Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association (www.bitsaa.org)1November 19, 2006 Introduction to Storage Area Networks – I iSCSI.

Slides:



Advertisements
Similar presentations
Storage Networking Strategic Decision-Making Randy Kerns Evaluator Group, Inc.
Advertisements

Copyright © 2014 EMC Corporation. All Rights Reserved. Linux Host Installation and Integration for Block Upon completion of this module, you should be.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Network-Attached Storage
IP –Based SAN extensions and Performance Thao Pham CS 622 Fall 07.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
TCP. Learning objectives Reliable Transport in TCP TCP flow and Congestion Control.
K. Salah1 Security Protocols in the Internet IPSec.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
5/8/2006 Nicole SAN Protocols 1 Storage Networking Protocols Nicole Opferman CS 526.
Agenda CS C446 Data Storage Technologies & Networks
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 12 Transmission Control Protocol (TCP) Basics.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
1 © 2004 Cisco Systems, Inc. All rights reserved. iSCSI Overview IP Storage Networking FCIP/iSCSI Steve Tegeler Storage Networking Team Northwest Territory.
Module 10 Configuring and Managing Storage Technologies.
12/12/2008 Summers - SAiSCSI 1 Secure Asymmetric iSCSI For Online Storage Sarah A. Summers.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 9: Configuring Storage
Chabot College ELEC Ports (Layer 4).
Design and Implementation of a Linux SCSI Target for Storage Area Networks Ashish A. PalekarAnshul Chaddha, Trebia Networks Narendran Ganapathy, 33 Nagog.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Chapter 7 Low-Level Protocols
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
11/05/07 1TDC TDC 564 Local Area Networks Lecture 8 IP-based Storage Area Network.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
ISER on SCTP & IB draft-hufferd-ips-iser-sctp-ib-00.txt Generalizations to iSER specification John Hufferd Mike Ko Yaron Haviv.
TCP/IP Protocols Contains Five Layers
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Storage Networking Evolution Jim Morin VP Strategic Planning June 2001.
Copyright © 2014 EMC Corporation. All Rights Reserved. Windows Host Installation and Integration for Block Upon completion of this module, you should be.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Chapter 2 Protocols and the TCP/IP Suite 1 Chapter 2 Protocols and the TCP/IP Suite.
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
SWICHING & ROUTING.
Storage Wide-Area Networks (SWANs)
Internet Protocol Storage Area Networks (IP SAN)
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Network Basics CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
K. Salah1 Security Protocols in the Internet IPSec.
July 30, 2009opsarea meeting, IETF Stockholm1 Operational Deployment and Management of Storage over the Internet David L. Black, EMC IETF opsarea meeting.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
PPP Protocol.
IP SAN Storage Overview
IT443 – Network Security Administration Instructor: Bo Sheng
SAN (Extension Protocol & Protocol Stack)
PPP PROTOCOL The First semester
Introduction to Networks
SWITCHING & ROUTING.
Direct Attached Storage and Introduction to SCSI
Protocols and the TCP/IP Suite
Module – 6 IP san and fcOe Module 6: IP SAN and FCoE 1
Storage Networking Protocols
Process-to-Process Delivery:
Protocols and the TCP/IP Suite
PPP Protocol.
Process-to-Process Delivery: UDP, TCP
Presentation transcript:

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Introduction to Storage Area Networks – I iSCSI & FCIP Ashish Shah Cisco Systems, Inc.

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Agenda iSCSI –What is iSCSI –Login and Session Establishment –Basic IO –Advanced Concepts –Initiators and Targets FCIP –What is FCIP –FCIP Case Study References

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 What is iSCSI RFC Internet Small Computer Systems Interface A SCSI transport protocol that operates on top of TCP –Encapsulates SCSI CDBs (Command Descriptor Blocks) and data into TCP/IP byte-streams –Allows IP hosts to access IP based SCSI targets Broad industry support –Server vendors now publishing own supported iSCSI drivers –Native iSCSI storage arrays now appearing IP IP TCP TCP iSCSI iSCSI SCSI SCSI Data Data

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Architectural Model SCSI Block Commands SCSI Stream Commands Parallel SCSI Transport SCSI Applications (File Systems, Databases) Parallel SCSI Interfaces SCSI Device-Type Commands SCSI Generic Commands SCSI Transport Protocols Layer 3 Network Transport Layer 2 Network Fibre ChannelEthernet, PPP, HDLC… Other SCSI Commands IP TCP SCSI Commands, Data and Status FCP SCSI over FC iSCSI SCSI over TCP/IP

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Conceptual model Network Entity –An object that can have multiple iSCSI nodes iSCSI Node –Initiator or Target node –Identified by an iSCSI Name –iSCSI Target node can have multiple LUs Network Portal –Provides a mechanism to access the iSCSI nodes –Identified by a Network address (IP) Network Portal ( ) Network Portal (IP ) Network Portal (IP ) IP Network iSCSI Initiator Entity iSCSI Target Entity iSCSI node: Iqn.com.cisco.init-1 iSCSI node: Iqn.com.cisco.disk-1 iSCSI node: Iqn.com.cisco.disk-2

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Sessions iSCSI has the concept of a session between an initiator and a target –Loosely equivalent to a SCSI I-T Nexus –It can have one or more TCP connections –Session establishment has three phases Security authentication, Operational negotiation and Full Feature Discovery Sessions –Discover the targets in the network entity –Initiator executes “SendTargets” command after establishing the session This is the only command supported for a Discovery session Target Sessions –Sessions to specific targets –Supports normal SCSI commands

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Discovery Session Login Response Target list: com.cisco.Target-disk1 Com.cisco.Target-Disk2 Session type: Discovery-Session TCP port 3260 Target Initiator iSCSI Initiator Login (Discovery Session) Establish TCP Session TCP iSCSI Driver Command - SendTargets Command - Login Optional Authentication Phase

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Target Session Login TCP port 3260 Target Initiator TCP iSCSI Driver Establish TCP Session Command - Login Session-Type: Normal-Session, Target: com.cisco.Target-disk1 Optional Authentication Phase Operational Parameter Negotiation After this completes we are in full feature mode Command – SCSI commands Normal SCSI commands…

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Common iSCSI Identifiers PGT: Portal Group Tag –Tag identifying a set of Network Portals that can support sessions with multiple connections spanned across these portals ISID: Initiator Session Identifier –Specified by the initiator during login SSID: Session Identifier –Composed of the {ISID, Target PGT} TSIH: Target Session Identifying Handle –A Target assigned tag to identify sessions on its end ITT: Initiator Task Tag –Identifies an iSCSI Task

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Naming iSCSI name can be either : –IQN (iSCSI Qualified Name) iqn => iqn.yyyy-mm.reverse-FQDN-[:|.]-and-qualifier-string For example, iqn com.cisco.cluster1.mbr2 –EUI-64 name (Extended Unique Identifier) eui. EUI-64 For example, eui A425678D

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Packet Format Destination Address Source Address TypeIP 46–1500 Bytes 8662 FCS 4 Octet Preamble TCP Header SCSI Encapsulated Source Port Sequence Number Acknowledgment Number Checksum OffsetReservedU A P R S F iSCSI Targets Will Listen on This Port (by Default) Source PortDestination Port Sequence Number Acknowledgement Number OffsetReservedUAPRSF Window ChecksumUrgent Pointer Options and Padding OpcodeOpcode-Specific Fields Length of Data (After 40-Byte Header) LUN or Opcode-Specific Fields Initiator-Task Tag Opcode-Specific Fields Data Field… TCPData 3260 iSCSI Well-Known Ports: 21 FTP 25 SMTP 80 HTTP 3225 FCIP

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Read Sequence Target Initiator SCSI Command : ITT: 100, CmdSN: 110, ExpStatSN 50 SCSI Data-In: ITT 100, ExpCmdSN: 111, MaxCmdSN: 115, DataSN: 1 SCSI Response: ITT 100, ExpCmdSN: 111, MaxCmdSN: 116, ExpDataSn: 3, StatSN: 50

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Write Sequence Target Initiator SCSI Command : ITT: 100, CmdSN: 110, ExpStatSN 50 SCSI Data-Out: ITT 100, : 111, TTT: 10, DataSN: 1, ExpStatSN: 1 SCSI Response: ITT 100, ExpCmdSN: 111, MaxCmdSN: 116, StatSN: 50 R2T : ITT: 100, TTT: 10 R2TSN: 10

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 More iSCSI Concepts Error Recovery Levels (ERL 0/1/2) –Progressively higher level of error recovery capability 0 => Session failure recovery 1 => Digest failure recovery 2 => Connection recovery iSCSI Header and Data Digests –Integrity protection only –Use of IPSec recommended for security Task Management Functions –Derived from SCSI TMFs

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Initiators NIC AdapterSCSI Adapter iSCSI Software Driver NIC Driver Adapter Driver TCP/IP Stack iSCSI SCSI Generic Block Device Applications File System SCSI Adapter iSCSI Software Driver and Dedicated Hardware Adapter Driver iSCSI TOE Adapter NIC Driver TCP/IP Stack iSCSI SCSI Generic Block Device File System Applications Windows & Linux iSCSI initiators freely available iSCSI HBA: both iSCSI & TCP offloaded to hardware TOE: Only TCP Offloaded

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Targets Native iSCSI Targets just appearing in the market iSCSI Gateway products have been on the market for a longer time –Exports backend FC targets through virtual iSCSI targets –Allows iSCSI initiators to access FC targets –Allows customers to introduce iSCSI initiators to existing FC SANs

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI Gateway on Cisco MDS iSCSI Initiators Presented as FC Initiators FC Targets Presented as iSCSI Targets pWWN a Fibre Channel SAN View pWWN b pWWN c pWWN d FC iSCSI Real iSCSI Initiator IP Addr iqn.initiator.abc IP Network Fibre Channel Fabric FC iSCSI Virtual iSCSI Target IP Addr iqn.target.abc Real FC Target pWWN 12:34…78 fcid 0x iSCSI iqn.abc.123 iqn.def.123 iqn.ghi.456 iqn.jkl.555 iSCSI Storage View IP Virtual FC Initiator pWWN 12:34…56 fcid 0x550001

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 FCIP

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 What is FCIP RFC 3821 – Fibre Channel over TCP/IP Method to encapsulate FC traffic and send over an IP network –Encapsulating TCP connections are called FCIP Tunnels Connects physically separate SANs through E/TE ports over an IP network –Forms a unified SAN in a single Fibre Channel fabric. –FC Fabric and all FC devices are unaware of the presence of the IP Network Motivation is to connect physically remote FC sites to allow remote disk access, tape backup and live mirroring

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 FCIP… Advanced features help throughput: –Write Acceleration Spoofing Transfer Ready locally –Tape Acceleration Spoofing Tape commands locally –Compression

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 FCIP Case Study

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Cisco IT SAN Case Study BEFORE FCIP: Host-Based Replication Source: Cisco Case Study: FCIP and EMC SRDF/A. November 14, 2005 © 2005 Cisco Systems, Inc. All rights reserved.

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Cisco IT SAN Case Study… AFTER FCIP: Array-Based Replication Source: Cisco Case Study: FCIP and EMC SRDF/A. November 14, 2005 © 2005 Cisco Systems, Inc. All rights reserved.

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 iSCSI & FCIP References IETF IP Storage (IPS) Chapter –List of all relevant RFCs, mailing lists and working group details Storage Networking Industry Association (SNIA) –

Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Q & A