Information technology — Storage management

This International Standard defines a method for the interoperable management of a heterogeneous storage area network (SAN). It describes not only the information available to a WBEM client from an SMI-S compliant CIM server, but also an object-oriented, XML-based, messaging-based interface designed to support the specific requirements of managing devices in and through storage area networks (SANs).

Technologie de l'information — Management du stockage

General Information

Status
Withdrawn
Publication Date
01-Jul-2007
Withdrawal Date
01-Jul-2007
Current Stage
9599 - Withdrawal of International Standard
Completion Date
01-Mar-2011
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 24775:2007 - Information technology -- Storage management
English language
611 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC

STANDARD 24775


First edition
2007-06

Information technology –
Storage management

Reference number
ISO/IEC 24775:2007(E)

---------------------- Page: 1 ----------------------
THIS PUBLICATION IS COPYRIGHT PROTECTED
Copyright © 2007 ISO/IEC, Geneva, Switzerland

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester.
If you have any questions about ISO/IEC copyright or have an enquiry about obtaining additional rights to this
publication, please contact the address below or your local IEC member National Committee for further information.

IEC Central Office
3, rue de Varembé
CH-1211 Geneva 20
Switzerland
Email: inmail@iec.ch
Web: www.iec.ch

About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigenda or an amendment might have been published.
ƒ Catalogue of IEC publications: www.iec.ch/searchpub
The IEC on-line Catalogue enables you to search by a variety of criteria (reference number, text, technical committee,…).
It also gives information on projects, withdrawn and replaced publications.
ƒ IEC Just Published: www.iec.ch/online_news/justpub
Stay up to date on all new IEC publications. Just Published details twice a month all new publications released. Available
on-line and also by email.
ƒ Customer Service Centre: www.iec.ch/webstore/custserv
If you wish to give us your feedback on this publication or need further assistance, please visit the Customer Service
Centre FAQ or contact us:
Email: csc@iec.ch
Tel.: +41 22 919 02 11
Fax: +41 22 919 03 00

---------------------- Page: 2 ----------------------
INTERNATIONAL ISO/IEC


STANDARD 24775


First edition
2007-06



Information technology –
Storage management

PRICE CODE
XM

For price, see current catalogue

---------------------- Page: 3 ----------------------
- 2 - 24775 © ISO/IEC:2007(E)
FOREWORD.22
INTRODUCTION .23
1 Scope .24
2 Normative References .25
2.1 International standards .25
2.2 Other specifications .25
3 Definitions, symbols, abbreviations, and conventions .26
3.1 Definitions .26
3.1.1 .34
3.2 Symbols and abbreviations.40
3.3 Keywords .40
3.4 Conventions.41
4 Introduction .43
4.1 Preamble .43
4.2 Business rationale .43
4.3 Interface definition .43
4.4 Technology trends .45
4.5 Management environment .47
4.6 Architectural objectives.48
5 Overview .50
5.1 Base capabilities.50
5.1.1 General.50
5.1.2 Object Oriented .50
5.1.3 Messaging-based interface .52
5.2 Capabilities of this version .54
5.2.1 Overview.54
5.2.2 Determine and monitor the configuration of a SAN .54
5.2.3 Monitoring the health of key resources in a SAN .55
5.2.4 Monitoring the available performance of interconnections in a
SAN .55
5.2.5 Monitoring and controlling the zones in a SAN.55
5.2.6 Discovering/monitoring/controlling the storage volumes in a
SAN .55
5.2.7 Requiring authenticated clients in a SAN .55
5.3 Operational environment .56
5.4 Using this standard .57
5.5 Language bindings .57
6 Transport and reference model .58
6.1 Introduction .58
6.1.1 Overview.58
6.1.2 Language requirements.58
6.1.3 Communications requirements.58
6.1.4 XML Message Syntax and Semantics.58
6.2 Transport stack .59

---------------------- Page: 4 ----------------------
24775 © ISO/IEC:2007(E) - 3 -
6.3 Reference model .60
6.3.1 Overview.60
6.3.2 Roles for Interface Constituents .60
6.3.2.1 Client .60
6.3.2.2 Agent .60
6.3.2.3 CIM Server .61
6.3.2.4 Provider .61
6.3.2.5 Lock Manager.61
6.3.2.6 Directory Server.61
6.3.3 Cascaded Agents .61
7 Object model .62
7.1 Model overview (key resources) .62
7.1.1 Overview.62
7.1.2 Introduction to CIM UML Notation .62
7.2 Techniques .63
7.2.1 CIM fundamentals .63
7.2.2 Modelling profiles.66
7.2.3 Naming .67
7.2.4 Correlatable and Durable Names .68
7.2.4.1 Overview.68
7.2.4.2 Correlatable Names Formation.70
7.2.4.3 Testing equality of Correlatable Names.70
7.2.4.4 Standard Formats for Correlatable Names.70
7.2.4.5 Case Sensitivity .72
7.2.4.6 Preferred Correlatable Names.72
7.2.4.7 Concatenation .72
7.2.5 Events – CIM indications .73
7.2.5.1 Background .73
7.2.5.2 Using indications .73
7.2.5.3 Indication hierarchy .75
7.2.5.4 Agent/Provider Considerations.76
7.2.5.5 Client Considerations .77
7.2.5.6 Requirements .78
7.2.5.7 Implementation Considerations .78
7.2.6 Device Credentials .78
7.2.7 Recipe Conventions .79
7.2.7.1 Recipe Definition .79
7.2.7.2 Recipe Pseudo Code Conventions.79
7.2.7.3 Common Recipes .84
7.3 Profiles.85
7.3.1 Profile content.85
7.3.1.1 Profile and subprofile definition .85
7.3.1.2 Format for Profile Specifications.85
7.3.1.3 Registry of Profiles and Subprofiles .87
7.3.2 Common CIM Packages.89
7.3.2.1 Description.89
7.3.2.2 Physical Package “package” .89

---------------------- Page: 5 ----------------------
- 4 - 24775 © ISO/IEC:2007(E)
7.3.2.3 Software Package .95
7.3.3 Common subprofiles.99
7.3.3.1 Overview.99
7.3.3.2 Access Points subprofile .99
7.3.3.3 Cluster Subprofile .103
7.3.3.4 Disk Drive subprofile.108
7.3.3.5 Extent Mapping subprofile .120
7.3.3.6 Location subprofile .124
7.3.3.7 Software Subprofile .127
7.3.3.8 Copy Services Subprofile .128
7.3.3.9 Job Control Subprofile .154
7.3.3.10 Pool Manipulation Capabilities and Settings Subprofile .160
7.3.3.11 LUN Creation Subprofile.183
7.3.3.12 Device Credentials subprofile.203
7.3.3.13 Backend Ports subprofile.208
7.3.3.14 LUN Masking and Mapping .215
7.3.4 Fabric.248
7.3.4.1 Fabric Profile .248
7.3.4.2 Switch Profile.297
7.3.5 Hosts .311
7.3.5.1 FC HBA Profile .311
7.3.6 Storage.325
7.3.6.1 Array Profile.325
7.3.6.2 In-Band Virtualization Profile .347
7.3.6.3 Storage Library Profile.362
7.3.7 Server Profile.384
7.3.7.1 Description.384
7.3.7.2 Standard dependencies.384
7.3.7.3 Profile dependencies .384
7.3.7.4 CIM Server requirements .385
7.3.7.5 Instance Diagram .386
7.3.7.6 Durable names and other correlatable IDs.387
7.3.7.7 Methods.387
7.3.7.8 Client considerations .388
7.3.7.9 Recipes.388
7.3.7.10 Instrumentation requirements.397
7.3.7.11 Required CIM Elements .399
7.3.7.12 Required properties for CIM Elements .399
7.3.7.13 Optional Subprofiles and Profiles. .406
7.3.7.14 ObjectManagerAdapter Subprofile .406
7.4 Cross Client considerations .410
7.4.1 Overview.410
7.4.1.1 HBA model .410
7.4.1.2 Switch model .411
7.4.1.3 Array model .411
7.4.1.4 Out of band virtualization model .413
7.4.1.5 Durable names .413

---------------------- Page: 6 ----------------------
24775 © ISO/IEC:2007(E) - 5 -
7.4.1.6 Fabric Topology (HBA, Switch, Array).414
7.4.1.7 Storage Connections (FC HBA, Array).420
7.4.1.8 Zoning.420
7.4.1.9 Fabric Route Discovery .421
7.4.1.10 Durable names .421
7.4.2 General recipes .421
7.4.2.1 Indications’ Status .421
7.4.2.2 Listenable Instance Notification.422
7.4.2.3 Life Cycle Event Subscription description.422
7.4.2.4 Subscription for alert indications.423
7.4.2.5 Listenable Interface Modification Notification .423
7.4.2.6 Subscribe for Lifecycle Events where OperationalStatus
Changes .423
7.4.2.7 Subscription for alert indications.424
8 Security .425
8.1 Introduction .425
8.2 Background.425
8.3 Requirements .426
8.3.1 General.426
8.3.2 Certificate usage with SSL 3.0 and TLS.426
8.3.2.1 Functional goals .426
8.3.2.2 Requirements .427
8.4 Modelling device credentials.428
8.4.1 General requirements.428
8.4.2 Instrumentation requirements.428
9 Service Discovery .429
9.1 Objectives .429
9.2 Overview.429
9.3 SLP messages.430
9.4 Scopes.431
9.5 Services definition.432
9.5.1 General.432
9.5.2 Service Type.432
9.5.3 Service Attributes .432
9.6 User Agents (UA).434
9.7 Service Agents (SAs).434
9.8 Directory Agents (DAs) .434
9.9 Service Agent Server (SA Server) .435
9.9.1 General Information.435
9.9.2 SA Server (SAS) Implementation .435
9.9.3 SA Server (SAS) Clients.435
9.9.3.1 Description.435
9.9.3.2 SAS Client Requests – SA Server Responses.436
9.9.4 SA Server configuration.436
9.9.4.1 Overview.436
9.9.4.2 SLP Configuration File.436
9.9.4.3 Programmatic configuration.436

---------------------- Page: 7 ----------------------
- 6 - 24775 © ISO/IEC:2007(E)
9.9.4.4 DHCP configuration.437
9.9.4.5 Scope .437
9.9.5 SA Server discovery .437
9.9.6 SAS Client registration .437
9.10 ‘Standard WBEM’ Service Type Templates.438
10 SMI-S Roles .442
10.1 Introduction .442
10.2 SMI-S Client.443
10.2.1 Overview.443
10.2.2 SLP functions .443
10.2.3 CIM-XML protocol functions .443
10.2.4 Security considerations .443
10.2.5 Lock management functions.443
10.3 Dedicated SMI-S Server .443
10.3.1 Overview.443
10.3.2 SLP functions .444
10.3.3 CIM-XML Protocol Functions.444
10.3.3.1 General.444
10.3.3.2 Required intrinsic methods .444
10.3.3.3 Required model support .445
10.3.4 Security considerations .445
10.3.5 Lock management functions.445
10.4 General Purpose SMI-S Server .445
10.4.1 Overview.445
10.4.2 SLP functions .445
10.4.3 CIM-XML Protocol functions.445
10.4.3.1 General.445
10.4.3.2 Required intrinsic methods .445
10.4.3.3 Required model support .446
10.4.3.4 Security considerations .446
10.4.4 Lock management functions.446
10.4.5 Provider Subrole.446
10.4.5.1 Overview.446
10.4.5.2 Required model support .446
10.5 Directory Server.446
10.5.1 General.446
10.5.2 SLP functions .446
10.5.3 CIM-XML Protocol functions.446
10.5.4 Security considerations .446
10.5.5 Lock management functions.446
10.6 Combined Roles on a Single System .446
10.6.1 Overview.446
10.6.2 General Purpose SMI-S Server as a Profile Aggregator .447
10.6.2.1 SLP functions .447
10.6.2.2 CIM-XML Protocol functions.447
10.6.2.3 Security considerations .447
10.6.2.4 Lock management functions.447

---------------------- Page: 8 ----------------------
24775 © ISO/IEC:2007(E) - 7 -
11 Installation and upgrade.448
11.1 Introduction .448
11.2 Role of the Administrator .448
11.3 Goals .448
11.3.1 Non-Disruptive Installation and De-installation.448
11.3.2 Plug-and-Play .448
11.4 Installing device support .449
11.4.1 General.449
11.4.2 Installation .449
11.4.3 Discovery and initialization of Device support .449
11.4.4 Removal/Update.450
11.4.5 Reconfiguration .450
11.4.6 Failure.451
11.5 Object manager .451
11.5.1 Installation .451
11.5.2 Multiple CIMOMs on a Single Server .451
11.5.3 Removal, reconfiguration and upgrade .452
11.5.4 Failure.452
11.6 Client .452
11.6.1 Removal .452
11.6.2 Reconfiguration .452
11.6.3 Failure.452
11.7 Directory Server .452
11.7.1 Installation .452
11.7.2 Removal/Failure .452
11.8 Management domains .452
11.8.1 General.452
11.8.2 Initial configuration.452
11.8.3 Reconfiguration .453
11.9 Lock manager .453
Annex A(informative) Futures .454
A.1 Overview .454
A.2 HBA LUN masking and persistent binding .454
A.3 Managed Hub Section.454
A.4 IP Storage .454
A.5 Multi-Path Modelling.454
A.6 Provider Modelling .454
A.7 Non-Fibre Fabrics .454
A.8 Compliance notification .454
A.9 Cascaded Agents.455
A.10 Network Storage .455
A.11 Synchronization of file system elements through copy services .455
A.12 Model size distinctions in Disk Drive .455
A.13 Expanded extent mapping .455
A.14 Locking.455
A.15 Policy management .456
Annex B(informative) Experimental Profiles.459

---------------------- Page: 9 ----------------------
- 8 - 24775 © ISO/IEC:2007(E)
B.1 Overview .459
B.2 Common Profiles and Subprofiles.459
B.3 SML Subprofiles.462
B.4 Extender profile .498
B.5 Management Appliance profile.513
B.6 Out of Band Virtualizer Profile.521
B.7 JBOD Profile .546
B.8 Extra Capacity Set Subprofile .557
B.9 Host Discovered Resources Profile (EXPERIMENTAL) .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.