Chapter 8


1

Name the three types of iSCSI names.

Answer:

IQN, EUI and NAA.

2

Why does RFC 3720 encourage the reuse of ISIDs?

Answer:

To promote initiator SCSI port persistence for the benefit of applications and to facilitate target recognition of initiator SCSI ports in multi-path environments.

3

What key feature does iSNS support that SLP does not support?

Answer:

RSCN.

4

In the context of iSCSI, what is the difference between immediate data and unsolicited data?

Answer:

Immediate data is sent in the SCSI Command PDU, whereas unsolicited data accompanies the SCSI Command PDU in a separate Data-Out PDU.

5

What is the function of the iSCSI R2T PDU?

Answer:

The iSCSI target signals its readiness to receive write data via the R2T PDU.

6

Can security parameters be re-negotiated during an active iSCSI session?

Answer:

No.

7

Why must iSCSI use its own CRC-based digests?

Answer:

Because the TCP checksum cannot detect all bit errors.

8

Does iSCSI support stateful recovery of active tasks in the presence of TCP connection failures?

Answer:

Yes.

9

Does FCP natively support the exchange of all required operating parameters to establish a new session?

Answer:

No. FCP relies on SCSI Mode commands for the exchange of certain operating parameters.

10

Does FCP support immediate data?

Answer:

No.

11

How many bytes long is the FCP_DATA IU header?

Answer:

Zero. The receiver uses only the FC Header to identify an FCP_DATA IU, and ULP data is directly encapsulated in the Data field of the FC frame.

12

What is the name of the FC-4 link service defined by the FCP-3 specification?

Answer:

Sequence Retransmission Request (SRR).

13

FCP mandates a one-to-one relationship between which two data constructs?

Answer:

IUs and sequences.

14

When an FCP target that supports only Exchange level error recovery detects a frame error, what action does the target take?

Answer:

The FCP target discards all frames associated with the Exchange. The target takes no further action and waits for the initiator to detect the error via timeout.

15

What determines the functional model of an FC-BB device?

Answer:

The type of non-FC network to which the FC-BB device connects.

16

How many FC Entities may be paired with an FCIP Entity?

Answer:

One.

17

Does the FCIP addressing scheme map to the SAM addressing scheme?

Answer:

No.

18

Why must the FC frame delimiters be encapsulated for transport across FC backbone networks?

Answer:

Because they serve several purposes rather than merely delimiting the start and end of each FC frame.

19

Which field in the FSF may be set to zero for the purpose of discovery?

Answer:

The Destination FC Fabric Entity WWN field.

20

What procedure begins after an FCIP link becomes fully active?

Answer:

The FC switch-to-switch extended link initialization procedure.

21

Why must jumbo frames be supported end-to-end if they are implemented?

Answer:

To avoid excessive fragmentation.




Storage Networking Protocol Fundamentals
Storage Networking Protocol Fundamentals (Vol 2)
ISBN: 1587051605
EAN: 2147483647
Year: 2007
Pages: 196
Authors: James Long

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net