RE: iSCSI protocol - use of SendTargets
Unfortunately my innuendo was poorly worded, so I
apologize to all readers on this list who took offence at my comments since the
intent was not malicious or disrespectful.
Parav, did the specific sections I pointed out help with
your understanding? If you have anything you are not sure of this is the forum
to ask in.
Nobody minds any sort of question. As for me getting
annoyed it was just about an unwarranted innuendo by Ken.
"Sandars, Ken" <ken_sandars@xxxxxxxxxxx>
|ips@xxxxxxxx, Parav Pandit
<paravpandit@xxxxxxxxx>, Eddy Quicksall
|RE: iSCSI protocol - use of
I apologize for asking such basic question on this mailing list. I
would read the iSCSI RFC 3720 by myself.
I thought of sharing and
gaining knowledge through this mailing list faster, but now I understand it may
not be the perfect for starters.
Thanks a lot for your the kind support,
suggestions and information.
Hard to comment on your statement. Sounds more like a group
"denigration" of the authors - and I don't know about any of us doing what you
I am a bit
uneasy about this statement - to say the least.
Satran/Haifa/IBM@IBMIL, "Eddy Quicksall"
|RE: iSCSI protocol - use of
I don't know how many third party iSCSI 'Big Dummies' guides are out
there, however, since RFC3720 succinctly describes the fundamentals of the iSCSI
model I recommended that as the first choice.
I'd have no objection if
the author of RFC3720 wanted to advertise his publication here! ;-)
From: Julian Satran
Sent: Saturday, 30 June 2007
To: Eddy Quicksall
Cc: ips@xxxxxxxx; Sandars, Ken;
Subject: Re: iSCSI protocol - use of
Ken - what exactly does "Before any author shamelessly plugs their iSCSI publications, I suggest
you have a quick re-read of RFC3720. "
reffer to? - Julo
<ken_sandars@xxxxxxxxxxx>, "Parav Pandit"
|Re: iSCSI protocol - use of
I agree with Ken on the reading
below. You may have alredy figured this out but just to try to give a simple
answer to your question ... suppose you have built a box that has several
targets each with different ip addresses; the user at the initiator could just
give one of the ip addresses as the "discovery address"; this could be the
address of only one of the targets; the initiator can then log on as a discovery
session using that address and use SendTargets to find the names and addresses
of all targets.
----- Original Message -----
Pandit ; ips@xxxxxxxx
Thursday, June 07, 2007 5:58 PM
Subject: RE: iSCSI protocol -
use of SendTargets
Before any author shamelessly plugs their iSCSI publications, I
suggest you have a quick re-read of RFC3720.
In particular, section
3.4 pages 37-40 cover some really important concepts that I think will help your
understanding. Then jump to the start of section 3, page 17 for more concepts
The specifics of the SendTargets command are in Appendix
From: Parav Pandit
Sent: Thursday, 7 June 2007
Subject: iSCSI protocol - use
I am new to iSCSI protocol
and gearing up.
Is this the right mailing list to ask questions related to
1. iSCSI target is identified
by the network portal (IP + port).
So once the iSCSI target is identified by
the network portal and Login to it is successful, why do we need to ask for
TargetName and TargetAddress returned are immaterial
(because we already know the target address to which we have logged-in), unless
there are multiple addresses for them and failover is required used.
Or it is
used for communicating different TCP port on which initiators can send TUR,
Inquiry, Read, Write commands?
What is the expected information from the
target in response to SendTargets command?
It's here! Your new message!
Get new email alerts with the free
Need a vacation? Get great deals to amazing places on Yahoo! Travel.
Ips mailing list