BS ISO/IEC 24775-2:2021
$215.11
Information technology. Storage management – Common Architecture
Published By | Publication Date | Number of Pages |
BSI | 2021 | 218 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
15 | List of Figures |
17 | List of Tables |
23 | Foreword |
25 | 1 Scope |
27 | 2 Normative references 2.1 General 2.2 Approved references 2.3 DMTF references (Final) |
28 | 2.4 IETF references |
29 | 2.5 References under development 2.6 Other references |
31 | 3 Terms, definitions, symbols, abbreviations, and conventions 3.1 Terms and definitions |
37 | 3.2 Acronyms and abbreviations 3.3 Keywords |
38 | 3.4 Conventions |
41 | 4 Transport and Reference Model 4.1 Introduction 4.1.1 Overview 4.1.2 Language Requirements 4.1.3 Communications Requirements 4.1.4 XML Message Syntax and Semantics |
42 | 4.2 Transport Stack 4.3 Reference Model 4.3.1 Overview |
43 | 4.3.2 Roles for Interface Constituents 4.3.3 Cascaded Agents |
45 | 5 Health and Fault Management 5.1 Objectives 5.2 Overview 5.3 Terms |
46 | 5.4 Description of Health and Fault Management 5.4.1 Operational Status and Health State (Polling) |
47 | 5.4.2 Standard Errors and Events 5.4.3 Indications 5.4.4 Event Correlation and Fault Containment |
50 | 5.4.5 Fault Regions |
52 | 5.4.6 Examples |
55 | 6 Object Model General Information 6.1 Model Overview (Key Resources) 6.1.1 Overview 6.1.2 Introduction to CIM UML Notation |
56 | 6.2 Techniques 6.2.1 CIM Fundamentals |
58 | 6.2.2 Modeling Profiles 6.2.3 CIM Naming |
59 | 7 Correlatable and Durable Names 7.1 Overview |
60 | 7.2 Guidelines for SCSI Logical Unit Names 7.3 Guidelines for FC-SB-2 Device Names |
61 | 7.4 Guidelines for Port Names 7.5 Guidelines for Storage System Names |
62 | 7.6 Standard Formats for Correlatable Names 7.6.1 General |
63 | 7.6.2 Standard Formats for Logical Unit Names |
64 | 7.6.3 Standard Formats for Port Names |
65 | 7.6.4 Standard Formats for Fabric Names 7.6.5 Standard Formats for Storage System Names |
67 | 7.6.6 Operating System Device Names |
68 | 7.6.7 Case Sensitivity 7.7 Testing Equality of correlatable Names |
69 | 7.8 iSCSI Names |
71 | 8 Standard Messages 8.1 Overview 8.2 Registries for Standard Messages 8.3 SNIA Standard Messages 8.3.1 Common Profile-related Messages |
85 | 8.3.2 Block Storage Messages |
118 | 8.3.3 Fabric Messages |
123 | 8.3.4 Filesystem Messages |
135 | 8.3.5 Host Messages |
138 | 8.3.6 Media Library Messages |
171 | 9 Service Discovery 9.1 Objectives 9.2 Overview |
173 | 9.3 SLP Messages |
174 | 9.4 Scopes |
175 | 9.5 Services Definition 9.5.1 SLP Terms 9.5.2 Service Type 9.5.3 Service Attributes 9.6 User Agents (UA) |
176 | 9.7 Service Agents (SAs) |
177 | 9.8 Directory Agents (DAs) 9.9 Service Agent Server (SA Server) 9.9.1 General Information 9.9.2 SA Server (SAS) Implementation |
178 | 9.9.3 SA Server (SAS) Clients 9.9.4 SA Server Configuration |
180 | 9.9.5 SA Server Discovery 9.9.6 SAS Client Registration 9.10 Configurations 9.10.1 Overview 9.10.2 Multicast Configurations |
181 | 9.10.3 No Multicast configuration |
182 | 9.10.4 Multicast Islands |
185 | 10 Indications 10.1 Indications profile 10.1.1 Profile Support 10.1.2 Creating a client defined indication and subscription 10.1.3 ListenerDestination 10.2 Indication Filter Strings 10.2.1 Definition Syntax |
186 | 10.2.2 Instance Creation 10.2.3 Instance Deletion 10.2.4 Modification of any value in an array property 10.2.5 Modification to either of Two Specific values in an Array Property |
187 | 10.2.6 Alert |
189 | 11 SMI-S Roles 11.1 Introduction |
190 | 11.2 SMI-S Client 11.2.1 Overview 11.2.2 SLP Functions 11.2.3 Generic Operations 11.2.4 Security Considerations 11.2.5 Lock Management Functions 11.3 Dedicated SMI-S Server 11.3.1 Overview |
191 | 11.3.2 SLP Functions 11.3.3 Generic Operations |
192 | 11.3.4 Security Considerations 11.3.5 Lock Management Functions 11.4 General Purpose SMI-S Server 11.4.1 Overview 11.4.2 SLP Functions |
193 | 11.4.3 Generic Operations 11.4.4 Lock Management Functions 11.4.5 Provider Sub-role 11.5 Directory Server 11.5.1 SLP Functions 11.5.2 Generic Operations 11.5.3 Security Considerations |
194 | 11.5.4 Lock Management Functions 11.6 Combined Roles on a Single System 11.6.1 Overview 11.6.2 General Purpose SMI-S Server as a Profile Aggregator |
195 | 12 Installation and Upgrade 12.1 Introduction 12.2 Role of the Administrator 12.3 Goals 12.3.1 Non-Disruptive Installation and De-installation 12.3.2 Plug-and-Play |
196 | 12.4 Server Deployment 12.4.1 General 12.4.2 Controlled Environment 12.4.3 Multiple WBEM Server systems |
197 | 12.4.4 Shared WBEM Server |
198 | 12.4.5 Uninstallation 12.4.6 Update 12.4.7 Reconfiguration 12.5 WBEM Service Support & Related Functions 12.5.1 Installation |
199 | 12.5.2 Multiple WBEM Servers on a Single Server System 12.5.3 Uninstallation/Upgrade 12.5.4 Reconfiguration 12.5.5 Failure 12.6 Client 12.6.1 Uninstallation 12.6.2 Reconfiguration 12.7 Directory Service 12.7.1 Installation |
200 | 12.7.2 Uninstallation/Failure 12.8 Issues with Discovery Mechanisms |
201 | 13 Security 13.1 Requirements 13.1.1 Overview |
202 | 13.1.2 General Requirements for HTTP Implementations 13.2 Description of SMI-S Security 13.2.1 Security Scope |
203 | 13.2.2 Transport Security 13.2.3 Authentication |
204 | 13.2.4 Service Discovery |
207 | Annex A (informative) SMI-S Information Model |
209 | Annex B (normative) Compliance with the SNIA SMI Specification B.1 Compliance Statement B.2 How Compliance of the Architecture is Declared B.3 How Compliance of the Model Is Declared B.4 The Server Profile and Compliance B.4.1 General Guidelines B.4.2 Example |
210 | B.5 Backward Compatibility B.5.1 Goals |
211 | B.5.2 Overview |
212 | B.5.3 Requirements |
213 | B.5.4 Implementation Considerations B.6 Rules for Combining (Autonomous) Profiles B.6.1 General B.6.2 Backward Compatibility Rules for combining profiles |
214 | B.6.3 Conditions for a New Profile B.7 Rules for Vendor Extensions B.7.1 Objectives for Vendor Extension Rules |
215 | B.7.2 Vendor Extensions and Compliance Rules B.7.3 Vendor Extensions and Backward Compatibility Rules |
216 | B.7.4 Vendor Extensions and SMI-S Nullification B.7.5 Vendor Extensions that Avoid Client Confusion |