EasyManua.ls Logo

IBM DS8884 Series User Manual

IBM DS8884 Series
244 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #63 background imageLoading...
Page #63 background image
If your workload is critical, consider isolating it from other workloads. To isolate
the workloads, place the data as follows:
v On separate RAID drive groups. Data for open systems or IBM Z hosts is
automatically placed on separate arrays, which reduce the contention for drive
use.
v On separate device adapters.
v In separate processor nodes, which isolate use of memory buses,
microprocessors, and cache resources. Before you decide, verify that the isolation
of your data to a single node provides adequate data access performance for
your application.
Count key data
In count-key-data (CKD) disk data architecture, the data field stores the user data.
Because data records can be variable in length, in CKD they all have an associated
count field that indicates the user data record size. The key field enables a
hardware search on a key. The commands used in the CKD architecture for
managing the data and the storage devices are called channel command words.
Fixed block
In fixed block (FB) architecture, the data (the logical volumes) are mapped over
fixed-size blocks or sectors.
With an FB architecture, the location of any block can be calculated to retrieve that
block. This architecture uses tracks and cylinders. A physical disk contains multiple
blocks per track, and a cylinder is the group of tracks that exists under the disk
heads at one point in time without performing a seek operation.
T10 DIF support
American National Standards Institute (ANSI) T10 Data Integrity Field (DIF)
standard is supported on IBM Z for SCSI end-to-end data protection on fixed block
(FB) LUN volumes. This support applies to the IBM DS8880 unit (98x models).
IBM Z support applies to FCP channels only.
IBM Z provides added end-to-end data protection between the operating system
and the DS8880 unit. This support adds protection information consisting of CRC
(Cyclic Redundancy Checking), LBA (Logical Block Address), and host application
tags to each sector of FB data on a logical volume.
Data protection using the T10 Data Integrity Field (DIF) on FB volumes includes
the following features:
v Ability to convert logical volume formats between standard and protected
formats supported through PPRC between standard and protected volumes
v Support for earlier versions of T10-protected volumes on the DS8880 with non
T10 DIF-capable hosts
v Allows end-to-end checking at the application level of data stored on FB disks
v Additional metadata stored by the storage facility image (SFI) allows host
adapter-level end-to-end checking data to be stored on FB disks independently
of whether the host uses the DIF format.
Notes:
Chapter 2. Hardware features 51

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the IBM DS8884 Series and is the answer not in the manual?

IBM DS8884 Series Specifications

General IconGeneral
ModelIBM DS8884 Series
Drive TypesSSD, HDD
Power SupplyRedundant Power Supplies
RAID Levels SupportedRAID 5, RAID 6, RAID 10
Host InterfaceFibre Channel, iSCSI, SAS
ControllersDual active-active
Form FactorRack-mountable
Operating System SupportAIX, Linux, Windows
Data EncryptionYes
TypeEnterprise Storage System

Summary

Chapter 1. Overview

Hardware

Describes the three major elements of DS8000 architecture: host adapters, flash RAID adapters, and power servers.

System types

Details the five DS8880 system types with frames: DS8884, DS8884F, DS8886, DS8886F, and DS8888F.

Logical configuration

RAID implementation

Describes RAID methods to improve data storage reliability and performance.

Management interfaces

DS8000 Storage Management GUI

Describes the web-based GUI for configuring, managing, and monitoring storage.

DS command-line interface

Explains the DS CLI for creating, deleting, modifying, and viewing configurations.

Chapter 2. Hardware features

Host attachment overview

Explains how to consolidate storage capacity and workloads for open-systems and IBM Z hosts.

Chapter 3. Data management features

IBM Easy Tier

Optimizes performance by placing frequently accessed data on faster storage tiers.

Copy Services

Features for data duplication, migration, and disaster recovery.

Chapter 4. Planning the physical configuration

Determining physical configuration features

Guidelines for ordering features to customize the storage system.

Physical and effective capacity

Calculations for total physical capacity and effective capacity based on configurations.

I/O adapter features

Covers I/O enclosures, device adapters, host adapters, and related cables.

Configuration rules for I/O adapter features

Specific rules for ordering and configuring I/O adapter features.

Configuration rules for host adapters

Guidelines for ordering and configuring host adapters.

Chapter 5. Planning use of licensed functions

Ordering licensed functions

General steps for purchasing and ordering licensed functions.

Base Function license

Describes the essential license required for each storage system.

Copy Services license

Licensing based on usable volume capacity for Copy Services.

Chapter 6. Delivery and installation requirements

Delivery requirements

Ensures the final installation site meets all delivery requirements.

Meeting floor load requirements

Ensures the installation location meets specified floor load requirements.

Planning for floor and space requirements

Ensures the location meets space and floor requirements.

Planning for power requirements

Details requirements for power outlets, input voltage, and connectors.

Planning for environmental requirements

Ensures the installation environment meets operating requirements.

Planning for safety

Addresses safety considerations including fire suppression and earthquake preparedness.

Chapter 7. Planning your storage complex setup

Chapter 9. Planning for security

Planning for data encryption

Details managing data secrecy and security through encryption.

Chapter 10. License activation and management

Planning your licensed functions

Considers workload increases and use-based licensing for flexibility.

Related product manuals