SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    iSCSI Naming and Discovery Requirements Document


    • To: ips@ece.cmu.edu
    • Subject: iSCSI Naming and Discovery Requirements Document
    • From: "Kaladhar Voruganti/Almaden/IBM" <kaladhar@us.ibm.com>
    • Date: Fri, 17 Nov 2000 14:59:39 -0800
    • Content-Disposition: inline
    • Content-type: multipart/mixed; Boundary="0__=8825699A007E1BD08f9e8a93df938690918c8825699A007E1BD0"
    • Importance: Normal
    • Sender: owner-ips@ece.cmu.edu

    Attached is the iSCSI Naming and Discovery requirements Internet Draft
    document.
    This document was produced by the iSCSI naming and discovery team.
    
    Kaladhar Voruganti
    IBM Almaden Research
    San Jose,  CA
    
    (See attached file: draft-Voruganti-ips-iscsi-disc-reqts-00.txt)
    
    iSCSI
                                                                Mark Bakke
                                                                     Cisco
    
                                                                  Joe Czap
                                                                       IBM
    
                                                                Jim Hafner
                                                                       IBM
    
                                                               Howard Hall
                                                                     Pirus
    
                                                              Jack Harwood
                                                                       EMC
    
                                                              John Hufferd
                                                                       IBM
    
                                                               Yaron Klein
                                                                    Sanrad
    
                                                           Lawrence Lamers
                                                        San Valley Systems
    
                                                              Joshua Tseng
                                                                    Nishan
    
                                                        Kaladhar Voruganti
                                                                       IBM
    iSCSI
    INTERNET DRAFT
    
    Expires May 2001
    draft-Voruganti-ips-iscsi-disc-reqts-00.txt
                                                           <November 2000> 
    
    
    
    
                             iSCSI Naming and Discovery Requirements
    
    
    Status of this Memo
    
    This document is an Internet-Draft and is in full conformance with all 
    provisions of Section 10 of RFC2026 [1]. 
    
    Internet-Drafts are working documents of the Internet Engineering Task 
    Force (IETF), its areas, and its working groups. Note that other groups 
    may also distribute working documents as Internet-Drafts. Internet-Drafts 
    are draft documents valid for a maximum of six months and may be updated, 
    replaced, or obsoleted by other documents at any time. It is inappropriate 
    to use Internet- Drafts as reference material or to cite them other than 
    as "work in progress." 
    The list of current Internet-Drafts can be accessed at 
    http://www.ietf.org/ietf/1id-abstracts.txt 
    The list of Internet-Draft Shadow Directories can be accessed at 
    http://www.ietf.org/shadow.html.
    
    
    Comments
    Comments should be sent to the ips mailing list (ips@ece.cmu.edu) or to 
    kaladhar@us.ibm.com
    
    
    
    1. Abstract
    
    This document describes the  iSCSI [7] naming and discovery requirements. 
    The requirements presented in this document have been agreed to by the 
    members of the iSCSI naming and discovery team. The focus of this document 
    is on iSCSI naming and discovery requirements and not on the details of 
    the naming and discovery mechanisms. This document complements the iSCSI 
    IETF draft. Flexibility is the key guiding principle behind this 
    requirements document. That is, an effort has been made to satisfy the 
    needs of both small isolated environments, as well as large environments 
    requiring secure/scalable solutions.
    
    
    2. Conventions used in this document
    
    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
    "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this 
    document are to be interpreted as described in RFC-2119 [2].
    
    
    3. Naming and Discovery Requirements
    The following items represent iSCSI naming and discovery requirements:
    
    1) There is a requirement to have the ability to generate world wide 
    unique identifiers (WWUIs) for both iSCSI initiators and targets. However, 
    it is not mandatory for the initiators and targets to use WWUIs because a 
    globally unique identifier might not be required in some simple, isolated 
    iSCSI configurations. WWUIs are useful because in some cases (e.g. when 
    DHCP services [6] are used etc), the combination of IP address and port 
    number [6] cannot uniquely identify an initiator or a target. The format 
    of the the WWUIs and their generation process is yet to be resolved.
    
    2) An iSCSI initiator needs to be able to identify a target's iSCSI 
    service delivery port. The iSCSI service delivery port address is made up 
    of IP address and  port number. The default port number is the canonical 
    iSCSI port. A single  iSCSI service delivery port could be serving one or 
    many targets. If the iSCSI service delivery port is serving a single iSCSI 
    target, then the service delivery port address is enough to access the 
    iSCSI target. If the iSCSI target device service delivery port serves 
    multiple targets then the initiator has the following different options 
    with respect to how it accesses a particular target:
    
    a) The initiator passes the target WWUI as part of the iSCSI Login 
    message. The WWUI is resolved to access a specific target.
    b) The initiator passes the DNS domain name [1] and a path string in the 
    iSCSI Login message. A path string is a text string that contains
    additional information about the target (e.g., a URL [3]). The exact 
    format of this string is to be determined. The path string may be used for 
    additional address resolution of the target, for example, by a transparent 
    proxy. 
    
    These options provide iSCSI with the necessary flexibility to operate with 
    different types of intermediaries (proxies, gateways,
    firewalls [4]).
    
    If the target WWUI supplied in Login does not match or cannot be resolved 
    by the target, then the Login should be rejected by the target.
    
    3) It is not mandatory for the initiator to fill the initiator WWUI field 
    in the Login message. The initiator WWUI field can be used for 
    authentication purposes.
    
    Thus, the iSCSI Login message optionally contains any of the following:
    initiator WWUI, target WWUI, DNS domain name, and target path string 
    fields.
    
    4) The initiator can send the initial iSCSI Login
    message to:
    
    a) A canonical, well known iSCSI service delivery port.
    b) A non-canonical, iSCSI service delivery port with the same 
    functionality as in the canonical iSCSI port (no additional restrictions).
    
    5) The initiator may Login to an iSCSI device and request from that device 
    a list of targets and/or alternate IP addresses:Ports that may be 
    available in the same device. The returned data SHALL contain a list of 
    tuples, where each tuple consists of a target WWUI, an IP address:Port and 
    optionally a Path string. 
    
    6) The initiator can get the target address information in the following 
    different ways:
    
    a) Information is hard-coded at the initiator.
    b) Initiator queries name servers.
    c) Initiator queries a known service delivery port for a list of targets.
    
    The initiator can access the target using the following:
     i) IP name or IP address
            +
     ii) TCP port number
            +
     iii) [Target WWUI  or (Target WWUI and path)]
    
    Point ii) is implied if a canonical port number is used.
    Point iii) is not mandatory.
    
    Now, the initiator can either hard-code the above information, or it can 
    obtain it from either DNS or storage director servers (like iSNS server 
    [8]). The storage director is a server which stores discovery data. The 
    storage director can also potentially store access control, zoning and 
    other storage management information but this group's current focus is on 
    storing discovery information.
    
    If the initiators are not hard-coding the address information then they 
    have to explicitly query the DNS/storage director servers. That is, this 
    information is not presented to the initiators via upcalls from the DNS or 
    storage director servers.
    
    7) The information about the targets can be registered at the storage 
    director in the following different ways:
    a) The targets can register this information at the storage director 
    automatically via upcalls.
    b) The target information is registered manually at the storage director.
    c) The target information is registered manually in DNS servers.
    
    8) The interaction between the initiators and the storage director/DNS 
    servers, and between the targets and the storage director/DNS servers can 
    be either secure or insecure. The details of the secure interaction still 
    need to be worked out.
    
    
    4. Outstanding Work Items
    
    The naming and discovery team will be working on the following outstanding 
    work items:
    
    1) Initiator WWUIs and target WWUIs design. Goal is to try and build upon 
    existing naming mechanisms [1,5].
    2) The "path" format design.
    3) Impact of naming and discovery on iSCSI Login command.
    4) Details of initiator APIs to interact with the storage director.
    5) Details of the target APIs for interacting with the storage director.
    6) Core schema design for the storage director.
    7) Secure interaction between the storage director and the initiators and 
    the targets.
    
    
    
    5. References
    [1] Mockapetris, P., "Domain Names -- Implentation and Specification", RFC 
    1035, November 1987 
    
    [2] Postel, J., "Domain Name System Structure and Delegation", RFC 1591, 
    March 1994.
    
    [3] Berners-Lee, T., Masinter, L., and McCahill, M., Uniform Resource 
    Locators (URL), RFC 1738, December 1994.
    
    [4] Freed, N., "Behavior of and Requirements for Internet Firewalls", RFC 
    2979, October 2000.
    
    [5] ANSI/IEEE Std 802-1990, Name: IEEE Standards for Local and 
    Metropolitan Area Networks: Overview and Architecture
    
    [6] Kessler, G. and Shepard, S., "A Primer On Internet and TCP/IP Tools 
    and Utilities", RFC 2151, June 1997. 
    
    [7] Satran, J., Sapuntzakis, C., Wakeley, M., Von Stamwitz, P., Haagens, 
    R., Zeidner, E., Dalle Ore, L., Klein, Y., "iSCSI", 
    draft-ietf-ips-iscsi-00.txt, November, 2000. 
    
    [8] Gibbons, K., Tseng, J. and Monia, C., "iSNS Internet Storage Name 
    Service", draft-tseng-ips-isns-00.txt, October 2000.
    
    6. Contact Author
    Kaladhar Voruganti
    650 Harry Road
    IBM Almaden Research
    San Jose, CA
    USA
    Email: kaladhar@us.ibm.com
    
    
    
    
    
    Full Copyright Statement
    
    "Copyright (C) The Internet Society (date). All Rights Reserved. This 
    document and translations of it may be copied and furnished to others, and 
    derivative works that comment on or otherwise explain it or assist in its 
    implmentation may be prepared, copied, published and distributed, in whole 
    or in part, without restriction of any kind, provided that the above 
    copyright notice and this paragraph are included on all such copies and 
    derivative works. However, this document itself may not be modified in any 
    way, such as by removing the copyright notice or references to the 
    Internet Society or other Internet organizations, except as needed for the 
    purpose of developing Internet standards in which case the procedures for 
    copyrights defined in the Internet Standards process must be followed, or 
    as required to translate it into languages other than English.
    
    The limited permissions granted above are perpetual and will not be 
    revoked by the Internet Society or its successors or assigns.
    
    This document and the information contained herein is provided on an "As 
    IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE 
    DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED , INCLUDING BUT NOT LIMITED 
    TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE 
    ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A 
    PARTICULAR PURPOSE"
    
    
    Expires May 2001
    
    
    
     
    
    
    
    
    


Home

Last updated: Tue Sep 04 01:06:22 2001
6315 messages in chronological order