{"id":372664,"date":"2024-10-20T02:30:23","date_gmt":"2024-10-20T02:30:23","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-24775-22021\/"},"modified":"2024-10-26T04:22:26","modified_gmt":"2024-10-26T04:22:26","slug":"bs-iso-iec-24775-22021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-24775-22021\/","title":{"rendered":"BS ISO\/IEC 24775-2:2021"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
15<\/td>\nList of Figures <\/td>\n<\/tr>\n
17<\/td>\nList of Tables <\/td>\n<\/tr>\n
23<\/td>\nForeword <\/td>\n<\/tr>\n
25<\/td>\n1 Scope <\/td>\n<\/tr>\n
27<\/td>\n2 Normative references
2.1 General
2.2 Approved references
2.3 DMTF references (Final) <\/td>\n<\/tr>\n
28<\/td>\n2.4 IETF references <\/td>\n<\/tr>\n
29<\/td>\n2.5 References under development
2.6 Other references <\/td>\n<\/tr>\n
31<\/td>\n3 Terms, definitions, symbols, abbreviations, and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n
37<\/td>\n3.2 Acronyms and abbreviations
3.3 Keywords <\/td>\n<\/tr>\n
38<\/td>\n3.4 Conventions <\/td>\n<\/tr>\n
41<\/td>\n4 Transport and Reference Model
4.1 Introduction
4.1.1 Overview
4.1.2 Language Requirements
4.1.3 Communications Requirements
4.1.4 XML Message Syntax and Semantics <\/td>\n<\/tr>\n
42<\/td>\n4.2 Transport Stack
4.3 Reference Model
4.3.1 Overview <\/td>\n<\/tr>\n
43<\/td>\n4.3.2 Roles for Interface Constituents
4.3.3 Cascaded Agents <\/td>\n<\/tr>\n
45<\/td>\n5 Health and Fault Management
5.1 Objectives
5.2 Overview
5.3 Terms <\/td>\n<\/tr>\n
46<\/td>\n5.4 Description of Health and Fault Management
5.4.1 Operational Status and Health State (Polling) <\/td>\n<\/tr>\n
47<\/td>\n5.4.2 Standard Errors and Events
5.4.3 Indications
5.4.4 Event Correlation and Fault Containment <\/td>\n<\/tr>\n
50<\/td>\n5.4.5 Fault Regions <\/td>\n<\/tr>\n
52<\/td>\n5.4.6 Examples <\/td>\n<\/tr>\n
55<\/td>\n6 Object Model General Information
6.1 Model Overview (Key Resources)
6.1.1 Overview
6.1.2 Introduction to CIM UML Notation <\/td>\n<\/tr>\n
56<\/td>\n6.2 Techniques
6.2.1 CIM Fundamentals <\/td>\n<\/tr>\n
58<\/td>\n6.2.2 Modeling Profiles
6.2.3 CIM Naming <\/td>\n<\/tr>\n
59<\/td>\n7 Correlatable and Durable Names
7.1 Overview <\/td>\n<\/tr>\n
60<\/td>\n7.2 Guidelines for SCSI Logical Unit Names
7.3 Guidelines for FC-SB-2 Device Names <\/td>\n<\/tr>\n
61<\/td>\n7.4 Guidelines for Port Names
7.5 Guidelines for Storage System Names <\/td>\n<\/tr>\n
62<\/td>\n7.6 Standard Formats for Correlatable Names
7.6.1 General <\/td>\n<\/tr>\n
63<\/td>\n7.6.2 Standard Formats for Logical Unit Names <\/td>\n<\/tr>\n
64<\/td>\n7.6.3 Standard Formats for Port Names <\/td>\n<\/tr>\n
65<\/td>\n7.6.4 Standard Formats for Fabric Names
7.6.5 Standard Formats for Storage System Names <\/td>\n<\/tr>\n
67<\/td>\n7.6.6 Operating System Device Names <\/td>\n<\/tr>\n
68<\/td>\n7.6.7 Case Sensitivity
7.7 Testing Equality of correlatable Names <\/td>\n<\/tr>\n
69<\/td>\n7.8 iSCSI Names <\/td>\n<\/tr>\n
71<\/td>\n8 Standard Messages
8.1 Overview
8.2 Registries for Standard Messages
8.3 SNIA Standard Messages
8.3.1 Common Profile-related Messages <\/td>\n<\/tr>\n
85<\/td>\n8.3.2 Block Storage Messages <\/td>\n<\/tr>\n
118<\/td>\n8.3.3 Fabric Messages <\/td>\n<\/tr>\n
123<\/td>\n8.3.4 Filesystem Messages <\/td>\n<\/tr>\n
135<\/td>\n8.3.5 Host Messages <\/td>\n<\/tr>\n
138<\/td>\n8.3.6 Media Library Messages <\/td>\n<\/tr>\n
171<\/td>\n9 Service Discovery
9.1 Objectives
9.2 Overview <\/td>\n<\/tr>\n
173<\/td>\n9.3 SLP Messages <\/td>\n<\/tr>\n
174<\/td>\n9.4 Scopes <\/td>\n<\/tr>\n
175<\/td>\n9.5 Services Definition
9.5.1 SLP Terms
9.5.2 Service Type
9.5.3 Service Attributes
9.6 User Agents (UA) <\/td>\n<\/tr>\n
176<\/td>\n9.7 Service Agents (SAs) <\/td>\n<\/tr>\n
177<\/td>\n9.8 Directory Agents (DAs)
9.9 Service Agent Server (SA Server)
9.9.1 General Information
9.9.2 SA Server (SAS) Implementation <\/td>\n<\/tr>\n
178<\/td>\n9.9.3 SA Server (SAS) Clients
9.9.4 SA Server Configuration <\/td>\n<\/tr>\n
180<\/td>\n9.9.5 SA Server Discovery
9.9.6 SAS Client Registration
9.10 Configurations
9.10.1 Overview
9.10.2 Multicast Configurations <\/td>\n<\/tr>\n
181<\/td>\n9.10.3 No Multicast configuration <\/td>\n<\/tr>\n
182<\/td>\n9.10.4 Multicast Islands <\/td>\n<\/tr>\n
185<\/td>\n10 Indications
10.1 Indications profile
10.1.1 Profile Support
10.1.2 Creating a client defined indication and subscription
10.1.3 ListenerDestination
10.2 Indication Filter Strings
10.2.1 Definition Syntax <\/td>\n<\/tr>\n
186<\/td>\n10.2.2 Instance Creation
10.2.3 Instance Deletion
10.2.4 Modification of any value in an array property
10.2.5 Modification to either of Two Specific values in an Array Property <\/td>\n<\/tr>\n
187<\/td>\n10.2.6 Alert <\/td>\n<\/tr>\n
189<\/td>\n11 SMI-S Roles
11.1 Introduction <\/td>\n<\/tr>\n
190<\/td>\n11.2 SMI-S Client
11.2.1 Overview
11.2.2 SLP Functions
11.2.3 Generic Operations
11.2.4 Security Considerations
11.2.5 Lock Management Functions
11.3 Dedicated SMI-S Server
11.3.1 Overview <\/td>\n<\/tr>\n
191<\/td>\n11.3.2 SLP Functions
11.3.3 Generic Operations <\/td>\n<\/tr>\n
192<\/td>\n11.3.4 Security Considerations
11.3.5 Lock Management Functions
11.4 General Purpose SMI-S Server
11.4.1 Overview
11.4.2 SLP Functions <\/td>\n<\/tr>\n
193<\/td>\n11.4.3 Generic Operations
11.4.4 Lock Management Functions
11.4.5 Provider Sub-role
11.5 Directory Server
11.5.1 SLP Functions
11.5.2 Generic Operations
11.5.3 Security Considerations <\/td>\n<\/tr>\n
194<\/td>\n11.5.4 Lock Management Functions
11.6 Combined Roles on a Single System
11.6.1 Overview
11.6.2 General Purpose SMI-S Server as a Profile Aggregator <\/td>\n<\/tr>\n
195<\/td>\n12 Installation and Upgrade
12.1 Introduction
12.2 Role of the Administrator
12.3 Goals
12.3.1 Non-Disruptive Installation and De-installation
12.3.2 Plug-and-Play <\/td>\n<\/tr>\n
196<\/td>\n12.4 Server Deployment
12.4.1 General
12.4.2 Controlled Environment
12.4.3 Multiple WBEM Server systems <\/td>\n<\/tr>\n
197<\/td>\n12.4.4 Shared WBEM Server <\/td>\n<\/tr>\n
198<\/td>\n12.4.5 Uninstallation
12.4.6 Update
12.4.7 Reconfiguration
12.5 WBEM Service Support & Related Functions
12.5.1 Installation <\/td>\n<\/tr>\n
199<\/td>\n12.5.2 Multiple WBEM Servers on a Single Server System
12.5.3 Uninstallation\/Upgrade
12.5.4 Reconfiguration
12.5.5 Failure
12.6 Client
12.6.1 Uninstallation
12.6.2 Reconfiguration
12.7 Directory Service
12.7.1 Installation <\/td>\n<\/tr>\n
200<\/td>\n12.7.2 Uninstallation\/Failure
12.8 Issues with Discovery Mechanisms <\/td>\n<\/tr>\n
201<\/td>\n13 Security
13.1 Requirements
13.1.1 Overview <\/td>\n<\/tr>\n
202<\/td>\n13.1.2 General Requirements for HTTP Implementations
13.2 Description of SMI-S Security
13.2.1 Security Scope <\/td>\n<\/tr>\n
203<\/td>\n13.2.2 Transport Security
13.2.3 Authentication <\/td>\n<\/tr>\n
204<\/td>\n13.2.4 Service Discovery <\/td>\n<\/tr>\n
207<\/td>\nAnnex A (informative) SMI-S Information Model <\/td>\n<\/tr>\n
209<\/td>\nAnnex B (normative) Compliance with the SNIA SMI Specification
B.1 Compliance Statement
B.2 How Compliance of the Architecture is Declared
B.3 How Compliance of the Model Is Declared
B.4 The Server Profile and Compliance
B.4.1 General Guidelines
B.4.2 Example <\/td>\n<\/tr>\n
210<\/td>\nB.5 Backward Compatibility
B.5.1 Goals <\/td>\n<\/tr>\n
211<\/td>\nB.5.2 Overview <\/td>\n<\/tr>\n
212<\/td>\nB.5.3 Requirements <\/td>\n<\/tr>\n
213<\/td>\nB.5.4 Implementation Considerations
B.6 Rules for Combining (Autonomous) Profiles
B.6.1 General
B.6.2 Backward Compatibility Rules for combining profiles <\/td>\n<\/tr>\n
214<\/td>\nB.6.3 Conditions for a New Profile
B.7 Rules for Vendor Extensions
B.7.1 Objectives for Vendor Extension Rules <\/td>\n<\/tr>\n
215<\/td>\nB.7.2 Vendor Extensions and Compliance Rules
B.7.3 Vendor Extensions and Backward Compatibility Rules <\/td>\n<\/tr>\n
216<\/td>\nB.7.4 Vendor Extensions and SMI-S Nullification
B.7.5 Vendor Extensions that Avoid Client Confusion <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Storage management – Common Architecture<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n218<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":372670,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-372664","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/372664","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/372670"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=372664"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=372664"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=372664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}