Return-Path: <owner-ips@ece.cmu.edu>
X-Sieve: cmu-sieve 2.0
Return-Path: <owner-ips@ece.cmu.edu>
Received: from osgood.ece.cmu.edu (OSGOOD.ECE.CMU.EDU [128.2.129.25])
	by ece.cmu.edu (8.11.0/8.10.2) with ESMTP id h3UDQxY29266
	for <ipsml@ece.cmu.edu>; Wed, 30 Apr 2003 09:26:59 -0400 (EDT)
Received: by osgood.ece.cmu.edu (Postfix, from userid 953)
	id 03E3A7B; Wed, 30 Apr 2003 09:26:58 -0400 (EDT)
Received: from sos.ece.cmu.edu (SOS.ECE.CMU.EDU [128.2.129.27])
	by osgood.ece.cmu.edu (Postfix) with ESMTP
	id 1747971; Wed, 30 Apr 2003 09:26:22 -0400 (EDT)
Received: by sos.ece.cmu.edu (Postfix)
	id F0DB8894A; Wed, 30 Apr 2003 09:26:03 -0400 (EDT)
Received: from sos.ece.cmu.edu (localhost [127.0.0.1])
	by sos.ece.cmu.edu (Postfix) with ESMTP id 8FED38949
	for <ips-outgoing@sos.ece.cmu.edu>; Wed, 30 Apr 2003 09:26:03 -0400 (EDT)
Received: (from majordom@localhost)
	by sos.ece.cmu.edu (8.12.9+Sun/8.12.2/Submit) id h3UDQ3rM015328
	for ips-outgoing; Wed, 30 Apr 2003 09:26:03 -0400 (EDT)
X-Authentication-Warning: sos.ece.cmu.edu: majordom set sender to owner-ips@ece.cmu.edu using -f
X-Original-To: ips@sos.ece.cmu.edu
Received: from bache.ece.cmu.edu (BACHE.ECE.CMU.EDU [128.2.129.23])
	by sos.ece.cmu.edu (Postfix) with ESMTP id 118DC8948
	for <ips@sos.ece.cmu.edu>; Wed, 30 Apr 2003 09:26:01 -0400 (EDT)
Received: by bache.ece.cmu.edu (Postfix)
	id 8FEA965; Wed, 30 Apr 2003 09:26:01 -0400 (EDT)
Delivered-To: ips@ece.cmu.edu
Received: by bache.ece.cmu.edu (Postfix, from userid 953)
	id 6CF966C; Wed, 30 Apr 2003 09:26:01 -0400 (EDT)
Received: from d12lmsgate-2.de.ibm.com (d12lmsgate-2.de.ibm.com [194.196.100.235])
	by bache.ece.cmu.edu (Postfix) with ESMTP id E84F665
	for <ips@ece.cmu.edu>; Wed, 30 Apr 2003 09:25:45 -0400 (EDT)
Received: from d12relay02.de.ibm.com (d12relay02.de.ibm.com [9.165.215.23])
	by d12lmsgate-2.de.ibm.com (8.12.9/8.12.8) with ESMTP id h3UDPbUm045488;
	Wed, 30 Apr 2003 15:25:40 +0200
Received: from d10ml001.telaviv.ibm.com (d10ml001.telaviv.ibm.com [9.148.216.55])
	by d12relay02.de.ibm.com (8.12.8/NCO/VER6.5) with ESMTP id h3UDPZlt145044;
	Wed, 30 Apr 2003 15:25:36 +0200
In-Reply-To: <AEC4671C8179D61194DE0002B328BDD26A7A5F@ATLOPS>
To: Eddy Quicksall <eddy_quicksall@ivivity.com>
Cc: "Mallikarjun C." <cbm@rose.hp.com>, ips@ece.cmu.edu,
   "KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie.krueger@hp.com>
Subject: RE: iSCSI: ISID RULE and Discovery sessions
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 6.0.1 February 07, 2003
From: "Julian Satran" <Julian_Satran@il.ibm.com>
Message-ID: <OF4C2B95CD.975C8BD3-ONC2256D18.00473857-C2256D18.0049BF54@telaviv.ibm.com>
Date: Wed, 30 Apr 2003 16:25:31 +0300
X-MIMETrack: Serialize by Router on D10ML001/10/M/IBM(Release 5.0.9a |January 7, 2002) at
 30/04/2003 16:25:36,
	Serialize complete at 30/04/2003 16:25:36
Content-Type: multipart/alternative; boundary="=_alternative 0047842EC2256D18_="
Sender: owner-ips@ece.cmu.edu
Precedence: bulk
X-Spam-Status: No, hits=-6.9 required=5.0
	tests=HTML_20_30,HTML_FONT_COLOR_BLUE,HTML_FONT_COLOR_NAME,
	      HTML_FONT_FACE_ODD,HTML_MESSAGE,IN_REP_TO,
	      QUOTED_EMAIL_TEXT,QUOTE_TWICE_1,X_AUTH_WARNING
	autolearn=ham	version=2.50
X-Spam-Level: 
X-Spam-Checker-Version: SpamAssassin 2.50 (1.173-2003-02-20-exp)

This is a multipart message in MIME format.
--=_alternative 0047842EC2256D18_=
Content-Type: text/plain; charset="US-ASCII"

The current rule leaves it clearly to the target. If the target recognizes 
the Initiator-ISID (it is in  its own domain) it will drop the session.
It does not say that the target must be designed so as to recognize any 
other target instances on the same node.
And we should leave it so.

Julo



Eddy Quicksall <eddy_quicksall@ivivity.com> 
30/04/03 15:25

To
"KRUEGER,MARJORIE (HP-Roseville,ex1)" <marjorie.krueger@hp.com>, Julian 
Satran/Haifa/IBM@IBMIL, "Mallikarjun C." <cbm@rose.hp.com>
cc
ips@ece.cmu.edu
Subject
RE: iSCSI: ISID RULE and Discovery sessions






I think you should just leave it as is. Since there is no TargetName, then 
the ISID rule would not apply.
 
If initiators would like to use a different ISID for each simultaneous 
discovery session, then that would be perfectly fine.
 
If you enforce the ISID rule where it was not really intended, you could 
open a can of worms.
 
Eddy
 
-----Original Message-----
From: KRUEGER,MARJORIE (HP-Roseville,ex1) [mailto:marjorie.krueger@hp.com] 

Sent: Tuesday, April 29, 2003 6:51 PM
To: 'Julian Satran'; Mallikarjun C.
Cc: ips@ece.cmu.edu
Subject: RE: iSCSI: ISID RULE and Discovery sessions
 
I'm inclined to agree with Julian, discovery sessions are a crufty 
short-term "protocol assist" and I wouldn't  change the rules to  be more 
friendly to the use of this discovery method.  I feel the rules should 
stand as currently stated, with some clarification.  I question the wisdom 
in developing a different set of rules for "discovery sessions" and see no 
harm in enforcing the ISID rule on a discovery session.  Let's keep 
enforcement as simple as possible. 
 
The ambiguity in enforcing the ISID rule on a discovery session arises 
from the fact that there is no "target node" identified.  Since a 
discovery session can conceptually be thought to be to "all targets on 
this iSCSI entity" we could say that any (every?) target node within an 
iSCSI entity will enforce the ISID rule on discovery sessions from a 
particular initiator.    I can't see any particular hardship that this 
causes for an initiator?  One discovery session is all that's necessary to 
"discover" all the target nodes serviced by that target portal group.  It 
makes target enforcement symmetric regardless of session type.
 
Marjorie Krueger
Networked Storage Architecture
Networked Storage Solutions
Hewlett-Packard
-----Original Message-----
From: Julian Satran [mailto:Julian_Satran@il.ibm.com] 
Sent: Monday, April 28, 2003 11:07 PM
To: Mallikarjun C.
Cc: ips@ece.cmu.edu
Subject: Re: iSCSI: ISID RULE and Discovery sessions

Mallikarjun, 

By discussing this further we create an issue where none exist (an all 
this for a mechanism that I KNEW will get to hunt us). 
On the long run no serious discovery will be based in the "discovery 
session" and if there will be sometime a second version we can drop it and 
use only the standardized alternatives (iSNS, SLP, Bluefin etc.). 
Meanwhile let the rules be as they are. There is no harm done if a 
discovery session is dropped if the same initiator connects the same 
target with the same ISID (the target recognizes itself as the same 
target!).   

Let sleeping dogs lie.. 

Julo 


"Mallikarjun C." <cbm@rose.hp.com> 
Sent by: owner-ips@ece.cmu.edu 
29/04/03 06:19 


To
<ips@ece.cmu.edu> 
cc
 
Subject
Re: iSCSI: ISID RULE and Discovery sessions
 


 
 




ISID is there for reasons that do not have anything 
to do with ISID RULE.  The rule only takes advantage 
of ISID to enforce I_T nexus uniqueness. 

As Julian and I said, a discovery session is just an 
iSCSI protocol-ism that simply isn't related to an 
I_T nexus.
--
Mallikarjun

Mallikarjun Chadalapaka
Networked Storage Architecture
Network Storage Solutions
Hewlett-Packard MS 5668 
Roseville CA 95747
cbm@rose.hp.com


----- Original Message ----- 
From: "mphaneen" <mphaneen@npd.hcltech.com>
To: "Mallikarjun C." <cbm@rose.hp.com>; "Julian Satran" 
<Julian_Satran@il.ibm.com>
Cc: <ips@ece.cmu.edu>
Sent: Monday, April 28, 2003 7:16 PM
Subject: Re: iSCSI: ISID RULE and Discovery sessions


> Hi,
>     *If* ISID RULE does not apply to Discovery session, then
> I believe, the ISID information is immaterial for the Discovery session.
> And thus I propose, an ISID need not be generated for a Discovery
> session at all.
> 
>     Regards
>     Phani
> 
> Phaneendra. M
> Member Technical Staff
> HCL TECHNOLOGIES LTD.
> Chennai, India.
> Phone: +91 044 23728366 extn: 1135
> 
> Visit us at:
> http://www.hcltech.com/san
> 
> 
> ----- Original Message -----
> From: "Mallikarjun C." <cbm@rose.hp.com>
> To: "Julian Satran" <Julian_Satran@il.ibm.com>
> Cc: <ips@ece.cmu.edu>
> Sent: Monday, April 28, 2003 11:16 PM
> Subject: Re: iSCSI: ISID RULE and Discovery sessions
> 
> 
> > Julian,
> >
> > >or another
> > > discovery session with the same InitiatorName and Isid.
> >
> > This may be hard to specify and also to implement.  The question that
> comes
> > up will be - to the same target network entity or to the same target 
node?
> > There may be concurrent discovery sessions attached to just one 
specific
> > TargetName as well within that network entity, and I presume we don't 
want
> > to bring them down when a new entity-level discovery session is
> instantiated.
> >
> > My preference is to just not apply the ISID RULE in any scope to the
> > discovery sessions.  There's no logical correctness issue in any case 
with
> them.
> >
> > If we agree that it's the reasonable thing to do, it might be useful 
to
> add
> > the following text to 12.21 ("SessionType"), if doing so is possible
> anymore.....
> > (David?  Or is it something that has to wait for getting in to the 
command
> > ordering draft? )
> >
> > "A discovery session is an iSCSI-level protocol construct and so is 
not
> >  an I_T nexus.  The "ISID RULE" stated in section 3.4.3 is thus not
> applicable
> >  to discovery sessions."
> >
> > Thanks.
> > --
> > Mallikarjun
> >
> > Mallikarjun Chadalapaka
> > Networked Storage Architecture
> > Network Storage Solutions
> > Hewlett-Packard MS 5668
> > Roseville CA 95747
> > cbm@rose.hp.com
> >
> > ----- Original Message -----
> > From: "Julian Satran" <Julian_Satran@il.ibm.com>
> > To: "Pittman, Joseph" <Joseph.Pittman@netapp.com>
> > Cc: <cbm@rose.hp.com>; <csapuntz@cisco.com>; "dl-iscsi-eng"
> <dl-iscsi-eng@netapp.com>; <efri@sangate.com>;
> > <ips@ece.cmu.edu>; "Kalman Meth" <meth@il.ibm.com>; <ips@ece.cmu.edu>
> > Sent: Saturday, April 26, 2003 12:44 AM
> > Subject: Re: iSCSI: ISID RULE and Discovery sessions
> >
> >
> > > It is true that  in the discovery session the initiator does not 
have to
> > > specify a TargetName as  the purpose of the discovery session was to
> > > discover the targets.
> > > As such the discovery session is technically a session with the 
"iSCSI
> > > Node" and the only thing that can bring it down is logout or another
> > > discovery session with the same InitiatorName and Isid.
> > >
> > > Regards,
> > > Julo
> > >
> > >
> > >
> > > "Pittman, Joseph" <Joseph.Pittman@netapp.com>
> > > 25/04/03 21:08
> > >
> > > To
> > > Julian Satran/Haifa/IBM@IBMIL, Kalman Meth/Haifa/IBM@IBMIL,
> > > <csapuntz@cisco.com>, <efri@sangate.com>, <cbm@rose.hp.com>,
> > > <ips@ece.cmu.edu>
> > > cc
> > > "dl-iscsi-eng" <dl-iscsi-eng@netapp.com>
> > > Subject
> > > iSCSI: ISID RULE and Discovery sessions
> > >
> > >
> > >
> > >
> > >
> > >
> > > iSCSI specification authors and experts,
> > > My name is Joe Pittman, an engineering at Network Appliance.
> > > My group has implemented an iSCSI target based on draft 20
> > > of the iSCSI specification.
> > > During interoperability testing, we have encountered an initiator
> > > (Cisco Linux initiator from SourceForge), whose implementers have
> > > interpreted the ISID RULE differently from the NetApp target
> > > implementation.  I need an authoritative ruling on the applicability
> > > of the ISID RULE for Discovery sessions.
> > > The ISID RULE states the following (draft-ietf-ips-iscsi-20.txt,
> > > section 3.4.3):
> > >    ISID RULE: Between a given iSCSI Initiator and iSCSI Target 
Portal
> > >    Group (SCSI target port), there can only be one session with a 
given
> > >    value for ISID that identifies the SCSI initiator port.
> > > Consider the case where an initiator {InitiatorName X, ISID I} has
> > > created a Discovery session to a target.  Then, without terminating
> > > this session via LOGOUT, the same initiator {X,I} creates a new
> > > Normal session to the same target, at the same target portal.  The
> > > question is, should the target terminate the existing Discovery
> > > session in order to enforce the ISID RULE?
> > > Because there is no mention of Discovery sessions vs. Normal 
sessions
> > > in the ISID RULE section, my interpretation of the specification
> > > was that the existing Discovery session MUST be terminated.
> > >
> > > But one of the authors of the Cisco Linux initiator interpreted
> > > the specification differently.  Here is an excerpt from an e-mail
> > > message describing his logic:
> > > > Discovery sessions don't have TargetNames, and the implicit logout
> > > > only occurs when the InitiatorName, ISID, and TargetName all 
match.
> > > > It should thus be impossible for a normal session to logout a
> > > > discovery session, since the TargetNames for the two sessions can
> > > > never match.  I think your target has a bug.
> > > >
> > > > Discovery sessions don't really connect to a particular iSCSI
> > > > target.  It's more a connection to the iSCSI Node as a whole.
> > > > Normal sessions connect to particular iSCSI targets.  This should
> > > > keep the two session types from conflicting, even if the ISIDs
> > > > are the same.
> > >
> > > So, will one of you authors rule on this disagreement?  I am
> > > eager to fix my bug, if my interpretation was in error.
> > > One followup question:
> > > Also, if the Cisco interpretation is correct, then does the ISID
> > > rule apply to two Discovery sessions?  That is, if the target
> > > receives a second Discovery session while the first Discovery
> > > session is still active, MUST the target terminate the first
> > > Discovery session in order to enforce the ISID RULE?
> > >
> > > Thanks in advance for any help you can provide.
> > > --
> > > Joe Pittman
> > > jpittman@netapp.com
> > >
> 
> 


--=_alternative 0047842EC2256D18_=
Content-Type: text/html; charset="US-ASCII"


<br><font size=2 face="sans-serif">The current rule leaves it clearly to
the target. If the target recognizes the Initiator-ISID (it is in &nbsp;its
own domain) it will drop the session.</font>
<br><font size=2 face="sans-serif">It does not say that the target must
be designed so as to recognize any other target instances on the same node.</font>
<br><font size=2 face="sans-serif">And we should leave it so.</font>
<br>
<br><font size=2 face="sans-serif">Julo</font>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td width=40%><font size=1 face="sans-serif"><b>Eddy Quicksall &lt;eddy_quicksall@ivivity.com&gt;</b>
</font>
<p><font size=1 face="sans-serif">30/04/03 15:25</font>
<td width=59%>
<table width=100%>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td valign=top><font size=1 face="sans-serif">&quot;KRUEGER,MARJORIE (HP-Roseville,ex1)&quot;
&lt;marjorie.krueger@hp.com&gt;, Julian Satran/Haifa/IBM@IBMIL, &quot;Mallikarjun
C.&quot; &lt;cbm@rose.hp.com&gt;</font>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td valign=top><font size=1 face="sans-serif">ips@ece.cmu.edu</font>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td valign=top><font size=1 face="sans-serif">RE: iSCSI: ISID RULE and
Discovery sessions</font></table>
<br>
<table>
<tr valign=top>
<td>
<td></table>
<br></table>
<br>
<br>
<br><font size=2 color=#000080 face="Arial">I think you should just leave
it as is. Since there is no TargetName, then the ISID rule would not apply.</font>
<p><font size=2 color=#000080 face="Arial">&nbsp;</font>
<p><font size=2 color=#000080 face="Arial">If initiators would like to
use a different ISID for each simultaneous discovery session, then that
would be perfectly fine.</font>
<p><font size=2 color=#000080 face="Arial">&nbsp;</font>
<p><font size=2 color=#000080 face="Arial">If you enforce the ISID rule
where it was not really intended, you could open a can of worms.</font>
<p><font size=2 color=#000080 face="Arial">&nbsp;</font>
<p><font size=2 color=#000080 face="Arial">Eddy</font>
<p><font size=2 color=#000080 face="Arial">&nbsp;</font>
<p><font size=2 face="Tahoma">-----Original Message-----<b><br>
From:</b> KRUEGER,MARJORIE (HP-Roseville,ex1) [mailto:marjorie.krueger@hp.com]
<b><br>
Sent:</b> Tuesday, April 29, 2003 6:51 PM<b><br>
To:</b> 'Julian Satran'; Mallikarjun C.<b><br>
Cc:</b> ips@ece.cmu.edu<b><br>
Subject:</b> RE: iSCSI: ISID RULE and Discovery sessions</font>
<p><font size=3 face="Times New Roman">&nbsp;</font>
<p><font size=2 color=blue face="Georgia">I'm inclined to agree with Julian,
discovery sessions are a crufty short-term &quot;protocol assist&quot;
and I wouldn't &nbsp;change the rules to &nbsp;be more friendly to the
use of this discovery method. &nbsp;I feel the rules should stand as currently
stated, with some clarification. &nbsp;I question the wisdom in developing
a different set of rules for &quot;discovery sessions&quot; and see no
harm in enforcing the ISID rule on a discovery session. &nbsp;Let's keep
enforcement as simple as possible. &nbsp;</font>
<p><font size=3 face="Times New Roman">&nbsp;</font>
<p><font size=2 color=blue face="Georgia">The ambiguity in enforcing the
ISID rule on a discovery session arises from the fact that there is no
&quot;target node&quot; identified. &nbsp;Since a discovery session can
conceptually be thought to be to &quot;all targets on this iSCSI entity&quot;
we could say that any (every?) target node within an iSCSI entity will
enforce the ISID rule on discovery sessions from a particular initiator.
&nbsp; &nbsp;I can't see any particular hardship that this causes for an
initiator? &nbsp;One discovery session is all that's necessary to &quot;discover&quot;
all the target nodes serviced by that target portal group. &nbsp;It makes
target enforcement symmetric regardless of session type.</font>
<p><font size=3 face="Times New Roman">&nbsp;</font>
<p><font size=2 color=blue face="Georgia">Marjorie Krueger<br>
Networked Storage Architecture<br>
Networked Storage Solutions<br>
Hewlett-Packard</font>
<br><font size=2 face="Tahoma">-----Original Message-----<b><br>
From:</b> Julian Satran [mailto:Julian_Satran@il.ibm.com] <b><br>
Sent:</b> Monday, April 28, 2003 11:07 PM<b><br>
To:</b> Mallikarjun C.<b><br>
Cc:</b> ips@ece.cmu.edu<b><br>
Subject:</b> Re: iSCSI: ISID RULE and Discovery sessions</font>
<p><font size=2 face="sans-serif"><br>
Mallikarjun,</font><font size=3 face="Times New Roman"> <br>
</font><font size=2 face="sans-serif"><br>
By discussing this further we create an issue where none exist (an all
this for a mechanism that I KNEW will get to hunt us).</font><font size=3 face="Times New Roman">
</font><font size=2 face="sans-serif"><br>
On the long run no serious discovery will be based in the &quot;discovery
session&quot; and if there will be sometime a second version we can drop
it and use only the standardized alternatives (iSNS, SLP, Bluefin etc.).
Meanwhile let the rules be as they are. There is no harm done if a discovery
session is dropped if the same initiator connects the same target with
the same ISID (the target recognizes itself as the same target!). &nbsp;</font><font size=3 face="Times New Roman">
<br>
</font><font size=2 face="sans-serif"><br>
Let sleeping dogs lie..</font><font size=3 face="Times New Roman"> <br>
</font><font size=2 face="sans-serif"><br>
Julo</font><font size=3 face="Times New Roman"> <br>
</font>
<p>
<table width=100%>
<tr valign=top>
<td width=45%><font size=1 face="sans-serif"><b>&quot;Mallikarjun C.&quot;
&lt;cbm@rose.hp.com&gt;</b> <br>
Sent by: owner-ips@ece.cmu.edu</font><font size=3 face="Times New Roman">
</font>
<p><font size=1 face="sans-serif">29/04/03 06:19</font><font size=3 face="Times New Roman">
</font>
<td width=54%>
<br>
<table width=100%>
<tr>
<td width=14%>
<div align=right><font size=1 face="sans-serif">To</font></div>
<td width=85% valign=top><font size=1 face="sans-serif">&lt;ips@ece.cmu.edu&gt;</font><font size=3 face="Times New Roman">
</font>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">cc</font></div>
<td valign=top><font size=3 face="Times New Roman">&nbsp;</font>
<tr>
<td>
<div align=right><font size=1 face="sans-serif">Subject</font></div>
<td valign=top><font size=1 face="sans-serif">Re: iSCSI: ISID RULE and
Discovery sessions</font></table>
<p><font size=3 face="Times New Roman">&nbsp;</font>
<p>
<br>
<table width=100%>
<tr valign=top>
<td width=50%><font size=3 face="Times New Roman">&nbsp;</font>
<td width=49%><font size=3 face="Times New Roman">&nbsp;</font></table>
<br></table>
<p><font size=3 face="Times New Roman"><br>
<br>
</font><font size=2 face="Courier New"><br>
ISID is there for reasons that do not have anything <br>
to do with ISID RULE. &nbsp;The rule only takes advantage <br>
of ISID to enforce I_T nexus uniqueness. &nbsp;<br>
<br>
As Julian and I said, a discovery session is just an <br>
iSCSI protocol-ism that simply isn't related to an <br>
I_T nexus.<br>
--<br>
Mallikarjun<br>
<br>
Mallikarjun Chadalapaka<br>
Networked Storage Architecture<br>
Network Storage Solutions<br>
Hewlett-Packard MS 5668 <br>
Roseville CA 95747<br>
cbm@rose.hp.com<br>
<br>
<br>
----- Original Message ----- <br>
From: &quot;mphaneen&quot; &lt;mphaneen@npd.hcltech.com&gt;<br>
To: &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;; &quot;Julian Satran&quot;
&lt;Julian_Satran@il.ibm.com&gt;<br>
Cc: &lt;ips@ece.cmu.edu&gt;<br>
Sent: Monday, April 28, 2003 7:16 PM<br>
Subject: Re: iSCSI: ISID RULE and Discovery sessions<br>
<br>
<br>
&gt; Hi,<br>
&gt; &nbsp; &nbsp; *If* ISID RULE does not apply to Discovery session,
then<br>
&gt; I believe, the ISID information is immaterial for the Discovery session.<br>
&gt; And thus I propose, an ISID need not be generated for a Discovery<br>
&gt; session at all.<br>
&gt; <br>
&gt; &nbsp; &nbsp; Regards<br>
&gt; &nbsp; &nbsp; Phani<br>
&gt; <br>
&gt; Phaneendra. M<br>
&gt; Member Technical Staff<br>
&gt; HCL TECHNOLOGIES LTD.<br>
&gt; Chennai, India.<br>
&gt; Phone: +91 044 23728366 extn: 1135<br>
&gt; <br>
&gt; Visit us at:<br>
&gt; http://www.hcltech.com/san<br>
&gt; <br>
&gt; <br>
&gt; ----- Original Message -----<br>
&gt; From: &quot;Mallikarjun C.&quot; &lt;cbm@rose.hp.com&gt;<br>
&gt; To: &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;<br>
&gt; Cc: &lt;ips@ece.cmu.edu&gt;<br>
&gt; Sent: Monday, April 28, 2003 11:16 PM<br>
&gt; Subject: Re: iSCSI: ISID RULE and Discovery sessions<br>
&gt; <br>
&gt; <br>
&gt; &gt; Julian,<br>
&gt; &gt;<br>
&gt; &gt; &gt;or another<br>
&gt; &gt; &gt; discovery session with the same InitiatorName and Isid.<br>
&gt; &gt;<br>
&gt; &gt; This may be hard to specify and also to implement. &nbsp;The
question that<br>
&gt; comes<br>
&gt; &gt; up will be - to the same target network entity or to the same
target node?<br>
&gt; &gt; There may be concurrent discovery sessions attached to just one
specific<br>
&gt; &gt; TargetName as well within that network entity, and I presume
we don't want<br>
&gt; &gt; to bring them down when a new entity-level discovery session
is<br>
&gt; instantiated.<br>
&gt; &gt;<br>
&gt; &gt; My preference is to just not apply the ISID RULE in any scope
to the<br>
&gt; &gt; discovery sessions. &nbsp;There's no logical correctness issue
in any case with<br>
&gt; them.<br>
&gt; &gt;<br>
&gt; &gt; If we agree that it's the reasonable thing to do, it might be
useful to<br>
&gt; add<br>
&gt; &gt; the following text to 12.21 (&quot;SessionType&quot;), if doing
so is possible<br>
&gt; anymore.....<br>
&gt; &gt; (David? &nbsp;Or is it something that has to wait for getting
in to the command<br>
&gt; &gt; ordering draft? )<br>
&gt; &gt;<br>
&gt; &gt; &quot;A discovery session is an iSCSI-level protocol construct
and so is not<br>
&gt; &gt; &nbsp;an I_T nexus. &nbsp;The &quot;ISID RULE&quot; stated in
section 3.4.3 is thus not<br>
&gt; applicable<br>
&gt; &gt; &nbsp;to discovery sessions.&quot;<br>
&gt; &gt;<br>
&gt; &gt; Thanks.<br>
&gt; &gt; --<br>
&gt; &gt; Mallikarjun<br>
&gt; &gt;<br>
&gt; &gt; Mallikarjun Chadalapaka<br>
&gt; &gt; Networked Storage Architecture<br>
&gt; &gt; Network Storage Solutions<br>
&gt; &gt; Hewlett-Packard MS 5668<br>
&gt; &gt; Roseville CA 95747<br>
&gt; &gt; cbm@rose.hp.com<br>
&gt; &gt;<br>
&gt; &gt; ----- Original Message -----<br>
&gt; &gt; From: &quot;Julian Satran&quot; &lt;Julian_Satran@il.ibm.com&gt;<br>
&gt; &gt; To: &quot;Pittman, Joseph&quot; &lt;Joseph.Pittman@netapp.com&gt;<br>
&gt; &gt; Cc: &lt;cbm@rose.hp.com&gt;; &lt;csapuntz@cisco.com&gt;; &quot;dl-iscsi-eng&quot;<br>
&gt; &lt;dl-iscsi-eng@netapp.com&gt;; &lt;efri@sangate.com&gt;;<br>
&gt; &gt; &lt;ips@ece.cmu.edu&gt;; &quot;Kalman Meth&quot; &lt;meth@il.ibm.com&gt;;
&lt;ips@ece.cmu.edu&gt;<br>
&gt; &gt; Sent: Saturday, April 26, 2003 12:44 AM<br>
&gt; &gt; Subject: Re: iSCSI: ISID RULE and Discovery sessions<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; &gt; It is true that &nbsp;in the discovery session the initiator
does not have to<br>
&gt; &gt; &gt; specify a TargetName as &nbsp;the purpose of the discovery
session was to<br>
&gt; &gt; &gt; discover the targets.<br>
&gt; &gt; &gt; As such the discovery session is technically a session with
the &quot;iSCSI<br>
&gt; &gt; &gt; Node&quot; and the only thing that can bring it down is
logout or another<br>
&gt; &gt; &gt; discovery session with the same InitiatorName and Isid.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Regards,<br>
&gt; &gt; &gt; Julo<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; &quot;Pittman, Joseph&quot; &lt;Joseph.Pittman@netapp.com&gt;<br>
&gt; &gt; &gt; 25/04/03 21:08<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; To<br>
&gt; &gt; &gt; Julian Satran/Haifa/IBM@IBMIL, Kalman Meth/Haifa/IBM@IBMIL,<br>
&gt; &gt; &gt; &lt;csapuntz@cisco.com&gt;, &lt;efri@sangate.com&gt;, &lt;cbm@rose.hp.com&gt;,<br>
&gt; &gt; &gt; &lt;ips@ece.cmu.edu&gt;<br>
&gt; &gt; &gt; cc<br>
&gt; &gt; &gt; &quot;dl-iscsi-eng&quot; &lt;dl-iscsi-eng@netapp.com&gt;<br>
&gt; &gt; &gt; Subject<br>
&gt; &gt; &gt; iSCSI: ISID RULE and Discovery sessions<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; iSCSI specification authors and experts,<br>
&gt; &gt; &gt; My name is Joe Pittman, an engineering at Network Appliance.<br>
&gt; &gt; &gt; My group has implemented an iSCSI target based on draft
20<br>
&gt; &gt; &gt; of the iSCSI specification.<br>
&gt; &gt; &gt; During interoperability testing, we have encountered an
initiator<br>
&gt; &gt; &gt; (Cisco Linux initiator from SourceForge), whose implementers
have<br>
&gt; &gt; &gt; interpreted the ISID RULE differently from the NetApp target<br>
&gt; &gt; &gt; implementation. &nbsp;I need an authoritative ruling on
the applicability<br>
&gt; &gt; &gt; of the ISID RULE for Discovery sessions.<br>
&gt; &gt; &gt; The ISID RULE states the following (draft-ietf-ips-iscsi-20.txt,<br>
&gt; &gt; &gt; section 3.4.3):<br>
&gt; &gt; &gt; &nbsp; &nbsp;ISID RULE: Between a given iSCSI Initiator
and iSCSI Target Portal<br>
&gt; &gt; &gt; &nbsp; &nbsp;Group (SCSI target port), there can only be
one session with a given<br>
&gt; &gt; &gt; &nbsp; &nbsp;value for ISID that identifies the SCSI initiator
port.<br>
&gt; &gt; &gt; Consider the case where an initiator {InitiatorName X, ISID
I} has<br>
&gt; &gt; &gt; created a Discovery session to a target. &nbsp;Then, without
terminating<br>
&gt; &gt; &gt; this session via LOGOUT, the same initiator {X,I} creates
a new<br>
&gt; &gt; &gt; Normal session to the same target, at the same target portal.
&nbsp;The<br>
&gt; &gt; &gt; question is, should the target terminate the existing Discovery<br>
&gt; &gt; &gt; session in order to enforce the ISID RULE?<br>
&gt; &gt; &gt; Because there is no mention of Discovery sessions vs. Normal
sessions<br>
&gt; &gt; &gt; in the ISID RULE section, my interpretation of the specification<br>
&gt; &gt; &gt; was that the existing Discovery session MUST be terminated.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; But one of the authors of the Cisco Linux initiator interpreted<br>
&gt; &gt; &gt; the specification differently. &nbsp;Here is an excerpt
from an e-mail<br>
&gt; &gt; &gt; message describing his logic:<br>
&gt; &gt; &gt; &gt; Discovery sessions don't have TargetNames, and the
implicit logout<br>
&gt; &gt; &gt; &gt; only occurs when the InitiatorName, ISID, and TargetName
all match.<br>
&gt; &gt; &gt; &gt; It should thus be impossible for a normal session to
logout a<br>
&gt; &gt; &gt; &gt; discovery session, since the TargetNames for the two
sessions can<br>
&gt; &gt; &gt; &gt; never match. &nbsp;I think your target has a bug.<br>
&gt; &gt; &gt; &gt;<br>
&gt; &gt; &gt; &gt; Discovery sessions don't really connect to a particular
iSCSI<br>
&gt; &gt; &gt; &gt; target. &nbsp;It's more a connection to the iSCSI Node
as a whole.<br>
&gt; &gt; &gt; &gt; Normal sessions connect to particular iSCSI targets.
&nbsp;This should<br>
&gt; &gt; &gt; &gt; keep the two session types from conflicting, even if
the ISIDs<br>
&gt; &gt; &gt; &gt; are the same.<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; So, will one of you authors rule on this disagreement? &nbsp;I
am<br>
&gt; &gt; &gt; eager to fix my bug, if my interpretation was in error.<br>
&gt; &gt; &gt; One followup question:<br>
&gt; &gt; &gt; Also, if the Cisco interpretation is correct, then does
the ISID<br>
&gt; &gt; &gt; rule apply to two Discovery sessions? &nbsp;That is, if
the target<br>
&gt; &gt; &gt; receives a second Discovery session while the first Discovery<br>
&gt; &gt; &gt; session is still active, MUST the target terminate the first<br>
&gt; &gt; &gt; Discovery session in order to enforce the ISID RULE?<br>
&gt; &gt; &gt;<br>
&gt; &gt; &gt; Thanks in advance for any help you can provide.<br>
&gt; &gt; &gt; --<br>
&gt; &gt; &gt; Joe Pittman<br>
&gt; &gt; &gt; jpittman@netapp.com<br>
&gt; &gt; &gt;<br>
&gt; <br>
&gt; <br>
</font>
<p>
--=_alternative 0047842EC2256D18_=--
