Scam; Scam Operations - Fujitsu MAN3184 SERIES Specifications

Disk drives scsi physical interface specifications
Hide thumbs Also See for MAN3184 SERIES:
Table of Contents

Advertisement

1.9

SCAM

The IDD does not support the SCAM functions.
1.9.1

SCAM operations

The SCAM operation functions include all functions required for ID assignment of each SCAM
device so that the SCAM tolerant and SCAM devices are identified by the SCAM initiator and
target. The user shall understand the SCAM operations clearly by knowing the operations between
the SCAM initiator and target.
(1)
SCAM initiator
The SCAM initiator shall complete its local initialization immediately after the power-on. It shall
wait at least a SCAM power-on to the SCAM selection delay before initiating any SCSI bus
activity. The SCAM initiator, which can be a level-1 SCAM device or can be determined to be the
dominant SCAM initiator, shall generate a RESET condition immediately after power-on. The
level-2 SCAM initiator, which cannot be determined to be the dominant SCAM initiator by the
deductive method, shall not generate a RESET condition. However, it shall start the SCAM
protocol as if it has detected the RESET condition as described below.
When the SCAM initiator generates or detects a RESET condition, it shall start the SCAM
protocol. The first function sequence shall be the Dominant Initiator Contention function. The
SCAM initiator becomes the dominant SCAM initiator when it broadcasts the numerically highest
ID character string during separation. The SCAM initiator which does not have the highest ID
character string is set to a subaudinate SCAM initiator.
Notes:
The level-1 SCAM initiator is not always required for execution of the Dominant Initiator
Contention function. It shall be used to detect the Dominant Initiator Contention function
which is broadcasted by another SCAM initiator.
The ID character string of the level-1 SCAM initiator has been defined not to be selected
through contention by the level-2 SCAM initiator. Therefore, the level-1 SCAM initiator
which has failed in contention shall function as the subordinate SCAM initiator.
The level-2 SCAM initiator is always active so that it can detect the SCAM protocol started by
another level-2 SCAM unit (the initiator or target).
a. Dominant SCAM initiator
The dominant SCAM initiator shall classify the allowable SCSI IDs into the already assigned
group or unassigned group. Also, it shall assign an ID to each SCAM device if necessary.
After ID assignment, the dominant SCAM initiator shall broadcast the Configuration Process
Complete function. This function sequence is used for two purposes: the report to the
subordinate SCAM initiator that it can restart the normal SCSI operations, and the
acknowledge to no response to the normal SCSI selection. It indicates that the SCAM target
having an unassigned ID keeps its current status.
1 - 84
C141-E123-01EN

Advertisement

Table of Contents
loading

This manual is also suitable for:

Man3367 seriesMan3735 series

Table of Contents