In computing, iSCSI is an acronym for Internet Small Computer Systems Interface, an Internet .. RFC – Internet Small Computer Systems Interface (iSCSI) ( obsolete); RFC – Internet Small Computer Systems Interface (iSCSI) Naming. The iSCSI protocol aims to be fully compliant with the standardized SCSI architecture model. Standards Track [Page 1] RFC iSCSI April Table of. (iSCSI). RFC (was draft-ietf-storm-rdmap-ext). Remote Direct . iSCSI Core – SCSI mapping to TCP () . RFC base iSCSI protocol.

Author: Mezicage Mazurisar
Country: Azerbaijan
Language: English (Spanish)
Genre: Education
Published (Last): 4 April 2005
Pages: 275
PDF File Size: 20.92 Mb
ePub File Size: 10.23 Mb
ISBN: 742-1-76624-204-5
Downloads: 44170
Price: Free* [*Free Regsitration Required]
Uploader: Vum

Network Working Group J. Satran Request for Comments: Sapuntzakis Cisco Systems M. Please refer to the current edition of the “Internet Official Protocol Standards” Iscssi 1 for the standardization state and status of this protocol.

Distribution of this memo is unlimited. As system interconnects move from the classical bus structure to a network structure, SCSI has to be mapped to network transport protocols. IP networks now meet the performance requirements of fast system interconnects and as such are good candidates to “carry” SCSI. Table of Contents 1. Command Numbering and Acknowledging. Tags and Integrity Checks.

Message Synchronization and Steering. Consequences of the Model. Task Management Function Request. Task Management Function Response 44 3. Ready To Transfer R2T. Text Request and Text Response. Login Request and Login Response. Logout Request and Response. Login and Full Feature Phase Negotiation. Session Reinstatement, Closure, and Timeout.

Loss of Nexus Notification. Session 370 and Failure. Protocol Features and State Expectations. Retry and Reassign in Recovery. Timeouts on Transport Exception Events. Timeouts on Planned Decommissioning. Implicit Termination of Tasks. Standard Connection State Diagrams. State Descriptions for Initiators and Targets. State Transition Descriptions for Initiators iecsi Targets. Standard Connection State Diagram for an Initiator. Standard Connection State Diagram for a Target.

Session State Diagram for an Initiator. Session State Diagram for a Target. Data Integrity and Authentication. Synch and Steering Layer and Performance. Determining the Proper ErrorRecoveryLevel. Header Digest and Data Digest. Flags and Task Attributes byte 1. Expected Data Transfer Length. Data Segment – Command Data.


Bidirectional Read Residual Count. Task Management Function Response. Task Management Actions on 33720 Sets. Implicit termination of tasks. Standard iSCSI extension item-label format. Sync and Steering with Fixed Interval Markers. Markers At Fixed Intervals. Algorithmic Presentation of Error Recovery Classes. General Data Structure and Procedure Description.

Within-command Error Recovery Algorithms. Clearing Effects of Various Events on Targets.

Internet Small Computer Systems Interface (iSCSI)”, RFC – Semantic Scholar

SCSI is a client-server architecture. Clients of a SCSI interface are called “initiators”. Initiators issue SCSI “commands” to request services from components, logical units of a server known as a “target”. Definitions and Acronyms 2. Connections within a session are identified by a connection ID.

Internet Small Computer Systems Interface (iSCSI)”, RFC 3720

It is a unique ID for this connection within the session for the rtc. It is generated by the initiator and presented to 3702 target during login requests and during logouts that close connections. A connection is a TCP connection. Communication between the initiator and target occurs over one or more TCP connections. The word “initiator” has been appropriately qualified as either a port or a device in the rest of the document when the context is ambiguous. All unqualified usages of “initiator” refer to an initiator port or device depending on the context.

The iSCSI transfer direction is defined with regard to the initiator.

iSCSI overview

Outbound or outgoing transfers are transfers from the 37200 to the target, while inbound or incoming transfers are from the target to the initiator. The initiator part of the Session Identifier. It is explicitly specified iecsi the initiator during Login. The Network Entity represents a device or gateway that is accessible from the IP network. A Network Portal in an initiator is identified by its IP address. In a negotiation or exchange, the party that initiates the negotiation or exchange.


The initiator and target divide their communications into messages. A Portal Group defines a set of Network Portals within an iSCSI Network Entity that collectively supports the capability of coordinating a session with connections spanning these portals. In a negotiation or exchange, the party that isdsi to the originator of the negotiation or exchange.

TCP connections can be added and removed from a session. Across all connections within a session, an initiator sees one and the same target. This maps to the endpoint of an iSCSI normal operational session.

The ISID is explicitly specified by the initiator at session establishment. The TargetPortalGroupTag key must also be returned by the target as a confirmation during connection establishment when TargetName is given. A target assigned tag for a session with a specific named initiator.

The target generates it during session establishment. Its internal format and content are iscis defined by this protocol, except for the value 0 that is reserved and used by the initiator to indicate a new session.

It is given to the target during additional connection establishment for idcsi same session. The following representation and ordering rules are observed in this document: Word Rule A word holds four consecutive bytes.

Whenever a word has numeric content, it is considered an unsigned number in base 2 positional representation with the lowest numbered byte e. Decimal and hexadecimal representation of word values map this representation to decimal or hexadecimal positional notation. Half-Word Rule A half-word holds two consecutive bytes. Whenever a half-word has numeric content it is considered an unsigned number in base 2 positional representation with the lowest numbered byte e.

Decimal and hexadecimal representation of half-word values map this representation to iscai or hexadecimal positional notation.

admin Software