Iscsi Block-Level Storage Protocol And IP San Essay

PAGES
2
WORDS
757
Cite

iSCSI block-Level storage protocol and IP SAN In the world of computing, iSCSI is an abbreviation used for Internet Small Computer System Interface. It is based on IP (Internet Protocol) storage, and is the standard that is used on most networks for the linking together of facilities for the storage of data (Dell, n.d.). By making sure that the commands created by SCSI are carried over specific IP networks, data can be easily transferred and storage can be managed (Dell, n.d.). That holds true even over very long distances, no matter what is being sent. Wide area networks and local area networks can be used for the transmission of data, and that same data can also just be sent over the Internet (Oppenheimer & Patterson, 2002). The storage and the retrieval of the data are both independent of location, meaning that it is possible to store things "in the cloud" and retrieve them from anywhere. That helps facilitate easy storage as well as quick retrieval no matter where a person is or what time he or she needs to store or retrieve some type of data for personal or professional use (Dell, n.d.; Oppenheimer &...

...

That creates a SAN (storage area network) protocol (Dell, n.d.). The storage from various clients can be consolidated quickly and efficiently, but the illusion of being local is still something that is created by the network. Even though it appears the information is on something local, such as an attached disk, the information is actually consolidated onto storage arrays in data centers (Dell, n.d.). Because of the way in which the data is stored, retrieval from anywhere is possible and is often considered a major improvement to having something stored on a local disk. The network infrastructure that is already in existence can also be used for iSCSI, so there is no need to run any kind of special cabling (Oppenheimer & Patterson, 2002). That is true even when the iSCSI is going to be used over very long distances or in remote areas (Dell, n.d.).
In short, iSCSI just allows two different hosts to exchange SCSI commands and negotiate with one another over an IP network. That sounds very simple,…

Sources Used in Documents:

References

Dell.com (n.d.). http://www.dell.com/downloads/global/products/pvaul/en/ip-san-best-practices-en.pdf

Oppenheimer, D., & Patterson, D.A. (2002). Architecture and dependability of large-scale internet services. IEEE Internet Computing, September -- October 2002.


Cite this Document:

"Iscsi Block-Level Storage Protocol And IP San" (2012, April 23) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/iscsi-block-level-storage-protocol-and-ip-79399

"Iscsi Block-Level Storage Protocol And IP San" 23 April 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/iscsi-block-level-storage-protocol-and-ip-79399>

"Iscsi Block-Level Storage Protocol And IP San", 23 April 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/iscsi-block-level-storage-protocol-and-ip-79399

Related Documents

Internet Protocols The internet is more than what it appears to many of its users. The World Wide Web is the standard and most popular method or protocol of acquiring information off the interconnectivity that the internet provides. The purpose of this essay is to define an internet protocols and give examples of several different types and the advantages and disadvantages they provide for myself and other users of this technology. HTTP

Internet Protocol Version 6 (IPv6) technology, one of the technologies listed on Gartner's 2004 Hype Cycle that has high visibility today because new IPv4 addresses are nearly exhausted. On the 2012 Hype Cycle, IPv6 is now listed in the "Trough of Disillusionment," yet the U.S. government is still directing that transition to this protocol continue: Name at least three advantages that government organizations will gain by transitioning to IPv6 technology

Fundamentally, proxy servers get SIP messages and redirect them to the next SIP server in the network. Proxy servers are able to provide operations like authentication, authorization, network access control, routing, reliable request transmission, and security. (ii) Redirect server: Gives the client with information regarding the nest hop or hops which the message must take and subsequently the client contacts the next hop server and UAS directly. (iii) Registrar

The address classes are the defined as a, B, C, D or E.This is however dependent on the initial bits. The total of number of addresses in IPv4 are 4 294-967-296. As for IPv6, the address is made up of 128 bit long pieces which are 16 bytes. The fundamental structure of IPv6 is 64 bits (network number) and 64 bits (host number). In most case the host portion

This system was problematic because of the number of students in the district and the time that it took to engage in this type of communication. In an effort to find a solution for the problem an Information Systems Manager was called in to assist the district (Milner, 2005). After abandoning an idea that called for the expansion of the traditional telephone system by placing new jacks in classrooms because

With the growth of VoIP, new requirements are brought forwarded, such as providing communication between a PC-based soft phone and a phone on PSTN. Such requirements strengthen the need for a standard for IP telephony. Same as other technologies, there are various standards proposed to be accepted by the industry. Two major standard bodies which govern the multimedia transmission over IP network are: International Telecommunications Union (ITU) Internet Engineering Task Force