⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spec.v1.txt

📁 网络数据管理协议的开发
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Network Working Group                                   R. Stager, PDCInternet Draft                              D. Hitz, Network ApplianceCategory: Informational                                   February 1996                     Network Data Management ProtocolStatus of this Memo     This document is an Internet-Draft.  Internet-Drafts are working     documents of the Internet Engineering Task Force (IETF), its areas,     and its working groups.  Note that other groups may also distribute     working documents as Internet-Drafts.     Internet-Drafts are draft documents valid for a maximum of six months     and may be updated, replaced, or obsoleted by other documents at any     time.  It is inappropriate to use Internet-Drafts as reference     material or to cite them other than as ``work in progress.''     To learn the current status of any Internet-Draft, please check the     ``1id-abstracts.txt'' listing contained in the Internet-Drafts Shadow     Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),     munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or     ftp.isi.edu (US West Coast).Abstract     The Network Data Management Protocol (NDMP) addresses the user's need     for centralized control of enterprise-wide network data management     while minimizing network traffic. The design objective of the     protocol is to make every network attached storage device "backup     ready", enabling true plug-and-play backup operation. The user will     not be required to install any additional software on an NDMP-     compliant network storage device. With the NDMP approach, each     network-attached file server ships with a "universal agent," which     can be used by any NDMP-compliant backup administration application.     For IS departments and system administrators, NDMP will ensure     interoperability between different file servers and backup solutions,     significantly simplifying the data management process. This sameInternet Draft     Network Data Management Protocol       October 1996     universal agent architecture is also for network-attached backup     devices, such as a tape libraries.Filename:           <draft-stager-pdc-netapp-backup-01.txt>Expires:            Aug 1997Stager,Hitz                                                     Page 2Internet Draft     Network Data Management Protocol       October 19961. OVERVIEW .......................................................5  1.1 MOTIVATION ..................................................5  1.2 AUDIENCE ....................................................5  1.3 TERMINOLOGY .................................................52. ARCHITECTURE ...................................................7  2.1 ARCHITECTURAL MODEL .........................................7  2.2 COMPARISON ARCHITECTURES ....................................9  2.3 STATE DESCRIPTION ..........................................11   2.3.1 Idle State ..............................................13   2.3.2 Active State ............................................13   2.3.3 Paused State ............................................13   2.3.4 Halted State ............................................13  2.4 PROTOCOL INTERFACES ........................................14   2.4.1 NDMP Server Interfaces ..................................14   2.4.2 NDMP Client Interfaces ..................................15  2.5 MESSAGING PROTOCOL .........................................15  2.6 HEADER .....................................................16  2.7 ERROR ......................................................18  2.8 MESSAGE DEFINITIONS ........................................213. NDMP SERVER INTERFACES ........................................24  3.1 CONNECT INTERFACE ..........................................24   3.1.1 Open Connection .........................................24   3.1.2 Authorization ...........................................25   3.1.3 Close Connection ........................................27  3.2 CONFIG INTERFACE ...........................................27   3.2.1 Get Host Info ...........................................27   3.2.2 Get backup Type Attribute ...............................29  3.3 SCSI INTERFACE .............................................30   3.3.1 Open SCSI Device ........................................30   3.3.2 Close Device ............................................32   3.3.3 Get SCSI State ..........................................33   3.3.4 Set SCSI Target .........................................34   3.3.5 Reset Device ............................................35   3.3.6 Reset Bus ...............................................36   3.3.7 Execute CDB .............................................36  3.4 TAPE INTERFACE .............................................39   3.4.1 Open Tape Device ........................................39   3.4.2 Close Device ............................................41   3.4.3 Get Tape State ..........................................42   3.4.4 MTIO ....................................................44   3.4.5 Write ...................................................46   3.4.6 Read ....................................................48   3.4.7 Set Record Size .........................................49Stager,Hitz                                                     Page 3Internet Draft     Network Data Management Protocol       October 1996   3.4.8 Execute CDB .............................................50  3.5 DATA INTERFACE .............................................50   3.5.1 Get Data State ..........................................50   3.5.2 Backup ..................................................55   3.5.3 Recover .................................................58   3.5.4 Abort ...................................................60   3.5.5 Stop ....................................................61   3.5.6 Continue ................................................62   3.5.7 Get ENV .................................................634. NDMP CLIENT INTERFACES ........................................65  4.1 NOTIFY INTERFACE ...........................................65   4.1.1 Notify Paused ...........................................65   4.1.2 Notify Halted ...........................................66   4.1.3 Notify Connect ..........................................66  4.2 LOGGING INTERFACE ..........................................68   4.2.1 Log .....................................................68   4.2.2 Debug ...................................................68  4.3 FILE HISTORY INTERFACE .....................................71   4.3.1 Add Unix Path ...........................................71   4.3.2 Add Unix Dir ............................................74   4.3.3 Add Unix Node ...........................................755. REFERENCES ....................................................766. SECURITY ......................................................767. AUTHORS .......................................................76FIGURE 1. SIMPLE CONFIGURATION ....................................7FIGURE 2. TWO DRIVE CONFIGURATION .................................8FIGURE 3. JUKEBOX CONFIGURATION ...................................9FIGURE 4 - BACKUP STATE DIAGRAM ..................................12Stager,Hitz                                                     Page 4Internet Draft     Network Data Management Protocol       October 19961. Overview1.1 MotivationThe purpose of this protocol is to allow a network backup application tocontrol the backup of an NDMP compliant server using a universal agentwithout installing special software on the server.This separation of control and data allows complete interoperability at anetwork level. The file system vendors need only be concerned withmaintaining compatibility with one, well-defined protocol. The backupvendors can place their primary focus on the sophisticated central backupadministration software.This protocol is specifically intended to support tape drives. Thisprotocol is targeted towards backup software and there are extensivereferences to the tasks of backup and restore. However, the protocol maybe used for other applications in the future.1.2 AudienceThis document is intended for use by software developers to implementNetwork Data Management Protocol. The reader is assumed to be familiarwith network protocol specifications and with the general operation ofbackup software.  The user is not expected to have knowledge of internalbackup software behavior.1.3 TerminologyNDMP client     The application that controls the NDMP server.NDMP host     The host which has a tape drive physically attached and can perform     local backups to that tape drive using the NDMP.NDMP serverStager,Hitz                                                     Page 5Internet Draft     Network Data Management Protocol       October 1996     The virtual state machine on the NDMP host that is controlled using     the NDMP protocol.  There is one of these for each connection to the     NDMP host.  This term is used independent of implementation.Stager,Hitz                                                     Page 6Internet Draft     Network Data Management Protocol       October 19962. Architecture2.1 Architectural ModelThe architecture is a client server model and backup software isconsidered a client to the NDMP server. For every connection between theclient and the NDMP host there is a  virtual state machine on the NDMPhost that is controlled using the NDMP.  This virtual state machine isreferred to as the NDMP server. Each state machine controls at most onedevice used to perform backups.  The protocol is a set of XDR encodedmessages that are exchanged over a bi-directional TCP/IP connection andare used to control and monitor the state of the NDMP server and tocollect detail information about the data that is backed up.In the most simple configuration, NDMP client will backup the data fromthe NDMP host to a tape drive connected to the NDMP host.                          Network Boundary                               *            BACKUP HOST        *        NDMP HOST                               *                               *                                                                         ____________________          *            ____________________|  Backup Software   |         *           |    NDMP Server     ||                    |<--NDMP Connection-->|                    ||____________________|         *           |____________________|                               *              ^              |                               * Backup Data  | Backup data |                               *       _______|__      _____V___                               *      |          |    |  Tape   |                               *      |  Disk    |    |  Drive  |                               *      |          |    |         |                               *      |          |    |_________|                               *      |__________|                               *                               *                          Network BoundaryFigure 1. Simple configurationStager,Hitz                                                     Page 7Internet Draft     Network Data Management Protocol       October 1996It is also possible to use the NDMP to simultaneously backup to two tapedrives physically attached to the NDMP host.  In this configuration thereare two instances of the NDMP server on the NDMP host.                Network Boundary                     *BACKUP HOST          *       NDMP HOST                     *                     *                                                                         __________          *            ____________      | Backup   |         *           |NDMP Server |      | Software |<--NDMP Connection-->|____________|     ___________|          |<--NDMP Connection--------------------->| NDMP     ||__________|         *            ^       |         | Server   |                     *      Backup| Backup|         |__________|                     *      Data  | Data  |   Backup ^ Backup|                     *       _____|_   ___V___ Data  |  Data |                     *      |       |  |      |      |       |                     *      |       |  |Tape  |      |       |                     *      |  Disk |  |Drive |  ____|_   ___V__                     *      |       |  |      | |      | |      |                     *      |_______|  |______| |      | |Tape  |                     *                          |Disk  | |Drive |                     *                          |      | |      |                     *                          |______| |______|                     *                      *                Network BoundaryFigure 2. Two drive configurationThe NDMP can be used to backup data to a tape drive in a jukebox that isphysically attached to the NDMP host. In this configuration, there is aseparate instance of the NDMP server to control the robotic arm  in thejukebox.Stager,Hitz                                                     Page 8Internet Draft     Network Data Management Protocol       October 1996                Network Boundary                     *BACKUP HOST          *       NDMP HOST                     *                     *                                                                         __________          *            ____________      ____________| Backup   |         *           |NDMP Server |    |            || Software |<--NDMP Connection-->|____________|----|-> Robotics ||          |         *            ____________     |   Control  | |          |<--NDMP Connection-->| NDMP Server |   |            ||__________|         *           |_____________|---|-> Tape     |                     *            ^                |   Drive    |                     *      Backup|                |            |                     *      Data  |                |Tape Jukebox|                     *       _____|___             |____________|                     *      |         |                      *      |         |                       *      |  Disk   |                       *      |         |                       *      |_________|                       *                       *                                       Network BoundaryFigure 3. Jukebox configuration2.2 Comparison ArchitecturesIt is useful to compare the NDMP architecture to other architectures andnote the similarities and differences.rmtThe architecture is similar to the rmt architecture in that connection ismade to a generic server and the server is instructed to open a specifictape drive device. The NDMP differs in that it uses a TCP/IP connection toa dedicated port whereas  rmt uses the rsh  demon to launch a server.X11The architecture is similar to the X11 architecture in that it uses asingle connection to a TCP/IP port, however it differs in that the NDMPserver is not assigned to a device until the client opens a device andthat there is only one client per NDMPserver, whereas X11 is assigned to aStager,Hitz                                                     Page 9Internet Draft     Network Data Management Protocol       October 1996display device before the first client connects and accepts connectionsfrom many clients.RPCThe NDMP architecture is similar to RPC in that it uses XDR encoding. NDMPdiffers in that it is only defined for a TCP/IP connection and that it isnot a call-return model, but rather a bi-directional asynchronousmessaging model.Stager,Hitz                                                    Page 10

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -