Fujitsu MAW3073 SERIES Specifications page 143

Scsi physical interface 3-1/2" intelligent disk drives
Hide thumbs Also See for MAW3073 SERIES:
Table of Contents

Advertisement

The dominant SCAM initiator can classify and assign SCSI IDs in various ways as described
below.
SCSI ID classification
After the reset, the dominant SCAM initiator waits for a certain period to establish a delay time
between the reset and selection of SCAM tolerant. The dominant SCAM initiator initializes the
SCSI ID internal table and indicates that all SCSI IDs are not classified yet. Also, the SCAM
initiator gets the arbitration and selects the unclassified IDs whose selection timeout delay is
greater than the response time of SCAM tolerant selection but less than the response delay of
SCAM unassigned ID selection. If the dominant SCAM initiator has an already assigned ID, it
can start arbitration using this ID. If it does not have the assigned ID, it starts arbitration
without IDs.
When the dominant SCAM initiator detects a selection timeout, it classifies the ID to be
unassigned. When the SCSI device responds to the selection by asserting the BSY signal,
the dominant SCAM initiator classifies this ID to be already assigned. In this case, the
dominant SCAM initiator shall complete the INQUIRY or similar command sequence to
normally terminate the SCSI device selection.
The dominant SCAM initiator shall repeat this process until all SCSI IDs are classified to
be assigned or unassigned. Note that the SCSI IDs can be classified even outside of
applicable clause of configuration parameters. This can eliminate the requirement of
SCSI ID classification.
SCSI ID assignment
After all SCSI IDs have been classified, the dominant SCAM initiator shall start the
SCAM protocol and repeat ID assignment to all SCSI devices. The dominant SCAM
initiator shall execute the Dominant Initiator Contention function sequence to prove that
the initiator is still dominant by itself. If the previously dominant SCAM initiator fails in
contention with other dominant initiators, it shall continue to control the SCAM protocol
but shall function as a slave SCAM initiator.
After the SCSI ID assignment, the dominant SCAM initiator shall broadcast the
Configuration Process Complete function sequence using one or more SCAM protocol
instances, and shall terminate the SCAM protocol.
b. Subaudinate SCAM initiator
The subaudinate SCAM initiator shall continue to control the SCAM protocol and shall
respond to all of SCAM function sequence. The SCSI ID assignment by the subaudinate
SCAM initiator is required for the dominant SCAM initiator to assign its SCSI IDs. Despite of
the SCAM target, the subaudinate SCAM initiator needs not stop SCAM protocol control by
releasing all signals if it has assigned an SCSI ID. Instead, the subaudinate SCAM initiator
shall recognize the sync pattern and the Configuration Process Complete function sequence.
If the subaudinate SCAM initiator has detected the end of SCAM protocol but has failed to
recognize the Configuration Process Complete function sequence, it shall not restart the normal
SCSI operations. The level-2 SCAM initiator can continue to detect the start of SCAM
protocol.
C141-C011
1-125

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents