|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] iSCSI: using the C bitI want to be sure I understand the use of the C bit in a login. It seems to me that the initiator could split a key into two parts: 1st part at the end of request A and 2nd part at the beginning of request A+1. e.g., the end of request A (with C bit set) could be "Immediate" and the beginning of request A+1 could be "Data=yes" (the full key=value pair being "ImmediateData=yes"). If this is done, the target will not process the partial key and may send his own key saying "ImmediateData=no". But, the initiator has already constructed the negotiation and request A+1 would violate the protocol because ImmediateData has already been negotiated. Comments? Eddy mailto: Eddy_Quicksall@iVivity.com
Home Last updated: Thu Jan 16 21:19:01 2003 12204 messages in chronological order |