没有合适的资源?快使用搜索试试~ 我知道了~
首页ISO IEC 24775-4:2021:信息技术存储管理——块设备国际标准
ISO IEC 24775-4:2021:信息技术存储管理——块设备国际标准
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 65 浏览量
更新于2024-07-18
收藏 7.19MB PDF 举报
ISO IEC 24775-4:2021 是一项重要的国际标准,专注于信息技术领域中的存储管理,具体针对的是块设备。这个第二版于2021年3月发布,旨在为块设备的管理和操作提供一套全面、系统的规范。块设备在计算机系统中扮演着核心角色,它们是数据存储的基本单元,如硬盘驱动器、固态硬盘(SSD)和其他非挥发性存储设备。
本标准定义了块设备管理的各个方面,包括但不限于性能指标、错误处理、容量管理、安全控制、一致性保障以及与操作系统和应用程序的交互接口。它要求在设计和实现块设备时,应考虑可扩展性、可靠性和兼容性,以确保在各种环境和应用场景下都能提供高效、稳定的服务。
标准涵盖了以下几个关键知识点:
1. **架构与接口**:定义了块设备与主机系统之间的标准接口,如SCSI、SAS、NVMe等,确保不同设备间互操作性。
2. **性能指标**:规定了衡量块设备性能的关键参数,如I/O速率、随机读写能力、吞吐量和响应时间,以便优化设备的使用和配置。
3. **错误处理**:详细规定了错误检测和恢复机制,包括错误报告、冗余和数据保护措施,以减少数据丢失和系统故障的风险。
4. **容量管理**:涵盖容量分配、扩展、备份和恢复策略,确保数据的持久性和可用性。
5. **安全性**:强调了数据加密、访问控制、权限管理和审计功能,以保护存储在块设备上的敏感信息。
6. **一致性保证**:确保在并发访问或多线程环境下,数据的一致性和完整性,防止竞态条件和数据损坏。
7. **生命周期管理**:涵盖了设备的安装、配置、维护和卸载过程中的最佳实践,以降低运维复杂性。
8. **标准实施指南**:提供了实施和测试块设备管理系统的详细步骤和指导,帮助开发人员和管理员遵循规范。
ISO IEC 24775-4不仅适用于硬件制造商,也对软件开发者、数据中心运维人员和云服务提供商具有重要参考价值。通过遵循该标准,可以提升整个行业的效率和可靠性,同时促进技术的标准化和互操作性。在实际应用中,组织和个人应根据标准要求持续改进其块设备管理实践,以适应快速发展的技术环境。
16
9.1 Description........................................................................................................305
9.2 Health and Fault Management Considerations ...................................................341
9.3 Cascading Considerations .................................................................................343
9.4 Supported Profiles and Packages ......................................................................343
9.5 Methods of the Profile .......................................................................................344
9.6 Client Considerations and Recipes ....................................................................362
9.7 CIM Elements ...................................................................................................374
10 Disk Drive Lite Profile .................................................................................................................. 391
10.1 Synopsis............................................................................................................................ 391
10.2 Description ........................................................................................................................ 391
10.3 Modeling............................................................................................................................ 391
10.4 Health and Fault Management Considerations ................................................................. 394
10.5 Cascading Considerations ................................................................................................ 396
10.6 Methods of this Profile....................................................................................................... 396
10.7 CIM Elements.................................................................................................................... 397
11 Disk Sparing Profile ..................................................................................................................... 411
11.1 Description ........................................................................................................................ 411
11.2 Health and Fault Management Considerations ................................................................. 418
11.3 Cascading Conjurations .................................................................................................... 418
11.4 Methods of the Profile ....................................................................................................... 418
11.5 Use Cases......................................................................................................................... 421
11.6 CIM Elements.................................................................................................................... 422
12 Erasure Profile............................................................................................................................. 433
12.1 Description ........................................................................................................................ 433
12.2 Health and Fault Management Considerations ................................................................. 435
12.3 Cascading Considerations ................................................................................................ 435
12.4 Methods of the Profile ....................................................................................................... 435
12.5 Use Cases......................................................................................................................... 436
12.6 CIM Elements.................................................................................................................... 436
13 Extent Composition Profile .......................................................................................................... 441
13.1 Description ........................................................................................................................ 441
13.2 Health and Fault Management Considerations ................................................................. 458
13.3 Cascading Considerations ................................................................................................ 458
13.4 Methods of the Profile ....................................................................................................... 458
13.5 Use Cases......................................................................................................................... 458
13.6 CIM Elements.................................................................................................................... 459
14 Masking and Mapping Profile ...................................................................................................... 469
14.1 Description ........................................................................................................................ 469
14.2 Health and Fault Management Considerations ................................................................. 478
14.3 Cascading Considerations ................................................................................................ 478
14.4 Methods of the Profile ....................................................................................................... 478
14.5 Use Cases......................................................................................................................... 491
14.6 CIM Elements.................................................................................................................... 492
15 Storage Server Asymmetry Profile ..............................................................................................509
15.1 Description ........................................................................................................................ 509
15.2 Health and Fault Management Consideration................................................................... 518
15.3 Cascading Considerations ................................................................................................ 518
15.4 Methods of the Profile ....................................................................................................... 518
15.5 Use Cases..................................................................................................................
....... 519
15.6
CIM Elements
.................................................................................................................... 519
ISO/IEC 24775-4:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
17
16 Storage Virtualizer Profile............................................................................................................ 529
16.1 Synopsis............................................................................................................................ 529
16.2 Description ........................................................................................................................ 530
16.3 Instance Diagrams ............................................................................................................ 531
16.4 Health and Fault Management.......................................................................................... 536
16.5 Storage Virtualizer Support for Cascading........................................................................ 536
16.6 Methods of the Profile ....................................................................................................... 537
16.7 Use Cases......................................................................................................................... 538
16.8 CIM Elements.................................................................................................................... 538
17 Volume Composition Profile ........................................................................................................ 555
17.1 Description ........................................................................................................................ 555
17.2 Striped and Concatenated Composite Volumes ............................................................... 567
17.3 Health and Fault Management Consideration................................................................... 568
17.4 Cascading Considerations ................................................................................................ 568
17.5 Methods of the Profile ....................................................................................................... 569
17.6 Use Cases......................................................................................................................... 581
17.7 CIM Elements.................................................................................................................... 582
18 Volume Management Profile .......................................................................................589
19 Storage Element Protection Profile ............................................................................................. 591
19.1 Description ........................................................................................................................ 591
19.2 Health and Fault Management Consideration................................................................... 602
19.3 Cascading Considerations ................................................................................................ 602
19.4 Methods of the Profile ....................................................................................................... 602
19.5 Client Considerations and Recipes ................................................................................... 606
19.6 CIM Elements.................................................................................................................... 606
20 Replication Services Profile......................................................................................................... 609
20.1 Description ........................................................................................................................ 609
20.2 Health and Fault Management Consideration................................................................... 638
20.3 Cascading Considerations ................................................................................................ 639
20.4 Mapping of Copy Services and Replication Services Properties and Methods ................ 642
20.5 Methods of the Profile ....................................................................................................... 643
20.6 Use Cases......................................................................................................................... 681
20.7 CIM Elements.................................................................................................................... 682
21 Pools from Volumes Profile ......................................................................................................... 717
21.1 Description ........................................................................................................................ 717
21.2 Block Services Enhancements.......................................................................................... 722
21.3 Health and Fault Management Considerations ................................................................. 723
21.4 Cascading Considerations ................................................................................................ 723
21.5 Methods of the Profile ....................................................................................................... 723
21.6 Use Cases......................................................................................................................... 724
21.7 CIM Elements.................................................................................................................... 724
22 Group Masking and Mapping Profile ........................................................................................... 729
22.1 Description ........................................................................................................................ 729
22.2 Health and Fault Management Consideration................................................................... 737
22.3 Cascading Considerations ................................................................................................ 737
22.4 Methods of the Profile ....................................................................................................... 737
22.5 Use Cases......................................................................................................................... 743
22.6 CIM Elements.................................................................................................................... 744
23 Storage Relocation Profile........................................................................................................... 769
ISO/IEC 24775-4:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
18
23.1 Description ........................................................................................................................ 769
23.2 Health and Fault Management Consideration................................................................... 774
23.3 Cascading Considerations ................................................................................................ 774
23.4 Mapping & Masking Considerations.................................................................................. 774
23.5 Methods of the Profile ....................................................................................................... 774
23.6 Use Cases......................................................................................................................... 778
23.7 CIM Elements.................................................................................................................... 784
24 Thin Provisioning Profile.............................................................................................................. 803
24.1 Description ........................................................................................................................ 803
24.2 Health and Fault Management Consideration................................................................... 807
24.3 Cascading Considerations ................................................................................................ 807
24.4 Methods of the Profile ....................................................................................................... 807
24.5 Use Cases......................................................................................................................... 808
24.6 CIM Elements.................................................................................................................... 812
25 Automated Storage Tiering Profile .............................................................................................. 847
25.1 Description ........................................................................................................................ 847
25.2 Methods of the Profile ....................................................................................................... 860
25.3 Client Considerations and Recipes ................................................................................... 865
25.4 CIM Elements.................................................................................................................... 866
26 Automated Storage Tiering Policy Profile.................................................................................... 889
26.1 Synopsis............................................................................................................................ 889
26.2 Description ........................................................................................................................ 889
26.3 Policies.............................................................................................................................. 889
26.4 Key Components............................................................................................................... 890
26.5 Implementation.................................................................................................................. 890
26.6 Methods ............................................................................................................................ 894
26.7 Use Cases......................................................................................................................... 899
26.8 CIM Elements.................................................................................................................... 900
27 Storage Pool Diagnostics Profile ................................................................................................. 929
27.1 Synopsis............................................................................................................................ 929
27.2 Description ........................................................................................................................ 929
27.3 Implementation.................................................................................................................. 931
27.4 Methods ............................................................................................................................ 949
27.5 Use Cases......................................................................................................................... 953
27.6 CIM Elements.................................................................................................................... 961
Annex A (informative) SMI-S Information Model................................................................................ 981
Annex B (informative) Registry of StorageExtent Definitions............................................................. 983
ISO/IEC 24775-4:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
19
LIST OF FIGURES
Figure 1 - Experimental Maturity Level Tag ....................................................................................... 12
Figure 2 - Implemented Maturity Level Tag ....................................................................................... 12
Figure 3 - Stable Maturity Level Tag .................................................................................................. 13
Figure 4 - Deprecated Tag ................................................................................................................. 13
Figure 5 - Array Profile Instance Diagram.......................................................................................... 51
Figure 6 - Array Package Diagram .................................................................................................... 52
Figure 7 - Storage Capacity State...................................................................................................... 62
Figure 8 - StoragePool Manipulation Instance Diagram .................................................................... 64
Figure 9 - Capabilities Specific to a StoragePool............................................................................... 65
Figure 10 - StorageVolume Creation Instance Diagram .................................................................... 71
Figure 11 - Storage Configuration...................................................................................................... 72
Figure 12 - StorageExtent Conservation - Step 1 .............................................................................. 78
Figure 13 - StorageExtent Conservation - Step 2 .............................................................................. 79
Figure 14 - StorageExtent Conservation - Step 3 .............................................................................. 80
Figure 15 - Representative Block Service Instance Diagram........................................................... 106
Figure 16 - StoragePool Creation - Initial State ............................................................................... 107
Figure 17 - StoragePool Creation - Step 1....................................................................................... 108
Figure 18 - StoragePool Creation - Step 2....................................................................................... 108
Figure 19 - StoragePool Creation - Step 3....................................................................................... 109
Figure 20 - StorageVolume Creation - Initial State .......................................................................... 110
Figure 21 - StorageVolume Creation - Step 1.................................................................................. 110
Figure 22 - StorageVolume Creation - Step 2.................................................................................. 111
Figure 23 - StorageVolume Creation - Step 3.................................................................................. 112
Figure 24 - Class diagram for managed element Block Storage View Classes............................... 147
Figure 25 - Class diagram for view associations.............................................................................. 148
Figure 26 - Block Storage View Class Capabilities.......................................................................... 149
Figure 27 - VolumeView and related associations ........................................................................... 150
Figure 28 - DiskDriveView and related associations........................................................................ 152
Figure 29 - MaskingMappingExposedDeviceView Association ....................................................... 154
Figure 30 - MaskingMappingView Association ................................................................................ 155
Figure 31 - The MappingProtocolControllerView ............................................................................. 157
Figure 32 - The StoragePoolView .................................................................................................... 159
Figure 33 - The ReplicaPairView ..................................................................................................... 162
Figure 34 - Block Server Performance Profile Summary Instance Diagram .................................... 203
Figure 35 - Base Array Profile Block Server Performance Instance Diagram.................................. 207
Figure 36 - Base Storage Virtualizer Profile Block Server Performance Instance Diagram............. 209
Figure 37 - Base Volume Management Profile Block Server Performance Instance Diagram ........ 211
Figure 38 - Multiple Computer System Profile Block Server Performance Instance Diagram ......... 215
Figure 39 - Fibre Channel Initiator Port Profile Block Server Performance Instance Diagram ........ 216
Figure 40 - Extent Composition Profile Block Server
Performance Ins
tance Diagram .................... 218
Figure 41 - Disk Drive Lite Profile Block Server Performance Instance Diagram ............................ 219
Figure 42 - Disk Drive Performance Data Rates.............................................................................. 220
ISO/IEC 24775-4:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
20
Figure 43 - SCSIArbitraryLogicalUnit Bloc
k Server Performance Instance Diagram....................... 221
Figure 44 - Remote Mirrors Block Server Performance Instance Diagram...................................... 222
Figure 45 - Block Server Performance Manifest Collections............................................................ 224
Figure 46 - Block Services Support for Count Key Data Storage .................................................... 270
Figure 47 - Copy Services Discovery............................................................................................... 306
Figure 48 - Local Replica ................................................................................................................. 310
Figure 49 - Multi-Level Local Replication ......................................................................................... 311
Figure 50 - Multiple Snapshots Per Source Element ....................................................................... 312
Figure 51 - SettingsDefineState Association ...................................................................................316
Figure 52 - SynchronizationAspect Instance ................................................................................... 317
Figure 53 - State Transitions for Mirrors and Clones ....................................................................... 325
Figure 54 - State Transitions for Snapshots and Migration.............................................................. 326
Figure 55 - CopyState Transitions ................................................................................................... 328
Figure 56 - Sample CopyState and ProgressStatus Transitions...................................................... 334
Figure 57 - Fixed Space Consumption ............................................................................................ 338
Figure 58 - Variable Space Consumption ........................................................................................339
Figure 59 - Fixed Space Consumption ............................................................................................ 369
Figure 60 - Variable Space Consumption ........................................................................................370
Figure 61 - CIM Elements in the Disk Drive Model .......................................................................... 392
Figure 62 - Disk Drive Dependency ................................................................................................. 395
Figure 63 - Drive Dependency and Pool Hierarchy.......................................................................... 396
Figure 64 - Sparing Instance Diagram ............................................................................................. 412
Figure 65 - Variations of RS per Storage Element........................................................................... 414
Figure 66 - Before Failure ................................................................................................................ 416
Figure 67 - During Failure ................................................................................................................ 416
Figure 68 - After Failure ................................................................................................................... 417
Figure 69 - Model Elements ............................................................................................................. 435
Figure 70 - Remaining Extents in Extent Composition..................................................................... 444
Figure 71 - Volume Composition from General QOS Pool .............................................................. 446
Figure 72 - Single QOS Pool Composition (RAID Groups).............................................................. 447
Figure 73 - SIngle QOS Pool Composition - Two Concretes ........................................................... 448
Figure 74 - Concatenation Composition .......................................................................................... 450
Figure 75 - RAID0 Composition ....................................................................................................... 450
Figure 76 - RAID1 Composition ....................................................................................................... 451
Figure 77 - RAID10 Composition ..................................................................................................... 452
Figure 78 - RAID0+1 Composition ................................................................................................... 453
Figure 79 - RAID4, 5 Composition ................................................................................................... 454
Figure 80 - RAID 6, 5DP, 4DP ......................................................................................................... 455
Figure 81 - RAID15 Composition ..................................................................................................... 456
Figure 82 - RAID50 Composition ..................................................................................................... 457
Figure 83 - RAID51 Composition ..................................................................................................... 458
Figure 84 - Generic System with no Configuration Service ............................................................. 471
Figure 85 - Generic System with ControllerConfigurationService.................................................... 471
Figure 86 - Relationship of Initiator
IDs, Endpoint
s, and Logical Units ............................................ 473
Figure 87 - StorageClientSettingData Model ................................................................................... 476
Figure 88 - Entire Model .................................................................................................................. 477
ISO/IEC 24775-4:2021(E)
© ISO/IEC 2021 – All rights reserved
poorest
剩余989页未读,继续阅读
点击了解资源详情
点击了解资源详情
点击了解资源详情
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
2021-09-03 上传
alarmano
- 粉丝: 27
- 资源: 1万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- tvovjddjjx
- WP Strona Startowa-crx插件
- ynwitter-clone:ynwitter-clone
- wufei:异步Kuberenetes命名空间日志记录器流媒体
- Accuinsight-1.0.30-py2.py3-none-any.whl.zip
- auto-update-action:测试gh操作自动更新存储库文件
- 基于PHP的最新苍穹影视V20七彩视界免授权开源源码.zip
- documentation:即插即用堆栈,用于从用户角度测试和监视Web应用程序
- Kubbo跟踪:Kubbo跟踪
- jsonserver::rocket:描述您的数据,自动获得带有随机值的伪造的REST&GraphQL API。或instantly立即获得假服务器
- aabbtree-2.6.1-py2.py3-none-any.whl.zip
- 轻量级指示器控件LBProgressHUD
- 基于PHP的最新精仿爱美眉美女图片程序源码.zip
- 子程序调用指令的应用举例.rar
- flashcard:抽认卡应用(Anki替代品)
- 日历模板:vanilajs日历模板
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功