While FCoE technology has been standardized for quite some time now, most FCoE deployments have been upto the access layer of the network. Multi-hop FCoE deployments are gaining traction increasingly. Many a times, I get asked to share the production deployment designs and the real-world benefits of Multi-Hop FCoE infrastructure. So, in this series of blogs, I plan to share the same. In this blog, the spotlight is on a division of the world’s largest aerospace company, Boeing Defense, Space, and Security (BDS).
BDS provides end-to-end services for large-scale systems and supports a diverse range of customers, including the U.S. Army, the Securities and Exchange Commission (SEC), and U.S. Department of Defense (DoD). When the global recession hit the aerospace industry in 2010, BDS came under extreme pressure to cut costs. Dual network topologies, both FC and IP, were adding complexity to the network. BDS needed to reduce the TCO and at the same time increase the network agility, improve scalability and maintain highest availability possible.
As a result, the company decided to adopt FCoE to consolidate its IP and SAN data traffic on a single network. Since 2010, BDS has extended its use of FCoE and is now 100 percent Multi-hop FCoE. BDS deployed End-to-End FCoE architecture with Nexus 5000 at the access layer, the Director-class Nexus 7000 at the Core, connected to the FCoE Storage Arrays.
For BDS, the shift to the new Cisco Unified Fabric infrastructure and leveraging FCoE has delivered unparalleled value to the organization. Read More »
Welcome back to the final episode of Engineers Unplugged, Season 3! It’s been quite a ride. This week, we take another viewpoint on the hot topic of software defined storage with Mike Slisinger (@slisinger) and Vaughn Stewart (@vstewed). Starting from the application owner’s perspective, this is a great 101 on the choices made on the road to the data center of the future. Let’s listen in:
Better stick to storage, not unicorns! Art by Mike Slisinger and Vaughn Stewart.
Welcome to Engineers Unplugged, where technologists talk to each other the way they know best, with a whiteboard. The rules are simple:
Episodes will publish weekly (or as close to it as we can manage)
Submit ideas for episodes or volunteer to appear by Tweeting to @CommsNinja
Practice drawing unicorns
How far up the unicorn scale is your data center in regard to software defined storage? Post a comment below!
Thanks for your viewership and support of Engineers Unplugged. We’ll be on site at VMworld Barcelona, camera and whiteboard markers in hand. If you’ve got show ideas or questions, tweet me @CommsNinja.
Next week at Oracle OpenWorld, I will be giving an abbreviated theater presentation on how Cisco UCS is changing the economics of the datacenter (full presentation below). If you will be at OOW, please stop by the Cisco booth (#1021 -- Monday 9/23 @ 12:30pm, Tuesday 9/24 @ 4pm, & Wednesday 9/25 @ 2:30pm) for the presentation or anytime the exhibit hall is open to discuss how the Cisco Unified Computing System is the best platform for your Oracle environment.
I have heard this a lot over the years, in one way or another – “The only price that really counts is what I actually pay for my server.”
Alright, so why bother with a TCO analysis? The truth is that server acquisition costs only contribute 20% (or less) to a 3 year server TCO. Management and other OpEx costs contribute the remaining 80%. If you go to 5 years, the acquisition cost starts to fade into obscurity.
There are a number of studies you can find online that call out server acquisition cost at 15% to 17% of TCO, or even less. One is an Information Week report that quotes a 2007 IDC study. The Information Week article is very good, with multiple sources and definitely worth a read. Since 2007 there have been myriad improvements in processor performance, as well as, server and architectural innovations (Cisco UCS). All of these supply ample rationale for a low CapEx component for Server / Data Center Total Cost of Ownership, see the figures below.
[The WW Server Related Spend… chart is from IDC, “New Econmoinc Model of the Datacenter”; IDC 2011] [Only the graph is from the cited source, the table is my analysis of the numbers presented by the graph.]
Summary of the figures above:
Server purchase spend and associated power & cooling spending is flat (red and green bands above)
Physical server management cost is the down (blue aband bove)
Virtual server management cost are way up and increasing (orange band above)
Our first SecureDC twitter chat created some great industry dialog around security for Software Defined Networks (SDN) as well as using SDN to improve security. SDN is going through a similar hype cycle as seen with cloud and we feel that it’s important to focus more on education now and broader collaboration, so that users can benefit from the tremendous potential SDN holds.
More Education, Less Buzz
We kicked off our conversation by asking what are the most pressing issues around SDN were. @Joltsik, Principal analyst at Enterprise Strategy Group, felt that users are confused with so much buzz, yet there’s little in the way of education.
@Raj_Samani, Chief Innovation Office at the Cloud Security Alliance and CTO at McAfee, went one step further indicating that greater transparency is also needed. However, @Jgreene3rd, Technical Lead for Data Center Security Technologies at Intel, noted that the upside of buzz is that it drives greater demand for availability, which in turn fuels education.
SDN and Improving Security
@KenSBeck, Principal Engineer at the Cisco Security Technology Group Office of the CTO, led an interesting discussion on how APIs for programming the network at network speed will allow security intelligence to be much more dynamic and eventually part of the network itself. @shl_eax_1, Technical Lead Engineer at Cisco Security Technology Group Office of the CTO, further noted how global visibility of the network hastens the speed with which security issues get resolved.
@fsmontenegro elaborated on how SDN security can enable more intelligent, granular and efficient response, and that SDN improves security by adding policy exceptions at the network layer with redirect flow. @vernonxt, SVP for ICT Research at IDC, honed in on SDN enabling better policy management. @AndiMann, Vice President at CA Technologies, speculated with automation enabling embedded policy and preventing random changes, shouldn’t SDN be able to do the same.
SDN Impact on Regulatory Compliance
@alokmittal65, Chief of Staff for the Cisco Security Technology Group Office of the CTO, stressed the need for auditing, logging and monitoring of policy change events.
@Raj_Samani also noted that with greater proliferation of devices, the ability to achieve greater attestation on the endpoint becomes more challenging. @KenSBeck drew attention to leveraging network awareness of user, geo location, and device as contextual elements that can make attestations much more meaningful.
@KenSBeck, our host from the Office of the CTO at Cisco, closed with words of advice and a hint of what is in store.