SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    Submission of draft under the IPS working group



    Attached is the updated draft of the Requirements Document for the iSCSI
    protocol under the IPS working group.
    
    Marjorie Krueger
    Networked Storage Architecture
    Hewlett-Packard Storage Organization
    tel: +1 916 785 2656
    fax: +1 916 785 0391
    email: marjorie_krueger@hp.com 
    
    
    
    
                             IP Storage Working Group           M. Krueger 
                                                                 R. Haagens 
    Internet Draft                                          Hewlett-Packard 
                                                                Corporation 
    Category: Informational                                                 
                                                             C. Sapuntzakis 
                                                                   M. Bakke 
                                                              Cisco Systems 
                                                                            
    Document: draft-ietf-ips-iscsi-reqmts-00.txt              November 2000 
     
     
                  iSCSI Requirements and Design Considerations 
     
     
    Status of this Memo 
     
       This document is an Internet-Draft and is in full conformance with 
       all provisions of Section 10 of RFC2026 [1].  
        
       Internet-Drafts are working documents of the Internet Engineering 
       Task Force (IETF), its areas, and its working groups.  Note that 
       other groups may also distribute working documents as Internet-
       Drafts. 
        
              Internet-Drafts are draft documents valid for a maximum of six 
        months and may be updated, replaced, or obsoleted by other documents 
                 at any time.  It is inappropriate to use Internet-Drafts as 
        reference material or to cite them other than as "work in progress." 
        
       The list of current Internet-Drafts can be accessed at 
       http://www.ietf.org/ietf/1id-abstracts.txt 
        
       The list of Internet-Draft Shadow Directories can be accessed at 
       http://www.ietf.org/shadow.html. 
        
        
    
    1. Abstract 
        
       The IP Storage Working group is chartered with developing a protocol 
       to transport the Small Computer Systems Interface (SCSI) protocol 
       over the internet. The iSCSI protocol will define a mapping of SCSI 
       transport protocol over TCP/IP so that SCSI storage controllers 
       (principally disk and tape arrays and libraries) can be attached to 
       IP networks, notably Gigabit Ethernet (GbE) and 10 Gigabit Ethernet 
       (10 GbE). 
        
       This document specifies the requirements the iSCSI protocol should 
       satisfy and the design considerations guiding the iSCSI protocol 
       development effort. In the interest of timely adoption of the iSCSI 
       protocol, this group has chosen to work with the existing SCSI 
       architecture and commands, and the existing TCP/IP transport layer.  
    
      
    Krueger            Informational – Expires May 2001                  1 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       Both these protocols are widely-deployed and well-understood.  The 
       thought is that using these mature protocols will entail a minimum 
       of new invention, the most rapid possible adoption, and the greatest 
       compatibility with Internet architecture, protocols, and equipment. 
        
       The iSCSI protocol is a mapping of SCSI to TCP, and constitutes a 
       "SCSI transport" as defined by the ANSI T10 document SCSI SAM-2 
       document [SAM2, p. 3, "Transport Protocols"]. 
        
    
    2. Conventions used in this document 
        
       The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
       "SHOULD", "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in 
       this document are to be interpreted as described in RFC-2119 [2]. 
        
       Paragraphs marked with [R] or [D] are still undergoing development. 
        
    
    3. Definitions 
     
       Certain definitions are offered here, with references to the 
       original document where applicable, in order to clarify the 
       discussion of requirements.  Definitions without references are the 
       work of the authors and reviewers of this document. 
        
       Logical Unit (LU): A target-resident entity that implements a device 
       model and executes SCSI commands sent by an application client [SAM-
       2, sec. 3.1.50, p. 7]. 
        
       Logical Unit Number (LUN): A 64-bit identifier for a logical unit 
       [SAM-2, sec. 3.1.52, p. 7]. 
        
       SCSI Device:  A device that is connected to a service delivery 
       subsystem and supports an SCSI application protocol [SAM-2, sec. 
       3.1.78, p. 9]. 
        
       Service Delivery Port (SDP): A device-resident interface used by the 
       application client, device server, or task manager to enter and 
       retrieve requests and responses from the service delivery subsystem.  
       Synonymous with port (SAM-2 sec. 3.1.61) [SAM-2, sec. 3.1.89, p. 9]. 
        
       Target: An SCSI device that receives SCSI command and directs such 
       commands to one or more logical units for execution [SAM-2 sec. 
       3.1.97, p. 10]. 
        
       Task: An object within the logical unit representing the work 
       associated with a command or a group of linked commands [SAM-2, sec. 
       3.1.98, p. 10]. 
        
       Transaction: A cooperative interaction between two objects, 
       involving the exchange of information or the execution of some 
      
    Krueger             Informational – Exp. May 2001                   2 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       service by one object on behalf of the other [SAM-2, sec. 3.1.109, 
       p. 10].  [A transaction seems to be a smaller unit than a task.] 
        
        
        
    
    4. iSCSI Design Considerations 
    
      4.1. General Discussion 
     
       The iSCSI standard SHALL specify how SCSI volume/block-oriented 
       devices interact when attached to IP networks.  The SCSI-3 command 
       sets (defined by the ANSI NCITS T10 committee) will be mapped to 
       TCP.  TCP has been chosen as the transport protocol because it is 
       well defined, well respected, and widely implemented in the internet 
       community.  In addition, the TCP transport provides the necessary 
       congestion management behavior necessary to be a "good internet 
       citizen".  
        
       Traditionally, volume/block-oriented storage controllers (e.g., disk 
       array controllers, tape library controllers) have supported the 
       SCSI-3 protocol, and have been attached to computers through the 
       SCSI parallel bus or through Fibre Channel.  File-oriented storage 
       controllers have supported the NFS and/or CIFS protocols, and have 
       been attached directly to IP networks such as Ethernet. 
       The IP infrastructure offers compelling advantages for volume/block-
       oriented storage attachment compared to current approaches.  It 
       offers the opportunity to take advantage of the cost/performance 
       benefits provided by competition in the internet marketplace. This 
       reduces the cost of storage infrastructure by: 
        
        -- Increasing performance (market driven by networking demand) 
        -- Offers richer array of management, security and QoS solutions 
        -- Economies arising from the need to install and operate only 
           single type of network 
        
       In addition, mapping SCSI over IP provides: 
        
        -- Extended distance ranges 
        -- Connectivity to "carrier class" services that support IP 
          
       The following applications for iSCSI are contemplated: 
        
        -- Local storage access, consolidation, clustering and pooling (as 
           in the data center) 
        -- Client access to remote storage (ex. a "storage service 
           provider") 
        -- Local and remote synchronous and asynchronous mirroring between 
           storage controllers 
        -- Local and remote backup and recovery 
        
       iSCSI must support the following topologies: 
      
    Krueger             Informational – Exp. May 2001                   3 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
        
        -- Point-to-point direct connections 
        -- Dedicated storage LAN, consisting of one or more LAN segments 
        -- Shared LAN, carrying a mix of traditional LAN traffic plus 
           storage traffic 
        -- LAN-to-WAN extension using IP routers or carrier-provided "IP 
           Datatone" 
        -- Private networks and the public Internet 
         
       Local-area storage networks will be built using Ethernet LAN 
       switches.  These networks may be dedicated to storage, or shared 
       with traditional Ethernet uses, as determined by cost, performance, 
       administration, and security considerations.  In the local area, 
       TCP's adaptive retransmission timers will provide for automatic and 
       rapid error detection and recovery, compared to alternative 
       technologies. 
        
       IP LAN-WAN routers will be used to extend the IP storage network to 
       the wide area, permitting remote disk access (as for a storage 
       utility), synchronous and asynchronous remote mirroring, and remote 
       backup and restore (as for tape vaulting).  In the WAN, TCP end-to-
       end will avoid the need for specialized equipment for protocol 
       conversion, ensure data reliability, cope with network congestion, 
       and automatically adapt retransmission strategies to WAN delays. 
        
       The full realization of iSCSI will involve the following elements: 
        (1)  Completion of Requirements (this document) and Specification 
             documents;  
        (2)  Development of Ethernet storage NICs and related driver and 
             protocol software; [NOTE: high-speed applications of iSCSI are 
             expected to require significant portions of the iSCSI/TCP/IP 
             implementation in hardware to achieve the necessary 
             throughput.]  
        (3)  Development of compatible storage controllers; and  
        (4)  The likely development of translating gateways to provide 
             connectivity between the Ethernet storage network and the 
             Fibre Channel and/or parallel-bus SCSI domains. 
        
       Products will initially be offered for Gigabit Ethernet attachment, 
       with rapid migration to 10 GbE.  For performance competitive with 
       alternative SCSI transports, it will be necessary to implement the 
       performance path of the full protocol stack in hardware.  These new 
       storage NICs will perform full-stack processing of a complete SCSI 
       task, analogous to today's SCSI and Fibre Channel HBAs.  They 
       typically also will support all host protocols that use TCP, 
       including NFS, CIFS and HTTP. 
        
       A key goal is not to require modifications to the current IP and 
       Ethernet infrastructure to support storage traffic over TCP.  
       Nevertheless, the performance and security requirements of storage 
       will create opportunities for improvement in security protocols and 
       QoS implementations.  The addition of storage traffic to local- and 
       wide-area internets (and even to the public Internet) may introduce 
      
    Krueger             Informational – Exp. May 2001                   4 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       increased requirements for traffic monitoring and engineering in 
       those environments. 
        
       It is contemplated that many organizations initially will choose to 
       operate storage networks based on iSCSI that are independent of 
       (isolated from) their current data networks except for secure 
       routing of storage management traffic.  These organizations will 
       benefit from the high performance/cost of IP equipment and a unified 
       management architecture, compared to alternative means of building 
       storage networks.  As security and QoS evolve, it will become more 
       reasonable to build combined networks with shared infrastructure; 
       nevertheless, it is likely that sophisticated users will choose to 
       keep their storage subnetworks isolated, for the best control of 
       security and QoS. 
        
       The charter of the IETF IP Storage Working Group (IPSWG) describes 
       the broad goal of mapping SCSI to IP.  Within that broad charter, 
       many transport alternatives may be considered.  Our initial work 
       focuses on TCP, and this requirements document is restricted to that 
       domain of interest.  At the current time, the working group does not 
       seek a more generic requirements statement that would justify the 
       choice of TCP (or another protocol) as transport, since the merits 
       of using TCP are readily evident to the working group participants. 
        
    
      4.2. Framing 
     
       Framing refers to the addition of information in a header, or the 
       data stream to allow implementations to locate the boundaries of an 
       iSCSI protocol data unit (PDU).  There are two technical 
       requirements driving framing: interfacing needs, and accelerated 
       processing needs. 
        
       A framing solution that addresses the "interfacing needs" of the 
       iSCSI protocol will facilitate the implementation of a message-based 
       upper layer protocol (SCSI) on top of an underlying byte streaming 
       protocol (TCP).  Since TCP is a reliable transport, this can be 
       accomplished by including a length field in the iSCSI header.  That 
       assumes that the receiver will parse from the beginning of the 
       stream, and never make a mistake (lose alignment on packet headers). 
        
       The other technical requirement for framing, "accelerated 
       processing", stems from the need to handle increasingly higher data 
       rates in the physical media interface.  Two needs arise from higher 
       data rates - 
         
       (1)  LAN environment - NIC vendors seek ways to provide "0 copy" 
            methods of moving data directly from the wire into application 
            buffers.  
       (2)  WAN environment- the emergence of high bandwidth, high latency, 
            low bit error rate physical media places huge buffer 
            requirements on the physical interface solutions. 
      
    Krueger             Informational – Exp. May 2001                   5 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       First, vendors are producing network processing hardware that 
       offloads network protocols to hardware solutions to achieve higher 
       data rates.  The concept of "0 copy" seeks to store blocks of data 
       in appropriate memory locations (aligned) directly off the wire, 
       even in when data is reordered due to packet loss.  This is 
       necessary to drive actual data rates of 10G and beyond. 
        
       Secondly, in order for iSCSI to be successful in the WAN arena it 
       must be possible to operate efficiently in high bandwidth, high 
       delay networks.  The emergence of multi-gigabit IP networks with 
       latencies in the tens to hundreds of milliseconds presents a 
       challenge. To fill such large pipes, tens of megabytes of 
       outstanding requests from the application are needed. In addition, 
       some protocols potentially require tens of megabytes at the 
       transport layer to deal with buffering for reassembly of data when 
       packets are received out-of-order. 
        
       Consider that a network pipe at 10 Gbps . 200 msec holds 250 MB. 
       [Assume land-based communication with a spot half way around the 
       world at the equator.  Ignore additional distance due to cable 
       routing.  Ignore repeater and switching delays; consider only a 
       speed-of-light delay of 5 .sec / km.  The circumference of the globe 
       at the equator is approx. 40000 km (we need to consider round-trip 
       delay to keep the pipe full).  10 Gb/sec . 40000 km . 5 .sec / km . B 
       / 8b = 250 MB].  In a conventional TCP implementation, loss of a TCP 
       segment means that stream processing must stop until that segment is 
       recovered, which takes at least a time of <network round trip> to 
       accomplish.  Following the example above, we would be obliged to 
       catch 250 MB of data into an anonymous buffer before we could resume 
       stream processing; later, this data would need to be moved to its 
       proper location.  Some proponents of iSCSI seek some means of 
       putting data directly where it belongs, and avoiding extra data 
       movement in the case of segment drop.  This is a key concept in 
       understanding the debate behind framing methodologies. 
        
       The framing of the iSCSI protocol impacts both the "interfacing 
       needs" and the "accelerated processing needs", however, while 
       including a length in a header may suffice for the "interfacing 
       needs", it will not serve the "accelerated processing needs". The 
       framing mechanism developed should allow resynchronization of packet 
       boundaries even in the case where a packet is temporarily missing in 
       the incoming data stream.   
        
    
      4.3. Performance/Cost 
        
       EDITORS NOTE: Performance/Cost is frequently, but inaccurately, 
       referred to as Cost/Performance.  The Performance/Cost formulation 
       is the correct representation, demonstrating that increasing 
       Performance/Cost is good. 
        
    
      
    Krueger             Informational – Exp. May 2001                   6 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       In general, iSCSI should allow implementations to equal or improve on 
       the current state of the art for SCSI interconnects. 
        
       [R] Low delay communication. 
        
       [D] Conventional storage access is of a stop-and-wait or remote 
       procedure call type.  Applications typically employ very little 
       pipelining of their storage accesses, and so storage access delay 
       directly impacts performance.  The delay imposed by current storage 
       interconnects, including protocol processing, is generally in the 
       range of 100 microseconds.  The use of caching in storage 
       controllers means that many storage accesses complete almost 
       instantly, and so the delay of the interconnect can have a high 
       relative impact on overall performance. 
        
       [R] High bandwidth, bandwidth aggregation. 
        
       [D] The bandwidth (transfer rate, MB/sec) supported by storage 
       controllers is rapidly increasing, due to several factors: (1) 
       Increase in disk spindle and controller performance; (2) Use of 
       ever-larger caches, and improved caching algorithms; (3) Increased 
       scale of storage controllers (number of supported spindles, speed of 
       interconnects).  Not only must the iSCSI provide for full 
       utilization of available link bandwidth, it also must exploit 
       parallelism (multiple connections) at the device interfaces and 
       within the interconnect fabric. 
        
       [R] Low CPU utilization, equal to or better than current technology. 
        
       [D] For competitive performance, the iSCSI protocol must allow three 
       key implementation choices to be realized: (1) iSCSI must make it 
       possible to build I/O adapters that handle an entire SCSI task, as 
       alternative SCSI transport implementations do.  (2) The protocol 
       must permit "zero-copy" memory architectures, where the I/O adapter 
       reads or writes host memory exactly once per disk transaction. (3) 
       The protocol must not impose complex operations on the host 
       software, which would increase host instruction path length relative 
       to alternatives. 
        
       [R] Cost competitive with alternative storage network technologies. 
        
       [R] Possible to move data directly f EDITORS NOTE: Performance/Cost 
       is frequently, but inaccurately, referred to as Cost/Performance.  
       The Performance/Cost formulation is the correct representation, 
       demonstrating that increasing Performance/Cost is good. 
        
       In general, iSCSI must allow implementations to equal or improve on 
       the current state of the art for SCSI interconnects. 
        
       [R] Low delay communication. 
        
       [D] Conventional storage access is of a stop-and-wait or remote 
       procedure call type.  Applications typically employ very little 
      
    Krueger             Informational – Exp. May 2001                   7 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       pipelining of their storage accesses, and so storage access delay 
       directly impacts performance.  The delay imposed by current storage 
       interconnects, including protocol processing, is generally in the 
       range of 100 microseconds.  The use of caching in storage 
       controllers means that many storage accesses complete almost 
       instantly, and so the delay of the interconnect can have a high 
       relative impact on overall performance. 
        
       [R] High bandwidth, bandwidth aggregation. 
        
       [D] The bandwidth (transfer rate, MB/sec) supported by storage 
       controllers is rapidly increasing, due to several factors: (1) 
       Increase in disk spindle and controller performance; (2) Use of 
       ever-larger caches, and improved caching algorithms; (3) Increased 
       scale of storage controllers (number of supported spindles, speed of 
       interconnects).  Not only must the iSCSI provide for full 
       utilization of available link bandwidth, it also must exploit 
       parallelism (multiple connections) at the device interfaces and 
       within the interconnect fabric. 
        
       [R] Low CPU utilization, equal to or better than current technology. 
        
       [D] For competitive performance, the iSCSI protocol must allow three 
       key implementation choices to be realized: (1) iSCSI must make it 
       possible to build I/O adapters that handle an entire SCSI task, as 
       alternative SCSI transport implementations do.  (2) The protocol 
       must permit "zero-copy" memory architectures, where the I/O adapter 
       reads or writes host memory exactly once per disk transaction. (3) 
       The protocol must not impose complex operations on the host 
       software, which would increase host instruction path length relative 
       to alternatives. 
        
       [R] Cost competitive with alternative storage network technologies. 
        
    
    5. Ease of implementation/complexity of protocol 
        
       Experience has shown that adoption of a protocol by the internet 
       community is inversely proportional to its complexity.  In addition, 
       the simpler the protocol, the easier it is to diagnose problems.  
       The designers of iSCSI shall strive to fulfill the requirements of 
       the interconnect effort, while keeping the protocol as simple as 
       possible. 
          
       In the interest of simplicity, iSCSI should minimize optional 
       features.  When features are deemed necessary, the protocol should 
       allow for feature negotiation at session establishment (login) and 
       provide for rejection when an implementation does not support a 
       requested feature. 
     
    
    
      
    Krueger             Informational – Exp. May 2001                   8 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
    6. Reliability and Availability 
     
       ISCSI protocol design, while placing an emphasis on simplicity, 
       should lead to timely recovery from failure of initiator, target, or 
       connecting internet infrastructure (cabling, data path equipment 
       such as routers, etc).  This would provide a basis for layered 
       technologies like high availability and clustering.  The protocol 
       specification should take into account fail-over schemes for 
       mirrored targets or highly available storage configurations that 
       provide paths to target data through multiple "storage servers". 
        
    
    7. Multiple Paths for Throughput 
     
       History has shown that any single link can be saturated by storage 
       traffic. Scientific data applications, asynchronous and synchronous 
       data replication are examples of applications that have pushed and 
       continue to push the limits of throughput.  
        
       The iSCSI standard MUST allow the initiator and target to use 
       multiple network interfaces and multiple paths through the network 
       for increased throughput.  
        
       Some applications, like log updates, streaming tape, and 
       replication, require ordering of updates and thus ordering of SCSI 
       commands. An initiator may maintain ordering by waiting for each 
       update to complete before issuing the next (a.k.a. synchronous 
       updates). However, the throughput of synchronous updates decreases 
       inversely with increases in latency of the operation. 
         
       To allow an initiator to maintain throughput, the SCSI task queuing 
       mechanism allows an initiator to have multiple commands outstanding 
       at the target simultaneously and to express ordering constraints on 
       the execution of those commands. The task queuing mechanism is only 
       effective if the commands arrive at the target in the order they 
       were presented to the initiator (FIFO order).  
        
       The iSCSI standard MAY provide a FIFO transport of SCSI commands, 
       even when commands are sent along different paths. This FIFO 
       transport mechanism MAY wish to minimize the amount of communication 
       necessary across multiple adapters doing transport off-load.  
     
       There are a few potential ways to satisfy the multiple path and 
       ordering requirements.  
        
       A popular way to satisfy the multiple-path requirement is to have a 
       driver above the SCSI layer instantiate multiple copies of the SCSI 
       transport, each communicating to the target along a different path. 
       “Wedge” drivers use this technique today to attain high performance. 
       Unfortunately, wedge drivers must use stop-and-wait to do ordered 
       updates. 
        
    
      
    Krueger             Informational – Exp. May 2001                   9 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       Another approach might be for the iSCSI protocol to use multiple 
       instances of its underlying transport (e.g. TCP). The iSCSI layer 
       would make these independent transport instances appear as one SCSI 
       transport instance and maintain the ability to do ordered SCSI 
       command queuing. The document will refer to this technique as 
       "connection binding" for convenience. 
        
       The consensus of the working group is that support for connection 
       binding is NOT a requirement for initiators and targets. (ref e-mail 
       of David Black to ips reflector on Oct 11, 2000) There has been no 
       explicit decision on whether the protocol is required to support 
       connection binding. 
        
       In the presence of connection binding, there are two ways to assign 
       features to connections. In the symmetric approach, all the 
       connections are identical from a feature standpoint. In the 
       asymmetric model, connections have different features. For example, 
       some connections may be used primarily for data transfers whereas 
       others are used primarily for SCSI commands. 
        
       Another point in the design space for connection binding has to do 
       with the data transfer associated with a SCSI command. The data 
       transfer is said to have allegiance to the command if it occurs on 
       the same connection on which the command was sent. A data transfer 
       can also potentially have allegiance to a channel which is different 
       from the command was sent (and perhaps even specified in the command 
       request). Finally, a data transfer can have no allegiance and appear 
       across number of any connection. 
        
       The question of symmetric or asymmetric has yet to be resolved by 
       the working group. The symmetric approach potentially requires less 
       communication between the interfaces and has simpler recovery 
       semantics in the case of a connection failure. The asymmetric 
       approach can simplify some aspects of the protocol and potentially 
       yields greater throughput. The symmetric approach with command 
       allegiance is currently being pursued. 
        
    
    8. Recovery 
        
       The iSCSI protocol MUST provide the ability to recover from a 
       failed, hung, or timed-out TCP connection, without the loss of the 
       session between the initiator and target.  This must particularly 
       work for non-idempotent requests, such as operations on tape drives.  
       If all TCP connections for a session fail, and no connections can be 
       established, the iSCSI session shall be aborted. 
        
       The iSCSI protocol SHALL attempt to provide recovery in a timely 
       fashion from initiator and target reboots and failovers to other 
       physical devices. 
          
    
    
      
    Krueger             Informational – Exp. May 2001                  10 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       The iSCSI protocol MUST also provide a method for sessions to be 
       gracefully terminated and restarted that can be initiated by either 
       the initiator or target.  This provides the ability to gracefully 
       fail over an initiator or target, or to gracefully reset a target 
       after upgrading software or performing other maintenance tasks. 
        
    
      8.1. Interoperability 
        
       It must be possible for initiators and targets that implement the 
       required portions of the iSCSI specification to interoperate. 
    
      8.2. Internet infrastructure 
        
       The iSCSI protocol MUST: 
        -- be compatible with both IPv4 and IPv6 
        -- use TCP connections conservatively, keeping in mind there may be 
           many other users of TCP on a given machine. 
         
       The iSCSI protocol MUST NOT: 
        -- require changes to existing internet protocols 
        
    
      8.3. SCSI 
     
       Since iSCSI is a SCSI transport, the iSCSI standard SHOULD comply 
       with the requirements of the SCSI Architecture Model [SAM2] and 
       SHOULD support all current SCSI command sets. Furthermore, it MUST 
       be possible to create bridges from iSCSI to other SCSI 
       interconnects. 
        
       track changes to SCSI and the SCSI Architecture Model.  
       iSCSI is a new SCSI "transport" [SAM2].  Being the intersection of 
       SCSI and TCP, iSCSI has potential impact on T10 as well as on IETF.  
       However, a stated requirement (below) is that iSCSI shall have no 
       impact on T10 architecture or command sets.  Collaboration with T10 
       will be necessary to achieve this requirement. 
        
       Collaboration with T10 concerns three phases of T10 activity: 
        
        (1)  Past.  For T10 work completed in the past, and well-document 
             in T10 standards publication, the IPS working group will seek 
             assistance in properly interpreting those standards;  
        (2)  Present.  For T10 work that is ongoing, or recently completed 
             (but not widely published), the IPS working group will seek 
             review of our work by individuals active in T10, and/or the 
             participation of those individuals in the IETF process;  
        (3)  Future.  For compatibility with future T10 work, it is 
             essential that iSCSI be a legitimate and recognized "SCSI 
             transport", no less so than the several other SCSI transports.  
    
    
      
    Krueger             Informational – Exp. May 2001                  11 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
             SCSI command standards must evolve within the context of all 
             existing SCSI transports. 
        
       Storage attachment to IP networks will engender an unprecedented 
       potential for device sharing.  This alone may impact future T10 
       work. 
        
       The iSCSI protocol MUST support all SCSI-3 command sets and device 
       types. The primary focus is on supporting “larger” devices: host 
       computers and storage controllers (disk arrays, tape libraries). 
       However, other command sets (printers, scanners) MUST be supported. 
       These requirements must not be construed to mean that iSCSI must be 
       natively implementable on all of today’s SCSI devices, which might 
       have limited processing power or memory. 
         
       The iSCSI protocol MUST not require changes to the SCSI-3 command 
       sets and SCSI client code except to reflect lengthier iSCSI target 
       names and potentially lengthier timeouts. 
        
       The iSCSI standard MUST allow for the construction of gateways to 
       other SCSI transports, including parallel SCSI [SPI-X] and to SCSI-
       FCP[FCP, FCP-2].  It MUST be possible to construct "translating" 
       gateways so that iSCSI hosts can talk to SCSI-X devices; so that 
       SCSI-X devices can talk to each other over an iSCSI network; and so 
       that SCSI-X hosts can talk to iSCSI devices (where SCSI-X refers to 
       parallel SCSI, SCSI-FCP, or SCSI over any other transport). 
        
       This requirement is implied by support for SAM-2, but is worthy of 
       emphasis[D] These are true application protocol gateways, and not 
       just bridge/routers.  The different standards have only the SCSI-3 
       command set layer in common.  These gateways are not mere packet 
       forwarders. 
        
       The iSCSI standard MUST reliably transport SCSI commands from the 
       initiator to the target. According to [SAM-2, p. 17.] "The function 
       of the service delivery subsystem is to transport an error-free copy 
       of the request or response between the sender and the receiver…" 
       [SAM-2, p. 22]. The iSCSI standard or its transport MUST correctly 
       deal with packet drop, duplication, corruption, stale packets, and 
       re-ordering. 
        
       The iSCSI standard MUST support FIFO delivery of SCSI commands from 
       the initiator to the target, so as to enable support for task 
       ordering in SCSI Task Queuing. 
        
    
    9. Security Considerations 
    
      9.1. Authentication 
        
       The iSCSI protocol MUST support authenticated login.  Authenticated 
       login aids the target in blocking the unauthorized use of SCSI 
      
    Krueger             Informational – Exp. May 2001                  12 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       resources.  Since block storage is considered critical in many 
       environments and many IP networks provide easy connectivity, many 
       organizations will want to protect their IP SCSI resources. 
        
       The iSCSI authenticated login MUST be resilient against passive 
       attacks since many IP networks are vulnerable to packet inspection. 
       Simple, US-exportable techniques exist to satisfy this requirement. 
        
       In addition, the iSCSI protocol MUST support optional authentication 
       of its communications. This requirement may be met using IPsec or 
       SSL/TLS or with some iSCSI-specific mechanism. The endpoints may 
       negotiate the authentication method, optionally none. The endpoints 
       will not be required to support any authentication algorithms. 
        
       Authentication of the communications is critical since IP networks 
       are vulnerable to source spoofing, where a malicious third party can 
       pretend to send packets from the initiator’s IP address.  
    
      9.2. Data Integrity 
        
       Requirements: 
        
        -- The iSCSI protocol shall support the negotiation of data 
           integrity schemes during connection login. 
         
        -- The iSCSI protocol shall support the negotiation of a data 
           integrity mechanism for SCSI data, blocks, separable from data 
           integrity mechanisms performed on commands, status, and iSCSI 
           headers. 
         
        -- The iSCSI data integrity negotiation scheme shall be extensible 
           to include other data integrity check mechanisms. 
         
        -- The iSCSI protocol shall not preclude the use of stream data 
           integrity mechanisms provided by IPSec.  
        
       The iSCSI protocol must provide the ability to select data integrity 
       mechanisms that are appropriate for each environment in which it is 
       to run.  For example, a layer 2 network (such as Ethernet) uses a 
       CRC to protect each IP packet that is comparable to the CRC used to 
       protect Fibre Channel frames.  When running in this environment, it 
       is likely that no additional data integrity mechanisms need be 
       provided by iSCSI, so a data integrity scheme of "none" might be 
       used. 
        
       However, in a L3 or L4 routed network, the Ethernet (or other layer  
       2) CRC is removed and replaced at each router, and the iSCSI stream 
       is protected only by the 16-bit TCP checksum.  In some applications 
       and networks, this still may be acceptable, but in many cases a 
       stronger check is needed.  Some of the options that have been 
       discussed rely either on adding a TCP option for CRC, which would 
       require work on the implementor’s TCP stack, or would rely on data 
      
    Krueger             Informational – Exp. May 2001                  13 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       integrity checks from a security layer such as IPsec.  These are 
       both technically workable solutions, but will not work across iSCSI 
       proxies or gateways. 
        
       In an iSCSI proxy or gateway situation, the iSCSI headers are 
       removed and re-added, and the TCP stream is terminated on either 
       side.  This means that even the TCP checksum is removed and 
       recomputed within the gateway.  To ensure the protection of 
       commands, data, and status, a CRC or other mechanism is required to 
       operation on the SCSI data block itself, as well as on each command 
       and status message.  Since the iSCSI headers can be stripped and 
       remade,  the iSCSI headers cannot be included in these CRCs, and 
       must have their own. 
    
      9.3. Data Privacy 
        
       Block storage is used for storing sensitive information, like 
       medical records, where data privacy is critical. 
        
       Encrypting the data blocks before writing them to storage provides 
       the best protection for the application. Even if the storage or 
       communications are compromised, the attacker will have difficulty 
       reading the data. 
        
       However, for certain environments, link encryption may be sufficient 
       or provide an extra layer of assurance of privacy. An iSCSI 
       implementation MAY use protocols such as TLS or IPsec to provide 
       data privacy over a link. 
        
    
    10. Management 
        
       iSCSI devices should be manageable using IP-based management 
       protocols (ex. SNMP, RMI).   
        
       iSCSI devices may also be manageable using SCSI commands for 
       management (ex. SCSI Enclosure Services, SES commands). 
        
       The iSCSI protocol document will not define the management 
       architecture for iSCSI networks. 
    
      10.1. Naming 
        
       Whenever possible, iSCSI shall support the naming architecture of 
       SAM-2.  Deviations and uncertainties will be made explicit, and 
       comment/resolution invited. 
        
       The iSCSI protocol shall provide a means of identifying iSCSI 
       targets by a flexible path address (URL), where the path is the 
       combination of a DNS name or IP address, a TCP port, and an optional 
       ASCII path name identifying the target. 
        
      
    Krueger             Informational – Exp. May 2001                  14 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       The iSCSI protocol shall provide a means of identifying iSCSI 
       targets by a world-wide unique identifier (WWUI), that is 
       independent of the path on which it is found.  This will be used to 
       correlate alternate paths to the same device.  Implementation 
       support for the WWUI is strongly recommended, but optional. 
       Note that LU names are discovered through SCSI-level inquiries, and 
       are not just for Fibre Channel.  There is nothing to prevent iSCSI 
       (or parallel SCSI) from implementing the LU WWN.  As such, this is 
       outside the scope of the iSCSI protocol specification. 
        
       Standard internet lookup services should be used to resolve names.   
        
       For example, the Domain Name Service (DNS) MAY be used to resolve 
       the <hostname> portion of the URL to one, or multiple IP addresses.  
       When a hostname resolves to multiple addresses, these addresses 
       should be equivalent for functional (possibly not performance) 
       purposes.  This means that the addresses can be used interchangeably 
       as long as performance isn’t a concern.  For example, the same set 
       of SCSI targets must be accessible from each of these addresses. 
        
       [R] Deal with the complications of the new SCSI security 
       architecture [99-245r8]. 
        
       [D] Pay attention to the proxy naming architecture defined by the 
       new security model.  In this new model, SCSI Logical Unit Numbers 
       (LUNs) can be mapped in a manner that gives each host (more 
       correctly, each AccessID) a unique LU map.  Thus, a given LU within 
       a target may be addressed by different LUNs. 
        
       [R] Support SCSI 3rd-party operations. 
        
       [D] The key issue here relates to the naming architecture for SCSI 
       LUs.  We need to determine a method of passing a name or handle 
       between parties  
    
      10.2. Topology Discovery 
        
       iSCSI shall have no impact on the use of conventional IP network 
       discovery techniques.  Various network management platforms have 
       ways of discovering IP addresses.  These techniques will be used, 
       and will find all of the IP end points that contain iSCSI nodes. 
       The iSCSI protocol shall provide appropriate discovery mechanisms 
       which scale from adding single devices to an iSCSI-internal storage 
       subsystem, up to the deployment of multi-customer, multi-utility 
       storage outsourcing environments. 
        
       iSCSI shall provide some means of determining that a discovered IP 
       end point is an iSCSI node.  It is expected that iSCSI is a point of 
       service in a host, just as SNMP, etc are points of services, and are 
       associated with a well known port number. One solution to this 
       problem would be to produce an iSCSI device MIB specification.  
        
      
    Krueger             Informational – Exp. May 2001                  15 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       The iSCSI protocol shall provide a method of discovering, given an 
       IP end point on its well-known port, the list of SCSI targets 
       available to the requestor.  These targets can either be path 
       addresses, or WWUIs.  The use of this discovery service shall be 
       optional. 
        
       SCSI protocol-dependent techniques shall be used for further 
       discovery beyond the iSCSI layer.  Discovery is a complex process.  
       SCSI provides specific hooks for doing the work, so the commands 
       associated with this process will also work over iSCSI.  Generally 
       the SCSI discovery process involves using the Report LUNs command to 
       determine which LUs are addressable at a given service delivery 
       port.  Subsequently, the true identity of each LU (ie, name) is 
       discovered by reading Vital product data page 83h.  By comparing LU 
       IDs, the discovery process can find that a given LU is accessible 
       through multiple paths. 
     
    
    11. Internet Accessibility 
    
      11.1. Denial of Service 
        
       As with all services, the denial of service by either incorrect 
       implementations or malicious agents is always a concern.  All 
       aspects of the iSCSI protocol should be scrutinized for potential 
       denial of service issues, and guarded against as much as possible. 
    
      11.2. Firewalls and Proxy servers 
        
       During the login phase, any login or connect command must include 
       the full iSCSI address of the target to which the initiator wishes 
       to connect.  This includes the IP Address (or DNS name), TCP port 
       number, and iSCSI PATH (target name), and allows an initiator to 
       connect to a target through an iSCSI proxy server. 
        
       The iSCSI protocol’s use of IP addressing and TCP port numbers must 
       be firewall friendly. This probably means that all connection 
       requests should be addressed a specific, well-known TCP port.  That 
       way, firewalls can filter based on source and destination IP 
       addresses, and destination (target) port number.  The source 
       (initiator) port number also should be well-known for the initial 
       TCP connection.  Additional TCP connections would require different 
       source port numbers (for uniqueness), but could be opened after a 
       security dialogue on the control channel. 
        
       It’s important that iSCSI operate through a firewall to provide a 
       possible means of defending against Denial of Service (DoS) assaults 
       from less-trusted areas of the network.  It is assumed that a 
       firewall will have much greater processing power for dismissing
       bogus connection requests than do the end nodes. 
    
    
      
    Krueger             Informational – Exp. May 2001                  16 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
      11.3. Congestion control and Transport Selection 
        
       The iSCSI protocol MUST be a good network citizen with TCP-
       compatible congestion control (as defined in RFC 2309). In addition, 
       iSCSI implementations MUST not use multiple connections as a means 
       to avoid transport-layer congestion control. 
        
    
    12. Virtualization 
        
       Virtualization of targets and LUNs is generally handled by 
       intelligent gateways, storage controllers, or other devices.  Many 
       vendors, especially those that build storage devices, include very 
       advanced virtualization features that are beyond the scope of a SCSI 
       transport layer to define, and are usually closely guarded as 
       intellectual property. 
        
       Requiring the iSCSI protocol to work within an environment that 
       includes proxies and gateways (see earlier requirements) will 
       provide a SCSI transport that will enable vendors to add their own 
       virtualization features without breaking the protocol or causing 
       interoperability problems. 
     
    
    13. References 
        
     
       1  Bradner, S., "The Internet Standards Process -- Revision 3", BCP 
          9, RFC 2026, October 1996. 
        
       2  Bradner, S., "Key words for use in RFCs to Indicate Requirement 
          Levels", BCP 14, RFC 2119, March 1997 
        
       1 [SAM-2] ANSI NCITS.  Weber, Ralph O., editor.  SCSI Architecture 
         Model -2 (SAM-2).  T10 Project 1157-D.  rev 13, 22 Mar 2000. 
    
       2 [SPC-2] ANSI NCITS.  Weber, Ralph O., editor.  SCSI Primary 
         Commands – 2 (SPC-2).  T10 Project 1236-D.  rev 18, 21 May 2000. 
    
       3 [CAM-3] ANSI NCITS.  Dallas, William D., editor.  Information 
         Technology – Common Access Method – 3 (CAM-3)).  X3T10 Project 
         990D.  rev 3, 16 Mar 1998. 
    
       4 [99-245r8] Hafner, Jim.  A Detailed Proposal for Access Controls.  
         T10/99-245 revision 8, 26 Apr 2000. 
    
       5 [SPI-X] ANSI NCITS.  SCSI Parallel Interface – X. 
    
       6 [FCP] ANSI NCITS.  SCSI-3 Fibre Channel Protocol [ANSI 
         X3.269:1996] 
    
    
      
    Krueger             Informational – Exp. May 2001                  17 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
       7 [FCP-2] ANSI NCITS.  SCSI-3 Fibre Channel Protocol – 2 [T10/1144-
         D] 
    
                                                 
    
    14. Acknowledgements 
        
       <TBD> 
        
    
    15. Author's Addresses 
        
       Address comments to: 
        
       Marjorie Krueger 
       Hewlett-Packard Corporation 
       8000 Foothills Blvd 
       Roseville, CA 95747-5668, USA 
       Phone: +1 916 785-2656 
       Email: marjorie_krueger@hp.com 
        
       Randy Haagens 
       Hewlett-Packard Corporation 
       8000 Foothills Blvd 
       Roseville, CA 95747-5668, USA 
       Phone: +1 916 785-4578 
       Email: Randy_Haagens@hp.com 
        
       Costa Sapuntzakis 
       Cisco Systems, Inc. 
       170 W. Tasman Dr. 
       San Jose, CA 95134, USA 
       Phone: +1 408 525-5497 
       Email: csapuntz@cisco.com 
        
       Mark Bakke 
       Cisco Systems, Inc. 
       6450 Wedgwood Road 
       Maple Grove, MN 55311 
       Phone: +1 763 398-1054 
       Email: mbakke@cisco.com
    
    
    
    
    
    
    
    
    
    
    
      
    Krueger             Informational – Exp. May 2001                  18 
    
                   ISCSI Reqmnts and Design Considerations      Nov. 2000 
     
     
        
    Full Copyright Statement 
     
       "Copyright (C) The Internet Society (date). All Rights Reserved. 
       This document and translations of it may be copied and furnished to 
       others, and derivative works that comment on or otherwise explain it 
       or assist in its implementation may be prepared, copied, published 
       and distributed, in whole or in part, without restriction of any 
       kind, provided that the above copyright notice and this paragraph 
       are included on all such copies and derivative works. However, this 
       document itself may not be modified in any way, such as by removing 
       the copyright notice or references to the Internet Society or other 
       Internet organizations, except as needed for the purpose of 
       developing Internet standards in which case the procedures for 
       copyrights defined in the Internet Standards process must be 
       followed, or as required to translate it into 
        
        
        
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
      
    Krueger             Informational – Exp. May 2001                  19 
    


Home

Last updated: Tue Sep 04 01:06:22 2001
6315 messages in chronological order