|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] iSCSI Naming and Discovery Requirements DocumentAttached is the iSCSI Naming and Discovery requirements Internet Draft document. This document was produced by the iSCSI naming and discovery team. Kaladhar Voruganti IBM Almaden Research San Jose, CA (See attached file: draft-Voruganti-ips-iscsi-disc-reqts-00.txt)
iSCSI
Mark Bakke
Cisco
Joe Czap
IBM
Jim Hafner
IBM
Howard Hall
Pirus
Jack Harwood
EMC
John Hufferd
IBM
Yaron Klein
Sanrad
Lawrence Lamers
San Valley Systems
Joshua Tseng
Nishan
Kaladhar Voruganti
IBM
iSCSI
INTERNET DRAFT
Expires May 2001
draft-Voruganti-ips-iscsi-disc-reqts-00.txt
<November 2000>
iSCSI Naming and Discovery Requirements
Status of this Memo
This document is an Internet-Draft and is in full conformance with all
provisions of Section 10 of RFC2026 [1].
Internet-Drafts are working documents of the Internet Engineering Task
Force (IETF), its areas, and its working groups. Note that other groups
may also distribute working documents as Internet-Drafts. Internet-Drafts
are draft documents valid for a maximum of six months and may be updated,
replaced, or obsoleted by other documents at any time. It is inappropriate
to use Internet- Drafts as reference material or to cite them other than
as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Comments
Comments should be sent to the ips mailing list (ips@ece.cmu.edu) or to
kaladhar@us.ibm.com
1. Abstract
This document describes the iSCSI [7] naming and discovery requirements.
The requirements presented in this document have been agreed to by the
members of the iSCSI naming and discovery team. The focus of this document
is on iSCSI naming and discovery requirements and not on the details of
the naming and discovery mechanisms. This document complements the iSCSI
IETF draft. Flexibility is the key guiding principle behind this
requirements document. That is, an effort has been made to satisfy the
needs of both small isolated environments, as well as large environments
requiring secure/scalable solutions.
2. Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC-2119 [2].
3. Naming and Discovery Requirements
The following items represent iSCSI naming and discovery requirements:
1) There is a requirement to have the ability to generate world wide
unique identifiers (WWUIs) for both iSCSI initiators and targets. However,
it is not mandatory for the initiators and targets to use WWUIs because a
globally unique identifier might not be required in some simple, isolated
iSCSI configurations. WWUIs are useful because in some cases (e.g. when
DHCP services [6] are used etc), the combination of IP address and port
number [6] cannot uniquely identify an initiator or a target. The format
of the the WWUIs and their generation process is yet to be resolved.
2) An iSCSI initiator needs to be able to identify a target's iSCSI
service delivery port. The iSCSI service delivery port address is made up
of IP address and port number. The default port number is the canonical
iSCSI port. A single iSCSI service delivery port could be serving one or
many targets. If the iSCSI service delivery port is serving a single iSCSI
target, then the service delivery port address is enough to access the
iSCSI target. If the iSCSI target device service delivery port serves
multiple targets then the initiator has the following different options
with respect to how it accesses a particular target:
a) The initiator passes the target WWUI as part of the iSCSI Login
message. The WWUI is resolved to access a specific target.
b) The initiator passes the DNS domain name [1] and a path string in the
iSCSI Login message. A path string is a text string that contains
additional information about the target (e.g., a URL [3]). The exact
format of this string is to be determined. The path string may be used for
additional address resolution of the target, for example, by a transparent
proxy.
These options provide iSCSI with the necessary flexibility to operate with
different types of intermediaries (proxies, gateways,
firewalls [4]).
If the target WWUI supplied in Login does not match or cannot be resolved
by the target, then the Login should be rejected by the target.
3) It is not mandatory for the initiator to fill the initiator WWUI field
in the Login message. The initiator WWUI field can be used for
authentication purposes.
Thus, the iSCSI Login message optionally contains any of the following:
initiator WWUI, target WWUI, DNS domain name, and target path string
fields.
4) The initiator can send the initial iSCSI Login
message to:
a) A canonical, well known iSCSI service delivery port.
b) A non-canonical, iSCSI service delivery port with the same
functionality as in the canonical iSCSI port (no additional restrictions).
5) The initiator may Login to an iSCSI device and request from that device
a list of targets and/or alternate IP addresses:Ports that may be
available in the same device. The returned data SHALL contain a list of
tuples, where each tuple consists of a target WWUI, an IP address:Port and
optionally a Path string.
6) The initiator can get the target address information in the following
different ways:
a) Information is hard-coded at the initiator.
b) Initiator queries name servers.
c) Initiator queries a known service delivery port for a list of targets.
The initiator can access the target using the following:
i) IP name or IP address
+
ii) TCP port number
+
iii) [Target WWUI or (Target WWUI and path)]
Point ii) is implied if a canonical port number is used.
Point iii) is not mandatory.
Now, the initiator can either hard-code the above information, or it can
obtain it from either DNS or storage director servers (like iSNS server
[8]). The storage director is a server which stores discovery data. The
storage director can also potentially store access control, zoning and
other storage management information but this group's current focus is on
storing discovery information.
If the initiators are not hard-coding the address information then they
have to explicitly query the DNS/storage director servers. That is, this
information is not presented to the initiators via upcalls from the DNS or
storage director servers.
7) The information about the targets can be registered at the storage
director in the following different ways:
a) The targets can register this information at the storage director
automatically via upcalls.
b) The target information is registered manually at the storage director.
c) The target information is registered manually in DNS servers.
8) The interaction between the initiators and the storage director/DNS
servers, and between the targets and the storage director/DNS servers can
be either secure or insecure. The details of the secure interaction still
need to be worked out.
4. Outstanding Work Items
The naming and discovery team will be working on the following outstanding
work items:
1) Initiator WWUIs and target WWUIs design. Goal is to try and build upon
existing naming mechanisms [1,5].
2) The "path" format design.
3) Impact of naming and discovery on iSCSI Login command.
4) Details of initiator APIs to interact with the storage director.
5) Details of the target APIs for interacting with the storage director.
6) Core schema design for the storage director.
7) Secure interaction between the storage director and the initiators and
the targets.
5. References
[1] Mockapetris, P., "Domain Names -- Implentation and Specification", RFC
1035, November 1987
[2] Postel, J., "Domain Name System Structure and Delegation", RFC 1591,
March 1994.
[3] Berners-Lee, T., Masinter, L., and McCahill, M., Uniform Resource
Locators (URL), RFC 1738, December 1994.
[4] Freed, N., "Behavior of and Requirements for Internet Firewalls", RFC
2979, October 2000.
[5] ANSI/IEEE Std 802-1990, Name: IEEE Standards for Local and
Metropolitan Area Networks: Overview and Architecture
[6] Kessler, G. and Shepard, S., "A Primer On Internet and TCP/IP Tools
and Utilities", RFC 2151, June 1997.
[7] Satran, J., Sapuntzakis, C., Wakeley, M., Von Stamwitz, P., Haagens,
R., Zeidner, E., Dalle Ore, L., Klein, Y., "iSCSI",
draft-ietf-ips-iscsi-00.txt, November, 2000.
[8] Gibbons, K., Tseng, J. and Monia, C., "iSNS Internet Storage Name
Service", draft-tseng-ips-isns-00.txt, October 2000.
6. Contact Author
Kaladhar Voruganti
650 Harry Road
IBM Almaden Research
San Jose, CA
USA
Email: kaladhar@us.ibm.com
Full Copyright Statement
"Copyright (C) The Internet Society (date). All Rights Reserved. This
document and translations of it may be copied and furnished to others, and
derivative works that comment on or otherwise explain it or assist in its
implmentation may be prepared, copied, published and distributed, in whole
or in part, without restriction of any kind, provided that the above
copyright notice and this paragraph are included on all such copies and
derivative works. However, this document itself may not be modified in any
way, such as by removing the copyright notice or references to the
Internet Society or other Internet organizations, except as needed for the
purpose of developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be followed, or
as required to translate it into languages other than English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an "As
IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE
DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED , INCLUDING BUT NOT LIMITED
TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE"
Expires May 2001
Home Last updated: Tue Sep 04 01:06:22 2001 6315 messages in chronological order |