Copyright © 2010 Caringo, Inc.All rights reserved iiiVersion 5.0December 2010Table of Contents1. Introduction to DX Storage Objects ....................................................................................... 11.1. Introducing Named Objects ....................................................................................... 11.2. Summary of Named Objects and Unnamed Objects .................................................... 21.3. Common Named Object Terminology ......................................................................... 21.4. About DX Storage Object Types ................................................................................ 31.5. Bucket and Object Naming Rules .............................................................................. 31.6. Simple Examples of Creating Buckets and Named Objects .......................................... 31.7. Universal Resource Identifiers (URIs) ......................................................................... 41.8. About Objects and Security ....................................................................................... 51.8.1. The Basics of DX Storage Security ................................................................. 51.8.2. Commonly Used Security Terminology ............................................................ 61.8.3. Basic Security Guidelines ............................................................................... 61.9. Concepts for Unnamed Objects ................................................................................. 61.9.1. Universally Unique Identifiers (UUIDs) ............................................................. 61.9.2. About Immutable Objects ................................................................................ 71.9.3. About Anchor Streams ................................................................................... 71.10. Document Typographical Conventions ...................................................................... 82. Connecting to a DX Storage Cluster ..................................................................................... 92.1. About the Primary Access Node (PAN) ...................................................................... 92.2. Requirements for Node Accessibility .......................................................................... 92.2.1. Using the DX Storage Software Development Kit (SDK) .................................... 92.2.2. Using Multicast-DNS (mDNS) ........................................................................ 102.2.3. Using DNS Round Robin .............................................................................. 102.2.4. Using a Pool of Static IP Addresses .............................................................. 112.2.5. Using a Single Static IP Address ................................................................... 113. Application Best Practices .................................................................................................. 123.1. Using the Software Development Kit (SDK) .............................................................. 123.2. Dynamically Locating DX Storage Nodes .................................................................. 123.3. Optimizing Bucket and Domain Operations ............................................................... 123.4. Using HTTP Client Libraries .................................................................................... 123.5. Handling Redirects .................................................................................................. 133.6. Using Range Headers ............................................................................................. 133.7. Multi-Threading ....................................................................................................... 143.8. Using Persistent Connections ................................................................................. 144. Introduction to the Simple Content Storage Protocol (SCSP) ................................................ 154.1. Mapping SCSP Operations to HTTP Methods ........................................................... 154.2. HTTP Overview ...................................................................................................... 164.3. Requests and Responses ........................................................................................ 164.3.1. HTTP Response Codes ................................................................................ 164.3.2. Redirect Responses ..................................................................................... 174.4. Formatting SCSP Commands for Named and Unnamed Objects ................................ 174.5. Undefined Responses from DX Storage ................................................................... 184.6. Normal Response Headers ...................................................................................... 195. SCSP READ ..................................................................................................................... 225.1. Introduction to READ .............................................................................................. 225.1.1. Reading With Content Validation ................................................................... 225.1.2. Requestion Node Status and Cluster Capacity ............................................... 225.2. Unnamed Object READ Details ............................................................................... 235.3. Normal Responses to READ ................................................................................... 235.3.1. Normal READ Responses for Named Objects ................................................ 235.3.2. Normal READ Response for Unnamed Objects .............................................. 24