亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3347.txt

?? 一個學習iSCSI協議的文檔
?? TXT
?? 第 1 頁 / 共 4 頁
字號:





Network Working Group                                         M. Krueger
Request for Comments: 3347                                    R. Haagens
Category: Informational                      Hewlett-Packard Corporation
                                                          C. Sapuntzakis
                                                                Stanford
                                                                M. Bakke
                                                           Cisco Systems
                                                               July 2002


  Small Computer Systems Interface protocol over the Internet (iSCSI)
                Requirements and Design Considerations

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2002).  All Rights Reserved.

Abstract

   This document specifies the requirements iSCSI and its related
   infrastructure should satisfy and the design considerations guiding
   the iSCSI protocol development efforts.  In the interest of timely
   adoption of the iSCSI protocol, the IPS group has chosen to focus the
   first version of the protocol to work with the existing SCSI
   architecture and commands, and the existing TCP/IP transport layer.
   Both these protocols are widely-deployed and well-understood.  The
   thought is that using these mature protocols will entail a minimum of
   new invention, the most rapid possible adoption, and the greatest
   compatibility with Internet architecture, protocols, and equipment.

Conventions used in this document

   This document describes the requirements for a protocol design, but
   does not define a protocol standard.  Nevertheless, the key words
   "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
   "SHOULD NOT", "RECOMMENDED",  "MAY", and "OPTIONAL" in this document
   are to be interpreted as described in RFC-2119 [2].








Krueger, et al.              Informational                      [Page 1]

RFC 3347      iSCSI Requirements and Design Considerations     July 2002


Table of Contents

   1.   Introduction.................................................2
   2.   Summary of Requirements......................................3
   3.   iSCSI Design Considerations..................................7
   3.1. General Discussion...........................................7
   3.2. Performance/Cost.............................................9
   3.3. Framing.....................................................11
   3.4. High bandwidth, bandwidth aggregation.......................13
   4.   Ease of implementation/complexity of protocol...............14
   5.   Reliability and Availability................................15
   5.1. Detection of Data Corruption................................15
   5.2. Recovery....................................................15
   6.   Interoperability............................................16
   6.1. Internet infrastructure.....................................16
   6.2. SCSI........................................................16
   7.   Security Considerations.....................................18
   7.1. Extensible Security.........................................18
   7.2. Authentication..............................................18
   7.3. Data Integrity..............................................19
   7.4. Data Confidentiality........................................19
   8.   Management..................................................19
   8.1. Naming......................................................20
   8.2. Discovery...................................................21
   9.   Internet Accessibility......................................21
   9.1. Denial of Service...........................................21
   9.2. NATs, Firewalls and Proxy servers...........................22
   9.3. Congestion Control and Transport Selection..................22
   10.  Definitions.................................................22
   11.  References..................................................23
   12.  Acknowledgements............................................24
   13.  Author's Addresses..........................................25
   14.  Full Copyright Statement....................................26

1. Introduction

   The IP Storage Working group is chartered with developing
   comprehensive technology to transport block storage data over IP
   protocols.  This effort includes a protocol to transport the Small
   Computer Systems Interface (SCSI) protocol over the Internet (iSCSI).
   The initial version of the iSCSI protocol will define a mapping of
   SCSI transport protocol over TCP/IP so that SCSI storage controllers
   (principally disk and tape arrays and libraries) can be attached to
   IP networks, notably Gigabit Ethernet (GbE) and 10 Gigabit Ethernet
   (10 GbE).






Krueger, et al.              Informational                      [Page 2]

RFC 3347      iSCSI Requirements and Design Considerations     July 2002


   The iSCSI protocol is a mapping of SCSI to TCP, and constitutes a
   "SCSI transport" as defined by the ANSI T10 document SCSI SAM-2
   document [SAM2, p. 3, "Transport Protocols"].

2. Summary of Requirements

   The iSCSI standard:

   From section 3.2 Performance/Cost:

      MUST allow implementations to equal or improve on the current
      state of the art for SCSI interconnects.

      MUST enable cost competitive implementations.

      SHOULD minimize control overhead to enable low delay
      communications.

      MUST provide high bandwidth and bandwidth aggregation.

      MUST have low host CPU utilizations, equal to or better than
      current technology.

      MUST be possible to build I/O adapters that handle the entire SCSI
      task.

      SHOULD permit direct data placement architectures.

      MUST NOT impose complex operations on host software.

      MUST provide for full utilization of available link bandwidth.

      MUST allow an implementation to exploit parallelism (multiple
      connections) at the device interfaces and within the interconnect
      fabric.

   From section 3.4 High Bandwidth/Bandwidth Aggregation:

      MUST operate over a single TCP connection.

      SHOULD support 'connection binding', and it MUST be optional to
      implement.

   From section 4 Ease of Implementation/Complexity of Protocol:

      SHOULD keep the protocol simple.

      SHOULD minimize optional features.



Krueger, et al.              Informational                      [Page 3]

RFC 3347      iSCSI Requirements and Design Considerations     July 2002


      MUST specify feature negotiation at session establishment (login).

      MUST operate correctly when no optional features are negotiated as
      well as when individual option negotions are unsuccessful.

   From section 5.1 Detection of Data Corruption:

      MUST support a data integrity check format for use in digest
      generation.

      MAY use separate digest for data and headers.

      iSCSI header format SHOULD be extensible to include other data
      integrity digest calculation methods.

   From section 5.2 Recovery:

      MUST specify mechanisms to recover in a timely fashion from
      failures on the initiator, target, or connecting infrastructure.

      MUST specify recovery methods for non-idempotent requests.

      SHOULD take into account fail-over schemes for mirrored targets or
      highly available storage configurations.

      SHOULD provide a method for sessions to be gracefully terminated
      and restarted that can be initiated by either the initiator or
      target.

   From section 6 Interoperability:

      iSCSI protocol document MUST be clear and unambiguous.

   From section 6.1 Internet Infrastructure:

      MUST:
      -- be compatible with both IPv4 and IPv6
      -- use TCP connections conservatively, keeping in mind there may
         be many other users of TCP on a given machine.

      MUST NOT require changes to existing Internet protocols.

      SHOULD minimize required changes to existing TCP/IP
      implementations.

      MUST be designed to allow future substitution of SCTP (for TCP) as
      an IP transport protocol with minimal changes to iSCSI protocol
      operation, protocol data unit (PDU) structures and formats.



Krueger, et al.              Informational                      [Page 4]

RFC 3347      iSCSI Requirements and Design Considerations     July 2002


   From section 6.2 SCSI:

      Any feature SAM2 requires in a valid transport mapping MUST be
      specified by iSCSI.

      MUST specify strictly ordered delivery of SCSI commands over an
      iSCSI session between an initiator/target pair.

      The command ordering mechanism SHOULD seek to minimize the amount
      of communication necessary across multiple adapters doing
      transport off-load.

      MUST specify for each feature whether it is OPTIONAL, RECOMMENDED
      or REQUIRED to implement and/or use.

      MUST NOT require changes to the SCSI-3 command sets and SCSI
      client code except except where SCSI specifications point to
      "transport dependent" fields and behavior.

      SHOULD track changes to SCSI and the SCSI Architecture Model.

      MUST be capable of supporting all SCSI-3 command sets and device
      types.

      SHOULD support ACA implementation.

      MUST allow for the construction of gateways to other SCSI
      transports

      MUST reliably transport SCSI commands from the initiator to the
      target.

      MUST correctly deal with iSCSI packet drop, duplication,
      corruption, stale packets, and re-ordering.

   From section 7.1 Extensible Security:

      SHOULD require minimal configuration and overhead in the insecure
      operation.

      MUST provide for strong authentication when increased security is
      required.

      SHOULD allow integration of new security mechanisms without
      breaking backwards compatible operation.






Krueger, et al.              Informational                      [Page 5]

RFC 3347      iSCSI Requirements and Design Considerations     July 2002


   From section 7.2 Authentication:

      MAY support various levels of authentication security.

      MUST support private authenticated login.

      iSCSI authenticated login MUST be resilient against attacks.

      MUST support data origin authentication of its communications;
      data origin authentication MAY be optional to use.

   From section 7.3 Data Integrity:

      SHOULD NOT preclude use of additional data integrity protection
      protocols (IPSec, TLS).

   From section 7.4 Data Confidentiality:

      MUST provide for the use of a data encryption protocol such as TLS
      or IPsec ESP to provide data confidentiality between iSCSI
      endpoints

   From section 8 Management:

      SHOULD be manageable using standard IP-based management protocols.

      iSCSI protocol document MUST NOT define the management
      architecture for iSCSI, or make explicit references to management
      objects such as MIB variables.

   From section 8.1 Naming:

      MUST support the naming architecture of SAM-2. The means by which
      an iSCSI resource is located MUST use or extend existing Internet
      standard resource location methods.

      MUST provide a means of identifying iSCSI targets by a unique
      identifier that is independent of the path on which it is found.

      The format for the iSCSI names MUST use existing naming
      authorities.

      An iSCSI name SHOULD be a human readable string in an
      international character set encoding.

      Standard Internet lookup services SHOULD be used to resolve iSCSI
      names.




Krueger, et al.              Informational                      [Page 6]

RFC 3347      iSCSI Requirements and Design Considerations     July 2002


      SHOULD deal with the complications of the new SCSI security
      architecture.

      iSCSI naming architecture MUST address support of SCSI 3rd party
      operations such as EXTENDED COPY.

   From section 8.2 Discovery:

      MUST have no impact on the use of current IP network discovery
      techniques.

      MUST provide some means of determining whether an iSCSI service is
      available through an IP address.

      SCSI protocol-dependent techniques SHOULD be used for further
      discovery beyond the iSCSI layer.

      MUST provide a method of discovering, given an IP end point on its
      well-known port, the list of SCSI targets available to the
      requestor.  The use of this discovery service MUST be optional.

   From section 9 Internet Accessability.

      SHOULD be scrutinized for denial of service issues and they should

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品2024| 亚洲影视在线播放| 日韩欧美国产系列| 欧美喷潮久久久xxxxx| 欧美性猛交一区二区三区精品| 一本到不卡精品视频在线观看| 95精品视频在线| 成+人+亚洲+综合天堂| 91亚洲国产成人精品一区二区三| 97精品久久久午夜一区二区三区 | 亚洲乱码国产乱码精品精小说 | 日本视频免费一区| 亚洲国产精品av| 久久蜜桃av一区精品变态类天堂| 久久综合色鬼综合色| 中文字幕不卡三区| 亚洲男人的天堂av| 亚洲成人av免费| 麻豆高清免费国产一区| 国产99一区视频免费 | 国产农村妇女精品| 国产精品夫妻自拍| 亚洲在线成人精品| 日av在线不卡| 国产宾馆实践打屁股91| 91免费在线看| 欧美丰满嫩嫩电影| 久久精品一区二区三区四区| 亚洲欧洲日产国产综合网| 亚洲综合小说图片| 久久精品国产免费| aaa国产一区| 欧美精品18+| 国产午夜精品久久久久久免费视 | 91麻豆福利精品推荐| 精品视频一区二区不卡| 精品sm在线观看| 中文字幕日本乱码精品影院| 午夜免费久久看| 国产精品一区二区久激情瑜伽 | 7777精品伊人久久久大香线蕉的| 欧美电影精品一区二区| 最新成人av在线| 日韩av在线发布| 99久久精品情趣| 91精品欧美一区二区三区综合在| 综合欧美一区二区三区| 亚洲欧美国产高清| 精品一区免费av| aa级大片欧美| 精品国产一区a| 亚洲精品自拍动漫在线| 久久成人免费电影| 日本高清不卡一区| 久久久青草青青国产亚洲免观| 一区二区国产视频| 国产精品亚洲午夜一区二区三区 | 国产99久久久久久免费看农村| 欧美性猛交一区二区三区精品| 国产午夜精品久久久久久免费视| 亚洲国产日韩一级| 成年人国产精品| 精品三级av在线| 亚洲另类一区二区| 懂色av一区二区在线播放| 717成人午夜免费福利电影| 亚洲视频狠狠干| 国内不卡的二区三区中文字幕| 欧美婷婷六月丁香综合色| 久久久国产精华| 免费成人深夜小野草| 欧美图片一区二区三区| 一区精品在线播放| 国产一二精品视频| 日韩欧美综合一区| 午夜精品一区二区三区免费视频| 99久久国产综合精品色伊| 久久久久久久久久美女| 欧美aaa在线| 91精品国产综合久久香蕉的特点 | 粉嫩av一区二区三区粉嫩| 精品久久五月天| 蜜臀av一区二区在线免费观看| 欧美日韩免费观看一区三区| 一区二区三区中文字幕精品精品| av高清久久久| 中文字幕一区二区三区乱码在线| 国产精品99久久久久久久vr| 欧美一区二区国产| 日本成人中文字幕| 91精品蜜臀在线一区尤物| 日韩制服丝袜先锋影音| 欧美视频在线播放| 亚洲一区二区三区四区五区中文| 91在线高清观看| 国产精品超碰97尤物18| 99久久99久久综合| 亚洲视频一区在线| 91麻豆自制传媒国产之光| ...av二区三区久久精品| 国产98色在线|日韩| 国产日韩欧美综合在线| 国产在线精品国自产拍免费| 精品国产乱码久久久久久浪潮| 麻豆91小视频| 久久久久久毛片| 国产精品99久久久久久有的能看| 日本一区二区三区在线不卡| 国产sm精品调教视频网站| 国产午夜精品久久久久久免费视 | 国产欧美日韩在线观看| 国产一区二区福利视频| 欧美国产激情一区二区三区蜜月| 成人av先锋影音| 亚洲另类春色校园小说| 在线精品亚洲一区二区不卡| 午夜电影久久久| 欧美一区二区三区人| 精品亚洲成a人| 国产色爱av资源综合区| 97se亚洲国产综合在线| 亚洲成人先锋电影| 欧美变态tickling挠脚心| 国产91精品一区二区麻豆亚洲| 欧美国产精品专区| 日本韩国欧美三级| 日本不卡视频在线| 国产婷婷色一区二区三区| a美女胸又www黄视频久久| 一区二区三区在线不卡| 日韩欧美一区二区不卡| 懂色av一区二区三区免费看| ●精品国产综合乱码久久久久| 欧美日韩一区不卡| 国产91丝袜在线播放九色| 欧美岛国在线观看| 国产精品 欧美精品| 综合网在线视频| 7777精品伊人久久久大香线蕉超级流畅| 久久成人免费网| 亚洲欧洲国产日本综合| 在线播放/欧美激情| 国产一区二区三区久久悠悠色av| 亚洲日本韩国一区| 91精品国产综合久久香蕉麻豆| 国产夫妻精品视频| 亚洲综合在线免费观看| 欧美成人伊人久久综合网| k8久久久一区二区三区 | 久久国产精品无码网站| 中文字幕第一区第二区| 欧美伦理电影网| 国产91露脸合集magnet| 五月天久久比比资源色| 国产三级一区二区三区| 88在线观看91蜜桃国自产| 成人美女视频在线观看18| 爽爽淫人综合网网站| 欧美国产禁国产网站cc| 7777精品久久久大香线蕉| 成人91在线观看| 另类人妖一区二区av| 一区二区三区不卡在线观看| 久久美女艺术照精彩视频福利播放 | 国产三级一区二区三区| 色婷婷综合久久| 久久福利资源站| 亚洲高清中文字幕| 国产精品视频在线看| 这里是久久伊人| 在线免费精品视频| 国产99久久久精品| 捆绑变态av一区二区三区| 夜夜嗨av一区二区三区中文字幕| 久久久久久久精| 日韩美女在线视频| 欧美午夜精品理论片a级按摩| 不卡的电视剧免费网站有什么| 久久不见久久见免费视频1| 午夜精品久久久久久久| 亚洲精品国产第一综合99久久 | 亚洲福利视频导航| 综合欧美亚洲日本| 国产精品欧美久久久久无广告 | 另类综合日韩欧美亚洲| 亚洲成人自拍偷拍| 亚洲品质自拍视频| 中文字幕一区二区三区乱码在线| 国产亚洲一本大道中文在线| 日韩欧美一区二区不卡| 欧美精品一二三| 精品视频免费在线| 在线看不卡av| 欧洲在线/亚洲| 色视频欧美一区二区三区| 91婷婷韩国欧美一区二区| 成人午夜视频在线| 国产成人a级片| 国产乱色国产精品免费视频| 精品夜夜嗨av一区二区三区|