|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: iSCSI: unsolicited dataJulian, > Unsolicited data needs are very hard to predict and ordering them may > remove the need to do so to a large extent. Completely agreed. There are obvious performance advantages in mandating order, as earlier discussions clearly outlined. I am not questioning it. I however could not really see a deadlock per se - my comment was to understand what it is. More comments would certainly help. > As for the action - yes we may want to weaken the requirement to > accommodate for digest errors. Thanks. I meant to weaken the requirement on the response to a UUD, not the ordering requirement itself. Regards. -- Mallikarjun Mallikarjun Chadalapaka Networked Storage Architecture Network Storage Solutions Organization Hewlett-Packard MS 5668 Roseville CA 95747 ----- Original Message ----- From: "Julian Satran" <Julian_Satran@il.ibm.com> To: <ips@ece.cmu.edu> Sent: Monday, November 26, 2001 10:23 PM Subject: Re: iSCSI: unsolicited data > Mallikarjun, > > The deadlock free requirement here goes a bit deeper than your comment may > suggest. > Unsolicited data needs are very hard to predict and ordering them may > remove the need to do so to a large extent. > As for the action - yes we may want to weaken the requirement to > accommodate for digest errors. > > Regards, > Julo > > > > > > > > "Mallikarjun C." <cbm@rose.hp.com> > Sent by: owner-ips@ece.cmu.edu > 26-11-01 21:45 > Please respond to cbm > > > To: ips <ips@ece.cmu.edu> > cc: > Subject: iSCSI: unsolicited data > > > > Julian, > > I don't recall the earlier discussion being conclusive on this topic, > so let me attempt to make a couple of suggestions on this. > > Last para in Section 2.2.5 (page 33) in rev09 mandates unsolicited > data ordering with the following wording. > > "iSCSI initiators and targets MUST also enforce some ordering rules to > achieve deadlock-free operation. Unsolicited data MUST be sent on > every connection in the same order in which commands were sent. A > target receiving data out of order SHOULD terminate the session." > > I have a couple of suggestions to reword - > > - The reference to a deadlock is true only for an implementation > overcommitting the unsolicited data buffers. So, I would suggest > dropping this reasoning. > > - The "MUST enforce" wording should also add that "targets MAY > however see unexpected unsolicited data (UUD), following data > digest errors on expected unsolicited data." > > - Finally, the "SHOULD terminate the session", IMHO, is too strong. > This wording will imply that a session is vulnerable to a single > digest error regardless of recovery level. [ I however disfavor > attaching more assorted semantics to recovery levels (than the > current easily understood "level = setof(recovery classes)" > formulation). ] As you mentioned on this discussion earlier, a > UUD is a protocol error (or may be not, if it is the effect of > a prior digest failure). > > We can choose to Reject ("protocol error") the UUD and discard the > data. The only problem with this approach is: following a digest > error on unsolicited data for one task, all the following unsolicited > data in flight would have to be discarded. One option is to imply > that the target update the "expected unsolicited data" so the > unsolicited data following in the pipe can be processed normally. > So, I guess it would be saying: "the target MAY Reject the UUD". > > Comments? > -- > Mallikarjun > > > Mallikarjun Chadalapaka > Networked Storage Architecture > Network Storage Solutions Organization > MS 5668 Hewlett-Packard, Roseville. > cbm@rose.hp.com > > > >
Home Last updated: Fri Nov 30 19:17:48 2001 7960 messages in chronological order |