iSCSI Technology and Applications

  
Before the 1990s, storage products were mostly part of the server. This form of storage was called SAS (Server Attached Storage) or DAS (Direct Attached Storage). . With the development of technology, after the 1990s, people gradually realized that the data concentration and sharing of IT systems became an urgent problem to be solved. Thus, the concept of networked storage was proposed and rapidly developed. In terms of architecture, today's networked storage systems mainly include SAN (Storage Area Network) and NAS (Network Attached Storage).

At present, many network storage provider, is committed to the SAN using Fiber Channel (FC) is set to a practical standard, but its structure requires high capital cost, is far from ordinary enterprises can afford. In contrast, NAS technology is low-cost, but it is limited by bandwidth consumption, unable to complete large-capacity storage applications, and the system is difficult to meet the requirements of openness. iSCSI enjoys the benefits of both NAS and SAN topologies while avoiding the traditional NAS/SAN differences in a new network-centric storage solution (open storage network). The "iSCSI" (Internet Small Computer Interface) standard combines storage devices and servers with networks built with common Internet protocols, rather than using faster, more expensive, and more complex Fibre Channel technology for many small and medium-sized businesses. Enterprises provide direct access to economically sound and manageable storage devices.

The concept of iSCSI


iSCSI (Internet Small Computer System Interface) is a type of data block on the Internet Protocol network, especially Ethernet. The standard of transmission. It was initiated by Cisco and IBM and is strongly supported by IP storage technology advocates. Is a set of SCSI instructions for hardware devices that can run on top of the IP protocol. Simply put, iSCSI can run the SCSI protocol over an IP network, enabling it to route on high-speed Gigabit Ethernet.

SCSI (Small Computer System Interface) is a widely used technical standard for connecting hard disks and computers. iSCSI is a technology that applies this technology to network connections for storage networks of small and medium-sized enterprises. That is, iSCSI technology is more cost-effective than fiber-based products. iSCSI is a technical standard based on the IP protocol. It is a new protocol that allows the network to transmit SCSI commands over the TCP/IP protocol. It implements the connection between SCSI and TCP/IP protocols. This technology allows users to build storage area networks through TCP/IP networks. (SAN). Before the advent of iSCSI technology, the only technology to build a storage area network was to use Fibre Channel, which was established in the early 1990s, but its architecture requires high construction costs, far beyond what ordinary companies can afford. The emergence of iSCSI technology for users with LAN-based network environment, it requires only a small investment, it can easily and quickly interactively transfer and manage information and data. Compared with the previous network access storage, the emergence of iSCSI solves the problems of openness, capacity, transmission speed, compatibility, security, etc. Its superior performance has attracted the attention and favor of the market since the release date.

iSCSI Workflow


The iSCSI protocol is a process of packetizing and unpacking on the network. At one end of the network, packets are encapsulated into It includes three parts: TCP/IP header, iSCSI identification packet and SCSI data. When transferring to the other end of the network, these three parts are sequentially unpacked.

iSCSI system issues a SCSI command consists of a SCSI card, the command is encapsulated into packets and transmitted in the fourth layer. The receiver extracts the SCSI commands from the packet and executes them, then encapsulates the returned SCSI commands and data into IP packets and sends them back to the sender. The system extracts data or commands and passes them back to the SCSI subsystem. All of this is done without user intervention and is completely transparent to the end user.

In order to ensure security, iSCSI has its own online login operation sequence. When they first run, the initiator device will log into the target device. Any iSCSI PDU (iSCSI Protocol Data Units) target device that receives an initiator that does not perform the login process will generate a protocol error and the target device will also close the connection. The target device may send back a rejected iSCSI PDU before closing the session. This security is basic because it only protects the startup of the communication, but does not provide security on a per-packet basis. There are other security methods, including the use of IPsec. In both control and data packets, IPsec provides integrity, replay protection and validation, and it also encrypts individual packets.

The development of the iSCSI standard


The need to establish an industry-standard transmission of stored information over an IP network exists simultaneously, but The question is how to establish this standard and make it a unified standard for the industry.

Bechtolsheim and his team formed a partnership with IBM to draft a standard for the new protocol called iSCSI (Internet SCSI), which allows SCSI commands to be transmitted over the TCP/IP protocol. In February 2000, the group submitted the draft as an Internet standard draft to the Internet Engineering Task Force (IETF). In March of the same year, the IETF meeting discussed the draft and decided to set up an IETF working group to develop technology for storing information via IP transmission. As of August 2000, the number of members of the IETF team has increased to 500, representing 200 companies or organizations, including almost all storage, network components and system vendors.

Currently, about iSCSI standard-setting has entered the final stage, it is estimated will be launched early next standard. The IETF has announced that it has completed the work of the iSCSI protocol and will now assign a comment number to it. This specification specifies how software handles SCSI packets on the intranet and how to process SCSI packets over long distances and how to encapsulate them in TCP/IP commands.

Comparison of iSCSI and FC (Fibre Channel)


Network storage is mainly composed of three parts: server (host), exchange (switch) and storage device (target). Among these three, exchange is very important. There are two ways to exchange network storage, one is Fibre Channel (FC) and the other is iSCSI.

from the point of view of data transmission, fiber channel and iSCSI are very different: a transmission which employs Fiber Channel FCP protocol, iSCSI uses the existing TCP protocol on the Internet. The FCP protocol was originally designed in accordance with the advanced protocol of the Fibre Channel network, and it works closely with low-level network functions. iSCSI is developed with the existing protected transport mechanism provided by TCP. Therefore, due to the different mechanisms, it is impossible to be compatible between iSCSI and Fibre Channel.

compared with Fiber Channel, iSCSI has its many advantages, mainly in the iSCSI more economical. Cost savings can be reflected in the following aspects: (1) Public technology existing between general data and SAN networks can reduce training costs, and there is no need to set up separate staff members, both of which can reduce costs. And a large number of Ethernet installation bases can also reduce the price. (2) iSCSI can leverage the existing, easy-to-understand TCP/IP infrastructure to build a SAN. As QoS and security advances, sharing between storage and existing infrastructure indicates hardware, training Several aspects, such as implementation, have the opportunity to achieve considerable cost savings. (3) With the implementation of Gigabit Ethernet, users will get a storage network with a transmission rate of 1 Gbps without changing the existing infrastructure.

FC (Fibre Channel) installed base little understanding of its technology, not many people, but it is very expensive. FC offers slightly better performance at the same speed, but this does not compensate for the high cost of the high cost and additional training costs required to achieve it. Recently, FC has temporarily maintained its dominance in SAN technology before Ethernet speeds exceed FC, but this is limited to a period of time before iSCSI became a climate.

However, iSCSI within three to five years will not replace Fibre Channel. First of all, although the TCP/IP network has many merits, its fatal problem in transmitting data blocks has not yet made a breakthrough in technology. Although Fibre Channel needs further improvement and improvement in terms of standards, long-distance connectivity, cost, etc., it has achieved remarkable results in the regional SAN field. Its products and technologies are gradually maturing. So, for now, Fibre Channel is the only option if users need high-capacity, high-speed block-level data access. However, as iSCSI matures, it will share the storage market for Fibre Channel. In addition, the efforts of vendors such as Brocade, Intel, and Cisco will also promote the convergence of Fibre Channel and iSCSI technologies, complement each other and develop together
< B>
Advantages and Limitations of iSCSI


Advantages of iSCSI Technology: The foundation of iSCSI is traditional Ethernet and Internet. In the past 20 years, network technology The rapid development has made traditional networks ubiquitous, and iSCSI has a good foundation and can greatly reduce the total cost of ownership.

With the advancement of technology, the bandwidth of IP networks has developed rapidly. 1Gbps Ethernet has already occupied a large number of markets, and 10Gbps Ethernet is ready to go. Moreover, the agreement is supported by industry giants including IBM, Cisco, Intel, Brocade, and Adaptec. At the same time, a number of new vendors are also competing, such as Nishan System, SAN Valley, CNT, Pirus, and 3Ware.
In terms of technology implementation, iSCSI has a strong and effective IP and Ethernet architecture as the backbone, which greatly increases the tolerance. In addition, simple management and deployment is also a reason why iSCSI is the heart of the industry, because traditional network vendors have trained a lot of professional network talents, and can easily have professional iSCSI talents without training.

iSCSI is a technical standard based on the IP protocol. It implements the connection between SCSI and TCP/IP protocols. For users with LAN as the network environment, it requires only a small investment and can be conveniently and quickly Information and data are transmitted and managed interactively.

completely solve the remote data replication (Data Replication) and disaster recovery (Disaster Recover) problems. In terms of security, the past FC-SAN and DAS are mostly in a regulated environment with relatively low security requirements. iSCSI reverses this concept and circulates stored data within the Internet, making users feel the need to improve security. Therefore, iSCSI has built-in support for IPSEL mechanisms and enforces instructions at the chip level to ensure security.

However, when talk about iSCSI storage engineers prospects, but also need to analyze the current situation and development direction of seeking truth from facts. In fact, so far, there is not a mature product to show the charm of iSCSI, it has not been widely commercialized. And the problems faced by storage networks, iSCSI can not be solved, such as the contradiction between distance and bandwidth. Although iSCSI satisfies the need for long-distance connectivity and facilitates the connection of wide-area storage, the bandwidth of IP is still an unsolvable problem. Although IP networks are growing rapidly and 1Gbps networks are gaining popularity, bandwidth is still quite expensive from the WAN. Even with iGbps data transfer with 1Gbps bandwidth, the speed is not ideal. Moreover, the efficiency and latency of IP networks are a huge barrier to storing data transmission.

Copyright © Windows knowledge All Rights Reserved