Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/8/2011
03:36 PM
George Crump
George Crump
Commentary
50%
50%

What If FCoE Were Free?

Intel recently announced Open FCoE, a software implementation of the Fibre Channel over Ethernet (FCoE) protocol that had only previously been available in expensive Converged Network Adapters (CNA) desinged to work on standard Ethernet hardware. Assuming that you use 10GbE LAN on Motherboard (LOM), which we discussed in our

Intel recently announced Open FCoE, a software implementation of the Fibre Channel over Ethernet (FCoE) protocol that had only previously been available in expensive Converged Network Adapters (CNA) desinged to work on standard Ethernet hardware. Assuming that you use 10GbE LAN on Motherboard (LOM), which we discussed in our last entry, it becomes prominent in servers and you might be able to have FCoE for free.Cost savings when it comes to infrastructure consolidation is not simple math yet. You have to factor in the savings of cables, interface cards and potentially infrastructure management. While those are all compelling factors, it may not be enough for an IT Manager to switch from their existing fibre channel fabric. If FCoE were available for free as a software load then the calculation changes significantly. By doing so you would replace the cost of a pair of CNAs for a pair of onboard 10GbE LOMs which could be a savings of more than $4,000 per connected host. You also make implementation much easier as the servers don't need to be opened up. Assuming that within the year every server ships with a 10GbE LOM the move to FCoE could be much more rapid than originally thought.

The first question is what do you give up? We don't yet have enough data across a variety of platforms to know for sure with Open FCoE, but it is a safe assumption that you are going to loose some CPU performance since that CPU is now handling the work of what used to be done by a CNA. Of course the follow up question will be do you need all that CPU performance? If the CPU utilization in your physical server never goes above 50% I'm not sure that doing FCoE purely in software will matter all that much. In other words the CPU is looking for something to do anyway. What you may give up with software based FCoE is some constancy of performance. This again ties into the processor load. If you load up the processor with a lot of tasks and then also have a spike in storage traffic then something, probably storage I/O, will have to give. So if you have workloads that can randomly peak a software based implementation of FCoE may not be the best choice.

My guess, and I think so is Intel's, is that there is a lot of servers that have plenty of excess CPU utilization and the software load of FCoE will be a non issue. The impact of this could be a very cost effective way to deploy FCoE. For the first time the fibre protocol can compete with iSCSI and NAS from a cost perspective. That is a winner for storage managers with a fibre investment and may be enough to keep them from deploying iSCSI or NAS. As we discussed in our article "What is TRILL's Role in FCoE Storage Networks?" all these protocols will benefit from Ethernet Fabric and Trill. If you are already a fibre channel based data center this may make the transition to the converged, lossless Ethernet Fabric even more appealing. The other winner will be the Ethernet Fabric switch manufacturers themselves. You could say that they may loose some HBA business but it may be HBA business they never were going to get because the customer was going to switch to iSCSI or NAS. I think they would rather sell the ports than the HBAs anyway.

Maybe the bigger question is FCoE in software a replacement for iSCSI or NAS? That is something we will address in a future entry.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
All Videos
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Back Issues | Must Reads
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24847
PUBLISHED: 2020-10-23
A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticat...
CVE-2020-24848
PUBLISHED: 2020-10-23
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVE-2020-5990
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in the ShadowPlay component which may lead to local privilege escalation, code execution, denial of service or information disclosure.
CVE-2020-25483
PUBLISHED: 2020-10-23
An arbitrary command execution vulnerability exists in the fopen() function of file writes of UCMS v1.4.8, where an attacker can gain access to the server.
CVE-2020-5977
PUBLISHED: 2020-10-23
NVIDIA GeForce Experience, all versions prior to 3.20.5.70, contains a vulnerability in NVIDIA Web Helper NodeJS Web Server in which an uncontrolled search path is used to load a node module, which may lead to code execution, denial of service, escalation of privileges, and information disclosure.