Shopping Cart

No products in the cart.

BS ISO/IEC 24775-2:2014

$215.11

Information technology. Storage management – Common architecture

Published By Publication Date Number of Pages
BSI 2014 202
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
6 CONTENTS
19 FOREWORD
21 Introduction
23 1 Scope
24 2 Normative references
26 3 Terms, definitions, symbols, abbreviations, and conventions
3.1 Terms and definitions
33 3.2 Acronyms and abbreviations
34 3.3 Keywords
35 3.4 Conventions
36 4 Typographical Conventions
4.1 Maturity Model
4.2 Experimental Maturity Level
4.3 Implemented Maturity Level
Figures
Figure 1 – Experimental Maturity Level Tag
37 4.4 Stable Maturity Level
4.5 Finalized Maturity Level
4.6 Deprecated Material
Figure 2 – Implemented Maturity Level Tag
Figure 3 – Stable Maturity Level Tag
38 Figure 4 – Deprecated Tag
39 5 Transport and reference model
5.1 Introduction to transport and reference model
5.1.1 Overview
5.1.2 Language requirements
5.1.3 Communications requirements
5.1.4 XML Message Syntax and Semantics
5.2 Transport Stack
40 Figure 5 – Transport Stack
41 5.3 Reference model
5.3.1 Overview
5.3.2 Roles for Interface Constituents
Figure 6 – Reference Model
42 5.3.3 Cascaded Agents
43 6 Health and Fault Management
6.1 Objectives
6.2 Overview
6.3 General concepts
44 6.4 Description of Health and Fault Management
6.4.1 General
6.4.2 Operational Status and Health State (Polling)
Figure 7 – Basic Fault Detection
Tables
Table 1 – OperationalStatus for Disk Drive
45 6.4.3 Standard Errors and Events
6.4.4 Error and Alert indications
6.4.5 Indications
6.4.6 Event Correlation and Fault Containment
47 Figure 8 – Health lifecycle
48 6.4.7 Fault regions
Figure 9 – Continuum
49 Figure 10 – Application Fault Region
50 6.4.8 Examples
Figure 11 – Array Instance
52 Figure 12 – Switch Example
54 7 Object Model General Information
7.1 Model overview (Key resources)
7.1.1 Overview
7.1.2 Introduction to CIM UML notation
Figure 13 – Lines that Connect Classes
55 7.2 Techniques
7.2.1 CIM fundamentals
57 7.2.2 Modeling profiles
7.2.3 CIM Naming
58 8 Correlatable and durable names
8.1 Overview
59 8.2 Guidelines for SCSI Logical Unit Names
8.3 Guidelines for FC-SB-2 device names
60 8.4 Guidelines for port names
8.5 Guidelines for storage system names
61 8.6 Standard formats for correlatable names
8.6.1 General
8.6.2 Standard formats for Logical Unit names
Table 2 – Standard formats for StorageVolume names
63 8.6.3 Standard formats for port names
8.6.4 Standard formats for fabric names
8.6.5 Standard formats for storage system names
Table 3 – Standard formats for port names
64 Table 4 – Standard formats for storage system names
65 8.6.6 Operating system device names
66 Table 5 – Standard operating system names for tape devices
Table 6 – LogicalDisk.Name for disk partitions
Table 7 – GenericDiskParittion.Name for disk partitions
67 8.6.7 Case sensitivity
8.7 Testing equality of correlatable names
8.8 iSCSI names
Table 8 – Standard operating system names for unpartitioned disks
68 Figure 14 – iSCSI Qualified Names (iqn) examples
Figure 15 – iSCSI EUI Name example
Figure 16 – iSCSI 64-bit NAA Name example
Figure 17 – iSCSI 128-bit NAA Name example
69 9 Standard Messages
9.1 Overview
9.2 Required characteristics of Standard Messages
9.2.1 Declaring and producing Standard Messages
70 Table 9 – Example Standard Message Declaration
71 9.3 Message registry
9.3.1 Common Element Messages
Table 10 – Example Standard Message Values
Table 11 – Redundancy Message Arguments
72 Table 12 – Redundancy Alert Information
Table 13 – Environmental Message Arguments
73 Table 14 – Environmental Alert Information
Table 15 – FRU Operation Message Arguments
Table 16 – FRU Operation Alert Information
74 Table 17 – Password change Message Arguments
Table 18 – Password change Alert Information
Table 19 – User or Account Operation Message Arguments
75 Table 20 – User or Account Operation Alert Information
Table 21 – User Login Message Arguments
Table 22 – User Login Alert Information
76 Table 23 – Proxy Agent Device Communication Message Arguments
Table 24 – Proxy Agent Device Communication Alert Information
Table 25 – Port Status Changed Message Arguments
77 Table 26 – Port Status Changed Alert Information
Table 27 – Datacheck Error Message Arguments
Table 28 – Datacheck Error Alert Information
78 Table 29 – User Login Failure Message Arguments
Table 30 – User Login Failure Alert Information
Table 31 – Drive not responding Message Arguments
79 Table 32 – Drive not responding Alert Information
Table 33 – Cooling Fan Failure Alert Information
Table 34 – Power Supply Failure Alert Information
80 Table 35 – Drive Power Consumption Alert Information
Table 36 – Drive Voltage Alert Information
Table 37 – Predictive Failure Alert Information
81 9.3.2 Common Protocol Messages
Table 38 – Diagnostics Required Alert Information
Table 39 – Authorization Failure Message Arguments
Table 40 – Error Properties for Authorization Failure
82 Table 41 – Operation Not Supported Message Arguments
Table 42 – Property Not Found Message Arguments
83 Table 43 – Invalid Query Message Arguments
Table 44 – Parameter Error Message Arguments
Table 45 – Error Properties for Parameter Error
84 Table 46 – Query Syntax Error Message Arguments
Table 47 – Error Properties for Query Syntax Error
Table 48 – Query Too Expensive Message Arguments
Table 49 – Error Properties for Query Too Expensive
85 Table 50 – Class or Property Invalid in Query Message Arguments
Table 51 – Error Properties for Class or Property Invalid in Query
Table 52 – Invalid Join in Query Message Arguments
86 Table 53 – Error Properties for Invalid Join in Query
Table 54 – Unexpected Hardware Fault Message Arguments
Table 55 – Error Properties for Unexpected Hardware Fault
Table 56 – Too busy to respond Message Arguments
87 Table 57 – Shutdown Started Message Arguments
Table 58 – Shutdown Started Alert Information
Table 59 – Component overheat Message Arguments
Table 60 – Error Properties for Component overheat
88 Table 61 – Component overheat Alert Information
Table 62 – Device Failover Message Arguments
Table 63 – Functionality is not licensed Message Arguments
Table 64 – Error Properties for Functionality is not licensed
89 Table 65 – Invalid Property Combination during instance creation or modification Message Arguments
Table 66 – Error Properties for Invalid Property Combination during instance creation or modification
90 Table 67 – Property Not Found Message Arguments
Table 68 – Error Properties for Property Not Found
Table 69 – Proxy Can Not Connect Message Arguments
Table 70 – Error Properties for Proxy Can Not Connect
91 9.3.3 Storage Messages
Table 71 – Not Enough Memory Message Arguments
Table 72 – Error Properties for Not Enough Memory
Table 73 – Error Properties for Object Already Exists
92 Table 74 – Device Not ready Message Arguments
Table 75 – Error Properties for Device Not ready
Table 76 – Error Properties for Internal Bus Error
93 Table 77 – Error Properties for DMA Overflow
Table 78 – Error Properties for Firmware Logic Error
Table 79 – Front End Port Error Message Arguments
Table 80 – Front End Port Error Alert Information
94 Table 81 – Back End Port Error Message Arguments
Table 82 – Back End Port Error Alert Information
Table 83 – Remote Mirror Error Message Arguments
Table 84 – Error Properties for Remote Mirror Error
95 Table 85 – Remote Mirror Error Alert Information
Table 86 – Error Properties for Cache Memory Error
Table 87 – Error Properties for Unable to Access Remote Device
96 Table 88 – Error Reading Data Alert Information
Table 89 – Error Writing Data Alert Information
Table 90 – Error Validating Write (CRC) Alert Information
97 Table 91 – Error Properties for Copy Operation Failed
Table 92 – Error Properties for RAID Operation Failed
Table 93 – Error Properties for Invalid RAID Type
98 Table 94 – Error Properties for Invalid Storage Element Type
Table 95 – Error Properties for Configuration Change Failed
Table 96 – Error Properties for Buffer Overrun
99 Table 97 – Stolen Capacity Message Arguments
Table 98 – Error Properties for Stolen Capacity
Table 99 – Invalid Extent passed Message Arguments
Table 100 – Error Properties for Invalid Extent passed
100 Table 101 – Error Properties for Invalid Deletion Attempted
Table 102 – Error Properties for Job Failed to Start
Table 103 – Job was Halted Message Arguments
101 Table 104 – Invalid State Transition Message Arguments
Table 105 – Error Properties for Invalid State Transition
Table 106 – Invalid SAP for Method Message Arguments
Table 107 – Error Properties for Invalid SAP for Method
102 Table 108 – Resource Not Available Message Arguments
Table 109 – Error Properties for Resource Not Available
Table 110 – Resource Limit Exceeded Message Arguments
103 Table 111 – Error Properties for Resource Limit Exceeded
Table 112 – Thin Provision Capacity Warning Message Arguments
Table 113 – Thin Provision Capacity Warning Alert Information
104 Table 114 – Thin Provision Capacity Critical Message Arguments
Table 115 – Thin Provision Capacity Critical Alert Information
Table 116 – Thin Provision Capacity Okay Message Arguments
Table 117 – Thin Provision Capacity Okay Alert Information
105 9.3.4 Fabric Messages
Table 118 – Masking Group Membership Changed Message Arguments
Table 119 – Masking Group Membership Changed Alert Information
Table 120 – Zone Database Changed Message Arguments
106 Table 121 – Zone Database Changed Alert Information
Table 122 – ZoneSet Activated Message Arguments
Table 123 – ZoneSet Activated Alert Information
Table 124 – Error Properties for Session Locked
107 Table 125 – Error Properties for Session Aborted
Table 126 – Switch Status Changed Message Arguments
Table 127 – Switch Status Changed Alert Information
108 Table 128 – Fabric Merge/Segmentation Message Arguments
Table 129 – Fabric Merge/Segmentation Alert Information
Table 130 – Switch Added/Removed Message Arguments
109 Table 131 – Switch Added/Removed Alert Information
Table 132 – Fabric Added/Removed Message Arguments
Table 133 – Fabric Added/Removed Alert Information
Table 134 – Security Policy change Message Arguments
110 9.3.5 Host Messages
Table 135 – Security Policy change Alert Information
Table 136 – Required Firmware Version Message Arguments
Table 137 – Required Firmware Version Alert Information
111 Table 138 – Rec om ended Firmware Version Message Arguments
Table 139 – Rec om ended Firmware Version Alert Information
Table 140 – Controller OK Message Arguments
Table 141 – Controller OK Alert Information
Table 142 – Controller not OK Message Arguments
112 9.3.6 Media Library Messages
Table 143 – Controller not OK Alert Information
Table 144 – Bus rescan complete Alert Information
Table 145 – Disk initialize Failed Message Arguments
Table 146 – Disk initialize Failed Alert Information
113 Table 147 – Read Warning Alert Information
Table 148 – Write Warning Alert Information
Table 149 – Hard Error Alert Information
114 Table 150 – Media Alert Information
Table 151 – Read Failure Alert Information
Table 152 – Write Failure Alert Information
115 Table 153 – Media Life Alert Information
Table 154 – Not Data Grade Alert Information
Table 155 – Write Protect Alert Information
116 Table 156 – No Removal Alert Information
Table 157 – Cleaning Media Alert Information
Table 158 – Unsupported Format Alert Information
117 Table 159 – Recoverable Snapped Tape Alert Information
Table 160 – Unrecoverable Snapped Tape Alert Information
Table 161 – Memory Chip In Cartridge Failure Alert Information
118 Table 162 – Forced Eject Alert Information
Table 163 – Read Only Format Alert Information
Table 164 – Directory Corrupted On Load Alert Information
119 Table 165 – Nearing Media Life Alert Information
Table 166 – Clean Now Alert Information
Table 167 – Clean Periodic Alert Information
120 Table 168 – Expired Cleaning Media Alert Information
Table 169 – Invalid Cleaning Media Alert Information
Table 170 – Retention Requested Alert Information
121 Table 171 – Dual-Port Interface Error Alert Information
Table 172 – Drive Maintenance Alert Information
Table 173 – Hardware A Alert Information
122 Table 174 – Hardware B Alert Information
Table 175 – Interface Alert Information
Table 176 – Eject Media Alert Information
123 Table 177 – Download Failure Alert Information
Table 178 – Loader Hardware A Alert Information
Table 179 – Loader Stray Media Alert Information
124 Table 180 – Loader Hardware B Alert Information
Table 181 – Loader Door Alert Information
Table 182 – Loader Hardware C Alert Information
125 Table 183 – Loader Magazine Alert Information
Table 184 – Loader Predictive Failure Alert Information
Table 185 – Load Statistics Alert Information
126 Table 186 – Media Directory Invalid at Unload Alert Information
Table 187 – Media System area Write Failure Alert Information
Table 188 – Media System Area Read Failure Alert Information
127 Table 189 – No Start of Data Alert Information
Table 190 – Loading Failure Alert Information
Table 191 – Library Hardware A Alert Information
128 Table 192 – Library Hardware B Alert Information
Table 193 – Library Hardware C Alert Information
Table 194 – Library Hardware D Alert Information
129 Table 195 – Library Diagnostic Required Alert Information
Table 196 – Library Interface Alert Information
Table 197 – Failure Prediction Alert Information
130 Table 198 – Library Maintenance Alert Information
Table 199 – Library Humidity Limits Alert Information
Table 200 – Library Voltage Limits Alert Information
131 Table 201 – Library Stray Media Alert Information
Table 202 – Library Pick Retry Alert Information
Table 203 – Library Place Retry Alert Information
132 Table 204 – Library Load Retry Alert Information
Table 205 – Library Door Alert Information
Table 206 – Library Mailslot Alert Information
133 Table 207 – Library Magazine Alert Information
Table 208 – Library Security Alert Information
Table 209 – Library Security Mode Alert Information
134 Table 210 – Library Offline Alert Information
Table 211 – Library Drive Offline Alert Information
Table 212 – Library Scan Retry Alert Information
135 Table 213 – Library Inventory Alert Information
Table 214 – Library Illegal Operation Alert Information
Table 215 – Pass Through Mechanism Failure Alert Information
136 Table 216 – Cartridge in Pass-through Mechanism Alert Information
Table 217 – Unreadable barcode Labels Alert Information
137 10 Service discovery
10.1 Objectives
10.2 Overview
139 10.3 SLP Messages
140 10.4 Scopes
Table 218 – Message Types
141 10.5 Services Definition
10.5.1 General
10.5.2 Service Type
10.5.3 Service Attributes
143 10.6 User Agents (UA)
144 10.7 Service Agents (SAs)
10.8 Directory Agents (DAs)
10.9 Service Agent Server (SA Server)
10.9.1 General Information
145 10.9.2 SA Server (SAS) Implementation
10.9.3 SA Server (SAS) Clients
146 10.9.4 SA Server Configuration
Table 219 – Required Configuration Properties for SA as DA
Table 220 – Required Configuration Properties for SA
147 10.9.5 SA Server Discovery
10.9.6 SAS Client Registration
Figure 18 – SA Server Configuration
148 10.10 Configurations
10.10.1 General
10.10.2 Multicast Configurations
10.10.3 No Multicast configuration
Figure 19 – Multicast Configuration
149 10.10.4 Multicast Islands
Figure 20 – No Multicast configuration
150 10.11 ‘Standard WBEM’ Service Type Templates
Figure 21 – Multicast Islands
154 11 Information Technology – Storage Management roles
11.1 Introduction to storage management roles
Figure 22 – SMI_S Roles
155 11.2 Information Technology – Storage Management Client
11.2.1 Overview
11.2.2 SLP functions
11.2.3 WBEM protocol functions
11.2.4 Security considerations
11.2.5 Lock management functions
11.3 Dedicated Information Technology – Storage Management Server
11.3.1 Overview
156 11.3.2 SLP functions
11.3.3 WBEM protocol functions
157 11.3.4 Security considerations
11.3.5 Lock management functions
11.4 General Purpose Information Technology – Storage Management Server
11.4.1 Overview
11.4.2 SLP functions
158 11.4.3 CIM-XML protocol functions
11.4.4 Lock management functions
11.4.5 Provider Subrole
11.5 Directory Server
11.5.1 General
11.5.2 SLP functions
159 11.5.3 CIM-XML protocol functions
11.5.4 Security considerations
11.5.5 Lock management functions
11.6 Combined roles on a single system
11.6.1 Overview
11.6.2 General Purpose Information Technology – Storage Management Server as a Profile Aggregator
160 12 Installation and upgrade
12.1 Overview
12.2 Role of the administrator
12.3 Goals
12.3.1 Non-disruptive installation and De-installation
12.3.2 Plug-and-Play
161 12.4 Server deployment
12.4.1 General
12.4.2 Controlled environment
12.4.3 Multiple CIMOM systems
162 12.4.4 Shared CIMOM
163 12.4.5 Uninstallation
12.4.6 Update
12.4.7 Reconfiguration
12.5 WBEM service support and related functions
12.5.1 Installation
164 12.5.2 Multiple CIM Servers on a Single Server System
12.5.3 Uninstallation/Upgrade
12.5.4 Reconfiguration
12.5.5 Failure
12.6 Client
12.6.1 Uninstallation
12.6.2 Reconfiguration
12.7 Directory Service
12.7.1 Installation
165 12.7.2 Uninstallation/Failure
12.8 Issues with Discovery mechanisms
166 13 Security
13.1 Objectives
13.2 Overview
13.2.1 General
167 13.2.2 General requirements for HTTP implementations
168 13.3 Description of SMI-S Security
13.3.1 General
13.3.2 Transport security
169 13.3.3 SSL 3.0 and TLS
173 13.3.4 Authentication
174 13.3.5 Indications
175 13.3.6 Service Discovery
176 13.3.7 HTTP Realms
177 13.4 Security Guidance
13.4.1 SSL 3.0 and TLS guidance
178 13.4.2 Authentication guidance
182 13.4.3 Authorization
183 Table 221 – ACL for File “XYZ”
184 13.4.4 Using IT Infrastructure Securely – Service Discovery
185 Annex A
A.1 Purpose of this annex
A.2 CIM-to-MIB mapping overview
A.3 The SML MIB
187 Annex B
B.1 Compliance statement
B.2 How compliance of the architecture is declared
B.3 How compliance of the model is declared
B.4 The Server Profile and compliance
B.4.1 General
B.4.2 Example
188 B.5 Backward compatibility
B.5.1 General
189 B.5.2 Overview
Figure B.1 – Provider migration
190 B.5.3 Requirements
191 B.5.4 Implementation considerations
B.6 Rules for combining (autonomous) profiles
B.6.1 General
B.6.2 Backward Compatibility Rules for combining profiles
192 B.6.3 Conditions for a new profile
B.7 Rules for vendor extensions
B.7.1 General
B.7.2 Objectives for vendor extension rules
193 B.7.3 Vendor extensions and compliance rules
B.7.4 Vendor extensions and backward compatibility rules
194 B.7.5 Vendor extensions and SMI-S Nullification
B.7.6 Vendor Extensions that Avoid Client Confusion
196 Annex C
C.1 Overview
C.2 Instance creation
C.2.1 Filter string
C.2.2 Semantics
C.3 Instance deletion
C.3.1 Filter string
C.3.2 Semantics
C.4 Modification of any value in an array property
C.4.1 WQL string
197 C.4.2 CQL string
C.4.3 Semantics
C.5 Modification to either of two specific values in an array property
C.5.1 WQL string
C.5.2 CQL string
C.5.3 Semantics
C.6 Alert
C.6.1 Filter string
C.6.2 Semantic
198 Bibliography
BS ISO/IEC 24775-2:2014
$215.11