{"id":372672,"date":"2024-10-20T02:30:26","date_gmt":"2024-10-20T02:30:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-24775-72021\/"},"modified":"2024-10-26T04:22:32","modified_gmt":"2024-10-26T04:22:32","slug":"bs-iso-iec-24775-72021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-24775-72021\/","title":{"rendered":"BS ISO\/IEC 24775-7:2021"},"content":{"rendered":"
The host-base storage portion of the Storage Management Technical Specification defines management profiles for autonomous, component and abstract profiles for management of host-based storage devices. The autonomous profiles describe the management of a stand-alone host-based storage entity. The component profiles describe management of aspects of host-based storage entities that may be used by other autonomous profiles. Finally, this section describes abstract profiles that may be used as a basis for creating additional Host-based autonomous profiles.<\/p>\n
This version of the Host-based Storage portion of the Storage Management Technical Specification includes autonomous profiles:<\/p>\n
The Host Discovered Resources Profile<\/p>\n
This profile defines the model for the storage devices presented to an operating system running on a host computer system. In addition, this profile describes the map of storage associated to a host-computer system that a client application can discover.<\/p>\n<\/li>\n
“The Fibre Channel HBA Profile<\/p>\n
This profile defines the model and functions of a Fibre Channel HBA that exports block storage to a host computer system from a SAN device (Fibre Channel switch, array, tape library, etc.).<\/p>\n<\/li>\n
iSCSI Initiator Profile<\/p>\n<\/li>\n<\/ul>\n
This profile defines the model and functions necessary to manage an iSCSI initiator.<\/p>\n
Component profiles used by autonomous profiles to describe aspects of host-based storage elements and services. The component profiles defined in this version of the specification include:<\/p>\n
Host Hardware RAID Controller Profile<\/p>\n
This profile defines the model and functions of a host-based RAID controller that exports block storage to a host computer system from locally attached storage devices (internal hard drives, JBODs, etc.)<\/p>\n<\/li>\n
Storage HBA Profile<\/p>\n
This profile defines the model and functions of a SAS, SATA, SPI, or Fibre Channel HBA that exports storage to a host computer system from a SAN device (Fibre Channel switch, array, tape library, etc.).<\/p>\n<\/li>\n
Disk Partition Profile<\/p>\n
The Disk Partition profile models partition (or slice) configuration services provided by operating systems on some platforms.<\/p>\n<\/li>\n
SB Multipath Management Profile<\/p>\n
The SB Multipath Management Profile models paths (connections between host controllers and device ports) for environments supporting the SB (Single Byte) command protocol.<\/p>\n<\/li>\n
SCSI Multipath Management Profile<\/p>\n<\/li>\n<\/ul>\n
The SCSI Multipath Management profile models paths (connections between host controllers, device ports, and logical units) for environments supporting the SCSI command protocol.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | List of Figures <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | List of Tables <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 2 Normative References 2.1 Overview 2.2 Approved references 2.3 References under development <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 3 Terms, Definitions, Symbols, Abbreviations, and Conventions 3.1 General 3.2 Terms and Definitions <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4 Disk Partition Profile 4.1 Description 4.1.1 Synopsis 4.1.2 Overview <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 4.1.3 Background on X86 MBR Partitions <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 4.2 Health and Fault Management Considerations <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 4.3 Supported Profiles and Packages 4.4 Methods of the Profile 4.4.1 SetPartitionStyle 4.4.2 CreateOrModifyPartition <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 4.5 Client Considerations and Recipes 4.5.1 Client Considerations 4.5.2 Recipes 4.6 CIM Elements 4.6.1 Overview <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 4.6.2 CIM_BasedOn (Partition to Extent) <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 4.6.3 CIM_BasedOn (Partition to Partition) 4.6.4 CIM_DiskPartition 4.6.5 CIM_DiskPartitionConfigurationCapabilities <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 4.6.6 CIM_DiskPartitionConfigurationService 4.6.7 CIM_ElementCapabilities <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 4.6.8 CIM_ElementConformsToProfile (DiskPartitionConfigurationService to Disk Partition RegisteredProfile) 4.6.9 CIM_GPTDiskPartition <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 4.6.10 CIM_GenericDiskPartition 4.6.11 CIM_HostedService 4.6.12 CIM_InstalledPartitionTable (Capabilities to Extent) <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 4.6.13 CIM_InstalledPartitionTable (Capabilities to Partition) 4.6.14 CIM_LogicalDisk <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 4.6.15 CIM_LogicalDiskBasedOnPartition (LogicalDisk to Partition) 4.6.16 CIM_StorageExtent <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 4.6.17 CIM_SystemDevice (System to Extent) 4.6.18 CIM_SystemDevice (System to LogicalDisk) 4.6.19 CIM_SystemDevice (System to Partition) 4.6.20 CIM_VTOCDiskPartition <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 5 FC HBA Profile <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 6 Storage HBA Profile 6.1 Synopsis 6.2 Description 6.3 Implementation 6.3.1 Health and Fault Management Consideration <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.3.2 Cascading Considerations 6.3.3 Storage HBA Model Overview 6.3.4 CIM_ComputerSystem 6.3.5 Profile Registration Profile <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.3.6 Generic Initiator Ports Profile <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.3.7 Software Inventory Profile <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 6.3.8 Software Update Profile 6.3.9 HBA Hot Swap Events 6.3.10 Physical Asset Profile <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 6.3.11 Modeling Attached Disk, Tape, and Optical Drives 6.3.12 Virtual System Considerations 6.3.13 Fibre Channel HBAs <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 6.3.14 FC HBA Diagnostics Profile 6.4 Methods of the Profile 6.4.1 Overview 6.4.2 Profile Conventions for Operations <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 6.5 Use Cases 6.6 CIM Elements 6.6.1 Overview <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 6.6.2 CIM_ControlledBy 6.6.3 CIM_PortController <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 6.6.4 CIM_Product 6.6.5 CIM_ProductElementComponent 6.6.6 CIM_Realizes <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 6.6.7 CIM_SystemDevice <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 7 Host Discovered Resources Profile 7.1 Description 7.1.1 Synopsis 7.1.2 Overview <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 7.1.3 Host Disk Extent Class Name Conventions 7.1.4 Discovered Hardware Resources <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 7.2 Health and Fault Management Considerations 7.3 Cascading Considerations 7.4 Extrinsic Methods of the Profile <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 7.5 Use Cases 7.6 CIM Elements 7.6.1 Overview <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 7.6.2 CIM_ATAInitiatorTargetLogicalUnitPath <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 7.6.3 CIM_ATAProtocolEndpoint 7.6.4 CIM_ElementConformsToProfile (LogicalDevice to Host Discovered Resources RegisteredProfile) 7.6.5 CIM_HostedAccessPoint <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 7.6.6 CIM_LogicalDevice (LogicalDevice) 7.6.7 CIM_LogicalDisk (LogicalDevice) <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 7.6.8 CIM_SCSIArbitraryLogicalUnit (LogicalDevice) 7.6.9 CIM_SCSIInitiatorTargetLogicalUnitPath <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 7.6.10 CIM_SCSIProtocolEndpoint 7.6.11 CIM_StorageExtent (LogicalDevice) <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 7.6.12 CIM_SystemDevice 7.6.13 CIM_TapeDrive (LogicalDevice) <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 7.6.14 CIM_SBInitiatorTargetLogicalUnitPath 7.6.15 CIM_SBProtocolEndpoint <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 8 Host Hardware RAID Controller Profile 8.1 Synopsis <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 8.2 Description 8.3 Implementation 8.3.1 Relationship to autonomous profiles <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 8.3.2 CIM_PortController 8.3.3 CIM_ComputerSystem <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 8.3.4 CIM_AlarmDevice 8.3.5 Server Profile 8.3.6 Profile Registration <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 8.3.7 Profile Discovery and Advertisement 8.3.8 Physical Asset Profile <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 8.3.9 Storage Enclosure Profile 8.3.10 Implementation of Block Services Package <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 8.3.11 Implementation of DAPort and SCSIProtocolController <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 8.3.12 Implementation of Software Inventory Profile <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 8.3.13 Implementation of Initiator Ports Profiles <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 8.3.14 Models for Imported Storage <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 8.3.15 Implementation of Extent Composition Profile 8.3.16 Disk Sparing <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 8.3.17 Multi-function controllers <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 8.3.18 Health and Fault Management Consideration 8.3.19 Cascading Considerations <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 8.4 Methods 8.4.1 Extrinsic Methods of the Profile 8.4.2 Intrinsic Methods of this Profile 8.5 Use Cases 8.6 CIM Elements 8.6.1 Overview <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 8.6.2 CIM_AlarmDevice 8.6.3 CIM_AssociatedAlarm <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 8.6.4 CIM_ComputerSystem (Host Hardware RAID Controller) 8.6.5 CIM_ComputerSystemPackage (Associates PhysicalPackage to ComputerSystem) 8.6.6 CIM_ControlledBy <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 8.6.7 CIM_ElementCapabilities (ImplementationCapabilities to System) 8.6.8 CIM_ImplementationCapabilities (ImplementationCapabilities) <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 8.6.9 CIM_LogicalIdentity 8.6.10 CIM_MediaAccessDevice <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 8.6.11 CIM_PortController 8.6.12 CIM_Product <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 8.6.13 CIM_ProductPhysicalComponent 8.6.14 CIM_ProtocolControllerForUnit (Extent or MediaAccessDevice) <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 8.6.15 CIM_ProtocolControllerForUnit (Volume) 8.6.16 CIM_Realizes (Associates PhysicalPackage to PortController) 8.6.17 CIM_SAPAvailableForElement <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 8.6.18 CIM_SCSIProtocolController 8.6.19 CIM_SoftwareIdentity (Driver) <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 8.6.20 CIM_SoftwareIdentity (FCode\/BIOS) 8.6.21 CIM_SoftwareIdentity (Firmware) 8.6.22 CIM_StorageExtent <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 8.6.23 CIM_SystemComponent 8.6.24 CIM_SystemDevice (Associates System to AlarmDevice) <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 8.6.25 CIM_SystemDevice (Associates controller system to PortController) 8.6.26 CIM_SystemDevice (System to SCSIProtocolController) 8.6.27 CIM_ElementSoftwareIdentity (Driver) <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 8.6.28 CIM_ElementSoftwareIdentity (Firmware or FCode\/BIOS) <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 9 iSCSI Initiator Profile 9.1 Description 9.1.1 Synopsis 9.1.2 Overview <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 9.1.3 Sessions and Connections <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 9.1.4 Durable Names and Correlatable IDs of the Profile 9.2 Health and Fault Management Considerations 9.3 Methods of the Profile 9.4 Use Cases <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 9.5 CIM Elements 9.5.1 Overview <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 9.5.2 CIM_BindsTo (TCPProtocolEndpoint to IPProtocolEndpoint) 9.5.3 CIM_BindsTo (iSCSIProtocolEndpoint to TCPProtocolEndpoint) 9.5.4 CIM_ComputerSystem <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 9.5.5 CIM_ControlledBy 9.5.6 CIM_DeviceSAPImplementation (EthernetPort to IPProtocolEndpoint) 9.5.7 CIM_DeviceSAPImplementation (EthernetPort to iSCSIProtocolEndpoint) <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 9.5.8 CIM_ElementSoftwareIdentity 9.5.9 CIM_EndpointOfNetworkPipe (Between iSCSI Session and iSCSIProtocolENdpoint) 9.5.10 CIM_EndpointOfNetworkPipe (Between iSCSI connection and TCPProtocolEndpoint) <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 9.5.11 CIM_InstalledSoftwareIdentity 9.5.12 CIM_NetworkPipeComposition 9.5.13 CIM_PhysicalPackage <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 9.5.14 CIM_PortController 9.5.15 CIM_Product <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 9.5.16 CIM_ProductPhysicalComponent 9.5.17 CIM_Realizes 9.5.18 CIM_SAPAvailableForElement 9.5.19 CIM_SCSIProtocolController <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 9.5.20 CIM_SoftwareIdentity 9.5.21 CIM_SystemDevice (to EthernetPort) <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 9.5.22 CIM_SystemDevice (to PortController) 9.5.23 CIM_SystemDevice (to ProtocolController) 9.5.24 CIM_iSCSIConnection <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 9.5.25 CIM_iSCSISession <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 10 SCSI Multipath Management Profile 10.1 Description 10.1.1 Synopsis 10.1.2 Overview <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 10.1.3 Asymmetric Multipath Target Devices <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 10.2 Health and Fault Management Considerations 10.3 Methods of the Profile 10.3.1 Implementation Requirements 10.3.2 SCSIPathConfigurationService.SetTPGAccess 10.3.3 SCSIPathConfigurationService.SetLoadBalanceAlgorithm 10.3.4 SCSIPathConfigurationService.AssignLogicalUnitToPortGroup <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 10.3.5 SCSIPathConfigurationService.SetOverridePath 10.3.6 SCSIPathConfigurationService.CancelOverridePath 10.4 Use Cases 10.5 CIM Elements 10.5.1 Overview <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 10.5.2 CIM_ConcreteComponent 10.5.3 CIM_ConcreteDependency 10.5.4 CIM_ElementCapabilities <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 10.5.5 CIM_ElementConformsToProfile (SCSIPathConfigurationService to SCSI Multipath Management RegisteredProfile) 10.5.6 CIM_ElementSettingData 10.5.7 CIM_ElementSoftwareIdentity (Driver) <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 10.5.8 CIM_ElementSoftwareIdentity (MP API Plugin) 10.5.9 CIM_HostedService 10.5.10 CIM_MemberOfCollection <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 10.5.11 CIM_Product 10.5.12 CIM_SCSIMultipathConfigurationCapabilities <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 10.5.13 CIM_SCSIMultipathSettings 10.5.14 CIM_SCSIPathConfigurationService <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 10.5.15 CIM_SCSITargetPortGroup 10.5.16 CIM_ServiceAvailableToElement <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 10.5.17 CIM_SoftwareIdentity (Driver) 10.5.18 CIM_SoftwareIdentity (MP API Plugin) <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 11 SB Multipath Management Profile <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 12 Memory Configuration Profile 12.1 Synopsis 12.2 Description 12.2.1 Overview <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 12.2.2 Class Diagram 12.2.3 MemoryConfigurationService 12.2.4 ResourcePool(Memory) 12.2.5 MemoryConfigurationCapabilities & MemoryCapabilities 12.2.6 MemoryAllocationSettingData 12.2.7 Registered Profile <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 12.2.8 DMTF: Multi-type System Memory Profile 12.3 Implementation 12.3.1 CIM_ResourcePool (memory) 12.3.2 Determining Pool Capacity 12.3.3 CIM_MemoryCapabilities 12.3.4 CIM_MemoryConfigurationService 12.3.5 CIM_MemoryConfigurationCapabilities 12.3.6 CIM_MemoryAllocationSettingData <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 12.3.7 CIM_ElementCapabilities 12.3.8 CIM_ServiceAffectsElement 12.3.9 CIM_ConcreteComponent 12.3.10 CIM_ElementAllocatedFromPool 12.3.11 CIM_HostedService 12.3.12 CIM_ElementSettingData 12.3.13 CIM_ElementConformsToProfile <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 12.4 Methods 12.4.1 Overview 12.4.2 CIM_MemoryConfigurationService <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 12.4.3 CIM_ResourcePool (memory) 12.4.4 CIM_MemoryCapabilities 12.4.5 CIM_MemoryConfigurationCapabilities <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 12.4.6 CIM_MemoryAllocationSettingData 12.4.7 CIM_ElementCapabilities 12.4.8 CIM_ServiceAffectsElement <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 12.4.9 CIM_ConcreteComponent 12.4.10 CIM_ElementAllocatedFromPool 12.4.11 CIM_HostedService 12.4.12 CIM_ElementSettingData <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 12.4.13 CIM_ElementConformsToProfile 12.5 Use Cases 12.5.1 Advertising Profile Conformance 12.5.2 Determine Support for Memory Configuration <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 12.5.3 Determine Support for Memory Features <\/td>\n<\/tr>\n | ||||||
150<\/td>\n | 12.5.4 Determine Available Capacity 12.5.5 Allocate Capacity 12.5.6 Deallocate Capacity 12.5.7 Delete a Pending Request <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 12.6 CIM Elements 12.6.1 Overview 12.6.2 CIM_RegisteredProfile <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 12.6.3 CIM_MemoryConfigurationService 12.6.4 CIM_ResourcePool <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 12.6.5 CIM_MemoryCapabilities 12.6.6 CIM_MemoryConfigurationCapabilities <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 12.6.7 CIM_MemoryAllocationSettingData <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 12.6.8 CIM_ElementSettingData <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 12.6.9 CIM_HostedService 12.6.10 CIM_ElementAllocatedFromPool <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | 12.6.11 CIM_ConcreteComponent 12.6.12 CIM_ElementCapabilities <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 13 Persistent Memory Configuration Profile 13.1 Synopsis 13.2 Overview 13.2.1 Description <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | 13.2.2 Class Hierarchy Overview <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 13.3 Implementation 13.3.2 CIM_PersistentMemoryCapabilities 13.3.3 CIM_PersistentMemoryService 13.3.4 CIM_PersistentConfigurationCapabilities 13.3.5 CIM_PersistentMemoryNamespace 13.3.6 CIM_PersistentMemoryNamespaceSettingData <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 13.3.7 CIM_ElementCapabilities 13.3.8 CIM_ServiceAffectsElement 13.3.9 CIM_ConcreteComponent 13.3.10 CIM_ElementAllocatedFromPool 13.3.11 CIM_HostedService 13.3.12 CIM_ElementSettingData 13.3.13 CIM_ElementConformsToProfile 13.3.14 CIM_SystemDevice 13.4 Methods 13.4.1 CIM_ResourcePool <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 13.4.2 CIM_PersistentMemoryCapabilities 13.4.3 CIM_PersistentMemoryService <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 13.4.4 CIM_PersistentConfigurationCapabilities 13.4.5 CIM_PersistentMemoryNamespace <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | 13.4.6 CIM_PersistentMemoryNamespaceSettingData 13.4.7 CIM_ElementCapabilities <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | 13.4.8 CIM_ServiceAffectsElement 13.4.9 CIM_ConcreteComponent 13.4.10 CIM_ElementAllocatedFromPool 13.4.11 CIM_HostedService <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | 13.4.12 CIM_ElementSettingData 13.4.13 CIM_ElementConformsToProfile 13.4.14 CIM_SystemDevice 13.5 Use Cases 13.5.1 Advertising Profile Conformance <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 13.5.2 Locate Existing Persistent Namespaces 13.5.3 Determine Support for Persistent Memory Features and Operations <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 13.5.4 Determine Availability of Persistent Capacity 13.5.5 Create a Persistent Namespace <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 13.5.6 Deallocate a Persistent Namespace 13.5.7 Modify a Persistent Namespace <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 13.6 CIM Elements 13.6.1 Overview 13.6.2 CIM_RegisteredProfile <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 13.6.3 CIM_ResourcePool 13.6.4 CIM_PersistentMemoryCapabilities <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 13.6.5 CIM_PersistentMemoryService 13.6.6 CIM_PersistentConfigurationCapabilities 13.6.7 CIM_PersistentMemoryNamespace <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 13.6.8 CIM_PersistentMemoryNamespaceSettingData <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 13.6.9 CIM_ElementCapabilities 13.6.10 CIM_ServiceAffectsElement <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | 13.6.11 CIM_ConcreteComponent 13.6.12 CIM_ElementAllocatedFromPool 13.6.13 CIM_HostedService <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | 13.6.14 CIM_ElementSettingData 13.6.15 CIM_ElementConformsToProfile 13.6.16 CIM_SystemDevice <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | 13.6.17 CIM_BasedOn <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | Annex A (informative) SMI-S Information Model <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Annex B (Informative) Host Profile Deployment Guidelines B.1 Introduction B.2 Background – Early SMI-S Host Profiles B.3 Limitations of Monolithic Agents for Host Storage B.4 Shared ComputerSystem Approach <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | B.5 Overview of Host Storage Models B.5.1 Combined Profiles B.5.2 FC HBA Profile <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | B.5.3 Storage HBA Profile B.5.4 Host Hardware RAID Controller Profile <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | B.5.5 Other Host Storage Profiles B.6 Deployment Guidelines B.6.1 Emulating the Monolithic Agent Approach B.6.2 Platform Vendor Supporting Device Partners <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | B.6.3 How to Deploy FC HBA with New Host Profiles B.7 Client Discovery of Host Storage Profiles <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Storage management – Host elements<\/b><\/p>\n |