EasyManua.ls Logo

IBM DS8880 Series User Manual

IBM DS8880 Series
244 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
IBM DS8880
Version 8 Release 5
Introduction and Planning Guide
GC27-8525-16
IBM

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the IBM DS8880 Series and is the answer not in the manual?

IBM DS8880 Series Specifications

General IconGeneral
BrandIBM
ModelDS8880 Series
CategoryStorage
LanguageEnglish

Summary

Chapter 1. Overview

Hardware

Explains the architecture and components of the DS8000 series.

Logical configuration

Explains concepts and sequence for configuring storage.

RAID implementation

Describes how RAID improves data reliability and performance.

Management interfaces

Lists various interfaces for managing the storage system.

Chapter 2. Hardware features

Host attachment overview

Explains how to connect hosts for storage capacity and workloads.

Physical and effective capacity

Information to calculate physical and effective capacity.

I/O adapter features

Details the selection of I/O adapter features for the storage system.

Chapter 3. Data management features

Transparent cloud tiering

Enables volume data transfer to cloud storage.

IBM Easy Tier

Increases system performance by placing data on faster storage.

Copy Services

Implements storage solutions for data duplication, migration, and disaster recovery.

Securing data

Manages data secrecy using encryption features.

Chapter 4. Planning the physical configuration

Chapter 5. Planning use of licensed functions

Base Function license

Provides essential functions for the storage system and is required.

Copy Services license

Implements storage solutions for data duplication, migration, and disaster recovery.

Chapter 6. Delivery and installation requirements

Chapter 7. Planning your storage complex setup

Chapter 8. Planning data migration

Chapter 9. Planning for security

Planning for data encryption

Supports data encryption using IBM Security Key Lifecycle Manager.

Chapter 10. License activation and management

Activation of licensed functions

First step after installation is to activate licensed functions.

Related product manuals