O'Reilly logo

iSCSI: The Universal Storage Connection by John L. Hufferd

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

6. Text Commands and Keyword Processing

To the Reader

Image

This chapter contains very detailed information concerning how text commands and key=value pairs are negotiated. If you are not interested in the details of this process, skip to the chapter summary.

The iSCSI protocol includes a method to send non-SCSI commands from the initiator to the target. It also has a technique for negotiating values between the two sides. This is the same process and negotiating routine that is part of the login process—even the syntax is the same. (See Chapter 5, the section Keywords and the Login Process.)

Text Requests and Responses

The Text Request ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required