|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: iSCSI Naming and Discovery (Bootstrapping)Charles, Dynamic Host Configuration Protocol is the first step in bootstrapping; Lightweight Directory Access Protocol should be the second. With these very powerful tools, all overhead needed to communicate with SCSI is done prior to making any connections. LDAP would contain knowledge of SCSI defined as a SCSI service schema. This technique avoids all real-time authentications to allow SCSI transport to scale. The SCSI schema naming conventions for the boot drive may take the form NETSCSIBOOT:XXXXXXXXXXXX where the hexadecimal text string of the MAC address of the booting machine is used as a user name to match against the special drive name. A schema for a SCSI service may look something like: Object Class: SCSI IP Network Services Description: Used to define Network SIPNSMacro: SCSINET OBJECT-CLASS SUBCLASS Portal MUST CONTAIN { Primary_IP, T_PROT, E_PROT, Targets, Permission} MAY CONTAIN { Secondary_IP, Internal_IP} TARGET_DEF OBJECT-CLASS SUBCLASS OF Targets MAY CONTAIN { Port_Identifier, Port_WWN, LUNS, Link} LUN_DEF OBJECT-CLASS SUBCLASS OF LUNS MAY CONTAIN { HI_LUN, WWNNS}... Standardizing using LDAP rather than vendor specific tools ensures more rapid acceptance and use of this protocol both within Internet and in enterprise environments. In single user scenarios, a simple flat file may suffice in defining SCSI services either as registry entries or as /etc files. The provider would only advertise his authentication server via a DNS to the public. If the client's browser had a plug-in that knew how to talk to a SCSI device, it could allow the user to type SCSI://my.storage.com/my_stuff and a pop-up would request a password or use a stored password to then access the authentication server at this location to look for the drives under my_stuff. Once the needed information was exchanged between the authentication server and the client, the SCSI driver would then have all the binary information required to access the SCSI portal (not advertised via DNS). The authentication server would return a structure as indicated prior together with a one-time secret for a cookie exchange. LDAP has a Java interface, so perhaps Java was used. There is sufficient documentation for accessing LDAP, whereas there is little if any for vendor specific management tools. Vendor specific management tools could easily construct a database exchange that would populate the documented LDAP database however. Should there be a third-party command that is required to transverse the IP, it should be a port on the back-side of a portal that has already been connected to yet another portal. This connection may have been established in response to the authentication or done in a prior fashion. The port on the back of the portal would have a SCSI address and would map into yet another SCSI address within the realm of the other Portal. Again, even this translation would not be handled by the client nor should it be as it would be in the domain of the provider. The provider would be required to make the permission and translation table prior to authentication. Perhaps the translation table was made at the time of installation. At no point in time, would the client be able to change this table. The SCSI space would be as defined in the permission list and remains static upon authentication. <snip> > > One problem with the existing SCSI discovery mechanisms for logical units, > of course, is that they don't scale well when the universe of > logical units > becomes large. > > With that in mind, I was tempted to assert that the storage naming service > should help us find the location of an LU directly, using it's world wide > name. As I think about this, however, I suspect that storage > management at > this level of granularity is best done by the vendors who supply > such tools. > > <snip> > > Charles >
Home Last updated: Tue Sep 04 01:06:46 2001 6315 messages in chronological order |