没有合适的资源?快使用搜索试试~ 我知道了~
首页ISO IEC 24775-3:2021:信息技术存储管理通用规范
ISO IEC 24775-3:2021:信息技术存储管理通用规范
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 158 浏览量
更新于2024-07-18
收藏 3.54MB PDF 举报
ISO IEC 24775-3:2021 是一项由国际标准化组织 (ISO) 和国际电工委员会 (IEC) 共同制定的信息技术标准,其主要关注存储管理领域。该标准的第三部分,即"Common profiles",着重于定义和推广在信息技术存储管理中通用的最佳实践和架构。作为第二版,它在2021年3月发布,旨在为全球的信息技术存储系统提供一个统一的标准框架,以便于系统的互操作性和管理效率。
该标准的核心内容涵盖了以下几个关键知识点:
1. 存储管理基础:ISO IEC 24775-3定义了存储管理的基础原则,包括存储设备的分类、性能指标、容量规划和生命周期管理,确保了不同类型的存储设备能在统一的标准下进行评估和管理。
2. 通用存储服务:标准中定义了一系列通用的存储服务,如数据备份、灾难恢复、数据复制、数据保留策略等,这些都是现代数据中心和企业级存储解决方案中不可或缺的部分。
3. 安全与合规:考虑到信息安全的重要性,标准包含了对数据保护措施的指南,如访问控制、加密、审计和合规性报告,以满足法规要求和防止数据泄露。
4. 服务质量(QoS)保障:标准强调了服务质量的管理,包括性能指标的设定、监控和优化,以确保用户能够获得预期的存储性能和服务可靠性。
5. 标准化接口和协议:通过制定通用接口和协议,ISO IEC 24775-3促进了不同厂商间产品的互操作性,使得存储设备能在异构环境中无缝集成。
6. 实施与维护:标准还提供了实施和维护存储管理系统的指导,包括最佳实践、培训、文档管理和变更管理流程,帮助组织有效地实施和保持存储系统的有效运行。
7. 版权与许可:在标准的版权和使用条款方面,ISO/IEC明确规定了复制和利用此文档的条件,强调了知识产权保护和获取授权的必要性。
ISO IEC 24775-3对于信息技术行业的组织和专业人士来说,是一份重要的参考文献,它有助于提升存储管理的标准化水平,降低运营成本,增强数据安全性,并推动整个行业的技术创新和发展。通过遵循这些通用规范,企业和机构能够在日益复杂和多变的存储环境中实现更高效、更可靠的管理。
16
23.7 Registered Name and Version .......................................................................................... 217
23.8 CIM Elements.................................................................................................................... 217
24 Location Profile............................................................................................................................ 223
24.1 Synopsis............................................................................................................................ 223
24.2 Description ........................................................................................................................ 223
24.3 Instance Diagram .............................................................................................................. 223
24.4 Health and Fault Management Considerations ................................................................. 223
24.5 Cascading Considerations ................................................................................................ 224
24.6 Methods of the Profile ....................................................................................................... 224
24.7 Use Cases......................................................................................................................... 224
24.8 CIM Elements.................................................................................................................... 224
25 Multiple Computer System Profile ............................................................................................... 227
25.1 Synopsis............................................................................................................................ 227
25.2 Description ........................................................................................................................ 227
25.3 Health and Fault Management Considerations ................................................................. 231
25.4 Cascading Considerations ................................................................................................ 231
25.5 Methods of the Profile ....................................................................................................... 231
25.6 Use Cases......................................................................................................................... 232
25.7 CIM Elements.................................................................................................................... 232
26 Physical Package Package ......................................................................................................... 237
26.1 Synopsis............................................................................................................................ 237
26.2 Description ........................................................................................................................ 237
26.3 Health and Fault Management Considerations ................................................................. 239
26.4 Cascading Considerations ................................................................................................ 239
26.5 Methods of this Profile....................................................................................................... 239
26.6 Use Cases......................................................................................................................... 239
26.7 CIM Elements.................................................................................................................... 240
27 Power Supply Profile ................................................................................................................... 247
27.1 Synopsis............................................................................................................................ 247
27.2 Description ........................................................................................................................ 247
27.3 Implementation.................................................................................................................. 247
27.4 Methods ............................................................................................................................ 247
27.5 Use Cases......................................................................................................................... 247
27.6 CIM Elements.................................................................................................................... 248
28 Fan Profile ................................................................................................................................... 253
28.1 Synopsis............................................................................................................................ 253
28.2 Description ........................................................................................................................ 253
28.3 Implementation.................................................................................................................. 253
28.4 Methods ............................................................................................................................ 253
28.5 Use Cases......................................................................................................................... 253
28.6 CIM Elements.................................................................................................................... 254
29 Sensors Profile ............................................................................................................................ 261
29.1 Synopsis............................................................................................................................ 261
29.2 Description ........................................................................................................................ 261
29.3 Implementation.................................................................................................................. 261
29.4 Methods ............................................................................................................................ 261
29.5 Use Cases......................................................................................................................... 261
29.6 CIM Elements...............................................................................................................
..... 262
30
Base Server Profile..........
............................................................................................................ 269
ISO/IEC 24775-3:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
17
30.1 Synopsis............................................................................................................................ 269
30.2 Description ........................................................................................................................ 270
30.3 Implementation.................................................................................................................. 270
30.4 Methods ............................................................................................................................ 270
30.5 Use Cases......................................................................................................................... 270
30.6 CIM Elements.................................................................................................................... 271
31 Media Access Device Profile ....................................................................................................... 277
31.1 Synopsis............................................................................................................................ 277
31.2 Description ........................................................................................................................ 277
31.3 Implementation.................................................................................................................. 278
31.4 Methods ............................................................................................................................ 279
31.5 Use Cases......................................................................................................................... 279
31.6 CIM Elements.................................................................................................................... 279
32 Storage Enclosure Profile............................................................................................................ 285
32.1 Synopsis............................................................................................................................ 285
32.2 Description ........................................................................................................................ 285
32.3 Implementation.................................................................................................................. 288
32.4 Methods ............................................................................................................................ 290
32.5 Use Cases......................................................................................................................... 291
32.6 CIM Elements.................................................................................................................... 291
33 Software Profile ........................................................................................................................... 305
33.1 Synopsis............................................................................................................................ 305
33.2 Description ........................................................................................................................ 305
33.3 Health and Fault Management Considerations ................................................................. 306
33.4 Cascading Considerations ................................................................................................ 306
33.5 Methods of the Profile ....................................................................................................... 306
33.6 Use Cases......................................................................................................................... 306
33.7 CIM Elements.................................................................................................................... 306
34 Software Inventory Profile ........................................................................................................... 309
34.1 Synopsis............................................................................................................................ 309
34.2 Description ........................................................................................................................ 309
34.3 Implementation.................................................................................................................. 310
34.4 Methods ............................................................................................................................ 310
34.5 Use Cases......................................................................................................................... 310
34.6 CIM Elements.................................................................................................................... 310
35 Server Profile............................................................................................................................... 317
35.1 Synopsis ........................................................................................................................... 317
35.2 Description ........................................................................................................................ 317
35.3 Health and Fault Management.......................................................................................... 320
35.4 Cascading Considerations ................................................................................................ 320
35.5 CIM Elements.................................................................................................................... 320
36 Profile Registration Profile ........................................................................................................... 325
36.1 Synopsis............................................................................................................................ 325
36.2 Description ........................................................................................................................ 325
36.3 Implementation.................................................................................................................. 325
36.4 Methods ............................................................................................................................ 328
36.5 Use Cases.....................................................................................................................
.... 328
36.6 CIM El
ements.................................................................................................................... 329
37 Indication Profile ........................................................................................................335
ISO/IEC 24775-3:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
18
38 Object Manager Adapter Profile .................................................................................................. 337
39 Proxy Server System Management Profile.................................................................................. 339
40 Device Credentials Profile ........................................................................................................... 341
40.1 Synopsis............................................................................................................................ 341
40.2 Description ........................................................................................................................ 341
40.3 Health and Fault Management Considerations ................................................................. 342
40.4 Cascading Considerations ................................................................................................ 342
40.5 Extrinsic Methods of this Profile ........................................................................................ 342
40.6 Use Cases......................................................................................................................... 342
40.7 CIM Elements.................................................................................................................... 342
41 Operational Power Profile............................................................................................................ 345
41.1 Synopsis............................................................................................................................ 345
41.2 Description ........................................................................................................................ 345
41.3 Implementation.................................................................................................................. 345
41.4 Methods of the Profile ....................................................................................................... 352
41.5 Use Cases......................................................................................................................... 357
41.6 Client Considerations and Recipes ................................................................................... 357
41.7 CIM Elements.................................................................................................................... 357
42 Indications Profile ........................................................................................................................ 373
43 WBEM Server Profile................................................................................................................... 375
Annex A (informative) SMI-S Information Model................................................................................ 377
Annex B (informative) Cross Profile Considerations .......................................................................... 379
B.1 Overview ........................................................................................................................... 379
B.2 HBA model ........................................................................................................................ 379
B.3 Switch Model..................................................................................................................... 380
B.4 Array Model....................................................................................................................... 380
B.5 Storage Virtualization Model ............................................................................................. 382
B.6 Fabric Topology (HBA, Switch, Array) .............................................................................. 383
ISO/IEC 24775-3:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
19
LIST OF FIGURES
Figure 1 - Experimental Maturity Level Tag ....................................................................................... 10
Figure 2 - Implemented Maturity Level Tag ....................................................................................... 10
Figure 3 - Stable Maturity Level Tag .................................................................................................. 11
Figure 4 - Deprecated Tag ................................................................................................................. 11
Figure 5 - Generic Target Port Classes ............................................................................................. 43
Figure 6 - LogicalPort Class Hierarchy .............................................................................................. 44
Figure 7 - Generic Target with LUN Masking..................................................................................... 45
Figure 8 - FC Target Port Instance Diagram...................................................................................... 50
Figure 9 - FCoE Topology.................................................................................................................. 55
Figure 10 - EthernetPort used for FCoE ............................................................................................ 56
Figure 11 - iSCSI Target Ports Profile Instance Diagram .................................................................. 65
Figure 12 - Serial Attached SCSI (SAS) Target Port Instance Diagram ............................................ 95
Figure 13 - SB Target Port Instance Diagram.................................................................................. 106
Figure 14 - DA Port Instance Diagram ............................................................................................. 112
Figure 15 - Generic Initiator Port Model ........................................................................................... 118
Figure 16 - Optional Connectivity Collection Model ......................................................................... 118
Figure 17 - Optional Full-Path Model ............................................................................................... 119
Figure 18 - HBA and Disk Model ..................................................................................................... 120
Figure 19 - HBA and Tape or Optical Devices ................................................................................. 121
Figure 20 - Port Statistics................................................................................................................. 121
Figure 21 - Port Statistics Hierarchy ................................................................................................ 122
Figure 22 - SPI Initiator Port Instance Diagram ...............................................................................129
Figure 23 - iSCSI Initiator Port Instance Diagram ............................................................................ 138
Figure 24 - Fibre Channel Initiator Instance Diagram ...................................................................... 148
Figure 25 - FC Node Model ............................................................................................................. 148
Figure 26 - SAS Initiator Port Model ................................................................................................ 159
Figure 27 - Fibre Channel Initiator Instance Diagram ...................................................................... 173
Figure 28 - FCoE Initiator Instance Diagram ...................................................................................183
Figure 29 - Optional Target Element Model .....................................................................................184
Figure 30 - Logical Port Group Model .............................................................................................. 185
Figure 31 - System-wide Remote Access Point............................................................................... 199
Figure 32 - Access Point Instance Diagram.....................................................................................200
Figure 33 - Job Control Profile Model .............................................................................................. 211
Figure 34 - Storage Configuration.................................................................................................... 217
Figure 35 - Location Instance .......................................................................................................... 223
Figure 36 - Two Redundant Systems Instance Diagram ................................................................. 227
Figure 37 - Multiple Redundancy Tier Instance Diagram
...................
.............................................. 229
Figure 38 - System Level Numbers ................................................................................................. 230
Figure 39 - Physical Package Package Mandatory Classes............................................................ 237
Figure 40 - Modeling for well defined subcomponents .................................................................... 238
Figure 41 - Physical Package Package with Optional Classes........................................................ 239
Figure 42 - Media Access Device Class Diagram............................................................................ 278
Figure 43 - Enclosure with Two Arrays ............................................................................................ 287
Figure 44 - Model for Disk in Enclosure........................................................................................... 290
ISO/IEC 24775-3:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
20
Figure 45 - Software Instance Diagram ......
..................................................................................... 305
Figure 46 - Server Model ................................................................................................................. 318
Figure 47 - Associations between RegisteredProfile instances ....................................................... 326
Figure 48 - Model for SMI-S Registered Profile ............................................................................... 327
Figure 49 - Model for Provider Versions .......................................................................................... 328
Figure 50 - DeviceCredentials Profile Model.................................................................................... 341
Figure 51 - Operational Power Profile Summary ............................................................................. 346
Figure 52 - Model for Element Types............................................................................................... 347
Figure 53 - Classes related to Top-level System Power Statistics................................................... 348
ISO/IEC 24775-3:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
剩余385页未读,继续阅读
2021-09-03 上传
2022-03-01 上传
点击了解资源详情
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
alarmano
- 粉丝: 26
- 资源: 1万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- C语言数组操作:高度检查器编程实践
- 基于Swift开发的嘉定单车LBS iOS应用项目解析
- 钗头凤声乐表演的二度创作分析报告
- 分布式数据库特训营全套教程资料
- JavaScript开发者Robert Bindar的博客平台
- MATLAB投影寻踪代码教程及文件解压缩指南
- HTML5拖放实现的RPSLS游戏教程
- HT://Dig引擎接口,Ampoliros开源模块应用
- 全面探测服务器性能与PHP环境的iprober PHP探针v0.024
- 新版提醒应用v2:基于MongoDB的数据存储
- 《我的世界》东方大陆1.12.2材质包深度体验
- Hypercore Promisifier: JavaScript中的回调转换为Promise包装器
- 探索开源项目Artifice:Slyme脚本与技巧游戏
- Matlab机器人学习代码解析与笔记分享
- 查尔默斯大学计算物理作业HP2解析
- GitHub问题管理新工具:GIRA-crx插件介绍
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功