HSG80 ACS Solution Software V8.6 for IBM AIM Installation and Configuration Guide
Table Of Contents
- HSG80 ACS Solution Software Version 8.6 for IBM AIX
- Contents
- Figures
- Tables
- About this Guide
- Chapter 1
- Planning a Subsystem
- Chapter 2
- Planning Storage
- Where to Start
- Configuration Rules
- Device PTL Addressing Convention
- Determining Storage Requirements
- Choosing a Container Type
- Creating a Storageset Profile
- Storageset Planning Considerations
- Storageset Expansion Considerations
- Partition Planning Considerations
- Changing Characteristics through Switches
- Storageset and Partition Switches
- Initialization Switches
- Unit Switches
- Storage Maps
- Chapter 3
- Preparing the Host System
- Chapter 4
- Installing and Configuring the HS-Series Agent
- Why Use StorageWorks Command Console (SWCC)?
- Installation and Configuration Overview
- About the Network Connection for the Agent
- Before Installing the Agent
- Installing and Configuring the Agent
- Running the Agent
- Reconfiguring the Agent
- Uninstall Agent, Storageworks Software, and Cambex Driver.
- High Availability Cluster Multi-Processor (HACMP)
- Enabler Software
- General Note on Software Installation
- SWCC Clients
- Running the Agent
- HACMP Implementation for the Agent
- Prerequisites
- Implementation
- Installing the Agent on an HACMP Cluster
- Installing and Configuring the Client on an HACMP cluster
- Operation of the Agent on an HACMP Cluster
- Normal Operation of the Agent on an HACMP Cluster
- Starting, Stopping and Checking for the Agent
- Password and Notification
- Client Functions and Storage Subsystem Options
- Failover with Agent as Part of a Resource Group
- Client IP Address
- Event Scripts
- Notification within HACMP
- Node Isolation Recovery
- Failure of the Agent
- Polling all nodes in cluster for presence of a running Agent
- Restarting the Agent on surviving node
- Notification
- Supporting Tools
- HACMP for AIX Primary Event Scripts
- HACMP for AIX Secondary Event Scripts
- Chapter 5
- Configuration Procedures
- Establishing a Local Connection
- Setting Up a Single Controller
- Setting Up a Controller Pair
- Configuring Devices
- Configuring a Stripeset
- Configuring a Mirrorset
- Configuring a RAIDset
- Configuring a Striped Mirrorset
- Configuring a Single-Disk Unit (JBOD)
- Configuring a Partition
- Assigning Unit Numbers and Unit Qualifiers
- Configuration Options
- Chapter 6
- Verifying Storage Configuration from the Host
- Chapter 7
- Configuration Example Using CLI
- Chapter 8
- Backing Up the Subsystem, Cloning Data for Backup, and Moving Storagesets
- Appendix A
- Subsystem Profile Templates
- Storageset Profile
- Storage Map Template 1 for the BA370 Enclosure
- Storage Map Template 2 for the second BA370 Enclosure
- Storage Map Template 3 for the third BA370 Enclosure
- Storage Map Template 4 for the Model 4214R Disk Enclosure
- Storage Map Template 5 for the Model 4254 Disk Enclosure
- Storage Map Template 6 for the Model 4310R Disk Enclosure
- Storage Map Template 7 for the Model 4350R Disk Enclosure
- Storage Map Template 8 for the Model 4314R Disk Enclosure
- Storage Map Template 9 for the Model 4354R Disk Enclosure
- Appendix B
- Installing, Configuring, and Removing the Client
- Appendix C
- Exploitation of the CLONE and SNAPSHOT Functions of the HSG80 in an AIX Environment
- Glossary
- Index
Planning Storage 2–19
RAIDsets are similar to stripesets in that the I/O requests are broken into smaller “chunks”
and striped across the disk drives. RAIDsets also create chunks of parity data and stripe
them across all the members of the RAIDset. Parity data is derived mathematically from
the I/O data and enables the controller to reconstruct the I/O data if a single disk drive
fails. Thus, it becomes possible to lose a disk drive without losing access to the data it
contained. Data could be lost if a second disk drive fails before the controller replaces the
first failed disk drive and reconstructs the data.
The relationship between the chunk size and the average request size determines if striping
maximizes the request rate or the data-transfer rates. You can set the chunk size or use the
default setting. See “Chunk Size,” page 2–26, for information about setting the chunk size.
Keep these points in mind when planning RAIDsets:
■ Reporting methods and size limitations prevent certain operating systems from
working with large RAIDsets.
■ Both cache modules must be the same size.
■ A RAIDset must include at least 3 disk drives, but no more than 14.
■ A storageset should only contain disk drives of the same capacity. The controller limits
the capacity of each member to the capacity of the smallest member in the storageset.
Thus, if you combine 9 GB disk drives with 4 GB disk drives in the same storageset,
you waste 5 GB of capacity on each 9 GB member.
■ RAIDsets are particularly well-suited for the following:
❏ Small to medium I/O requests
❏ Applications requiring high availability
❏ High read request rates
❏ Inquiry-type transaction processing
■ RAIDsets are not particularly well-suited for the following:
❏ Write-intensive applications
❏ Database applications in which fields are continually updated
❏ Transaction processing