Feeds

QLogic's 3G CNA does three things at once

FCoE, iSCSI and IP at same time

High performance access to file storage

QLogic now has a third-generation network adapter that can run three network protocols at once, do virtual machine commas in a server, and deploy 1gigabit and 10 gigabit Ethernet ports from its single chip.

This chip with the chops is its third generation CNA (Converged Network Adaptor), built to handle both storage and Ethernet traffic travelling along a ten gigabit Ethernet cable. OT comes as a so-called cLOM (converged LAN on Motherboard) ASIC, an 8200 10GBe CNA card or a 3200 10GbitE Ethernet NIC (network interface card).

The 8200 product can be configured either as a quad-port 1gigE or dual-port 10gigE device.

All three products use the same ASIC chip, and the 3200 can be upgraded to an 8200 with a software key. This chip can run iSCSI storage traffic, Fibre Channel over Ethernet (FCoE) traffic, and ordinary internet traffic simultaneously. Unlike the previous generation product, it has a built-in TCP/IP offload engine which does TCP/IP processing in hardware, relieving the host CPU of the job and boosting iSCSI traffic speed by around 100 per cent.

QLogic understands that its bête noir, Emulex, cannot run three protocols at once on its universal CNA product.

With the 3G product, two virtual machines (VMs) in the host server can send messages to each other via Ethernet - which never actually leave the server. EMEA Marketing head for QLogic, Henrik Hansen, said: "Within the ASIC we have embedded a layer 2 Ethernet switch [and] can carve up the two physical ports into 4 NIC partitions or NPARs, which can each be assigned to a specific VM. There can be eight of them with dual-port product."

An Ethernet message from one VM to another in the same server goes to the QLogic ASIC and is switched back to the target VM. This is reminiscent of Emulex' VNIC feature.

The embedded switch makes the QLogic product switch-agnostic.

The new product technology supports a veritable alphabet soup of virtualisation standards: SR-IOV for Ethernet I/O virtualisation, NIV (Network I/O Virtualisation for Cisco), EVP (HP's virtualisation feature), VEPA - a top-of-rack virtualisation initiative, MP/IV inside FCoE, and RDMA for people using Ethernet in HPC environment.

Hansen said: "Encryption is also part of our 3G feature set. We do in-flight encryption between host and target, and work with the main key management systems."

The 3G CNA product is orderable now and ships in the second half of November. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.