Feeds

QLogic's 3G CNA does three things at once

FCoE, iSCSI and IP at same time

Combat fraud and increase customer satisfaction

QLogic now has a third-generation network adapter that can run three network protocols at once, do virtual machine commas in a server, and deploy 1gigabit and 10 gigabit Ethernet ports from its single chip.

This chip with the chops is its third generation CNA (Converged Network Adaptor), built to handle both storage and Ethernet traffic travelling along a ten gigabit Ethernet cable. OT comes as a so-called cLOM (converged LAN on Motherboard) ASIC, an 8200 10GBe CNA card or a 3200 10GbitE Ethernet NIC (network interface card).

The 8200 product can be configured either as a quad-port 1gigE or dual-port 10gigE device.

All three products use the same ASIC chip, and the 3200 can be upgraded to an 8200 with a software key. This chip can run iSCSI storage traffic, Fibre Channel over Ethernet (FCoE) traffic, and ordinary internet traffic simultaneously. Unlike the previous generation product, it has a built-in TCP/IP offload engine which does TCP/IP processing in hardware, relieving the host CPU of the job and boosting iSCSI traffic speed by around 100 per cent.

QLogic understands that its bête noir, Emulex, cannot run three protocols at once on its universal CNA product.

With the 3G product, two virtual machines (VMs) in the host server can send messages to each other via Ethernet - which never actually leave the server. EMEA Marketing head for QLogic, Henrik Hansen, said: "Within the ASIC we have embedded a layer 2 Ethernet switch [and] can carve up the two physical ports into 4 NIC partitions or NPARs, which can each be assigned to a specific VM. There can be eight of them with dual-port product."

An Ethernet message from one VM to another in the same server goes to the QLogic ASIC and is switched back to the target VM. This is reminiscent of Emulex' VNIC feature.

The embedded switch makes the QLogic product switch-agnostic.

The new product technology supports a veritable alphabet soup of virtualisation standards: SR-IOV for Ethernet I/O virtualisation, NIV (Network I/O Virtualisation for Cisco), EVP (HP's virtualisation feature), VEPA - a top-of-rack virtualisation initiative, MP/IV inside FCoE, and RDMA for people using Ethernet in HPC environment.

Hansen said: "Encryption is also part of our 3G feature set. We do in-flight encryption between host and target, and work with the main key management systems."

The 3G CNA product is orderable now and ships in the second half of November. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.