SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    IPS Issues/Requirements Document



    Appended is a first draft of the IPS Issues/Requirements document.
    
    It was submitted to the IETF as an Internet Draft on March 10, 2:42 PST
    
    Unfortunately, it missed the cutoff time of 5:00 EST by 42 minutes, so 
    it was NOT processed.
    
    All comments and suggestions for improvements all welcome by responding 
    to the IPS list, or to me directly.
    
    The timeline for the final draft is March 20, so the more feedback I can 
    have this week, the better.
    
    Dave Nagle, 
    If you feel that it is appropriate, please cross post it to other 
    storage groups (SNIA, NSIC, T10, etc.) to get them involved and post it 
    to the web site.
    
    Thank you,
    Paul von Stamwitz
    
    -----------------------------
    
    
    Internet Draft                                           P. von Stamwitz
    <draft-von-ipsissues-01.txt>                                   D. Wilson
    Expires 10 September 2000                                        Adaptec
                                                              C. Sapuntzakis
                                                               Cisco Systems
                                                                      D. Lee
                                                                        3Com
                                                                  March 2000
    
    
                                   IP Storage
                             Issues and Requirements
    
    
         This document is an Internet-Draft and is NOT offered in accordance 
         with Section 10 of RFC2026, and the author does not provide the 
         IETF with any rights other than to publish as an Internet-Draft.
    
         Internet-Drafts are working documents of the Internet Engineering 
         Task Force (IETF), its areas, and its working groups. Note that 
         other groups may also distribute working documents as Internet-
         Drafts.
    
         Internet-Drafts are draft documents valid for a maximum of six 
         months and may be updated, replaced, or obsoleted by other 
         documents at any time. It is inappropriate to use Internet-Drafts 
         as reference material or to cite them other than as "work in 
         progress."
    
         The list of current Internet-Drafts can be accessed at
         http://www.ietf.org/ietf/1id-abstracts.txt
    
         The list of Internet-Draft Shadow Directories can be accessed at 
         http://www.ietf.org/shadow.html.
    
    
    Status of this Memo 
    
         This document specifies issues and requirements for the IP Storage 
         BOF and any future working group. It is a first draft and has not 
         been reviewed by the Internet community. A subsequent revision is 
         likely after discussion and suggestions for improvements have been 
         submitted. The next revision is planned to be submitted by March 
         22, 2000. Please submit all comments to the ips@ece.cmu.edu or 
         paulv@corp.adaptec.com. Distribution of this memo is unlimited.
    
    
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 1]
    
    IP Storage               Issues and Requirements              March 2000
    
    
    Table of Contents
    
    Abstract ............................................................. 2
    1. Introduction and Motivation ....................................... 3
    2. Requirements and issues for storage ............................... 3
     2.1. Data Integrity and Reliability ................................. 3
     2.2. Ability to span large distances ................................ 3
     2.3. Performance .................................................... 4
      2.3.1. Performance vs. Connectivity Solution ....................... 4
      2.3.2 Competitive with existing architectures ...................... 4
      2.3.3 CPU Utilization .............................................. 5
      2.3.4 Storage Stack vs. Network Stack Processing ................... 5
      2.3.5. Flow control at the Storage Protocol ........................ 5
     2.4. Storage Management ............................................. 6
      2.4.1. Sharing Storage vs. Data .................................... 6
     2.5. Security ....................................................... 6
     2.6. Device Discovery and Configuration ............................. 6
    3. Optimum Criteria for Solutions .................................... 7
    4. Candidates for Solutions .......................................... 8
     4.1. Transport ...................................................... 8
      4.1.1. TCP ......................................................... 8
      4.1.2. UDP ......................................................... 8
      4.1.3. Scheduled Transfer (ST) ..................................... 8
      4.1.4. Other? ...................................................... 8
     4.2 Storage Protocol ................................................ 8
      4.2.1. SCSI ........................................................ 8
      4.2.2. FCP ......................................................... 9
      4.2.3. ATA ......................................................... 9
      4.2.4. NFS ......................................................... 9
      4.2.5. Other? ...................................................... 9
    5. An example solution ............................................... 9
    6. Conclusion ........................................................ 9
    
    
    Abstract
    
       Recently, there has been increasing interest in investigating ways on 
       how to deliver enhancements to existing networking technology for 
       storage solutions. To facilitate exploration of the issues, a Birds 
       of a Feather (BoF) session has been scheduled during the IETF 
       Meetings of March, 2000.  The BoF session will be held on March 29, 
       2000 at 3:30PM in Adelaide, Australia.
    
       The intent of the memo is to facilitate discussion and achieve 
       consensus on the best approach and the key issues that need to be 
       investigated before storage over IP becomes a reality.
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 2]
    
    IP Storage               Issues and Requirements              March 2000
    
    
    1. Introduction and Motivation
    
       Recently, the trend toward merging networking and storage 
       interconnect technologies has accelerated. This merging has given 
       rise to new technologies such as Storage Area Networks (SANs) and 
       Network Attached Storage (NAS.) Other technologies, such as Object 
       Based Storage Device (OBSD) are being discussed. Due to the increased 
       usage of the Internet, storage demands will continue to increase. In 
       light of this, it is reasonable to assume that the merging of 
       networking and storage will continue.
    
       While file storage protocols like NFS and AFS have long operated over 
       IP-based networks, block storage protocols such as SCSI and ATA have 
       yet to make the leap from non-IP based interconnects to IP-based 
       networks. With the emergence of gigabit and 10-gigabit IP networks, 
       transporting block storage over IP networks is increasingly 
       attractive. While block storage based SAN implementations have 
       applied networking concepts to storage technology, another 
       perspective is to apply storage principles and concepts to existing 
       networking technology.
    
       The IP Storage architecture offers a framework within which existing 
       network infrastructures can be used as a high-quality storage 
       subsystem interconnect. The goal is to provide current and future 
       storage requirements while leveraging the broad installed base as 
       well as the inherent manageability, scalability, and availability of 
       the network.
    
    2. Requirements and issues for storage
    
    2.1. Data Integrity and Reliability
    
       This is an absolute requirement of storage. Whatever solution is 
       used, it must be shown empirically that it is safe and reliable.
       
    2.2. Ability to span large distances
    
       Block storage has generally been relegated to the subnet. As storage 
       demands increase, the need for remote backup and data mirroring for 
       storage consolidation and disaster recovery is becoming increasingly 
       important. The ability to transfer storage over an existing network 
       infrastructure makes IP-based storage very attractive. Another 
       attractive feature of IP Storage is the ability to bridge subnets via 
       a high speed interconnect. While information between subnets are 
       shared today through file transfers over the communications network, 
    
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 3]
    
    IP Storage               Issues and Requirements              March 2000
    
    
       the ability to directly access data resident in other subnets may be 
       useful in some applications.
    
       The bridging of subnets raises the issue of supporting legacy 
       installations.  For example, one application of IP Storage could be 
       the bridging of multiple FibreChannel-based SANs. The IP Storage 
       architecture should consider ways that easily adapt to legacy 
       installations. Adequate liaisons need to be in place with other 
       standards bodies such as ANSI T10, T11, and T13 (SCSI, FC, and ATA 
       respectively) to ensure interoperability.
    
       In the future, it may be highly desirable for the subnets themselves 
       to be based on IP Storage. However, optimal solutions for the subnet 
       raise a different, though overlapping, set of issues and 
       requirements. Also, the IETF may not be the appropriate venue for 
       optimizing IP Storage for the subnet. In order to keep the issues 
       clear and relevant to the Internet community and the goals reasonably 
       specific, a decision must be made early on as to whether issues 
       related to LANs or SANs are to be addressed. 
    
    2.3. Performance
    
       In the storage market, speed sells. Projected access times and 
       sequential access rates for disk drives, assuming historical annual 
       improvement rates, will approach 4 milliseconds and 100 
       megabytes/second respectively within the next 5 years. But, 
       performance requirements vary greatly depending on the application. 
       For applications which access data sequentially, or in very large 
       data blocks, low latencies and high bandwidth will be required. On 
       the other hand, transaction processing applications will still be 
       limited by disk access time to about 350 IOPS per drive, or one to 
       five megabytes a second depending on request size. Furthermore, the 
       caching of data at various points within the system can effectively 
       eliminate the physical limitations of rotating media, resulting in 
       memory to memory speeds. Before performance requirements can be 
       discussed, certain issues need to be addressed.
    
    2.3.1. Performance vs. Connectivity Solution
    
       There needs to be an agreement on which problem IP Storage is 
       solving. While performance is always important, connectivity 
       solutions tend to have less severe performance requirements while 
       having a greater emphasis on ease-of-use or solving data access 
       problems.
    
    2.3.2 Competitive with existing architectures
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 4]
    
    IP Storage               Issues and Requirements              March 2000
    
    
       If IP Storage is to provide storage solutions that are currently 
       provided by other architectures, then IP Storage must be competitive 
       in a cost/performance basis. Since it is assumed that the use of off-
       the-shelf networking switches, routers, and wiring will produce 
       substantial cost savings due to the large volumes associated with the 
       use of such equipment for networks, the performance requirements need 
       only to meet those of other architectures in typical applications.
       
    2.3.3 CPU Utilization
    
       One of the benefits of the IP Storage architecture is the ability to 
       scale servers and storage devices independently. If bandwidth is 
       exceeded, host bus adapters can be added. But, if the CPU is 
       exceeded, then additional servers are required. Traditionally, CPU 
       utilization of storage architectures has been significantly lower 
       than that of networking. Methods for the reduction of network stack 
       processing overhead at the storage clients and servers need to be 
       considered and possibly incorporated into the protocol.
    
    2.3.4 Storage Stack vs. Network Stack Processing
    
       In the server, the storage stack has generally been more efficient 
       than the network stack for various reasons. The transport protocol is 
       simpler than that of networking, thus more readily able to be 
       incorporated in hardware. The server acts as the initiator, and 
       rarely (if at all) receives unsolicited commands. Read memory is 
       locked and the host bus adapter is able to transfer data directly 
       into destination memory via a host-supplied scatter/gather list. This 
       direct memory access is simplified by the fact that data is received 
       from the target in order. For IP Storage, it is probably unreasonable 
       to require in order delivery. However, a comparison of the two stacks 
       might be useful in developing ways of increasing the efficiency of 
       the protocol processing.
    
    2.3.5. Flow control at the Storage Protocol
    
       Whereas the server, in the typical storage stack, has read memory 
       pre-allocated by the operating system, the storage client has a 
       finite amount of memory to store write data. This requires some level 
       of flow control to avoid overrunning memory resources. For example, 
       parallel SCSI uses disconnects and Fibrechannel uses transfer ready 
       as methods of flow control.  The flow control in the transport 
       protocol could handle this situation if each command had a unique 
       session. However, if a session could support multiple concurrent 
       commands (i.e. tagged queuing), then the transport's flow control 
       would effectively pause data flow for all commands, even if there are 
       available resources for some of the commands. It needs to be 
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 5]
    
    IP Storage               Issues and Requirements              March 2000
    
    
       determined whether some flow control is necessary at the storage 
       protocol layer. If so, a control mechanism such as transfer ready may 
       produce undesirable latencies, especially in long distance 
       configurations; and, if possible, a safe mechanism could be found to 
       reduce this latency.
    
    2.4. Storage Management
    
       The ability to consolidate storage allows for many heterogeneous 
       servers to share the same storage pool. This also presents new 
       problems of management of that storage pool. By leveraging the 
       inherent manageability of IP as well as the experiences of the 
       Fibrechannel community, virtual LANs can be established using IP-
       based tools to segment and allocate storage at the port, LUN, and/or 
       partition level. SNMP MIBs and/or CIM object models for storage 
       devices may be necessary.
    
    2.4.1. Sharing Storage vs. Data
    
       One advantage that NFS has over block storage protocol is the ability 
       to share files among multiple diverse server environments. Currently, 
       sharing of data using block storage is only done in a clustered 
       environment. Ongoing discussions in the Storage Networking Industry 
       Association (SNIA) and the ANSI committees regarding object-based 
       storage should be followed and appropriate liaisons established.
    
    2.5. Security
    
       Assigning IP addresses to storage clients can be alarming to those 
       tasked with ensuring data is protected from unwanted access. Work is 
       being done at the storage protocol to increase the level of access 
       control. It must be noted that these methods for restricting access 
       may assume a protected environment. In other words, the protocol may 
       guard against accidental access, but may not be a sufficient 
       safeguard against malicious access. Leveraging IPsec will provide 
       greater security in more open environments.
    
    2.6. Device Discovery and Configuration
    
       Communication networks, which assume that all attached devices are 
       peers and that any given device will want to communicate with only a 
       small subset of other devices. On the other hand, storage networks 
       are hierarchical, with a few Initiators in communication with many 
       targets, and with targets in communication only with initiators, or 
       with other targets under the control of an initiator. This storage 
       viewpoint requires that initiators be able to locate all the targets, 
       and be able to communicate with many or all of them. A decision must 
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 6]
    
    IP Storage               Issues and Requirements              March 2000
    
    
       be made on which method to use for discovery: peer-to-peer or master-
       slave. Any discovery protocol should be scalable up to systems of 
       hundreds of initiators and thousands of targets.
    
       A negotiation protocol also needs to be defined to allow for auto-
       configuration of devices. Adequate liaisons need to be in place with 
       other working groups in the IETF that are relevant to these areas 
       (e.g. zeroconf, LDAP, Service Location Protocol).
    
    2.7. Quality of Service
    
       Investigation should be done on how QoS can enhance storage solutions 
       running over networks. A strong partnership with IPv6 will ensure 
       that storage needs will be considered.
    
    2.8 Storage Subsystem vs. Device
    
       Many of the issues discussed can be addressed by the subsystem 
       vendors, but may be prohibitively expensive and/or complex in the 
       highly competitive disk drive market. Assuming the IP Storage 
       architecture is successful, it is highly likely that it will be 
       adopted by the drive manufacturers. A decision needs to be made on 
       whether integration at the drive level needs to be considered at this 
       time, or at some later date (or by some other organization.)
    
    3. Optimum Criteria for Solutions
    
       The following are some criteria that, though not necessary, would 
       increase the likelihood of success and aid in the quick adoption of 
       the IP Storage architecture in the marketplace:
    
        - Leverage existing technology wherever possible, thus increasing 
          the likelihood of interoperability.
    
        - The solution requires little or no modification to existing 
          operating systems, ensuring early deployment.
    
        - Existing software tools and applications are compatible, for both 
          networking and storage. This allows for a high degree of 
          application specific testing prior to deployment. 
    
        - Deployment of the solution requires little or no additional 
          training.
    
        - The solution has appeal in multiple segments of the market.
    
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 7]
    
    IP Storage               Issues and Requirements              March 2000
    
    
    4. Candidates for Solutions
    
    4.1. Transport
    
    4.1.2. TCP
    
       TCP is ubiquitous on the Internet. It has many years of development 
       and enhancements. There is a strong comfort level with IS 
       administrators. It has proven interoperability in a wide range of 
       configurations. TCP has a great deal of support among the networking 
       community.
    
       TCP also has the reputation of being large, software intensive, and 
       overly complicated. There are those in the storage community that are 
       skeptical that TCP can provide the required level of performance. In 
       addition, the checksum may not be adequate for ensuring data 
       integrity.
    
       A detailed performance study should be done. A key factor is the 
       network stack processing overhead. New development of hardware 
       accelerated TCP could be pivotal.
    
    4.1.3. UDP
    
       UDP is used heavily in the LAN environment, but will have to win over 
       skeptics that it can run safely over the Internet/WAN.
    
    4.1.4. Scheduled Transfer (ST)
    
       Developed in the HIPPI organization, it provides high bandwidth, low 
       latency, and low CPU utilization. A SCSI encapsulation protocol has 
       already been proposed in ANSI T10. Will have to win over skeptics 
       that it can run safely over the Internet/WAN.
    
    4.1.5. Other?
    
       Any other proposed transport protocol should be considered.
    
    4.2 Storage Protocol
    
    4.2.1. SCSI
    
       SCSI has two meanings. Logical SCSI refers to the command protocol. 
       Most storage stacks are based on the SCSI Architectural Model (SAM). 
       It is this logical command protocol that would need to be 
       encapsulated and transported over IP.
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 8]
    
    IP Storage               Issues and Requirements              March 2000
    
    
       SCSI also is equated with devices incorporating the SCSI Parallel 
       Interface (SPI). These drives have the largest deployment in the 
       server market. Since it is a parallel interface, bridging would 
       usually be done at the storage subsystem. Its interlocked protocol is 
       dissimilar in behavior to networking, but the newly approved 
       Information Unit phase may make the conversion simpler.
    
    4.2.2. FCP
    
       This is Fibrechannel's version of encapsulated SCSI command protocol. 
       Bridging can be done at either the storage subsystem or router. 
    
    4.2.3. ATA
    
       There is interest here due to the cost differential between ATA and 
       SCSI drives. A serial version of ATA is also being developed. The 
       storage protocol would still be based on the SCSI model. This 
       interface accounts for approximately 85% of all disk drives sold 
       world-wide.
    
    4.2.4. NFS
    
       NFS is the current solution for accessing storage over the network. 
       Its strengths are ease-of-use, file sharing, and security. The 
       general assumption is that a block storage protocol should outperform 
       NFS in some applications, but that assumption needs to be tested. 
       Also, some applications (e.g. tape library) could benefit from a 
       block storage protocol. In order for a block-based solution to be 
       accepted, clear benefits over NFS (e.g. performance, direct access) 
       must be proven. Even then, NFS would still be the solution of choice 
       for those requiring ease-of-use and file sharing.
    
    4.2.5. Other?
    
       There may be other mappings of SCSI over serial interconnects. A more 
       general approach could also be explored. A class-based (disk, tape, 
       enclosure, etc.) message could be transported to the storage client 
       where it was then translated to the native interface(SCSI, FCP, etc.)
    
    5. An example solution
    
       A proposed solution which transports SCSI over TCP is available as an 
       internet draft under the name <draft-satran-iSCSI-02.txt>
    
    6. Conclusion
    
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 9]
    
    IP Storage               Issues and Requirements              March 2000
    
    
       The critical success factors are:
    
        - Data integrity and reliability are empirically demonstrated.
    
        - Issues of security are satisfactorily addressed.
    
        - Any block storage protocol must show clear differentiation from 
          NFS.
    
    
    Expires 10 September 2000
    IP Storage               Issues and Requirements              March 2000
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 5]
    
    
    Von Stamwitz, Wilson, Sapuntzakis, Lee                          [Page 1]
    
    
    
    


Home

Last updated: Tue Sep 04 01:08:17 2001
6315 messages in chronological order