BS ISO/IEC 24775-2:2014
$215.11
Information technology. Storage management – Common architecture
Published By | Publication Date | Number of Pages |
BSI | 2014 | 202 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
6 | CONTENTS |
19 | FOREWORD |
21 | Introduction |
23 | 1 Scope |
24 | 2 Normative references |
26 | 3 Terms, definitions, symbols, abbreviations, and conventions 3.1 Terms and definitions |
33 | 3.2 Acronyms and abbreviations |
34 | 3.3 Keywords |
35 | 3.4 Conventions |
36 | 4 Typographical Conventions 4.1 Maturity Model 4.2 Experimental Maturity Level 4.3 Implemented Maturity Level Figures Figure 1 – Experimental Maturity Level Tag |
37 | 4.4 Stable Maturity Level 4.5 Finalized Maturity Level 4.6 Deprecated Material Figure 2 – Implemented Maturity Level Tag Figure 3 – Stable Maturity Level Tag |
38 | Figure 4 – Deprecated Tag |
39 | 5 Transport and reference model 5.1 Introduction to transport and reference model 5.1.1 Overview 5.1.2 Language requirements 5.1.3 Communications requirements 5.1.4 XML Message Syntax and Semantics 5.2 Transport Stack |
40 | Figure 5 – Transport Stack |
41 | 5.3 Reference model 5.3.1 Overview 5.3.2 Roles for Interface Constituents Figure 6 – Reference Model |
42 | 5.3.3 Cascaded Agents |
43 | 6 Health and Fault Management 6.1 Objectives 6.2 Overview 6.3 General concepts |
44 | 6.4 Description of Health and Fault Management 6.4.1 General 6.4.2 Operational Status and Health State (Polling) Figure 7 – Basic Fault Detection Tables Table 1 – OperationalStatus for Disk Drive |
45 | 6.4.3 Standard Errors and Events 6.4.4 Error and Alert indications 6.4.5 Indications 6.4.6 Event Correlation and Fault Containment |
47 | Figure 8 – Health lifecycle |
48 | 6.4.7 Fault regions Figure 9 – Continuum |
49 | Figure 10 – Application Fault Region |
50 | 6.4.8 Examples Figure 11 – Array Instance |
52 | Figure 12 – Switch Example |
54 | 7 Object Model General Information 7.1 Model overview (Key resources) 7.1.1 Overview 7.1.2 Introduction to CIM UML notation Figure 13 – Lines that Connect Classes |
55 | 7.2 Techniques 7.2.1 CIM fundamentals |
57 | 7.2.2 Modeling profiles 7.2.3 CIM Naming |
58 | 8 Correlatable and durable names 8.1 Overview |
59 | 8.2 Guidelines for SCSI Logical Unit Names 8.3 Guidelines for FC-SB-2 device names |
60 | 8.4 Guidelines for port names 8.5 Guidelines for storage system names |
61 | 8.6 Standard formats for correlatable names 8.6.1 General 8.6.2 Standard formats for Logical Unit names Table 2 – Standard formats for StorageVolume names |
63 | 8.6.3 Standard formats for port names 8.6.4 Standard formats for fabric names 8.6.5 Standard formats for storage system names Table 3 – Standard formats for port names |
64 | Table 4 – Standard formats for storage system names |
65 | 8.6.6 Operating system device names |
66 | Table 5 – Standard operating system names for tape devices Table 6 – LogicalDisk.Name for disk partitions Table 7 – GenericDiskParittion.Name for disk partitions |
67 | 8.6.7 Case sensitivity 8.7 Testing equality of correlatable names 8.8 iSCSI names Table 8 – Standard operating system names for unpartitioned disks |
68 | Figure 14 – iSCSI Qualified Names (iqn) examples Figure 15 – iSCSI EUI Name example Figure 16 – iSCSI 64-bit NAA Name example Figure 17 – iSCSI 128-bit NAA Name example |
69 | 9 Standard Messages 9.1 Overview 9.2 Required characteristics of Standard Messages 9.2.1 Declaring and producing Standard Messages |
70 | Table 9 – Example Standard Message Declaration |
71 | 9.3 Message registry 9.3.1 Common Element Messages Table 10 – Example Standard Message Values Table 11 – Redundancy Message Arguments |
72 | Table 12 – Redundancy Alert Information Table 13 – Environmental Message Arguments |
73 | Table 14 – Environmental Alert Information Table 15 – FRU Operation Message Arguments Table 16 – FRU Operation Alert Information |
74 | Table 17 – Password change Message Arguments Table 18 – Password change Alert Information Table 19 – User or Account Operation Message Arguments |
75 | Table 20 – User or Account Operation Alert Information Table 21 – User Login Message Arguments Table 22 – User Login Alert Information |
76 | Table 23 – Proxy Agent Device Communication Message Arguments Table 24 – Proxy Agent Device Communication Alert Information Table 25 – Port Status Changed Message Arguments |
77 | Table 26 – Port Status Changed Alert Information Table 27 – Datacheck Error Message Arguments Table 28 – Datacheck Error Alert Information |
78 | Table 29 – User Login Failure Message Arguments Table 30 – User Login Failure Alert Information Table 31 – Drive not responding Message Arguments |
79 | Table 32 – Drive not responding Alert Information Table 33 – Cooling Fan Failure Alert Information Table 34 – Power Supply Failure Alert Information |
80 | Table 35 – Drive Power Consumption Alert Information Table 36 – Drive Voltage Alert Information Table 37 – Predictive Failure Alert Information |
81 | 9.3.2 Common Protocol Messages Table 38 – Diagnostics Required Alert Information Table 39 – Authorization Failure Message Arguments Table 40 – Error Properties for Authorization Failure |
82 | Table 41 – Operation Not Supported Message Arguments Table 42 – Property Not Found Message Arguments |
83 | Table 43 – Invalid Query Message Arguments Table 44 – Parameter Error Message Arguments Table 45 – Error Properties for Parameter Error |
84 | Table 46 – Query Syntax Error Message Arguments Table 47 – Error Properties for Query Syntax Error Table 48 – Query Too Expensive Message Arguments Table 49 – Error Properties for Query Too Expensive |
85 | Table 50 – Class or Property Invalid in Query Message Arguments Table 51 – Error Properties for Class or Property Invalid in Query Table 52 – Invalid Join in Query Message Arguments |
86 | Table 53 – Error Properties for Invalid Join in Query Table 54 – Unexpected Hardware Fault Message Arguments Table 55 – Error Properties for Unexpected Hardware Fault Table 56 – Too busy to respond Message Arguments |
87 | Table 57 – Shutdown Started Message Arguments Table 58 – Shutdown Started Alert Information Table 59 – Component overheat Message Arguments Table 60 – Error Properties for Component overheat |
88 | Table 61 – Component overheat Alert Information Table 62 – Device Failover Message Arguments Table 63 – Functionality is not licensed Message Arguments Table 64 – Error Properties for Functionality is not licensed |
89 | Table 65 – Invalid Property Combination during instance creation or modification Message Arguments Table 66 – Error Properties for Invalid Property Combination during instance creation or modification |
90 | Table 67 – Property Not Found Message Arguments Table 68 – Error Properties for Property Not Found Table 69 – Proxy Can Not Connect Message Arguments Table 70 – Error Properties for Proxy Can Not Connect |
91 | 9.3.3 Storage Messages Table 71 – Not Enough Memory Message Arguments Table 72 – Error Properties for Not Enough Memory Table 73 – Error Properties for Object Already Exists |
92 | Table 74 – Device Not ready Message Arguments Table 75 – Error Properties for Device Not ready Table 76 – Error Properties for Internal Bus Error |
93 | Table 77 – Error Properties for DMA Overflow Table 78 – Error Properties for Firmware Logic Error Table 79 – Front End Port Error Message Arguments Table 80 – Front End Port Error Alert Information |
94 | Table 81 – Back End Port Error Message Arguments Table 82 – Back End Port Error Alert Information Table 83 – Remote Mirror Error Message Arguments Table 84 – Error Properties for Remote Mirror Error |
95 | Table 85 – Remote Mirror Error Alert Information Table 86 – Error Properties for Cache Memory Error Table 87 – Error Properties for Unable to Access Remote Device |
96 | Table 88 – Error Reading Data Alert Information Table 89 – Error Writing Data Alert Information Table 90 – Error Validating Write (CRC) Alert Information |
97 | Table 91 – Error Properties for Copy Operation Failed Table 92 – Error Properties for RAID Operation Failed Table 93 – Error Properties for Invalid RAID Type |
98 | Table 94 – Error Properties for Invalid Storage Element Type Table 95 – Error Properties for Configuration Change Failed Table 96 – Error Properties for Buffer Overrun |
99 | Table 97 – Stolen Capacity Message Arguments Table 98 – Error Properties for Stolen Capacity Table 99 – Invalid Extent passed Message Arguments Table 100 – Error Properties for Invalid Extent passed |
100 | Table 101 – Error Properties for Invalid Deletion Attempted Table 102 – Error Properties for Job Failed to Start Table 103 – Job was Halted Message Arguments |
101 | Table 104 – Invalid State Transition Message Arguments Table 105 – Error Properties for Invalid State Transition Table 106 – Invalid SAP for Method Message Arguments Table 107 – Error Properties for Invalid SAP for Method |
102 | Table 108 – Resource Not Available Message Arguments Table 109 – Error Properties for Resource Not Available Table 110 – Resource Limit Exceeded Message Arguments |
103 | Table 111 – Error Properties for Resource Limit Exceeded Table 112 – Thin Provision Capacity Warning Message Arguments Table 113 – Thin Provision Capacity Warning Alert Information |
104 | Table 114 – Thin Provision Capacity Critical Message Arguments Table 115 – Thin Provision Capacity Critical Alert Information Table 116 – Thin Provision Capacity Okay Message Arguments Table 117 – Thin Provision Capacity Okay Alert Information |
105 | 9.3.4 Fabric Messages Table 118 – Masking Group Membership Changed Message Arguments Table 119 – Masking Group Membership Changed Alert Information Table 120 – Zone Database Changed Message Arguments |
106 | Table 121 – Zone Database Changed Alert Information Table 122 – ZoneSet Activated Message Arguments Table 123 – ZoneSet Activated Alert Information Table 124 – Error Properties for Session Locked |
107 | Table 125 – Error Properties for Session Aborted Table 126 – Switch Status Changed Message Arguments Table 127 – Switch Status Changed Alert Information |
108 | Table 128 – Fabric Merge/Segmentation Message Arguments Table 129 – Fabric Merge/Segmentation Alert Information Table 130 – Switch Added/Removed Message Arguments |
109 | Table 131 – Switch Added/Removed Alert Information Table 132 – Fabric Added/Removed Message Arguments Table 133 – Fabric Added/Removed Alert Information Table 134 – Security Policy change Message Arguments |
110 | 9.3.5 Host Messages Table 135 – Security Policy change Alert Information Table 136 – Required Firmware Version Message Arguments Table 137 – Required Firmware Version Alert Information |
111 | Table 138 – Rec om ended Firmware Version Message Arguments Table 139 – Rec om ended Firmware Version Alert Information Table 140 – Controller OK Message Arguments Table 141 – Controller OK Alert Information Table 142 – Controller not OK Message Arguments |
112 | 9.3.6 Media Library Messages Table 143 – Controller not OK Alert Information Table 144 – Bus rescan complete Alert Information Table 145 – Disk initialize Failed Message Arguments Table 146 – Disk initialize Failed Alert Information |
113 | Table 147 – Read Warning Alert Information Table 148 – Write Warning Alert Information Table 149 – Hard Error Alert Information |
114 | Table 150 – Media Alert Information Table 151 – Read Failure Alert Information Table 152 – Write Failure Alert Information |
115 | Table 153 – Media Life Alert Information Table 154 – Not Data Grade Alert Information Table 155 – Write Protect Alert Information |
116 | Table 156 – No Removal Alert Information Table 157 – Cleaning Media Alert Information Table 158 – Unsupported Format Alert Information |
117 | Table 159 – Recoverable Snapped Tape Alert Information Table 160 – Unrecoverable Snapped Tape Alert Information Table 161 – Memory Chip In Cartridge Failure Alert Information |
118 | Table 162 – Forced Eject Alert Information Table 163 – Read Only Format Alert Information Table 164 – Directory Corrupted On Load Alert Information |
119 | Table 165 – Nearing Media Life Alert Information Table 166 – Clean Now Alert Information Table 167 – Clean Periodic Alert Information |
120 | Table 168 – Expired Cleaning Media Alert Information Table 169 – Invalid Cleaning Media Alert Information Table 170 – Retention Requested Alert Information |
121 | Table 171 – Dual-Port Interface Error Alert Information Table 172 – Drive Maintenance Alert Information Table 173 – Hardware A Alert Information |
122 | Table 174 – Hardware B Alert Information Table 175 – Interface Alert Information Table 176 – Eject Media Alert Information |
123 | Table 177 – Download Failure Alert Information Table 178 – Loader Hardware A Alert Information Table 179 – Loader Stray Media Alert Information |
124 | Table 180 – Loader Hardware B Alert Information Table 181 – Loader Door Alert Information Table 182 – Loader Hardware C Alert Information |
125 | Table 183 – Loader Magazine Alert Information Table 184 – Loader Predictive Failure Alert Information Table 185 – Load Statistics Alert Information |
126 | Table 186 – Media Directory Invalid at Unload Alert Information Table 187 – Media System area Write Failure Alert Information Table 188 – Media System Area Read Failure Alert Information |
127 | Table 189 – No Start of Data Alert Information Table 190 – Loading Failure Alert Information Table 191 – Library Hardware A Alert Information |
128 | Table 192 – Library Hardware B Alert Information Table 193 – Library Hardware C Alert Information Table 194 – Library Hardware D Alert Information |
129 | Table 195 – Library Diagnostic Required Alert Information Table 196 – Library Interface Alert Information Table 197 – Failure Prediction Alert Information |
130 | Table 198 – Library Maintenance Alert Information Table 199 – Library Humidity Limits Alert Information Table 200 – Library Voltage Limits Alert Information |
131 | Table 201 – Library Stray Media Alert Information Table 202 – Library Pick Retry Alert Information Table 203 – Library Place Retry Alert Information |
132 | Table 204 – Library Load Retry Alert Information Table 205 – Library Door Alert Information Table 206 – Library Mailslot Alert Information |
133 | Table 207 – Library Magazine Alert Information Table 208 – Library Security Alert Information Table 209 – Library Security Mode Alert Information |
134 | Table 210 – Library Offline Alert Information Table 211 – Library Drive Offline Alert Information Table 212 – Library Scan Retry Alert Information |
135 | Table 213 – Library Inventory Alert Information Table 214 – Library Illegal Operation Alert Information Table 215 – Pass Through Mechanism Failure Alert Information |
136 | Table 216 – Cartridge in Pass-through Mechanism Alert Information Table 217 – Unreadable barcode Labels Alert Information |
137 | 10 Service discovery 10.1 Objectives 10.2 Overview |
139 | 10.3 SLP Messages |
140 | 10.4 Scopes Table 218 – Message Types |
141 | 10.5 Services Definition 10.5.1 General 10.5.2 Service Type 10.5.3 Service Attributes |
143 | 10.6 User Agents (UA) |
144 | 10.7 Service Agents (SAs) 10.8 Directory Agents (DAs) 10.9 Service Agent Server (SA Server) 10.9.1 General Information |
145 | 10.9.2 SA Server (SAS) Implementation 10.9.3 SA Server (SAS) Clients |
146 | 10.9.4 SA Server Configuration Table 219 – Required Configuration Properties for SA as DA Table 220 – Required Configuration Properties for SA |
147 | 10.9.5 SA Server Discovery 10.9.6 SAS Client Registration Figure 18 – SA Server Configuration |
148 | 10.10 Configurations 10.10.1 General 10.10.2 Multicast Configurations 10.10.3 No Multicast configuration Figure 19 – Multicast Configuration |
149 | 10.10.4 Multicast Islands Figure 20 – No Multicast configuration |
150 | 10.11 ‘Standard WBEM’ Service Type Templates Figure 21 – Multicast Islands |
154 | 11 Information Technology – Storage Management roles 11.1 Introduction to storage management roles Figure 22 – SMI_S Roles |
155 | 11.2 Information Technology – Storage Management Client 11.2.1 Overview 11.2.2 SLP functions 11.2.3 WBEM protocol functions 11.2.4 Security considerations 11.2.5 Lock management functions 11.3 Dedicated Information Technology – Storage Management Server 11.3.1 Overview |
156 | 11.3.2 SLP functions 11.3.3 WBEM protocol functions |
157 | 11.3.4 Security considerations 11.3.5 Lock management functions 11.4 General Purpose Information Technology – Storage Management Server 11.4.1 Overview 11.4.2 SLP functions |
158 | 11.4.3 CIM-XML protocol functions 11.4.4 Lock management functions 11.4.5 Provider Subrole 11.5 Directory Server 11.5.1 General 11.5.2 SLP functions |
159 | 11.5.3 CIM-XML protocol functions 11.5.4 Security considerations 11.5.5 Lock management functions 11.6 Combined roles on a single system 11.6.1 Overview 11.6.2 General Purpose Information Technology – Storage Management Server as a Profile Aggregator |
160 | 12 Installation and upgrade 12.1 Overview 12.2 Role of the administrator 12.3 Goals 12.3.1 Non-disruptive installation and De-installation 12.3.2 Plug-and-Play |
161 | 12.4 Server deployment 12.4.1 General 12.4.2 Controlled environment 12.4.3 Multiple CIMOM systems |
162 | 12.4.4 Shared CIMOM |
163 | 12.4.5 Uninstallation 12.4.6 Update 12.4.7 Reconfiguration 12.5 WBEM service support and related functions 12.5.1 Installation |
164 | 12.5.2 Multiple CIM Servers on a Single Server System 12.5.3 Uninstallation/Upgrade 12.5.4 Reconfiguration 12.5.5 Failure 12.6 Client 12.6.1 Uninstallation 12.6.2 Reconfiguration 12.7 Directory Service 12.7.1 Installation |
165 | 12.7.2 Uninstallation/Failure 12.8 Issues with Discovery mechanisms |
166 | 13 Security 13.1 Objectives 13.2 Overview 13.2.1 General |
167 | 13.2.2 General requirements for HTTP implementations |
168 | 13.3 Description of SMI-S Security 13.3.1 General 13.3.2 Transport security |
169 | 13.3.3 SSL 3.0 and TLS |
173 | 13.3.4 Authentication |
174 | 13.3.5 Indications |
175 | 13.3.6 Service Discovery |
176 | 13.3.7 HTTP Realms |
177 | 13.4 Security Guidance 13.4.1 SSL 3.0 and TLS guidance |
178 | 13.4.2 Authentication guidance |
182 | 13.4.3 Authorization |
183 | Table 221 – ACL for File “XYZ” |
184 | 13.4.4 Using IT Infrastructure Securely – Service Discovery |
185 | Annex A A.1 Purpose of this annex A.2 CIM-to-MIB mapping overview A.3 The SML MIB |
187 | Annex B B.1 Compliance statement B.2 How compliance of the architecture is declared B.3 How compliance of the model is declared B.4 The Server Profile and compliance B.4.1 General B.4.2 Example |
188 | B.5 Backward compatibility B.5.1 General |
189 | B.5.2 Overview Figure B.1 – Provider migration |
190 | B.5.3 Requirements |
191 | B.5.4 Implementation considerations B.6 Rules for combining (autonomous) profiles B.6.1 General B.6.2 Backward Compatibility Rules for combining profiles |
192 | B.6.3 Conditions for a new profile B.7 Rules for vendor extensions B.7.1 General B.7.2 Objectives for vendor extension rules |
193 | B.7.3 Vendor extensions and compliance rules B.7.4 Vendor extensions and backward compatibility rules |
194 | B.7.5 Vendor extensions and SMI-S Nullification B.7.6 Vendor Extensions that Avoid Client Confusion |
196 | Annex C C.1 Overview C.2 Instance creation C.2.1 Filter string C.2.2 Semantics C.3 Instance deletion C.3.1 Filter string C.3.2 Semantics C.4 Modification of any value in an array property C.4.1 WQL string |
197 | C.4.2 CQL string C.4.3 Semantics C.5 Modification to either of two specific values in an array property C.5.1 WQL string C.5.2 CQL string C.5.3 Semantics C.6 Alert C.6.1 Filter string C.6.2 Semantic |
198 | Bibliography |