{"id":346939,"date":"2024-10-20T00:23:37","date_gmt":"2024-10-20T00:23:37","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-24775-22014\/"},"modified":"2024-10-25T23:52:04","modified_gmt":"2024-10-25T23:52:04","slug":"bs-iso-iec-24775-22014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-24775-22014\/","title":{"rendered":"BS ISO\/IEC 24775-2:2014"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\nCONTENTS <\/td>\n<\/tr>\n
19<\/td>\nFOREWORD <\/td>\n<\/tr>\n
21<\/td>\nIntroduction <\/td>\n<\/tr>\n
23<\/td>\n1 Scope <\/td>\n<\/tr>\n
24<\/td>\n2 Normative references <\/td>\n<\/tr>\n
26<\/td>\n3 Terms, definitions, symbols, abbreviations, and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n
33<\/td>\n3.2 Acronyms and abbreviations <\/td>\n<\/tr>\n
34<\/td>\n3.3 Keywords <\/td>\n<\/tr>\n
35<\/td>\n3.4 Conventions <\/td>\n<\/tr>\n
36<\/td>\n4 Typographical Conventions
4.1 Maturity Model
4.2 Experimental Maturity Level
4.3 Implemented Maturity Level
Figures
Figure 1 \u2013 Experimental Maturity Level Tag <\/td>\n<\/tr>\n
37<\/td>\n4.4 Stable Maturity Level
4.5 Finalized Maturity Level
4.6 Deprecated Material
Figure 2 \u2013 Implemented Maturity Level Tag
Figure 3 \u2013 Stable Maturity Level Tag <\/td>\n<\/tr>\n
38<\/td>\nFigure 4 \u2013 Deprecated Tag <\/td>\n<\/tr>\n
39<\/td>\n5 Transport and reference model
5.1 Introduction to transport and reference model
5.1.1 Overview
5.1.2 Language requirements
5.1.3 Communications requirements
5.1.4 XML Message Syntax and Semantics
5.2 Transport Stack <\/td>\n<\/tr>\n
40<\/td>\nFigure 5 \u2013 Transport Stack <\/td>\n<\/tr>\n
41<\/td>\n5.3 Reference model
5.3.1 Overview
5.3.2 Roles for Interface Constituents
Figure 6 \u2013 Reference Model <\/td>\n<\/tr>\n
42<\/td>\n5.3.3 Cascaded Agents <\/td>\n<\/tr>\n
43<\/td>\n6 Health and Fault Management
6.1 Objectives
6.2 Overview
6.3 General concepts <\/td>\n<\/tr>\n
44<\/td>\n6.4 Description of Health and Fault Management
6.4.1 General
6.4.2 Operational Status and Health State (Polling)
Figure 7 \u2013 Basic Fault Detection
Tables
Table 1 \u2013 OperationalStatus for Disk Drive <\/td>\n<\/tr>\n
45<\/td>\n6.4.3 Standard Errors and Events
6.4.4 Error and Alert indications
6.4.5 Indications
6.4.6 Event Correlation and Fault Containment <\/td>\n<\/tr>\n
47<\/td>\nFigure 8 \u2013 Health lifecycle <\/td>\n<\/tr>\n
48<\/td>\n6.4.7 Fault regions
Figure 9 \u2013 Continuum <\/td>\n<\/tr>\n
49<\/td>\nFigure 10 \u2013 Application Fault Region <\/td>\n<\/tr>\n
50<\/td>\n6.4.8 Examples
Figure 11 \u2013 Array Instance <\/td>\n<\/tr>\n
52<\/td>\nFigure 12 \u2013 Switch Example <\/td>\n<\/tr>\n
54<\/td>\n7 Object Model General Information
7.1 Model overview (Key resources)
7.1.1 Overview
7.1.2 Introduction to CIM UML notation
Figure 13 \u2013 Lines that Connect Classes <\/td>\n<\/tr>\n
55<\/td>\n7.2 Techniques
7.2.1 CIM fundamentals <\/td>\n<\/tr>\n
57<\/td>\n7.2.2 Modeling profiles
7.2.3 CIM Naming <\/td>\n<\/tr>\n
58<\/td>\n8 Correlatable and durable names
8.1 Overview <\/td>\n<\/tr>\n
59<\/td>\n8.2 Guidelines for SCSI Logical Unit Names
8.3 Guidelines for FC-SB-2 device names <\/td>\n<\/tr>\n
60<\/td>\n8.4 Guidelines for port names
8.5 Guidelines for storage system names <\/td>\n<\/tr>\n
61<\/td>\n8.6 Standard formats for correlatable names
8.6.1 General
8.6.2 Standard formats for Logical Unit names
Table 2 \u2013 Standard formats for StorageVolume names <\/td>\n<\/tr>\n
63<\/td>\n8.6.3 Standard formats for port names
8.6.4 Standard formats for fabric names
8.6.5 Standard formats for storage system names
Table 3 \u2013 Standard formats for port names <\/td>\n<\/tr>\n
64<\/td>\nTable 4 \u2013 Standard formats for storage system names <\/td>\n<\/tr>\n
65<\/td>\n8.6.6 Operating system device names <\/td>\n<\/tr>\n
66<\/td>\nTable 5 \u2013 Standard operating system names for tape devices
Table 6 \u2013 LogicalDisk.Name for disk partitions
Table 7 \u2013 GenericDiskParittion.Name for disk partitions <\/td>\n<\/tr>\n
67<\/td>\n8.6.7 Case sensitivity
8.7 Testing equality of correlatable names
8.8 iSCSI names
Table 8 \u2013 Standard operating system names for unpartitioned disks <\/td>\n<\/tr>\n
68<\/td>\nFigure 14 \u2013 iSCSI Qualified Names (iqn) examples
Figure 15 \u2013 iSCSI EUI Name example
Figure 16 \u2013 iSCSI 64-bit NAA Name example
Figure 17 \u2013 iSCSI 128-bit NAA Name example <\/td>\n<\/tr>\n
69<\/td>\n9 Standard Messages
9.1 Overview
9.2 Required characteristics of Standard Messages
9.2.1 Declaring and producing Standard Messages <\/td>\n<\/tr>\n
70<\/td>\nTable 9 \u2013 Example Standard Message Declaration <\/td>\n<\/tr>\n
71<\/td>\n9.3 Message registry
9.3.1 Common Element Messages
Table 10 \u2013 Example Standard Message Values
Table 11 \u2013 Redundancy Message Arguments <\/td>\n<\/tr>\n
72<\/td>\nTable 12 \u2013 Redundancy Alert Information
Table 13 \u2013 Environmental Message Arguments <\/td>\n<\/tr>\n
73<\/td>\nTable 14 \u2013 Environmental Alert Information
Table 15 \u2013 FRU Operation Message Arguments
Table 16 \u2013 FRU Operation Alert Information <\/td>\n<\/tr>\n
74<\/td>\nTable 17 \u2013 Password change Message Arguments
Table 18 \u2013 Password change Alert Information
Table 19 \u2013 User or Account Operation Message Arguments <\/td>\n<\/tr>\n
75<\/td>\nTable 20 \u2013 User or Account Operation Alert Information
Table 21 \u2013 User Login Message Arguments
Table 22 \u2013 User Login Alert Information <\/td>\n<\/tr>\n
76<\/td>\nTable 23 \u2013 Proxy Agent Device Communication Message Arguments
Table 24 \u2013 Proxy Agent Device Communication Alert Information
Table 25 \u2013 Port Status Changed Message Arguments <\/td>\n<\/tr>\n
77<\/td>\nTable 26 \u2013 Port Status Changed Alert Information
Table 27 \u2013 Datacheck Error Message Arguments
Table 28 \u2013 Datacheck Error Alert Information <\/td>\n<\/tr>\n
78<\/td>\nTable 29 \u2013 User Login Failure Message Arguments
Table 30 \u2013 User Login Failure Alert Information
Table 31 \u2013 Drive not responding Message Arguments <\/td>\n<\/tr>\n
79<\/td>\nTable 32 \u2013 Drive not responding Alert Information
Table 33 \u2013 Cooling Fan Failure Alert Information
Table 34 \u2013 Power Supply Failure Alert Information <\/td>\n<\/tr>\n
80<\/td>\nTable 35 \u2013 Drive Power Consumption Alert Information
Table 36 \u2013 Drive Voltage Alert Information
Table 37 \u2013 Predictive Failure Alert Information <\/td>\n<\/tr>\n
81<\/td>\n9.3.2 Common Protocol Messages
Table 38 \u2013 Diagnostics Required Alert Information
Table 39 \u2013 Authorization Failure Message Arguments
Table 40 \u2013 Error Properties for Authorization Failure <\/td>\n<\/tr>\n
82<\/td>\nTable 41 \u2013 Operation Not Supported Message Arguments
Table 42 \u2013 Property Not Found Message Arguments <\/td>\n<\/tr>\n
83<\/td>\nTable 43 \u2013 Invalid Query Message Arguments
Table 44 \u2013 Parameter Error Message Arguments
Table 45 \u2013 Error Properties for Parameter Error <\/td>\n<\/tr>\n
84<\/td>\nTable 46 \u2013 Query Syntax Error Message Arguments
Table 47 \u2013 Error Properties for Query Syntax Error
Table 48 \u2013 Query Too Expensive Message Arguments
Table 49 \u2013 Error Properties for Query Too Expensive <\/td>\n<\/tr>\n
85<\/td>\nTable 50 \u2013 Class or Property Invalid in Query Message Arguments
Table 51 \u2013 Error Properties for Class or Property Invalid in Query
Table 52 \u2013 Invalid Join in Query Message Arguments <\/td>\n<\/tr>\n
86<\/td>\nTable 53 \u2013 Error Properties for Invalid Join in Query
Table 54 \u2013 Unexpected Hardware Fault Message Arguments
Table 55 \u2013 Error Properties for Unexpected Hardware Fault
Table 56 \u2013 Too busy to respond Message Arguments <\/td>\n<\/tr>\n
87<\/td>\nTable 57 \u2013 Shutdown Started Message Arguments
Table 58 \u2013 Shutdown Started Alert Information
Table 59 \u2013 Component overheat Message Arguments
Table 60 \u2013 Error Properties for Component overheat <\/td>\n<\/tr>\n
88<\/td>\nTable 61 \u2013 Component overheat Alert Information
Table 62 \u2013 Device Failover Message Arguments
Table 63 \u2013 Functionality is not licensed Message Arguments
Table 64 \u2013 Error Properties for Functionality is not licensed <\/td>\n<\/tr>\n
89<\/td>\nTable 65 \u2013 Invalid Property Combination during instance creation or modification Message Arguments
Table 66 \u2013 Error Properties for Invalid Property Combination during instance creation or modification <\/td>\n<\/tr>\n
90<\/td>\nTable 67 \u2013 Property Not Found Message Arguments
Table 68 \u2013 Error Properties for Property Not Found
Table 69 \u2013 Proxy Can Not Connect Message Arguments
Table 70 \u2013 Error Properties for Proxy Can Not Connect <\/td>\n<\/tr>\n
91<\/td>\n9.3.3 Storage Messages
Table 71 \u2013 Not Enough Memory Message Arguments
Table 72 \u2013 Error Properties for Not Enough Memory
Table 73 \u2013 Error Properties for Object Already Exists <\/td>\n<\/tr>\n
92<\/td>\nTable 74 \u2013 Device Not ready Message Arguments
Table 75 \u2013 Error Properties for Device Not ready
Table 76 \u2013 Error Properties for Internal Bus Error <\/td>\n<\/tr>\n
93<\/td>\nTable 77 \u2013 Error Properties for DMA Overflow
Table 78 \u2013 Error Properties for Firmware Logic Error
Table 79 \u2013 Front End Port Error Message Arguments
Table 80 \u2013 Front End Port Error Alert Information <\/td>\n<\/tr>\n
94<\/td>\nTable 81 \u2013 Back End Port Error Message Arguments
Table 82 \u2013 Back End Port Error Alert Information
Table 83 \u2013 Remote Mirror Error Message Arguments
Table 84 \u2013 Error Properties for Remote Mirror Error <\/td>\n<\/tr>\n
95<\/td>\nTable 85 \u2013 Remote Mirror Error Alert Information
Table 86 \u2013 Error Properties for Cache Memory Error
Table 87 \u2013 Error Properties for Unable to Access Remote Device <\/td>\n<\/tr>\n
96<\/td>\nTable 88 \u2013 Error Reading Data Alert Information
Table 89 \u2013 Error Writing Data Alert Information
Table 90 \u2013 Error Validating Write (CRC) Alert Information <\/td>\n<\/tr>\n
97<\/td>\nTable 91 \u2013 Error Properties for Copy Operation Failed
Table 92 \u2013 Error Properties for RAID Operation Failed
Table 93 \u2013 Error Properties for Invalid RAID Type <\/td>\n<\/tr>\n
98<\/td>\nTable 94 \u2013 Error Properties for Invalid Storage Element Type
Table 95 \u2013 Error Properties for Configuration Change Failed
Table 96 \u2013 Error Properties for Buffer Overrun <\/td>\n<\/tr>\n
99<\/td>\nTable 97 \u2013 Stolen Capacity Message Arguments
Table 98 \u2013 Error Properties for Stolen Capacity
Table 99 \u2013 Invalid Extent passed Message Arguments
Table 100 \u2013 Error Properties for Invalid Extent passed <\/td>\n<\/tr>\n
100<\/td>\nTable 101 \u2013 Error Properties for Invalid Deletion Attempted
Table 102 \u2013 Error Properties for Job Failed to Start
Table 103 \u2013 Job was Halted Message Arguments <\/td>\n<\/tr>\n
101<\/td>\nTable 104 \u2013 Invalid State Transition Message Arguments
Table 105 \u2013 Error Properties for Invalid State Transition
Table 106 \u2013 Invalid SAP for Method Message Arguments
Table 107 \u2013 Error Properties for Invalid SAP for Method <\/td>\n<\/tr>\n
102<\/td>\nTable 108 \u2013 Resource Not Available Message Arguments
Table 109 \u2013 Error Properties for Resource Not Available
Table 110 \u2013 Resource Limit Exceeded Message Arguments <\/td>\n<\/tr>\n
103<\/td>\nTable 111 \u2013 Error Properties for Resource Limit Exceeded
Table 112 \u2013 Thin Provision Capacity Warning Message Arguments
Table 113 \u2013 Thin Provision Capacity Warning Alert Information <\/td>\n<\/tr>\n
104<\/td>\nTable 114 \u2013 Thin Provision Capacity Critical Message Arguments
Table 115 \u2013 Thin Provision Capacity Critical Alert Information
Table 116 \u2013 Thin Provision Capacity Okay Message Arguments
Table 117 \u2013 Thin Provision Capacity Okay Alert Information <\/td>\n<\/tr>\n
105<\/td>\n9.3.4 Fabric Messages
Table 118 \u2013 Masking Group Membership Changed Message Arguments
Table 119 \u2013 Masking Group Membership Changed Alert Information
Table 120 \u2013 Zone Database Changed Message Arguments <\/td>\n<\/tr>\n
106<\/td>\nTable 121 \u2013 Zone Database Changed Alert Information
Table 122 \u2013 ZoneSet Activated Message Arguments
Table 123 \u2013 ZoneSet Activated Alert Information
Table 124 \u2013 Error Properties for Session Locked <\/td>\n<\/tr>\n
107<\/td>\nTable 125 \u2013 Error Properties for Session Aborted
Table 126 \u2013 Switch Status Changed Message Arguments
Table 127 \u2013 Switch Status Changed Alert Information <\/td>\n<\/tr>\n
108<\/td>\nTable 128 \u2013 Fabric Merge\/Segmentation Message Arguments
Table 129 \u2013 Fabric Merge\/Segmentation Alert Information
Table 130 \u2013 Switch Added\/Removed Message Arguments <\/td>\n<\/tr>\n
109<\/td>\nTable 131 \u2013 Switch Added\/Removed Alert Information
Table 132 \u2013 Fabric Added\/Removed Message Arguments
Table 133 \u2013 Fabric Added\/Removed Alert Information
Table 134 \u2013 Security Policy change Message Arguments <\/td>\n<\/tr>\n
110<\/td>\n9.3.5 Host Messages
Table 135 \u2013 Security Policy change Alert Information
Table 136 \u2013 Required Firmware Version Message Arguments
Table 137 \u2013 Required Firmware Version Alert Information <\/td>\n<\/tr>\n
111<\/td>\nTable 138 \u2013 Rec om ended Firmware Version Message Arguments
Table 139 \u2013 Rec om ended Firmware Version Alert Information
Table 140 \u2013 Controller OK Message Arguments
Table 141 \u2013 Controller OK Alert Information
Table 142 \u2013 Controller not OK Message Arguments <\/td>\n<\/tr>\n
112<\/td>\n9.3.6 Media Library Messages
Table 143 \u2013 Controller not OK Alert Information
Table 144 \u2013 Bus rescan complete Alert Information
Table 145 \u2013 Disk initialize Failed Message Arguments
Table 146 \u2013 Disk initialize Failed Alert Information <\/td>\n<\/tr>\n
113<\/td>\nTable 147 \u2013 Read Warning Alert Information
Table 148 \u2013 Write Warning Alert Information
Table 149 \u2013 Hard Error Alert Information <\/td>\n<\/tr>\n
114<\/td>\nTable 150 \u2013 Media Alert Information
Table 151 \u2013 Read Failure Alert Information
Table 152 \u2013 Write Failure Alert Information <\/td>\n<\/tr>\n
115<\/td>\nTable 153 \u2013 Media Life Alert Information
Table 154 \u2013 Not Data Grade Alert Information
Table 155 \u2013 Write Protect Alert Information <\/td>\n<\/tr>\n
116<\/td>\nTable 156 \u2013 No Removal Alert Information
Table 157 \u2013 Cleaning Media Alert Information
Table 158 \u2013 Unsupported Format Alert Information <\/td>\n<\/tr>\n
117<\/td>\nTable 159 \u2013 Recoverable Snapped Tape Alert Information
Table 160 \u2013 Unrecoverable Snapped Tape Alert Information
Table 161 \u2013 Memory Chip In Cartridge Failure Alert Information <\/td>\n<\/tr>\n
118<\/td>\nTable 162 \u2013 Forced Eject Alert Information
Table 163 \u2013 Read Only Format Alert Information
Table 164 \u2013 Directory Corrupted On Load Alert Information <\/td>\n<\/tr>\n
119<\/td>\nTable 165 \u2013 Nearing Media Life Alert Information
Table 166 \u2013 Clean Now Alert Information
Table 167 \u2013 Clean Periodic Alert Information <\/td>\n<\/tr>\n
120<\/td>\nTable 168 \u2013 Expired Cleaning Media Alert Information
Table 169 \u2013 Invalid Cleaning Media Alert Information
Table 170 \u2013 Retention Requested Alert Information <\/td>\n<\/tr>\n
121<\/td>\nTable 171 \u2013 Dual-Port Interface Error Alert Information
Table 172 \u2013 Drive Maintenance Alert Information
Table 173 \u2013 Hardware A Alert Information <\/td>\n<\/tr>\n
122<\/td>\nTable 174 \u2013 Hardware B Alert Information
Table 175 \u2013 Interface Alert Information
Table 176 \u2013 Eject Media Alert Information <\/td>\n<\/tr>\n
123<\/td>\nTable 177 \u2013 Download Failure Alert Information
Table 178 \u2013 Loader Hardware A Alert Information
Table 179 \u2013 Loader Stray Media Alert Information <\/td>\n<\/tr>\n
124<\/td>\nTable 180 \u2013 Loader Hardware B Alert Information
Table 181 \u2013 Loader Door Alert Information
Table 182 \u2013 Loader Hardware C Alert Information <\/td>\n<\/tr>\n
125<\/td>\nTable 183 \u2013 Loader Magazine Alert Information
Table 184 \u2013 Loader Predictive Failure Alert Information
Table 185 \u2013 Load Statistics Alert Information <\/td>\n<\/tr>\n
126<\/td>\nTable 186 \u2013 Media Directory Invalid at Unload Alert Information
Table 187 \u2013 Media System area Write Failure Alert Information
Table 188 \u2013 Media System Area Read Failure Alert Information <\/td>\n<\/tr>\n
127<\/td>\nTable 189 \u2013 No Start of Data Alert Information
Table 190 \u2013 Loading Failure Alert Information
Table 191 \u2013 Library Hardware A Alert Information <\/td>\n<\/tr>\n
128<\/td>\nTable 192 \u2013 Library Hardware B Alert Information
Table 193 \u2013 Library Hardware C Alert Information
Table 194 \u2013 Library Hardware D Alert Information <\/td>\n<\/tr>\n
129<\/td>\nTable 195 \u2013 Library Diagnostic Required Alert Information
Table 196 \u2013 Library Interface Alert Information
Table 197 \u2013 Failure Prediction Alert Information <\/td>\n<\/tr>\n
130<\/td>\nTable 198 \u2013 Library Maintenance Alert Information
Table 199 \u2013 Library Humidity Limits Alert Information
Table 200 \u2013 Library Voltage Limits Alert Information <\/td>\n<\/tr>\n
131<\/td>\nTable 201 \u2013 Library Stray Media Alert Information
Table 202 \u2013 Library Pick Retry Alert Information
Table 203 \u2013 Library Place Retry Alert Information <\/td>\n<\/tr>\n
132<\/td>\nTable 204 \u2013 Library Load Retry Alert Information
Table 205 \u2013 Library Door Alert Information
Table 206 \u2013 Library Mailslot Alert Information <\/td>\n<\/tr>\n
133<\/td>\nTable 207 \u2013 Library Magazine Alert Information
Table 208 \u2013 Library Security Alert Information
Table 209 \u2013 Library Security Mode Alert Information <\/td>\n<\/tr>\n
134<\/td>\nTable 210 \u2013 Library Offline Alert Information
Table 211 \u2013 Library Drive Offline Alert Information
Table 212 \u2013 Library Scan Retry Alert Information <\/td>\n<\/tr>\n
135<\/td>\nTable 213 \u2013 Library Inventory Alert Information
Table 214 \u2013 Library Illegal Operation Alert Information
Table 215 \u2013 Pass Through Mechanism Failure Alert Information <\/td>\n<\/tr>\n
136<\/td>\nTable 216 \u2013 Cartridge in Pass-through Mechanism Alert Information
Table 217 \u2013 Unreadable barcode Labels Alert Information <\/td>\n<\/tr>\n
137<\/td>\n10 Service discovery
10.1 Objectives
10.2 Overview <\/td>\n<\/tr>\n
139<\/td>\n10.3 SLP Messages <\/td>\n<\/tr>\n
140<\/td>\n10.4 Scopes
Table 218 \u2013 Message Types <\/td>\n<\/tr>\n
141<\/td>\n10.5 Services Definition
10.5.1 General
10.5.2 Service Type
10.5.3 Service Attributes <\/td>\n<\/tr>\n
143<\/td>\n10.6 User Agents (UA) <\/td>\n<\/tr>\n
144<\/td>\n10.7 Service Agents (SAs)
10.8 Directory Agents (DAs)
10.9 Service Agent Server (SA Server)
10.9.1 General Information <\/td>\n<\/tr>\n
145<\/td>\n10.9.2 SA Server (SAS) Implementation
10.9.3 SA Server (SAS) Clients <\/td>\n<\/tr>\n
146<\/td>\n10.9.4 SA Server Configuration
Table 219 \u2013 Required Configuration Properties for SA as DA
Table 220 \u2013 Required Configuration Properties for SA <\/td>\n<\/tr>\n
147<\/td>\n10.9.5 SA Server Discovery
10.9.6 SAS Client Registration
Figure 18 \u2013 SA Server Configuration <\/td>\n<\/tr>\n
148<\/td>\n10.10 Configurations
10.10.1 General
10.10.2 Multicast Configurations
10.10.3 No Multicast configuration
Figure 19 \u2013 Multicast Configuration <\/td>\n<\/tr>\n
149<\/td>\n10.10.4 Multicast Islands
Figure 20 \u2013 No Multicast configuration <\/td>\n<\/tr>\n
150<\/td>\n10.11 \u2018Standard WBEM\u2019 Service Type Templates
Figure 21 \u2013 Multicast Islands <\/td>\n<\/tr>\n
154<\/td>\n11 Information Technology \u2013 Storage Management roles
11.1 Introduction to storage management roles
Figure 22 \u2013 SMI_S Roles <\/td>\n<\/tr>\n
155<\/td>\n11.2 Information Technology \u2013 Storage Management Client
11.2.1 Overview
11.2.2 SLP functions
11.2.3 WBEM protocol functions
11.2.4 Security considerations
11.2.5 Lock management functions
11.3 Dedicated Information Technology \u2013 Storage Management Server
11.3.1 Overview <\/td>\n<\/tr>\n
156<\/td>\n11.3.2 SLP functions
11.3.3 WBEM protocol functions <\/td>\n<\/tr>\n
157<\/td>\n11.3.4 Security considerations
11.3.5 Lock management functions
11.4 General Purpose Information Technology \u2013 Storage Management Server
11.4.1 Overview
11.4.2 SLP functions <\/td>\n<\/tr>\n
158<\/td>\n11.4.3 CIM-XML protocol functions
11.4.4 Lock management functions
11.4.5 Provider Subrole
11.5 Directory Server
11.5.1 General
11.5.2 SLP functions <\/td>\n<\/tr>\n
159<\/td>\n11.5.3 CIM-XML protocol functions
11.5.4 Security considerations
11.5.5 Lock management functions
11.6 Combined roles on a single system
11.6.1 Overview
11.6.2 General Purpose Information Technology \u2013 Storage Management Server as a Profile Aggregator <\/td>\n<\/tr>\n
160<\/td>\n12 Installation and upgrade
12.1 Overview
12.2 Role of the administrator
12.3 Goals
12.3.1 Non-disruptive installation and De-installation
12.3.2 Plug-and-Play <\/td>\n<\/tr>\n
161<\/td>\n12.4 Server deployment
12.4.1 General
12.4.2 Controlled environment
12.4.3 Multiple CIMOM systems <\/td>\n<\/tr>\n
162<\/td>\n12.4.4 Shared CIMOM <\/td>\n<\/tr>\n
163<\/td>\n12.4.5 Uninstallation
12.4.6 Update
12.4.7 Reconfiguration
12.5 WBEM service support and related functions
12.5.1 Installation <\/td>\n<\/tr>\n
164<\/td>\n12.5.2 Multiple CIM Servers on a Single Server System
12.5.3 Uninstallation\/Upgrade
12.5.4 Reconfiguration
12.5.5 Failure
12.6 Client
12.6.1 Uninstallation
12.6.2 Reconfiguration
12.7 Directory Service
12.7.1 Installation <\/td>\n<\/tr>\n
165<\/td>\n12.7.2 Uninstallation\/Failure
12.8 Issues with Discovery mechanisms <\/td>\n<\/tr>\n
166<\/td>\n13 Security
13.1 Objectives
13.2 Overview
13.2.1 General <\/td>\n<\/tr>\n
167<\/td>\n13.2.2 General requirements for HTTP implementations <\/td>\n<\/tr>\n
168<\/td>\n13.3 Description of SMI-S Security
13.3.1 General
13.3.2 Transport security <\/td>\n<\/tr>\n
169<\/td>\n13.3.3 SSL 3.0 and TLS <\/td>\n<\/tr>\n
173<\/td>\n13.3.4 Authentication <\/td>\n<\/tr>\n
174<\/td>\n13.3.5 Indications <\/td>\n<\/tr>\n
175<\/td>\n13.3.6 Service Discovery <\/td>\n<\/tr>\n
176<\/td>\n13.3.7 HTTP Realms <\/td>\n<\/tr>\n
177<\/td>\n13.4 Security Guidance
13.4.1 SSL 3.0 and TLS guidance <\/td>\n<\/tr>\n
178<\/td>\n13.4.2 Authentication guidance <\/td>\n<\/tr>\n
182<\/td>\n13.4.3 Authorization <\/td>\n<\/tr>\n
183<\/td>\nTable 221 \u2013 ACL for File “XYZ” <\/td>\n<\/tr>\n
184<\/td>\n13.4.4 Using IT Infrastructure Securely \u2013 Service Discovery <\/td>\n<\/tr>\n
185<\/td>\nAnnex A
A.1 Purpose of this annex
A.2 CIM-to-MIB mapping overview
A.3 The SML MIB <\/td>\n<\/tr>\n
187<\/td>\nAnnex B
B.1 Compliance statement
B.2 How compliance of the architecture is declared
B.3 How compliance of the model is declared
B.4 The Server Profile and compliance
B.4.1 General
B.4.2 Example <\/td>\n<\/tr>\n
188<\/td>\nB.5 Backward compatibility
B.5.1 General <\/td>\n<\/tr>\n
189<\/td>\nB.5.2 Overview
Figure B.1 \u2013 Provider migration <\/td>\n<\/tr>\n
190<\/td>\nB.5.3 Requirements <\/td>\n<\/tr>\n
191<\/td>\nB.5.4 Implementation considerations
B.6 Rules for combining (autonomous) profiles
B.6.1 General
B.6.2 Backward Compatibility Rules for combining profiles <\/td>\n<\/tr>\n
192<\/td>\nB.6.3 Conditions for a new profile
B.7 Rules for vendor extensions
B.7.1 General
B.7.2 Objectives for vendor extension rules <\/td>\n<\/tr>\n
193<\/td>\nB.7.3 Vendor extensions and compliance rules
B.7.4 Vendor extensions and backward compatibility rules <\/td>\n<\/tr>\n
194<\/td>\nB.7.5 Vendor extensions and SMI-S Nullification
B.7.6 Vendor Extensions that Avoid Client Confusion <\/td>\n<\/tr>\n
196<\/td>\nAnnex C
C.1 Overview
C.2 Instance creation
C.2.1 Filter string
C.2.2 Semantics
C.3 Instance deletion
C.3.1 Filter string
C.3.2 Semantics
C.4 Modification of any value in an array property
C.4.1 WQL string <\/td>\n<\/tr>\n
197<\/td>\nC.4.2 CQL string
C.4.3 Semantics
C.5 Modification to either of two specific values in an array property
C.5.1 WQL string
C.5.2 CQL string
C.5.3 Semantics
C.6 Alert
C.6.1 Filter string
C.6.2 Semantic <\/td>\n<\/tr>\n
198<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Storage management – Common architecture<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2014<\/td>\n202<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":346943,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-346939","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/346939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/346943"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=346939"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=346939"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=346939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}