LUN OS type specifies the OS of the host accessing the LUN, determining data layout and ensuring proper alignment. Igroup OS type indicates the OS type of initiators in an igroup, enforcing that all initiators are the same type. When creating a LUN, the LUN OS type must match the host and cannot change, while igroup OS type can change and acts as an OS segregation attribute. LUNs are mapped to igroups to grant initiators access to the LUN.
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareLinaro
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
---------------------------------------------------
Speaker: Jorge Ramirez-Ortiz
Date: February 13, 2015
---------------------------------------------------
★ Session Summary ★
[Note: this is a joint Security/Power Management session) Understand what use cases related to Power Management have to interact with Trusted Firmware via Secure calls. Walk through some key use cases like CPU Suspend and explain how PM Linux drivers interacts with Trusted Firmware / PSCI
--------------------------------------------------
★ Resources ★
Pathable: https://hkg15.pathable.com/meetings/250855
Video: https://www.youtube.com/watch?v=hQ2ITjHZY4s
Etherpad: http://pad.linaro.org/p/hkg15-505
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2015 - #HKG15
February 9-13th, 2015
Regal Airport Hotel Hong Kong Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Linux Memory Management
1.Memory Structure of Linux OS.
2.How Program is loaded into the memory.
3.Address Translation.
4.Feature for Multithreading and Multiprocessing.
HKG15-505: Power Management interactions with OP-TEE and Trusted FirmwareLinaro
HKG15-505: Power Management interactions with OP-TEE and Trusted Firmware
---------------------------------------------------
Speaker: Jorge Ramirez-Ortiz
Date: February 13, 2015
---------------------------------------------------
★ Session Summary ★
[Note: this is a joint Security/Power Management session) Understand what use cases related to Power Management have to interact with Trusted Firmware via Secure calls. Walk through some key use cases like CPU Suspend and explain how PM Linux drivers interacts with Trusted Firmware / PSCI
--------------------------------------------------
★ Resources ★
Pathable: https://hkg15.pathable.com/meetings/250855
Video: https://www.youtube.com/watch?v=hQ2ITjHZY4s
Etherpad: http://pad.linaro.org/p/hkg15-505
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2015 - #HKG15
February 9-13th, 2015
Regal Airport Hotel Hong Kong Airport
---------------------------------------------------
http://www.linaro.org
http://connect.linaro.org
Linux Memory Management
1.Memory Structure of Linux OS.
2.How Program is loaded into the memory.
3.Address Translation.
4.Feature for Multithreading and Multiprocessing.
Learn about Networking on z/OS. This part of the z/OS basic skills information center is intended to provide information systems personnel with the background knowledge and skills necessary to begin using the basic communications facilities of a mainframe based system. It provides a broad understanding of networking principles and the hardware and software components necessary to allow the mainframe to participate in a high volume data communications network. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2zOSCommserver
IBM recently announced SMCv2 for SMC-Dv2. SMCv2 defines Shared Memory Communications for TCP/IP connections that span multiple IP subnets. This presentation will introduce how this new capability applies to SMC-Dv2 for z/OS V2R4 and ISMv2 for the IBM z15. The key concepts of the SMC-Dv2 will be introduced along with an overview of how to get started using the new solution with z/OS 2.4. The overview will also cover exploitation and configuration considerations for existing SMC-D users and for new SMC-Dv2 only users. In this presentation, customers will learn about this new capability and how this capability can extend the performance benefits of SMC-D to additional System Z workloads.
CloudStack - Top 5 Technical Issues and TroubleshootingShapeBlue
Cloudstack Top 5 technical issues and troubleshooting. Cloudstack is a mature product in use by companies world-wide. While being associated with CloudStack development for over 5 years, Abhi has come across some technical issues that once in a while affect the CloudStack deployment. This presentation is an effort to put together top 5 such issues, analyze their symptoms, see them from CloudStack architecture perspective and from the distributed nature of cloud orchestration, then look at ways to avoid them and finally be able to troubleshoot if they occur.
Chorus - Distributed Operating System [ case study ]Akhil Nadh PC
ChorusOS is a microkernel real-time operating system designed as a message-based computational model. ChorusOS started as the Chorus distributed real-time operating system research project at Institut National de Recherche en Informatique et Automatique (INRIA) in France in 1979. During the 1980s, Chorus was one of two earliest microkernels (the other being Mach) and was developed commercially by Chorus Systèmes. Over time, development effort shifted away from distribution aspects to real-time for embedded systems.
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
The Nitro Project: Next-Generation EC2 Infrastructure - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- How Nitro System delivers consistent performance, higher security and lower latency to our customers
- How Nitro System delivers the full resources of the underlying AWS servers with limited virtualization overhead
- Leverage the purpose-built Nitro Hypervisor to take complete advantage of the Nitro System
Learn about Networking on z/OS. This part of the z/OS basic skills information center is intended to provide information systems personnel with the background knowledge and skills necessary to begin using the basic communications facilities of a mainframe based system. It provides a broad understanding of networking principles and the hardware and software components necessary to allow the mainframe to participate in a high volume data communications network. For more information on IBM System z, visit http://ibm.co/PNo9Cb.
Visit the official Scribd Channel of IBM India Smarter Computing at http://bit.ly/VwO86R to get access to more documents.
Introduction to IBM Shared Memory Communications Version 2 (SMCv2) and SMC-Dv2zOSCommserver
IBM recently announced SMCv2 for SMC-Dv2. SMCv2 defines Shared Memory Communications for TCP/IP connections that span multiple IP subnets. This presentation will introduce how this new capability applies to SMC-Dv2 for z/OS V2R4 and ISMv2 for the IBM z15. The key concepts of the SMC-Dv2 will be introduced along with an overview of how to get started using the new solution with z/OS 2.4. The overview will also cover exploitation and configuration considerations for existing SMC-D users and for new SMC-Dv2 only users. In this presentation, customers will learn about this new capability and how this capability can extend the performance benefits of SMC-D to additional System Z workloads.
CloudStack - Top 5 Technical Issues and TroubleshootingShapeBlue
Cloudstack Top 5 technical issues and troubleshooting. Cloudstack is a mature product in use by companies world-wide. While being associated with CloudStack development for over 5 years, Abhi has come across some technical issues that once in a while affect the CloudStack deployment. This presentation is an effort to put together top 5 such issues, analyze their symptoms, see them from CloudStack architecture perspective and from the distributed nature of cloud orchestration, then look at ways to avoid them and finally be able to troubleshoot if they occur.
Chorus - Distributed Operating System [ case study ]Akhil Nadh PC
ChorusOS is a microkernel real-time operating system designed as a message-based computational model. ChorusOS started as the Chorus distributed real-time operating system research project at Institut National de Recherche en Informatique et Automatique (INRIA) in France in 1979. During the 1980s, Chorus was one of two earliest microkernels (the other being Mach) and was developed commercially by Chorus Systèmes. Over time, development effort shifted away from distribution aspects to real-time for embedded systems.
Virtualization with KVM (Kernel-based Virtual Machine)Novell
As a technical preview, SUSE Linux Enterprise Server 11 contains KVM, which is the next-generation virtualization software delivered with the Linux kernel. In this technical session we will demonstrate how to set up SUSE Linux Enterprise Server 11 for KVM, install some virtual machines and deal with different storage and networking setups.
To demonstrate live migration we will also show a distributed replicated block device (DRBD) setup and a setup based on iSCSI and OCFS2, which are included in SUSE Linux Enterprise Server 11 and SUSE Linux Enterprise 11 High Availability Extension.
The Nitro Project: Next-Generation EC2 Infrastructure - AWS Online Tech TalksAmazon Web Services
Learning Objectives:
- How Nitro System delivers consistent performance, higher security and lower latency to our customers
- How Nitro System delivers the full resources of the underlying AWS servers with limited virtualization overhead
- Leverage the purpose-built Nitro Hypervisor to take complete advantage of the Nitro System
Accelerating Software Development with NetApp's P4flexPerforce
The challenge for developers who work with large volumes of data such as multimedia assets, video game art, and firmware designs, etc., is the ability to get a quick copy of source and build assets. By combining the technologies of Perforce and NetApp, a new Perforce workspace can be created in minutes instead of hours. Perforce in collaboration with NetApp has developed a p4 broker script written in Python that allows users to create workspaces quickly using NetApp FlexClone technology.
[NetApp] Managing Big Workspaces with Storage MagicPerforce
If you work with large volumes of data—multimedia assets, video game art, or firmware designs—you understand the pain of trying to quickly get a copy of source and build assets. But if you have the right storage system, you can be up and running with a new Perforce workspace in minutes instead of hours. See a simple procedure for fast workspace cloning using a few Perforce commands and NetApp FlexClone.
VMworld 2013: Architecting Oracle Databases on vSphere 5 with NetApp StorageVMworld
VMworld 2013
Greg Loughmiller, NetApp
Kannan Mani, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
FedRAMP Compliant FlexPod architecture from NetApp, Cisco, HyTrust and CoalfireEric Chiu
The FlexPod Datacenter solution combines NetApp storage systems, Cisco Unified Computing System (Cisco UCS) servers, and Cisco Nexus fabric into a single flexible architecture. The FlexPod integrated infrastructure leads in efficiency and flexibility, scaling and flexing as needed, with validated designs that reduce deployment time, project risk, and the cost of IT.
In this deployment, the FlexPod Datacenter solution is treated as the core infrastructure-as-a-service component. In addition, the HyTrust CloudControl and HyTrust DataControl software suites enable FlexPod readiness for FedRAMP environments.
This IT Brand Pulse mini-report includes only market leader data from the independent, non-sponsored survey conducted in January 2017 covering six categories of brand leadership–Market, Price, Performance, Reliability, Service & Support and Innovation–for twelve Networked Storage products.
Complete survey data for each product category is available. Please contact us at info@itbrandpulse.com for information and pricing.
Cloud Data Management at Australia's Largest Software Company -Session Sponso...Amazon Web Services
AWS Cloud services are known to scale automatically and easily, though managing the data sets created by the applications using these services don't. In fact, distributed and disparate types of production, test, development and customer data in volume regularly create operational friction and escalate costs at scale. Learn how Australia's largest software company overcame these challenges, and leveraged an advanced cloud data management platform to maximise control over data placement, performance and privacy, as well as create a better experience for their SaaS customers.
Speakers: Corey Adolphus, Hybrid Cloud Architect, NetApp & Darryn Schafferius, Systems Engineer, NetApp
Getting started with setting up embedded platform requires audience to understand some of the key aspects of Linux. This presentation deals with basics of Linux as an OS, Linux commands, vi editor, Shell features like redirection, pipes and shell scripting
Linux is an operating system or a kernel. It is distributed under an open source license. Its functionality list is quite like UNIX. Linux is an operating system or a kernel which germinated as an idea in the mind of young and bright Linus Torvalds when he was a computer science student. The main advantage of Linux was that programmers were able to use the Linux Kernel to design their own custom operating systems. With time, a new range of user-friendly OS's stormed the computer world. Now, Linux is one of the most popular and widely used Kernel, and it is the backbone of popular operating systems like Debian, Knoppix, Ubuntu, and Fedora.
A guest lecture at National University of Defense Technology (NUDT) in 2016 to postgraduate students in China about emerging technologies in the Linux operating system.
The tutorial covers the process of installing, configuring and operating private, public and hybrid clouds using OpenNebula. Additionally the program briefly addresses the integration of OpenNebula with other components in the data center. The target audience is devops and system administrators interested in deploying a private cloud solution, or in the integration of OpenNebula with other platform.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
1. Difference between LUN OS type and igroup OS type?
What is LUN OS type?
LUNS OS type or the LUN Multiprotocol Type specifies the OS of the host accessing the LUN, and based on that
it determines the layout of data on the LUN, the geometry used to access that data, and properly offsets the
LUN to ensure it is properly aligned with upper layers of the file system. If you do not select the correct LUN OS
type, it may result in a misaligned LUN and eventually lead to performance issues. This OS type property also
determines the minimum and maximum size of the LUN.
The LUN Multiprotocol Type values are solaris, solaris_efi, windows, windows_gpt, windows_2008 , hpux, aix,
linux, netware, xen, hyper_v, and vmware. When you create a LUN, you must specify the LUN type. Once the
LUN is created, you cannot modify the LUN host operating system type.
Note: Do not confuse LUN OS type with igroup OS type; always select the correct LUN OS type. For example –
If you are manually creating a LUN for Windows 2008 OS using NetApp’s System Manager or through the
ONTAP console, make sure ‘windows_2008’ LUN OS type is selected, and igroup OS type of ‘windows’. In case
you have selected ‘windows’ as LUN OS type for Windows 2008 and ‘windows’ for igroup OS type, this will lead
to misaligned LUN.
Following example shows LUN OS type selection menu during LUN creation via NetApp System Manager.
2. What is igroup OS type?
Indicates the type of host operating system used by all of the initiators in the igroup. All initiators in an igroup
must be of the same ostype. The ostypes of initiators are solaris, windows, hpux, aix, netware, xen, hyper_v,
vmware, and linux. You must select an ostype for the igroup.
Following example shows igroup OS type: [Point to be noted here is – The menu selection of igroup OS type
looks similar to LUN OS type in once instance, but if you look carefully, igroup OS type selection is very generic
and does not go into types of OS within the particular OS type as in the LUN OS type selection. For example – It
uses ‘windows’ property for all the flavours of windows]
Igroup in itself is useless unless it is associated with a LUN, and that brings the next question –
What is LUN mapping?
LUN mapping in simplest of definition would be the process of associating a LUN with an igroup. When you
map the LUN to the igroup, you grant the initiators in the igroup access to the LUN. You must map a LUN to an
igroup to make the LUN accessible to the host. Data ONTAP maintains a separate LUN map for each igroup to
support a large number of hosts and to enforce access control.
3. Creating LUN and igroup though command line: [FYI: These days we rarely create LUNS this way; we
rather use System Manager or SnapDrive on the Host Side for provisioning SAN LUNs]
Filer>lun setup
Note: the "lun setup" will display prompts that lead you through the setup process; else you can manually
create them using absolute commands.
# Create the LUN
Filer>lun create -s 100m -t windows_2008 /vol/tradvol1/lun1
# -t = LUN OS type
# Create the igroup, you must obtain the nodes identifier (my home pc is: iqn.1991-
05.com.microsoft:win2k8r2)
Filer>igroup create -i -t windows win_hosts_group1 iqn.1991-05.com.microsoft:win2k8r2
# -t = igroup OS type (This is more of a OS segregation object)
# Map the LUN to the igroup
Filer>lun map /vol/tradvol1/lun1 win_hosts_group1
Some facts about LUN OS type and igroup OS type:
LUN OS type cannot be changed once it is set as shown in the Figure below:
4. Whereas,
igroup OS type is an editable field, in other words, this property can be edited even after the igroup creation.
(This is B’cos it more of an OS masking for the initiators) as shown in figure below.
The next obvious question would be – Is it disruptive?
Well, I tested this on my Linux and windows hosts, during IO operations and nothing happened. So, basically it
can be changed. This also makes me believe that it is just an attribute to ensure that initiators are not a
member of igroups of differing ostype, and possibly has no role in the underline SCSI operations. That said, it is
my opinion and not that of NetApp’s. Always consult the NetApp Technical Support if you are not 100 % sure.
Most important of all:
An initiator cannot be a member of igroups of differing ostype. For example, if you have an initiator that
belongs to a windows igroup, you cannot add the same initiator to a linux igroup or vice versa. Also, a given
igroup can be used for FCP or iSCSI, but not both.
5. igroup example for clustered host:
You can create multiple igroups to define which LUNs are available to your hosts in a cluster. For example, you
can use igroups to ensure that specific LUNs are visible to only one host in the cluster as shown in the chart
below.
The following table illustrates how four igroups give access to the LUNs for four different hosts accessing the
storage system. The clustered hosts (Host3 and Host4) are both members of the same igroup (aix-group2) and
can access the LUNs mapped to this igroup. The igroup named aix-group3 contains the WWPNs of Host4 to
store local information not intended to be seen by its partner.
This document does not intend to cover how igroup is created for FC or iSCSI or how other igroup attribute
functions such as ALUA. There is already plenty of documentation available for that.
Prepared by,
ashwinwriter@gmail.com