System Management Bus (Smbus 2.0); Intel Anti-Theft Technology; Intel Virtualization Technology For Directed I/O; Jtag Boundary-Scan - Dell External OEMR R310 Technical Manual

Technical guide
Table of Contents

Advertisement

Dell
9.17

System Management Bus (SMBus 2.0)

The
Intel 3420 contains an SMBus Host interface that allows the processor to communicate with SMBus slaves.
This interface is compatible with most I2C devices. Special I2C commands are implemented.
The Intel 3420's SMBus host controller provides a mechanism for the processor to initiate communications
with SMBus peripherals (slaves). Also, the Intel 3420 supports slave functionality, including the Host Notify
protocol. Hence, the host controller supports eight command protocols of the SMBus interface (see System
Management Bus
(SMBus) Specification, Version 2.0): Quick Command, Send Byte, Receive Byte, Write Byte/Word, Read
Byte/Word, Process Call, Block Read/Write, and Host Notify.
Intel 3420's SMBus also implements
Address Resolution Protocol (ARP) to dynamically provide address to all SMBus devices.
9.18

Intel Anti-Theft Technology

The Intel 3420
introduces a new hardware-based security technology which encrypts data stored on any
SATA compliant HDD in AHCI Mode. This feature gives the end-user the ability to restrict access to HDD data
by unknown parties. Intel
encryption applications to add protection against data theft.
®
Intel
Anti-Theft Technology functionality requires a correctly configured system, including an appropriate
processor, Intel Management Engine firmware, and system BIOS support.
9.19

Intel Virtualization Technology for Directed I/O

The
Intel 3420
provides hardware support for implementation of Intel
®
Directed I/O (Intel
VT-d). Intel VT-d Technology consists of technology components that support the
virtualization of platforms based on Intel
operating systems and applications to run in independent partitions. A partition behaves like a virtual
machine (VM) and provides isolation and protection across partitions. Each partition is allocated its own
subset of host physical memory.
9.20

JTAG Boundary-Scan

Intel 3420 adds the industry standard JTAG interface and enables Boundary-Scan in place of the XOR chains
used in previous generations of the Intel 3420. Boundary-Scan can be used to ensure device connectivity
during the board manufacturing process. The JTAG interface allows system manufacturers to improve
efficiency by using industry available tools to test the Intel 3420 on an assembled board. Since JTAG is a
serial interface, it eliminates the need to create probe points for every pin in an XOR chain. This eases pin
breakout and trace routing and simplifies the interface between the system and a bed-of-nails tester.
Dell PowerEdge R310 Technical Guide
hardware-based Packet Error Checking for data robustness and the
®
Anti-Theft Technology can be used alone or can be combined with software
®
Architecture Processors. Intel VT-d Technology enables multiple
®
Virtualization Technology with
43

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Poweredge r310

Table of Contents