Information technology -- Storage management

Technologies de l'information -- Gestion du stockage

General Information

Status
Published
Current Stage
4098 - Project deleted
Start Date
07-Sep-2009
Ref Project

RELATIONS

Buy Standard

Draft
ISO/IEC DIS 13186 - Information technology -- Storage management
English language
1380 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

DRAFT INTERNATIONAL STANDARD ISO/IEC 13186
Attributed to ISO/IEC JTC 1 by the Central Secretariat (see page iii)
Voting begins on Voting terminates on
2009-03-27 2009-08-27

INTERNATIONAL ORGANIZATION FOR STANDARDIZATION • МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ • ORGANISATION INTERNATIONALE DE NORMALISATION

INTERNATIONAL ELECTROTECHNICAL COMMISSION • МЕЖДУНАРОДНАЯ ЭЛЕКТРОТЕХНИЧЕСКАЯ КОММИСИЯ • COMMISSION ÉLECTROTECHNIQUE INTERNATIONALE

FAST-TRACK PROCEDURE
Information technology — Storage management
Technologies de l'information — Gestion du stockage
ICS 35.220.01

The version of this document received for DIS ballot has been distilled to PDF 1.6.

Unfortunately it is not possible at present to obtain a version of the document in PDF 1.4.

Rather than delay the document or redistil it at the ISO Central Secretariat and risk the

introduction of changes, it has been decided exceptionally to launch the DIS ballot with the

current PDF 1.6 version.

If you encounter any problems in either viewing or printing this document, please inform the

ISO Central Secretariat as soon as possible: projects@iso.org

In accordance with the provisions of Council Resolution 21/1986 this DIS is circulated in the

English language only.

Conformément aux dispositions de la Résolution du Conseil 21/1986, ce DIS est distribué en

version anglaise seulement.

THIS DOCUMENT IS A DRAFT CIRCULATED FOR COMMENT AND APPROVAL. IT IS THEREFORE SUBJECT TO CHANGE AND MAY NOT BE

REFERRED TO AS AN INTERNATIONAL STANDARD UNTIL PUBLISHED AS SUCH.

IN ADDITION TO THEIR EVALUATION AS BEING ACCEPTABLE FOR INDUSTRIAL, TECHNOLOGICAL, COMMERCIAL AND USER PURPOSES,

DRAFT INTERNATIONAL STANDARDS MAY ON OCCASION HAVE TO BE CONSIDERED IN THE LIGHT OF THEIR POTENTIAL TO BECOME

STANDARDS TO WHICH REFERENCE MAY BE MADE IN NATIONAL REGULATIONS.

RECIPIENTS OF THIS DRAFT ARE INVITED TO SUBMIT, WITH THEIR COMMENTS, NOTIFICATION OF ANY RELEVANT PATENT RIGHTS OF WHICH

THEY ARE AWARE AND TO PROVIDE SUPPORTING DOCUMENTATION.
International Organization for Standardization, 2009
International Electrotechnical Commission, 2009
---------------------- Page: 1 ----------------------
ISO/IEC DIS 13186
PDF disclaimer

This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but

shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In

downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat

accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.

Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation

parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In

the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.

Copyright notice

This ISO document is a Draft International Standard and is copyright-protected by ISO. Except as permitted

under the applicable laws of the user's country, neither this ISO draft nor any extract from it may be

reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,

photocopying, recording or otherwise, without prior written permission being secured.

Requests for permission to reproduce should be addressed to either ISO at the address below or ISO's

member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Reproduction may be subject to royalty payments or a licensing agreement.
Violators may be prosecuted.
ii © ISO/IEC 2009 — All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC DIS 13186
NOTE FROM ITTF

The current fast track draft is the American National Standard ANSI INCITS 388:2008, submitted by the US

National Committee of the IEC / US Member Body of ISO to the ISO/IEC JTC 1 Fast Track process. If the

fast-track draft is approved, it will replace ISO/IEC 24775:2007, "Information Technology — Storage

management", of which it constitutes a technical revision.

This draft International Standard is submitted for JTC 1 national body vote under the Fast-Track Procedure.

In accordance with Resolution 30 of the JTC 1 Berlin Plenary 1993, the proposer of this document recommends

assignment of ISO/IEC 13186 to JTC 1/SC 25.
“FAST-TRACK” PROCEDURE

1 Any P-member and any Category A liaison organization of ISO/IEC JTC 1 may propose that an existing

standard from any source be submitted directly for vote as a DIS. The criteria for proposing an existing

standard for the fast-track procedure are a matter for each proposer to decide.

2 The proposal shall be received by the ITTF which will take the following actions.

2.1 To settle the copyright and/or trade mark situation with the proposer, so that the proposed text can be

freely copied and distributed within JTC 1 without restriction.

2.2 To assess in consultation with the JTC 1 secretariat which SC is competent for the subject covered by

the proposed standard and to ascertain that there is no evident contradiction with other International

Standards.

2.3 To distribute the text of the proposed standard as a DIS. In case of particularly bulky documents the ITTF

may demand the necessary number of copies from the proposer.

3 The period for combined DIS voting shall be five months. In order to be accepted the DIS must be

supported by 75 % of the votes cast (abstention is not counted as a vote) and by two-thirds of the P-members

voting of JTC 1.

4 At the end of the voting period, the comments received, whether editorial only or technical, will be dealt

with by a working group appointed by the secretariat of the relevant SC.

5 If, after the deliberations of this WG, the requirements of 3 above are met, the amended text shall be sent

to the ITTF by the secretariat of the relevant SC for publication as an International Standard.

If it is impossible to agree to a text meeting the above requirements, the proposal has failed and the procedure

is terminated.

In either case the WG shall prepare a full report which will be circulated by the ITTF.

6 If the proposed standard is accepted and published, its maintenance will be handled by JTC 1.

© ISO/IEC 2009 — All rights reserved iii
---------------------- Page: 3 ----------------------
ANSI INCITS 388-2008
for Information Technology –
Storage Management
Developed by
ANSI INCITS 388-2008
American National Standard
---------------------- Page: 4 ----------------------
ANSI
INCITS 388-2008
Revision of
ANSI INCITS 388-2004
American National Standard
for Information Technology –
Storage Management
Secretariat
Information Technology Industry Council
Approved May 21, 2008
American National Standards Institute, Inc.
Abstract

This specification documents a secure and reliable interface that allows storage management systems to

identify, classify, monitor, and control physical and logical resources in a Storage Area Network.

---------------------- Page: 5 ----------------------
Approval of an American National Standard requires review by ANSI that the
American
requirements for due process, consensus, and other criteria for approval have
been met by the standards developer.
National
Consensus is established when, in the judgement of the ANSI Board of
Standard
Standards Review, substantial agreement has been reached by directly and
materially affected interests. Substantial agreement means much more than
a simple majority, but not necessarily unanimity. Consensus requires that all
views and objections be considered, and that a concerted effort be made
towards their resolution.
The use of American National Standards is completely voluntary; their
existence does not in any respect preclude anyone, whether he has approved
the standards or not, from manufacturing, marketing, purchasing, or using
products, processes, or procedures not conforming to the standards.
The American National Standards Institute does not develop standards and
will in no circumstances give an interpretation of any American National
Standard. Moreover, no person shall have the right or authority to issue an
interpretation of an American National Standard in the name of the American
National Standards Institute. Requests for interpretations should be
addressed to the secretariat or sponsor whose name appears on the title
page of this standard.
CAUTION NOTICE: This American National Standard may be revised or
withdrawn at any time. The procedures of the American National Standards
Institute require that action be taken periodically to reaffirm, revise, or
withdraw this standard. Purchasers of American National Standards may
receive current information on all standards by calling or writing the American
National Standards Institute.

CAUTION: The developers of this standard have requested that holders of patents that may be

required for the implementation of the standard disclose such patents to the publisher. However,

neither the developers nor the publisher have undertaken a patent search in order to identify

which, if any, patents may apply to this standard. As of the date of publication of this standard

and following calls for the identification of patents that may be required for the implementation of

the standard, no such claims have been made. No further patent search is conducted by the de-

veloper or publisher in respect to any standard it processes. No representation is made or implied

that licenses are not required to avoid infringement in the use of this standard.

Published by
American National Standards Institute, Inc.
25 West 43rd Street, New York, NY 10036
Copyright © 2008 by Information Technology Industry Council (ITI)
All rights reserved.
No part of this publication may be reproduced in any
form, in an electronic retrieval system or otherwise,
without prior written permission of ITI, 1250 Eye Street NW,
Washington, DC 20005.
Printed in the United States of America
---------------------- Page: 6 ----------------------
Contents

List of Tables.............................................................................................................................. ix

List of Figures..........................................................................................................................xxxi

1. Scope ...................................................................................................................................1

2. Definitions, Symbols, Abbreviations, and Conventions .................................................3

2.1 Definitions........................................................................................................................3

2.2 Symbols and abbreviations ...........................................................................................15

2.3 Keywords.......................................................................................................................16

2.4 Conventions ..................................................................................................................17

3. Business Overview...........................................................................................................19

3.1 Preamble .......................................................................................................................19

3.2 Business Rationale........................................................................................................19

3.3 Interface Definition ........................................................................................................20

3.4 Technology Trends........................................................................................................22

3.5 Management Environment ............................................................................................23

3.6 Architectural Objectives.................................................................................................24

3.7 Disclaimer......................................................................................................................25

4. Typographical Conventions ............................................................................................27

4.1 Deprecated Material ......................................................................................................27

4.2 Experimental Material....................................................................................................27

5. Overview............................................................................................................................29

5.1 Base Capabilities...........................................................................................................29

5.1.1. Object Oriented......................................................................................................29

5.1.2. Messaging Based ..................................................................................................31

5.2 Functionality Matrix .......................................................................................................33

5.2.1. Overview................................................................................................................33

5.2.2. Multi-Level Model Of Networked Storage Management Functionality...................33

5.2.3. FCAPS...................................................................................................................34

5.2.4. Management Functionality Within Each Level Of The Model ................................34

5.2.4.1 (Level 1) Device Level Functionality................................................................34

5.2.4.2 (Level 2) Connectivity Level Functionality .......................................................34

5.2.4.3 (Level 3) Block Level Functionality..................................................................34

5.2.4.4 (Level 4) File/Record Level Functionality ........................................................34

5.2.4.5 (Level 5) Application Level Functionality.........................................................35

5.2.5. Referring To Levels And Capabilities In The Multi-level Model .............................35

5.2.6. Functionality Descriptions in SMI-S Profiles ..........................................................35

5.3 Capabilities of This Version...........................................................................................35

5.3.1. Device Level ..........................................................................................................35

5.3.1.1 Fault Management ..........................................................................................35

5.3.1.2 Configuration Management .............................................................................35

5.3.1.3 Accounting Management.................................................................................35

5.3.1.4 Performance Management..............................................................................35

5.3.1.5 Security Management .....................................................................................35

5.3.2. Connectivity Level..................................................................................................36

5.3.2.1 Fault Management ..........................................................................................36

5.3.2.2 Configuration Management .............................................................................36

---------------------- Page: 7 ----------------------

5.3.2.3 Accounting Management.................................................................................36

5.3.2.4 Performance Management..............................................................................36

5.3.2.5 Security Management .....................................................................................36

5.3.3. Block Level ............................................................................................................36

5.3.3.1 Fault Management ..........................................................................................36

5.3.3.2 Configuration Management .............................................................................36

5.3.3.3 Accounting Management.................................................................................36

5.3.3.4 Performance Management..............................................................................36

5.3.3.5 Security Management .....................................................................................36

5.3.4. File/Record Level...................................................................................................37

5.3.4.1 Fault Management ..........................................................................................37

5.3.4.2 Configuration Management .............................................................................37

5.3.4.3 Accounting Management.................................................................................37

5.3.4.4 Performance Management..............................................................................37

5.3.4.5 Security Management .....................................................................................37

5.3.5. Application Level....................................................................................................37

5.4 Operational Environment .................................................................................................................. 39

5.5 Using this Specification .................................................................................................40

5.6 Language Bindings........................................................................................................40

6. Transport and Reference Model......................................................................................41

6.1 Introduction....................................................................................................................41

6.1.1. Overview................................................................................................................41

6.1.2. Language Requirements .......................................................................................41

6.1.3. Communications Requirements.............................................................................41

6.1.4. XML Message Syntax and Semantics ...................................................................41

6.2 Transport Stack .............................................................................................................42

6.3 Reference Model ...........................................................................................................43

6.3.1. Overview................................................................................................................43

6.3.2. Roles for Interface Constituents ............................................................................43

6.3.2.1 Client ...............................................................................................................43

6.3.2.2 Agent ...............................................................................................................43

6.3.2.3 CIM Server ......................................................................................................44

6.3.2.4 Provider...........................................................................................................44

6.3.2.5 Lock Manager..................................................................................................44

6.3.2.6 Directory Server (SLP Directory Agent) ..........................................................44

6.3.3. Cascaded Agents ..................................................................................................44

7. Object Model General Information ..................................................................................45

7.1 Model Overview (Key Resources).................................................................................45

7.1.1. Overview................................................................................................................45

7.1.2. Introduction to CIM UML Notation .........................................................................45

7.2 Techniques....................................................................................................................46

7.2.1. CIM Fundamentals ................................................................................................46

7.2.2. Modeling Profiles ...................................................................................................48

7.2.3. CIM Naming...........................................................................................................49

7.2.4. Correlatable and Durable Names ..........................................................................51

7.2.4.1 Overview .........................................................................................................51

7.2.4.2 Guidelines for SCSI Logical Unit Names.........................................................52

---------------------- Page: 8 ----------------------

7.2.4.3 Guidelines for Port Names ..............................................................................52

7.2.4.4 Guidelines for Storage System Names ...........................................................53

7.2.4.5 Standard Formats for Correlatable Names .....................................................54

7.2.4.6 Case Sensitivity...............................................................................................59

7.2.4.7 Testing Equality of correlatable Names...........................................................59

7.2.4.8 Operating System Device Names ...................................................................59

7.2.4.9 iSCSI Names...................................................................................................59

7.3 Health and Fault Management ......................................................................................61

7.3.1. Objectives ..............................................................................................................61

7.3.2. Overview................................................................................................................61

7.3.3. Terms.....................................................................................................................61

7.3.4. Description of Health and Fault Management .......................................................62

7.3.4.1 Operational Status and Health State (Polling).................................................62

7.3.4.2 Standard Errors and Events............................................................................63

7.3.4.3 Indications .......................................................................................................63

7.3.4.4 Event Correlation and Fault Containment .......................................................64

7.3.4.5 Fault Regions ..................................................................................................66

7.3.4.6 Examples.........................................................................................................68

7.4 Policy.............................................................................................................................73

7.4.1. Objectives ..............................................................................................................73

7.4.2. Overview................................................................................................................73

7.4.3. Policy Terms ..........................................................................................................73

7.4.4. Policy Definition .....................................................................................................74

7.4.4.1 Query Condition ..............................................................................................74

7.4.4.2 Method Action .................................................................................................74

7.4.4.3 Query Condition Result ...................................................................................74

7.4.4.4 Method Action Result ......................................................................................74

7.4.4.5 Capabilities......................................................................................................75

7.4.5. Policy Recipes .......................................................................................................75

7.5 Standard Messages ......................................................................................................77

7.5.1. Overview................................................................................................................77

7.5.2. Required Characteristics of Standard Messages...................................................77

7.5.2.1 Common Messages ........................................................................................79

7.5.2.2 Storage Messages ..........................................................................................90

7.5.2.3 Fabric Messages...........................................................................................101

7.6 Recipe Overview .........................................................................................................105

7.6.1. Recipe Definition..................................................................................................105

7.6.2. Recipe Pseudo Code Conventions......................................................................105

7.6.2.1 Overview .......................................................................................................105

7.6.2.2 General Syntax..............................................................................................105

7.6.2.3 CIM related variable and methods ................................................................106

7.6.2.4 Data Structure ...............................................................................................107

7.6.2.5 Operations.....................................................................................................107

7.6.2.6 Control Operations ........................................................................................108

7.6.2.7 Functions.......................................................................................................109

7.6.2.8 Exception Handling .......................................................................................109

7.6.2.9 Built-in Functions...........................................................................................109

iii
---------------------- Page: 9 ----------------------

7.6.2.10 Extrinsic method calls....................................................................................111

8. Normative References....................................................................................................113

8.1 Introduction to Profiles.................................................................................................115

8.1.1. Profile Content .....................................................................................................115

8.1.1.1 Profile Definition ............................................................................................115

8.1.1.2 Format for Profile Specifications ...................................................................116

9. Object Model ...................................................................................................................119

9.1 Registry of Profiles and Subprofiles ............................................................................119

9.2 Packages, Subprofiles and Profile ..............................................................................123

9.2.1. Common Profiles .................................................................................................123

9.2.1.1 Access Points Subprofile...............................................................................123

9.2.1.2 Cascading Subprofile ...................................................................................127

9.2.1.3 Cluster Subprofile (DEPRECATED)..............................................................153

9.2.1.4 Device Credentials Subprofile .......................................................................155

9.2.1.5 Extra Capacity Set Subprofile (DEPRECATED) ...........................................159

9.2.1.6 Health Package.............................................................................................161

9.2.1.7 Job Control Subprofile...................................................................................169

9.2.1.8 Location Subprofile........................................................................................181

9.2.1.9 Multiple Computer System Subprofile ...........................................................185

9.2.1.10 Physical Package Package...........................................................................197

9.2.1.11 Policy Package..............................................................................................

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.