Chapter 1. Networking and Storage Concepts
Chapter 1. Networking and Storage Concepts
Basic networking concepts and topologies Need for storage networks Storage devices and techniques Network attached storage (NAS) and storage area networks (SANs) SAN standards organizations
This is the age of the Internet. But a few of us also realize that this is the Store Agethe age of mission-critical, data-intensive applications that have been fueled by the immense popularization of the phenomenon called the Internet. Also, the progress achieved by the multimedia industry has enabled the integration of storage-intensive data, such as audio and video, with common applications, thus making increased demands on the storage capacity. These applications have grown at such a rapid pace that today for many of us the term computing is synonymous with data management. No matter if it's a large corporate organization sprawled across the globe or a small business, all are struggling to keep pace with the ever-growing amount of business data, which might be dispersed all over the network, especially if the network is a wide-area network (WAN). The current scenario has forced the IT industry to re-evaluate the strategy for managing the existing storage infrastructure and to accommodate the staggering amount of data in the future.
Online trading and transactions NOTE Popular online trading sites, such as Amazon.com, register a high number of hits and orders on a per-hour basis. All the user registration and order information needs to be stored, verified, and modified. This makes online transactions and trading storageintensive.
E-commerce transactions (B2B and B2C) Enterprise Resource Planning (ERP) Managing Information Systems (MIS) Data warehouse and data mining systems Web-based e-mail NOTE Details of the huge number of users using Web-based mail services, such as Hotmail and Yahoo, need to be stored and managed. This makes Web-based e-mail highly storage-intensive.
Evolution and benefits of SANs SAN components and building blocks Data access over SANs
Storage area networks are the future of enterprise storage, period. If your company is heading toward, or has already passed the terabyte mark in storage, it's a prime candidate for a SAN migration. If you are forecasting significant growth in storage requirements, you should develop your SAN strategy now. Excerpted from Building a Storage Area Network, Dave Fetters www.networkcomputing.com/1109/1109ws1.html
Physical partitioning of the storage disk volumes Logical partitioning of the storage disk volumes File pooling Sharing data
Summary
In this chapter, you learned about the evolution of SAN technology. SANs evolved out of the need for fast and secure data access. Until the Internet became a household name, SCSI technology worked fine because data transfers were not bandwidth-intensive. However, the advent of the Internet heralded the era of storage-intensive applications. Managing huge amounts of data became the bane of network administrators. When NAS technology entered the market it stabilized the datamanagement scenario for some time, but it failed to provide a long-lasting solution. Thus emerged the SAN technology of today. The technology is young, but it is gaining fast industry-wide acceptance. SANs are slowly becoming the darling of network administrators and managers because they are effectively helping them to combat the ever-threatening problems related to storage management.
Overview of Fibre Channel technology Fibre Channel ports Fibre Channel topologies Fibre Channel layers Classes of service
The last decade has witnessed enormous advancement in the performance of computers, which has led to the popularization of bandwidth- and storage-intensive applications. The existing framework has been slow to keep up with the increasing demands related to performance and storage, which has resulted in the framework bogging down with restrictions in the areas of speed, distance, and device connectivity. For example, Small Computer System Interface (SCSI)one of the popular infrastructuresis limited to 80 Mbps of speed, up to 25 meters of bus length, and a maximum of 32 devices per bus. These restrictions are major bottlenecks for online trading and transactions. Over the years, Fibre Channel has emerged as an ideal solution for storing, retrieving, and transferring data between servers, storage devices, other network devices, and ultimately users. Despite the high-speed, high-performance, and reliable solution that Fibre Channel offers, it remains relatively inexpensive. Because of these advantages, Fibre Channel has been adopted as the native technology in storage area networks (SANs).
Facilitate high-speed data transfers between servers, storage devices, and other network devices Provide a high-performance, yet inexpensive solution, which does not lead to skyrocketing implementation costs Provide a highly mature infrastructure that responds well to future growths and advancement Provide a generic solution that supports the heterogeneous environments seamlessly Reuse existing protocols and infrastructures
Node ports (N_Port) These ports are a part of Fibre Channel nodes and are used to connect Fibre Channel nodes to the Fabric (an interconnection of Fibre Channel switches). These ports can be attached only to other N_Ports and Fabric ports (F_Ports).
Loop ports (L_Port) Loop ports are basic ports used in the Fibre Channel-Arbitration Loop (FC-AL) topology and are a part of FC-AL nodes. These ports can be of two typesNL_Ports or FL_Ports. NL_Ports are a part of the Fibre Channel nodes and are used to connect a node to the FC-AL topology. These ports can be attached only to other NL_Ports and FL_Ports. FL_Ports are a part of the Fibre Channel switched Fabric and are used to connect the FC-AL loop to the Fibre Channel Fabric. Similar to F_Ports, these ports also act as the middlemen between the communicating ports. They can be attached only to other NL_Ports. NOTE For more information on FC-AL, refer to the next section Fibre Channel Topologies. The FC-AL topology is discussed in further detail inChapter 6, SAN Topologies.
Fabric ports (F_Port) These basic ports are a part of the Fibre Channel switched Fabric. These can act as neither the source nor destination ports during communication. They simply act as middlemen by facilitating communication between two entities. These ports can be attached only to other N_Ports.
Expansion ports (E_Port) These ports are a part of the Fibre Channel switched Fabric and are used to connect Fibre Channel switches to other Fibre Channel switches and routers. Similar to NL_Ports and FL_Ports, expansion ports also act as middlemen and facilitate communication between switches or routers involved in communication. They can be attached only to other E_Ports.
3C.
As discussed earlier, Fibre Channel is strongly based on network and channel technologies. Network technology is highly dependent on topology (that is, the physical layout of net-work devices). However, major network topologies, such as Ethernet, Token Ring, and FDDI are incompatible with each other because of the differences in their media access methods, frame length, clock speed, and so on. In contrast, the three topologies offered by Fibre Channel are highly flexible and compatible with each other. These topologies include point-to-point, FC-AL, and switched Fabric. Each of these is discussed in the following sections.
NOTE: Point-to-point, FC-AL, and switched Fabric are also discussed in Chapter 6.
Host Bus Adapters Connectors Hubs Switches Bridges Routers Storage devices
With the growing popularity of storage area networks (SANs), Fibre Channel technology has emerged to the forefront as an effective means of solving storage-related problems that have plagued corporate networks all over the world. A wealth of Fibre Channel products are available, including Host Bus Adapters (HBAs), connectors, switches, hubs, gateways, and Fibre Channel-to-Small Computer System Interface (SCSI) bridges. Along with optical cables, Fibre Channel products enable network administrators and designers to develop solutions to storage problems related to performance, distance, backups and restoration, bandwidth, and security. For example, Fibre Channel switches play an important role in enhancing the performance of database servers by switching data queries and their results much faster. Similarly, switched Fibre Channel hubs provide high-speed access to disk arrays, tape libraries, and Just a Bunch of Disks (JBODs). To build a successful SAN that fulfills all or most of the requirements of a corporation, you must choose each device of a SAN with care and understanding. Understanding the purpose and the capabilities of each Fibre Channel device will help you make effective choices while designing a SAN. With the infiltration of SAN and Fibre Channel technology in corporate storage solutions, many vendors have jumped into the field of Fibre Channel devices. You need not restrict yourself to the Fibre Channel products offered by one single vendor. As a SAN designer, an intelligent mix and match of compatible products will help you to implement a cost-effective and high-performance storage solution.
4A. HBAs
Similar to network interface cards (NICs) that are used in traditional Ethernets, HBAs provide the physical interface between the input/output (I/O) host bus of Fibre Channel devices (such as servers and storage devices) and the underlying Fibre Channel network. In other words, HBAs connect Fibre Channel devices to Fibre Channel links. NOTE Popularly used I/O host buses include IBM's PCI-MCA, HP's HSC, and Sun's SBus. The term PCI-MCA is a combination of two termsPCI (Peripheral Component Interconnect) and MCA (Micro Channel Architecture). PCI-MCA is a 32-bit, high-speed interface between the processor of a computer and the attached peripheral devices and expansion cards. HP's High Speed Connect (HSC) is a high-speed proprietary interface that functions much like PCI. SBus is a 32-bit bus used in Sun's SPARC workstations. SBus facilitates the transactions between the processor and the attached peripheral devices. SBus can also help the processor in identifying the corresponding device drivers of the attached devices.
ends. The connectors provide an interface that converts any type of communication transport into gigabit transport. Four types of Fibre Channel connectors are used to interconnect Fibre Channel devices:
4C. Hubs
The FC-AL topology allows cost-effective connection of up to 126 devices without the need of an underlying Fabric. However, a daisy chain of devices connected to form a loop makes it difficult to troubleshoot the network. Adding or removing devices from the loop is a highly time-consuming exercise. Also, any cable break or power loss can lead to the temporary shut down of the entire loop and all the nodes attached to the loop until the problem is remedied. Fibre Channel hubs are used to effectively solve the problems that occur in the FC-AL topology. Analogous to the hubs used in traditional local-area networks (LANs), Fibre Channel hubs form the focal point of the FC-AL topology, as shown in Figure 4-9. As a result, network administrators can centrally monitor and manage the loop. The Port Bypass Circuitry (PBC) used in hubs allows devices to be dynamically added or removed from the loop while the loop is still functional. If a device is added or removed from the loop, these hubs can automatically reconfigure the loop.
4D. Switches
Fibre Channel switches are one of the most powerful components of a SAN. They are responsible for the efficient and high-speed switching of frames over a storage network. These switches are the basis of the switched Fabric topology, where the switches are interconnected to form the Fabric. The Fabric, in turn, can support numerous point-to-point connections, individual nodes, and arbitrated loops. Unlike Fibre Channel hubs that are generally used to implement the arbitrated loop topology and extend the effective distance of a loop, Fibre Channel switches offer enhanced and more complex functionality. As a part of the Fabric, Fibre Channel switches are responsible for the following:
4E. Bridges
Fibre Channel bridges allow the integration of legacy SCSI devices in a Fibre Channel network. By allowing the inclusion of expensive SCSI devices such as legacy SCSI disks and drives, SCSI tape subsystems, and optical CD and DVD devices in Fibre Channel storage networks, Fibre Channel bridges help in reducing the total cost of implementation of SANs. The biggest advantage of Fibre Channel bridges is the LAN-free backup and archiving that reduces traffic overhead from LANs by an average of 400500%.
10
Fibre Channel bridges provide the capability for Fibre Channel and SCSI interfaces to support both SCSI and Fibre Channel devices seamlessly. Therefore, they are often referred to as FC-SCSI routers.
4F. Routers
Fibre Channel routers enable the integration of IP-based hosts with Fibre Channel nodes. Thus, the use of Fibre Channel routers increases the reach of SANs by allowing access to remote storage devices over IP WANs through ATM, ISDN, and T1/T3 lines. Many vendors also offer routers that provide Fibre Channel to SCSI interconnectivity. In addition, the use of intelligent routers allows the implementation of firewalls that can play a very important role in preventing unauthorized access. Depending on the functionality provided, the cost of a Fibre Channel router can range anywhere from $7000 to $35,000. Many vendors offer a wide variety of Fibre Channel routers. These vendors include Cisco, IBM, HP, Gadzoox, and Brocade Communication, Inc. As in the field of network routers, Cisco is considered the leader in Fibre Channel routers. The following sections describe Cisco routers
Summary
Fibre Channel technology offers high-performance solutions that are a prerequisite of any SAN. In fact, most of the SANs that are built today are based on Fibre Channel devices. However, to build a successful SAN that fulfills all or most of the business requirements of a corporation, each device must be chosen with care and understanding. An intelligent mix and match of compatible products will help you as a SAN designer to build a cost-effective and high-performance storage solution.
11
Cabling is the backbone of any network, including a storage area network (SAN). Similar to any other network, if cables in a storage network haven't been implemented properly, your network can fail to live up to its expectations, no matter how sophisticated or high the performance of your infrastructure or other SAN components is. You can use two types of Fibre Channel links in storage networkscopper-based and fiber-optic. You must understand the two types of media thoroughly to build a high-speed and high-performance SAN. In this chapter, you'll explore the two types of Fibre Channel media.
12
A storage area network (SAN) is based on Fibre Channel technology. Therefore, the three SAN topologiespoint-to-point, Fibre Channel-Arbitrated Loop (FC-AL), and switched Fabricare the same as Fibre Channel topologies. Of these three, FC-AL and switched Fabric are implemented more commonly because they are cost-effective, high-performing, and scalable. Although the point-to-point topology offers the best performance of the three, it incurs high costs and, therefore, is used only in specialized cases. An effective mix of these three topologies can be implemented to meet the specific requirements and needs of a corporation.
13
14
Summary
SANs are strongly based on Fibre Channel technology. The following list summarizes each technology:
Point-to-point topology This topology is the direct connection between two SAN devices. Because of the dedicated nature of physical connections, the point-to-point topology is the fastest, simplest, and easiest to implement and manage. However, the point-to-point topology is not commonly used to build an entire storage network because it is the costliest of the three.
FC-AL topology FC-AL is the most cost-effective topology of the three and can support up to 127 nodes and devices simultaneously. However, because the link bandwidth is shared among connected devices in this topology, its performance can degrade considerably if all 126 nodes are connected to it. Also, because of the shared nature of the loop, node loops need to arbitrate for loop control. After a node gains control of the loop, only one loop node can transmit data at a time. Therefore, this topology should be used in a SAN if the number of nodes is not high or transmissions are not time-sensitive. FC-AL supports two types of loops public loops and private loops. Private loops have no connection to the rest of the Fabric in the SAN. However, public loops are connected to the Fabric.
Switched Fabric topology This topology is the most high-performing and reliable topology of the three. Also, it is not as expensive as the point-to-point topology. This topology consists of an interconnection of Fibre Channel switches that can support a staggering 16 million Fibre Channel devices. The high point of this topology is that despite the addition of devices to the Fabric, the aggregate bandwidth of the topology increases because Fibre Channel switches that form the backbone of the switched Fabric topology are high-performing, non-blocking devices.
15
The design and implementation of a storage area network (SAN) is a complex process. You need adequate expertise, manpower, and a sufficient budget to develop a storage network that not only will address the current storage demands, but also will meet any future requirements. A SAN must be stable, secure, high-performance, scalable, and extremely resilient. At the same time, a SAN must justify its cost.
Business requirements Performance Physical layout Data pooling Data availability Heterogeneity Storage requirement Connectivity Scalability Migration Security Manageability Resilience Routability
16
17
The end user expects the storage system to provide speedy data transactions 24 hours a day, 7 days a week, and 365 days a year. So, the prime focus of storage networks is high performance and 24/7 data availability. In addition to these requirements, the data stored in a storage network is highly confidential and valuable. According to a recent study, compromise of this data or a security breach can cost a small organization tens of thousands of dollars. The fourth annual Information Security Survey by Information Week and Ernst & Young presented some more shocking statistics. According to this survey, more than 50 percent of 1300 IS executives surveyed across the U.S. and Canada indicated that they had suffered financial losses from security breaches and disaster recovery. Seventy percent were unable to calculate the loss they had to bear. More than 25 percent of medium-sized organizations estimated a loss of roughly $250,000. However, large organizations had to face losses of up to several million dollars. It is estimated that 90 percent of small businesses would go out of business in the case of a catastrophic event. These statistical figures reiterate the fact that security is not only important, but that it is another fundamental requirement of any storage area network (SAN). NOTE The Internet has grown at an unprecedented rate. Since its advent in 1969, the Internet has expanded from merely four interconnected hosts to more than 80,000,000 interconnected hosts that form the core of the Internetthe World Wide Web (WWW). The security threat has grown proportionately. As per the latest report by the Computer Emergency Response Team (CERT), 34,754 security incidents were reported within the first three quarters of 2000-2001. This figure is staggering and warns just how real the security threat is in our wired world, and how important it is to protect mission-critical data stored in SANs if they are going to be interconnected over the Internet! In this chapter, you will learn the basics of securing a storage network. You'll learn about the general guidelines that will help you secure a SAN. You'll also learn how to prevent SAN components and business transactions in divisional and enterprise environments from unauthorized access and hacking.
18
Poor administration of the storage network. Lack of a comprehensive security policy. The security policy of a network contains directions on the management of user
NOTE :
accounts. This includes detailed information about user accounts, user privileges, data categories and the associated safeguards, and a list of legal and prohibited activities.
NOTE : Vulnerability analysis helps an organization to re-evaluate and locate loopholes in its
security policies.
Divisional Security
In the divisional approach, the SANlets are created on the basis of divisions in the organization, as compared to the enterprise approach where the storage network is not divided into various zones on the basis of divisions. Security in the divisional environment is not as big a concern as in the enterprise environment. This is because personnel in the same division share similar goals and generally work on the same set of projects or tasks. All the employees in the same division more or less must access the same storage systems. Therefore, the implementation of security measures and the management of data access is comparatively simpler. However, there is still a possibility of the following security threats:
19
Problems are part of any network setup. A storage network is no exception. Despite choosing best-ofbreed components, applications, and management tools, there is no guarantee that everything will function ideally. The challenge is in handling any problem quickly so that long-term harm to the network is avoided. How quickly you detect, isolate, diagnose, and troubleshoot the problem so that no ongoing operations are disrupted is critical to the management of a storage network. If operations are disrupted, the disruption must be short-lived. Proper management can prove to be the most proactive method of avoiding a problem or disastrous situation. Management tools and applications allow you to control the network, monitor it, detect a problem before it reaches disastrous proportions, and provide assistance in troubleshooting the problem. Management tools and applications also play an important role in optimizing the performance of a storage network. In addition, many management tools can help you in planning, implementing, and configuring a storage area network (SAN). Isolating and troubleshooting problems is not an instinctive art. It is an ongoing education that you gain from each experience. In this chapter, you will learn the basic techniques that set the groundwork for isolating and troubleshooting any problem in a storage network. You will learn about the management of SANs to help you to maintain and support a stable storage network. In addition, you will learn about one of the most critical aspects of any networkdata backup and restoration. Proper data backup and restoration strategies help you recover data without potential corruption or loss, if you have to face network failure or data loss.
20
Problems related to the access of storage devices Problems related to the upper-layer protocols
Summary:
Problems in a SAN can be categorized as the following: Problems related to the physical connectivity of devices Problems related to the access of storage devices Problems related to the upper-layer protocols
21
The emergence of iSCSI technology iSCSI concepts iSCSI design considerations and security requirements
Since the advent of storage networks, Fibre Channel has been the mainstay of storage area networks (SANs). In fact, for most of us, Fibre Channel is synonymous with SANs. However, the unrivaled reign of Fibre Channel technology might not entirely be due to the fact that it provides high-performance solutions. Fibre Channel has never had to face any serious competition because of the significant lack of options in the field of SAN products. Fibre Channel has been, and still is, a market on its own. However, the Fibre Channel market is now facing a serious challenge for the first time in its history. A small group of SAN vendors have come up with a new standard called Internet Small Computer System Interface (iSCSI) that is creating waves in the SAN arena.
22
iSCSI, which is often referred to as SCSI over IP networks, is a next generation SCSI standard. In other words, iSCSI derives its roots from SCSI. SCSI is one of the most popularly used interfaces (or protocols) to facilitate data movement on a storage network. To understand iSCSI, you will briefly review the concept of SCSI.
Table 10-1. iSCSI Requirements Definition Performance/cost Requirements MUST allow implementations to equal or improve the current state of SCSI interconnects MUST enable cost competitive implementations MUST have low host CPU uses, equal to or better than current technology MUST be possible to build I/O adapters that handle the entire SCSI task MUST provide for the full use of the available link bandwidth Flow control and synchronization MUST be able to support existing flow-control mechanisms MUST be able to synchronize the transaction between iSCSI and non-iSCSI devices Description To make iSCSI a viable and marketable solution, there should be a balance between the performance and the cost of implementation and the maintenance of iSCSI-based networks. Although reusing most of the existing IP-based infrastructure, it should be able to meet the basic requirements of high speed and high availability. Use of SNICs can help meet most of these requirements because these adapters handle protocolrelated processing, such as encapsulation, CRC checks, and so on, and therefore offload the burden of processing from the host CPU. The iSCSI protocol must incorporate additional information in PDU headers or data streams so that implementations can locate the boundaries of iSCSI PDUs within the TCP byte stream.
MUST operate over a single To be able to compete with Fibre TCP connection Channel technology, which offers
23
Table 10-1. iSCSI Requirements Definition Requirements Description high-bandwidth solutions, iSCSI must be able to facilitate the full use of the available link bandwidth while minimizing the use of TCP connections. This is because if one session were to operate over multiple TCP connections, it would slow down the network considerably, especially during peak hours because other devices would have to wait for an availabile TCP connection. Also, it is important that iSCSI must not jeopardize the performance of simultaneous connections within the interconnect Fabric. Ease of implementation/complexity of protocol SHOULD keep the protocol simple MUST operate correctly when no optional features are negotiated and when individual option negotiations are unsuccessful For the protocol to be marketable, it should be simple to understand and easy to implement. This makes it simple for network administrators to diagnose problems. To diagnose faults and failures, the protocol must provide parameter negotiation during the Login phase. Also, its default parameters must be such that successful transactions can be handled if optional features were not negotiated during transaction. Data might be corrupted while in transit. Therefore, the iSCSI protocol must support data integrity check formats for the early detection of data corruption. Also, the iSCSI data corruption detection mechanism
Detection of data corruption MUST support a data integrity check format for use in digest generation
24
Table 10-1. iSCSI Requirements Definition Requirements Description must support other detection methods, such as checksum and Cyclic Redundancy Checks (CRCs). Recovery MUST specify mechanisms to recover in a timely fashion from failures on the initiator, target, or connecting infrastructure SHOULD take into account fail-over schemes for mirrored targets or highly available storage configurations SHOULD provide a method for sessions to be gracefully terminated and restarted by either the initiator or target Internet infrastructure MUST be compatible with both IPv4 and IPv6 Because it operates over IPbased infrastructures, ISCSI must be compatible with the MUST use TCP connections current version of IPIPv4. IPv6 conservatively, keeping in is likely to take over from IPv4 in mind that there might be the near future. Therefore, iSCSI many other users of TCP technology should be worked out in such a manner that no major on a given machine issues related to infrastructure MUST NOT require changes arise during the transition from to the existing Internet IPv4 to IPv6. protocols SHOULD minimize required changes to existing TCP/IP implementation. Interoperability iSCSI protocol document MUST be clear and Incompatibility with contemporary network In case of network failures, iSCSI should support recovery mechanisms. Also, it should support failover strategies that ensure the availability of data, even if the primary source is down.
25
Table 10-1. iSCSI Requirements Definition Requirements unambiguous Description technologies has forced the industry to look for other solutions. The iSCSI protocol must be simple and unambiguous so that it can be seamlessly integrated with other popular networking technologies, such as the Internet, SCSI, and Fibre Channel.
Extensible security
SHOULD require minimal Because iSCSI stresses data configuration and overhead transfers over insecure media, in an insecure operation such as the Internet, extensible security measures, such as SHOULD provide for strong strong authentication, should be authentication when implemented in case of iSCSI increased security is data exchanges to ensure required integrity and confidentiality of the data being transmitted over SHOULD allow integration the iSCSI infrastructure. At the of new security same time, these measures mechanisms without should also be compatible with breaking backward existing security mechanisms compatible operations and must not require major reconfiguration. MUST support private authenticated login CAN support various levels of authentication security iSCSI authenticated login MUST be resilient against passive attacks. To ensure secure transactions over insecure media, iSCSI must support strong authentication mechanisms.
Authentication
SCSI
SHOULD track changes to SCSI and the SCSI architecture model MUST reliably transport
Because it is the nextgeneration, SCSI-based technology, iSCSI must be able to accommodate future changes
26
Table 10-1. iSCSI Requirements Definition Requirements SCSI commands from the initiator to the target MUST correctly deal with iSCSI packet drops, duplication, correction, stale packets, and reordering Data integrity SHOULD NOT preclude the use of additional data integrity protection protocols (for example, IPSec and TLS) SHOULD be manageable by using standard IP-based management protocols (for example, SNMP, RMI, and so on) In addition to strong authentication, additional security measures will only improve the reliability of iSCSIbased transactions. Because iSCSI transactions are carried over the IP-based infrastructure, the iSCSI protocol must be manageable by using the standard IP-based management protocols. For this, iSCSI specifications must ensure that the iSCSI resources are uniquely identifiable, and also can be located by using IP-based standard resource location methods, such as DNS. The iSCSI naming scheme must be human-readable and compatible with both IP and Fibre Channel. This ensures the smooth discovery of iSCSI devices regardless of the interface. Description in the existing SCSI model.
Management
Naming
The means by which an iSCSI resource is located MUST use or extend existing Internet standard resource location methods. MUST provide a means of identifying iSCSI targets by a unique identifier that is independent of the path on which it is found An iSCSI name should be a
27
Table 10-1. iSCSI Requirements Definition Requirements human-readable string in an international character set encoding Standard Internet lookup services SHOULD be used to resolve iSCSI names. Discovery MUST have no impact on the current IP network discovery techniques The iSCSI specification must ensure that iSCSI devices and services can be discovered by standard discovery methods, such as DNS, which are used in IP-based networks. The iSCSI protocol specifications must be able to protect the storage network from unauthorized and malicious attacks without hampering the security of the entire network. For this, the iSCSI implementation must be able to seamlessly support Network Address Translators (NATs), proxy servers, and firewalls without disturbing the existing network setup. As an added security mechanism, iSCSI should be able to seamlessly support the current breed of network security devices, such as firewalls, proxy servers, and NATs. Description
Internet accessibility
SHOULD be scrutinized for denial of service issues and the issues should be addressed
SHOULD allow deployment where functional and optimizing middle-boxes such as firewalls, proxy servers, and NATs are present Use of IP addresses and TCP ports SHOULD be firewall friendly.
MUST be a good network During peak hours, iSCSI must citizen with TCP-compatible be able to handle transport layer
28
Table 10-1. iSCSI Requirements Definition Requirements congestion control (as defined in RFC 2309) iSCSI implementations MUST NOT use multiple connections as a means to avoid transport layer congestion control. Description network conges-tions so that situations leading to traffic congestions do not occur or their after-effect is minimized if congestion does occur.
Storage networking is a powerful technology and its potential is staggering. As companies and organizations all over the world struggle with huge amounts of mission-critical data, the storage area network (SAN) has emerged as an extremely reliable solution. SANs offer a high-performance means of ensuring that data is always available, which has brought a new lease on life to e-commerce and online businesses. However, a few hurdles still remain. SANs are a costly venture, and the in-depth, technical know-how necessary to implement SANs is scarce. The emergence of other storage technologies, such as Internet Small Computer System Interface (iSCSI), Internet Protocol (IP), and Storage over Internet Protocol (SoIP) have further challenged the coveted position of SANs in the field of storage technology. You learn about the need for change in the present storage scenario. You learn about various SAN technology developments, such as optical storage networking (OSN), IP SANs, and the emergence of storage service providers. These developments address several issues and problems faced in traditional SANs. Finally, you learn about technology developments other than SANs, including SoIP, Network Data Management Protocol (NDMP), virtual interface (VI) architecture, Direct Access File System (DAFS), and InfiniBand. Some of these, such as SoIP, are rival technologies, whereas others, such as NDMP, DAFS, VI, and InfiniBand, when augmented with the existing SAN technology, enhance the performance, reach, and popularity of SANs.
29
other alternatives. The major reasons for this heightened interest for other alternatives include the following:
Fibre Channel's high cost of implementation The difficulty of Fibre Channel's implementation A lack of expertise and technical know-how The necessity for retraining staff or for hiring additional staff Incompatibility with other popular technologies (such as TCP/IP) Inability to support long-distance data transfers A lack of mature management tools
30
31