1.

What Is Iscsi Architecture?

Answer»

The server can be implemented both programmatically and hardware. The software implementation receives requests over the network, processes them, reads (writes) the necessary data to the media, and returns the information (result) back over the network. Since these operations take a significant amount of CPU time for high-intensity requests, iSCSI HBAs (adapters) have been created that combine an Ethernet network card and a SCSI controller.

iSCSI works at the block level. The object to which access is granted is the data area interpreted by the initiator as a block device (disk). Access is exclusive (with the exception of specially designed FILE systems and file systems in read-only mode). The RESPONSIBILITY to create and maintain the file system rests with the initiator; the server (target, target) only serves low-level queries, similar to the requests that the disk driver serves when working with local disks.

For addressing over the network, both the client and the server have their own addresses, which must be UNIQUE.

Detection TECHNOLOGY (discovery, auto-discovery) is used to discover the list of AVAILABLE devices on the iSCSI target (server). It is a service that listens on the tcp port (usually 3260) client requests and gives them a list of available targets. This service is called a portal (English portal).

In addition to portals, iSNS (Internet storage name service) can also be used to find available targets.

The server can be implemented both programmatically and hardware. The software implementation receives requests over the network, processes them, reads (writes) the necessary data to the media, and returns the information (result) back over the network. Since these operations take a significant amount of CPU time for high-intensity requests, iSCSI HBAs (adapters) have been created that combine an Ethernet network card and a SCSI controller.

iSCSI works at the block level. The object to which access is granted is the data area interpreted by the initiator as a block device (disk). Access is exclusive (with the exception of specially designed file systems and file systems in read-only mode). The responsibility to create and maintain the file system rests with the initiator; the server (target, target) only serves low-level queries, similar to the requests that the disk driver serves when working with local disks.

For addressing over the network, both the client and the server have their own addresses, which must be unique.

Detection technology (discovery, auto-discovery) is used to discover the list of available devices on the iSCSI target (server). It is a service that listens on the tcp port (usually 3260) client requests and gives them a list of available targets. This service is called a portal (English portal).

In addition to portals, iSNS (Internet storage name service) can also be used to find available targets.



Discussion

No Comment Found