Home Page Icon
Home Page
Table of Contents for
Front cover
Close
Front cover
by Danny Yang, Tom Provost, Steven Pemberton, Michael Klimes, Christian Fey, Roland
IBM System Storage N series Software Guide
Front cover
Figures
Tables
Examples
Notices
Trademarks
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Summary of changes
July 2014, Eighth Edition
Part 1 Introduction
Chapter 1. Overview
1.1 Introduction to features
1.2 IBM System Storage N series hardware
1.3 Software licensing structure
1.3.1 What is new in Data ONTAP 8.2
1.3.2 License packages
1.3.3 Evaluation licenses
1.4 Data ONTAP 8 supported systems
Chapter 2. Data ONTAP
2.1 Data ONTAP for IBM System Storage N series
2.1.1 The challenge of managing explosive growth
2.1.2 The solutions
2.2 Data ONTAP overview
2.3 Data ONTAP approach
2.4 Data ONTAP architecture
2.4.1 The Network Interface driver
2.4.2 The RAID manager
2.4.3 Data ONTAP startup
2.5 Data ONTAP 8.1 7-mode
2.5.1 New terminology
2.5.2 New and changed platform and hardware support
2.5.3 Manageability enhancements
2.5.4 Storage resource management enhancements
2.5.5 High-availability pair enhancements
2.5.6 Networking and security protocol enhancements
2.5.7 File access protocol enhancements
2.5.8 Data protection enhancements
2.5.9 Storage efficiency enhancements
2.5.10 MultiStore enhancements
2.6 Data ONTAP 8.1 upgrades
2.7 N series Data Motion
2.7.1 Overview of Data Motion
2.7.2 Business value of Data Motion
Chapter 3. Write Anywhere File Layout
3.1 Introduction to Write Anywhere File Layout
3.2 Write Anywhere File Layout design
3.2.1 WAFL overview
3.2.2 Metadata resides in files
3.2.3 A tree of blocks
3.3 File system consistency and non-volatile RAM
3.4 Write allocation
3.5 Summary
Chapter 4. Aggregates and volumes
4.1 Overview of aggregates
4.1.1 What is new in 8.2
4.1.2 Mirrored and unmirrored aggregates
4.1.3 Unmirrored aggregate
4.1.4 Mirrored aggregate
4.2 Aggregates and the IBM N series storage hierarchy
4.2.1 Traditional volume
4.2.2 Flexible volume (FlexVol)
4.2.3 Volume properties
4.2.4 List affiliation of FlexVols and aggregates
4.3 Introduction to 64-bit aggregates
4.3.1 Overview
4.3.2 About aggregate types
4.3.3 The need for 64-bit aggregates
4.3.4 Maximum aggregate and volume sizes
4.3.5 Advantages of 64-bit aggregates
4.3.6 Creating and managing FlexVol volumes in a 64-bit aggregate
4.4 Introduction to flexible volumes
4.4.1 How FlexVol volumes work
4.4.2 Benefits of FlexVol
4.4.3 64-bit FlexVol volumes
Chapter 5. qtrees
5.1 What qtrees are
5.2 What qtrees do
5.2.1 Security styles
5.2.2 Oplocks
5.2.3 Quotas
5.2.4 SnapMirror
5.2.5 SnapVault
5.3 Working with qtrees
Chapter 6. FlexClone volumes
6.1 Introduction to FlexClone volumes
6.2 FlexClone operation
6.3 Practical applications of FlexClone
6.4 FlexClone performance
6.5 Creating a FlexClone
6.6 Accessing FlexClone volumes
6.7 Splitting FlexClone volumes
6.8 Summary
Chapter 7. FlexCache volumes
7.1 Introduction to FlexCache
7.2 How FlexCache works
7.2.1 Caching
7.2.2 Reads
7.2.3 Writes
7.2.4 Caching granularity
Chapter 8. FlexShare
8.1 Introduction to FlexShare
8.2 FlexShare concept
8.2.1 Queues
8.2.2 Buffer cache policies
8.2.3 How FlexShare schedules WAFL operations
8.2.4 How FlexShare manages system resources
8.3 Benefits of using FlexShare
8.4 When to use FlexShare
8.5 Supported configurations
8.6 Using FlexShare in cluster storage systems
8.7 Setting up FlexShare
8.7.1 FlexShare CLI overview
8.7.2 Enabling FlexShare service
8.7.3 Priority settings
8.8 FlexShare usage examples
8.8.1 Consolidating different workloads
8.8.2 Mixed storage including FC disks and SATA disks
8.9 FlexShare preferred practices
8.9.1 Setting a priority configuration for all volumes in an aggregate
8.9.2 Configuring Active/Active configurations consistently
8.9.3 Setting volume cache usage appropriately
8.9.4 Tuning for SnapMirror and backup operations
8.10 FlexShare administration
8.10.1 FlexShare CLI overview
8.10.2 Expected behavior with other CLI commands
8.10.3 Managing Data ONTAP API
8.10.4 Upgrading and reverting
8.11 Understanding FlexShare behavior and troubleshooting
8.11.1 Using counters to analyze FlexShare behavior
8.11.2 Troubleshooting
8.11.3 FlexShare off versus on
8.11.4 Maintaining priority configurations
8.12 Summary
Chapter 9. Network configuration
9.1 Network interfaces
9.1.1 Maximum number of network interfaces
9.1.2 Maximum number of interface groups
9.2 Configuring network interfaces
9.2.1 Configuring a partner interface in an HA pair
9.2.2 Enabling or disabling automatic takeover for a network interface
9.3 How routing data in Data ONTAP works
9.3.1 Routing mechanisms
9.3.2 How fast path works
9.4 Interface groups
9.4.1 Types of interface groups
9.4.2 Load balancing in multimode interface groups
9.5 Ways to improve your storage system's performance
Chapter 10. MultiStore
10.1 Introduction to vFiler
10.1.1 Number of vFiler units allowed
10.1.2 vFiler supported protocols
10.1.3 Using vFiler
10.2 vFiler benefits
10.3 vFiler scenarios
10.3.1 vFiler migration with SnapMirror
10.3.2 vFiler disaster recovery
Part 2 Data protection
Chapter 11. Snapshot
11.1 Introduction to Snapshot
11.1.1 Snap commands
11.1.2 Automatic Snapshots
11.2 Snapshot process: Basic operation
11.3 Understanding Snapshots in detail
11.3.1 How Snapshot copies consume disk space
11.3.2 How changing file content consumes disk space
11.3.3 What the Snapshot copy reserve is
11.4 Snapshot data structures and algorithms
11.4.1 Creating a Snapshot
11.4.2 Deleting a Snapshot
Chapter 12. SnapRestore
12.1 SnapRestore at a glance
12.2 Introduction to SnapRestore
12.2.1 Cost and storage efficiency
12.2.2 Data restoration
12.2.3 A possible SnapRestore use
12.2.4 Flexible restore
12.2.5 Additional benefits
12.3 SnapRestore operation
12.3.1 What SnapRestore reverts
12.3.2 Applying SnapRestore
12.4 SnapRestore: Details of operation
12.5 Examples
12.5.1 SnapRestore command syntax
12.5.2 Considerations before performing SnapRestore
12.5.3 The process for restoring data
12.5.4 SnapRestore volume restore
12.5.5 SnapRestore single file restore
12.5.6 Mounting the Snapshot directly from a server
12.6 SnapRestore for databases
12.6.1 SnapRestore for databases overview
12.6.2 SnapRestore for databases scenario
Chapter 13. SnapMirror
13.1 SnapMirror at a glance
13.2 Introduction to SnapMirror
13.2.1 The need for SnapMirror
13.2.2 Rules for using SnapMirror
13.3 The three modes of SnapMirror
13.3.1 Asynchronous mode
13.3.2 Synchronous mode
13.3.3 Semi-synchronous mode
13.4 SnapMirror applications
13.5 Synchronous and asynchronous implications
13.6 Volume capacity and SnapMirror
13.7 Guarantees in a SnapMirror deployment
13.8 SnapMirror architecture
13.9 Isolating testing from production
13.10 Cascading mirrors
13.10.1 Cascading replication
13.10.2 Disaster recovery
13.11 Performance impact of synchronous and semi-synchronous modes
13.12 CPU impact of synchronous and semi-synchronous modes
13.13 Network bandwidth considerations
13.14 Replication considerations
13.14.1 Maximum concurrent transfers for clustered configurations
Chapter 14. SnapLock
14.1 SnapLock at a glance
14.2 Introduction to SnapLock
14.2.1 SnapLock Compliance
14.2.2 SnapLock Enterprise
14.3 SnapLock setup
Chapter 15. SyncMirror
15.1 Background
15.1.1 What is new in 8.2
15.2 Differences between SnapMirror and SyncMirror
15.3 Implementing local SyncMirror
15.3.1 Preliminary construction and considerations
15.3.2 Implementation of SyncMirror
15.3.3 Controlling plexes
15.4 How SyncMirror works with third-party storage
15.5 Disaster recovery with SyncMirror
Chapter 16. MetroCluster
16.1 Overview of MetroCluster
16.2 Business continuity solutions
16.3 Stretch MetroCluster
16.3.1 Planning Stretch MetroCluster configurations
16.3.2 Cabling Stretch MetroClusters
16.4 Fabric Attached MetroCluster
16.4.1 Planning Fabric Attached MetroCluster configurations
16.4.2 Cabling Fabric Attached MetroClusters
16.5 Synchronous mirroring with SyncMirror
16.5.1 SyncMirror overview
16.5.2 SyncMirror without MetroCluster
16.6 MetroCluster zoning and TI zones
16.7 Failure scenarios
16.7.1 MetroCluster host failure
16.7.2 N series and expansion unit failure
16.7.3 MetroCluster interconnect failure
16.7.4 MetroCluster site failure
16.7.5 MetroCluster site recovery
Part 3 Storage efficiency technology
Chapter 17. SnapVault
17.1 SnapVault at a glance
17.1.1 What is new in 8.2
17.2 Business applications of SnapVault
17.3 Overview of SnapVault
17.4 Benefits of using SnapVault
17.4.1 Incremental backups forever
17.4.2 Self-service restores
17.4.3 Consistent security
17.5 SnapVault operation
17.5.1 Snapshots, volumes, and qtrees
17.5.2 SnapVault example
17.5.3 Special case: Database and application server backups
17.5.4 Special case: Backup of FCP or iSCSI LUNs
17.6 SnapVault backup
17.6.1 Incremental backups (updates)
17.6.2 Scheduling/retention policy
17.6.3 Snapshot copies
17.7 SnapVault details
17.8 Disaster recovery with SnapVault
17.8.1 SnapVault options
17.8.2 Comparing SnapMirror and SnapVault
17.9 Remote solution using SnapVault
17.10 Maximum number of concurrent SnapVault targets
17.11 Preferred practices
17.11.1 General preferred practices
17.11.2 Common misconfigurations
17.12 Summary
Chapter 18. What storage efficiency is
18.1 The IBM N series advantage
18.2 SATA storage disks and Flash Cache
18.3 Protection against double disk failure with RAID-DP
18.3.1 What RAID-DP protection is
18.3.2 How RAID-DP protection works
18.4 How space management works
18.4.1 What kind of space management to use
18.4.2 What space guarantees are
18.4.3 What space reservation is
18.4.4 What fractional reserve is
18.4.5 Reasons to set fractional reserve to zero
18.4.6 Automatic space provisioning for full volumes
18.5 Thin provisioning using FlexVol volumes
18.5.1 Storage space management using OnCommand
18.5.2 Automating thin provisioning using Provisioning Manager
Chapter 19. Deduplication
19.1 How deduplication works
19.2 What deduplication metadata is
19.3 Guidelines for using deduplication
19.4 Deduplication commands
19.4.1 Activating the deduplication license
19.4.2 Common deduplication operations
19.5 Performance considerations for deduplication
19.6 How deduplication works with other features and products
19.6.1 Deduplication and Snapshot copies
19.6.2 Deduplication and volume SnapMirror
19.6.3 Deduplication and qtree SnapMirror
19.6.4 Deduplication and SnapVault
19.6.5 Deduplication and SnapRestore
19.6.6 Deduplication and volume copy
19.6.7 Deduplication and FlexClone volumes
19.6.8 Deduplication in a High Availability pair
19.6.9 Deduplication and VMware
19.6.10 Deduplication and MultiStore
Chapter 20. Compression
20.1 Introduction to data compression
20.1.1 How N series data compression works
20.1.2 When data compression runs
20.2 Potential space savings
20.3 Performance
20.3.1 Performance impact of in-line and post-process compression
20.3.2 I/O performance on compressed volumes
20.4 Compression examples
20.4.1 Creating a new volume and enabling compression and deduplication
20.4.2 Enabling compression and deduplication on an existing volume
Chapter 21. IBM Real-time Compression Appliance
21.1 Introduction to data compression
21.2 IBM Real-time Compression
21.3 Benefits
21.4 IBM RTCA RACE technology
Chapter 22. Thin replication using SnapVault and Volume SnapMirror
22.1 Disk-to-Disk backups using SnapVault
22.1.1 What data gets backed up and restored through SnapVault
22.1.2 Types of SnapVault deployment
22.1.3 How SnapVault backup works
22.1.4 Guidelines for creating a SnapVault relationship
22.1.5 About LUN clones and SnapVault
22.2 Efficient data protection using volume SnapMirror
22.2.1 How SnapMirror works
22.2.2 SnapMirror use cases
22.2.3 Preferred practices while using SnapMirror
22.2.4 SnapMirror deployment variations
22.2.5 Cascading data replication
Part 4 Storage access protocols
Chapter 23. CIFS and Active Directory
23.1 Supported CIFS versions
23.2 Joining the N series CIFS service to Active Directory
23.2.1 Data ONTAP
23.2.2 Machine accounts
23.3 Prerequisite steps for Active Directory integration
23.4 Selecting a user account
23.4.1 Preparation
23.4.2 Acquiring rights
23.5 Precreating a computer object
23.5.1 Creating the computer object
23.5.2 Completion of the Active Directory integration
23.6 Running the CIFS setup wizard
23.6.1 Running the CIFS setup wizard using Data ONTAP CLI
23.6.2 Running the CIFS setup wizard using System Manager
23.6.3 Active Directory: Mixed mode or native mode
23.6.4 Domain function levels (mixed and native)
23.7 Troubleshooting the domain joining process
23.7.1 DNS
23.7.2 Time synchronization
23.7.3 Active Directory replication
23.8 Device discovery
23.9 Automatic home shares
23.9.1 Visibility of shares
23.9.2 Configuring the NAS controller
Chapter 24. NFS
24.1 What NFS is
24.2 NFS versions
24.2.1 NFS V1
24.2.2 NFS V2
24.2.3 NFS V3
24.2.4 NFS V4
24.3 File access using NFS
24.3.1 Exporting or unexporting file system paths
24.3.2 Editing the /etc/exports file
24.4 NFS shares
24.5 NFS Data ONTAP 8.1 commands
24.6 Enabling Kerberos v5 security services for NFS
24.7 Interoperability
Chapter 25. Multiprotocol data access
25.1 Introduction to multiprotocol access
25.2 File system permissions
25.2.1 UNIX file permissions
25.2.2 NTFS file permissions
25.2.3 NFS access of data
25.2.4 NTFS access modes
25.3 File service for environments with NFS and CIFS
25.3.1 CIFS access of UNIX security data
25.3.2 CIFS access of NTFS data
25.3.3 CIFS access of NTFS data
25.4 Altering qtree security at the qtree level or volume level
25.5 NFS
25.6 CIFS
25.7 NFS compared to CIFS
25.8 Mixing NFS and CIFS
25.9 Multiprotocol file service
25.9.1 Emulated multiprotocol file service
25.9.2 Native multiprotocol file service
Chapter 26. Fibre Channel
26.1 Fibre Channel defined
26.2 What FC nodes are
26.3 How FC target nodes connect to the network
26.4 How FC nodes are identified
26.4.1 How WWPNs are used
26.4.2 How storage systems are identified
26.4.3 How hosts are identified
26.4.4 How switches are identified
26.5 Further information
Chapter 27. FCoE
27.1 Benefits of a unified infrastructure
27.2 Fibre Channel over Ethernet (FCoE)
27.3 Data center bridging
27.4 Further information
Chapter 28. iSCSI
28.1 What iSCSI is
28.2 How iSCSI nodes are identified
28.2.1 The iqn-type designator
28.2.2 Storage system node name
28.2.3 The eui-type designator
28.3 How the storage system checks initiator node names
28.4 Default port for iSCSI
28.5 What target portal groups are
28.6 What iSNS is
28.7 What CHAP authentication is
28.8 How iSCSI communication sessions work
28.9 How iSCSI works with HA pairs
28.10 Further information
Chapter 29. Other protocols
29.1 File Transfer Protocol (FTP)
29.1.1 Enabling and disabling FTP
29.1.2 Blocking and protecting data and access
29.2 Secure File Transfer Protocol (SFTP)
29.2.1 Limitations of Data ONTAP support for SFTP
29.2.2 Enabling or disabling SFTP
29.2.3 Enabling or disabling SFTP file locking
29.3 File Transfer Protocol over SSL (FTPS)
29.3.1 Differences between implicit and explicit FTPS
29.3.2 Implicit FTPS
29.3.3 Explicit FTPS
29.4 Hypertext Transfer Protocol (HTTP)
29.4.1 Managing the Data ONTAP HTTP server
29.4.2 Enabling or disabling the bypassing of HTTP traverse checking
29.4.3 Specifying the root directory for the HTTP server
29.4.4 Testing the HTTP server
29.5 WebDAV
Part 5 Application and host OS integration
Chapter 30. SnapDrive
30.1 Challenges
30.2 SnapDrive overview
30.2.1 Components of SnapDrive
30.2.2 Benefits of SnapDrive
30.3 SnapDrive integration with the host operating system
30.4 Snapshots using SnapDrive
30.4.1 Consistent Snapshots
30.4.2 Preferred practices for Snapshots
30.4.3 Volume-size rules
30.5 SnapDrive for Windows
30.5.1 SnapDrive software components
30.5.2 Windows Device Manager
30.5.3 Dynamic file system expansion
30.5.4 Volumes, RAID groups, and virtual disks
30.6 SnapDrive for UNIX
30.6.1 How SnapDrive for UNIX works
30.6.2 SnapDrive for UNIX and logical volumes
30.7 Flexible networked storage
30.8 Summary
Chapter 31. SnapManager
31.1 Introduction to SnapManager
31.2 Supported databases and applications
31.3 SnapManager for Hyper-V
31.3.1 What you can do with SnapManager for Hyper-V
31.3.2 Installing and uninstalling SnapManager for Hyper-V
31.3.3 Configuring SnapManager for Hyper-V
31.3.4 Managing backup jobs
31.3.5 Restoring a virtual machine
31.4 SnapManager for Microsoft Exchange
31.4.1 What SnapManager for Microsoft Exchange does
31.4.2 Installation on a stand-alone Windows host system
31.4.3 Installing SnapManager in interactive mode
31.5 SnapManager for Oracle on UNIX
31.5.1 What SnapManager for Oracle on UNIX does
31.5.2 Installing or upgrading SnapManager on a UNIX host
31.6 SnapManager for SAP on Windows
31.6.1 What SnapManager for SAP on Windows does
31.6.2 Installing SnapManager for SAP on Windows
Chapter 32. Snap Creator
32.1 Snap Creator architecture
32.1.1 Security features of Snap Creator
32.1.2 Snap Creator integration
32.1.3 What a Snap Creator agent is
32.2 Installing Snap Creator on UNIX
32.2.1 Installing the Snap Creator Server
32.2.2 Installing Snap Creator agent
32.3 Configuring Snap Creator Server
32.3.1 Creating a configuration file using CLI
32.3.2 Creating a configuration file using the GUI
Chapter 33. VMware vSphere
33.1 Server virtualization
33.1.1 VMware Virtual Infrastructure
33.1.2 Implementation example
33.2 Benefits of N series with VMware vSphere 5
33.2.1 Increased protection with RAID-DP
33.2.2 Cloning virtual machines
33.2.3 Multiprotocol capability for storing files on iSCSI, SAN, or NFS volumes
33.2.4 N series LUNs for VMWare host boot
33.2.5 N series LUNs for VMFS datastores
33.2.6 Using N series LUNs for Raw Device Mappings
33.2.7 Growing VMFS datastores
33.2.8 Backup and recovery of the virtual infrastructure (SnapVault, Snapshot, SnapMirror)
33.3 Virtual Storage Console
33.4 Using N series deduplication with VMware
33.5 Coupling deduplication and compression
33.6 Further reading
Chapter 34. Virtual Storage Console 4.1
34.1 Virtual Storage Console
34.1.1 Introduction to the Virtual Storage Console
34.1.2 License requirements
34.1.3 Architecture overview
34.1.4 Monitoring and host configuration
34.1.5 Provisioning and cloning
34.2 Installing the Virtual Storage Console 4.1
34.2.1 Basic installation
34.2.2 Registration completion
34.3 Adding storage controllers to the VSC
34.4 Optimal storage settings for ESXi host
34.5 SnapMirror integration
34.5.1 SnapMirror destinations
34.5.2 SnapMirror and deduplication
34.6 VSC in an N series MetroCluster environment
34.7 Backup and recovery
34.7.1 Data layout
34.7.2 Backup and recovery requirements
34.7.3 Single wizard for creating backup jobs
34.7.4 Granular restore options
34.7.5 Other features
34.8 Provisioning and cloning
34.8.1 Features and functions
34.8.2 Provisioning datastores
34.8.3 Managing deduplication
34.8.4 Cloning virtual machines
34.8.5 Reclaiming space on virtual machines
34.9 Optimum VM availability
34.9.1 Optimizing VM SCSI BUS
34.9.2 Optimal storage performance
34.9.3 VM partition alignment
34.9.4 N series MBR Tools: Identification of partition alignment status
34.9.5 Windows VM file system performance
34.10 VSC commands
34.11 Scripting
Chapter 35. Consistency groups
35.1 Snapshot backup and application consistency
35.1.1 Application-consistent
35.1.2 Crash-consistent
35.1.3 Non-consistent
35.2 Consistency groups
35.2.1 Consistency group architecture overview
35.2.2 CG Primitives: APIs
35.3 How to use consistency groups
35.3.1 SnapDrive
35.3.2 SnapCreator
35.3.3 Custom scripting
Part 6 Storage management
Chapter 36. Remote management
36.1 Remote LAN Module (RLM)
36.1.1 Ways to configure the RLM
36.1.2 Prerequisites for configuring the RLM
36.1.3 Setting up the RLM
36.2 Baseboard Management Controller (BMC)
36.2.1 Ways to configure the BMC
36.2.2 Prerequisites for configuring the BMC
36.2.3 Setting up the BMC
36.3 Service Processor (SP)
36.3.1 Ways to configure the SP
36.3.2 Prerequisites for configuring the SP
36.3.3 Setting up the SP
36.4 CLI administration
Chapter 37. Command line administration
37.1 Introduction to CLI administration
37.1.1 Audit logging
37.1.2 Preferred practice
37.2 Telnet
37.2.1 Telnet session options
37.2.2 Starting a Telnet session
37.3 SSH
37.3.1 SSH options
37.3.2 Interactive SSH support for vFiler units
37.4 RSH
Chapter 38. N series System Manager
38.1 Introduction to N series System Manager (NSM)
38.2 Installing the N series System Manager
38.2.1 Installing NSM on Windows
38.2.2 Installing System Manager on Linux
38.3 Getting started with NSM
38.3.1 Starting NSM
38.3.2 Adding a storage system
38.3.3 Configuring a storage system
Chapter 39. AutoSupport
39.1 Overview of AutoSupport
39.2 What is new in 8.2
39.3 How AutoSupport works
39.4 High level perspective
39.5 Detailed perspective
Chapter 40. OnCommand
40.1 Introduction to OnCommand
40.1.1 OnCommand architecture
40.1.2 Dashboard
40.2 Key functionality
40.2.1 Operations
40.2.2 Provisioning
40.2.3 Protection
40.2.4 Plug-ins
40.2.5 N series Operations Manager
40.2.6 N series Management Console
40.2.7 Host Agent
Related publications
IBM Redbooks publications
Other publications
Online resources
Help from IBM
Back cover
IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
Introduction
Business problem and business value
Reference architecture use
Requirements
InfoSphere BigInsights predefined configuration
InfoSphere BigInsights HBase predefined configuration
Deployment considerations
Customizing the predefined configurations
Predefined configuration bill of materials
References
The team who wrote this paper
Now you can become a published author, too!
Stay connected to IBM Redbooks
Notices
Trademarks
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Note: Before using this information and the product it supports, read the information in “Notices” on page xxix.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset