Secure Registration

  In-Depth iSCSI & SCSI Protocols

 
  iSCSI is a relatively mature technology that changed the way users access their files (storage devices) via standard Ethernet-based local area networks (LANs). iSCSI technology leverages the investment in the industry's dominant Ethernet-based infrastructure and marries it with the proven block-based SCSI command protocol and architecture. The resulting iSCSI protocol dramatically reduces operational overhead when compared to other IP storage options (e.g. NAS) that use standard network protocols (e.g. NFS and CIFS).

Early iSCSI solutions were originally deployed in small to medium sized businesses that required block-based cost-sensitive storage applications. However today's Enterprise class iSCSI storage servers (or application servers) come with high performance CPUs (containing dual/quad-core processors), advanced hardware protocol acceleration (i.e. TOE: TCP/IP offload engine), and 10Gb Ethernet links (with migration to 40GbE and 100GbE). Enterprise class iSCSI solutions provide a reliable high-performance method for backup, recovery and restoration applications for Ethernet-based infrastructures.

This seminar provides a comprehensive examination of the current and future development of iSCSI and SCSI protocols. It explains the plethora of information available and puts it all together; from making connections, to how SCSI commands work; including how to decipher mode & log pages, and sense data (SCSI error information). All the pieces of an iSCSI system are clearly explained including what it takes to integrate iSCSI components into a working system. We also look at the trend of the current iSCSI implementations and examine SCSI & iSCSI analyzer captures of real hardware configurations.

Course  Outline

In-Depth iSCSI and SCSI Protocols
  Course Introduction

Storage Networking Basic Concepts
  Storage Networking Overview DAS, NAS, SAN & CAS
  • Network vs. Storage
  • Basic Storage Networks DAS, NAS, SAN, CAS
  • LAN, MAN, AN, SmAN
  • External & Internal SAN
  • Standards Organizations

  Storage Networking Concepts
  • Circuit Switch vs. Packet Switch
  • Connection-Oriented vs. Connectionless
  • Layered Protocols
  • Flow Control
  • Payload Integrity
  • Names vs. Addresses
  • Segmentation, Convergence & Reassembly
  • Hardware Offload

Ethernet Storage
  Storage Protocol Comparison
  Storage protocols compared against OSI
  Ethernet Standards
  Ethernet Essentials
  Ethernet Frame Format
  • Ethernet frame characteristics
  • Preamble
  • Destination Address and Source Address
  • Data
  • Frame Check Sequence (FCS)
  • EtherType
  • Reserved Ethernet Group MAC Addresses
  Ethernet Topologies
  • Shared-Medium Topology
  • Ethernet Switched Topology
  Ethernet Jumbo Frames
  • Baby giant frames
  • Super jumbo frames
  Ethernet Switch Learning
  • Spanning Tree Protocol (STP)
  Virtual LANs (VLANs)
  • VLAN Tagging
  • How is a VLAN Identified?
  • Why Use VLANs?
  • Types of VLAN
  • VLAN Modes
  • VLAN Configurations
  Making Ethernet "Lossless"
  • Frame Loss and Ethernet Flow Control
  • Pause Frame Format
  • Priority-based Flow Control: IEEE 802.1Qbb
  • Congestion Notification: IEEE 802.1Qau
  • Link Aggregation (NIC Teaming)
  Bridges
  Routers: Logical Segmentation
  Ethernet Link Initialization
  Ethernet Physical Link Variants
  Ethernet Transceivers
  Data Center Bridging Exchange Protocol
IP Layer
  Dotted Address Notation
  IPv4 Address Classes
  Private Network Addresses
  IP Header
  • Version Field
  • IP Header Length (IHL) Field
  • Type of Service (TOS) Field
  • Total Length Field
  • Identification Field
  • Flags
  • IPv6 Header descriptions
IP Datagram Fragmentation
Internet Control Message Protocol (ICMP)
TCP Operation
  TCP Ports and IP Addresses
  TCP Segment Header
  TCP Options
  Connections and Connection Management
  Connection Established/Termination
  TCP Flow Control
  TCP Error Detection and Retransmission
  Retransmission Timeout (RTO)
  TCP/IP Performance Considerations
  TCP Window Size Considerations
  Data Compression

SCSI Protocol
  iSCSI & SCSI Storage Protocol
  • SCSI Standards
  • SCSI Architecture
  • Initiator, Target, LUN
  • Commands, Data, Status
  • Task Management
  • Sense, Autosense, Contingent Allegiance Condition CAC
  • Error Recovery
  • Muli-Segment Transfer
  • Mode and Log Pages
  Mapping to iSCSI


iSCSI Protocol
  iSCSI Protocol Overview
  • Terms
  • iSCSI Headers
  • iSCSI Mapping
  • iSCSI Phase Collapse
  • iSCSI Structure
  • TCP/IP Advantages
  • iSCSI Security Overview
  • iSCSI Boot and Relocation
  • iSCSI Sessions and Conections
  • iSCSI Operations

  iSCSI Names & Addresses
  • iSCSI Entity Model
    o Name and Address Terms
  • iSCSI Names
    o iQN, EUI, NAA
    o Alias
  • iSCSI IP Address and TCP Port Numbers
  iSCSI Discovery & Configuration
  • iSCSI Discovery Goals and Requirements
  • iSCSI Discovery Methods
  • Send Targets Command
  • SLP, iSNS
  • Discovery Domains
  • iSNS Query and Registration
  • iSNS Example

  iSCSI Login & Session Establishment
  • iSCSI Login Process
    o Login Negotiation and Phases
    o Login Authentication
    o Login Transitions
    o Login Security
  • Discovery vs. Full Feature Phase
  • Connection and Session Reinstatement
  • Login Example

  iSCSI Operations
  • Connect and Login
  • Full Feature Phase
  • Session Termination
  • Data Flow
  • Read and Write
  • iSCSI Commands and iSCSI Messages
  • Delivery Ordering
  • iSCSI Numbering - Command, Data, Status
  • Sessions Tag and the Nexus ITLQ
  • Data Stream Marking

  iSCSI Security
  • iSCSI Security Considerations
  • iSCSI Security Mechanisms
  • IPSec

  iSCSI Error Detection & Recovery
  • Error Handling
  • Recovery Classes
  • Error Types

iSCSI PDU Formats & Keys
  iSCSI PDU Formats
  • PDU Formats
  • Login & Logout Command & Response
  • NOP-Out & NOP-In
  • SCSI Command, Data-in, Data-out, Response
  • SCSI Task Management Command & Response
  • Ready To Transfer (R2T), SNACK Request
  • Text Command & Response
  iSCSI Keys
  • iSCSI Security and Integrity Keys
  • Login/Text Operational Keys
  • Authentication
    o SPKM, Kerberos, CHAP, Secure Remote Password

iSCSI and RDMA
  iSCSI Extension for RDMA (iSER)
  • Storage Networking Today
  • What is Remote Direct Memory Access (RDMA)?
  • DMA vs. RDMA
  • iSCSI Extensions for RDMA (iSER)

  IP Storage & iSCSI Resources
  • Standards
  • IETF and IPS
  • Web sites
  • Books

  iSCSI Performance: Technical
  • NAS vs. iSCSI
  • Storage vs. Network Bandwidth History
  • Performance Considerations
  • Fibre Channel, iSCSI/TCP/IP/Ethernet Detail Comparisons
  • Performance Myths
  • Disks Matter Most
  • Bandwidth does not equal Speed


Who Should Attend: This seminar is targeted towards developers, integrators, managers, marketing personnel, technical writers and others with a need for an understanding of storage area networks as implemented using iSCSI technology. The third day is of special interest to developers and integrators that may be required to perform system analysis.
Prerequisites: An understanding of current computer interfaces or networks is useful, but not absolutely necessary.
 
Course Length:

Onsite workshop: 3 full days, usually 9:00–17:00 local time.
Online workshop: 5 days, 4 hours per day, usually 09:00 – 13:00 Pacific Time.
 

 

Last Update: 10.14.2016 17:15 PDT