Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing network storage protocol stack based on iSCSI

A network storage and protocol stack technology, applied in the new storage technology-iSCSI technology field, can solve the problems of short transmission distance and small number of connected devices.

Inactive Publication Date: 2013-10-23
CHANGCHUN YISHEN SOFTWARE
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Shortcomings of small computer system interface (SCSI) protocol short transmission distance and few connected devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network storage protocol stack based on iSCSI
  • Method for realizing network storage protocol stack based on iSCSI
  • Method for realizing network storage protocol stack based on iSCSI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described below in conjunction with accompanying drawing and specific embodiment:

[0040]iSCSI (that is, iSCSI over IP) is an iSCSI protocol that can run on an IP network, that is, the iSCSI command is encapsulated in TCP and transmitted in the IP network. The format of the encapsulated command is as follows: figure 1 shown. The initiator (iniator) and the target (target) are connected through the TCP / IP protocol stack, and control information, iSCSI commands, parameters and data are transmitted through the TCP connection. The core task of iSCSI is to encapsulate the command description block (Command Descriptor Block CDB) on the TCP / IP network to form the iSCSI Protocol Data Unit (Protocol Data Unit PDU) and reliably transmit the CDB and corresponding data at the source and destination.

[0041] The iSCSI protocol defines the rules and methods for sending and receiving block-level storage data in the TCP / IP network. The workflow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method for realizing a network storage protocol stack based on an iSCSI includes: storing an IP in an IP network and transmitting block-level data so that a server is capable of connecting SCSI devices through the IP network; and network connection is based on the IP and an Ethernet and the iSCSI is one of two principal methods for transmission of storage data through the IP network. The iSCSI is mainly operated on the prior Ethernets. Generation technical backgrounds, realization principles, a realization method and advantages of the iSCSI and newest development of network storage technologies are introduced. Keywords: network storage; iSCSI protocol; TCP / IP; protocol SAN.

Description

Technical field: [0001] The invention belongs to the field of network storage, and in particular relates to a new storage technology-iSCSI technology. Background technique: [0002] Provide security protection for disk static data in IP SAN. The system implements data flow control at the back end through the virtualization of storage devices and hosts. We implemented the iSCSI protocol stack, solved the analysis and encryption of business data in IP data packets, and ensured complete transparency to the client. The system encrypts SCSI commands and data files as a whole, and the files in the storage device are garbled files. Even if the disk device is stolen, the data cannot be leaked. Deleting the key is equivalent to deleting the data, reducing the physical damage to the disk media caused by formatting. [0003] SecureSAN system, the system is an enterprise-level network storage encryption system that operates in the back-end encryption mode. It implements a SAN network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
Inventor 申庆辉徐学东季才伟李沐源苏纪元
Owner CHANGCHUN YISHEN SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products