Solved

Difference between WWNN & WWPN

Posted on 2008-06-13
3
7,642 Views
Last Modified: 2013-11-14
Can anyone explain me the difference between WWPN and WWNN?
0
Comment
Question by:Kumar_Nachiketa
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
Duncan Meyers earned 500 total points
ID: 21784120
A WWNN (World Wide Node Name) is physically burnt to a Fibre Channel device such as a FC HBA or storage array. The WWNs are administred by the IEEE in much the same way as a MAC address is - the first few octets are assigned to a manufacturer, the rest is arbitrary. The WWPN (World Wide Port Name) is generated from the WWNN by the Fibre Channel fabric when the device logs into the fabric. Generally, it is usually set by changing one bit in the manufacturer's section of the WWNN. For example, a QLogic HBA WWNN starts with 20:00:... The asssigned WWPN is 21:00:...

This is the best overview of Fibre Channel out there - and it's by the guys who invented the protocol (CERN is the European Centre for Nuclear Research):

http://hsi.web.cern.ch/HSI/fcs/fcs.html and
http://hsi.web.cern.ch/HSI/fcs/spec.htm and
http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm
0
 

Author Closing Comment

by:Kumar_Nachiketa
ID: 31467130
Thnaks for the solution.
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 21787027
Thanks! Glad I could help.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question