Академический Документы
Профессиональный Документы
Культура Документы
MADHUKAR GUNJAN
LSI Technologies (ESG)
Network Storage Models
LSI Proprietary 2
SCSI Protocols and Standards
Parallel
SCSI FC-2
iSCSI FC-1 TCP
FCIP
TCP FC-0 IP
iFCP
IP
LSI Proprietary 3
iSCSI - Data Encapsulation Into Packets
C
Physical
Physical
• Data Link Layer :
Interface
interface § Gigabit Ethernet (GbE)
§ Improves Performance upon FC
§ 10 GbE yet to Implement
LSI Proprietary 5
iSCSI Architecture
• 2x 1Gbps Ethernet Port/ Controller
• Block access to remote storage
over IP
• Auto-negotiate to 1000/100/10Mb/s.
• Supports IPv4 Only
• Configuration Parameters
§ IP Address Per Port
§ Supports Manual or DHCP
§ Configuration
§ Do Not Support remote
§ shell (RSH) or remote login.
LSI Proprietary 6
iSCSI Naming Convention
• iSCSI Name:
§ Identifies iSCSI node and its encapsulated SCSI device
§ Used in authentication of targets to initiators
§ Must be world wide unique
§ Utilized existing naming authorities
§ Human readable 233 character name
LSI Proprietary 7
An iSCSI Session
• iSCSI Connection:
§ Verify a TCP connection over which the initiator
and target communicate via iSCSI PDUs.
§ Verify uniquely identified in a session by an
initiator defined connection ID (CID).
§ Verify the response and any data associated
with an iSCSI command must be returned on
the same connection.
• iSCSI Session:
§ Verify a set of iSCSI connections that link an
iSCSI initiator and target.
§ Verify uniquely identified by a 64 bit Session ID
(SID) built from a 48 bit initiator defined Initiator
Session ID (ISID) and a 16 bit target defined
Target Session Identifying Handle (TSIH).
§ Verify resources of a target (i.e., LUNs) must be
identical across all connections that make up a
session.
§ Verify commands can be alternated across all
connections in a session for bandwidth
aggregation.
§ Verify error recovery connections can be
created on the same network portal as a failed
connection.
LSI Proprietary 8
An iSCSI Login
• Login Process:
§ A sequence of Login Request PDUs from initiator and Login Response
PDU’s from target.
§ Authentication and operational parameter data is passed between initiator
and target in named key/value pairs in the PDU data segments:
§ During login, only the Login Request, Logout Request, and Reject PDUs are
allowed
LSI Proprietary 9
iSCSI – Multiple Management Configuration
• Management Topology • Single Path Topology
LSI Proprietary 10
iSCSI Security: Protect valuable data
• Secure IP connection
§ Integrity, authentication, and confidentiality
§ Based on IKE and ESP (IPsec components)
LSI Proprietary 11
CHAP Authentication Protocol
• Based on shared secret, random challenge
§ Uses a secure (one-way) hash, usually MD5
§ One-way hash: Computationally infeasible to invert
Secret
Challenge Secret
Hash
Hash
Response
=?
Host Storage
LSI Proprietary 12
FCIP iFCP iSCSI
LSI Proprietary 13
Product Performance – MB/sec
Drive Dual Quad
Type FC-FC FC-FC FC-SAS SAS- SAS iSCSI-SAS
Sustained throughput
1600 MB/s 1800 MB/s 1600 MB/s 1600 MB/s 400 MB/s
cache read (512k)
Sustained throughput
FC 850 MB/s 850 MB/s
disk read (512k)
Sustained throughput
FC 800 MB/s 800 MB/s
disk write (512k)
Cache mirroring disabled SAS 750 MB/s 750 MB/s 400 MB/s
Cache mirroring disabled SATA 750 MB/s 750 MB/s 400 MB/s
Sustained throughput
FC 350 MB/s 350 MB/s
disk write (512k)
Cache mirroring enabled SAS 350 MB/s 350 MB/s 350 MB/s
Cache mirroring enabled SATA 350 MB/s 350 MB/s 350 MB/s
LSI Proprietary 14
Trend - Current $ Future
2003 Open Systems
• Predictions of the size of the External Storage
LSI Proprietary 15