Unsolicited mode:
R2T
is not needed only for the first outgoing data burst. The subsequent data MUST
be solicited.
Solicited mode:
all
data outs (including the first data out) MUST be solicited.
Is this correct?
<karthik>Yes
2) As per section 9.8 and 11.10, for
WRITE operations without explicit Initial R2T, the InitialR2T MUST
have negotiated to NO.
<karthik>
yes
But as per 11.12 says that
if InitialR2T=yes and ImmediateData=yes, then Immediate unsolicited
data only allowed.
<karthik> Draft Section 11.2
clearly says that
"If ImmediateData is set to Yes and
InitialR2t is to Yes(default), then only immediate data are accepted in the
first burst."
So it is
not ambigous. (The word
"immediate data" makes the difference)
Please refer previous postings in the mailing list.
You can get detailed answers.
Hope
this helps
karthik selvan
"tells me that a target, at all times during
a data sequence transfer, can be
one or the other, but not both (non
R2T for the initial data out, R2T for
the
remaining data). Is
this correct?"
really? I thought thatit is permissible to
have non-R2T for the initial data out and R2T
for
remaining. i.e for a 64K transfer, the first 32K
can be the first burst size of data
and
the
next 32K will be solicited by the target through R2T. Am I missing
something?
-Deva
yes -
julo
| Dennis Young
<dyoung@rhapsodynetworks.com> Sent by: owner-ips@ece.cmu.edu
06/12/2002 06:20 AM Please respond to Dennis Young
|
To: ips@ece.cmu.edu cc:
Subject: iscsi: unsolicited
data question
|
I have a question which has been asked before,
but I couldn't find a direct
answer in the archive. The table on
page 200 of draft 12 doesn't directly
answer this question
either.
The first paragraph on page 36 of draft 12 says "Targets
operate in either
solicitied (R2T) data mode or unsolicited (non R2T)
data mode."
tells me that a target, at all times during a data sequence
transfer, can be
one or the other, but not both (non R2T for the
initial data out, R2T for
the
remaining data). Is this
correct?
Thanks,
Dennis
---snip from an old email dated
3/30/2001---
" Hi Julian
Sorry if I'm covering old ground... Is
it possible to use unsolicited data
for the first burst and then
request any remaining data using R2T? For
example, if the target has a
previously allocated buffer available (length
defined by
FirstBurstSize) for unsolicited data, then once the initiator has
sent
unsolicited data up to and including this amount then the
remaining
data (if any) can be requested using R2T once the target has
the buffer
space available.
...Matthew Burbridge Hewlett Packard,
Bristol Telnet: 312 7010 E-mail:
matthewb@bri.hp.com
"