iSCSI Workflow Target and initiator

Source: Internet
Author: User

With the exponential growth of enterprise-class data, the traditional centralized storage scheme cannot meet its storage requirements, so the storage area network (storage region Network,san) technology is widely used, but its existence is short, the price is expensive and the construction is complex. IP storage technology based on iSCSI protocol is an emerging network storage technology, which integrates IP network technology into storage I/O, and has the incomparable advantage of other data access protocols in constructing heterogeneous storage network.

The use of iSCSI protocol to build a storage network, with low, open, large capacity, compatibility and so on, and its main disadvantage is that the storage and network use the same physical interface, followed by the need to frequently encapsulate SCSI commands in the IP packet and from the IP packet to resolve the SCSI command, All of them will increase the burden of network bandwidth and processor, and affect the response speed of the system, thus restricting the development of ISCSL technology.

The typical I/O process for accessing an iSCSI target device is:

① when a user makes an access request to a Iscsitarget device, the application accesses the file system through a system call:

The ② file system interprets this I/O command, analyzes the device and address where the I/O command resides, and then sends the request to the SCSI upper layer driver:

③SCSI the upper-level driver converts the appropriate I/O command to a SCSI command and sends it to the iSCSI initiator;

④ISCSI Initiator encapsulates the SCSI command package and sends it over the network to the ISCSI target module;

⑤ISCSL the target module receives the iSCSI command Pack, the SCSI command in the iSCSI command Pack is sent to the SCSI underlying driver;

The ⑥ completes the I/O request by the SCSI underlying driver and returns the data to the user at the original path.

As an example of iSCSI read operations, the specific process is:

① send iSCSI commands;

② cache scheduling;

③ reading data;

④ data encapsulation using the iSCSI protocol;

The ⑤ transmits the data encapsulated by the iSCSI protocol.

iSCSI Workflow Target and initiator

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.