2004
DOI: 10.17487/rfc3721
|View full text |Cite
|
Sign up to set email alerts
|

Internet Small Computer Systems Interface (iSCSI) Naming and Discovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2004
2004
2014
2014

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…An initiator may discover the iSCSI Target Names to which it has access, along with their addresses, using the SendTargets Text Request, or other techniques discussed in [RFC3721].…”
Section: Iscsi Namesmentioning
confidence: 99%
See 2 more Smart Citations
“…An initiator may discover the iSCSI Target Names to which it has access, along with their addresses, using the SendTargets Text Request, or other techniques discussed in [RFC3721].…”
Section: Iscsi Namesmentioning
confidence: 99%
“…Although [RFC3721] implies an SLP ( [RFC2608]) implementation requirement, SLP has not been widely implemented or deployed for use with iSCSI in practice. iSCSI implementations therefore SHOULD NOT rely on SLP-based discovery interoperability.…”
Section: Iscsi Namesmentioning
confidence: 99%
See 1 more Smart Citation
“…This may be done either by pointing the component to a vendor-specific location for this datum or to a system-wide location. The structure of the ISID namespace (see Section 10.12.5 ISID and [RFC3721]) facilitates implementation of the ISID coordination by allowing each component vendor to independently (of other vendor's components) coordinate allocation, use, and reuse of its own partition of the ISID namespace in a vendor-specific manner. Partitioning of the ISID namespace within initiator portal groups managed by that vendor allows each such initiator portal group to act independently of all other portal groups when selecting an ISID for a login; this facilitates enforcement of the ISID RULE (see Section 3.4.3 Consequences of the Model) at the initiator.…”
Section: Iscsi Name Isid and Tpgt Usementioning
confidence: 99%
“…A Login Request with the C bit set to 1 MUST have the T bit set to 0. This is an initiator-defined component of the session identifier and is structured as follows (see [RFC3721] and Section 9.1.1 Conservative Reuse of ISIDs for details):…”
Section: ---------------+---------------+---------------+------------mentioning
confidence: 99%