Chapter 33. Detailed Description of SA

The Previous Chapter

The previous chapter provided a detailed description of the General Services Interface (QP1). It was provided at that point in the book because the SA is accessed via the GSI and this chapter covers the SA. Specifically, the previous chapter covered:

  • The GSMs, GSAs, and GSIs.

  • How to prepare an HCA GSI for use.

  • The required versus optional GSAs.

  • The SA and the GSI.

  • GMPs use a VL buffer determined by the GMP's SL value.

  • GMPs can transit routers.

  • QP1 is a controlled-access QP.

  • QP1's P_Key insertion and checking.

  • Additional reference material.

This Chapter

This chapter provides a detailed description of the Subnet Administrator (SA). Specifically, it covers:

  • The purpose of the SA.

  • The SA is accessed using GMPs.

  • The location of the SA.

  • Requester access authorization.

  • The SA's methods and attributes.

  • The definition of a Record Identifier (RID).

  • SubnAdmGet() operation.

  • SubnAdmSet() operation.

  • The definition of a table.

  • SubnAdmConfig() operation.

  • Database queries using SubnAdmGetTable().

  • Fetching the entire database.

  • The reliable multi-packet transaction protocol.

  • Additional reference information.

The Next Chapter

The next chapter provides an overview of Baseboard Management (BM) and a detailed description of the BM MADs exchanged between the BM and the Baseboard Management Agents (BMAs) within IBA devices. It does not provide a detailed description of all issues related to BM (e.g., hot-install, hot-removal, etc.) nor does it provide a detailed description of the IB-ML bus. These subjects may be covered in a future edition of this book. Specifically, this chapter covers:

  • The roles of the other managers.

  • The BM reaches behind the IBA front-end.

  • A basic definition of a chassis and a module.

  • The chassis Baseboard Management elements.

  • Passively managed chassis.

  • Module BM elements.

  • Non-module IBA devices.

  • BM MAD format.

  • BM methods.

  • BM attributes.

  • The BM sending a command to the MME.

  • The CME sending a command to the BM.

  • BM-related traps.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset