ISCSI Interview Questions & Answers

4 avg. rating (80% score) - 1 votes

ISCSI Interview Questions & Answers

Experienced in ISCSI? ISCSI means Internet Small Computer system Interface. It sits on top of TCP layer and allows communication to happen with SCSI commands over local area network, wide area network and intranet. It provides block-level access to storage devices by carrying the SCSI commands over a TCP/IP network. Microsoft iSCSI Initiator is a tool that connects external iSCSI-based storage to host computers with an Ethernet network adapter. Good hands on knowledge on the Iscsi will put you ahead in interview. Every where, we can find job opportunities for this position. Wisdomjobs has interview questions which are exclusively designed for employees to assist them in clearing interviews. ISCSI interview questions and answers are useful for employees who are good at ISCSI.

ISCSI Interview Questions

ISCSI Interview Questions
    1. Question 1. Which Technologies Will Merge?

      Answer :

      SAN projects don’t always demand a clear decision between iSCSI and Fibre Channel; combinations are also possible. Despite the many differences, communication is possible. On the hardware side, a connection requires an IP storage switch or bridge, or a router.

      The Internet Fibre Channel Protocol (iFCP) acts as a gateway between Fibre Channel and iSCSI because it provides NAT between FC and IP; that is, it maps FC addresses to IP addresses.

      FCIP (Fibre Channel over IP) allows FC SANs to be connected over IP networks by tunneling. The FC packets are encapsulated in TCP/IP.

    2. Question 2. What Are Typical Applications Supported By Iscsi?

      Answer :

      Primarily, business-critical enterprise applications at the department level, along with mission-critical applications of small and medium sized businesses. The most widespread examples are mail servers, databases, and other applications that regularly access databases, such as eCommerce applications. iSCSI provides a powerful connection for server virtualization solutions.

    3. Question 3. Which Customer Problems Does Iscsi Solve?

      Answer :

      iSCSI is mainly a good way to counter the uncontrolled proliferation of DAS servers and SAN islands in a company. The most important point in iSCSI favor is the cost savings potential arising from centralized management. However, iSCSI also offers all the other advantages of a SAN (better storage utilization, smaller backup windows, cluster support, snapshots for SQL and Exchange servers, long ranges) and costs much less than Fibre Channel.

    4. Question 4. Is It True That A Lot Of Additional Hardware Is Required To Get Iscsi Running? A Cost Factor?

      Answer :

      In fact, just the opposite is true. With iSCSI installations you can use a lot of existing Ethernet infrastructure, such as standard network cards or existing server systems. iSCSI initiators are available for free, for example from Microsoft, or even as Open Source software in the form of Open iSCSI. Additionally required components include, for example, hard disk systems or tape drives, but those aren’t needed for iSCSI itself, but for the intended functionality such as for backups. Compared to DAS systems or Fibre Channel SANs, iSCSI is a financially attractive solution.

    5. Question 5. What Kinds Of Iscsi Products Are Currently On The Market?

      Answer :

      There is an abundance of products and solutions on the market that are based on different drafts of the iSCSI specification. The most important ones are iSCSI targets, such as hard disk arrays, storage routers, storage switches and iSCSI initiators integrated into network adapters, and specific host bus adapters.

    6. Question 6. Are Pure Ip Sans (iscsi Sans) Or Fcip(fibre Channel Over Ip) Already Being Implemented?

      Answer :

      Yes, businesses today usually choose pure IP SANs with iSCSI in order to stay in a familiar, controllable environment. These SANs are often created in the course of consolidation projects, where DAS systems are replaced. FCIP is used in large companies, for example when FC SANs at different locations are connected via IP networks.

    7. Question 7. Which New Features/characteristics Will Drive The Adaptation Of Iscsi This Year?

      Answer :

      For many businesses, virtualization is a very high priority; iSCSI provides a suitable and cost-effective solution for that. In addition, most companies are trying to optimize their backups, which also argues for greater iSCSI acceptance.

    8. Question 8. How Does Iscsi Relate To Ip Storage Protocols Such As Ifcp (internet Fibre Channel Protocol)?

      Answer :

      Technically, iSCSI and iFCP are not very far apart. The principle of iSCSI is that SCSI commands are embedded in IP packets. iFCP works very similarly - at its core, SCSI commands are at work, which are transmitted over an IP network. The difference is at Layer Four of the protocol stack. With iFCP, this layer of the Fibre Channel stack is retained, allowing the use of management applications for Fibre Channel networks with iFCP.

      iFCP and also FCIP are used to connect SANs to each other. In contrast to iFCP, FCIP creates a tunnel between FC SANs.

    9. Question 9. What Kinds Of Storage Data Traffic Are Transmitted Via Iscsi?

      Answer :

      ISCSI offers block-based data transmission, for example for backups, databases, snapshots, remote boot, virtualization, disaster recovery, mirroring, and much more.

    10. Question 10. Fibre Channel Is Already Designed To Transmit Iscsi Commands Via Switched Network Fabrics. So Why Should I Bother With Iscsi?

      Answer :

      If you prefer a unified network infrastructure and want to save money, there’s no way around iSCSI. Another advantage is that it’s easy to administrate with familiar management tools.

    11. Question 11. Is It True That Ip Sans Require You To Take A Very Close Look At The Issue Of “security”?

      Answer :

      Of course, after all we’re talking about storing valuable company data. On the one hand, data security is important; that is, ensuring backups, replication, snapshots etc. On the other hand, access to this data must also be strictly regulated. The necessary functionalities are, of course, available for iSCSI, for example IPSec, VPNs, CHAP, VLANs.

    12. Question 12. What Is An Iscsi Initiator?

      Answer :

      An initiator is an iSCSI client. Initiators typically have the same tasks as a SCSI host bus adapter. The difference is that iSCSI initiators don’t connect SCSI devices (such as hard disks or tape changers) physically via cables. iSCSI initiators send commands over IP networks. There are two kinds of initiators: software and hardware iSCSI initiators.

    13. Question 13. What Is The Aim Of Iscsi?

      Answer :

      iSCSI is the industry standard for data transfer over Ethernet-based networks in IP-based storage networks. iSCSI systems use the existing Ethernet infrastructure to transfer SCSI commands over IP. Because IP based networks are available everywhere, iSCSI can be used to transfer data in LANs or WANs, enabling location-independent data storage and recovery.

    14. Question 14. How Do Hardware And Software Initiators Affect The Performance Of Applications?

      Answer :

      If an application accesses a large number of small files frequently (e.g. a heavily utilized OLTP database), this may result in the iSCSI initiator using up to 25% of CPU capacity. In such cases a, hardware iSCSI initiator (or iSCSI HBA) would possibly become necessary, although a TNIC might still suffice.

    15. Question 15. How Does Iscsi Interoperability Compare To Fibre Channel Interoperability?

      Answer :

      Both technologies are so mature that interoperability between most manufacturers has already been verified or certified.

    16. Question 16. What Is The Difference Between Iscsi And Fibre Channel?

      Answer :

      iSCSI is the transfer of SCSI commands over IP (Internet Protocol) networks, whereas Fibre Channel is the transfer of network and storage protocols (e.g. SCSI or IP) over fibre-optic or copper cables. Therefore iSCSI uses established network infrastructures to create an IP SAN, whereas with Fibre Channel, additional infrastructure must be purchased in order to create a SAN.

    17. Question 17. Disadvantages Of Iscsi?

      Answer :

      The main obstacle to the spread of Ethernet as the basic technology of building storage area networks is the relatively long delay time (close to 75 microseconds), which arises due to the peculiarities of the TCP / IP stack. In High-End systems, with simultaneous access to thousands of files, this can be a serious problem.

    18. Question 18. Advantages Of Iscsi?

      Answer :

      The advantages of iSCSI include:

      • Consolidating Storage Systems
      • Data backup
      • Server clustering
      • Replication
      • Emergency recovery
      • Geographical distribution of SANs
      • QoS
      • Security

    19. Question 19. What Is Iscsi Architecture?

      Answer :

      The server can be implemented both programmatically and hardware. The software implementation receives requests over the network, processes them, reads (writes) the necessary data to the media, and returns the information (result) back over the network. Since these operations take a significant amount of CPU time for high-intensity requests, iSCSI HBAs (adapters) have been created that combine an Ethernet network card and a SCSI controller.

      iSCSI works at the block level. The object to which access is granted is the data area interpreted by the initiator as a block device (disk). Access is exclusive (with the exception of specially designed file systems and file systems in read-only mode). The responsibility to create and maintain the file system rests with the initiator; the server (target, target) only serves low-level queries, similar to the requests that the disk driver serves when working with local disks.

      For addressing over the network, both the client and the server have their own addresses, which must be unique.

      Detection technology (discovery, auto-discovery) is used to discover the list of available devices on the iSCSI target (server). It is a service that listens on the tcp port (usually 3260) client requests and gives them a list of available targets. This service is called a portal (English portal).

      In addition to portals, iSNS (Internet storage name service) can also be used to find available targets.

    20. Question 20. Will Iscsi Replace Fibre Channel, In Your Opinion?

      Answer :

      No, Fibre Channel offers a very solid basis for secure and high performance storage solutions. iSCSI still suffers from the weakness that IP packets may be lost on the network and then have to be resent. If a network is overloaded, this may cause significant drops in performance.

    21. Question 21. When Should I Use Iscsi Instead Of Fibre Channel San?

      Answer :

      You should perhaps be asking the opposite question: When should I use Fibre Channel instead of iSCSI? You should use Fibre Channel if the requirements of your IT systems cannot be covered by iSCSI, for example if you have very high data traffic. Due to the FC protocol, FC offers lower data packet loss than iSCSI, which uses TCP/IP as a transfer protocol.

    22. Question 22. How Do The Characteristics Of Iscsi Storage Arrays Compare To The Characteristics Of Fibre Channel Arrays?

      Answer :

      Apart from the connection type, the characteristics of iSCSI and Fibre storage arrays are comparable. What’s interesting is to take a look at the features offered by the various manufacturers and array models: replication, backup/recovery, disaster recovery, redundancy, failover, price and performance.

    23. Question 23. How Does Iscsi Compare To Fibre Channel In Terms Of Security?

      Answer :

      Contrary to general opinion, FC SANs are no more secure than iSCSI SANs. Rather, FC installations have benefited indirectly from their complexity and their relative isolation in data centers. When comparing the two, it’s worth noting that iSCSI supports a pretty extensive list of security features, including Access Control Lists (ACLs), the IP Security Protocol (IPSec), the Challenge Handshake Authentication Protocol (CHAP) and the use of Virtual Private Networks (VPNs). Anytime an iSCSI SAN extends beyond the data center, the storage administrator must take the necessary steps to ensure secure access. The trick when it comes to iSCSI security is not to find the right tools for the job, but to use the best methods and make the most of the tools that already exist.

    24. Question 24. What Does Ipsec Mean?

      Answer :

      IPSec is an abbreviation of Internet Protocol Security. It provides a security architecture for communication over IP computer networks. This protection consists of ensuring confidentiality, authenticity and integrity.

    25. Question 25. What Does Iscsi Api Mean?

      Answer :

      ISCSI API is really called iSCSI Management API, and is a standardized interface that applications use in order to manage iSCSI HBAs, regardless of manufacture.

    26. Question 26. What About Iscsi Backups?

      Answer :

      iSCSI can be used to perform backups over the network. Typically, an iSCSI target is created, where a snapshot of the block device can be seen, and this block device is integrated into a backup server as write-protected. In this regard it should be noted that in order to perform the backup, the backup server must be able to read the iSCSI block device as a formatted disk with a file system (e.g. NTFS, XFS, EXT3).

    27. Question 27. How About Ip Storage And Disaster Recovery?

      Answer :

      Disaster recovery: organizations mirror storage resources from one data center to another, remote data center, where they can serve as a “hot standby” in the event of a prolonged outage. Specifically, iSCSI SANs allow you to migrate entire disk arrays over a WAN, with minimal configuration changes, so that storage traffic can be routed in the same way as network traffic.

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Internet Protocol version 6 (IPv6) Tutorial