Investigating Serial Attached SCSI (SAS) over TCP (eSAS) and benchmarking eSAS prototype against legacy SAS UCCS Master’s Project Proposal Deepti Reddy.

Slides:



Advertisements
Similar presentations
Investigating Serial Attached SCSI (SAS) over TCP (tSAS)
Advertisements

Storage Networking Strategic Decision-Making Randy Kerns Evaluator Group, Inc.
1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
IP –Based SAN extensions and Performance Thao Pham CS 622 Fall 07.
Fibre Channel Erin Keith CPE 401 Spring, Fibre Channel Storage Area Networks Overview Functionality Format Applications References.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
5/8/2006 Nicole SAN Protocols 1 Storage Networking Protocols Nicole Opferman CS 526.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Storage Networking. Storage Trends Storage growth Need for storage flexibility Simplify and automate management Continuous availability is required.
Lecture 8 Modeling & Simulation of Communication Networks.
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 File and Disk Sharing Protocols April 2, 2008 Richard Sharpe Senior Software Engineer | Data.
Investigating Serial Attached SCSI (SAS) over TCP (tSAS) UCCS Master’s Project Deepti Reddy.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Introduction to Storage Area Networks – I iSCSI.
4/13/2007 Master's Project Proposal 1 Secure Asymmetric iSCSI For Online Storage Sarah A. Summers Project Proposal Master of Science in Computer Science.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Prepared by They Yu Shu Lee Ern Yu.  Motivation  Previous Work  Remaining Issues  Improvement.
11/05/07 1TDC TDC 564 Local Area Networks Lecture 8 IP-based Storage Area Network.
ITCC-1401 Chapter 3: Network Protocols and Communications
Investigating Serial Attached SCSI (SAS) over TCP (eSAS) and benchmarking eSAS prototype against legacy SAS UCCS Master’s Project Proposal Deepti Reddy.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
INDEX oWoWhat is TCP/IP protocol suite ? oDoDifferent layers. oEoEncapsulation. oPoProtocol Interface.
The Internet The History and Future of the Internet.
Knowing when to deploy DAS NAS and SAN can optimize t Availability t Scalability t Performance t Manageability t Cost effectiveness.
Virtual Storage in Future Internet Database Lab. Kyung Hee University. Ding Jinghua
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Communicating over the Network Network Fundamentals – Chapter 2.
© 2009 IBM Corporation Statements of IBM future plans and directions are provided for information purposes only. Plans and direction are subject to change.
AoE and HyperSCSI on Linux PDA Prepared by They Yu Shu.
1 OSI and TCP/IP Models. 2 TCP/IP Encapsulation (Packet) (Frame)
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
IATA Kulveer Singh
Internet Protocol Storage Area Networks (IP SAN)
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
Investigating Serial Attached SCSI (SAS) over TCP (tSAS)
SAN 2001 Session 201 The Future of Storage Area Networks Milan Merhar Chief Scientist, Pirus Networks
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
K. Salah1 Security Protocols in the Internet IPSec.
July 30, 2009opsarea meeting, IETF Stockholm1 Operational Deployment and Management of Storage over the Internet David L. Black, EMC IETF opsarea meeting.
Chapter 3: Network Protocols and Communications
Video Security Design Workshop:
A quick intro to networking
Rick Graziani Cabrillo College Fall 2015
Distributed Systems.
Investigating Serial Attached SCSI (SAS) over TCP (tSAS)
iSCSI Application to Cam Coder - A feasibility Study
Direct Attached Storage and Introduction to SCSI
Storage Networking.
SAN (Extension Protocol & Protocol Stack)
Introduction to Networks
Network Architecture Introductory material
Computer Networks 9/17/2018 Computer Networks.
Direct Attached Storage and Introduction to SCSI
Storage Networking.
Review of Important Networking Concepts
Module – 6 IP san and fcOe Module 6: IP SAN and FCoE 1
Storage Networks and Storage Devices
Storage Networking Protocols
iSCSI-based Virtual Storage System for Mobile Devices
TCP/IP Protocol Suite: Review
TCP/IP Protocol Suite: Review
CS4470 Computer Networking Protocols
Cost Effective Network Storage Solutions
Network and the internet
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Presentation transcript:

Investigating Serial Attached SCSI (SAS) over TCP (eSAS) and benchmarking eSAS prototype against legacy SAS UCCS Master’s Project Proposal Deepti Reddy 1

SCSI vs SAS SCSISAS TopologyParallel BusSerial Bus Speed3.2 Gbps3 Gbps, 6Gbps, 12Gbps Distance1 to 12 meters8 meters Number of Targets 14 devices128 expanders. > 16,000 with cascaded expanders DevicesSCSI onlySAS & SATA ConnectivitySingle PortDual Port Drive Form Factor 3.5”2.5” CostLowMedium 2

iSCSI & Related Work iSCSI protocol describes a means of transporting of the SCSI packets over TCP/IP  The iSCSI specification is revised and updated by the Internet Engineering task Force (IEFT).  Work by S. Aiken, D. Grunwald, A. Pleszkun and J. Willeke shows the performance of a commercial iSCSI software implementation compared quite favorably with fibrechannel [7]  Security in iSCSI based network storage systems can degrade the performance of the syste. Research by S. Chaitanya, K. Butler, A. Sivasubramaniam, P. McDaniel and M. Vilayannur looks at methods to improve iSCSI performance [10] 3

Typical SAS Topology - DISK DRIVES - EXPANDERS Driver ~8m 4

Motivation & Challenges  Overcome the distance and scalability limitations of traditional Serial Attached SCSI (SAS) by using eSAS.  Like iSCSI, eSAS takes advantage of existing internet infrastructure, internet management facilities as well as addresses distance limitations  Provide research results for future industry specification for eSAS and iSCSI. 5

eSAS Topology - DISK DRIVES - EXPANDERS MPT Driver - TCP link - SAS link Out of band SAS over TCP In-band SAS 6

eSAS Approach  The eSAS Request is initially sent by the eSAS Initiator to the eSAS Target over TCP.  The eSAS Target strips off the TCP header and sends the SAS frames using the SAS Initiator block on the eSAS Target to the SAS expander/drive.  The SAS expander/drive sends SAS frames to the eSAS Target.  Finally, the eSAS Target embeds the SAS frames received from the expander/drive over TCP and sends it to the eSAS Initiator. 7

eSAS Message Format  The above shows how a legacy SAS header and data are embedded in an ethernet frame.  iSCSI uses the same approach where the SCSI header and data are encapsulated in an Ethernet frame. Ethernet Header IP Header TCP Header eSAS Header eSAS Data Ethernet Trailer TCP Segment IP Datagram Ethernet Frame 8

eSAS Approach  The above diagram shows a typical eSAS (SSP Read ) Request & Response sequence diagram.  iSCSI uses a similar approach where the back-end between the iSCSI target and SCSI drives uses the legacy SCSI protocol. eSAS Request eSAS Initiator eSAS Target SAS Expander Open Address Frame Open Accept SAS Request Frame Data Frame. Data Frame eSAS Response Response Frame Data Frame. Data Frame 9

Goals of the project  Design and develop a prototype of eSAS system − Write a client program using C/C++ that sends a set of eSAS commands to a server. − Write a server program using C/C++ that receives a set of eSAS commands, processes them and responds to the client with eSAS responses.  Evaluate the eSAS solution and compare with legacy SAS. 10

Tasks and Timeline TaskTimelineStatus Research SAS protocol 1.5 monthsCompleted Understand iSCSI at a high-level 15 daysCompleted Investigate how to embed SAS traffic over TCP/IP 7 daysCompleted Research how to benchmark SAS 10 daysOngoing (Expected Completion – November 22 nd ) Proposal writing7 daysCompleted 11

Tasks and Timeline TaskTimelineStatus S/W development of the eSAS client mock up + S/W development of the eSAS server mock up using C/C++ ~1.5 monthsEstimated Completion – January 10th Final Project Report 15 daysEstimated Completion – January 28th Final Presentation + Defense 5 daysEstimated Completion – January 31 st 12

Deliverables 1.Research report on the design and implementation of the client and server application 2.Research report on the benchmarking results of eSAS prototype app vs legacy SAS. 3. The software client eSAS simulator developed for the project. 4. The software server eSAS simulator developed to test the client application 13

References [1] T10/1760-D Information Technology – Serial Attached SCSI – 2 (SAS-2), T10, 18 April 2009, Available from [2] Harry Mason, Serial attached SCSI Establishes its Position in the Enterprise, LSI Corporation, available from [3] J Satran, K Meth, C. Sapuntzakis, M. Chadalapka, E. Zeidner, RFC 3720 Internet Small Computer Systems Interface (iSCSI) Specification IETF, April 2004, available from [4] Cai, Y.; Fang, L.; Ratemo, R.; Liu, J.; Gross, K.; Kozma, M.; A test case for 3Gbps serial attached SCSI (SAS) Test Conference, Proceedings. ITC IEEE International, February 2006, available from [5] Heng Liao, Tim Symons, Rachelle Tant, Managing Access Control Through Zoning, PMC-Sierra Inc., Spetember 2005, available from 14

References [6] Kalmath Meth, Julian Satran, Design of the iSCSI Protocol, Mass Storage Systems and Technologies, (MSST 2003). Proceedings. 20th Mass Storage Systems and Technologies, (MSST 2003). Proceedings. 20th IEEE/11th NASA Goddard Conference onIEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, April 2003, available from [7] Stephen Aiken, Dirk Grunwald, Andrew R. Pleszkun, Jesse Willeke, A Performance Analysis of the iSCSI Protocol 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies, 2003, available from [8] M. Rajagopal, E. Rodriguez, R. Weber, RFC 3821 Fibre Channel over TCP/IP (FCIP) standard, IETF, July 2004, available from [9] BLi Bigang, Shu Jiwu, Zheng Weimin, SCSI Target Simulator Based on FC and IP Protocols in TH-MSNS * Department of Computer Science and Technology, Tsinghua University, Beijing China,

References [10] S. Chaitanya, K. Butler, A. Sivasubramaniam, P. McDaniel, M. Vilayannur, Design, Implementation and Evaluation of Security in iSCSI-based Network Storage Systems, StorageSS '06 Proceedings of the second ACM workshop on Storage security and survivability, October 2006, available from 16