iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG

Size: px
Start display at page:

Download "iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG"

Transcription

1 iscsi Protocols iscsi, Naming & Discovery, Boot, MIBs John Hufferd, Sr. Technical Staff IBM SSG What is iscsi? iscsi is a transport protocol for SCSI that operates on top of TCP through encapsulation of SCSI commands in a TCP/IP stream. Enables the transport of I/O Block data over IP Networks. Ethernet Header IP Header TCP Header ISCSI Header ISCSI Data Ethernet Trailer TCP segment IP datagram Ethernet frame 19 June

2 What is iscsi? cont. iscsi s Protocol currently at version 8 soon version 9 This is the base encapsulation protocol isns Internet Storage Name Service Protocol Document A protocol for discovering storage devices A iscsi Bootstrapping Document Allows clients to boot from iscsi devices SW vrsnrequires a pre-boot execution environments (PXE). HW vrsn should boot like an normal SCSI HBA A SLP in Discovery Document An iscsi Security Document A iscsi MIB Document All documents and more information can be found at: 19 June What is iscsi? - cont. iscsi is a Transport for SCSI Commands iscsi is an End to End protocol iscsi can be implemented on Desktops, Laptops and Servers iscsi can be implemented with current TCP/IP Stacks iscsi can be implemented completely in a HBA iscsi has the concept of Human readable SCSI Device (Node) naming iscsi Transport includes Security as a base concept IPSec Connection Security iscsi Authentication for Access Control iscsi defines Discovery as a basic element iscsi define process for remote Boot, as a basic element iscsi defines MIB standards as a basic element 19 June

3 iscsi & SCSI Layering SCSI Host connection to SCSI target via iscsi Transport 19 June SCSI - a Client/Server Model Logical Unit Application Client Device Service Request Device Service Response Device Server Task Management Request Task Management Response Task Manager Initiator Target Host bus adapter is the SCSI initiator Target devices are the SCSI targets Initiators and target connected via an arbitrated shared bus. Limited target connectivity Limited initiator connectivity 19 June

4 iscsi - Layered Model Application Layer Application I/O Request Logical Unit SCSI Interface SCSI Layer SCSI Class Driver (SCSI Initiator) SCSI Application Protocol SCSI Device (SCSI Target) SCSI CDB iscsi Protocol Layer TCP/IP iscsi Protocol Services TCP/IP TCP/IP TCP/IP Interface iscsi Transport Interface TCP/IP Protocol iscsi session iscsi Protocol Services TCP/IP TCP/IP TCP/IP iscsi PDU TCP segments in IP Datagrams Ethernet Data link + Physical Ethernet Data link + Physical Ethernet Frame Replaces shared bus with switched fabric Transparently encapsulates SCSI CDBs Unlimited target and initiator connectivity 19 June iscsi Message Types Initiator to Target NOP-out SCSI Command Encapsulates a SCSI CDB SCSI Task Management Command Login Command Text Command SCSI data Output Data for Writes Logout Command SendTargets Used in iscsi Discovery Target to Initiator NOP-in SCSI Response Can contain status SCSI Task Management Response Login Response Text Response SCSI data Input Data from Reads Logout Response Ready to Transfer R2T Async Event 19 June

5 iscsi Session Establishment iscsi has the concept of a Session A session maybe made up of one or more TCP/IP connections for additional bandwidth The Session can be thought of as a SCSI Port Session has four phases/stages Initial login phase Security Authentication Phase Operational Negotiation Phase Full Featured Phase The Session can handle SCSI commands and data after Login is complete That is the Full Featured Phase 19 June iscsi Session Establishment Login begins with the first connection Text Strings are exchanged that define the parameters of the session Initial Login Phase Initiator Sends Login with Text Strings for InitiatorName, TargetName, and Authentication Options (which are then selected by Target) Security Authentication Phase Authentication Text exchanges (ID, Password, Certificates, etc.) Operational Negotiation Phase Each Side (Initiator and Target) negotiate the supported options all via Keyword=value, or Keyword=value,value,value Amount of unsolicited buffer Types of Data Delivery Solicited, unsolicited, immediate etc. Full Featured Phase can carry SCSI CDBs/Data, Task Management, and responses Similar process on parallel connection within the Session 19 June

6 iscsi Session Termination Session may end with Logout, or I/O error causing dropped connection But often connection can be reestablished and Session continued 19 June iscsi Security/Integrity Considerations A basic level of end to end data integrity can be reasonably handled by TCP using the standard checksum Two Types of Security and Integrity IPSec Secures TCP/IP Nodes; setup at TCP/IP startup -- before iscsi Login Session Authentication via IKE (Internet Key Exchange) Packet by Packet Authentication (also provides Integrity) Privacy via Encryption (also provide Integrity) iscsi Techniques (done/setup during iscsi Login) Authentication (ensures Nodes are authorized to use the iscsi Target Node) May use SRP, Chap, or Kerberos iscsi CRC32c Digest checks for Integrity beyond TCP/IP XOR CkSum Various levels of security fit each topology. Examples => Secure Main Floor -- No Security Campus LAN -- iscsi Authentication and CRC32c Remote Private WAN -- IPSec with Session/Packet Authentication Remote Internet WAN -- IPSec with Privacy Encryption 19 June

7 iscsi Key Points Sessions: iscsi Session = a group of TCP connections linking an initiator with a target ( i.e. can be one or more connections) Note: A TCP connection that is part of an iscsi session will only be used to carry iscsi traffic The iscsi initiator and target use this session for communicating iscsi commands, control messages, parameters, and data to each other TCP connections can be added and removed from a session using the iscsi Login / Logout commands 19 June iscsi Key Points (cont.) Connection Allegiance: For SCSI commands that require data and/or parameter transfer, the (optional) data phase and status phase must be sent over the same TCP connection that was used to deliver the SCSI command during the command phase Consecutive commands that are part of a SCSI task (i.e. a linked set of commands) MAY use different connections within the session Connection allegiance is strictly per-command and not per-task 19 June

8 iscsi Key Points (cont.) Tasks: A linked set of SCSI commands One and only one SCSI command at a time can be outstanding within any given iscsi task Initiator Task Tags(ITT)&Target Task Tags(TTT) Initiator tags for all pending commands must be unique initiator-wide SCSI Data packets are matched to their corresponding SCSI commands by using Tags that are specified in the protocol ITT for Unsolicited Data TTT (Target Transfer Tag) for Solicited Data 19 June iscsi Key Points (cont.) Solicited or Unsolicited Messages: Initiator to Target User data or command parameters will be sent as either Solicited data or Unsolicited data Solicited data is sent in response to Ready To Transfer (R2T) PDUs Unsolicited data can be part of an iscsi command PDU ( Immediate data") or an iscsi data PDU The maximum size of an individual data PDU or the immediate-part of the initial unsolicited burst MAY be negotiated at login Target to Initiator Targets sends Ready to Transfer (R2T) Message to Initiator, requesting data for Write Command Targets send Command Responses Targets sends Asynchronous Messages (SCSI & iscsi) Describing some Unusual or Error event 19 June

9 iscsi Protocol Data Unit (PDU) An Encapsulation Data Unit which carry SCSI information. Has Header Section and Data Section Additional Header Sections can also be used for Extended SCSI commands (third party Copy, etc.) Contains the SCSI CDB & the appropriate LUN Sequence Nums used for Flow Control and Sync Command Seq. Num. & Response Seq Num Header and Data Sections can have their own CRC32c Digest protection. Provides more protection then TCP/IP XOR Cksum 19 June iscsi PDU for a SCSI Command BYTE Bit 1 Bit X I Opcode F R W 0 0 ATTR Reserved CRN or 0x01 Reserved Total AHS Length Data Segment Length 2 Bit Logical Unit Number (LUN) Initiator Task Tag (ITT) Expected Data Transfer Length Command Seq. Num. (CmdSN) Expected Status Seq Num. (ExpStatSN) Bit SCSI Command Descriptor Block (CDB) or null 48 or nn Header Digest (if Any) -- CRC32c Data-Segment - Command Data 19 June

10 iscsi Key Points (cont.) Numbering: iscsi uses Command and Status Numbering Command numbering session wide and is used for ordered command delivery over multiple connections with in a session. It can also be used as a mechanism for command flow control over a session Status numbering per connection and is used to enable recovery in case of connection failure Fields in the iscsi PDUs communicate the reference numbers between the initiator and target. During periods when traffic on a connection is unidirectional, iscsi NOP-message PDUs may be utilized to synchronize the command and status ordering counters of the target and initiator 19 June iscsi READ Command Simplest Form: Step #1: Initiator transmits iscsi command PDU (CDB = Read) Step #2: Target transmits iscsi data-in PDU(s) Step #3: Target sends iscsi response PDU Notes: Solicited data via Read Command PDU (Initiator requests data from the target) The target can satisfy the single read command with multiple iscsi data read PDUs (PDUs can be out of order) The command is not complete until all data and status is received by initiator Good Status can be sent within the last iscsi data-in PDU All iscsi data-in PDUs and the response PDU will be delivered on the same TCP connection that the command was sent on All Data-in PDUs will carry the same value for the ITT field 19 June

11 What is Familiar & New About iscsi iscsi protocols can be exported fully onto the HBA (Like FC) Expect the same Host overheads as Fibre Channel Performance as good as FC when ASICs used for TCP/IP Offload Engine (TOE) The SCSI device driver might be the iscsi HBA Device Driver Like the FC Device Driver Most of the rest of the OS is unchanged Exception: Management Interfaces may or may not be same Vendor Dependent 19 June What is Familiar & New About iscsi Different types of iscsi targets are possible iscsi Target could be a gateway to SCSI or FC iscsi Target could be FC/iSCSI Switch/Router iscsi Target could be a RAID array with the upper interface iscsi iscsi Target could be a new virtualizing device iscsi Target could be a Tape Drive, Tape Lib, or Virtual Tape System 19 June

12 What is Familiar & New About iscsi iscsi has a set of approaches to discovery For small Networks Static Config, Init.s & Targets SendTargets Cmd makes configuration easer For Med Size Networks needing only simple Discovery Service Location Protocol (SLP Multicast Discovery) For Large Size Networks isns (internet Storage Name Service) Includes Soft Zone Domains Includes Database for ongoing management 19 June iscsi Names & Addresses iscsi NAME and Address in URL form <Domain-Name>[:<port>]/<iSCSI-name> DN => <= IPv4 DN => [af24:256b:12a4:247d:3478:ae3b:7539:7adc5]<= IPv6 DN =>Fully-Qualified-Domain-Name =>FQDN FQDN=> host1.almaden.ibm.com iscsi-name => either an iqn (iscsi Qualified Name) or eui (EUI- 64 name used in FC) iqn=>iqn.yyyy-mm.reverse-fqdn-[:.]-and-qualifier-string eui=>eui:eui-64bit-wwn Examples: iqn com.ibm.ssg.snj:aix.cluster1.mbr2 eui: a425678d iscsi full name and address expressed as a URL Example: portal3.mbr2.aix.snj.ibm.com[5000]/iqn com.ibm.snj:aix.mbr [3000]/eui A425678D 19 June

13 iscsi Architectural Model Network Entity (iscsi Client) --The OS -- iscsi Initiator Node Name=iqn com.ajax.OS1 iscsi (SCSI) Initiator Port Name=iqn com.ajax.os1[ISID=1] HBA with 2 Network Portals Portal Group Network Portal Portal Group A-1 IP Network Portal Group B-1 Portal Group A-2 Network Portal port 3000 Network Portal port 3000 Port 5000 HBA with 2 Network Portals port port 5000 HBA Network Portal port 5000 SCSI Device (A) iscsi (SCSI) Target Port eui a425678a[tag=2] iscsi (SCSI) Target Port eui a425678a[tag=1] iscsi Target Node (A) Name=eui A425678A Network Entity (iscsi Server) iscsi (SCSI)Target Port iqn com.ibm.ssg.12579[tag=1] iscsi Target Node ( B) Name=iqn com.ibm.ssg SCSI Device (B) 19 June Discovery & Configuration Static configuration Admin sets authorized iscsi Target Node Name, & iscsi Address Can receive a "Target has Moved" Redirect Response Admin can set iscsi Address of Specific Discovery Device, or to any valid iscsi portal at a Target Establish Discovery Session (only permits SendTargets in FFP) Use SendTargets command to get list of known targets Returned iscsi Target Node Names IP Addresses and Ports for each Node Name Get Portal Group Tag to identify Multi Connection Sessions portals Must, at least return all authorized portals within the Target Can be used for single admin location/device for simple networks If it contains information from many different iscsi Targets 19 June

14 Discovery & Configuration SendTargets Command Response A List of Target Names followed by Target IP address TargetName=<iSCSI-Target-Node-Name> TargetAddress<FQDN IP-Address>[:<port>],<portal-group-tag> For each Target Node Name there are n Target Address Portal Group Tags are used to associate IP address for use with Multiple Connection Sessions and identify the SCSI Port Name Example of SendTargets Command Response iqn com.ibm.ssg [5000], [5000], [3000], [5000],1 eui a425678a [3000], [5000], [3000],1 19 June Discovery & Configuration Dynamic configuration via Initiator use of SLP to find Targets iscsi controllers can register iscsi Node Name, iscsi Address, Portal Groups Admin can define which Targets should be accessed by which Hosts Initiators can query to get information Information returned will depend on Admin settings Specific Hosts will only have information returned that is appropriate for it Admin still tells Targets what Initiators are permitted This is the base for iscsi Authentication 19 June

15 SLP General Model Registered Info iscsi Node name TCP/IP address Portal Group Tags User Agent (UA) Contacts SA or DA for Target information Server Agent (SA) Advertises info to DA May optionally carry info if DA not available Directory Agent(DA) Holds Advertisements from all SAs Returns information to UAs 19 June Discovery & Configuration- isns Functions Name Registration Service isns clients register their attributes and address, and can then dynamically obtain information about accessible storage devices Network Zoning and Login Control Service Zones map to target access control lists Network management appcation can monitor, create, and change Zones for isns clients Authorized clients create new Zones and add new Zone members State Change Notification Service Server notifies clients if a registered device changes status Server notifies clients if Zone membership changes Server notifies clients if devices added or removed Map FC devices to an iscsi image Seamless integration of legacy FC fabrics with iscsi networks OPEN Source for Clients and Server 19 June

16 iscsi Boot Static configuration information for Boot Admin sets authorized iscsi Node Name and iscsi Address, Optional LUN Default LUN is 0 Dynamic configuration via use of DHCP or SLP DHCP be used by Host to get an IP address DHCP can hold the iscsi Boot Service Option (Admin Set) May contain all that is needed to reach the Boot device May only contain iscsi Target Node Name, then use SLP to resolve to iscsi address W/O DHCP information, SLP can be used to find Boot "Service" The Boot load process The Admin. or DHCP or SLP can enable the access BootP is also possible as part of a SW two phase process HW HBA can act as a normal SCSI HBA for system BIOS use 19 June iscsi MIB Structure Information and Statistics on all the following Instance Target Initiator Session Target Portal Initiator Portal Access List Connection 19 June

17 iscsi Working Group iscsi: a specification from the IETF IP Storage working group for encapsulating SCSI command data blocks (CDB) in a TCP/IP byte stream The working group will cover: Issues new to iscsi (a result of using an IP transport) Management, including MIB definition(s) The working group will not cover Extensions to existing protocols (SCSI, TCP, IP, ). File system protocols. Environments where high data loss rates are acceptable. That is, protocols assume a reliable transport (TCP) SNIA IP Storage Forum -- Marketing Industry Assoc. 19 June Backup 19 June

18 Integrating FC and IP Networks FC JBOD: WWN=X, isc SI iscsi Name = abc iscsi TapeInitiator 2 FC Server: WWN=Y, Library 2 iscsi Name = xyz isns Server iscsi Tape Library 1 iscsi Server 1 IP Network FC JBOD: WWN = X FC Fabric FC-iSCSI Gateway FC Server: WWN = Y Integrating FC Fabrics: FC-iSCSI Router registers FC devices WWN and iscsi Name alias. Both iscsi and FC identities are stored in the isns server 19 June Integrating FC and IP Networks FC JBOD: WWN=X, iscsi iscsi Name = abc iscsi TapeInitiator 2 FC Server: WWN=Y, Library 2 iscsi Name = xyz isns Server Management Platform iscsi Tape Library 1 iscsi Server 1 IP Network FC JBOD: WWN = X FC Fabric FC-iSCSI Gateway FC Server: WWN = Y Management Platforms can view and manage both iscsi and FC devices by interacting with isns server 19 June

19 Integrating FC and IP Networks iscsi Tape Library 2 is C S I Initiator 2 FC JBOD: WWN=X, iscsi Name = abc FC Server: WWN=Y, iscsi Name = xyz isns Server iscsi Tape Library 1 iscsi Server 1 IP Network FC JBOD: WWN=X, iscsi Name = abc FC JBOD: WWN = X FC Fabric FC-iSCSI Gateway FC Server: WWN = Y Other FC fabrics can be joined over common IP network. Other gateways can discover open mapping by querying isns FC-iSCSI Gateway FC JBOD: WWN = X 19 June FC Fabric FC Server: WWN = Z 19

IP Storage Protocols: iscsi. John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel

IP Storage Protocols: iscsi. John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

EDUCATION IP Storage Protocols: iscsi

EDUCATION IP Storage Protocols: iscsi IP Storage Protocols: John L. Hufferd, Sr. Exec Dir of Technology, Brocade, Inc Ahmad Zamer Storage Technology Initiatives Manager, Intel Abstract IP Storage Protocols: This session will explain the various

More information

IP Storage Protocols: iscsi. John L Hufferd, Hufferd Enterprises

IP Storage Protocols: iscsi. John L Hufferd, Hufferd Enterprises John L Hufferd, Hufferd Enterprises SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material

More information

Title Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers

Title Month Year. IP Storage: iscsi and FC Extension. Introduction. IP Network Layers - In Practice. IP Network Layers Introduction Storage: and FC Extension David L. Black, Ph.D. What is Storage? Storage access over / networks SCSI and Fibre Channel over / Why is Storage interesting? Reuse existing infrastructure and

More information

Traditional SAN environments allow block

Traditional SAN environments allow block Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance

More information

iscsi A Revolutionary IP based SAN

iscsi A Revolutionary IP based SAN Volume 2, Issue 3, June 2013 iscsi A Revolutionary IP based SAN Sandeep Gupta Abstract - The storage area network, or SAN, allows many servers to share data storage, while providing high-performance access

More information

PERFORMANCE ANALYSIS AND IMPLEMENTATION OF OBJECT BASED STORAGE. A Thesis by. Ashish Maddi

PERFORMANCE ANALYSIS AND IMPLEMENTATION OF OBJECT BASED STORAGE. A Thesis by. Ashish Maddi PERFORMANCE ANALYSIS AND IMPLEMENTATION OF OBJECT BASED STORAGE A Thesis by Ashish Maddi Bachelor of Engineering, Mahatma Gandhi Institute of Technology, JNTU, India, 2006 Submitted to the Department of

More information

iscsi PERFORMANCE FOR MOBILE APPLIANCES USING INTERMEDIATE TARGET STORAGE A Thesis by Prashanth Kumar Arragattu

iscsi PERFORMANCE FOR MOBILE APPLIANCES USING INTERMEDIATE TARGET STORAGE A Thesis by Prashanth Kumar Arragattu iscsi PERFORMANCE FOR MOBILE APPLIANCES USING INTERMEDIATE TARGET STORAGE A Thesis by Prashanth Kumar Arragattu Bachelor of Technology, JNTU, India, 2005 Submitted to Department of Electrical and Computer

More information

Advanced iscsi Management April, 2008

Advanced iscsi Management April, 2008 April, 2008 Gene Nagle, istor Networks SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and

More information

iscsi testing: What are the test Challenges Under the Hood of a 10 Gb iscsi Storage Product Certification?

iscsi testing: What are the test Challenges Under the Hood of a 10 Gb iscsi Storage Product Certification? iscsi testing: What are the test Challenges Under the Hood of a 10 Gb iscsi Storage Product Certification? Dr. M. K. Jibbe Distinguished Engineer Manager and Technical Lead of Test Architect and Product

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter:

COPYRIGHTED MATERIAL. Windows Server 2008 Storage Services. Chapter. in this chapter: Chapter 1 Windows Server 2008 Storage Services Microsoft Exam Objectives covered in this chapter: ÛÛConfigure storage. May include but is not limited to: RAID types, Virtual Disk Specification (VDS) API,

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S

Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Configuring iscsi in a VMware ESX Server 3 Environment B E S T P R A C T I C E S Contents Introduction...1 iscsi Explained...1 Initiators...1 Discovery and Logging On...2 Authentication...2 Designing the

More information

ECE Enterprise Storage Architecture. Fall 2016

ECE Enterprise Storage Architecture. Fall 2016 ECE590-03 Enterprise Storage Architecture Fall 2016 Storage Area Network (SAN) Tyler Bletsch Duke University Adapted from the course Information Storage and Management v2 (module 5-6), published by EMC

More information

iscsi Security Overview

iscsi Security Overview iscsi Security Overview Otakar Likar, Chris Odhner Network Appliance March 2005 TR 3338 TECHNICAL REPORT Network Appliance, a pioneer and industry leader in data storage technology, helps organizations

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

iscsi Design Considerations and Deployment Guide VMware Infrastructure 3

iscsi Design Considerations and Deployment Guide VMware Infrastructure 3 Technical Note iscsi Design Considerations and Deployment Guide VMware Infrastructure 3 With the release of VMware Infrastructure 3, VMware added ESX Server support for iscsi storage. With rapidly increasing

More information

Comparing Server I/O Consolidation Solutions: iscsi, InfiniBand and FCoE. Gilles Chekroun Errol Roberts

Comparing Server I/O Consolidation Solutions: iscsi, InfiniBand and FCoE. Gilles Chekroun Errol Roberts Comparing Server I/O Consolidation Solutions: iscsi, InfiniBand and FCoE Gilles Chekroun Errol Roberts SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2

More information

iscsi BSDCan 2008, Ottawa is not an Apple appliance Daniel Braniss The Hebrew University of Jerusalem

iscsi BSDCan 2008, Ottawa is not an Apple appliance Daniel Braniss The Hebrew University of Jerusalem iscsi is not an Apple appliance Daniel Braniss danny@cs.huji.ac.il BSDCan 2008, Ottawa The Hebrew University of Jerusalem 1 why learn a new OS/kernel check feasibility of writing a driver knowing little

More information

Introduction to iscsi In BladeCenter

Introduction to iscsi In BladeCenter R Introduction to iscsi In BladeCenter First Edition (June 2005) Copyright International Business Machines Corporation 2005. All rights reserved. US Government Users Restricted Rights Use, duplication,

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

IP Storage Network Design

IP Storage Network Design IP Storage Network Design Session 2 Copyright Printed in USA. Agenda Storage Networking Technology Review and IP Storage Networking Naming TCP and Sessions Discovering Storage Connecting Servers NICs and

More information

COSC6376 Cloud Computing Lecture 17: Storage Systems

COSC6376 Cloud Computing Lecture 17: Storage Systems COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive

More information

The Evolution of iscsi

The Evolution of iscsi The Evolution of iscsi Fred Knight, NetApp Andy Banta, SolidFire, Now part of NetApp @andybanta May 24 th, 2016 Today s Presenters Andy Banta Storage Janitor SolidFire/NetApp David Fair Chair, SNIA-ESF

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

iscsi Software User Guide for Linux

iscsi Software User Guide for Linux iscsi Software User Guide for Linux iscsi Software Release Version 5.0 Chelsio Communications, Inc. www.chelsio.com Copyright 2007, 2008, 2009, 2010 by Chelsio Communications, Inc., 370 San Aleso Ave,

More information

Design of the iscsi Protocol

Design of the iscsi Protocol Design of the iscsi Protocol Kalman Z. Meth, Julian Satran IBM Haifa Research Laboratory Haifa, Israel {meth,satran}@il.ibm.com Abstract The iscsi protocol enables accessing SCSI I/O devices over an IP

More information

S S SNIA Storage Networking Foundations

S S SNIA Storage Networking Foundations S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS

More information

BIG-IP TMOS : Implementations. Version

BIG-IP TMOS : Implementations. Version BIG-IP TMOS : Implementations Version 11.5.1 Table of Contents Table of Contents Customizing the BIG-IP Dashboard...13 Overview: BIG-IP dashboard customization...13 Customizing the BIG-IP dashboard...13

More information

iscsi PCTS Protocol Conformance Test Suite

iscsi PCTS Protocol Conformance Test Suite iscsi PCTS Protocol Conformance Test Suite Tejas Bhise Arshad Hussain Calsoft Inc. Contents Background Workings Test Case Coverage Login Details FFP Details Errors Details RFC Sections Covered Architecture

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

iscsi Unified Network Storage

iscsi Unified Network Storage iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

THE FOLLOWING EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Configure local storage. Configure Windows Firewall

THE FOLLOWING EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Configure local storage. Configure Windows Firewall Chapter 17 Configuring File and Storage Services THE FOLLOWING 70-410 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: Configure local storage This objective may include, but is not limited to: Design storage

More information

SCSI and FC standards update Frederick Knight NetApp Inc

SCSI and FC standards update Frederick Knight NetApp Inc SCSI and FC standards update Frederick Knight NetApp Inc INCITS standards process 1. Proposals (at each TC - T10, T11, T13) 2. Working Draft (many revs) 3. TC Letter Ballot (+ comment resolution) 4. INCITS

More information

American Dynamics RAID Storage System iscsi Software User s Manual

American Dynamics RAID Storage System iscsi Software User s Manual American Dynamics RAID Storage System iscsi Software User s Manual Release v2.0 April 2006 # /tmp/hello Hello, World! 3 + 4 = 7 How to Contact American Dynamics American Dynamics (800) 507-6268 or (561)

More information

Installation Guide. Tandberg Data DPS1000 Series Model: DPS1100 and DPS1200, Release: 1.3

Installation Guide. Tandberg Data DPS1000 Series Model: DPS1100 and DPS1200, Release: 1.3 Installation Guide Tandberg Data DPS1000 Series Model: DPS1100 and DPS1200, Release: 1.3 Contents Preface.......................................................................v About this guide..............................................................

More information

Evaluating the Impact of RDMA on Storage I/O over InfiniBand

Evaluating the Impact of RDMA on Storage I/O over InfiniBand Evaluating the Impact of RDMA on Storage I/O over InfiniBand J Liu, DK Panda and M Banikazemi Computer and Information Science IBM T J Watson Research Center The Ohio State University Presentation Outline

More information

iscsisim Test Tool for iscsi Targets David J. Cuddihy Principal Engineer ATTO Technology, Inc.

iscsisim Test Tool for iscsi Targets David J. Cuddihy Principal Engineer ATTO Technology, Inc. iscsisim Test Tool for iscsi Targets David J. Cuddihy Principal Engineer ATTO Technology, Inc. Another iscsi Test Platform? Why do we need yet another test tool? Commercial testing platforms don t match

More information

draft-ietf-storm-iscsi-cons-09.txt Intended status: Proposed Standard

draft-ietf-storm-iscsi-cons-09.txt Intended status: Proposed Standard Storage Maintenance (storm) WG Mallikarjun Chadalapaka Internet Draft Microsoft draft-ietf-storm-iscsi-cons-09.txt Intended status: Proposed Standard Julian Satran Expires: December 2013 Infinidat Ltd.

More information

PAC532 iscsi and NAS in ESX Server 3.0. Andy Banta Senior Storage Engineer VMware

PAC532 iscsi and NAS in ESX Server 3.0. Andy Banta Senior Storage Engineer VMware PAC532 iscsi and NAS in ESX Server 3.0 Andy Banta Senior Storage Engineer VMware October 20th, 2005 Overview What is iscsi? What is NAS? Why are iscsi and NAS Interesting? How VMware is Doing iscsi Implementation

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Module 2 Storage Network Architecture

Module 2 Storage Network Architecture Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,

More information

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview This course will teach students about building a simple network, establishing internet connectivity, managing network device security,

More information

Objective. Performance. Availability. Cost. A good network citizen

Objective. Performance. Availability. Cost. A good network citizen Objective Performance Interconnect will meet or exceed current storage needs and enable growth High bandwidth, minimum latency Availability Enable various levels of recovery Cost Reuse whatever available

More information

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting

Hands-On Wide Area Storage & Network Design WAN: Design - Deployment - Performance - Troubleshooting Hands-On WAN: Design - Deployment - Performance - Troubleshooting Course Description This highly intense, vendor neutral, Hands-On 5-day course provides an in depth exploration of Wide Area Networking

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Assignment No. SAN. Title. Roll No. Date. Programming Lab IV. Signature

Assignment No. SAN. Title. Roll No. Date. Programming Lab IV. Signature Assignment No. Title (A-6) SAN Roll No. Class T.E. Date Subject Programming Lab IV Signature Assignment no: (A-6) Title: Study of Storage Area Network (SAN). Problem Statement: Design and Setup LAN with

More information

Storage Maintenance (StorM) Working Group. Intended status: Standards Track. December 2011

Storage Maintenance (StorM) Working Group. Intended status: Standards Track. December 2011 Storage Maintenance (StorM) Working Group Internet Draft Intended status: Standards Track Expires: June 2012 Frederick Knight NetApp M. Chadalapaka Microsoft December 2011 Internet Small Computer Systems

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

TS Open Day Data Center Fibre Channel over IP

TS Open Day Data Center Fibre Channel over IP TS Open Day Data Center Fibre Channel over IP Presented by: Rong Cheng- TAC LAN & DCN China Jan 30 th, 2015 2013 Cisco and/or its affiliates. All rights reserved. 1 FCIP Introduction FCIP Configuration

More information

iscsi Consortium Full Feature Phase Test Suite For iscsi Initiators

iscsi Consortium Full Feature Phase Test Suite For iscsi Initiators iscsi Consortium Full Feature Phase Test Suite For iscsi Initiators Version 0.1 Last Update: July 3, 2003 iscsi Consortium 121 Technology Drive Suite 2 Durham, NH 03824-3525 Research Computing Center Phone:

More information

Fibre Channel and IP SAN Integration Dr. Joseph L White

Fibre Channel and IP SAN Integration Dr. Joseph L White Fibre Channel and IP SAN Integration Dr. Joseph L White (was Henry Yang) (My presentation is based on his conference paper) McDATA Corporation 4 McData Parkway, Broomfield CO 80021-5060 [3850 N. First

More information

CompTIA Storage+ Powered by SNIA

CompTIA Storage+ Powered by SNIA CompTIA Storage+ Powered by SNIA http://www.snia.org/education/courses/training_tc Course Length: 4 1/2 days 9AM 5PM (Monday-Thursday) local time 9AM 2PM (Friday) local time Course Fee: $2,790 USD Register:

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Best Practices For Running VMware vsphere On iscsi December 15, 2017

Best Practices For Running VMware vsphere On iscsi December 15, 2017 Best Practices For Running VMware vsphere On iscsi December 15, 2017 1 Table of Contents 1. Introduction 1.1.Introduction 2. iscsi Overview 2.1.iSCSI Overview 2.2.iSCSI Considerations 3. iscsi Architecture

More information

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows Objective A Virtual Private Network (VPN) is a method for remote users to virtually connect to a private network

More information

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates.

Cisco Plug and Play Feature Guide Cisco Services. Cisco Plug and Play Feature Guide Cisco and/or its affiliates. Cisco Services TABLE OF CONTENTS Configuring Cisco Plug and Play... 14 Contents Introduction... 3 Cisco Plug and Play Components... 3 Plug-n-Play Agent... 3 Key Benefits... 4 Plug and Play Server... 4

More information

IPsec NAT Transparency

IPsec NAT Transparency The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities

More information

iscsisim Test Tool for iscsi Targets David J. Cuddihy Principal Engineer ATTO Technology, Inc.

iscsisim Test Tool for iscsi Targets David J. Cuddihy Principal Engineer ATTO Technology, Inc. iscsisim Test Tool for iscsi Targets David J. Cuddihy Principal Engineer ATTO Technology, Inc. Another iscsi Test Platform? Why do we need yet another test tool? Commercial testing platforms don t match

More information

ExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you

ExamTorrent.   Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you ExamTorrent http://www.examtorrent.com Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you Exam : 100-105 Title : Cisco Interconnecting Cisco Networking Devices Part 1

More information

A Proposal for Access Controls

A Proposal for Access Controls A Proposal for Access Controls (aka SAN Boxes) SAN Promise and Problem T10 99-278r0 Promise: pool Storage Devices on SAN for ease of management Problem: SCSI not suited for "big shared bus" data integrity

More information

Agenda. 1. The need for Multi-Protocol Networks. 2. Users Attitudes and Perceptions of iscsi. 3. iscsi: What is it? 4.

Agenda. 1. The need for Multi-Protocol Networks. 2. Users Attitudes and Perceptions of iscsi. 3. iscsi: What is it? 4. iscsi Today and Tomorrow Gene Chesser Microsoft IOP Program Manager Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

HP OpenVMS Software-Based iscsi Initiator Technology Demonstration Kit Configuration and User s Guide

HP OpenVMS Software-Based iscsi Initiator Technology Demonstration Kit Configuration and User s Guide HP OpenVMS Software-Based iscsi Initiator Technology Demonstration Kit Configuration and User s Guide November 2007 This manual describes how to configure and use the HP OpenVMS Software-Based iscsi Initiator

More information

Copyleft 2005, Binnur Kurt. Objectives

Copyleft 2005, Binnur Kurt. Objectives 1 ing Fundamentals Copyleft 2005, Binnur Kurt Objectives Define basic networking terms Describe some commonly used network applications Describe the main purposes and functions of computer networking Describe

More information

CSE 123A Computer Netwrking

CSE 123A Computer Netwrking CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore

More information

Course Documentation: Printable course material This material is copyrighted and is for the exclusive use of the student only

Course Documentation: Printable course material This material is copyrighted and is for the exclusive use of the student only Title: CompTIA Storage+ Powered by SNIA Course Length: 5 days Monday - Friday 9AM 5PM (MTN) Course Instructional Method: Interactive Lecture Lab Exam Study Sessions Course Documentation: Printable course

More information

Fabric Services. Tom Clark Director, Technical Marketing

Fabric Services. Tom Clark Director, Technical Marketing Fabric Services Tom Clark Director, Technical Marketing April 2000 Introduction A fabric is one or more Fibre Channel switches connected together as a network. Typically, fabrics are used to build storage

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Configuring Server Boot

Configuring Server Boot This chapter includes the following sections: Boot Policy, page 1 UEFI Boot Mode, page 2 UEFI Secure Boot, page 3 CIMC Secure Boot, page 3 Creating a Boot Policy, page 5 SAN Boot, page 6 iscsi Boot, page

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Network Working Group. Category: Standards Track Hewlett-Packard T. McSweeney IBM J. Muchow Qlogic Corp. May 2006

Network Working Group. Category: Standards Track Hewlett-Packard T. McSweeney IBM J. Muchow Qlogic Corp. May 2006 Network Working Group Request for Comments: 4544 Category: Standards Track M. Bakke Cisco Systems M. Krueger Hewlett-Packard T. McSweeney IBM J. Muchow Qlogic Corp. May 2006 Status of This Memo Definitions

More information

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Foreword xxiii Preface xxvii IPv6 Rationale and Features Contents Foreword Preface xxiii xxvii 1 IPv6 Rationale and Features 1 1.1 Internet Growth 1 1.1.1 IPv4 Addressing 1 1.1.2 IPv4 Address Space Utilization 3 1.1.3 Network Address Translation 5 1.1.4 HTTP

More information

Chapter 6: Network Layer

Chapter 6: Network Layer Chapter 6: Network Layer CCNA Routing and Switching Introduction to Networks v6.0 Chapter 6 - Sections & Objectives 6.1 Network Layer Protocols Explain how network layer protocols and services support

More information

Imi :... Data:... Nazwisko:... Stron:...

Imi :... Data:... Nazwisko:... Stron:... Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols

More information

This appendix covers the following topics: Understanding the Concepts of Storage Networking Understanding the Storage Networking Protocols

This appendix covers the following topics: Understanding the Concepts of Storage Networking Understanding the Storage Networking Protocols This appendix covers the following topics: Understanding the Concepts of Storage Networking Understanding the Storage Networking Protocols Integrating SAN in Cisco Multilayer Switched Networks Implementing

More information

IPsec NAT Transparency

IPsec NAT Transparency sec NAT Transparency First Published: November 25, 2002 Last Updated: March 1, 2011 The sec NAT Transparency feature introduces support for Security (sec) traffic to travel through Network Address Translation

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

IPv6 Neighbor Discovery

IPv6 Neighbor Discovery The IPv6 neighbor discovery process uses Internet Control Message Protocol (ICMP) messages and solicited-node multicast addresses to determine the link-layer address of a neighbor on the same network (local

More information

A SCSI Transport Layer Extension with Separate Data and Control Paths for Scalable Storage-Area-Network Architectures

A SCSI Transport Layer Extension with Separate Data and Control Paths for Scalable Storage-Area-Network Architectures Technion - Israel Institute of technology Department of Electrical Engineering SCSI-DSDC A SCSI Transport Layer Extension with Separate Data and Control Paths for Scalable Storage-Area-Network Architectures

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to

More information

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004

Quick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004 CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the

More information

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Network Working Group Request for Comments: 3776 Category: Standards Track J. Arkko Ericsson V. Devarapalli Nokia Research Center F. Dupont GET/ENST Bretagne June 2004 Using IPsec to Protect Mobile IPv6

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

iscsi Error Recovery Mallikarjun Chadalapaka Randy Haagens Julian Satran London, 6-7 Aug 2001

iscsi Error Recovery Mallikarjun Chadalapaka Randy Haagens Julian Satran London, 6-7 Aug 2001 iscsi Error Recovery Mallikarjun Chadalapaka Randy Haagens Julian Satran London, 6-7 Aug 2001 Why do we care? Error statistics an attempt to extrapolate (innovatively) from an experiment conducted at Stanford:

More information

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00 Fred Detienne, Cisco Systems Manish Kumar, Cisco Systems Mike Sullenberger, Cisco Systems What is Dynamic Mesh VPN? DMVPN is a solution for building VPNs

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Hypervisor Storage Interfaces for Storage Optimization White Paper June 2010

Hypervisor Storage Interfaces for Storage Optimization White Paper June 2010 Hypervisor Storage Interfaces for Storage Optimization White Paper June 2010 1 of 44 The SNIA hereby grants permission for individuals to use this document for personal use only, and for corporations and

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Fibre Channel vs. iscsi. January 31, 2018

Fibre Channel vs. iscsi. January 31, 2018 Fibre Channel vs. iscsi January 31, 2018 Today s Presenters Fred Knight NetApp John Kim SNIA ESF Chair Mellanox Alex McDonald SNIA ESF Vice Chair NetApp 2 SNIA-At-A-Glance 3 SNIA Legal Notice The material

More information

iscsi Management API

iscsi Management API iscsi Management API Version 2.0 rev 15 Publication of this Working Draft for review and comment has been approved by the IP Storage TWG. This draft represents a best effort attempt by the IP Storage TWG

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile

More information