ISO/IEC DIS 13186
(Main)Information technology -- Storage management
Information technology -- Storage management
Technologies de l'information -- Gestion du stockage
General Information
RELATIONS
Standards Content (sample)
DRAFT INTERNATIONAL STANDARD ISO/IEC 13186
Attributed to ISO/IEC JTC 1 by the Central Secretariat (see page iii)
Voting begins on Voting terminates on
2009-03-27 2009-08-27
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ • ORGANISATION INTERNATIONALE DE NORMALISATION
INTERNATIONAL ELECTROTECHNICAL COMMISSION • МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОММИСИЯ • COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE
FAST-TRACK PROCEDUREInformation technology — Storage management
Technologies de l'information — Gestion du stockage
ICS 35.220.01
The version of this document received for DIS ballot has been distilled to PDF 1.6.
Unfortunately it is not possible at present to obtain a version of the document in PDF 1.4.
Rather than delay the document or redistil it at the ISO Central Secretariat and risk the
introduction of changes, it has been decided exceptionally to launch the DIS ballot with the
current PDF 1.6 version.If you encounter any problems in either viewing or printing this document, please inform the
ISO Central Secretariat as soon as possible: projects@iso.orgIn accordance with the provisions of Council Resolution 21/1986 this DIS is circulated in the
English language only.Conformément aux dispositions de la Résolution du Conseil 21/1986, ce DIS est distribué en
version anglaise seulement.THIS DOCUMENT IS A DRAFT CIRCULATED FOR COMMENT AND APPROVAL. IT IS THEREFORE SUBJECT TO CHANGE AND MAY NOT BE
REFERRED TO AS AN INTERNATIONAL STANDARD UNTIL PUBLISHED AS SUCH.IN ADDITION TO THEIR EVALUATION AS BEING ACCEPTABLE FOR INDUSTRIAL, TECHNOLOGICAL, COMMERCIAL AND USER PURPOSES,
DRAFT INTERNATIONAL STANDARDS MAY ON OCCASION HAVE TO BE CONSIDERED IN THE LIGHT OF THEIR POTENTIAL TO BECOME
STANDARDS TO WHICH REFERENCE MAY BE MADE IN NATIONAL REGULATIONS.RECIPIENTS OF THIS DRAFT ARE INVITED TO SUBMIT, WITH THEIR COMMENTS, NOTIFICATION OF ANY RELEVANT PATENT RIGHTS OF WHICH
THEY ARE AWARE AND TO PROVIDE SUPPORTING DOCUMENTATION.International Organization for Standardization, 2009
International Electrotechnical Commission, 2009
---------------------- Page: 1 ----------------------
ISO/IEC DIS 13186
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
Copyright noticeThis ISO document is a Draft International Standard and is copyright-protected by ISO. Except as permitted
under the applicable laws of the user's country, neither this ISO draft nor any extract from it may be
reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
photocopying, recording or otherwise, without prior written permission being secured.
Requests for permission to reproduce should be addressed to either ISO at the address below or ISO's
member body in the country of the requester.ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
ii © ISO/IEC 2009 — All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC DIS 13186
NOTE FROM ITTF
The current fast track draft is the American National Standard ANSI INCITS 388:2008, submitted by the US
National Committee of the IEC / US Member Body of ISO to the ISO/IEC JTC 1 Fast Track process. If the
fast-track draft is approved, it will replace ISO/IEC 24775:2007, "Information Technology — Storage
management", of which it constitutes a technical revision.This draft International Standard is submitted for JTC 1 national body vote under the Fast-Track Procedure.
In accordance with Resolution 30 of the JTC 1 Berlin Plenary 1993, the proposer of this document recommends
assignment of ISO/IEC 13186 to JTC 1/SC 25.“FAST-TRACK” PROCEDURE
1 Any P-member and any Category A liaison organization of ISO/IEC JTC 1 may propose that an existing
standard from any source be submitted directly for vote as a DIS. The criteria for proposing an existing
standard for the fast-track procedure are a matter for each proposer to decide.2 The proposal shall be received by the ITTF which will take the following actions.
2.1 To settle the copyright and/or trade mark situation with the proposer, so that the proposed text can be
freely copied and distributed within JTC 1 without restriction.2.2 To assess in consultation with the JTC 1 secretariat which SC is competent for the subject covered by
the proposed standard and to ascertain that there is no evident contradiction with other International
Standards.2.3 To distribute the text of the proposed standard as a DIS. In case of particularly bulky documents the ITTF
may demand the necessary number of copies from the proposer.3 The period for combined DIS voting shall be five months. In order to be accepted the DIS must be
supported by 75 % of the votes cast (abstention is not counted as a vote) and by two-thirds of the P-members
voting of JTC 1.4 At the end of the voting period, the comments received, whether editorial only or technical, will be dealt
with by a working group appointed by the secretariat of the relevant SC.5 If, after the deliberations of this WG, the requirements of 3 above are met, the amended text shall be sent
to the ITTF by the secretariat of the relevant SC for publication as an International Standard.
If it is impossible to agree to a text meeting the above requirements, the proposal has failed and the procedure
is terminated.In either case the WG shall prepare a full report which will be circulated by the ITTF.
6 If the proposed standard is accepted and published, its maintenance will be handled by JTC 1.
© ISO/IEC 2009 — All rights reserved iii---------------------- Page: 3 ----------------------
ANSI INCITS 388-2008
for Information Technology –
Storage Management
Developed by
ANSI INCITS 388-2008
American National Standard
---------------------- Page: 4 ----------------------
ANSI
INCITS 388-2008
Revision of
ANSI INCITS 388-2004
American National Standard
for Information Technology –
Storage Management
Secretariat
Information Technology Industry Council
Approved May 21, 2008
American National Standards Institute, Inc.
Abstract
This specification documents a secure and reliable interface that allows storage management systems to
identify, classify, monitor, and control physical and logical resources in a Storage Area Network.
---------------------- Page: 5 ----------------------Approval of an American National Standard requires review by ANSI that the
American
requirements for due process, consensus, and other criteria for approval have
been met by the standards developer.
National
Consensus is established when, in the judgement of the ANSI Board of
Standard
Standards Review, substantial agreement has been reached by directly and
materially affected interests. Substantial agreement means much more than
a simple majority, but not necessarily unanimity. Consensus requires that all
views and objections be considered, and that a concerted effort be made
towards their resolution.
The use of American National Standards is completely voluntary; their
existence does not in any respect preclude anyone, whether he has approved
the standards or not, from manufacturing, marketing, purchasing, or using
products, processes, or procedures not conforming to the standards.
The American National Standards Institute does not develop standards and
will in no circumstances give an interpretation of any American National
Standard. Moreover, no person shall have the right or authority to issue an
interpretation of an American National Standard in the name of the American
National Standards Institute. Requests for interpretations should be
addressed to the secretariat or sponsor whose name appears on the title
page of this standard.
CAUTION NOTICE: This American National Standard may be revised or
withdrawn at any time. The procedures of the American National Standards
Institute require that action be taken periodically to reaffirm, revise, or
withdraw this standard. Purchasers of American National Standards may
receive current information on all standards by calling or writing the American
National Standards Institute.
CAUTION: The developers of this standard have requested that holders of patents that may be
required for the implementation of the standard disclose such patents to the publisher. However,
neither the developers nor the publisher have undertaken a patent search in order to identify
which, if any, patents may apply to this standard. As of the date of publication of this standard
and following calls for the identification of patents that may be required for the implementation of
the standard, no such claims have been made. No further patent search is conducted by the de-
veloper or publisher in respect to any standard it processes. No representation is made or implied
that licenses are not required to avoid infringement in the use of this standard.
Published byAmerican National Standards Institute, Inc.
25 West 43rd Street, New York, NY 10036
Copyright © 2008 by Information Technology Industry Council (ITI)
All rights reserved.
No part of this publication may be reproduced in any
form, in an electronic retrieval system or otherwise,
without prior written permission of ITI, 1250 Eye Street NW,
Washington, DC 20005.
Printed in the United States of America
---------------------- Page: 6 ----------------------
Contents
List of Tables.............................................................................................................................. ix
List of Figures..........................................................................................................................xxxi
1. Scope ...................................................................................................................................1
2. Definitions, Symbols, Abbreviations, and Conventions .................................................3
2.1 Definitions........................................................................................................................3
2.2 Symbols and abbreviations ...........................................................................................15
2.3 Keywords.......................................................................................................................16
2.4 Conventions ..................................................................................................................17
3. Business Overview...........................................................................................................19
3.1 Preamble .......................................................................................................................19
3.2 Business Rationale........................................................................................................19
3.3 Interface Definition ........................................................................................................20
3.4 Technology Trends........................................................................................................22
3.5 Management Environment ............................................................................................23
3.6 Architectural Objectives.................................................................................................24
3.7 Disclaimer......................................................................................................................25
4. Typographical Conventions ............................................................................................27
4.1 Deprecated Material ......................................................................................................27
4.2 Experimental Material....................................................................................................27
5. Overview............................................................................................................................29
5.1 Base Capabilities...........................................................................................................29
5.1.1. Object Oriented......................................................................................................29
5.1.2. Messaging Based ..................................................................................................31
5.2 Functionality Matrix .......................................................................................................33
5.2.1. Overview................................................................................................................33
5.2.2. Multi-Level Model Of Networked Storage Management Functionality...................33
5.2.3. FCAPS...................................................................................................................34
5.2.4. Management Functionality Within Each Level Of The Model ................................34
5.2.4.1 (Level 1) Device Level Functionality................................................................34
5.2.4.2 (Level 2) Connectivity Level Functionality .......................................................34
5.2.4.3 (Level 3) Block Level Functionality..................................................................34
5.2.4.4 (Level 4) File/Record Level Functionality ........................................................34
5.2.4.5 (Level 5) Application Level Functionality.........................................................35
5.2.5. Referring To Levels And Capabilities In The Multi-level Model .............................35
5.2.6. Functionality Descriptions in SMI-S Profiles ..........................................................35
5.3 Capabilities of This Version...........................................................................................35
5.3.1. Device Level ..........................................................................................................35
5.3.1.1 Fault Management ..........................................................................................35
5.3.1.2 Configuration Management .............................................................................35
5.3.1.3 Accounting Management.................................................................................35
5.3.1.4 Performance Management..............................................................................35
5.3.1.5 Security Management .....................................................................................35
5.3.2. Connectivity Level..................................................................................................36
5.3.2.1 Fault Management ..........................................................................................36
5.3.2.2 Configuration Management .............................................................................36
---------------------- Page: 7 ----------------------5.3.2.3 Accounting Management.................................................................................36
5.3.2.4 Performance Management..............................................................................36
5.3.2.5 Security Management .....................................................................................36
5.3.3. Block Level ............................................................................................................36
5.3.3.1 Fault Management ..........................................................................................36
5.3.3.2 Configuration Management .............................................................................36
5.3.3.3 Accounting Management.................................................................................36
5.3.3.4 Performance Management..............................................................................36
5.3.3.5 Security Management .....................................................................................36
5.3.4. File/Record Level...................................................................................................37
5.3.4.1 Fault Management ..........................................................................................37
5.3.4.2 Configuration Management .............................................................................37
5.3.4.3 Accounting Management.................................................................................37
5.3.4.4 Performance Management..............................................................................37
5.3.4.5 Security Management .....................................................................................37
5.3.5. Application Level....................................................................................................37
5.4 Operational Environment .................................................................................................................. 39
5.5 Using this Specification .................................................................................................40
5.6 Language Bindings........................................................................................................40
6. Transport and Reference Model......................................................................................41
6.1 Introduction....................................................................................................................41
6.1.1. Overview................................................................................................................41
6.1.2. Language Requirements .......................................................................................41
6.1.3. Communications Requirements.............................................................................41
6.1.4. XML Message Syntax and Semantics ...................................................................41
6.2 Transport Stack .............................................................................................................42
6.3 Reference Model ...........................................................................................................43
6.3.1. Overview................................................................................................................43
6.3.2. Roles for Interface Constituents ............................................................................43
6.3.2.1 Client ...............................................................................................................43
6.3.2.2 Agent ...............................................................................................................43
6.3.2.3 CIM Server ......................................................................................................44
6.3.2.4 Provider...........................................................................................................44
6.3.2.5 Lock Manager..................................................................................................44
6.3.2.6 Directory Server (SLP Directory Agent) ..........................................................44
6.3.3. Cascaded Agents ..................................................................................................44
7. Object Model General Information ..................................................................................45
7.1 Model Overview (Key Resources).................................................................................45
7.1.1. Overview................................................................................................................45
7.1.2. Introduction to CIM UML Notation .........................................................................45
7.2 Techniques....................................................................................................................46
7.2.1. CIM Fundamentals ................................................................................................46
7.2.2. Modeling Profiles ...................................................................................................48
7.2.3. CIM Naming...........................................................................................................49
7.2.4. Correlatable and Durable Names ..........................................................................51
7.2.4.1 Overview .........................................................................................................51
7.2.4.2 Guidelines for SCSI Logical Unit Names.........................................................52
---------------------- Page: 8 ----------------------7.2.4.3 Guidelines for Port Names ..............................................................................52
7.2.4.4 Guidelines for Storage System Names ...........................................................53
7.2.4.5 Standard Formats for Correlatable Names .....................................................54
7.2.4.6 Case Sensitivity...............................................................................................59
7.2.4.7 Testing Equality of correlatable Names...........................................................59
7.2.4.8 Operating System Device Names ...................................................................59
7.2.4.9 iSCSI Names...................................................................................................59
7.3 Health and Fault Management ......................................................................................61
7.3.1. Objectives ..............................................................................................................61
7.3.2. Overview................................................................................................................61
7.3.3. Terms.....................................................................................................................61
7.3.4. Description of Health and Fault Management .......................................................62
7.3.4.1 Operational Status and Health State (Polling).................................................62
7.3.4.2 Standard Errors and Events............................................................................63
7.3.4.3 Indications .......................................................................................................63
7.3.4.4 Event Correlation and Fault Containment .......................................................64
7.3.4.5 Fault Regions ..................................................................................................66
7.3.4.6 Examples.........................................................................................................68
7.4 Policy.............................................................................................................................73
7.4.1. Objectives ..............................................................................................................73
7.4.2. Overview................................................................................................................73
7.4.3. Policy Terms ..........................................................................................................73
7.4.4. Policy Definition .....................................................................................................74
7.4.4.1 Query Condition ..............................................................................................74
7.4.4.2 Method Action .................................................................................................74
7.4.4.3 Query Condition Result ...................................................................................74
7.4.4.4 Method Action Result ......................................................................................74
7.4.4.5 Capabilities......................................................................................................75
7.4.5. Policy Recipes .......................................................................................................75
7.5 Standard Messages ......................................................................................................77
7.5.1. Overview................................................................................................................77
7.5.2. Required Characteristics of Standard Messages...................................................77
7.5.2.1 Common Messages ........................................................................................79
7.5.2.2 Storage Messages ..........................................................................................90
7.5.2.3 Fabric Messages...........................................................................................101
7.6 Recipe Overview .........................................................................................................105
7.6.1. Recipe Definition..................................................................................................105
7.6.2. Recipe Pseudo Code Conventions......................................................................105
7.6.2.1 Overview .......................................................................................................105
7.6.2.2 General Syntax..............................................................................................105
7.6.2.3 CIM related variable and methods ................................................................106
7.6.2.4 Data Structure ...............................................................................................107
7.6.2.5 Operations.....................................................................................................107
7.6.2.6 Control Operations ........................................................................................108
7.6.2.7 Functions.......................................................................................................109
7.6.2.8 Exception Handling .......................................................................................109
7.6.2.9 Built-in Functions...........................................................................................109
iii---------------------- Page: 9 ----------------------
7.6.2.10 Extrinsic method calls....................................................................................111
8. Normative References....................................................................................................113
8.1 Introduction to Profiles.................................................................................................115
8.1.1. Profile Content .....................................................................................................115
8.1.1.1 Profile Definition ............................................................................................115
8.1.1.2 Format for Profile Specifications ...................................................................116
9. Object Model ...................................................................................................................119
9.1 Registry of Profiles and Subprofiles ............................................................................119
9.2 Packages, Subprofiles and Profile ..............................................................................123
9.2.1. Common Profiles .................................................................................................123
9.2.1.1 Access Points Subprofile...............................................................................123
9.2.1.2 Cascading Subprofile ...................................................................................127
9.2.1.3 Cluster Subprofile (DEPRECATED)..............................................................153
9.2.1.4 Device Credentials Subprofile .......................................................................155
9.2.1.5 Extra Capacity Set Subprofile (DEPRECATED) ...........................................159
9.2.1.6 Health Package.............................................................................................161
9.2.1.7 Job Control Subprofile...................................................................................169
9.2.1.8 Location Subprofile........................................................................................181
9.2.1.9 Multiple Computer System Subprofile ...........................................................185
9.2.1.10 Physical Package Package...........................................................................197
9.2.1.11 Policy Package..............................................................................................
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.