HP StorageWorks 4000/6000/8000 .HP StorageWorks SAN Design Reference Guide, Pa - Page 358

Sessions and logins, SendTargets command, Service Location Protocol, Internet Storage Name Service

Page 358 highlights

SendTargets command With the SendTargets command, administrators configure the address of each target portal, setting up a range of target addresses for discovery. In a discovery session, an initiator sends the SendTarget command to discover all of the accessible target node names. SendTargets is recommended for small iSCSI SANs. Service Location Protocol Clients (initiators) discover services (targets) using SLP, a client-server protocol. SLP for iSCSI uses three components: • An iSCSI initiator has an SLP UA that serves as a client. • iSCSI targets have an SLP SA that acts as an SLP server. • A DA interprets multicast service requests from the server. Initiators use three techniques for discovering targets: • Unicast discovery service requests to the DA • Multicast discovery service requests to SAs • Unicast discovery service requests directly to an SA Internet Storage Name Service The iSNS is a client-server discovery protocol. It provides naming and resource discovery services for storage systems on the IP network. The iSNS is modeled on both IP and Fibre Channel. iSNS components include: • iSNS server-A directory server with optional security features. • iSCSI initiators with iSNS client capabilities-The initiator iSNS client registers the initiator with the iSNS server and queries for a list of targets. • iSCSI targets with iSNS client capabilities-The target iSNS client registers the target with the iSNS server. Sessions and logins A session is a data exchange between an initiator and target. At the beginning of a session, information about the session is exchanged; later, application data is exchanged. A session is enabled through an iSCSI login process: 1. The initiator establishes a TCP/IP connection. 2. The initiator starts the iSCSI login phase. 3. The initiator and target negotiate variable parameters. 4. Optional-The target checks allowable connectivity with a security phase. 5. At the completion of the iSCSI login phase: • Success means the target sends a login accept to the initiator; the session continues. • Failure means the login is rejected; the TCP/IP connection is closed. During iSCSI login, the initiator and target negotiate the lowest mutually acceptable value for each parameter. Negotiable parameters include: • Type of security protocol, if any 358 iSCSI storage

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456

SendTargets command
With the
SendTargets
command, administrators configure the address of each target portal, setting
up a range of target addresses for discovery. In a discovery session, an initiator sends the
SendTarget
command to discover all of the accessible target node names.
SendTargets
is recommended for
small iSCSI SANs.
Service Location Protocol
Clients (initiators) discover services (targets) using SLP, a client-server protocol. SLP for iSCSI uses three
components:
An iSCSI initiator has an SLP UA that serves as a client.
iSCSI targets have an SLP SA that acts as an SLP server.
A DA interprets multicast service requests from the server.
Initiators use three techniques for discovering targets:
Unicast discovery service requests to the DA
Multicast discovery service requests to SAs
Unicast discovery service requests directly to an SA
Internet Storage Name Service
The iSNS is a client-server discovery protocol. It provides naming and resource discovery services for
storage systems on the IP network. The iSNS is modeled on both IP and Fibre Channel. iSNS
components include:
iSNS server
A directory server with optional security features.
iSCSI initiators with iSNS client capabilities
The initiator iSNS client registers the initiator with the
iSNS server and queries for a list of targets.
iSCSI targets with iSNS client capabilities
The target iSNS client registers the target with the iSNS
server.
Sessions and logins
A session is a data exchange between an initiator and target. At the beginning of a session, information
about the session is exchanged; later, application data is exchanged.
A session is enabled through an iSCSI login process:
1.
The initiator establishes a TCP/IP connection.
2.
The initiator starts the iSCSI login phase.
3.
The initiator and target negotiate variable parameters.
4.
Optional
The target checks allowable connectivity with a security phase.
5.
At the completion of the iSCSI login phase:
Success means the target sends a login accept to the initiator; the session continues.
Failure means the login is rejected; the TCP/IP connection is closed.
During iSCSI login, the initiator and target negotiate the lowest mutually acceptable value for each
parameter. Negotiable parameters include:
Type of security protocol, if any
iSCSI storage
358