iscsi naming discovery
play

iSCSI Naming & Discovery 50 th IETF - Minneapolis March 2001 - PowerPoint PPT Presentation

iSCSI Naming & Discovery 50 th IETF - Minneapolis March 2001 Mark Bakke, Cisco Yaron Klein, Sanrad Joe Czap, IBM Lawrence Lamers, San Valley Jim Hafner, IBM Todd Sperry, Adaptec Howard Hall, Pirus Joshua Tseng, Nishan Jack Harwood, EMC


  1. iSCSI Naming & Discovery 50 th IETF - Minneapolis March 2001 Mark Bakke, Cisco Yaron Klein, Sanrad Joe Czap, IBM Lawrence Lamers, San Valley Jim Hafner, IBM Todd Sperry, Adaptec Howard Hall, Pirus Joshua Tseng, Nishan Jack Harwood, EMC Kaladhar Voruganti, IBM John Hufferd, IBM

  2. Status • Key Decisions – Consistency with iSCSI, Boot and MIB drafts – Multicast discovery of targets, SNS uses SLP • Milestones – WWUI complete; part of iSCSI login process – SendTargets and redirects integrated w/iSCSI – Name service and discovery requirements – Open questions from interim meeting resolved – NDT draft submitted as WG document

  3. Naming and Addressing • WWUI Satisfies URN Requirements – UTF-8 Format – WWUI Naming Authority Specified – WWUI Comparison Defined – URN Format Defined • iSCSI URL (Address) Defined – Includes the WWUI • Use (and non-use) of Alias Defined

  4. iSCSI Names & Addresses iSCSI Host server1.zzz.com WWUI names the initiator, not the iSCSI port. iSCSI Initiator com.sw.hostid.4567890 This initiator has two IP Addr IP Addr addresses. 10.1.1.58 10.1.2.60 10.1.1 10.1.2 Network Network disk1a.zzz.com iSCSI disk1b.zzz.com An iSCSI "port" is an IP Device 10.1.1.48 10.1.2.48 Address + TCP Port. port 5000 port 5000 WWUI names the target, internal bus, memory, switch, etc independent of the iSCSI iSCSI Target iSCSI Target port on which it is accessed. com.acme.sn.8675309 com.acme.sn.5551212 iSCSI targets may or may LU 0 LU 1 LU n LU 0 LU 1 LU n not share logical units.

  5. Discovery / SNS Requirements • Discovery Domains – Constrain discovery to avoid scaling problems • Access Control – Which initiators allowed to access each target • Support iSCSI Object Model • Authentication of SNS protocol messages • Registration and Query • State Change Notification

  6. Discovery Approach Deploy and interoperate in three stages: 1. Naming and Static Configuration – Configure both targets and initiators – Use SendTargets to reduce initiator config 2. SLP for simple discovery – Configure targets 3. iSNS for centralized management – Configure central iSNS server

  7. Current Work Items • Storage Name Services • iSCSI and T10/SAM-2 Mapping – Mapping iSCSI and SCSI names, ports, etc – Mapping iSCSI sessions and SCSI nexus? – Third Party Addressing (T10 Issue) – Which entity gets the reservation?

  8. Issues & Questions • Naming and Discovery Issues – Integrating WWUI with authentication – Proxies and middle boxes • Ensure that beneficial ones work – Implementations needed for standardization? • General Issues – Authenticate Network Entities vs. WWUIs – Authentication for Third Party Commands

  9. Plan • April-July – Revise Naming & Discovery Draft – Continue work on T10 items • September – Submit Naming & Discovery to IESG

  10. References • iSCSI NDT Requirements – Draft-ietf-ips-iscsi-name-disc-00 • iSNS document – Draft-ietf-ips-isns-01 • URN document – Draft-bakke-iscsi-wwui-urn-00 • SLP document – Draft-bakke-iscsi-slp-00

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend