Solved

Difference between WWNN & WWPN

Posted on 2008-06-13
3
7,818 Views
Last Modified: 2013-11-14
Can anyone explain me the difference between WWPN and WWNN?
0
Comment
Question by:Kumar_Nachiketa
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
Duncan Meyers earned 500 total points
ID: 21784120
A WWNN (World Wide Node Name) is physically burnt to a Fibre Channel device such as a FC HBA or storage array. The WWNs are administred by the IEEE in much the same way as a MAC address is - the first few octets are assigned to a manufacturer, the rest is arbitrary. The WWPN (World Wide Port Name) is generated from the WWNN by the Fibre Channel fabric when the device logs into the fabric. Generally, it is usually set by changing one bit in the manufacturer's section of the WWNN. For example, a QLogic HBA WWNN starts with 20:00:... The asssigned WWPN is 21:00:...

This is the best overview of Fibre Channel out there - and it's by the guys who invented the protocol (CERN is the European Centre for Nuclear Research):

http://hsi.web.cern.ch/HSI/fcs/fcs.html and
http://hsi.web.cern.ch/HSI/fcs/spec.htm and
http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm
0
 

Author Closing Comment

by:Kumar_Nachiketa
ID: 31467130
Thnaks for the solution.
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 21787027
Thanks! Glad I could help.
0

Featured Post

10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
When we purchase storage, we typically are advertised storage of 500GB, 1TB, 2TB and so on. However, when you actually install it into your computer, your 500GB HDD will actually show up as 465GB. Why? It has to do with the way people and computers…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question