Feeds

IBM zEnterprise 196 mainframe due July 22

Mainframe-blade interconnect

Internet Security Threat Report 2014

The System z11 mainframe announcement date has been set for July 22, as expected, and Rod Adkins, general manager of IBM's Systems and Technology Group, and Steve Mills, general manager of Software Group, will host a shindig in New York debuting Big Blue's so-called "system of systems."

As El Reg already reported, the System z11 machine will sport 96 cores and give about 80 of them over to running either z/OS or Linux in a single system image (rated at around 50,000 aggregate MIPS by our math) or allow them to be carved up into logical partitions with somewhere around 1,100 MIPS per core.

The System z11 machines, variously known as the z11 or zNext as placeholder names, will be called the zEnterprise 196, according to sources familiar with IBM's plans. And, yes that's zEnterprise 196 — without the characteristic slash used in IBM mainframe names since a lot of us were babies and before some of you were born.

As El Reg told you back in May, the new mainframe will sport Power7 blades for running AIX and x64 blades for running Linux and maybe Windows, and hence the name "system of systems" that Adkins has been using. What's not yet clear is how IBM is lashing the Power and x64 blades to the mainframe's central electronics complex.

Some stories out there are talking about the mainframe, Power, and x64 machines sharing memory, but this is nonsense. IBM could, in theory, make a memory appliance that is an analog to a storage area network (SAN) for disk-based storage, allowing for these three different servers to grab a partition of DDR3 memory to run their workloads. A fast bus for linking processors to memory could be used as a Virtual LAN network, too, between the machines, which IBM has done for logical partitions Power-based servers for years now.

Shared memory across different processor architectures may be something that happens in the future, but as far as I know, the z196 processor books (what we would call cell boards or system boards in other architectures) have one more socket than the existing z10 books and memory for the mainframe engines implemented on the books.

Here's what one anonymous source told us about the links between the z196 mainframe and its blades:

The new z11 will include a blade enclosure as part of the server. This enables x86 and Power blades to work in the same footprint as the mainframe — running Unix, Windows, Linux etc. The main mainframe unit and the blades will be managed via a shared Hardware Management Console (HMC) — workload management via a single interface. This new hybrid blade architecture has been code-named zGryphon.

Well, that zGryphon description gets us a little closer to understanding what IBM might be up to, but it doesn't really tell us how tightly the blades are coupled to the mainframes and what protocols they are using.

As I said last week, IBM was a big and early adopter of both Fibre Channel and InfiniBand and has used both, in that order, to provide remote I/O capabilities off its system motherboards to remote peripheral devices.

FICON on the mainframe is based on Fibre Channel, and the High-Speed Loop interconnect on Power systems is a tweak Fibre Channel link running at 2Gb/sec (HSL) or 4Gb/sec (HSL-2), and the 12X I/O links that Power5+, Power6, Power6+, and Power7 machines use is based on 20Gb/sec InfiniBand and link back into the GX+ system bus on the Power chips.

The simplest thing for IBM to do is to put a GX+ bus on the z11 engine and use InfiniBand coming right off the engine to talk to the Power and x64 blades. The Power blades already have their own GX+ ports, so IBM could create a private network between z11 and Power engines with existing electronics; it probably would be better to have a switch in the works, however, since x64 processors do not have GX+ ports.

No matter how IBM does it, one thing is clear: there is no way, given the security paranoia of mainframe shops, that the network that interfaces the mainframe engines and their associated Power and x64 blades to the outside world will be used to allow Power and x64 blades to talk back to the mainframes.

Big Blue will no doubt create a private network that only z/OS and maybe Linux running natively on the z196 server can see to lash the blades to the mainframes. It seems likely that in addition to this private communication network, IBM will also implement a private management network that includes the HMC console, which manages logical partitions on the mainframe and Power iron, which is all IBM code. Presumably the HMC will be able to run a management console for whatever x64 hypervisor IBM anoints. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.