12.07.2015 Views

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SECURING FIBRE CHANNEL FABRICS - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 3: SAN Basics for Security Professionalsswitches in the fabric. However, this is the least scalable fabric topologydue to the exponential increase in links required as the number ofswitches increases.Switch ASwitch BSwitch CSwitch FSwitch DSwitch EFigure 11. Full mesh topologyThe formula for the number of ISLs required to create a full meshtopology is:1 + 2 + … + (N-1)where “N” is the number of switches.For example: a five-switch full mesh fabric would require:1 + 2 + 3 + (5-1) = 1 + 2 + 3 + 4 = 10 ISLsTable 6. Full mesh topology ISL and port requirements# of Switches # of ISLs # of Ports2 1 23 3 64 6 125 10 206 15 307 21 428 28 569 36 7210 45 9011 55 11012 66 13238 Securing Fibre Channel Fabrics

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!