What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?

InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols...

This Article Covers


InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols. For example, the SCSI command set can run on InfiniBand but the SCSI command set can also run on top of FC. iSCSI-carries the SCSI command set on IP (Ethernet). By comparison, SAS is an interface for attaching disk drives to servers, storage arrays to servers and to attach disk drives within storage arrays.

@30650 You can have a server with an InfiniBand host channel adapter (HCA) that attaches to an InfiniBand disk array. That InfiniBand connection can run SCSI, iSCSI or some other protocol. In turn, this can be talking to an array that has SAS disk drives attached to it. In a small environment, you might use SAS to attach a local SAS drive in a 1U blade server. Alternately, you might have SAS in a disk array coexisting with SATA drives. Otherwise, you might have network storage with iSCSI to access a disk array with SAS disk drives in it.

These technologies all work together in a complementary fashion even though they are typically positioned against each other. For example, you might hear an argument for InfiniBand vs. iSCSI the same way that FC is normally positioned against iSCSI -- they are apples and oranges. InfiniBand is an interface, so it should be compared to FC or Ethernet. Then, compare your protocols, such as iSCSI vs. "SCSI on FC" or "SCSI on InfiniBand." InfiniBand, SAS, iSCSI are all very much complementary.

Listen to the SAN FAQ audiocast here.

Go back to the beginning of the Storage Area Network FAQ Guide.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Networking hardware



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...