SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
iSCSI: Protocol and
Functionality

David L. Black, Ph.D.
EMC Corporation
Session Goals

Ÿ   Explain what iSCSI is
    –   And the structure of the iSCSI protocol stack
Ÿ   Explain how iSCSI provides storage access
    –   And how it fits into storage and network infrastructure
Ÿ   Explain how an iSCSI session is established
    –   Plus cover security, boot, multipathing, etc.



    NOTE: This is a technology session
             Product specifics are covered in other sessions
Introduction

Ÿ   What is iSCSI?
    –   Internet Small Computer Systems Interface
    –   SCSI storage access over TCP/IP networks
Ÿ   Why is iSCSI interesting?
    –   Reuse existing IP infrastructure and skills
    –   IP protocols have better interoperability track records
    –   Security can be better in IP networks
Ÿ   iSCSI reuses networking and storage concepts
    –   Next few slides: Review important basic concepts
IP Network Layers
   7 - Application                     Web Browser
                      Application
   6 - Presentation                       HTML
                      Data Formats
   5 - Session                            HTTP
                      App. Protocol
   4 - Transport                           TCP
                      Stream or Msg.
   3 - Network                              IP
                      Internetwork
   2 - Link                            100 Mbit Enet
                      Access/Framing
   1 - Physical                        Cat 5e Cable
                      Fiber/Wires
IP Network Layers – In Practice
   7 - Application                    Web/HTML
                     Application


   5 - Session                           HTTP
                     App. Protocol
   4 - Transport                          TCP
                     Stream or Msg.
   3 - Network                             IP
                     Internetwork
   2 - Link                           100 Mbit Enet
                     Access/Framing
   1 - Physical                       Cat 5e Cable
                     Fiber/Wires
Fibre Channel Layers

                Upper-layer protocols
       FC-4
                (FCP (SCSI), VI, FICON, IP, etc.)
       (ULP)

                Common services
       FC-3
                Frames and signaling protocols
       FC-2
                8b/10b coding and protocol
       FC-1
                Wire/fiber and transceivers
       FC-0
SCSI Concepts

Ÿ Initiator connects to Target
   – Host connects to storage device
Ÿ Target exports Logical Units
   – Storage device exports volumes
Ÿ Logical Units have Logical Unit Numbers (LUNs)
   – Numbering is per target
   – Same LU may have different LUNs at different targets
Ÿ Active discovery
   – SCSI “Bus Walker” finds accessible targets
IP Storage Network Scenarios and Protocols
                                             = IP
Native                                       = FC
l    All Ethernet (no Fibre Channel)
l    iSCSI protocol
l    Standard Ethernet switches and
     routers

Bridging
 l   Servers Ethernet attached
 l   Storage Fibre Channel attached
 l   iSCSI protocol



Extension
l    Servers and storage on SAN
l    FCIP or iFCP protocol
l    Host-to-storage or replication
iSCSI Overview

Ÿ Internet Small Computer Systems Interface
Ÿ Provides storage access over TCP/IP networks
   – Maps SCSI functionality to TCP/IP protocol
   – Similar to mapping SCSI over Fibre Channel (FCP)
Ÿ Network protocol
   – Peer to HTTP, NFS, FTP, Telnet, etc. (uses TCP)
Ÿ Can be used with existing IP & Ethernet networks
   – NICs, switches, routers, etc.
Dedicated Native iSCSI


                                   Native
                                   iSCSI
                                  Adapters




Servers
  with               IP Network
Std.NICs




                                      Native
                                      iSCSI
                                                IP
                                     Adapters
                                                FC
Existing
                                             FC
 Add-On Bridged iSCSI (Switch Blade)        SAN




Servers                                  iSCSI
  with                                   Bridge
                     IP Network
Std.NICs                               in Switch
                                        (Blade)




                                                      IP
                                                      FC
iSCSI Relationship to Other SCSI Protocols
                 SCSI Architecture (SAM)
                  & Commands (SCSI-3)
                                                      Fibre Channel

                                                        VI   FICON   IP (RFC 4338)
                                           FCP

                                      FC-4
                                     (ULP)
      Parallel
       SCSI                                           FC-2
                          iSCSI                       FC-1
                           TCP                        FC-0
                            IP

     SCSI Cables

                          Any IP                   FC Fibers,
                         Network                 Hubs, Switches
iSCSI Protocol Stack

       Initiator                    Target

        SCSI                        SCSI

        iSCSI                       iSCSI

         TCP                        TCP

          IP                         IP

        IPsec                       IPsec

         Link                       Link

                       IP Network
Data Encapsulation into Network Packets
      Ethernet                                                    CRC
                      IP                                Data
                                           iSCSI
      Header                    TCP



                                            Delivery of iSCSI Protocol Data
                                            Unit (PDU) for SCSI
                                            functionality (initiator, target,
                                            data read/write, etc.)
                                Reliable data transport and delivery (TCP
                                Windows, ACKs, ordering, etc.) Also
                                demux within node (port numbers)

                     Provides IP “routing” capability so that packet can
                     find its way through the network
     Provides physical network capability (Cat 5, MAC, etc.)
SCSI to iSCSI Mapping


                        SCSI Command and Data

     iSCSI PDU            iSCSI PDU               iSCSI PDU              iSCSI PDU

   Header              Header                 Header                   Header
             Data                 Data                      Data                 Data


    IP                         IP
             IP       IP                                       IP        IP       IP
                                          IP        IP
   Packet                     Packet
            Packet   Packet                                   Packet    Packet   Packet
                                         Packet    Packet




   iSCSI PDU alignment
    with packets varies
iSCSI Concepts

Ÿ iSCSI Session: One Initiator and one Target
   – Multiple TCP connections allowed in a session
       § Exploit network parallelism
       § Error recovery possible across connections

Ÿ Most communication is based on SCSI
   – e.g., Ready to Transmit (R2T) for target flow control
Ÿ Important iSCSI additions to SCSI
   – Immediate and unsolicited data to avoid round trip
   – Login phase for connection setup
       § Text-based parameter negotiation
   – Explicit logout for clean teardown
iSCSI Read Example

                                          Target
       Initiator
      SCSI Read
                                          Data in PDU
      Command

                                           Target
                                          Data in PDU

        Receive                           Data in PDU
         Data




                                            Status
       Command
       Complete
                        Optimization:
                      Good status can
                      be included with
                     last “Data in” PDU
iSCSI Write Example
                      Target
     Initiator
                      Ready to
    SCSI Write
                      Transmit
    Command
                        (R2T)
                                   Optimization:
                                   Immediate or
    Data out PDU      Receive
                                  unsolicited data
                       Data
    Data out PDU
                                 avoids a round trip

                        R2T
    Data out PDU

    Data out PDU

                      Receive
                       Data



     Command
                       Status
     Complete
Establishing an iSCSI Session

Ÿ Naming: Identify storage to access (target) [What]
   – Also identify initiator that wants to access storage
   – Naming is location-independent (unlike Fibre Channel)
Ÿ Discovery: Find storage to access [Where]
   – SCSI “Bus Walker” doesn’t scale to IP networks
Ÿ Login: Establish connections to storage [How]
   – Parameter negotiation prior to reads/writes
   – Login occurs on each TCP connection
iSCSI Naming [What]

Ÿ Design rationale
   – Targets may share <IP address, TCP port>
   – Initiators and targets may have multiple IP addresses
   – Unique names are important for third-party commands
Ÿ iSCSI names: Globally unique
   – EUI-based (type of WWN)
      § eui.5006048dc7dfb1af
   – IQN: Reversed hostname (DNS) as naming authority
      § iqn.1991-05.com.microsoft:WindowsSystem1
   – NAA-based (more WWNs, including long WWNs)
      § naa.62004567BA64678D0123456789ABCDEF
Ÿ Intended usage: iSCSI name per operating system instance
   – Regardless of the number of interfaces (NICs/HBAs)
iSCSI Discovery [Where]

Ÿ SCSI discovery paradigm
   – “Bus Walker” looks for targets
   – Exhaustive search doesn’t work in IP networks
Ÿ iSCSI discovery mechanisms
   – Small scale: Static configuration and SendTargets
      § Simple configuration mechanisms
   – Intermediate scale: SLP
      § Based on multicast or simple directory agent
   – Large scale: iSNS
      § Rich name service, similar to services provided by FC fabric
      § SLP can be used to discover iSNS Server
Static Configuration and SendTargets

Ÿ Static configuration: Tell initiator about target(s)
   – iSCSI target name and location (e.g., IP address, port)
       § iSCSI default TCP port: 3260
   – Simple mechanism, does not scale well
       § Especially if information is entered manually

Ÿ SendTargets command: Better scaling
   – Initiator issues SendTargets
   – Target responds with iSCSI names of targets
       § Also IP addresses and TCP ports if they differ
   – Moves most configuration from initiator to target
       § Only have to tell initiator an address of target system
       § Target provides the rest of the information
SLP (Service Location Protocol)

Ÿ Major SLP components
   – User Agent (UA) – Find services to use
   – Service Agent (SA) – Advertise services for use
   – Directory Agent (DA) – Connect users to services
Ÿ SLP function for iSCSI
   – Target advertises name:IP address:port
       § Either to DA in the network or on its own
   – Initiator contacts DA for target information
       § If no DA configured, use multicast to find targets
       § DA usage recommended if multicast is restricted
   – iSCSI template identifies iSCSI services in SLP
SLP Structures


            Directory Agent

                                                               Service Request
Service                       Service Registration
                                                                Service Reply
Request

                                                     User Agent                  Service Agent
                                                      (Initiator)                   (Target)



 User Agent               Service Agent
  (Initiator)                (Target)



                                 Directory Agent structure
                                   has better scalability
iSNS (Storage Name Service)

Ÿ Modeled on Fibre Channel Name Server
   – Discovery domains: Similar to soft FC zones
Ÿ Scalable discovery and configuration management
   – Asynchronous notification of changes
Ÿ Initiator retrieves all iSCSI target info from iSNS
   – Rich information repository (e.g., IPsec config info)
   – Enables more centralization of management
iSNS Structure
                          Management Platform

                                                  iSNS can be integral to
                                                  the cloud or management
                                                  station
                                                   Device B




                              iSNS
                               iSNS

                                                                Two
                                                                Discovery
                                            Device A
                                                                Domains
            Host A
                     Host B        Host C
                                            Domains are similar to Fibre
                                            Channel zones, e.g., Host C
                                             will not discover Device B
Login [How]

Ÿ Two types of login sessions
   – Discovery (SendTargets)
   – Normal (after any discovery mechanism)
Ÿ Normal login phases
   1. Security negotiation
   2. Operational parameter negotiation
   3. Full feature (perform I/O)
Ÿ Login uses text-based parameter negotiation
   – Syntax: key=value (or list of values)
   – Designed for extensibility
Additional iSCSI Topics

Ÿ Security – Protect valuable data
Ÿ Error handling – Things will go wrong
Ÿ Implementation classes – NICs and HBAs
Ÿ Multipathing – Important HA mechanisms
Ÿ Boot – Yes, it can be done
Security Properties

Ÿ Authentication: Who are you? Prove it!
   – Mutual authentication: Initiator to Target AND vice versa
Ÿ Integrity: Has this data been tampered with?
   – Cryptographic integrity, not just checksum or CRC
   – Linked to authentication to prevent regeneration attack
Ÿ Authorization: What are you allowed to do?
   – iSCSI: Who can connect to which Target
   – LUN masking & mapping handled by SCSI, not iSCSI
Ÿ Confidentiality: Has this data been disclosed?
Ÿ iSCSI: Usage is optional – subject to negotiation
iSCSI Security: Protect Valuable Data

Ÿ Secure IP connection
   – Integrity, authentication, and confidentiality
   – Based on IKEv1 and ESP (IPsec components)
Ÿ Extensive applied security requirements
   – Selection of Integrity (MAC) and encryption algorithms
   – Profile for usage of IKEv1 authentication and key management
Ÿ Inband authentication (part of Login)
   – SRP, CHAP, Kerberos, and other mechanisms
   – CHAP with strong secrets is required
      § Can’t use passwords
   – iSCSI CHAP: Stronger than basic CHAP
      § When specification is followed
CHAP Authentication Protocol

Ÿ Based on shared secret, random challenge
   – Uses a secure (one-way) hash, usually MD5
   – One-way hash: Computationally infeasible to invert

 Secret
                                      Challenge     Secret



  Hash
                                                  Hash
     Response
                                                                Can be
                                                     =?
                                                             outsourced to
                                                             RADIUS serve
     Host                                  Storage
iSCSI Error Detection

Ÿ Sequence numbers detect missing things
   – Commands, responses, data blocks
   – Goal: Avoid SCSI retry if at all possible
   – Command sequencing also used for flow control
      § Sliding window of commands target will accept
      § Data flow control: R2T (Ready to Transmit) mechanism

Ÿ Optional digests improve communication integrity
   – In addition to TCP checksum and Ethernet CRC
   – New 32-bit CRC polynomial (not the Ethernet CRC-32)
   – Separate CRCs computed over header and data
      § Allows an iSCSI proxy (e.g., router) to preserve data CRC
iSCSI Error Recovery: Three Levels

Ÿ Error recovery level 0: Session recovery
   – Basic recovery mechanism that always works
   – Recover by session restart (close all TCP connections)
Ÿ Error recovery level 1: Digest failure recovery
   – Recover from digest failure without session restart
   – Recover by reissuing commands, data and/or status on same
     connection
Ÿ Error recovery level 2: Connection recovery
   – Open new TCP connection to replace failed connection
   – New connection picks up at point where old one failed
Ÿ Error recovery level negotiated during login
iSCSI Implementation Classes

Ÿ NIC: iSCSI driver in software, standard NIC
   –   Utilizes operating system TCP/IP stack
   –   Link aggregation is below iSCSI driver
   –   Digests and IPsec handled by software
   –   Higher CPU utilization (but not prohibitive)
Ÿ HBA: Offload both TCP/IP and iSCSI
   –   Appears as a SCSI controller to the operating system
   –   Digests and IPsec handled by hardware
   –   Lower CPU utilization due to full offload
   –   Harder to support link aggregation and iSCSI sessions that span
       multiple HBAs
iSCSI Multipathing Mechanisms

Ÿ Ethernet trunking
   – Link layer (2), below TCP, transparent to iSCSI
Ÿ Multiple TCP connections
   – In a single iSCSI session (layer 5)
   – Same or different hardware (Ethernet) ports
   – Difficult when TCP and iSCSI are offloaded
Ÿ Multiple iSCSI sessions
   – Multipathing software (e.g., PowerPath) above iSCSI
   – Same or different hardware (e.g., Ethernet) ports
Ÿ iSCSI also supports HTTP-style redirects
   – Target has been temporarily or permanently moved
iSCSI Boot

Ÿ Have to discover the boot target
   – Can use DHCP (root path option) for this
   – Boot is usually from LUN zero
Ÿ Boot requires early access to system volume
   – Must be available prior to operating system running
   – iSCSI protocol can support booting
Ÿ NIC and iSCSI software driver: Have to modify OS
   – PXE (DHCP + TFTP) can download modified OS image
   – Int 13 BIOS boot: Need iSCSI driver in system BIOS
Ÿ HBA: No OS modifications needed
   – Int 13 BIOS boot: iSCSI can be in HBA card BIOS
iSCSI Status

Ÿ iSCSI protocol specification: Done
   – IETF RFC 3720 – April 2004
Ÿ iSCSI ancillary documents: Done
   – Naming, discovery, management, MIBs - most published as RFCs
Ÿ New document: iSCSI Corrections and Clarifications
   – Clarification of issues that have arisen in implementations
Ÿ New work area: iSER (Done)
   – iSER = iSCSI extensions for RDMA
       § RDMA = Remote Direct Memory Access (remote DMA)
   – Extend iSCSI to exploit RDMA
       § IP RDMA – IETF Remote Direct Data Placement (rddp) WG
   – iSER also used over InfiniBand
       § Alternative to SRP – SCSI RDMA Protocol
iSCSI: Summary and Conclusion

Ÿ iSCSI: SCSI storage access over TCP/IP networks
   – Protocol stack: SCSI, iSCSI, TCP, IP (& IPsec), Ethernet
   – Works over any IP network, not just Ethernet
Ÿ iSCSI transports SCSI commands and data
   – Native iSCSI storage access
   – Bridged access to Fibre Channel storage
Ÿ iSCSI session establishment
   –   Target naming (multiple formats) [What]
   –   Target discovery (multiple mechanisms) [Where]
   –   Login negotiation (multiple parameters) [How]
   –   Followed by: Full feature phase (e.g., reads and writes)
SCSI Protocols and Standards Organizations

                   SCSI Architecture (SAM)
                                                                                T11
                    & Commands (SCSI-3)
                                                        Fibre Channel
 T10                                                      VI   FICON       IP (RFC 4338)
                                             FCP



        Parallel
         SCSI                                           FC-2
                                                                                TCP
                            iSCSI                       FC-1
                                                                    FCIP
                             TCP                        FC-0                     IP
                                                                    iFCP
                              IP
                                       IETF
       SCSI Cables

                            Any IP                   FC Fibers,               Any IP
                           Network                 Hubs, Switches            Network
Standards Organizations

Ÿ SCSI: T10
   – www.t10.org
Ÿ Fibre Channel: T11
   – www.t11.org
Ÿ IETF IP Storage Working Group
   – http://www.ietf.org/html.charters/ips-charter.html
       § Latest versions of drafts are linked to that page
   – Chair: David L. Black (EMC)
Ÿ Active coordination on overlapping matters
iSCSI Protocol and Functionality

Mais conteúdo relacionado

Mais procurados

Linux Boot Process
Linux Boot ProcessLinux Boot Process
Linux Boot Processdarshhingu
 
Memory management
Memory managementMemory management
Memory managementcpjcollege
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-VMark Wilson
 
Linux Internals - Kernel/Core
Linux Internals - Kernel/CoreLinux Internals - Kernel/Core
Linux Internals - Kernel/CoreShay Cohen
 
Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and PropertiesSaadi Rahman
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
Swap-space Management
Swap-space ManagementSwap-space Management
Swap-space ManagementAgnas Jasmine
 
Linux Initialization Process (2)
Linux Initialization Process (2)Linux Initialization Process (2)
Linux Initialization Process (2)shimosawa
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsKuber Chandra
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4Vepsun Technologies
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernelguest547d74
 

Mais procurados (20)

operating system structure
operating system structureoperating system structure
operating system structure
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory Management
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Linux Boot Process
Linux Boot ProcessLinux Boot Process
Linux Boot Process
 
Memory management
Memory managementMemory management
Memory management
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Linux Internals - Kernel/Core
Linux Internals - Kernel/CoreLinux Internals - Kernel/Core
Linux Internals - Kernel/Core
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and Properties
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Swap-space Management
Swap-space ManagementSwap-space Management
Swap-space Management
 
Linux Initialization Process (2)
Linux Initialization Process (2)Linux Initialization Process (2)
Linux Initialization Process (2)
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) Basics
 
VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4VMware Advance Troubleshooting Workshop - Day 4
VMware Advance Troubleshooting Workshop - Day 4
 
Operating System Scheduling Algorithms
Operating System Scheduling AlgorithmsOperating System Scheduling Algorithms
Operating System Scheduling Algorithms
 
Raid
RaidRaid
Raid
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 
Introduction to DPDK RIB library
Introduction to DPDK RIB libraryIntroduction to DPDK RIB library
Introduction to DPDK RIB library
 

Destaque

Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep diveAnimesh Singh
 
OpenStack Load Balancer as a Service (LBaaS) with openSUSE Leap
OpenStack Load Balancer as a Service (LBaaS) with openSUSE LeapOpenStack Load Balancer as a Service (LBaaS) with openSUSE Leap
OpenStack Load Balancer as a Service (LBaaS) with openSUSE LeapSaputro Aryulianto
 
Building a Production Grade PostgreSQL Cloud Foundry Service | anynines
Building a Production Grade PostgreSQL Cloud Foundry Service  | anyninesBuilding a Production Grade PostgreSQL Cloud Foundry Service  | anynines
Building a Production Grade PostgreSQL Cloud Foundry Service | anyninesanynines GmbH
 
Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...
Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...
Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...CAFxX
 
Cloud Foundry Days Tokyo 2016
Cloud Foundry Days Tokyo 2016Cloud Foundry Days Tokyo 2016
Cloud Foundry Days Tokyo 2016Chip Childers
 
Garden introduction for dea users public
Garden introduction for dea users   publicGarden introduction for dea users   public
Garden introduction for dea users publicTakehiko Amano
 
Circle of Code with Cloud Foundry
Circle of Code with Cloud FoundryCircle of Code with Cloud Foundry
Circle of Code with Cloud FoundryTomohiro Ichimura
 
Routeサービスを使ったCloud FoundryアプリのAPI管理
Routeサービスを使ったCloud FoundryアプリのAPI管理Routeサービスを使ったCloud FoundryアプリのAPI管理
Routeサービスを使ったCloud FoundryアプリのAPI管理Kazuchika Sekiya
 
OpenStack - heat on boarding
OpenStack - heat on boardingOpenStack - heat on boarding
OpenStack - heat on boardingRico Lin
 
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Cisco Canada
 
Deploy Cloud Foundry using bosh_bootstrap
Deploy Cloud Foundry using bosh_bootstrapDeploy Cloud Foundry using bosh_bootstrap
Deploy Cloud Foundry using bosh_bootstraprajdeep
 
Simplifying openstack instances networking
Simplifying openstack instances networkingSimplifying openstack instances networking
Simplifying openstack instances networkingMohamed ELMesseiry
 
Cloud Foundry: Infrastructure Options
Cloud Foundry: Infrastructure OptionsCloud Foundry: Infrastructure Options
Cloud Foundry: Infrastructure OptionsAltoros
 
Cloud Foundry on OpenStack - An Experience Report | anynines
Cloud Foundry on OpenStack - An Experience Report | anynines Cloud Foundry on OpenStack - An Experience Report | anynines
Cloud Foundry on OpenStack - An Experience Report | anynines anynines GmbH
 
iSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System InterfaceiSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System InterfaceManoj Singh
 
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data CenterFibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data CenterStuart Miniman
 
Big Data in the Cloud? Yes, you can do it in OpenStack
Big Data in the Cloud? Yes, you can do it in OpenStackBig Data in the Cloud? Yes, you can do it in OpenStack
Big Data in the Cloud? Yes, you can do it in OpenStackObed N Muñoz
 
Cloud foundry presentation
Cloud foundry presentation Cloud foundry presentation
Cloud foundry presentation Vivek Parihar
 
OpenStack & the Evolving Cloud Ecosystem
OpenStack & the Evolving Cloud EcosystemOpenStack & the Evolving Cloud Ecosystem
OpenStack & the Evolving Cloud EcosystemMark Voelker
 
Cloud infrastructures - Slide Set 6 - BOSH | anynines
Cloud infrastructures - Slide Set 6 - BOSH | anyninesCloud infrastructures - Slide Set 6 - BOSH | anynines
Cloud infrastructures - Slide Set 6 - BOSH | anyninesanynines GmbH
 

Destaque (20)

Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep dive
 
OpenStack Load Balancer as a Service (LBaaS) with openSUSE Leap
OpenStack Load Balancer as a Service (LBaaS) with openSUSE LeapOpenStack Load Balancer as a Service (LBaaS) with openSUSE Leap
OpenStack Load Balancer as a Service (LBaaS) with openSUSE Leap
 
Building a Production Grade PostgreSQL Cloud Foundry Service | anynines
Building a Production Grade PostgreSQL Cloud Foundry Service  | anyninesBuilding a Production Grade PostgreSQL Cloud Foundry Service  | anynines
Building a Production Grade PostgreSQL Cloud Foundry Service | anynines
 
Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...
Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...
Everyday life with Cloud Foundry in a big organization (Cloud Foundry Days To...
 
Cloud Foundry Days Tokyo 2016
Cloud Foundry Days Tokyo 2016Cloud Foundry Days Tokyo 2016
Cloud Foundry Days Tokyo 2016
 
Garden introduction for dea users public
Garden introduction for dea users   publicGarden introduction for dea users   public
Garden introduction for dea users public
 
Circle of Code with Cloud Foundry
Circle of Code with Cloud FoundryCircle of Code with Cloud Foundry
Circle of Code with Cloud Foundry
 
Routeサービスを使ったCloud FoundryアプリのAPI管理
Routeサービスを使ったCloud FoundryアプリのAPI管理Routeサービスを使ったCloud FoundryアプリのAPI管理
Routeサービスを使ったCloud FoundryアプリのAPI管理
 
OpenStack - heat on boarding
OpenStack - heat on boardingOpenStack - heat on boarding
OpenStack - heat on boarding
 
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
Fiber Channel over Ethernet (FCoE) – Design, operations and management best p...
 
Deploy Cloud Foundry using bosh_bootstrap
Deploy Cloud Foundry using bosh_bootstrapDeploy Cloud Foundry using bosh_bootstrap
Deploy Cloud Foundry using bosh_bootstrap
 
Simplifying openstack instances networking
Simplifying openstack instances networkingSimplifying openstack instances networking
Simplifying openstack instances networking
 
Cloud Foundry: Infrastructure Options
Cloud Foundry: Infrastructure OptionsCloud Foundry: Infrastructure Options
Cloud Foundry: Infrastructure Options
 
Cloud Foundry on OpenStack - An Experience Report | anynines
Cloud Foundry on OpenStack - An Experience Report | anynines Cloud Foundry on OpenStack - An Experience Report | anynines
Cloud Foundry on OpenStack - An Experience Report | anynines
 
iSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System InterfaceiSCSI: Internet Small Computer System Interface
iSCSI: Internet Small Computer System Interface
 
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data CenterFibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
 
Big Data in the Cloud? Yes, you can do it in OpenStack
Big Data in the Cloud? Yes, you can do it in OpenStackBig Data in the Cloud? Yes, you can do it in OpenStack
Big Data in the Cloud? Yes, you can do it in OpenStack
 
Cloud foundry presentation
Cloud foundry presentation Cloud foundry presentation
Cloud foundry presentation
 
OpenStack & the Evolving Cloud Ecosystem
OpenStack & the Evolving Cloud EcosystemOpenStack & the Evolving Cloud Ecosystem
OpenStack & the Evolving Cloud Ecosystem
 
Cloud infrastructures - Slide Set 6 - BOSH | anynines
Cloud infrastructures - Slide Set 6 - BOSH | anyninesCloud infrastructures - Slide Set 6 - BOSH | anynines
Cloud infrastructures - Slide Set 6 - BOSH | anynines
 

Semelhante a iSCSI Protocol and Functionality

I scsi ov_whitepaper
I scsi ov_whitepaperI scsi ov_whitepaper
I scsi ov_whitepaperreachmekumar
 
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph BassalyPlanning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph BassalyCisco Canada
 
iSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini bandiSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini bandAkash Gupta
 
SAN vs NAS technology summary
SAN vs NAS technology summarySAN vs NAS technology summary
SAN vs NAS technology summaryswankymarsh5704
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storagesagaroceanic11
 
Matching Cisco and System p
Matching Cisco and System pMatching Cisco and System p
Matching Cisco and System pAndrey Klyachkin
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlacejonatanmedeirosgomes1
 
6lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp016lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp01mrmr2010i
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDr. Mohieddin Moradi
 
ARM LPC2300/LPC2400 TCP/IP Stack Porting
ARM LPC2300/LPC2400 TCP/IP Stack PortingARM LPC2300/LPC2400 TCP/IP Stack Porting
ARM LPC2300/LPC2400 TCP/IP Stack PortingMathivanan Elangovan
 
Presentation comparing server io consolidation solution with i scsi, infini...
Presentation   comparing server io consolidation solution with i scsi, infini...Presentation   comparing server io consolidation solution with i scsi, infini...
Presentation comparing server io consolidation solution with i scsi, infini...xKinAnx
 

Semelhante a iSCSI Protocol and Functionality (20)

I scsi ov_whitepaper
I scsi ov_whitepaperI scsi ov_whitepaper
I scsi ov_whitepaper
 
Module 06 (1).pdf
Module 06 (1).pdfModule 06 (1).pdf
Module 06 (1).pdf
 
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph BassalyPlanning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
Planning and Designing Virtual UC Solutions on UCS Platform- Joseph Bassaly
 
6lowpan
6lowpan6lowpan
6lowpan
 
iSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini bandiSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini band
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Multipath TCP
Multipath TCPMultipath TCP
Multipath TCP
 
Osi 7 layer
Osi 7 layerOsi 7 layer
Osi 7 layer
 
SAN vs NAS technology summary
SAN vs NAS technology summarySAN vs NAS technology summary
SAN vs NAS technology summary
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
Matching Cisco and System p
Matching Cisco and System pMatching Cisco and System p
Matching Cisco and System p
 
Introduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlaceIntroduction to Ethernet para radio enlace
Introduction to Ethernet para radio enlace
 
Detailed iSCSI presentation
Detailed iSCSI presentationDetailed iSCSI presentation
Detailed iSCSI presentation
 
6lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp016lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp01
 
Ip
IpIp
Ip
 
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-basedDesigning an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
Designing an 4K/UHD1 HDR OB Truck as 12G-SDI or IP-based
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
ARM LPC2300/LPC2400 TCP/IP Stack Porting
ARM LPC2300/LPC2400 TCP/IP Stack PortingARM LPC2300/LPC2400 TCP/IP Stack Porting
ARM LPC2300/LPC2400 TCP/IP Stack Porting
 
Presentation comparing server io consolidation solution with i scsi, infini...
Presentation   comparing server io consolidation solution with i scsi, infini...Presentation   comparing server io consolidation solution with i scsi, infini...
Presentation comparing server io consolidation solution with i scsi, infini...
 
Tcp
TcpTcp
Tcp
 

Último

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Último (20)

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

iSCSI Protocol and Functionality

  • 1. iSCSI: Protocol and Functionality David L. Black, Ph.D. EMC Corporation
  • 2. Session Goals Ÿ Explain what iSCSI is – And the structure of the iSCSI protocol stack Ÿ Explain how iSCSI provides storage access – And how it fits into storage and network infrastructure Ÿ Explain how an iSCSI session is established – Plus cover security, boot, multipathing, etc. NOTE: This is a technology session Product specifics are covered in other sessions
  • 3. Introduction Ÿ What is iSCSI? – Internet Small Computer Systems Interface – SCSI storage access over TCP/IP networks Ÿ Why is iSCSI interesting? – Reuse existing IP infrastructure and skills – IP protocols have better interoperability track records – Security can be better in IP networks Ÿ iSCSI reuses networking and storage concepts – Next few slides: Review important basic concepts
  • 4. IP Network Layers 7 - Application Web Browser Application 6 - Presentation HTML Data Formats 5 - Session HTTP App. Protocol 4 - Transport TCP Stream or Msg. 3 - Network IP Internetwork 2 - Link 100 Mbit Enet Access/Framing 1 - Physical Cat 5e Cable Fiber/Wires
  • 5. IP Network Layers – In Practice 7 - Application Web/HTML Application 5 - Session HTTP App. Protocol 4 - Transport TCP Stream or Msg. 3 - Network IP Internetwork 2 - Link 100 Mbit Enet Access/Framing 1 - Physical Cat 5e Cable Fiber/Wires
  • 6. Fibre Channel Layers Upper-layer protocols FC-4 (FCP (SCSI), VI, FICON, IP, etc.) (ULP) Common services FC-3 Frames and signaling protocols FC-2 8b/10b coding and protocol FC-1 Wire/fiber and transceivers FC-0
  • 7. SCSI Concepts Ÿ Initiator connects to Target – Host connects to storage device Ÿ Target exports Logical Units – Storage device exports volumes Ÿ Logical Units have Logical Unit Numbers (LUNs) – Numbering is per target – Same LU may have different LUNs at different targets Ÿ Active discovery – SCSI “Bus Walker” finds accessible targets
  • 8. IP Storage Network Scenarios and Protocols = IP Native = FC l All Ethernet (no Fibre Channel) l iSCSI protocol l Standard Ethernet switches and routers Bridging l Servers Ethernet attached l Storage Fibre Channel attached l iSCSI protocol Extension l Servers and storage on SAN l FCIP or iFCP protocol l Host-to-storage or replication
  • 9. iSCSI Overview Ÿ Internet Small Computer Systems Interface Ÿ Provides storage access over TCP/IP networks – Maps SCSI functionality to TCP/IP protocol – Similar to mapping SCSI over Fibre Channel (FCP) Ÿ Network protocol – Peer to HTTP, NFS, FTP, Telnet, etc. (uses TCP) Ÿ Can be used with existing IP & Ethernet networks – NICs, switches, routers, etc.
  • 10. Dedicated Native iSCSI Native iSCSI Adapters Servers with IP Network Std.NICs Native iSCSI IP Adapters FC
  • 11. Existing FC Add-On Bridged iSCSI (Switch Blade) SAN Servers iSCSI with Bridge IP Network Std.NICs in Switch (Blade) IP FC
  • 12. iSCSI Relationship to Other SCSI Protocols SCSI Architecture (SAM) & Commands (SCSI-3) Fibre Channel VI FICON IP (RFC 4338) FCP FC-4 (ULP) Parallel SCSI FC-2 iSCSI FC-1 TCP FC-0 IP SCSI Cables Any IP FC Fibers, Network Hubs, Switches
  • 13. iSCSI Protocol Stack Initiator Target SCSI SCSI iSCSI iSCSI TCP TCP IP IP IPsec IPsec Link Link IP Network
  • 14. Data Encapsulation into Network Packets Ethernet CRC IP Data iSCSI Header TCP Delivery of iSCSI Protocol Data Unit (PDU) for SCSI functionality (initiator, target, data read/write, etc.) Reliable data transport and delivery (TCP Windows, ACKs, ordering, etc.) Also demux within node (port numbers) Provides IP “routing” capability so that packet can find its way through the network Provides physical network capability (Cat 5, MAC, etc.)
  • 15. SCSI to iSCSI Mapping SCSI Command and Data iSCSI PDU iSCSI PDU iSCSI PDU iSCSI PDU Header Header Header Header Data Data Data Data IP IP IP IP IP IP IP IP IP Packet Packet Packet Packet Packet Packet Packet Packet Packet iSCSI PDU alignment with packets varies
  • 16. iSCSI Concepts Ÿ iSCSI Session: One Initiator and one Target – Multiple TCP connections allowed in a session § Exploit network parallelism § Error recovery possible across connections Ÿ Most communication is based on SCSI – e.g., Ready to Transmit (R2T) for target flow control Ÿ Important iSCSI additions to SCSI – Immediate and unsolicited data to avoid round trip – Login phase for connection setup § Text-based parameter negotiation – Explicit logout for clean teardown
  • 17. iSCSI Read Example Target Initiator SCSI Read Data in PDU Command Target Data in PDU Receive Data in PDU Data Status Command Complete Optimization: Good status can be included with last “Data in” PDU
  • 18. iSCSI Write Example Target Initiator Ready to SCSI Write Transmit Command (R2T) Optimization: Immediate or Data out PDU Receive unsolicited data Data Data out PDU avoids a round trip R2T Data out PDU Data out PDU Receive Data Command Status Complete
  • 19. Establishing an iSCSI Session Ÿ Naming: Identify storage to access (target) [What] – Also identify initiator that wants to access storage – Naming is location-independent (unlike Fibre Channel) Ÿ Discovery: Find storage to access [Where] – SCSI “Bus Walker” doesn’t scale to IP networks Ÿ Login: Establish connections to storage [How] – Parameter negotiation prior to reads/writes – Login occurs on each TCP connection
  • 20. iSCSI Naming [What] Ÿ Design rationale – Targets may share <IP address, TCP port> – Initiators and targets may have multiple IP addresses – Unique names are important for third-party commands Ÿ iSCSI names: Globally unique – EUI-based (type of WWN) § eui.5006048dc7dfb1af – IQN: Reversed hostname (DNS) as naming authority § iqn.1991-05.com.microsoft:WindowsSystem1 – NAA-based (more WWNs, including long WWNs) § naa.62004567BA64678D0123456789ABCDEF Ÿ Intended usage: iSCSI name per operating system instance – Regardless of the number of interfaces (NICs/HBAs)
  • 21. iSCSI Discovery [Where] Ÿ SCSI discovery paradigm – “Bus Walker” looks for targets – Exhaustive search doesn’t work in IP networks Ÿ iSCSI discovery mechanisms – Small scale: Static configuration and SendTargets § Simple configuration mechanisms – Intermediate scale: SLP § Based on multicast or simple directory agent – Large scale: iSNS § Rich name service, similar to services provided by FC fabric § SLP can be used to discover iSNS Server
  • 22. Static Configuration and SendTargets Ÿ Static configuration: Tell initiator about target(s) – iSCSI target name and location (e.g., IP address, port) § iSCSI default TCP port: 3260 – Simple mechanism, does not scale well § Especially if information is entered manually Ÿ SendTargets command: Better scaling – Initiator issues SendTargets – Target responds with iSCSI names of targets § Also IP addresses and TCP ports if they differ – Moves most configuration from initiator to target § Only have to tell initiator an address of target system § Target provides the rest of the information
  • 23. SLP (Service Location Protocol) Ÿ Major SLP components – User Agent (UA) – Find services to use – Service Agent (SA) – Advertise services for use – Directory Agent (DA) – Connect users to services Ÿ SLP function for iSCSI – Target advertises name:IP address:port § Either to DA in the network or on its own – Initiator contacts DA for target information § If no DA configured, use multicast to find targets § DA usage recommended if multicast is restricted – iSCSI template identifies iSCSI services in SLP
  • 24. SLP Structures Directory Agent Service Request Service Service Registration Service Reply Request User Agent Service Agent (Initiator) (Target) User Agent Service Agent (Initiator) (Target) Directory Agent structure has better scalability
  • 25. iSNS (Storage Name Service) Ÿ Modeled on Fibre Channel Name Server – Discovery domains: Similar to soft FC zones Ÿ Scalable discovery and configuration management – Asynchronous notification of changes Ÿ Initiator retrieves all iSCSI target info from iSNS – Rich information repository (e.g., IPsec config info) – Enables more centralization of management
  • 26. iSNS Structure Management Platform iSNS can be integral to the cloud or management station Device B iSNS iSNS Two Discovery Device A Domains Host A Host B Host C Domains are similar to Fibre Channel zones, e.g., Host C will not discover Device B
  • 27. Login [How] Ÿ Two types of login sessions – Discovery (SendTargets) – Normal (after any discovery mechanism) Ÿ Normal login phases 1. Security negotiation 2. Operational parameter negotiation 3. Full feature (perform I/O) Ÿ Login uses text-based parameter negotiation – Syntax: key=value (or list of values) – Designed for extensibility
  • 28. Additional iSCSI Topics Ÿ Security – Protect valuable data Ÿ Error handling – Things will go wrong Ÿ Implementation classes – NICs and HBAs Ÿ Multipathing – Important HA mechanisms Ÿ Boot – Yes, it can be done
  • 29. Security Properties Ÿ Authentication: Who are you? Prove it! – Mutual authentication: Initiator to Target AND vice versa Ÿ Integrity: Has this data been tampered with? – Cryptographic integrity, not just checksum or CRC – Linked to authentication to prevent regeneration attack Ÿ Authorization: What are you allowed to do? – iSCSI: Who can connect to which Target – LUN masking & mapping handled by SCSI, not iSCSI Ÿ Confidentiality: Has this data been disclosed? Ÿ iSCSI: Usage is optional – subject to negotiation
  • 30. iSCSI Security: Protect Valuable Data Ÿ Secure IP connection – Integrity, authentication, and confidentiality – Based on IKEv1 and ESP (IPsec components) Ÿ Extensive applied security requirements – Selection of Integrity (MAC) and encryption algorithms – Profile for usage of IKEv1 authentication and key management Ÿ Inband authentication (part of Login) – SRP, CHAP, Kerberos, and other mechanisms – CHAP with strong secrets is required § Can’t use passwords – iSCSI CHAP: Stronger than basic CHAP § When specification is followed
  • 31. CHAP Authentication Protocol Ÿ Based on shared secret, random challenge – Uses a secure (one-way) hash, usually MD5 – One-way hash: Computationally infeasible to invert Secret Challenge Secret Hash Hash Response Can be =? outsourced to RADIUS serve Host Storage
  • 32. iSCSI Error Detection Ÿ Sequence numbers detect missing things – Commands, responses, data blocks – Goal: Avoid SCSI retry if at all possible – Command sequencing also used for flow control § Sliding window of commands target will accept § Data flow control: R2T (Ready to Transmit) mechanism Ÿ Optional digests improve communication integrity – In addition to TCP checksum and Ethernet CRC – New 32-bit CRC polynomial (not the Ethernet CRC-32) – Separate CRCs computed over header and data § Allows an iSCSI proxy (e.g., router) to preserve data CRC
  • 33. iSCSI Error Recovery: Three Levels Ÿ Error recovery level 0: Session recovery – Basic recovery mechanism that always works – Recover by session restart (close all TCP connections) Ÿ Error recovery level 1: Digest failure recovery – Recover from digest failure without session restart – Recover by reissuing commands, data and/or status on same connection Ÿ Error recovery level 2: Connection recovery – Open new TCP connection to replace failed connection – New connection picks up at point where old one failed Ÿ Error recovery level negotiated during login
  • 34. iSCSI Implementation Classes Ÿ NIC: iSCSI driver in software, standard NIC – Utilizes operating system TCP/IP stack – Link aggregation is below iSCSI driver – Digests and IPsec handled by software – Higher CPU utilization (but not prohibitive) Ÿ HBA: Offload both TCP/IP and iSCSI – Appears as a SCSI controller to the operating system – Digests and IPsec handled by hardware – Lower CPU utilization due to full offload – Harder to support link aggregation and iSCSI sessions that span multiple HBAs
  • 35. iSCSI Multipathing Mechanisms Ÿ Ethernet trunking – Link layer (2), below TCP, transparent to iSCSI Ÿ Multiple TCP connections – In a single iSCSI session (layer 5) – Same or different hardware (Ethernet) ports – Difficult when TCP and iSCSI are offloaded Ÿ Multiple iSCSI sessions – Multipathing software (e.g., PowerPath) above iSCSI – Same or different hardware (e.g., Ethernet) ports Ÿ iSCSI also supports HTTP-style redirects – Target has been temporarily or permanently moved
  • 36. iSCSI Boot Ÿ Have to discover the boot target – Can use DHCP (root path option) for this – Boot is usually from LUN zero Ÿ Boot requires early access to system volume – Must be available prior to operating system running – iSCSI protocol can support booting Ÿ NIC and iSCSI software driver: Have to modify OS – PXE (DHCP + TFTP) can download modified OS image – Int 13 BIOS boot: Need iSCSI driver in system BIOS Ÿ HBA: No OS modifications needed – Int 13 BIOS boot: iSCSI can be in HBA card BIOS
  • 37. iSCSI Status Ÿ iSCSI protocol specification: Done – IETF RFC 3720 – April 2004 Ÿ iSCSI ancillary documents: Done – Naming, discovery, management, MIBs - most published as RFCs Ÿ New document: iSCSI Corrections and Clarifications – Clarification of issues that have arisen in implementations Ÿ New work area: iSER (Done) – iSER = iSCSI extensions for RDMA § RDMA = Remote Direct Memory Access (remote DMA) – Extend iSCSI to exploit RDMA § IP RDMA – IETF Remote Direct Data Placement (rddp) WG – iSER also used over InfiniBand § Alternative to SRP – SCSI RDMA Protocol
  • 38. iSCSI: Summary and Conclusion Ÿ iSCSI: SCSI storage access over TCP/IP networks – Protocol stack: SCSI, iSCSI, TCP, IP (& IPsec), Ethernet – Works over any IP network, not just Ethernet Ÿ iSCSI transports SCSI commands and data – Native iSCSI storage access – Bridged access to Fibre Channel storage Ÿ iSCSI session establishment – Target naming (multiple formats) [What] – Target discovery (multiple mechanisms) [Where] – Login negotiation (multiple parameters) [How] – Followed by: Full feature phase (e.g., reads and writes)
  • 39. SCSI Protocols and Standards Organizations SCSI Architecture (SAM) T11 & Commands (SCSI-3) Fibre Channel T10 VI FICON IP (RFC 4338) FCP Parallel SCSI FC-2 TCP iSCSI FC-1 FCIP TCP FC-0 IP iFCP IP IETF SCSI Cables Any IP FC Fibers, Any IP Network Hubs, Switches Network
  • 40. Standards Organizations Ÿ SCSI: T10 – www.t10.org Ÿ Fibre Channel: T11 – www.t11.org Ÿ IETF IP Storage Working Group – http://www.ietf.org/html.charters/ips-charter.html § Latest versions of drafts are linked to that page – Chair: David L. Black (EMC) Ÿ Active coordination on overlapping matters