White Papers

BP1028 EqualLogic iSCSI for Fibre Channel Professionals ii
Contents
1 Overview ............................................................................................................................................................. 2
2 Audience ............................................................................................................................................................. 2
3 Fibre Channel and iSCSI basic comparison .................................................................................................. 3
4 Fabric architecture comparison ..................................................................................................................... 4
4.1 Network congestion and prevention ..................................................................................................... 4
4.2 Packet and frame size............................................................................................................................... 5
4.3 SAN topologies and interconnects ........................................................................................................ 5
5 Host adapters/interface card comparison ..................................................................................................... 7
5.1 FC host bus adapters ................................................................................................................................. 7
5.2 iSCSI network interface cards .................................................................................................................. 7
6 Storage array architecture comparison ........................................................................................................ 8
6.1 Fibre Channel arrays ................................................................................................................................. 8
6.2 EqualLogic PS Series arrays ..................................................................................................................... 9
7 Security concept comparison ........................................................................................................................12
8 Storage management ......................................................................................................................................13
9 Conclusion ....................................................................................................................................................... 14
Appendix A Common terminology ................................................................................................................. 15
Appendix B Related publications .................................................................................................................... 16