and 2
Tables 12(A) and 12(B)
Annex C. Conduit and Tubing Fill Tables for Conductors and Fixture Wires of the Same Size
802.11 Wireless Networks: The Definitive Guide, Second Edition
IEEE 802 Network Technology Family Tree
Dynamic WEP
Power over Ethernet (PoE)
Authentication and Access Control
11 Network Analysis Checklist
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies