Unsolicited mode:
R2T is not needed only for the first outgoing
data burst. The subsequent data MUST be solicited.
Solicited mode:
all data outs (including the first data out) MUST
be solicited.
Is this correct?
<karthik>Yes
2) As per section 9.8 and
11.10, for WRITE operations without explicit Initial R2T,
the InitialR2T MUST have negotiated to NO.
<karthik> yes
But
as per 11.12 says that if InitialR2T=yes and ImmediateData=yes,
then Immediate unsolicited data only allowed.
<karthik>
Draft Section 11.2 clearly says
that
"If
ImmediateData is set to Yes and InitialR2t is to Yes(default), then only
immediate data are accepted in the first
burst."
So
it is not ambigous. (The word "immediate data" makes the
difference)
Please refer previous postings in the mailing
list. You can get detailed answers.
Hope this helps
karthik selvan
"tells me that a target, at all times
during a data sequence transfer, can be
one or the other, but not
both (non R2T for the initial data out, R2T for
the
remaining
data). Is this correct?"
really? I thought thatit is permissible to
have non-R2T for the initial data out and R2T
for
remaining. i.e for a 64K transfer, the first
32K can be the first burst size of data
and
the next 32K will be solicited by the target
through R2T. Am I missing
something?
-Deva
yes -
julo
| Dennis Young
<dyoung@rhapsodynetworks.com> Sent by: owner-ips@ece.cmu.edu
06/12/2002 06:20 AM
Please respond to Dennis
Young
|
To: ips@ece.cmu.edu
cc:
Subject:
iscsi: unsolicited data question
|
I have a question which has been asked
before, but I couldn't find a direct
answer in the archive.
The table on page 200 of draft 12 doesn't directly
answer
this question either.
The first paragraph on page 36 of draft
12 says "Targets operate in either
solicitied (R2T) data mode or
unsolicited (non R2T) data mode."
tells me that a target, at all
times during a data sequence transfer, can be
one or the other,
but not both (non R2T for the initial data out, R2T
for
the
remaining data). Is this
correct?
Thanks,
Dennis
---snip from an old email
dated 3/30/2001---
" Hi Julian
Sorry if I'm covering old
ground... Is it possible to use unsolicited data
for the first
burst and then request any remaining data using R2T? For
example,
if the target has a previously allocated buffer available
(length
defined by FirstBurstSize) for unsolicited data, then once
the initiator has
sent unsolicited data up to and including this
amount then the remaining
data (if any) can be requested using R2T
once the target has the buffer
space available.
...Matthew
Burbridge Hewlett Packard, Bristol Telnet: 312 7010
E-mail:
matthewb@bri.hp.com
"