Solved

SAN topologies with Fibre Channel links

Posted on 2010-08-16
6
1,432 Views
Last Modified: 2013-11-14
Hi!

I don´t know much about Fibre Channel, but I have to create a SAN network with Fibre Channel links between EVA4400, libraries and other equipment, between two Data Centers by using SAN FC switches (HP Brocade or Cisco). Can I think of it as if they were ethernet links? I mean...is there loop control and prevention like Spanning Tree in case I connect the SAN FC switches where loops are created? Where can I get a good tutorial about FC topologies and best practices?

Thank you.
0
Comment
Question by:asanchgo
6 Comments
 
LVL 11

Accepted Solution

by:
Coast-IT earned 42 total points
Comment Utility
I have a good page bookmarked for my EVA configs, its a bit slow, give it a go ;

http://www.fcoe.ru/index.php?option=com_content&task=view&id=220&Itemid=54&lang=english
0
 
LVL 30

Assisted Solution

by:Duncan Meyers
Duncan Meyers earned 42 total points
Comment Utility
>Can I think of it as if they were ethernet links? I mean...is there loop control and prevention like Spanning Tree in case I connect the SAN FC switches where loops are created? Where can I get a good tutorial about FC topologies and best practices?

No - Fibre Channel is a very different beast to Ethernet. There is no notion on Spanning Tree (a Fibre Channel Fabric calculates a Fabric Shortest Path First switching route through a fabric from source to destination) and loops cannot exist.

You'll most likely interconnect the two SANs via either a dedicated fibre link or using FCIP (Fibre Channel over IP) appliances.

You can find good tutorials about Fibre Channel here:
http://www.iol.unh.edu/services/testing/fc/training/

CERN - who invented FC in the first place - had a good tutorial, too, but I'm struggling to find it. SNIA usually has some good stuff too: http://www.snia.org and http://www.snia.org/education/tutorials/2007/spring/



0
 
LVL 30

Expert Comment

by:Duncan Meyers
Comment Utility
Bingo! Found it: http://hsi.web.cern.ch/HSI/fcs/spec/overview.htm

So they're doing useful stuff on top of running the Large Hadron Collider and sucking the world into a singularity...  :-)

http://www.cyriak.co.uk/lhc/lhc-webcams.html
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 41 total points
Comment Utility
Two HP resources you can use, www.hp.com/storage/spock - you'll need to create a free account. Tells you what firmware/driver combinatons are supported. HP's SAN design guide, the Bible for HP storage engineers, topologies are on about page 30 to 40,  http://h20000.www2.hp.com/bc/docs/support/SupportManual/c00403562/c00403562.pdf

Oh, and if you want to know about root bridges just look at the picture ;)
http://www.igreenspot.com/wp-content/uploads/live-root-bridge3.jpg

0
 

Author Comment

by:asanchgo
Comment Utility
Thank you very much all for your responses, they will really help me (now I have to read a little bit :) ).
0
 
LVL 30

Expert Comment

by:Duncan Meyers
Comment Utility
Thanks! Glad I could help.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Netapp Snapshots 3 44
Cisco Switch Password ---Urgent 3 37
Problem - Database Storage 4 40
cisco switch stacking 6 29
Hi, I've made you some graphics for a better understanding how RAID works. First of all, there are two ways a raid can be generated: - By hardware - By software What does that mean? This means: If you have a hardware RAID controller, there…
I previously wrote an article addressing the use of UBCD4WIN and SARDU. All are great, but I have always been an advocate of SARDU. Recently it was suggested that I go back and take a look at Easy2Boot in comparison.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now