Do you have a question about the IBM DS8884 Series and is the answer not in the manual?
Model | IBM DS8884 Series |
---|---|
Drive Types | SSD, HDD |
Power Supply | Redundant Power Supplies |
RAID Levels Supported | RAID 5, RAID 6, RAID 10 |
Host Interface | Fibre Channel, iSCSI, SAS |
Controllers | Dual active-active |
Form Factor | Rack-mountable |
Operating System Support | AIX, Linux, Windows |
Data Encryption | Yes |
Type | Enterprise Storage System |
Describes the three major elements of DS8000 architecture: host adapters, flash RAID adapters, and power servers.
Details the five DS8880 system types with frames: DS8884, DS8884F, DS8886, DS8886F, and DS8888F.
Describes RAID methods to improve data storage reliability and performance.
Describes the web-based GUI for configuring, managing, and monitoring storage.
Explains the DS CLI for creating, deleting, modifying, and viewing configurations.
Explains how to consolidate storage capacity and workloads for open-systems and IBM Z hosts.
Optimizes performance by placing frequently accessed data on faster storage tiers.
Features for data duplication, migration, and disaster recovery.
Guidelines for ordering features to customize the storage system.
Calculations for total physical capacity and effective capacity based on configurations.
Covers I/O enclosures, device adapters, host adapters, and related cables.
Specific rules for ordering and configuring I/O adapter features.
Guidelines for ordering and configuring host adapters.
General steps for purchasing and ordering licensed functions.
Describes the essential license required for each storage system.
Licensing based on usable volume capacity for Copy Services.
Ensures the final installation site meets all delivery requirements.
Ensures the installation location meets specified floor load requirements.
Ensures the location meets space and floor requirements.
Details requirements for power outlets, input voltage, and connectors.
Ensures the installation environment meets operating requirements.
Addresses safety considerations including fire suppression and earthquake preparedness.
Details managing data secrecy and security through encryption.
Considers workload increases and use-based licensing for flexibility.