Solved

Difference between WWNN & WWPN

Posted on 2008-06-13
3
7,553 Views
Last Modified: 2013-11-14
Can anyone explain me the difference between WWPN and WWNN?
0
Comment
Question by:Kumar_Nachiketa
  • 2
3 Comments
 
LVL 30

Accepted Solution

by:
Duncan Meyers earned 500 total points
ID: 21784120
A WWNN (World Wide Node Name) is physically burnt to a Fibre Channel device such as a FC HBA or storage array. The WWNs are administred by the IEEE in much the same way as a MAC address is - the first few octets are assigned to a manufacturer, the rest is arbitrary. The WWPN (World Wide Port Name) is generated from the WWNN by the Fibre Channel fabric when the device logs into the fabric. Generally, it is usually set by changing one bit in the manufacturer's section of the WWNN. For example, a QLogic HBA WWNN starts with 20:00:... The asssigned WWPN is 21:00:...

This is the best overview of Fibre Channel out there - and it's by the guys who invented the protocol (CERN is the European Centre for Nuclear Research):

http://hsi.web.cern.ch/HSI/fcs/fcs.html and
http://hsi.web.cern.ch/HSI/fcs/spec.htm and
http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm
0
 

Author Closing Comment

by:Kumar_Nachiketa
ID: 31467130
Thnaks for the solution.
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 21787027
Thanks! Glad I could help.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A bootable USB key can be very handy now-a-days. My favorite USB key consists of our Windows 7 image, network card drivers (to connect up to a Ghost server), the latest BIOS updates for all of our PCs and CopyWipe (to erase a retired PC) Creating…
We all have limited time to study long and complicated information about RAID theories, but you may be interested as to how RAID 5 works. We made it simple for you by providing the shortest and easiest explanation ever.   First we need to remind …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now