右手中指指尖麻木是什么原因| 叶公好龙是什么故事| 扁桃体发炎咳嗽吃什么药效果好| 白油是什么| 低烧是什么原因| 口扫是什么| 汗味酸臭是什么原因| 黄水晶五行属什么| hpv59高危阳性是什么意思| 飞鱼籽是什么鱼的籽| 心肌酶是查什么的| 刀子嘴豆腐心什么意思| 寒风吹起细雨迷离是什么歌| 蛆是什么| 内热是什么原因引起的怎么调理| 哈密瓜为什么会苦| 脖子淋巴结挂什么科| 9月16日是什么星座| 头发掉要用什么洗发水| 什么样的女人最旺夫| 冰箱为什么结冰| 鱼油不适合什么人吃| cmr医学中什么意思| 濡养是什么意思| 绿色裤子配什么上衣| 尿胆原阴性是什么意思| 吃什么美容养颜抗衰老| 装修都包括什么| 心里烦躁是什么原因| 自愈什么意思| 见多识广什么意思| 修心是什么意思| 三焦是什么器官| 文书是什么| 九五至尊是什么生肖| 脂肪是什么| 杏仁有什么功效和作用| 禄蠹是什么意思| imei是什么意思| 鹰击长空是什么意思| 下巴两边长痘痘是什么原因| 自欺欺人是什么意思| 糟卤是什么| 6月25是什么星座| 鼻子毛白了是什么原因| 九曲红梅是什么茶| 肌腱炎有什么症状| 脱头发严重是什么原因引起的| 下头是什么意思| 善茬是什么意思| 毛的部首是什么| 4pcs是什么意思| 子宫出血是什么原因造成的| 秀米是什么| 血脂稠吃什么药最好| 地雷是什么意思| 腹泻是什么意思| 咖啡有什么好处和坏处| 观音殿求什么| 脾大是什么原因造成的怎么治疗| 人怕出名猪怕壮是什么生肖| 花干是什么做的| 梦见一个人死了是什么意思| 三部曲是什么意思| 后背出汗是什么原因| 什么是海藻糖| 苟且是什么意思| 齁甜是什么意思| 心绞痛吃什么药缓解最快| 全虫是什么中药| 什么叫打飞机| 高血压突然变成低血压是什么原因| 什么是熬夜| 右脸突然肿了是什么原因| 冒冷汗是什么原因| cps是什么| 海鲜中毒有什么反应| 恐龙为什么叫恐龙| 11月7号是什么星座| ca登录是什么意思| 谋杀是什么意思| 胆汁反流性胃炎吃什么药| 长痣是什么原因| 妈妈的表哥叫什么| 北加田加共是什么字| package什么意思| 西游记是一部什么小说| 人参和什么泡酒壮阳| 人为什么打嗝| sephora是什么牌子| 脖子黑是什么病| 什么是岩茶| 备孕需要做什么准备| 黄绿色痰液是什么感染| 路痴是什么原因造成的| 立本是什么意思| 温暖的近义词是什么| 血糖高有什么危害| 蚕豆病是什么| 什么食物胶原蛋白含量高| 桃胶是什么东西| 六月二号是什么星座| 武则天代表什么生肖| 什么颜色显黑| 为什么突然有狐臭了| 皮肤过敏用什么药最好| 胆毒是什么原因引起的| 什么东西护肝养肝| 吃恩替卡韦有什么副作用| 下眼皮跳是什么原因| 经常腹痛什么原因| 青云志是什么意思| 逆流而上是什么意思| 子宫肌瘤有什么危害| u型枕有什么作用| 为什么胸闷一吃丹参滴丸就好| 11月20日什么星座| 凉瓜是什么瓜| 掰手指头响有什么危害| 牙龈发黑是什么原因| 老是拉肚子什么原因| 刘禹锡是什么朝代的| 一条线是什么意思| 肚子胀胀的是什么原因| 粉皮是什么做的| 黄瓜含有什么营养成分| 舌苔白什么原因| 苏木是什么意思| 豆汁是什么味道| 宦游人是什么意思| 凝血四项是检查什么的| 目赤什么意思| 孩子生化了是什么意思| 金鱼藻属于什么植物| 血压高压高低压正常是什么原因| 路政属于什么单位| 0l是什么意思| 黑脸娃娃有什么功效| 号是什么| mn是什么单位| 核糖体由什么组成| 年抛是什么意思| 肠脂膜炎是什么病严重吗| 漏斗胸是什么原因造成的| 乏了是什么意思| 膈肌痉挛吃什么药| 怀孕两个星期有什么反应| 吃完饭恶心想吐是什么原因| 新生儿前面头发稀少是什么原因| 脚痒脱皮是什么原因| winbond是什么品牌| 早餐吃什么最有营养又减肥| 处女座的幸运数字是什么| 烂舌头是什么原因| 复方氨酚烷胺片是什么药| 兵马未动粮草先行是什么意思| 甘油三酯高吃什么药好| 属鼠是什么命| 两岁宝宝拉肚子吃什么药| 8月14日是什么星座| 兰若是什么意思| 抬头头晕是什么原因| 脸部填充用什么填充最好| 高铁为什么没有e| 拔罐痒是什么原因| 眼白有点黄是什么原因| 天津是什么省| 大三阳是什么病| vibe什么意思| 四肢无力吃什么药| 什么是适度水解奶粉| 人为什么怕死| adp是什么意思| 波尔多红是什么颜色| 中之人什么意思| 西腾手表属于什么档次| 码农是什么意思| 3月25号是什么星座| 中山大学是什么级别| 吃皮蛋不能和什么一起吃| 1997年属牛的是什么命| 朝鲜面是什么原料做的| 生吃大蒜有什么好处和坏处| 卵巢囊肿是什么意思| 诺如病毒吃什么药最有效| 王八和乌龟有什么区别| 怎么知道自己适合什么发型| 胃ct能检查出什么病| 水什么| 巨人观什么意思| 口腔溃疡为什么那么痛| 1946年属狗的是什么命| 免疫肝是什么病| 鸡蛋壳属于什么垃圾| 嗜血综合症是什么病| 用什么锅炒菜对人体健康更有益| 什么人不洗澡| 宫颈糜烂有什么症状和现象| prp是什么意思| hfp是什么意思| 癸未日五行属什么| 参军意愿选什么比较好| 阿飘是什么意思| 北京为什么是首都| 女性尿血挂什么科| 西瓜都有什么品种| 爸爸的爸爸叫什么| 24号来月经什么时候是排卵期| 月经来了不走是什么原因| 明目退翳是什么意思| 白蛋白低有什么症状| 花名册是什么意思| 漏是什么意思| 江西景德镇有什么好玩的地方| shiraz是什么名字红酒| 什么牌子的空调最好| 贞操锁是什么| 带刺的玫瑰是什么意思| 口干舌燥吃点什么药| 葡萄像什么| 璎珞是什么意思| 成都有什么特产| 大队书记是什么级别| 积分落户是什么意思| 北京有什么特产| 电焊打眼睛用什么眼药水| 蒙古族信仰什么教| 卑职是什么意思| 什么时候减肥效果最快最好| 大脑缺氧有什么症状| 添丁是什么意思| 容易长口腔溃疡是什么原因| 遥望是什么意思| 机械表是什么意思| 金国是什么民族| 太平天国失败的根本原因是什么| 人体缺钾是什么原因引起的| 吸渣体质是什么意思| 卧轨是什么意思| po医学上是什么意思| 米放什么不生虫子| 40min是什么意思| 农历4月14日是什么星座| 黑曜石五行属什么| 邦字五行属什么| 脚趾缝痒用什么药| 近亲是什么意思| 周角是什么| 什么是天丝面料| 狗吐了是什么原因| buffalo是什么牌子| 什么是负氧离子| cache是什么意思| 阑尾粪石是什么| 化疗和放疗什么区别| 为什么叫中国| 伛偻是什么意思| 降血脂吃什么| 兰台是什么意思| 生眼屎是什么原因引起的| 肚子有虫吃什么药| 臭鳜鱼是什么菜系| 什么是ppi| 女生为什么会来月经| 百度

生姜吃多了有什么害处

百度 评选活动开展以来,已树立了一大批积极参与上海文明交通建设,严格遵守道交条例,坚持文明出行,用自身行动推动城市精神文明建设的先进典范。

Internet Small Computer Systems Interface (iSCSI; /a??sk?zi/ ? eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data storage facilities. iSCSI provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network. iSCSI facilitates data transfers over intranets and to manage storage over long distances. It can be used to transmit data over local area networks (LANs), wide area networks (WANs), or the Internet and can enable location-independent data storage and retrieval.

The protocol allows clients (called initiators) to send SCSI commands (CDBs) to storage devices (targets) on remote servers. It is a storage area network (SAN) protocol, allowing organizations to consolidate storage into storage arrays while providing clients (such as database and web servers) with the illusion of locally attached SCSI disks.[1] It mainly competes with Fibre Channel, but unlike traditional Fibre Channel which usually requires dedicated cabling,[a] iSCSI can be run over long distances using existing network infrastructure.[2] iSCSI was pioneered by IBM and Cisco in 1998 and submitted as a draft standard in March 2000.[3]

Concepts

edit

In essence, iSCSI allows two hosts to negotiate and then exchange SCSI commands using Internet Protocol (IP) networks. By doing this, iSCSI takes a popular high-performance local storage bus and emulates it over a wide range of networks, creating a storage area network (SAN). Unlike some SAN protocols, iSCSI requires no dedicated cabling; it can be run over existing IP infrastructure. As a result, iSCSI is often seen as a low-cost alternative to Fibre Channel, which requires dedicated infrastructure except in its FCoE (Fibre Channel over Ethernet) form. However, the performance of an iSCSI SAN deployment can be severely degraded if not operated on a dedicated network or subnet (LAN or VLAN), due to competition for a fixed amount of bandwidth.

Although iSCSI can communicate with arbitrary types of SCSI devices, system administrators almost always use it to allow servers (such as database servers) to access disk volumes on storage arrays. iSCSI SANs often have one of two objectives:

Storage consolidation
Organizations move disparate storage resources from servers around their network to central locations, often in data centers; this allows for more efficiency in the allocation of storage, as the storage itself is no longer tied to a particular server. In a SAN environment, a server can be allocated a new disk volume without any changes to hardware or cabling.
Disaster recovery
Organizations mirror storage resources from one data center to a remote data center, which can serve as a hot / standby in the event of a prolonged outage. In particular, iSCSI SANs allow entire disk arrays to be migrated across a WAN with minimal configuration changes, in effect making storage "routable" in the same manner as network traffic.

Initiator

edit

An initiator functions as an iSCSI client. An initiator typically serves the same purpose to a computer as a SCSI bus adapter would, except that, instead of physically cabling SCSI devices (like hard drives and tape changers), an iSCSI initiator sends SCSI commands over an IP network. An initiator falls into two broad types:

A software initiator uses code to implement iSCSI. Typically, this happens in a kernel-resident device driver that uses the existing network card (NIC) and network stack to emulate SCSI devices for a computer by speaking the iSCSI protocol. Software initiators are available for most popular operating systems and are the most common method of deploying iSCSI.

A hardware initiator uses dedicated hardware, typically in combination with firmware running on that hardware, to implement iSCSI. A hardware initiator mitigates the overhead of iSCSI and TCP processing and Ethernet interrupts, and therefore may improve the performance of servers that use iSCSI. An iSCSI host bus adapter (more commonly, HBA) implements a hardware initiator. A typical HBA is packaged as a combination of a Gigabit (or 10 Gigabit) Ethernet network interface controller, some kind of TCP/IP offload engine (TOE) technology and a SCSI bus adapter, which is how it appears to the operating system. An iSCSI HBA can include PCI option ROM to allow booting from an iSCSI SAN.

An iSCSI offload engine, or iSOE card, offers an alternative to a full iSCSI HBA. An iSOE "offloads" the iSCSI initiator operations for this particular network interface from the host processor, freeing up CPU cycles for the main host applications. iSCSI HBAs or iSOEs are used when the additional performance enhancement justifies the additional expense of using an HBA for iSCSI,[4] rather than using a software-based iSCSI client (initiator). iSOE may be implemented with additional services such as TCP offload engine (TOE) to further reduce host server CPU usage.

Target

edit

The iSCSI specification refers to a storage resource located on an iSCSI server (more generally, one of potentially many instances of iSCSI storage nodes running on that server) as a target.

An iSCSI target is often a dedicated network-connected hard disk storage device, but may also be a general-purpose computer, since as with initiators, software to provide an iSCSI target is available for most mainstream operating systems.

Common deployment scenarios for an iSCSI target include:

Storage array

edit

In a data center or enterprise environment, an iSCSI target often resides in a large storage array. These arrays can be in the form of commodity hardware with free-software-based iSCSI implementations, or as commercial products such as in StorTrends, Pure Storage, HP StorageWorks, EqualLogic, Tegile Systems, Nimble storage, IBM Storwize family, Isilon, NetApp filer, Dell EMC, Kaminario, NS-series, CX4, VNX, VNXe, VMAX, Hitachi Data Systems HNAS, or Pivot3 vSTAC.

A storage array usually provides distinct iSCSI targets for numerous clients.[5]

Software target

edit

Nearly all modern mainstream server operating systems (such as BSD, Linux, Solaris or Windows Server) can provide iSCSI target functionality, either as a built-in feature or with supplemental software. Some specific-purpose operating systems implement iSCSI target support.

Logical unit number

edit

In SCSI terminology, LU stands for logical unit, which is specified by a unique logical unit number. A LUN represents an individually addressable (logical) SCSI device that is part of a physical SCSI device (target). In an iSCSI environment, LUNs are essentially numbered disk drives. An initiator negotiates with a target to establish connectivity to a LUN; the result is an iSCSI connection that emulates a connection to a SCSI hard disk. Initiators treat iSCSI LUNs the same way as they would a raw SCSI or IDE hard drive; for instance, rather than mounting remote directories as would be done in NFS or CIFS environments, iSCSI systems format and directly manage filesystems on iSCSI LUNs.

In enterprise deployments, LUNs usually represent subsets of large RAID disk arrays, often allocated one per client. iSCSI imposes no rules or restrictions on multiple computers sharing individual LUNs; it leaves shared access to a single underlying filesystem as a task for the operating system.

Network booting

edit

For general data storage on an already-booted computer, any type of generic network interface may be used to access iSCSI devices.[citation needed] However, a generic consumer-grade network interface is not able to boot a diskless computer from a remote iSCSI data source.[citation needed] Instead, it is commonplace for a server to load its initial operating system from a TFTP server or local boot device, and then use iSCSI for data storage once booting from the local device has finished.[citation needed]

A separate DHCP server may be configured to assist interfaces equipped with network boot capability to be able to boot over iSCSI. In this case, the network interface looks for a DHCP server offering a PXE or bootp boot image.[6] This is used to kick off the iSCSI remote boot process, using the booting network interface's MAC address to direct the computer to the correct iSCSI boot target[citation needed]. One can then use a software-only approach to load a small boot program which can in turn mount a remote iSCSI target as if it was a local SCSI drive and then fire the boot process from said iSCSI target[citation needed]. This can be achieved using an existing Preboot Execution Environment (PXE) boot ROM, which is available on many wired Ethernet adapters. The boot code can also be loaded from CD/DVD, floppy disk (or floppy disk image) and USB storage, or it can replace existing PXE boot code on adapters that can be re-flashed.[7] The most popular free software to offer iSCSI boot support is iPXE.[8]

Most Intel Ethernet controllers for servers support iSCSI boot.[9]

Addressing

edit

iSCSI uses TCP (typically TCP ports 860 and 3260) for the protocols itself, with higher-level names used to address the objects within the protocol. Special names refer to both iSCSI initiators and targets. iSCSI provides three name-formats:

iSCSI Qualified Name (IQN)
Format: The iSCSI Qualified Name is documented in RFC 3720, with further examples of names in RFC 3721. Briefly, the fields are:
  • literal iqn (iSCSI Qualified Name)
  • date (yyyy-mm) that the naming authority took ownership of the domain
  • reversed domain name of the authority (e.g. org.alpinelinux, com.example, to.yp.cr)
  • Optional ":" prefixing a storage target name specified by the naming authority.
From the RFC:[10]
Type . Date . Naming Auth : String defined by example.com Naming Authority
iqn . 1992-01 . com.example : storage:diskarrays-sn-a8675309
iqn . 1992-01 . com.example
iqn . 1992-01 . com.example : storage.tape1.sys1.xyz
iqn . 1992-01 . com.example : storage.disk2.sys1.xyz
Extended Unique Identifier (EUI)
Format: eui.{EUI-64 bit address} (e.g. eui.02004567A425678D)
T11 Network Address Authority (NAA)
Format: naa.{NAA 64 or 128 bit identifier} (e.g. naa.52004567BA64678D)

IQN format addresses occur most commonly. They are qualified by a date (yyyy-mm) because domain names can expire or be acquired by another entity.

The IEEE Registration authority provides EUI in accordance with the EUI-64 standard. NAA is part OUI which is provided by the IEEE Registration Authority. NAA name formats were added to iSCSI in RFC 3980, to provide compatibility with naming conventions used in Fibre Channel and Serial Attached SCSI (SAS) storage technologies.

Usually, an iSCSI participant can be defined by three or four fields:

  1. Hostname or IP Address (e.g., "iscsi.example.com")
  2. Port Number (e.g., 3260)
  3. iSCSI Name (e.g., the IQN "iqn.2003-01.com.ibm:00.fcd0ab21.shark128")
  4. An optional CHAP Secret (e.g., "secretsarefun")

iSNS

edit

iSCSI initiators can locate appropriate storage resources using the Internet Storage Name Service (iSNS) protocol. In theory, iSNS provides iSCSI SANs with the same management model as dedicated Fibre Channel SANs. In practice, administrators can satisfy many deployment goals for iSCSI without using iSNS.

Security

edit

Authentication

edit

iSCSI initiators and targets prove their identity to each other using CHAP, which includes a mechanism to prevent cleartext passwords from appearing on the wire. By itself, CHAP is vulnerable to dictionary attacks, spoofing, and reflection attacks. If followed carefully, the best practices for using CHAP within iSCSI reduce the surface for these attacks and mitigate the risks.[11]

Additionally, as with all IP-based protocols, IPsec can operate at the network layer. The iSCSI negotiation protocol is designed to accommodate other authentication schemes, though interoperability issues limit their deployment.

Logical network isolation

edit

To ensure that only valid initiators connect to storage arrays, administrators most commonly run iSCSI only over logically isolated backchannel networks. In this deployment architecture, only the management ports of storage arrays are exposed to the general-purpose internal network, and the iSCSI protocol itself is run over dedicated network segments or VLANs. This mitigates authentication concerns; unauthorized users are not physically provisioned for iSCSI, and thus cannot talk to storage arrays. However, it also creates a transitive trust problem, in that a single compromised host with an iSCSI disk can be used to attack storage resources for other hosts.

Physical network isolation

edit

While iSCSI can be logically isolated from the general network using VLANs only, it is still no different from any other network equipment and may use any cable or port as long as there is a completed signal path between source and target. Just a single cabling mistake by a network technician can compromise the barrier of logical separation, and an accidental bridging may not be immediately detected because it does not cause network errors.

In order to further differentiate iSCSI from the regular network and prevent cabling mistakes when changing connections, administrators may implement self-defined color-coding and labeling standards, such as only using yellow-colored cables for the iSCSI connections and only blue cables for the regular network, and clearly labeling ports and switches used only for iSCSI.

While iSCSI could be implemented as just a VLAN cluster of ports on a large multi-port switch that is also used for general network usage, the administrator may instead choose to use physically separate switches dedicated to iSCSI VLANs only, to further prevent the possibility of an incorrectly connected cable plugged into the wrong port bridging the logical barrier.

Authorization

edit

Because iSCSI aims to consolidate storage for many servers into a single storage array, iSCSI deployments require strategies to prevent unrelated initiators from accessing storage resources. As a pathological example, a single enterprise storage array could hold data for servers variously regulated by the Sarbanes–Oxley Act for corporate accounting, HIPAA for health benefits information, and PCI DSS for credit card processing. During an audit, storage systems must demonstrate controls to ensure that a server under one regime cannot access the storage assets of a server under another.

Typically, iSCSI storage arrays explicitly map initiators to specific target LUNs; an initiator authenticates not to the storage array, but to the specific storage asset it intends to use. However, because the target LUNs for SCSI commands are expressed both in the iSCSI negotiation protocol and in the underlying SCSI protocol, care must be taken to ensure that access control is provided consistently.

Confidentiality and integrity

edit

For the most part, iSCSI operates as a cleartext protocol that provides no cryptographic protection for data in motion during SCSI transactions. As a result, an attacker who can listen in on iSCSI Ethernet traffic can:[12]

  • Reconstruct and copy the files and filesystems being transferred on the wire
  • Alter the contents of files by injecting fake iSCSI frames
  • Corrupt filesystems being accessed by initiators, exposing servers to software flaws in poorly tested filesystem code.

These problems do not occur only with iSCSI, but rather apply to any SAN protocol without cryptographic security. IP-based security protocols, such as IPsec, can provide standards-based cryptographic protection to this traffic.

Implementations

edit

Operating systems

edit

The dates in the following table denote the first appearance of a native driver in each operating system. Third-party drivers for Windows and Linux were available as early as 2001, specifically for attaching IBM's IP Storage 200i appliance.[13]

OS First release date Version Features
IBM i 2006-10 V5R4M0 (as i5/OS) Target, Multipath
VMware ESX 2006-06 ESX 3.0, ESX 4.0, ESXi 5.x, ESXi 6.x Initiator, Multipath
AIX 2002-10 AIX 5.3 TL10, AIX 6.1 TL3 Initiator, Target
Windows 2003-06 2000, XP Pro, 2003, Vista, 2008, 2008 R2, 7, 8, Server 2012, 8.1, Server 2012 R2, 10, Server 2016, 11, Server 2019 Initiator, Target,[b] Multipath
NetWare 2003-08 NetWare 5.1, 6.5, & OES Initiator, Target
HP-UX 2003-10 HP 11i v1, HP 11i v2, HP 11i v3 Initiator
Solaris 2002-05 Solaris 10, OpenSolaris Initiator, Target, Multipath, iSER
Linux 2005-06 2.6.12, 3.1 Initiator (2.6.12), Target (3.1), Multipath, iSER, VAAI[c]
OpenBSD 2009-10 4.9 Initiator
NetBSD 2002-06 4.0, 5.0 Initiator (5.0), Target (4.0)
FreeBSD 2008-02 7.0 Initiator (7.0), Target (10.0), Multipath, iSER, VAAI[c]
OpenVMS 2002-08 8.3-1H1 Initiator, Multipath
macOS 2008-07 10.4— N/A[d]

Targets

edit

Most iSCSI targets involve disk, though iSCSI tape and medium-changer targets are popular as well. So far, physical devices have not featured native iSCSI interfaces on a component level. Instead, devices with Parallel SCSI or Fibre Channel interfaces are bridged by using iSCSI target software, external bridges, or controllers internal to the device enclosure.

Alternatively, it is possible to virtualize disk and tape targets. Rather than representing an actual physical device, an emulated virtual device is presented. The underlying implementation can deviate drastically from the presented target as is done with virtual tape library (VTL) products. VTLs use disk storage for storing data written to virtual tapes. As with actual physical devices, virtual targets are presented by using iSCSI target software, external bridges, or controllers internal to the device enclosure.

In the security products industry, some manufacturers use an iSCSI RAID as a target, with the initiator being either an IP-enabled encoder or camera.

Converters and bridges

edit

Multiple systems exist that allow Fibre Channel, SCSI and SAS devices to be attached to an IP network for use via iSCSI. They can be used to allow migration from older storage technologies, access to SANs from remote servers and the linking of SANs over IP networks. An iSCSI gateway bridges IP servers to Fibre Channel SANs. The TCP connection is terminated at the gateway, which is implemented on a Fibre Channel switch or as a standalone appliance.

See also

edit

Notes

edit
  1. ^ Unless tunneled, such as in Fibre Channel over Ethernet or Fibre Channel over IP.
  2. ^ Target available only as part of Windows Unified Data Storage Server. Target available in Storage Server 2008 (excepted Basic edition).[14] Target available for Windows Server 2008 R2 as a separate download. Windows Server 2012, 2012 R2 and 2016 have built-in Microsoft iSCSI target version 3.3.
  3. ^ a b vStorage APIs Array Integration
  4. ^ macOS has neither initiator nor target coming from vendor directly. [citation needed]

References

edit
  1. ^ Rouse, Margaret (May 2011). "iSCSI (Internet Small Computer System Interface)". SearchStorage. Retrieved 21 January 2019.
  2. ^ "ISCSI SAN: Key Benefits, Solutions & Top Providers Of Storage Area Networking". Tredent Network Solutions. Archived from the original on 12 August 2014. Retrieved 3 November 2012.
  3. ^ "iSCSI proof-of-concept at IBM Research Haifa". IBM. Retrieved 13 September 2013.
  4. ^ "Chelsio Demonstrates Next Generation 40G iSCSI at SNW Spring". chelsio.com. 2025-08-14. Retrieved 2025-08-14.
  5. ^ Architecture and Dependability of Large-Scale Internet Services David Oppenheimer and David A. Patterson, Berkeley, IEEE Internet Computing, September–October 2002.
  6. ^ "Chainloading iPXE". ipxe.org. Retrieved 2025-08-14.
  7. ^ "Burning iPXE into ROM". ipxe.org. Retrieved 2025-08-14.
  8. ^ "iPXE - Open Source Boot Firmware". ipxe.org. Retrieved 2025-08-14.
  9. ^ "Intel Ethernet Controllers". Intel.com. Retrieved 2025-08-14.
  10. ^ J. Satran; K. Meth; C. Sapuntzakis; M. Chadalapaka; E. Zeidner (April 2004). Internet Small Computer Systems Interface (iSCSI). Network Working Group. doi:10.17487/RFC3720. RFC 3720. Obsolete. sec. 3.2.6.3.1,?p. 32. Obsoleted by RFC?7143. Type "iqn." (iSCSI Qualified Name)
  11. ^ J. Satran; K. Meth; C. Sapuntzakis; M. Chadalapaka; E. Zeidner (April 2004). Internet Small Computer Systems Interface (iSCSI). Network Working Group. doi:10.17487/RFC3720. RFC 3720. Obsolete. sec. 8.2.1. Obsoleted by RFC?7143.
  12. ^ "Protecting an iSCSI SAN". VMware. Archived from the original on 3 March 2016. Retrieved 3 November 2012.
  13. ^ "IBM IP storage 200i general availability". IBM. Retrieved 13 September 2013.
  14. ^ "Windows Storage Server | NAS | File Management". Microsoft. Retrieved 2025-08-14.

Further reading

edit
  • RFC?3720 - Internet Small Computer Systems Interface (iSCSI) (obsolete)
  • RFC?3721 - Internet Small Computer Systems Interface (iSCSI) Naming and Discovery (updated)
  • RFC?3722 - String Profile for Internet Small Computer Systems Interface (iSCSI) Names
  • RFC?3723 - Securing Block Storage Protocols over IP (Scope: The use of IPsec and IKE to secure iSCSI, iFCP, FCIP, iSNS and SLPv2.)
  • RFC?3347 - Small Computer Systems Interface protocol over the Internet (iSCSI) Requirements and Design Considerations
  • RFC?3783 - Small Computer Systems Interface (SCSI) Command Ordering Considerations with iSCSI
  • RFC?3980 - T11 Network Address Authority (NAA) Naming Format for iSCSI Node Names (obsolete)
  • RFC?4018 - Finding Internet Small Computer Systems Interface (iSCSI) Targets and Name Servers by Using Service Location Protocol version 2 (SLPv2)
  • RFC?4173 - Bootstrapping Clients using the Internet Small Computer System Interface (iSCSI) Protocol
  • RFC?4544 - Definitions of Managed Objects for Internet Small Computer System Interface (iSCSI)
  • RFC?4850 - Declarative Public Extension Key for Internet Small Computer Systems Interface (iSCSI) Node Architecture (obsolete)
  • RFC?4939 - Definitions of Managed Objects for iSNS (Internet Storage Name Service)
  • RFC?5048 - Internet Small Computer System Interface (iSCSI) Corrections and Clarifications (obsolete)
  • RFC?5047 - DA: Datamover Architecture for the Internet Small Computer System Interface (iSCSI)
  • RFC?5046 - Internet Small Computer System Interface (iSCSI) Extensions for Remote Direct Memory Access (RDMA)
  • RFC?7143 – Internet Small Computer System Interface (iSCSI) Protocol (consolidated)
杜甫是什么派诗人 乙肝245阳性是什么意思 墨染是什么意思 线性骨折是什么意思 下雨天穿什么衣服
清炖排骨都放什么调料 琋字五行属什么 蚩是什么意思 秋天开什么花 咳黄痰吃什么药好得快
尴尬什么意思 激素吃多了对身体有什么副作用 心肌梗塞是什么原因造成的 戈美其鞋子是什么档次 为什么会阑尾炎
血氧仪是干什么用的 什么水果补钾 十月初八是什么星座 生吃黄瓜有什么好处 什么叫御姐
瑛字五行属什么hcv7jop7ns0r.cn 跛脚是什么意思hcv8jop3ns7r.cn 裸婚是什么意思dajiketang.com 吃什么治疗湿气重hcv8jop7ns1r.cn 普拉提是什么意思hcv9jop4ns4r.cn
8月31日什么星座hcv7jop6ns5r.cn 一切尽在不言中是什么意思hcv9jop1ns1r.cn 强直性脊柱炎挂什么科hcv9jop3ns9r.cn 杨少华什么辈分hcv8jop9ns0r.cn 一个火一个斤念什么hcv8jop0ns2r.cn
脾虚要吃什么东西调理hcv8jop7ns2r.cn 知柏地黄丸对男性功能有什么帮助hcv7jop7ns3r.cn 豪五行属什么hcv7jop5ns3r.cn 陈皮泡水喝有什么功效和作用hcv9jop1ns0r.cn 1971属什么hcv8jop4ns6r.cn
脸一边大一边小是什么原因xjhesheng.com 10月30日是什么星座jingluanji.com 1月11是什么星座hcv9jop3ns3r.cn 皮肤黑穿什么颜色的衣服显白hcv8jop0ns2r.cn 什么木头的菜板最好hcv9jop6ns0r.cn
百度