Solved

Is iSCSI Reliable?

Posted on 2013-05-29
4
524 Views
Last Modified: 2013-06-03
I was asked if iSCSI is reliable? Compared to fiber channel or fiber channel over ethernet
What makes it reliable or unreliable? What are advantages/disadvantages to fiber channel?
0
Comment
Question by:fireguy1125
  • 2
4 Comments
 
LVL 4

Assisted Solution

by:iammorrison
iammorrison earned 250 total points
ID: 39206628
iscsi is reliable, but requires hefty network bandwidth and for best performance, may require trunking (or bundling) of ports for optimal throughout. It is also good practice to setup CHAP authentication to protect that data as it crosses the network. Fiber channel is my preferred method, as it is fast and secure, but it is expensive. More often than not, you would require a fiber switch to connect the fabric to your hosts (unless you had a certain series of blade chassis).
0
 
LVL 30

Accepted Solution

by:
pgm554 earned 250 total points
ID: 39206632
Is iSCSI is reliable?yup


What are advantages/disadvantages to fiber channel?

 fibre can go longer lengths without a repeater and it does not have the overhead of tcp/ip as a protocol.

It is also faster and can be made redundant through fibre channel arbitrated loop

Fibre is more expensive to implement,while TP copper is not.

If you want hands down state of the art ,fibre.
If you want good solid performance at a price point,iscsi.
0
 
LVL 1

Author Comment

by:fireguy1125
ID: 39209671
thanks, what would be the overhead with tcp/ip?
0
 
LVL 30

Expert Comment

by:pgm554
ID: 39209704
Depends.
If you use what is referred to as jumbo packets,you can get a pretty good throughput on a GIGe network,but all network devices must support the size frame you set.

http://pic.dhe.ibm.com/infocenter/iseries/v7r1m0/index.jsp?topic=%2Frzahq%2Fmtuconsiderations.htm

http://www.youtube.com/watch?v=Sylnsg4jQ0s
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Vlan to Vlan communication 9 102
Symantec replaced by VEEAM 6 64
Drivers  Repository for Win 7 13 56
Non-jumbo host to jumbo enabled switch: Will it work? 3 15
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now