SlideShare uma empresa Scribd logo
1 de 39
Baixar para ler offline
Internet Small Computer System
Interface
iSCSI

Sheel Sindhu Manohar
IWC2013011
tuxophilia@gmail.com
What is this?
PATA Cable
What is this?
SATA Cable
What is this?
SCSI Cable
SCSI
●

●

●

●

●

●

Small Computer System Interface (SCSI) technology for I/O buses in Unix
and PC servers.
SCSI protocol defines how the devices communicate with each other via
the SCSI bus.
It specifies how the devices reserve the SCSI bus and in which format data
is transferred.
The SCSI protocol introduces SCSI IDs (aka. called target ID or just ID)
and Logical Unit Numbers (LUNs) for the addressing of devices.
The server can be equipped with many SCSI controllers.
The operating system must note three things for the differentiation of
devices – controller ID, SCSI ID and LUN.
SCSI (2)
●

●

●

●

Devices (servers and storage devices) must reserve the SCSI bus
(arbitrate) before they may send data through it.
During the arbitration of the bus, the device that has the highest priority
SCSI ID always wins.
Lower priorities never being allowed to send data if higher priority bus is
heavily loaded
SCSI devices connected in the form of daisy chain.
The SCSI I/O Channel
●

●

●

SCSI is the dominant protocol
used to communicate between
servers and storage devices
in open system
SCSI I/O channel is a
half-duplex pipe for
SCSI CDBs and data
Parallel bus evolution
Bus width: 8, 16 bits
Bus speed: 5–80 Mhz
Throughput: 5–320 MBps
Devices/bus: 2–16 devices
Cable length: 1.5m–25m

●

A network approach can scale
the I/O channel in many areas
(length, devices, speed)

Applications
Raw

File System
Block Device
SCSI Generic

TCP/IP
Stack
NIC
Driver
Ethernet
NIC

Ethernet

SCSI CDB: SCSI Command Descriptor Block Used to Relay
SCSI Commands, Parameters, and Status between SCSI
Initiators and SCSI Targets; Typically 6, 10, or 12 Byte Block

Adapter Driver
Half-Duplex
SCSI
I/O Channel
SCSI

SCSI Adapter

SCSI
Initiator

SCSI
Target
SCSI and Storage Network
●

SCSI suitable for the deployment of storage networks upto limited degree

●

SCSI daisy chain can only connect a very few devices with each other.

●

●

●

●

Although it is theoretically possible to connect several servers to a SCSI
bus, this does not work very well in practice.
The maximum lengths of SCSI buses greatly limit the construction of
storage networks. Large disk subsystems have over 30 connection ports
for SCSI cables
Extend the length of the SCSI buses with so-called link extenders, the
use of a large number of link extenders is unwieldy.
SCSI having advantage that transition of SCSI cables to storage networks
remains hidden from applications and higher layers
Different type of SCSI Interfaces
IP Based Storage
●

●

IP storage is an approach to build storage networks upon TCP, IP and
Ethernet.
Three protocols are available for transmitting storage data traffic over
TCP/IP:
- iSCSI,
- Internet FCP (iFCP)
- Fibre Channel over IP (FCIP)

●

The basic idea behind iSCSI is to transmit the SCSI protocol over TCP/IP
iSCSI thus takes a similar approach to Fibre Channel SAN, the difference
being that in iSCSI a TCP/IP/Ethernet connection replaces the SCSI cable
What is iSCSI?
●

A SCSI transport protocol that operates over TCP/IP
Encapsulates SCSI CDBs (operational commands: e.g. read
or write) and data into TCP/IP byte streams
Allows IP hosts to access IP-based SCSI targets (either
natively or via iSCSI to FC Gateways)

●

Standards status
RFC 3720 on iSCSI
Collection of RFCs describing iSCSI
RFC 3347—iSCSI Requirements
RFC 3721—iSCSI Naming and Discover
RFC 3723—iSCSI Security
iSCSI
ISCSI refers to Internet Small Computer System Interface
Enable location-independent data storage and retrieval.
The protocol allows clients (called initiators) to send SCSI commands (CDBs)
to SCSI storage devices (targets) on remote servers.
It is a storage area network (SAN) protocol, allowing organizations to
consolidate storage into data center storage arrays while providing hosts
the illusion of locally attached disks.
Unlike traditional Fibre Channel, which requires special-purpose cabling,
iSCSI can be run over long distances using existing network
infrastructure.
Concept
iSCSI is often seen as a low-cost alternative to Fibre Channel, which
requires dedicated infrastructure except in its FCoE (Fibre Channel over
Ethernet) form.
●

●

iSCSI is a mapping of SCSI-3 to TCP, as a “SCSI transport”.

It behaves as a Serial SCSI transporter transferring SCSI packets
(commands, data, status and control messages ) over a TCP stream.
●

The idea is extremely simple, use existing building blocks ( SCSI, TCP ) to
implement another service.
●
iSCSI Layers
SCSI
iSCSI
Upper Functional Layers (e.g. SSL)
TCP
Lower Functional Layers (e.g. IPSec)
IP
LINK
IP Storage Networking
●

●
●
●

IP storage networking provides solution to carry
storage traffic within IP
Uses TCP: a reliable transport for delivery
Applicable to local data center and long-haul applications
Two primary protocols:
iSCSI—Internet-SCSI—used to transport SCSI CDBs and data
within TCP/IP connections

IP TCP

iSCSI

SCSI

Data

FCIP—Fibre-Channel-over-IP—used to transport Fibre Channel frames within
TCP/IP connections—any FC frame—not just SCSI

IP TCP

FCIP

FC

SCSI

Data
Objective of iSCSI SAN
iSCSI SANs often have one of two objectives:
Storage consolidation
Organizations move disparate storage resources from servers around their
network to central locations, often in data centers; this allows for more
efficiency in the allocation of storage.
Disaster recovery
Organizations mirror storage resources from one data center to a remote data
center, which can serve as a hot standby in the event of a prolonged outage.
In particular, iSCSI SANs allow entire disk arrays to be migrated across a
WAN with minimal configuration changes.
For Storage Consolidation
●

●

●

●

●

iS
CS
I

IP access to open
systems iSCSI and
Fibre Channel storage
iSCSI driver is loaded onto
hosts on Ethernet network
Able to consolidate servers
via iSCSI onto existing
storage arrays

●

iSC
SI

Storage assigned on a LUN-byLUN basis at iSCSI router

Logical Unit Number (LUN): A Field within SCSI
Containing up to 64 Bits that Identifies the Logically
Addressable Unit within a Target SCSI Device

iS
CS
I

iSCSI

iSCSI
Array
(Target)

Able to build Ethernet-based
SANs using iSCSI arrays

iSCSI-Enabled
Hosts
(Initiators)

IP
Network
iSCSI
Gateway
FC
Fabric

Storage
Pool (Target)

FC HBAAttached Host
(Initiator)
iSCSI Topologies
●
●

●

●

●

Point-to-point direct connections
Dedicated storage LAN, consisting of one or more LAN
segments
Shared LAN, carrying a mix of traditional LAN traffic plus
storage traffic
LAN-to-WAN extension using IP routers or carrier-provided "IP
Datatone"
Private networks and the public Internet
The following applications for
iSCSI are contemplated:
●

●

●

●

Local storage access, consolidation, clustering and pooling (as
in the data center)
Client access to remote storage e.g. a "storage service
provider“ (SSP)
Local and remote synchronous and asynchronous mirroring
between storage controllers
Local and remote backup and recovery
iSCSI and SCSI
●

●

●

The iSCSI protocol MUST NOT require changes to the SCSI-3
command sets and SCSI client code except to reflect lengthier
iSCSI target names and potentially lengthier timeouts.
All SCSI devices types SHOULD be supported, but iSCSI main
interest are disk and tape controllers
The iSCSI protocol MUST reliably transport SCSI commands
from the initiator to the target.
SCSI command protocol
●

●

●

●

●

●

SCSI standards also include an extensive set of command definitions
There are 4 categories of SCSI commands:
N (non-data)
W (writing data from initiator to target)
R (reading data)
B (bidirectional)
There are about 60 different SCSI commands in total
As commands sent in a CDB can be of 6,10,12,16 bytes but later versions
also allows for the variable length CDBs
Contain one byte Operation Code followed by some command specific
parameters.
Parameters length varies from one command to another command.
SCSI Commands
●

●

●

Test unit ready: Queries device to see if it is ready for data transfers
Inquiry: Returns basic device information.
Request sense: Returns any error codes from the previous command that returned an
error status.

●

Send diagnostic and Receive diagnostic results: runs a simple self-test

●

Start/Stop unit: Spins disks up and down, or loads/unloads media (CD, tape, etc.).

●

Read capacity: Returns storage capacity.

●

Format unit: Prepares a storage medium for use. In a disk, a low level format will occur.
Some tape drives will erase the tape in response to this command.

●

Read (four variants): Reads data from a device.

●

Write (four variants): Writes data to a device.

●

Log sense: Returns current information from log pages.

●

Mode sense: Returns current device parameters from mode pages.

●

Mode select: Sets device parameters in a mode page.
ISCSI Application
●

●

●

●

ISCSI target which is aka iSCSI server is responsible for exporting a block
device
ISCSI initiator that is iSCSI client is responsible for importing that block
device, formats that and make use of it.
LUN is the only part which is exported we actually doing changes to that
LUN and that automatically do the changes to the target machine
We can have multiple targets and security can be implemented on these
target levels
ISCSI Target (server)
●

●

●

Dedicated network-connected hard disk storage device
Exports a storage device as a LUN. The backed device could be a disk,
disk partition, LVM, RAID or file.
Uses ISCSI protocol that works over ethernet
How does it provides security?
●

IP/Network based Access

●

CHAP based initiator authentication

●

CHAP target authentication (Bidirectional,
initiator authenticates target)
iSCSI initiator
●

The client application used to connect to the iSCSI server

●

Send SCSI commands over the IP

●

Generic tasks involved:-

●

Discover targets at a given IP

●

Login, must use a node record id found by the discovery

●

Logout

●

Delete
Naming and Addressing
●
●
●

●

All iSCSI initiators and targets are named.
Each target or initiator is known by an iSCSI Name.
The iSCSI Name is independent of the location of
the initiator and target
A target also provides a default name called "iSCSI".
This is not a globally unique name. An initiator can
log into this default target name, and use a
command called "SendTargets" to retrieve a list of
iSCSI targets that exist at that address.
Naming and
Addressing(cont.)
●

●

●

ISCSI uses TCP (typically TCP ports 860 & 3260) for the
protocol itself with higher level names used to address the
objects within the protocol.
Special name refers to both iSCSI
iSCSI provides 3 name formats
- iSCSI Qualified Name (IQN)
- Extended Unique Identifier (EUI)
- T11 Network Address Authority (NAA)
Naming and
Addressing(cont.)
●

●

●

Standard internet lookup services SHOULD be used to resolve
names. For example, Domain Name Services (DNS) MAY be
used to resolve the <hostname> portion of the URL to one or
multiple IP addresses.
When a hostname resolves to multiple addresses, these
addresses should be equivalent for functional (possibly not
performance) purposes. This means that the addresses can be
used interchangeably as long as performance isn’t a concern.
For example, the same set of SCSI targets MUST be
accessible from each of these addresses.
Naming and
Addressing(cont.)
An iSCSI address is specified as a URL, such as:
<domain-name>[:<port>]/<iSCSI-name>
●
The <port> in the address is optional; it specified the TCP port
on which the target is listening for connections.
●
If <port> is not specified, a default port, to be assigned by
IANA, will be assumed.
●
Examples :
●

– iSCSI://diskfarm1.acme.com/iscsi
–
iSCSI://com
putingcenter.acme.com:4002/fqn.com.gateways.yourtargets.24
iSNS
●

●

●

iSCSI initiators can locate appropriate storage resources using the
Internet Storage Name Service (iSNS) protocol.
In theory, iSNS provides iSCSI SANs with the same management model
as dedicated Fibre Channel SANs.
In practice, administrators can satisfy many deployment goals for iSCSI
without using iSNS.
Security
●

●

●

●

●

Authentication: iSCSI initiators and targets prove their identity to each other using the CHAP
protocol, which includes a mechanism to prevent cleartext passwords from appearing on the
wire.
Logical Network Isolation: To ensure that only valid initiators connect to storage arrays,
administrators most commonly run iSCSI only over logically isolated backchannel networks.
Physical Network Isolation:In order to further differentiate iSCSI from the regular network and
prevent cabling mistakes when changing connections, administrators may implement selfdefined color-coding and labeling standards
Authorization: iSCSI storage arrays explicitly map initiators to specific target LUNs; an initiator
authenticates not to the storage array, but to the specific storage asset it intends to use
Confidentiality and Integrity: iSCSI operates as a cleartext protocol that provides no
cryptographic protection for data in motion during SCSI transactions. IP-based security
protocols, such as IPsec, provide standards-based cryptographic protection to this traffic.
iSCSI Challenges
●

●
●

●

While using TCP as a SCSI transport-layer might look straight
forward, there are challenges resulting from the different
environments of traditional SCSI and TCP.
SCSI was developed for reliable low-delays environments.
Taking SCSI to the WAN introduces unreliable environment of
high-delays.
Those different environments results with changes applied to
the SCSI protocol
References
●

http://titanpad.com/iSCSI
Connect To Me
●

Homepage: www.ssmanohar.in

●

Connect to me :Facebook
Twitter

●

Email: tuxophilia@gmail.com
info@ssmanohar.in
THANK YOU

Mais conteúdo relacionado

Mais procurados

Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1Chaing Ravuth
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking ExplainedThomas Graf
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentationSaqib Malik
 
The linux networking architecture
The linux networking architectureThe linux networking architecture
The linux networking architecturehugo lu
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linuxVarnnit Jain
 
Segment Routing
Segment RoutingSegment Routing
Segment RoutingAPNIC
 
MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)JuHwan Lee
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training PresentationRohit Singh
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment RoutingAPNIC
 
Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and PropertiesSaadi Rahman
 

Mais procurados (20)

NVMe overview
NVMe overviewNVMe overview
NVMe overview
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
CCNP Switching Chapter 1
CCNP Switching Chapter 1CCNP Switching Chapter 1
CCNP Switching Chapter 1
 
Linux Networking Explained
Linux Networking ExplainedLinux Networking Explained
Linux Networking Explained
 
Ospf.ppt
Ospf.pptOspf.ppt
Ospf.ppt
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
The linux networking architecture
The linux networking architectureThe linux networking architecture
The linux networking architecture
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
 
Segment Routing
Segment RoutingSegment Routing
Segment Routing
 
Iptables the Linux Firewall
Iptables the Linux Firewall Iptables the Linux Firewall
Iptables the Linux Firewall
 
Asa packet-flow-00
Asa packet-flow-00Asa packet-flow-00
Asa packet-flow-00
 
Link state protocols.ppt
Link state protocols.pptLink state protocols.ppt
Link state protocols.ppt
 
Hands-on ethernet driver
Hands-on ethernet driverHands-on ethernet driver
Hands-on ethernet driver
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)MP BGP-EVPN 실전기술-1편(개념잡기)
MP BGP-EVPN 실전기술-1편(개념잡기)
 
Ipv6
Ipv6Ipv6
Ipv6
 
CCNA Course Training Presentation
CCNA Course Training PresentationCCNA Course Training Presentation
CCNA Course Training Presentation
 
WAN SDN meet Segment Routing
WAN SDN meet Segment RoutingWAN SDN meet Segment Routing
WAN SDN meet Segment Routing
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and Properties
 

Destaque

iSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System InterfaceiSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System InterfaceManoj Singh
 
Chapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File SystemsChapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File Systemsaskme
 
Basics of IO techniques in Storage Technology Networks
Basics of IO techniques in Storage Technology NetworksBasics of IO techniques in Storage Technology Networks
Basics of IO techniques in Storage Technology NetworksSheel Sindhu Manohar
 
SCSI Vs. SATA Vs. IDE
SCSI Vs. SATA Vs. IDESCSI Vs. SATA Vs. IDE
SCSI Vs. SATA Vs. IDEnullhate7543
 
Micro channel architecture
Micro channel architectureMicro channel architecture
Micro channel architectureGichelle Amon
 
Presentation comparing server io consolidation solution with i scsi, infini...
Presentation   comparing server io consolidation solution with i scsi, infini...Presentation   comparing server io consolidation solution with i scsi, infini...
Presentation comparing server io consolidation solution with i scsi, infini...xKinAnx
 
Using Windows Storage Spaces and iSCSI on Amazon EBS
Using Windows Storage Spaces and iSCSI on Amazon EBSUsing Windows Storage Spaces and iSCSI on Amazon EBS
Using Windows Storage Spaces and iSCSI on Amazon EBSLaroy Shtotland
 
Linux Based Network Proposal
Linux Based Network ProposalLinux Based Network Proposal
Linux Based Network ProposalChris Riccio
 
Linux training
Linux trainingLinux training
Linux trainingartisriva
 
Network attached storage
Network attached storageNetwork attached storage
Network attached storageashutosh rai
 
Setting up network in an office
Setting up network in an officeSetting up network in an office
Setting up network in an officeMd. Tashnim
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Aventis Systems, Inc.
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Linux conf-admin
Linux conf-adminLinux conf-admin
Linux conf-adminbadamisri
 

Destaque (17)

iSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System InterfaceiSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System Interface
 
Chapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File SystemsChapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File Systems
 
Basics of IO techniques in Storage Technology Networks
Basics of IO techniques in Storage Technology NetworksBasics of IO techniques in Storage Technology Networks
Basics of IO techniques in Storage Technology Networks
 
SCSI Vs. SATA Vs. IDE
SCSI Vs. SATA Vs. IDESCSI Vs. SATA Vs. IDE
SCSI Vs. SATA Vs. IDE
 
A study of the value of local bus services to society
A study of the value of local bus services to societyA study of the value of local bus services to society
A study of the value of local bus services to society
 
Bus
BusBus
Bus
 
Micro channel architecture
Micro channel architectureMicro channel architecture
Micro channel architecture
 
Presentation comparing server io consolidation solution with i scsi, infini...
Presentation   comparing server io consolidation solution with i scsi, infini...Presentation   comparing server io consolidation solution with i scsi, infini...
Presentation comparing server io consolidation solution with i scsi, infini...
 
Using Windows Storage Spaces and iSCSI on Amazon EBS
Using Windows Storage Spaces and iSCSI on Amazon EBSUsing Windows Storage Spaces and iSCSI on Amazon EBS
Using Windows Storage Spaces and iSCSI on Amazon EBS
 
Linux Based Network Proposal
Linux Based Network ProposalLinux Based Network Proposal
Linux Based Network Proposal
 
Linux training
Linux trainingLinux training
Linux training
 
Network attached storage
Network attached storageNetwork attached storage
Network attached storage
 
Eisa
EisaEisa
Eisa
 
Setting up network in an office
Setting up network in an officeSetting up network in an office
Setting up network in an office
 
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
Answers to Your IT Nightmares - SAS, iSCSI, or Fibre Channel?
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Linux conf-admin
Linux conf-adminLinux conf-admin
Linux conf-admin
 

Semelhante a Detailed iSCSI presentation

Introduction to Storage.ppt
Introduction to Storage.pptIntroduction to Storage.ppt
Introduction to Storage.pptParam Eswaran
 
I scsi ov_whitepaper
I scsi ov_whitepaperI scsi ov_whitepaper
I scsi ov_whitepaperreachmekumar
 
Io Architecture
Io ArchitectureIo Architecture
Io ArchitectureAero Plane
 
Scsi drives
Scsi drivesScsi drives
Scsi drivesBits
 
Storage Area Network
Storage Area NetworkStorage Area Network
Storage Area NetworkRaphael Ejike
 
Storage networks
Storage networksStorage networks
Storage networksAhmed Nour
 
SAN vs NAS technology summary
SAN vs NAS technology summarySAN vs NAS technology summary
SAN vs NAS technology summaryswankymarsh5704
 
Storage Area networking and upcoming trends
Storage Area networking and upcoming trendsStorage Area networking and upcoming trends
Storage Area networking and upcoming trendsDeepanshu Lulla
 
Bus Standards and Networking
Bus Standards and NetworkingBus Standards and Networking
Bus Standards and NetworkingPrabu U
 
iSCSI and CLEAR-Flow
iSCSI and CLEAR-FlowiSCSI and CLEAR-Flow
iSCSI and CLEAR-FlowMUK Extreme
 
Setting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSESetting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSELeeDuncan16
 
BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!Linaro
 
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...247 Invest
 

Semelhante a Detailed iSCSI presentation (20)

Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Introduction to Storage.ppt
Introduction to Storage.pptIntroduction to Storage.ppt
Introduction to Storage.ppt
 
I scsi ov_whitepaper
I scsi ov_whitepaperI scsi ov_whitepaper
I scsi ov_whitepaper
 
Io Architecture
Io ArchitectureIo Architecture
Io Architecture
 
Pcie basic
Pcie basicPcie basic
Pcie basic
 
Scsi drives
Scsi drivesScsi drives
Scsi drives
 
SCSI Interfaces
SCSI InterfacesSCSI Interfaces
SCSI Interfaces
 
Storage Area Network
Storage Area NetworkStorage Area Network
Storage Area Network
 
Securing the local area network
Securing the local area networkSecuring the local area network
Securing the local area network
 
Storage networks
Storage networksStorage networks
Storage networks
 
SAN vs NAS technology summary
SAN vs NAS technology summarySAN vs NAS technology summary
SAN vs NAS technology summary
 
Storage Area networking and upcoming trends
Storage Area networking and upcoming trendsStorage Area networking and upcoming trends
Storage Area networking and upcoming trends
 
Storage Managment
Storage ManagmentStorage Managment
Storage Managment
 
Bus Standards and Networking
Bus Standards and NetworkingBus Standards and Networking
Bus Standards and Networking
 
iSCSI and CLEAR-Flow
iSCSI and CLEAR-FlowiSCSI and CLEAR-Flow
iSCSI and CLEAR-Flow
 
Setting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSESetting up iSCSI Providers and Clients in openSUSE
Setting up iSCSI Providers and Clients in openSUSE
 
BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!BKK16-103 OpenCSD - Open for Business!
BKK16-103 OpenCSD - Open for Business!
 
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
White Paper: Smart Style Office as iSCSI Target for Storage Array and Storage...
 
Module 06 (1).pdf
Module 06 (1).pdfModule 06 (1).pdf
Module 06 (1).pdf
 
IP storage
IP storageIP storage
IP storage
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Detailed iSCSI presentation

  • 1. Internet Small Computer System Interface iSCSI Sheel Sindhu Manohar IWC2013011 tuxophilia@gmail.com
  • 8. SCSI ● ● ● ● ● ● Small Computer System Interface (SCSI) technology for I/O buses in Unix and PC servers. SCSI protocol defines how the devices communicate with each other via the SCSI bus. It specifies how the devices reserve the SCSI bus and in which format data is transferred. The SCSI protocol introduces SCSI IDs (aka. called target ID or just ID) and Logical Unit Numbers (LUNs) for the addressing of devices. The server can be equipped with many SCSI controllers. The operating system must note three things for the differentiation of devices – controller ID, SCSI ID and LUN.
  • 9. SCSI (2) ● ● ● ● Devices (servers and storage devices) must reserve the SCSI bus (arbitrate) before they may send data through it. During the arbitration of the bus, the device that has the highest priority SCSI ID always wins. Lower priorities never being allowed to send data if higher priority bus is heavily loaded SCSI devices connected in the form of daisy chain.
  • 10. The SCSI I/O Channel ● ● ● SCSI is the dominant protocol used to communicate between servers and storage devices in open system SCSI I/O channel is a half-duplex pipe for SCSI CDBs and data Parallel bus evolution Bus width: 8, 16 bits Bus speed: 5–80 Mhz Throughput: 5–320 MBps Devices/bus: 2–16 devices Cable length: 1.5m–25m ● A network approach can scale the I/O channel in many areas (length, devices, speed) Applications Raw File System Block Device SCSI Generic TCP/IP Stack NIC Driver Ethernet NIC Ethernet SCSI CDB: SCSI Command Descriptor Block Used to Relay SCSI Commands, Parameters, and Status between SCSI Initiators and SCSI Targets; Typically 6, 10, or 12 Byte Block Adapter Driver Half-Duplex SCSI I/O Channel SCSI SCSI Adapter SCSI Initiator SCSI Target
  • 11. SCSI and Storage Network ● SCSI suitable for the deployment of storage networks upto limited degree ● SCSI daisy chain can only connect a very few devices with each other. ● ● ● ● Although it is theoretically possible to connect several servers to a SCSI bus, this does not work very well in practice. The maximum lengths of SCSI buses greatly limit the construction of storage networks. Large disk subsystems have over 30 connection ports for SCSI cables Extend the length of the SCSI buses with so-called link extenders, the use of a large number of link extenders is unwieldy. SCSI having advantage that transition of SCSI cables to storage networks remains hidden from applications and higher layers
  • 12. Different type of SCSI Interfaces
  • 13. IP Based Storage ● ● IP storage is an approach to build storage networks upon TCP, IP and Ethernet. Three protocols are available for transmitting storage data traffic over TCP/IP: - iSCSI, - Internet FCP (iFCP) - Fibre Channel over IP (FCIP) ● The basic idea behind iSCSI is to transmit the SCSI protocol over TCP/IP iSCSI thus takes a similar approach to Fibre Channel SAN, the difference being that in iSCSI a TCP/IP/Ethernet connection replaces the SCSI cable
  • 14. What is iSCSI? ● A SCSI transport protocol that operates over TCP/IP Encapsulates SCSI CDBs (operational commands: e.g. read or write) and data into TCP/IP byte streams Allows IP hosts to access IP-based SCSI targets (either natively or via iSCSI to FC Gateways) ● Standards status RFC 3720 on iSCSI Collection of RFCs describing iSCSI RFC 3347—iSCSI Requirements RFC 3721—iSCSI Naming and Discover RFC 3723—iSCSI Security
  • 15. iSCSI ISCSI refers to Internet Small Computer System Interface Enable location-independent data storage and retrieval. The protocol allows clients (called initiators) to send SCSI commands (CDBs) to SCSI storage devices (targets) on remote servers. It is a storage area network (SAN) protocol, allowing organizations to consolidate storage into data center storage arrays while providing hosts the illusion of locally attached disks. Unlike traditional Fibre Channel, which requires special-purpose cabling, iSCSI can be run over long distances using existing network infrastructure.
  • 16. Concept iSCSI is often seen as a low-cost alternative to Fibre Channel, which requires dedicated infrastructure except in its FCoE (Fibre Channel over Ethernet) form. ● ● iSCSI is a mapping of SCSI-3 to TCP, as a “SCSI transport”. It behaves as a Serial SCSI transporter transferring SCSI packets (commands, data, status and control messages ) over a TCP stream. ● The idea is extremely simple, use existing building blocks ( SCSI, TCP ) to implement another service. ●
  • 17. iSCSI Layers SCSI iSCSI Upper Functional Layers (e.g. SSL) TCP Lower Functional Layers (e.g. IPSec) IP LINK
  • 18. IP Storage Networking ● ● ● ● IP storage networking provides solution to carry storage traffic within IP Uses TCP: a reliable transport for delivery Applicable to local data center and long-haul applications Two primary protocols: iSCSI—Internet-SCSI—used to transport SCSI CDBs and data within TCP/IP connections IP TCP iSCSI SCSI Data FCIP—Fibre-Channel-over-IP—used to transport Fibre Channel frames within TCP/IP connections—any FC frame—not just SCSI IP TCP FCIP FC SCSI Data
  • 19. Objective of iSCSI SAN iSCSI SANs often have one of two objectives: Storage consolidation Organizations move disparate storage resources from servers around their network to central locations, often in data centers; this allows for more efficiency in the allocation of storage. Disaster recovery Organizations mirror storage resources from one data center to a remote data center, which can serve as a hot standby in the event of a prolonged outage. In particular, iSCSI SANs allow entire disk arrays to be migrated across a WAN with minimal configuration changes.
  • 20. For Storage Consolidation ● ● ● ● ● iS CS I IP access to open systems iSCSI and Fibre Channel storage iSCSI driver is loaded onto hosts on Ethernet network Able to consolidate servers via iSCSI onto existing storage arrays ● iSC SI Storage assigned on a LUN-byLUN basis at iSCSI router Logical Unit Number (LUN): A Field within SCSI Containing up to 64 Bits that Identifies the Logically Addressable Unit within a Target SCSI Device iS CS I iSCSI iSCSI Array (Target) Able to build Ethernet-based SANs using iSCSI arrays iSCSI-Enabled Hosts (Initiators) IP Network iSCSI Gateway FC Fabric Storage Pool (Target) FC HBAAttached Host (Initiator)
  • 21. iSCSI Topologies ● ● ● ● ● Point-to-point direct connections Dedicated storage LAN, consisting of one or more LAN segments Shared LAN, carrying a mix of traditional LAN traffic plus storage traffic LAN-to-WAN extension using IP routers or carrier-provided "IP Datatone" Private networks and the public Internet
  • 22. The following applications for iSCSI are contemplated: ● ● ● ● Local storage access, consolidation, clustering and pooling (as in the data center) Client access to remote storage e.g. a "storage service provider“ (SSP) Local and remote synchronous and asynchronous mirroring between storage controllers Local and remote backup and recovery
  • 23. iSCSI and SCSI ● ● ● The iSCSI protocol MUST NOT require changes to the SCSI-3 command sets and SCSI client code except to reflect lengthier iSCSI target names and potentially lengthier timeouts. All SCSI devices types SHOULD be supported, but iSCSI main interest are disk and tape controllers The iSCSI protocol MUST reliably transport SCSI commands from the initiator to the target.
  • 24. SCSI command protocol ● ● ● ● ● ● SCSI standards also include an extensive set of command definitions There are 4 categories of SCSI commands: N (non-data) W (writing data from initiator to target) R (reading data) B (bidirectional) There are about 60 different SCSI commands in total As commands sent in a CDB can be of 6,10,12,16 bytes but later versions also allows for the variable length CDBs Contain one byte Operation Code followed by some command specific parameters. Parameters length varies from one command to another command.
  • 25. SCSI Commands ● ● ● Test unit ready: Queries device to see if it is ready for data transfers Inquiry: Returns basic device information. Request sense: Returns any error codes from the previous command that returned an error status. ● Send diagnostic and Receive diagnostic results: runs a simple self-test ● Start/Stop unit: Spins disks up and down, or loads/unloads media (CD, tape, etc.). ● Read capacity: Returns storage capacity. ● Format unit: Prepares a storage medium for use. In a disk, a low level format will occur. Some tape drives will erase the tape in response to this command. ● Read (four variants): Reads data from a device. ● Write (four variants): Writes data to a device. ● Log sense: Returns current information from log pages. ● Mode sense: Returns current device parameters from mode pages. ● Mode select: Sets device parameters in a mode page.
  • 26. ISCSI Application ● ● ● ● ISCSI target which is aka iSCSI server is responsible for exporting a block device ISCSI initiator that is iSCSI client is responsible for importing that block device, formats that and make use of it. LUN is the only part which is exported we actually doing changes to that LUN and that automatically do the changes to the target machine We can have multiple targets and security can be implemented on these target levels
  • 27. ISCSI Target (server) ● ● ● Dedicated network-connected hard disk storage device Exports a storage device as a LUN. The backed device could be a disk, disk partition, LVM, RAID or file. Uses ISCSI protocol that works over ethernet
  • 28. How does it provides security? ● IP/Network based Access ● CHAP based initiator authentication ● CHAP target authentication (Bidirectional, initiator authenticates target)
  • 29. iSCSI initiator ● The client application used to connect to the iSCSI server ● Send SCSI commands over the IP ● Generic tasks involved:- ● Discover targets at a given IP ● Login, must use a node record id found by the discovery ● Logout ● Delete
  • 30. Naming and Addressing ● ● ● ● All iSCSI initiators and targets are named. Each target or initiator is known by an iSCSI Name. The iSCSI Name is independent of the location of the initiator and target A target also provides a default name called "iSCSI". This is not a globally unique name. An initiator can log into this default target name, and use a command called "SendTargets" to retrieve a list of iSCSI targets that exist at that address.
  • 31. Naming and Addressing(cont.) ● ● ● ISCSI uses TCP (typically TCP ports 860 & 3260) for the protocol itself with higher level names used to address the objects within the protocol. Special name refers to both iSCSI iSCSI provides 3 name formats - iSCSI Qualified Name (IQN) - Extended Unique Identifier (EUI) - T11 Network Address Authority (NAA)
  • 32. Naming and Addressing(cont.) ● ● ● Standard internet lookup services SHOULD be used to resolve names. For example, Domain Name Services (DNS) MAY be used to resolve the <hostname> portion of the URL to one or multiple IP addresses. When a hostname resolves to multiple addresses, these addresses should be equivalent for functional (possibly not performance) purposes. This means that the addresses can be used interchangeably as long as performance isn’t a concern. For example, the same set of SCSI targets MUST be accessible from each of these addresses.
  • 33. Naming and Addressing(cont.) An iSCSI address is specified as a URL, such as: <domain-name>[:<port>]/<iSCSI-name> ● The <port> in the address is optional; it specified the TCP port on which the target is listening for connections. ● If <port> is not specified, a default port, to be assigned by IANA, will be assumed. ● Examples : ● – iSCSI://diskfarm1.acme.com/iscsi – iSCSI://com putingcenter.acme.com:4002/fqn.com.gateways.yourtargets.24
  • 34. iSNS ● ● ● iSCSI initiators can locate appropriate storage resources using the Internet Storage Name Service (iSNS) protocol. In theory, iSNS provides iSCSI SANs with the same management model as dedicated Fibre Channel SANs. In practice, administrators can satisfy many deployment goals for iSCSI without using iSNS.
  • 35. Security ● ● ● ● ● Authentication: iSCSI initiators and targets prove their identity to each other using the CHAP protocol, which includes a mechanism to prevent cleartext passwords from appearing on the wire. Logical Network Isolation: To ensure that only valid initiators connect to storage arrays, administrators most commonly run iSCSI only over logically isolated backchannel networks. Physical Network Isolation:In order to further differentiate iSCSI from the regular network and prevent cabling mistakes when changing connections, administrators may implement selfdefined color-coding and labeling standards Authorization: iSCSI storage arrays explicitly map initiators to specific target LUNs; an initiator authenticates not to the storage array, but to the specific storage asset it intends to use Confidentiality and Integrity: iSCSI operates as a cleartext protocol that provides no cryptographic protection for data in motion during SCSI transactions. IP-based security protocols, such as IPsec, provide standards-based cryptographic protection to this traffic.
  • 36. iSCSI Challenges ● ● ● ● While using TCP as a SCSI transport-layer might look straight forward, there are challenges resulting from the different environments of traditional SCSI and TCP. SCSI was developed for reliable low-delays environments. Taking SCSI to the WAN introduces unreliable environment of high-delays. Those different environments results with changes applied to the SCSI protocol
  • 38. Connect To Me ● Homepage: www.ssmanohar.in ● Connect to me :Facebook Twitter ● Email: tuxophilia@gmail.com info@ssmanohar.in