|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: Framing FormatsIf the iSCSI protocol is going to take on the responsibility of insuring a reliable data stream then there are only two alternatives. 1) Fixed length commands with padding. or 2) Pattern markers (and the required byte stuffing) that allow the detection of a command frame boundary. (I agree that this approach is oriented more towards those with hardware solutions) Personally I would rather drop the whole issue of Syncing and Steering (section 1.2.8) from the specification all together. In paragraph two of section 1.2.8.1 there are reasons given for not allowing TCP to do the re-ordering needed when packets are either dropped or show up out of order. Yet in paragraph three of the very same section we are told to use the same TCP techniques to handle dropped or up out of order packets. Mike -----Original Message----- From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu] On Behalf Of Rod Harrison Sent: Tuesday, July 10, 2001 11:42 AM To: ips@ece.cmu.edu Subject: RE: Framing Formats Byte stuffing will kill the performance of software implementations. Do we really believe re-synching in this way is necessary? Remember that the host SCSI layer will retry failed commands. I believe we will see error rates low enough to make pushing recovery back onto the host a viable solution. - Rod -----Original Message----- From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of Mike Parkhurst Sent: Tuesday, July 10, 2001 6:24 PM To: Black_David@emc.com Cc: ips@ece.cmu.edu Subject: RE: Framing Formats In my previous posting I was referring to the TCP-unaware variety. At the heart of the matter is whether we trust the underlying transport mechanism or not. If we don't, then there has to be some sort of error-recovery procedure for when information/data is lost in transit. If we do trust it, then the iSCSI specification is simplified and we assume that the protocol is riding on an error free link. But to go back to the point of this thread.... Byte and word stuffing mechanisms have been proven to work for many years. Picking a 32 bit number reduces the chances of it showing up in the data stream. Even if it does the stuffing mechanism would mask it. Mike -----Original Message----- From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu] On Behalf Of Black_David@emc.com Sent: Tuesday, July 10, 2001 7:07 AM To: Julian_Satran@il.ibm.com Cc: ips@ece.cmu.edu Subject: Framing Formats NOTE: iSCSI tag removed because there's FCIP-related material in this message. > We don't want this thread to be started again in this forum. > For anything related to framing go to the TSWG or to the RDMA mailing list. I think Julian may have jumped for that conclusion a little too quickly. Certainly, there are topics that belong on those mailing lists: - TCP-aware framing mechanisms are in the domain of TSVWG. Use of URG and PSH for framing is not going to happen. - RDMA mechanism discussions belong on the RDMA list - this is not an official IETF list. Beyond these, there are a couple of topics that are fair game for the IPS list: - TCP-unaware framing mechanisms intended for specification as part of an IPS protocol; this includes markers, as well as the synchronization recovery mechanism proposed for FCIP. - Discussion of appropriate requirements (e.g., should markers be specified as "MUST implement" with some additional rules about which end of a connection controls their usage on what traffic?). The requirements issue is definitely an open issue at this point in time. As for alternatives to markers, a fairly high level of rigor will be expected of approaches that scan data looking for some distinctive pattern - it basically needs to be the case that this sort of scan and detect algorithm cannot get confused by any pattern appearing in a data payload (read or write data for iSCSI). A motivating example to think about is where trace data that includes the distinctive pattern (e.g., from a sniffer) is being written to or read from a file. Byte and word stuffing mechanisms to ensure that the pattern the algorithm is looking for can't appear in data are one way to accomplish this, but there are others. While I'm on this topic, let me note that the algorithm in Annex A of the -03 FCIP draft does not meet this "cannot get confused" criterion. For FCIP, it is possible to meet this criterion without resorting to stuffing techniques - the basic idea is to scan enough incoming data so that there have to be valid headers in there, note every possible header found, and their relationships based on length fields. If the resulting situation is ambiguous/confusing, restart and/or abandon the attempt to re-establish synchronization. A considerably improved algorithm should appear in the -04 version of the FCIP draft based on some offline discussion with some of the draft authors. Thanks, --David --------------------------------------------------- David L. Black, Senior Technologist EMC Corporation, 42 South St., Hopkinton, MA 01748 +1 (508) 435-1000 x75140 FAX: +1 (508) 497-8500 black_david@emc.com Mobile: +1 (978) 394-7754 ---------------------------------------------------
Home Last updated: Tue Sep 04 01:04:20 2001 6315 messages in chronological order |