WO1999018512A1 - Platform-independent subsystem protocol - Google Patents

Platform-independent subsystem protocol Download PDF

Info

Publication number
WO1999018512A1
WO1999018512A1 PCT/US1998/020840 US9820840W WO9918512A1 WO 1999018512 A1 WO1999018512 A1 WO 1999018512A1 US 9820840 W US9820840 W US 9820840W WO 9918512 A1 WO9918512 A1 WO 9918512A1
Authority
WO
WIPO (PCT)
Prior art keywords
subsystem
command
identifier
information
protocol
Prior art date
Application number
PCT/US1998/020840
Other languages
French (fr)
Inventor
Horatio Lo
David Lee
Original Assignee
Vicom Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vicom Systems, Inc. filed Critical Vicom Systems, Inc.
Priority to AU96818/98A priority Critical patent/AU9681898A/en
Publication of WO1999018512A1 publication Critical patent/WO1999018512A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/382Information transfer, e.g. on bus using universal interface adapter
    • G06F13/385Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices

Definitions

  • the present invention relates to computer subsystems. More particularly, the present invention relates to a method and apparatus for communicating with one or more computer subsystems via a platform- independent communication protocol.
  • a controller for a computer subsystem e.g., an intelligent small computer systems interface (SCSI) controller for a storage subsystem
  • SCSI small computer systems interface
  • this might take the form of controlling/configuring various features of the subsystem by sending commands from the host computer.
  • the ability to monitor the health and/or performance of the subsystem from the host is also often desired.
  • the present invention provides techniques that allow a host application to communicate with one or more computer subsystems via a communication protocol that is platform independent.
  • a method and apparatus according to the present invention implement a communications protocol whereby a host application program can communicate with a computer subsystem without the use of special driver software. In this way, the application program is able to invoke virtually any function on a compatible subsystem controller using only standard read/write system calls. This avoids platform dependency, greatly improving the portability of an application program using this technique .
  • One aspect of the present invention provides a computer-implemented method for communicating between a CPU and a subsystem. Communications according to the method of the present invention begin by writing a data packet to the subsystem.
  • the data packet includes a signature and an identifier.
  • the signature uniquely identifies the command as being a command to the subsystem under a protocol of the present invention. If information is to be returned from the subsystem, the central processing unit reads from the subsystem using the identifier. As with the signature, the use of this identifier indicates that the read is requesting the information generated by the last command whose data has not yet been read.
  • the subsystem When a write is performed, the subsystem first detects the signature. Data which might be a command may be constantly checked by the subsystem to determine if the data being sent is indeed a command. Alternatively, only a subset of such commands might be checked. When such a signature is detected, the subsystem stores the identifier. This allows any accesses using the identifier to be classified as a subsystem command. Alternatively, when the central processing unit sends a read command to the subsystem that reads from a location identified by the identifier, the read is detected by analyzing the read command's identifier. When such a read command is detected, the requisite information is returned from the subsystem to the central processing unit.
  • the signature Data which might be a command may be constantly checked by the subsystem to determine if the data being sent is indeed a command. Alternatively, only a subset of such commands might be checked.
  • the subsystem stores the identifier. This allows any accesses using the identifier to be classified as a subsystem command.
  • FIG. 1 depicts a block diagram of a host computer system 10 suitable for implementing the present invention or being connected in a network implementing the present invention
  • Fig. 2A depicts a platform-independent subsystem protocol in accordance with one embodiment of the present invention
  • Fig. 2B depicts one embodiment of an interface controller of the present invention
  • Fig. 2C depicts another embodiment of an interface controller of the present invention
  • Fig. 3 depicts the steps of performing a write operation conforming to platform- independent subsystem protocol in accordance with one embodiment of the present invention
  • Fig 4 depicts the steps of performing a read operation conforming to platform-independent subsystem protocol in accordance with one embodiment of the present invention
  • the present invention supports communication with a computer subsystem (e g., a hard disk subsystem) by allowing the transfer of information using a communication protocol that obviates the need for a software driver to communicate with the subsystem
  • a computer subsystem e g., a hard disk subsystem
  • Application programs and subsystems employing the method of the present invention require no special driver software in order to communicate because such an application communicates directly with the subsystem by writing to and reading from conventional OS constructs such as partitions and files .
  • An application according to the present invention is configured to run on a host computer 10, and permit nost computer 10 to communicate with one or more of its subsystems using the method of the present invention
  • Host computer system 10 includes a bus 12 which interconnects major subsystems such as a central processing unit (CPU) 14, a system memory 16 (e.g , dynamic random-access memory or DRAM), an input/output (I/O) adapter 18, an external device such as a display screen 24 v a display adapter 26, a keyboard 32 and a mouse 34 via I/O adapter 18, and a subsystem controller 36
  • a floppy disk drive 38 operative to receive a floppy disk 40 is also provided.
  • Subsystem controller 36 contains a recognition unit 37, which is capable of recognizing the subsystem protocol commands of the present invention.
  • Recognition unit 37 may be configured to analyze all commands sent to subsystem controller 36, in which case recognition unit 37 is in the data and control paths Alternatively, data and control information may be passed to both recognition unit 37 and the device (s) being controlled. A further possibility is performing the analysis of commands in firmware. These alternatives are described further in relation to Figs. 2B and 2C, below.
  • Subsystem controller 36 may serve as an interface controller for a fixed disk drive 42 or a CD-ROM player 44, for example. CD-ROM player 44 is operative to receive a CD-ROM 46.
  • Fixed d sk 42 may be a part of host computer system 10 or may be separate and accessed through other interface systems .
  • a network interface 48 may provide a connection to a LAN or to the Internet, for example Many other devices or subsystems (not shown) may be connected n a similar manner.
  • subsystem controller 36 might be a SCSI interface controller that supports the usual SCSI command set, m addition to the commands of the present invention.
  • SCSI interface controller that supports the usual SCSI command set, m addition to the commands of the present invention.
  • Such commands, and descriptions of normal SCSI operations are included m "The Book of SCSI • A Guide for Adventurers” by Peter M Ridge, and David Deming (No Starch Printers; April 1995; ISBN: 1886411026) and "SCSI Understanding the Small Computer System Interface” from NCR Corporation (Prentice Hall Computer Books, January 1, 1990, ISBN: 0137968558), which are included herein by reference
  • Fig. 2A depicts a block diagram of the software and hardware modules that communicate m a system of the present invention
  • An application program 100 containing the functionality provided by the present invention (l e., compiled source code, generated according to the present invention) is loaded onto host computer 10 by downloading the program to fixed disk 42.
  • Application program 100 is run on CPU 14, and allows CPU 14 to communicate with certain of the various subsystems in host computer 10 without the need for special driver software.
  • application program 100 performs writes and reads by calling operating system functions 110.
  • Operating system functions 110 are standard functions of the given operating system running on host computer 10 that read data from and write data to one or more subsystems of host computer 10. For example, these functions might be the routines which read and write files on fixed disk 42.
  • operating system functions 110 communicate with standard driver software 120, which is provided w th the operating system (or the subsystem) to support communication between the operating system and the given subsystem.
  • Standard driver software 120 communicates the commands (and any associated data) through an interface controller 130 (e.g , subsystem controller 36 of Fig. 1) to a subsystem 140 (e.g., fixed disk drive 42 of Fig. l) While it is shown as a single block, interface controller 130 may actually consist of several hardware modules.
  • interface controller 130 would preferably include a SCSI host adapter and hard disk controller card with the recognition circuitry of the present invention (e.g , recognition unit 37 of Fig 1) situated m the controller card
  • recognition circuitry may reside on any of the hardware modules within interface controller 130
  • interface controller 130 merely passes the commands and data through to the device being controlled
  • Interface controller 130 may include a recognition unit such as recognition unit 37 of Fig. 1.
  • Fig. 2B illustrates one embodiment of interface controller 130, exemplified by subsystem controller 36
  • the recognition circuitry of the present invention exemplified by recognition unit 37
  • recognition unit 37 receives commands from standard driver software 120 and analyzes these commands to determine if they are subsystem protocol commands, or simply commands for one of the devices being controlled. This may be done using a comparator and two registers
  • the first register holds a signature that one or more of the subsystem protocol commands will contain (the use of signatures and other designations of the present invention are described later)
  • the second register contains a portion of the command being analyzed which is expected to contain the subsystem protocol command signature.
  • the outputs of the two registers are fed into the comparator, which subsequently indicates whether the information in the second register is the signature sought, and that the command being analyzed is indeed a subsystem protocol command If a signature is identified, the command is passed to interface controller hardware 210 Otherwise, the command (and associated data, if any) is passed to subsystem 140.
  • recognition un t 37 may be configured to analyze only a subset of the possible commands sent to interface controller 130, based on one or more features of the commands which might possibly be sent (e.g , command length)
  • the subsystem protocol command is passed to interface controller hardware 210 over control lines 220.
  • Associated data, if any, is passed to interface controller hardware 210 over data lines 230.
  • control lines 220 and data lines 230 may be combined into a bus over which data and control information are passed.
  • Fig. 2C illustrates an alternative embodiment of interface controller 130 in which the communications are passed to both recognition unit 37 and subsystem 140 in parallel.
  • recognition unit 37 simply monitors the communications between standard driver software 120 and interface controller 130.
  • recognition unit 37 passes a subsystem protocol command to interface controller hardware 210 when protocol communications occur.
  • the subsystem protocol command is passed to interface controller hardware 210 over control lines 220.
  • Associated data, if any, is passed to interface controller hardware 210 over data lines 230.
  • control lines 220 and data lines 230 may be combined into a bus over which data and control information are passed, as noted above.
  • Subsystem 140 would thus ignore communications so identified, for example, by means of a tristate technique, in order to electrically disconnect subsystem 140 from interface controller 130.
  • interface controller 130 Another alternative, although not illustrated, is the use of firmware routines in interface controller 130 to perform the requisite analysis of commands passed to interface controller by standard driver software 120. Assuming interface controller hardware of interface controller 130 would normally be capable of monitoring the data/control streams passing through it, the interface controller hardware's firmware could be configured to analyze commands issued by standard driver software 120. Subsystem protocol commands would then be executed by the interface controller hardware, and non-protocol commands passed to subsystem 140.
  • Application program 100 communicates with interface controller 130 by writing a data packet to interface controller 130 which includes a signature and an identifier.
  • Interface controller 130 analyzes some or all of the traffic between application program 100 (and so standard driver software 120) and subsystem 140. When a write command containing the given signature is detected, that command is acted upon by interface controller 130, and is not passed to subsystem 140. If results are generated by the write command, a read command may be issued to retrieve that information. The read command contains the identifier used by the write command, and so is itself identified.
  • this identifier will indicate an address in either the memory or I/O space of host computer 10, or the memory or I/O space of the subsystem.
  • a logical block address (LBA) of a file or partition in a storage subsystem e.g., fixed disk 42
  • Application program 100 could thus write to a specific logical block address (LBA) of a file or partition in a storage subsystem (e.g., fixed disk 42)
  • Fig. 3 illustrates the steps performed in writing information to a subsystem from a host computer using a protocol according to the present invention.
  • a write operation is issued by host computer 10 (step 300) .
  • This operation writes a data packet to subsystem 140 (step 305) .
  • Interface controller 130 receives this data packet and analyzes it to determine if the data packet contains a signature (step 310) .
  • Interface controller 130 determines if the data packet contains a signature pattern (step 320) . If the data packet simply contains data to be written to subsystem 140, the data packet is passed through to subsystem 140 (step 330) .
  • the identifier contained in the data packet is read into interface controller 130 (step 340), which stores this information for future use (e.g., for use by a read operation) (step 350) .
  • the operation specified by the protocol command is then performed, if any such action needs to be taken (step 360) .
  • the subsystem controller distinguishes this command from standard read commands on the basis of its identifier (e.g., a logical block address (LBA) of the file or partition from which the command is to "read”) .
  • This identifier is preferably the same as that of the preceding subsystem protocol write command, which simplifies the protocol.
  • out-of-order write-read pair processing may be supported by a protocol according to the present invention.
  • a protocol read command may read information generated by a protocol write command other than that generated by the immediately preceding protocol write command.
  • the subsystem protocol application (or different subsystem protocol applications, if more than one is used) may read from different drives and addresses. The subsystem protocol application may read this information from the dedicated file or partition, or may request that the OS and subsystem driver perform a read-back of the data which was just written.
  • Fig. 4 illustrates the steps performed in reading information from a subsystem into a host computer using a protocol according to the present invention.
  • a read operation is issued by host computer 10 (step 400) .
  • Interface controller 130 receives this command and analyzes it (step 410) .
  • Interface controller 130 determines whether the read is to a location identified by the identifier in a corresponding write command (i.e., if it contains the proper identifier) (step 410) . If the data packet is simply a command to read data from subsystem 140, the read command is passed through to subsystem 140 for completion (step 430) .
  • the identifier contained in the data packet is processed by interface controller 130, which responds to the read operation by providing the requested information (step 440) .
  • th s might be information generated by a corresponding write protocol command.
  • protocol commands are arranged and issued in pairs. This might take the form of, for example, the issuance of a SCSI write command (a subsystem protocol write command) followed by the issuance of a SCSI read command (a subsystem protocol read command) In that case the data-out phase of the write command transfers the order descriptor block, parameters, and data to the subsystem.
  • the data-in phase of the read command transfers the status, results, and data back to host application after carrying out the orders given n the write command
  • the subsystem orders and results are embedded n the data area of the subsystem protocol commands
  • the subsystem protocol commands are preferably issued in single-threaded fashion ( .e , all commands are issued and executed in- order) . If issued in this manner, the write-read subsystem protocol command sequence described above is ensured In a SCSI based subsystem, the SCSI check condition status command may cause the host SCSI driver or host operating system to make some attempt to retry the failed command. This situation should be detected by the subsystem controller to avoid the out-of-sequence execution of subsystem protocol commands.
  • one embodiment of the present invention uses two block long write and read commands as subsystem protocol commands as subsystem protocol commands Any read or write which is not two blocks long (a relatively unusual size for most operating systems) is immediately eliminated from consideration as a possible subsystem protocol command This reduces the workload of the subsystem controller analyzing the command stream.
  • a comparatively long signature pattern should normally be employed In order to avoid the performance penalty of verifying a long pattern m each subsystem protocol write command, as well as a reduction m bandwidth caused by the use of signatures of such length, one embodiment of the present invention does not actually put this long signature pattern in every subsystem protocol write command Instead, a special subsystem protocol command called the subsystem protocol sign-on command is defined This write command is a different size than other subsystem protocol commands (e.g , six blocks, rather than two), allowing subsystem protocol sign-on command to be distinguished from other subsystem protocol write commands without analyzing the command's data Six blocks is also a relatively
  • the subsystem controller may be configured to classify any write or read directed to the subsystem protocol address which s not 2 blocks long (and is not a new subsystem protocol sign-on write command) as a protocol violation Whatever the cause, a protocol violation would, for example, immediately terminate the protocol, or another action could be taken to indicate the failure (e.g., a blinking light on the controller)
  • Protocol violations may be detected by either the subsystem controller or the host application. If detected by the subsystem controller, the command may be treated as though no subsystem protocol sign-on command was ever received and allow the storage media to be accessed normally. The subsystem controller would then remain m the signed-off state, until a new subsystem protocol sign-on command was received. The next time the host sent a subsystem protocol read command, data from the media (rather than specially formatted information from the suDsystem controller) would be returned This data would fa l one or more of the host application's validity checks, thereby triggering an error m the host application (and so indicating a failure in the protocol)
  • a serial loop interface controller (SLIC) which employs a communication protocol, application programming interface (API) , and user interface according to the present invention
  • SLIC serial loop interface controller
  • API application programming interface
  • the host application that performs diagnostics on one or more disk drive units m this environment is referred to as a SLIC Diagnostic Utility (SDU)
  • SCSI small -computer systems interface
  • the SDU is designed to allow a small -computer systems interface (SCSI) host to communicate with an interface controller 130 through a SCSI interface (e.g., subsystem controller 36)
  • SCSI small -computer systems interface
  • SSA serial storage architecture
  • FCAL Fiber Channel Arbitrated Loop
  • the present invention supports architectures other than the serial communications architecture discussed herein (e g , parallel architectures)
  • the serial communications architecture discussed herein e g , parallel architectures
  • the functions of the SDU include SLIC configuration, SSA administration, error diagnostics, microcode downloading, and other such functions .
  • An SDU of the present invention may be implemented in at least two different ways by having the application software write to one or more of at least two different operating system constructs
  • the application writes to and reads from a data file. By sending information to a data file (in, for example, a DOS environment) , the information can be detected by interface controller 130, and acted upon in an appropriate manner.
  • the application writes to and reads from a reserved partition (e.g., a "SLIC partition") created on a hard disk connected to interface controller 130 controller.
  • SDU-DP SDU Disk Partition
  • SDU-DP SDU Disk Partition
  • the SDU can then communicate with interface controller 130 using disk accesses and standard system calls, which maximizes portability by avoiding the use of platform-specific driver software.
  • the host system needs to be correctly booted with SLIC-SSA drives attached before the SDU can be launched. This method would be appropriate in a UNIX environment, for example.
  • a vendor-unique approach may be employed in implementing a subsystem protocol according to the present invention. This might be done to allow communication with subsystems manufactured by a specific vendor that are capable of using a superset of the normal subsystem protocol commands (i.e., to provide vendor-specific subsystem protocol commands) . For example, special read and write commands could be provided to allow easy identification of subsystem protocol commands . Alternatively, a pass -through command could be used to issue vendor- unique commands to a subsystem device of the vendor's manufacture, supported by the host system's device driver.
  • vendor-unique commands can be filtered and interpreted as SDU communication commands. Although it is possible to support SCSI pass-through commands in a platform-specific manner, each implementation's interface would then differ from platform to platform. The SDU of such an approach would have to be ported and tested on each platform supported. This approach may be used to provide a PC-based service tool for off-line analysis of sub- systems without involving the real host system, but is antithetical to the idea of providing platform- independent support .
  • one or more SDU partitions are created by the system administrator on the hard disk being controlled. Preferably, these partitions are used exclusively by the SDU-DP program.
  • the size of the SDU partition is preferably the minimum size that the host system allows in order to avoid needlessly wasting disk space.
  • the SDU-DP program takes the form of a utility program running on the host system. When launched, the SDU-DP program locates the SDU partition on the hard disk from the configuration file provided by user and issues an SDU sign-on command to the subsystem controller (e.g., interface controller 130).
  • the SDU sign-on command may be, for example, a three block raw data write to the SDU partition with a specific pattern in data area (i.e., a signature pattern) .
  • the SDU sign-on command turns on the SDU mode and sets the SDU-LBA (the logical block address used to communicate with the SDU) If a SCSI subsystem is being controlled, for example, the SDU-LBA is preferably the identifier (ID) , logical unit number (LUN) , and LBA combination from the sign-on command.
  • ID the identifier
  • LUN logical unit number
  • the application communicates with interface controller 130 by issuing a two block write command (SDU command) to the SDU-LBA.
  • SDU command a two block write command
  • the SDU application preferably issues a two block read command to the SDU-LBA (e.g., an SDU read, after any SDU write, to retrieve the SDU status block)
  • the syntax of the SDU status block may then be checked by the SDU-DP application. Any syntax error may be reported to user as possible conflict on the data partition
  • the SDU mode When powering on interface controller 130, the SDU mode will normally be “off” and the SDU-LBA undefined. Any three block write command to any of the SLIC-SSA devices is subsequently intercepted and checked by the SLIC firmware to determine if it is a SDU sign-on command. When a sign-on command is detected, the SDU mode is changed to "on,” the SDU sequence number (if used) is reset to zero and the SDU-LBA is set to the [ID, LUN, LBA] combination m the sign-on command.
  • any two block write to the SDU-LBA is checked by interface controller 130 Assuming these write commands have the correct magic number (an arbitrarily chosen number, similar to a signature, that is used to ensure that the checksum is non-zero) and checksum (used to determine if the data is protocol data or simply random data) , they are treated as SDU write commands
  • An SDU write command is not normally passed to the SSA device m this situation because it is intended as an SDU command, and not as data to be written to the SSA device.
  • the two block read commands to the SDU-LBA are passed to the SSA device unless they are compliant with SDU protocol. These SDU-compliant read commands should be treated as SDU read commands and return the data generated by the SLIC being addressed.
  • a SLIC configured to employ the communication protocol of che present invention uses an SDU sign-on command to enable the SDU mode During SDU mode, the SCSI read/write command accessing SDU at the location identified by ID/LUN/LBA (as before) should be checked against the SDU communication protocol parameters The following example illustrates this checking for a preferred embodiment of the present invention:
  • the LBA of the SCSI command should be equal to the SDU-LBA
  • - the transfer length of the SCSI command should be equal to 2
  • the magic number and the checksum should indicate a write command, according to the SDU command format
  • an SDU read command violating the SLIC protocol should be passed to the subsystem (e.g., a hard disk storage unit) controlled by the controller (e.g., a SLIC) and operate in the manner of a normal SCSI read command.
  • the write command qualified by the preceding rules should not be passed to the subsystem.
  • the violation condition should be stored and an error status reported in subsequent SDU status blocks .
  • the SLIC protocol violation condition should be held until another SDU sign-on process is successfully completed.
  • the sequence number is reset to zero by the sign-on command and incremented by one for each SDU command received.
  • the sequence number is checked by the SLIC as part of error checking in the SDU protocol .
  • An exemplary SDU status block format is shown below:
  • Data Area Data Possible status codes in the SDU status block include the following:
  • an exemplary SDU command API can be defined using the following format:
  • rv is the return structure for the command and is located in the SDU status block.
  • the first integer of the rv structure preferably contains the result for the command. A zero value indicates no error occurred in the command's execution.
  • Other return values are command specific.
  • this exemplary SDU command API employs a syntax similar to the high-level language known as "C, " other high-level languages, assembly codes, or other computer programming languages may be used to write software embodying the method of the present invention.
  • the most fundamental command in the protocol is the sign-on/sign-off command, which enables and disables the protocol. This is the only three block SDU command in this embodiment.
  • the UPLOAD command uploads the SLIC firmware code.
  • a QUERY_UPLOAD command is preferably issued in advance of the UPLOAD command, in order to configure the communication software.
  • Downloading firmware is accomplished by first using a command such as the SETUP_DOWNLOAD command to inform the SLIC hardware about the size of the next SLIC firmware download. The last download sequence is then committed using the COMMIT_DOWNLOAD command, in which a delay is specified by the user. The user can specify the delay (in seconds) to be used in beginning the programming of the memory holding the downloaded information (e.g., a non-volatile memory such as flash RAM) .
  • Interface controller 130 preferably suspends communications when flash RAM programming starts, to allow the programming to proceed without the risk of unknowingly ignoring subsequent commands.
  • interface controller 130 should self-reset after the completion of the download process. Interface controller 130 should not accept any SCSI command after the start of flash RAM programming unless a reset is completed.
  • the ABORT_DOWNLOAD command aborts the current download sequence. The user must first notify the subsystem controller to prepare for the download. A DOWNLOAD command is then issued to download a small portion of the image file at a time. The user can abort the download by using ABORT_DOWNLOAD . Otherwise, user should commit the download using COMMIT_DOWNLOAD .
  • This SDU command invokes a delayed execution to a number of functions. Delay is normally specified in seconds. Immediately after command is issued, an indication that the timer is running should be given. Since the subsystem controller will not be accessible while running in this mode, a delay allows the operator to terminate the SDU function as well as other processes currently using the subsystem controller.
  • interface controller 130 performs a series of internal self-tests Usually, the test can be expected to complete within a short period of time. Interface controller 130 should then reboot itself Afterwards, indications will be made if a loop is detected if an opened loop is detected. Hardware problems may also be indicated in th s manner.
  • Interface controller 130 is designed to keep track of the connections and assigned addresses of all the connected SSA drives (i.e., to maintain a SCSI map) .
  • a reset command is provided to allow the user to erase this SCSI map and start anew.
  • Interface controller 130 saves the information m non-volatile memory (e.g , flash RAM) such that it can operate properly after reboot and power-up. However, m some cases, it is desirable to start from a known state, which the reset command allows.
  • the reset command queries product information from interface controller 130, providing information such as the original equipment manufacturer (OEM) that manufactured interface controller 130, hardware and firmware versions, serial number, and other information.
  • Two commands available to determine SSA web topology are QUERY_SSA and QUERYJTOPOLOGY .
  • the QUERY_SSA command determines the status of node node_number and returns this information. The result is equal to -1 for a nonexistent node.
  • the QUERYJTOPOLOGY command determines the topology of the SSA web. An array is used to contain the nodes connected to port 1 of interface controller 130, and another to contain the nodes connected to port 2 of the SLIC. A value of 0 or -1 m each array may be used to indicate the end of the sequence. When the sequence ends with 0 (home node), the topology is a loop. When the sequence ends with -1, the topology consists of two strings. A third array contains the node number that is currently in service mode. Other query commands may also be supported.
  • commands include commands which return the node and logical unit number for each device attached to the SCSI communications channel, for example.
  • SSA service commands may be implemented to permit the execution of various utility functions needed to operate the SSA nodes .
  • interface controller 130 snould be a master to issue these commands .
  • the first of these commands, SSA_SET_SERVICE puts the node m service mode, and allows the service mode to be enabled and disabled
  • the instruction SSA_WEB_RESET starts the SSA web reset procedure.
  • a SCSI pass -through command, PASSJTHROUGH may also be provided to force the command to be passed through to the SCSI device connected thereto.
  • Other commands may also be provided.
  • a subsystem communication application according to the present invention may be installed on several different computing platforms with only minor alterations, and no alterations to the portions of the software which actually communicate with the subsystem. Moreover, because no special driver software is required to operate the subsystem communication application, the user is relieved from installing, configuring, and maintaining such software, a significant benefit .
  • This software is referred to herein as SSA_SERV software The following describes the installation of an the SSA_SERV software according to the present invention.
  • the SSA_SERV software assists a user m servicing an SSA subsystem attached to a SLIC
  • the service function may include features such as :
  • Installing SSA_SERV software on a computer running a UNIX operating system may include one or more of the following steps First, a new directory is created for the SSA_SERV software and the software extracted from removable media into this directory Installation of the SSA_SERV software is then completed by running an installation script which copies the necessary files to various locations m the OS ' s filesystem, sets up configuration files, and further configures the software .
  • the SLIC partition For the software's exclusive use. Multiple partitions may be provided to allow the application to switch to an alternate partition and remain operational, in the event that one partition is unavailable due to hardware problem or scheduled maintenance. These partitions are preferably created on different drives to provide added redundancy. Preferably, the last cylinder of the disk is reserved as the SLIC partition. Assigning the first cylinder of the disk for the SLIC partition should normally be avoided, as this may conflict with the OS's filesystem.
  • the SLIC partitions created for use by the SSA_SERV software should be specified in a configuration file.
  • the configuration file is preferably a text
  • nnn is a string of up to 15 characters and represents the user- defined SLIC device's name.
  • SSA_SERV When the SSA_SERV software is executed, it reads in data blocks in the communication area of the partition. In case SSA_SERV detects any protocol error, the original data is restored to the disk. This protects the user from corrupting data stored on the disk. This might occur, for example, when the device path name is entered incorrectly in the configuration file. For example, if the user specifies a local SCSI disk partition as the SLIC partition, the SLIC commands will be written to the disk directly. When SSA_SERV reads the status block, it will detect an error and restore the original data to the disk.
  • a configuration file can be used to store configuration information.
  • a file is created (either by the user or the installation program) that the SSA_SERV software will use to write commands to and read data from, to support the given embodiment of the present invention.
  • multiple files could be used to provide redundancy.
  • the subsystem communication protocol of the present invention provides several benefits.
  • a subsystem communication protocol such as that described herein permits an application employing this protocol to be used on several different platforms, merely by recompiling the application's source code. This greatly reduces the effort required to support subsystem communications on several different platforms .
  • the present invention simplify the creation of such applications, it simplifies their use as well.
  • an application employing the present invention requires no special device driver software to communicate with subsystem, the application's users are relieved of having to install and configure such driver software .
  • the present invention thus simplifies both the creation and use of application software that must communicate with a computer subsystem.
  • the present invention also incurs minimal overhead in the transfer of control information between the CPU and the subsystem. Further, the present invention maintains simplicity in the hardware used to communicate between the CPU and the subsystem.
  • the present invention offers a flexible approach which is not dependent on specific features of the given computing platform or operating system (OS) , as noted above .
  • OS operating system

Abstract

A method and apparatus implement a communications protocol (130) whereby a host application program (100) can communicate with a computer subsystem (140) without the use of special driver software. In this way, the application program is able to invoke virtually any vendor-unique function on a compatible subsystem controller using only standard read/write system calls. This avoids platform dependency and greatly improves the portability of the application program.

Description

PLATFORM- INDEPENDENT SUBSYSTEM PROTOCOL
BACKGROUND OF THE INVENTION The present invention relates to computer subsystems. More particularly, the present invention relates to a method and apparatus for communicating with one or more computer subsystems via a platform- independent communication protocol.
The need for increasingly powerful computer subsystems has mandated the development of increasingly sophisticated computer peripheral devices to off-load tasks from the host computer's central processing unit (CPU). Examples include storage subsystems, graphics controllers, and network interface controllers, among others. Because such subsystems are often critical to the host system's performance, the transfer of information between the CPU and its subsystems should incur as little overhead as reasonably possible. Further, it s preferable to maintain simplicity in the hardware used to communicate between the CPU and the subsystem, both for reasons of cost and reliability. Finally, a flexible approach whicn is not dependent on specific features of the given computing platform or operating system (OS) is also desirable.
When designing a controller for a computer subsystem (e.g., an intelligent small computer systems interface (SCSI) controller for a storage subsystem) , it is thus generally desirable to offer the capability to communicate with that subsystem in a manner that meets the foregoing criteria. For example, this might take the form of controlling/configuring various features of the subsystem by sending commands from the host computer. The ability to monitor the health and/or performance of the subsystem from the host is also often desired.
Using the intelligent SCSI subsystem as an example, it can De seen that historically, the foregoing types of vendor-unique features nave been implemented using some non-standard SCSI commands ιe.g., Send Diagnostic and Receive Diagnostic commands) This approach, while straightforward, forces a software implementation of such functionality that is highly host -dependent . Moreover, the way m which an application program requests a SCSI driver to send these types of vendor-unique commands is in no way standardized in the industry. Therefore, new driver software modules must repeatedly written and re- written for the many different platforms and OSs commonly m use today
This repeated effort is a drain on the resources of those creating such software applications.
What is therefore desirable is a method and apparatus which permits an application program to communicate with a computer subsystem without the use of driver software written especially for supporting communications on a specific platform. SUMMARY OF THE INVENTION The present invention provides techniques that allow a host application to communicate with one or more computer subsystems via a communication protocol that is platform independent. A method and apparatus according to the present invention implement a communications protocol whereby a host application program can communicate with a computer subsystem without the use of special driver software. In this way, the application program is able to invoke virtually any function on a compatible subsystem controller using only standard read/write system calls. This avoids platform dependency, greatly improving the portability of an application program using this technique .
One aspect of the present invention provides a computer-implemented method for communicating between a CPU and a subsystem. Communications according to the method of the present invention begin by writing a data packet to the subsystem. The data packet includes a signature and an identifier. The signature uniquely identifies the command as being a command to the subsystem under a protocol of the present invention. If information is to be returned from the subsystem, the central processing unit reads from the subsystem using the identifier. As with the signature, the use of this identifier indicates that the read is requesting the information generated by the last command whose data has not yet been read.
When a write is performed, the subsystem first detects the signature. Data which might be a command may be constantly checked by the subsystem to determine if the data being sent is indeed a command. Alternatively, only a subset of such commands might be checked. When such a signature is detected, the subsystem stores the identifier. This allows any accesses using the identifier to be classified as a subsystem command. Alternatively, when the central processing unit sends a read command to the subsystem that reads from a location identified by the identifier, the read is detected by analyzing the read command's identifier. When such a read command is detected, the requisite information is returned from the subsystem to the central processing unit.
A further understanding of the nature and advantages of the invention described herein may be realized by reference to the remaining portions of the specification and the attached drawings .
BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 depicts a block diagram of a host computer system 10 suitable for implementing the present invention or being connected in a network implementing the present invention; Fig. 2A depicts a platform-independent subsystem protocol in accordance with one embodiment of the present invention; Fig. 2B depicts one embodiment of an interface controller of the present invention;
Fig. 2C depicts another embodiment of an interface controller of the present invention, Fig. 3 depicts the steps of performing a write operation conforming to platform- independent subsystem protocol in accordance with one embodiment of the present invention, and
Fig 4 depicts the steps of performing a read operation conforming to platform-independent subsystem protocol in accordance with one embodiment of the present invention
DESCRIPTION OF THE SPECIFIC EMBODIMENTS Introduction The present invention supports communication with a computer subsystem (e g., a hard disk subsystem) by allowing the transfer of information using a communication protocol that obviates the need for a software driver to communicate with the subsystem Application programs and subsystems employing the method of the present invention require no special driver software in order to communicate because such an application communicates directly with the subsystem by writing to and reading from conventional OS constructs such as partitions and files . This allows the subsystem communication source code to be run on multiple computing platforms d e , in a platform-independent manner) simply by recompiling that source code No rewriting of the subsystem communication source code is required, as must often be done with current techniques And, unlike current techniques, no new driver software need be created to operate an application's subsystem communication code on a new computing platform
General Architecture
An application according to the present invention is configured to run on a host computer 10, and permit nost computer 10 to communicate with one or more of its subsystems using the method of the present invention Host computer system 10 includes a bus 12 which interconnects major subsystems such as a central processing unit (CPU) 14, a system memory 16 (e.g , dynamic random-access memory or DRAM), an input/output (I/O) adapter 18, an external device such as a display screen 24 v a display adapter 26, a keyboard 32 and a mouse 34 via I/O adapter 18, and a subsystem controller 36 A floppy disk drive 38 operative to receive a floppy disk 40 is also provided.
Subsystem controller 36 contains a recognition unit 37, which is capable of recognizing the subsystem protocol commands of the present invention. Recognition unit 37 may be configured to analyze all commands sent to subsystem controller 36, in which case recognition unit 37 is in the data and control paths Alternatively, data and control information may be passed to both recognition unit 37 and the device (s) being controlled. A further possibility is performing the analysis of commands in firmware. These alternatives are described further in relation to Figs. 2B and 2C, below. Subsystem controller 36 may serve as an interface controller for a fixed disk drive 42 or a CD-ROM player 44, for example. CD-ROM player 44 is operative to receive a CD-ROM 46. Fixed d sk 42 may be a part of host computer system 10 or may be separate and accessed through other interface systems . A network interface 48 may provide a connection to a LAN or to the Internet, for example Many other devices or subsystems (not shown) may be connected n a similar manner.
With regard to the present invention, subsystem controller 36, for example, might be a SCSI interface controller that supports the usual SCSI command set, m addition to the commands of the present invention. Such commands, and descriptions of normal SCSI operations, are included m "The Book of SCSI A Guide for Adventurers" by Peter M Ridge, and David Deming (No Starch Printers; April 1995; ISBN: 1886411026) and "SCSI Understanding the Small Computer System Interface" from NCR Corporation (Prentice Hall Computer Books, January 1, 1990, ISBN: 0137968558), which are included herein by reference
Also, it is not necessary for all of the devices shown in Fig. 1 to be present to practice the present invention Moreover, the devices and subsystems shown n Fig 1 may be interconnected in different ways from that illustrated The operation of a computer system such as host computer 10 is readily known in the art and s not discussed in detail m this application. Code that employs the present invention may be operably disposed or stored m computer-readable storage media such as system memory 16, fixed disk 42, CD-ROM 46, or floppy disk 40 A software application may employ a communication protocol according to the present invention to communicate with any of the subsystems illustrated above, and others.
Fig. 2A depicts a block diagram of the software and hardware modules that communicate m a system of the present invention An application program 100 containing the functionality provided by the present invention (l e., compiled source code, generated according to the present invention) is loaded onto host computer 10 by downloading the program to fixed disk 42. Application program 100 is run on CPU 14, and allows CPU 14 to communicate with certain of the various subsystems in host computer 10 without the need for special driver software. In normal operation, application program 100 performs writes and reads by calling operating system functions 110. Operating system functions 110 are standard functions of the given operating system running on host computer 10 that read data from and write data to one or more subsystems of host computer 10. For example, these functions might be the routines which read and write files on fixed disk 42.
Alternatively, they might be routines which read and write raw block data, n a UNIX-type operating system environment. In a UNIX environment, a separate disk partition might be employed to hold the area written to and read from, when communicating with the subsystem. Subsequently, operating system functions 110 communicate with standard driver software 120, which is provided w th the operating system (or the subsystem) to support communication between the operating system and the given subsystem. Standard driver software 120 communicates the commands (and any associated data) through an interface controller 130 (e.g , subsystem controller 36 of Fig. 1) to a subsystem 140 (e.g., fixed disk drive 42 of Fig. l) While it is shown as a single block, interface controller 130 may actually consist of several hardware modules. For example, in a SCSI environment, interface controller 130 would preferably include a SCSI host adapter and hard disk controller card with the recognition circuitry of the present invention (e.g , recognition unit 37 of Fig 1) situated m the controller card However, such recognition circuitry may reside on any of the hardware modules within interface controller 130 Because, m the usual case, the information being communicated is not protocol information, interface controller 130 merely passes the commands and data through to the device being controlled Interface controller 130 may include a recognition unit such as recognition unit 37 of Fig. 1.
Fig. 2B illustrates one embodiment of interface controller 130, exemplified by subsystem controller 36 In this embodiment, the recognition circuitry of the present invention, exemplified by recognition unit 37, is an integral part of data and control lines 200 In this configuration, recognition unit 37 receives commands from standard driver software 120 and analyzes these commands to determine if they are subsystem protocol commands, or simply commands for one of the devices being controlled. This may be done using a comparator and two registers The first register holds a signature that one or more of the subsystem protocol commands will contain (the use of signatures and other designations of the present invention are described later) The second register contains a portion of the command being analyzed which is expected to contain the subsystem protocol command signature. The outputs of the two registers are fed into the comparator, which subsequently indicates whether the information in the second register is the signature sought, and that the command being analyzed is indeed a subsystem protocol command If a signature is identified, the command is passed to interface controller hardware 210 Otherwise, the command (and associated data, if any) is passed to subsystem 140.
To minimize the overhead involved in analyzing every command from standard driver software 120, recognition un t 37 may be configured to analyze only a subset of the possible commands sent to interface controller 130, based on one or more features of the commands which might possibly be sent (e.g , command length) In the configuration shown in Fig. 2B, when recognition unit 37 receives a subsystem protocol command, the subsystem protocol command is passed to interface controller hardware 210 over control lines 220. Associated data, if any, is passed to interface controller hardware 210 over data lines 230. Alternatively, control lines 220 and data lines 230 may be combined into a bus over which data and control information are passed.
Fig. 2C illustrates an alternative embodiment of interface controller 130 in which the communications are passed to both recognition unit 37 and subsystem 140 in parallel. In that case, recognition unit 37 simply monitors the communications between standard driver software 120 and interface controller 130. In this configuration, recognition unit 37 passes a subsystem protocol command to interface controller hardware 210 when protocol communications occur. The subsystem protocol command is passed to interface controller hardware 210 over control lines 220. Associated data, if any, is passed to interface controller hardware 210 over data lines 230.
Alternatively, control lines 220 and data lines 230 may be combined into a bus over which data and control information are passed, as noted above. Subsystem 140 would thus ignore communications so identified, for example, by means of a tristate technique, in order to electrically disconnect subsystem 140 from interface controller 130.
Another alternative, although not illustrated, is the use of firmware routines in interface controller 130 to perform the requisite analysis of commands passed to interface controller by standard driver software 120. Assuming interface controller hardware of interface controller 130 would normally be capable of monitoring the data/control streams passing through it, the interface controller hardware's firmware could be configured to analyze commands issued by standard driver software 120. Subsystem protocol commands would then be executed by the interface controller hardware, and non-protocol commands passed to subsystem 140.
Application program 100 communicates with interface controller 130 by writing a data packet to interface controller 130 which includes a signature and an identifier. Interface controller 130 analyzes some or all of the traffic between application program 100 (and so standard driver software 120) and subsystem 140. When a write command containing the given signature is detected, that command is acted upon by interface controller 130, and is not passed to subsystem 140. If results are generated by the write command, a read command may be issued to retrieve that information. The read command contains the identifier used by the write command, and so is itself identified.
Normally, this identifier will indicate an address in either the memory or I/O space of host computer 10, or the memory or I/O space of the subsystem. For example, a logical block address (LBA) of a file or partition in a storage subsystem (e.g., fixed disk 42) could be used as the identifier. Application program 100 could thus write to a specific
Figure imgf000009_0001
TJ Ω ft) Ω μ- μ- ϋ 3 ti pT ft) O 3 cn ro ft) o 3 ti en a <! 01 μ- rt ti ø ro ø Pi 3
0 μ- tr ro 3 ft) rt
Ω 0 ro 01 Ω rt 3 Ω ro
O TJ rt μ- Ω o 3 i rt 01 ro 0 ro 3 ft) μ- μ- rt Pi 3 3 a
Ω o 3 ro 0 ft) Ω
0 a 3 rt en Hi 3 ro
3 pi rt tr ø Pi
H 3 K1 tr Ω ro TJ μ] rt 01
3 P) μj ro 0 ti TJ tr tr
3 ^ 3 ro O ro ro ft) o P. - s- 3 rt ti en ϋ &
3 tn ti ft) 0 rt 01 ro ro o ro 0 μ- 3 en 0 rt rt rt Pi tr tr TJ μ- tr ro tr ro Ω cn β) cn ro ro ^. O ^ μ- en ti ti Ω ft) ft) 3 tn ti ø o 0 3 3 rt en ro P>
P € 3 P. ø ro P Pi μ- ti 3 0 3 3 Ω <
3 μ- ft) 3 £ μ- ft) μ- ft) ro rt 3 O μ- Ω Ω a 3 3
3 ro Pi rt 3 ft) 0 rt rt IP rt
C 3 O TJ ft)
- Ω ft) rt μ- 3 Ω ft) IP CO 0 tr pi 0 0 Ω μ- ro ω PJ 3 ro 3 3 ø ti
H 3 0 s; μ- ti 01 0
TJ PJ € 0 ti tr Ω Hi c Ά P) 3 m en μ- ro ft) s- μ- i ø rt rt rt μ- Ω rt
H ϋ in 0 ft) ro — s μ- rt tr 3" rn 3 ro O tr &) μ-
0 ro Ω ro 3 O 3 en en Hi rt £ 0 3 ø I
0 o ti x 3 TJ rt ro rt tn ii μ- 3 ft) ti en ro m rt tr rt p) 0 Ω Ω m ft) ro 3 μ- 3 tr rt ft) μ- tr
H 3 0 3 P 0 0 ø 3 3 μ- ti IP en Ω en μ- ft) Pi ro rt rt 0 μ- rt c ti ro O 0 3 3" r Pi 3 01 Hi n tp ro 2 ro rt 0 tr TJ 0 m s- μ- tr Pi ro α Hi ft) μ- μ- ϋ Hi en ft) 3 P en t μ- μ- ro rt μ- P) rt ; ro rt ro ft) Pi 3 tr 3 rt ro i 8 ~ — ' ro i ro TJ rt tr
1 ro a ti μ- ft> i pi 3 rt P) TJ o Hi rt ro en rt μ- ti tr μ-
H Hi tn ro ro μ-
Pi en H 3 μ- 0 en ro ti Hi ø ro Hi ro tr ro 3
Ω tr ft) 0 Pi en a en tr s:
0 en Pi H r rt ro ti
3 3 P) en rt μ-
3 en Ω ft) en rt s- rt
P) rt o rt ro ro
3 ro 3 μ- σ 3 ro
3 3 0 ro 3 ft) en ft) 3 μ- 3
3 3 rt i
Pi IQ 3"
Figure imgf000009_0003
en ro
Figure imgf000009_0002
performance (especially if a long signature were used) . Alternatively, a discernible subset of the possible write commands could be checked, reducing this overhead.
Fig. 3 illustrates the steps performed in writing information to a subsystem from a host computer using a protocol according to the present invention. First, a write operation is issued by host computer 10 (step 300) . This operation writes a data packet to subsystem 140 (step 305) . Interface controller 130 receives this data packet and analyzes it to determine if the data packet contains a signature (step 310) . Interface controller 130 then determines if the data packet contains a signature pattern (step 320) . If the data packet simply contains data to be written to subsystem 140, the data packet is passed through to subsystem 140 (step 330) . However, if the data packet contains a signature (and so is a protocol command) , the identifier contained in the data packet is read into interface controller 130 (step 340), which stores this information for future use (e.g., for use by a read operation) (step 350) . The operation specified by the protocol command is then performed, if any such action needs to be taken (step 360) . With regard to the subsystem protocol read command, the subsystem controller distinguishes this command from standard read commands on the basis of its identifier (e.g., a logical block address (LBA) of the file or partition from which the command is to "read") . This identifier is preferably the same as that of the preceding subsystem protocol write command, which simplifies the protocol.
Alternatively, out-of-order write-read pair processing may be supported by a protocol according to the present invention. For example, a protocol read command may read information generated by a protocol write command other than that generated by the immediately preceding protocol write command. In certain embodiments, the subsystem protocol application (or different subsystem protocol applications, if more than one is used) may read from different drives and addresses. The subsystem protocol application may read this information from the dedicated file or partition, or may request that the OS and subsystem driver perform a read-back of the data which was just written.
Fig. 4 illustrates the steps performed in reading information from a subsystem into a host computer using a protocol according to the present invention. First, a read operation is issued by host computer 10 (step 400) . Interface controller 130 receives this command and analyzes it (step 410) . Interface controller 130 then determines whether the read is to a location identified by the identifier in a corresponding write command (i.e., if it contains the proper identifier) (step 410) . If the data packet is simply a command to read data from subsystem 140, the read command is passed through to subsystem 140 for completion (step 430) . However, if the data packet contains the proper identifier (and so is a protocol command) , the identifier contained in the data packet is processed by interface controller 130, which responds to the read operation by providing the requested information (step 440) . For example, th s might be information generated by a corresponding write protocol command. Preferably, protocol commands are arranged and issued in pairs. This might take the form of, for example, the issuance of a SCSI write command (a subsystem protocol write command) followed by the issuance of a SCSI read command (a subsystem protocol read command) In that case the data-out phase of the write command transfers the order descriptor block, parameters, and data to the subsystem. The data-in phase of the read command transfers the status, results, and data back to host application after carrying out the orders given n the write command The subsystem orders and results are embedded n the data area of the subsystem protocol commands Thus, the SCSI status (or other standard status information) regarding eitner the subsystem protocol write or read command is irrelevant to indicating that the subsystem protocol is operating properly
The subsystem protocol commands are preferably issued in single-threaded fashion ( .e , all commands are issued and executed in- order) . If issued in this manner, the write-read subsystem protocol command sequence described above is ensured In a SCSI based subsystem, the SCSI check condition status command may cause the host SCSI driver or host operating system to make some attempt to retry the failed command. This situation should be detected by the subsystem controller to avoid the out-of-sequence execution of subsystem protocol commands.
In order to avoid the performance penalty of having to examine the data of every write command to see if it contains a signature pattern, one embodiment of the present invention uses two block long write and read commands as subsystem protocol commands Any read or write which is not two blocks long (a relatively unusual size for most operating systems) is immediately eliminated from consideration as a possible subsystem protocol command This reduces the workload of the subsystem controller analyzing the command stream.
Negligibly low probability of a random, unintentional match of the given signature pattern is also desirable Thus, a comparatively long signature pattern should normally be employed In order to avoid the performance penalty of verifying a long pattern m each subsystem protocol write command, as well as a reduction m bandwidth caused by the use of signatures of such length, one embodiment of the present invention does not actually put this long signature pattern in every subsystem protocol write command Instead, a special subsystem protocol command called the subsystem protocol sign-on command is defined This write command is a different size than other subsystem protocol commands (e.g , six blocks, rather than two), allowing subsystem protocol sign-on command to be distinguished from other subsystem protocol write commands without analyzing the command's data Six blocks is also a relatively
Figure imgf000012_0001
Figure imgf000012_0002
The subsystem controller may be configured to classify any write or read directed to the subsystem protocol address which s not 2 blocks long (and is not a new subsystem protocol sign-on write command) as a protocol violation Whatever the cause, a protocol violation would, for example, immediately terminate the protocol, or another action could be taken to indicate the failure (e.g., a blinking light on the controller)
Protocol violations may be detected by either the subsystem controller or the host application. If detected by the subsystem controller, the command may be treated as though no subsystem protocol sign-on command was ever received and allow the storage media to be accessed normally. The subsystem controller would then remain m the signed-off state, until a new subsystem protocol sign-on command was received. The next time the host sent a subsystem protocol read command, data from the media (rather than specially formatted information from the suDsystem controller) would be returned This data would fa l one or more of the host application's validity checks, thereby triggering an error m the host application (and so indicating a failure in the protocol)
Subsystem Communication Example
The following defines one embodiment of an apparatus designed according to the present invention. A serial loop interface controller (SLIC) is described which employs a communication protocol, application programming interface (API) , and user interface according to the present invention Of course, the present invention may be incorporated into other types of interface controllers, with the attendant benefits described herein The host application that performs diagnostics on one or more disk drive units m this environment is referred to as a SLIC Diagnostic Utility (SDU) The SDU is designed to allow a small -computer systems interface (SCSI) host to communicate with an interface controller 130 through a SCSI interface (e.g., subsystem controller 36) In th s example, a serial communications architecture s used to connect the subsystem to host computer 10 Specifically, a serial storage architecture (SSA) is used in this example, although other serial communications architectures could be used (e ., a Fiber Channel Arbitrated Loop (FCAL) ) Moreover, the present invention supports architectures other than the serial communications architecture discussed herein (e g , parallel architectures) In this embodiment, the host uses standard SCSI commands over the same interface to access the SSA devices within interface controller 130. The functions of the SDU include SLIC configuration, SSA administration, error diagnostics, microcode downloading, and other such functions . An SDU of the present invention may be implemented in at least two different ways by having the application software write to one or more of at least two different operating system constructs In one implementation, the application writes to and reads from a data file. By sending information to a data file (in, for example, a DOS environment) , the information can be detected by interface controller 130, and acted upon in an appropriate manner. In another implementation, the application writes to and reads from a reserved partition (e.g., a "SLIC partition") created on a hard disk connected to interface controller 130 controller. This mechanism, referred to herein as the SDU Disk Partition (SDU-DP) technique, requires the host to reserve a SLIC partition exclusively for the SDU to communicate with the SLIC. Data read from and written to the SLIC partition should be interpreted by interface controller 130 according to the SLIC communication protocol . The SDU can then communicate with interface controller 130 using disk accesses and standard system calls, which maximizes portability by avoiding the use of platform-specific driver software. However, the host system needs to be correctly booted with SLIC-SSA drives attached before the SDU can be launched. This method would be appropriate in a UNIX environment, for example.
Alternatively, a vendor-unique approach may be employed in implementing a subsystem protocol according to the present invention. This might be done to allow communication with subsystems manufactured by a specific vendor that are capable of using a superset of the normal subsystem protocol commands (i.e., to provide vendor-specific subsystem protocol commands) . For example, special read and write commands could be provided to allow easy identification of subsystem protocol commands . Alternatively, a pass -through command could be used to issue vendor- unique commands to a subsystem device of the vendor's manufacture, supported by the host system's device driver.
These vendor-unique commands can be filtered and interpreted as SDU communication commands. Although it is possible to support SCSI pass-through commands in a platform-specific manner, each implementation's interface would then differ from platform to platform. The SDU of such an approach would have to be ported and tested on each platform supported. This approach may be used to provide a PC-based service tool for off-line analysis of sub- systems without involving the real host system, but is antithetical to the idea of providing platform- independent support .
When the SDU-DP technique is used in a UNIX system, one or more SDU partitions are created by the system administrator on the hard disk being controlled. Preferably, these partitions are used exclusively by the SDU-DP program. The size of the SDU partition is preferably the minimum size that the host system allows in order to avoid needlessly wasting disk space. The SDU-DP program takes the form of a utility program running on the host system. When launched, the SDU-DP program locates the SDU partition on the hard disk from the configuration file provided by user and issues an SDU sign-on command to the subsystem controller (e.g., interface controller 130). The SDU sign-on command may be, for example, a three block raw data write to the SDU partition with a specific pattern in data area (i.e., a signature pattern) . The SDU sign-on command turns on the SDU mode and sets the SDU-LBA (the logical block address used to communicate with the SDU) If a SCSI subsystem is being controlled, for example, the SDU-LBA is preferably the identifier (ID) , logical unit number (LUN) , and LBA combination from the sign-on command.
Once the SDU-LBA has been set, the application communicates with interface controller 130 by issuing a two block write command (SDU command) to the SDU-LBA. The SDU application preferably issues a two block read command to the SDU-LBA (e.g., an SDU read, after any SDU write, to retrieve the SDU status block) The syntax of the SDU status block may then be checked by the SDU-DP application. Any syntax error may be reported to user as possible conflict on the data partition The issue of more than one sign-on command before sign-off s permitted, and makes possible the switching of the SDU-DP to an alternate SDU partition via an "updating" sign-on command.
When powering on interface controller 130, the SDU mode will normally be "off" and the SDU-LBA undefined. Any three block write command to any of the SLIC-SSA devices is subsequently intercepted and checked by the SLIC firmware to determine if it is a SDU sign-on command. When a sign-on command is detected, the SDU mode is changed to "on," the SDU sequence number (if used) is reset to zero and the SDU-LBA is set to the [ID, LUN, LBA] combination m the sign-on command. During SDU mode, any two block write to the SDU-LBA is checked by interface controller 130 Assuming these write commands have the correct magic number (an arbitrarily chosen number, similar to a signature, that is used to ensure that the checksum is non-zero) and checksum (used to determine if the data is protocol data or simply random data) , they are treated as SDU write commands An SDU write command is not normally passed to the SSA device m this situation because it is intended as an SDU command, and not as data to be written to the SSA device. The two block read commands to the SDU-LBA are passed to the SSA device unless they are compliant with SDU protocol. These SDU-compliant read commands should be treated as SDU read commands and return the data generated by the SLIC being addressed.
A SLIC configured to employ the communication protocol of che present invention uses an SDU sign-on command to enable the SDU mode During SDU mode, the SCSI read/write command accessing SDU at the location identified by ID/LUN/LBA (as before) should be checked against the SDU communication protocol parameters The following example illustrates this checking for a preferred embodiment of the present invention:
- the LBA of the SCSI command should be equal to the SDU-LBA, - the transfer length of the SCSI command should be equal to 2, and for write commands, the magic number and the checksum should indicate a write command, according to the SDU command format,
- the sequence number in SDU command header should be incremented, and any SDU write command completed with a good status should be followed by an SDU read command. (No two contiguous SDU read or write commands are allowed in such an embodiment.)
In SDU mode, an SDU read command violating the SLIC protocol should be passed to the subsystem (e.g., a hard disk storage unit) controlled by the controller (e.g., a SLIC) and operate in the manner of a normal SCSI read command. The write command qualified by the preceding rules should not be passed to the subsystem. When an SDU protocol error is detected, the violation condition should be stored and an error status reported in subsequent SDU status blocks . The SLIC protocol violation condition should be held until another SDU sign-on process is successfully completed.
An exemplary SDU command block format is shown below:
Byte Offset Data Description
0 0x5555aaaa Magic number for command block
4 Seq # Seq # for this command block Cmd Code SLIC Command Op Code
12 arg 0 argument 0 16 arg 1 argument 1 20 arg 2 argument 2 24 arg 3 argument 3 28 Checksum Checksum (e.g., XOR 0:7 = 0) 32-1023 Data Area Data
The sequence number is reset to zero by the sign-on command and incremented by one for each SDU command received. The sequence number is checked by the SLIC as part of error checking in the SDU protocol . An exemplary SDU status block format is shown below:
Bvte Offset Data Description
0 0x5555aaaa Magic Number for status block
4 Seq # + 1 Incremented Seq # of the corresponding command block
8 Cmd Code Command Code
12 Status Status Code
16 Checksum Checksum
20-1023 Data Area Data Possible status codes in the SDU status block include the following:
Status Code Description
0 COMMAND COMPLETED WITHOUT ERROR 1 INVALID COMMAND
2 STATUS NOT READY
3 PROTOCOL ERROR
4 ILLEGAL REQUEST
A Set of Exemplary SDU Commands
Based on the above SDU communication protocol, an exemplary SDU command API can be defined using the following format:
<command code> (argO, argl, arg2 , arg3) struct rv { ... }
where rv is the return structure for the command and is located in the SDU status block. Note that the first integer of the rv structure preferably contains the result for the command. A zero value indicates no error occurred in the command's execution. Other return values are command specific. While this exemplary SDU command API employs a syntax similar to the high-level language known as "C, " other high-level languages, assembly codes, or other computer programming languages may be used to write software embodying the method of the present invention. The most fundamental command in the protocol is the sign-on/sign-off command, which enables and disables the protocol. This is the only three block SDU command in this embodiment. When a message indicating that the command completed without error is returned in the SDU status block, a new communication session is enabled and the ID/LUN/LBA is stored to enable the identification of incoming SDU commands. The data field of the sign-on command repeats with a unique character string (such as "StartSDUUtility, " ) . When the sign-off command completes without error, the SDU mode is disabled.
The UPLOAD command uploads the SLIC firmware code. A QUERY_UPLOAD command is preferably issued in advance of the UPLOAD command, in order to configure the communication software. Downloading firmware is accomplished by first using a command such as the SETUP_DOWNLOAD command to inform the SLIC hardware about the size of the next SLIC firmware download. The last download sequence is then committed using the COMMIT_DOWNLOAD command, in which a delay is specified by the user. The user can specify the delay (in seconds) to be used in beginning the programming of the memory holding the downloaded information (e.g., a non-volatile memory such as flash RAM) . Interface controller 130 preferably suspends communications when flash RAM programming starts, to allow the programming to proceed without the risk of unknowingly ignoring subsequent commands. Furthermore, interface controller 130 should self-reset after the completion of the download process. Interface controller 130 should not accept any SCSI command after the start of flash RAM programming unless a reset is completed. The ABORT_DOWNLOAD command aborts the current download sequence. The user must first notify the subsystem controller to prepare for the download. A DOWNLOAD command is then issued to download a small portion of the image file at a time. The user can abort the download by using ABORT_DOWNLOAD . Otherwise, user should commit the download using COMMIT_DOWNLOAD . This SDU command invokes a delayed execution to a number of functions. Delay is normally specified in seconds. Immediately after command is issued, an indication that the timer is running should be given. Since the subsystem controller will not be accessible while running in this mode, a delay allows the operator to terminate the SDU function as well as other processes currently using the subsystem controller.
The diagnostic routines within interface controller 130 perform a series of internal self-tests Usually, the test can be expected to complete within a short period of time. Interface controller 130 should then reboot itself Afterwards, indications will be made if a loop is detected if an opened loop is detected. Hardware problems may also be indicated in th s manner.
Interface controller 130 is designed to keep track of the connections and assigned addresses of all the connected SSA drives (i.e., to maintain a SCSI map) . A reset command is provided to allow the user to erase this SCSI map and start anew. Interface controller 130 saves the information m non-volatile memory (e.g , flash RAM) such that it can operate properly after reboot and power-up. However, m some cases, it is desirable to start from a known state, which the reset command allows. The reset command queries product information from interface controller 130, providing information such as the original equipment manufacturer (OEM) that manufactured interface controller 130, hardware and firmware versions, serial number, and other information. Two commands available to determine SSA web topology are QUERY_SSA and QUERYJTOPOLOGY . The QUERY_SSA command determines the status of node node_number and returns this information. The result is equal to -1 for a nonexistent node. The QUERYJTOPOLOGY command determines the topology of the SSA web. An array is used to contain the nodes connected to port 1 of interface controller 130, and another to contain the nodes connected to port 2 of the SLIC. A value of 0 or -1 m each array may be used to indicate the end of the sequence. When the sequence ends with 0 (home node), the topology is a loop. When the sequence ends with -1, the topology consists of two strings. A third array contains the node number that is currently in service mode. Other query commands may also be supported. These commands include commands which return the node and logical unit number for each device attached to the SCSI communications channel, for example. Moreover, several SSA service commands may be implemented to permit the execution of various utility functions needed to operate the SSA nodes . During the normal operation of an SSA web, interface controller 130 snould be a master to issue these commands . The first of these commands, SSA_SET_SERVICE, puts the node m service mode, and allows the service mode to be enabled and disabled The instruction SSA_WEB_RESET starts the SSA web reset procedure. A SCSI pass -through command, PASSJTHROUGH may also be provided to force the command to be passed through to the SCSI device connected thereto. Other commands may also be provided.
Exemplary Installation Procedure
As noted, a subsystem communication application according to the present invention may be installed on several different computing platforms with only minor alterations, and no alterations to the portions of the software which actually communicate with the subsystem. Moreover, because no special driver software is required to operate the subsystem communication application, the user is relieved from installing, configuring, and maintaining such software, a significant benefit . This software is referred to herein as SSA_SERV software The following describes the installation of an the SSA_SERV software according to the present invention.
The SSA_SERV software assists a user m servicing an SSA subsystem attached to a SLIC The service function may include features such as :
1. Firmware Download
2. Error Logging 3 Diagnostics
4 Disk administration
Examples of installation procedures are now given. Installing SSA_SERV software on a computer running a UNIX operating system may include one or more of the following steps First, a new directory is created for the SSA_SERV software and the software extracted from removable media into this directory Installation of the SSA_SERV software is then completed by running an installation script which copies the necessary files to various locations m the OS ' s filesystem, sets up configuration files, and further configures the software .
To use the SSA_SERV software, it is preferable to create at least one disk partition, called the SLIC partition, for the software's exclusive use. Multiple partitions may be provided to allow the application to switch to an alternate partition and remain operational, in the event that one partition is unavailable due to hardware problem or scheduled maintenance. These partitions are preferably created on different drives to provide added redundancy. Preferably, the last cylinder of the disk is reserved as the SLIC partition. Assigning the first cylinder of the disk for the SLIC partition should normally be avoided, as this may conflict with the OS's filesystem. The SLIC partitions created for use by the SSA_SERV software should be specified in a configuration file. The configuration file is preferably a text
file and in the following format:
# Comment line has a # in the first column
# <SLIC dev name> <Raw disk partition path name> nnn /dev/rdsk/clt0d0s7 nnn /dev/rdsk/cltld3s7
where nnn is a string of up to 15 characters and represents the user- defined SLIC device's name. When the SSA_SERV software is executed, it reads in data blocks in the communication area of the partition. In case SSA_SERV detects any protocol error, the original data is restored to the disk. This protects the user from corrupting data stored on the disk. This might occur, for example, when the device path name is entered incorrectly in the configuration file. For example, if the user specifies a local SCSI disk partition as the SLIC partition, the SLIC commands will be written to the disk directly. When SSA_SERV reads the status block, it will detect an error and restore the original data to the disk. In the case of an installation in a PC operating system, the same basic procedure is followed, albeit with OS-specific adjustments. For example, the software is loaded onto a system drive and installed using a script or installation procedure. As before, a configuration file can be used to store configuration information. However, in this case a file is created (either by the user or the installation program) that the SSA_SERV software will use to write commands to and read data from, to support the given embodiment of the present invention. As before, multiple files could be used to provide redundancy.
Conclusion
Given the foregoing, it can be seen that the subsystem communication protocol of the present invention provides several benefits. A subsystem communication protocol such as that described herein permits an application employing this protocol to be used on several different platforms, merely by recompiling the application's source code. This greatly reduces the effort required to support subsystem communications on several different platforms . Not only does the present invention simplify the creation of such applications, it simplifies their use as well. Because an application employing the present invention requires no special device driver software to communicate with subsystem, the application's users are relieved of having to install and configure such driver software . The present invention thus simplifies both the creation and use of application software that must communicate with a computer subsystem. The present invention also incurs minimal overhead in the transfer of control information between the CPU and the subsystem. Further, the present invention maintains simplicity in the hardware used to communicate between the CPU and the subsystem. Finally, the present invention offers a flexible approach which is not dependent on specific features of the given computing platform or operating system (OS) , as noted above .
The invention has now been explained with reference to specific embodiments. Other embodiments will be apparent to those of ordinary skill in the art in view of the foregoing description. It is therefore not intended that this invention be limited except as indicated by the appended claims and their full scope of equivalents.

Claims

WHAT IS CLAIMED IS:
1 A computer- implemented subsystem controller communication method comprising the steps of. issuing a command from a host computer to a subsystem controller, said command communicating information to said subsystem comtroller; identifying said command as a protocol command using said information; and if said command is identified as said protocol command, causing said subsystem controller to perform an action, and otherwise, passing said command to a device controlled by said subsystem controller.
2. The method of claim 1, wherein said command is a sign-on command and said identifying step comprises the step of. identifying said command as said sign-on command using at least one of (1) a data length, (2) a length of said command, (3) a signature pattern, and (4) an address.
3. The method of claim 2, wherein said identifying step uses said address and said method further comprises the steps of: issuing a subsequent command from a host computer to said subsystem controller, sa d subsequent command containing further address information; identifying said subsequent command as one of a plurality of protocol commands by comparing said further address information with said address; and if said subsequent command is identified as said one of said plurality of protocol commands, causing said subsystem controller to perform an action, and otherwise, passing sa d subsequent command to a device controlled by said subsystem controller
4 The method of claim 3, wherein said command and said subsequent command are storage device commands .
5 The method of claim 3, wherein said subsystem controller is a SCSI host adapter, sa d device is a SCSI hard disk drive, and said command and said subsequent command are SCSI commands.
6 The method of claim 5, wherein said address information is a SCSI address.
7 The method of claim 6, wherein said SCSI address is a SCSI logical block address.
8. The method of claim 2, said method further comprising the steps of: writing to said subsystem using said information; and reading from said subsystem using said information.
9. The method of claim 8, wherein said writing step comprises the steps of: issuing a write command to said subsystem controller, said write command communicating first identifying information to said subsystem controller; identifying said write command as a protocol write command by comparing said first identifying information with said information; and causing said subsystem controller to perform an action if said write command is identified as said protocol write command, said subsystem controller generating data in response to said write command.
10. The method of claim 9, wherein said reading step comprises the steps of: issuing a read command to said subsystem controller, said read command communicating second identifying information to said subsystem controller; identifying said read command as a protocol read command by comparing said second identifying information with said information; and returning said data from said subsystem controller to said host computer if said second identifying information matches said information.
11. A computer-implemented communication method comprising the steps of : storing first identifying information in a subsystem controller; writing from a host computer to said subsystem controller, said writing step communicating second identifying information from said host computer to said subsystem controller, wherein said second identifying information is used to identify write protocol commands; and reading from said subsystem controller, said reading step communicating third identifying information from said host computer to said subsystem controller, wherein said third identifying information is used to identify read protocol commands .
12. The method of claim 1, wherein said writing step comprises the steps of: issuing a write command to said subsystem controller, said write command communicating second identifying information to said subsystem controller; identifying said write command as a write protocol command by comparing said second identifying information with said first identifying information; and causing said subsystem controller to perform an action if said write command is identified as said protocol command, said subsystem controller generating data m response to said write command.
13. The method of claim 12, wherein said write command is a SCSI write command.
14. The method of claim 11, wherein said reading step comprises the steps of: issuing a read command to said subsystem controller, said read command communicating third identifying information to said subsystem controller; identifying said read command as a read protocol command by comparing said third identifying information with said first identifying information; and returning said data from said subsystem controller to said host computer if said third identifying information matches said first identifying information.
15 The method of claim 14, wherein said read command is a SCSI read command.
16. A computer- implemented method for communicating between a host computer and a subsystem, sa d method comprising the steps of: writing a data packet to the subsystem, said data packet containing first identifying information and second identifying information; and reading from the subsystem using said second identifying information.
17. The method of claim 16, wherein said writing step comprises the steps of: issuing a write command to the subsystem, said write command writing said data packet to the subsystem; detecting said first identifying information; and storing said second identifying information.
18. The method of claim 16, wherein said reading step comprises the steps of: issuing a read command to the subsystem, said read command including third identifying information; detecting said third identifying information by comparing said third identifying information with said second identifying information; and returning information from the subsystem to the host computer if third identifying information matches said second identifying information.
19. A computer-implemented method for communicating between a host computer and a subsystem controller using a communication protocol, said method comprising the steps of: issuing a write command from the host computer to the subsystem controller, said write command containing information; determining if said write command is a protocol write command by using said information, and causing the subsystem controller to perform an action specified by said write command if said write command is identified as said protocol write command.
20 The method of claim 19, wherein said determining step comprises the step of analyzing said write command by: detecting said information; and comparing said information with identification information stored in the subsystem controller.
21. The method of claim 19, wherein said method further comprises the steps of . issuing a read command from the host computer to the subsystem controller, said read command containing further information, determining if said read command is a protocol read command using said further information; and causing said subsystem controller to send a response if said read command is identified as said protocol read command.
22. The method of claim 21, wherein said determining step comprises the step of analyzing said read command by detecting said further information; and comparing said further information with identification information stored in the subsystem controller.
23. The method of claim 21, wherein said response comprises requested information generated by a previously- issued write command .
24. A computer-implemented method for communicating between a host computer and a subsystem, said method comprising the steps of: writing a data packet to the subsystem, said data packet containing a signature and a first identifier; and reading from the subsystem using a second identifier, said subsystem providing information if said second identifier matches said first identifier.
25. The method of claim 24, wherein said writing step comprises the steps of. issuing a write command to the subsystem, said write command writing said data packet to the subsystem, detecting said signature; and storing said first identifier.
26. The method of claim 24, wherein said reading step comprises the steps of: issuing a read command to the subsystem, wherein said second identifier is included within said read command; analyzing said second identifier, and returning information from the subsystem to the host computer if said second identifier matches said first identifier.
27. The method of claim 26, wherein said issuing step comprises writing to a file.
28. The method of claim 26, wherein said issuing step comprises writing to a partition.
29 The method of claim 26, wherein said analyzing step comprises the steps of: detecting said second identifier, and comparing said second identifier with said first identifier.
30. A computer- implemented method for communicating between a host computer and a subsystem, said method comprising the steps of: issuing a write command to the subsystem, said write command writing a data packet to the subsystem, said data packet containing a signature and a first identifier; detecting said signature; storing said first identifier; issuing a read command to the subsystem, said read command including a second identifier and reading from the subsystem using said second identifier; detecting said second identifier; comparing said second identifier with said first identifier; and returning information from the subsystem to the host computer if said second identifier matches said first identifier.
31. A computer-implemented method for communicating between a host computer and a subsystem, said method comprising the steps of : issuing a write command to the subsystem, said write command writing a data packet to the subsystem, said data packet containing a signature and an identifier; detecting said signature; storing said identifier; issuing a read command to the subsystem, said read command including said identifier; detecting said identifier within said read command; and returning information from the subsystem to the host computer upon detecting said identifier.
32. A computer system comprising: a subsystem; and a central processing unit coupled to said subsystem and configured to communicate with said subsystem by virtue of being configured to: issue a write command to write a data packet to the subsystem, said data packet containing a signature and an identifier, and issue a read command, said read command including said identifier and reading from the subsystem using said identifier.
33. The computer system of claim 32, wherein said subsystem is further configured to: detect said signature; and store said identifier.
34. The computer system of claim 32, wherein: said central processing unit is configured to read from the subsystem using said identifier by virtue of being configured to send a read command to the subsystem, said read command reading from a location identified by said identifier; and said subsystem is further configured to detect said identifier, and return information from said subsystem to said central processing unit if said identifier is detected.
35. A computer program product for communicating between a host computer and a subsystem, said product comprising: code that writes a data packet to the subsystem, said data packet containing a signature and an identifier; and code that reads from the subsystem using said identifier.
36. A computer-implemented method for controlling a subsystem via commands issued by a host computer, said method comprising the steps of : issuing a write command to the subsystem; and determining if said write command contains a signature, and, if said write command contains a signature, executing the command on the subsystem.
37. The method of claim 36, wherein said issuing step comprises writing to a file.
38. A computer- implemented method for controlling a subsystem via commands issued by a host computer, said method comprising the steps of: issuing a write command to the subsystem, said write command writing a data packet to the subsystem; detecting a signature within said data packet; and executing a command contained in said data packet on the subsystem if said data packet contains a signature.
39. A computer-implemented method for controlling a subsystem via protocol commands issued by a host computer, said method comprising the steps of : issuing a write command to the subsystem; and determining if said write command contains a signature, and, if said write command contains a signature, executing a sign-on command on the subsystem, said sign-on command enabling the subsystem to receive the protocol commands by causing the subsystem to store a first identifier.
40. The method of claim 39, further comprising the steps Of: issuing a write command to the subsystem, said write command containing a second identifier; and analyzing said write command, and, if said second identifier matches said first identifier, executing a protocol command on the subsystem, said protocol command _ being included in a data packet of said write command.
41. The method of claim 40, wherein said analyzing step comprises the steps of: detecting said second identifier; and comparing said second identifier with said first identifier.
42. The method of claim 39, further comprising the steps of: issuing a read command to the subsystem, wherein a second identifier is included within said read command; analyzing said read command; and returning information from the subsystem to the host computer if said second identifier matches said first identifier.
43. The method of claim 42, wherein said analyzing step comprises the steps of: detecting said second identifier; and comparing said second identifier with said first identifier.
PCT/US1998/020840 1997-10-03 1998-10-01 Platform-independent subsystem protocol WO1999018512A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU96818/98A AU9681898A (en) 1997-10-03 1998-10-01 Platform-independent subsystem protocol

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US6093797P 1997-10-03 1997-10-03
US60/060,937 1997-10-03
US08/992,202 US6078968A (en) 1997-10-03 1997-12-17 Platform-independent communications protocol supporting communications between a processor and subsystem controller based on identifying information
US08/992,202 1997-12-17

Publications (1)

Publication Number Publication Date
WO1999018512A1 true WO1999018512A1 (en) 1999-04-15

Family

ID=26740522

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/020840 WO1999018512A1 (en) 1997-10-03 1998-10-01 Platform-independent subsystem protocol

Country Status (3)

Country Link
US (1) US6078968A (en)
AU (1) AU9681898A (en)
WO (1) WO1999018512A1 (en)

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941543B1 (en) 1995-05-30 2005-09-06 Roy-G-Biv Corporation Motion control system and method
US6571141B1 (en) 1995-05-30 2003-05-27 Roy-G-Biv Corporation Application programs for motion control devices including access limitations
US6209037B1 (en) 1995-05-30 2001-03-27 Roy-G-Biv Corporation Motion control systems using communication map to facilitating communication with motion control hardware
US6542925B2 (en) 1995-05-30 2003-04-01 Roy-G-Biv Corporation Generation and distribution of motion commands over a distributed network
US20020156872A1 (en) * 2001-01-04 2002-10-24 Brown David W. Systems and methods for transmitting motion control data
US6859671B1 (en) 1995-05-30 2005-02-22 Roy-G-Biv Corporation Application programs for motion control devices including access limitations
US20010032278A1 (en) * 1997-10-07 2001-10-18 Brown Stephen J. Remote generation and distribution of command programs for programmable devices
JPH11338762A (en) * 1998-05-26 1999-12-10 Mitsubishi Electric Corp Ic memory and operation compatibility discriminating method by the ic memory
US6282584B1 (en) * 1998-08-18 2001-08-28 International Business Machines Corporation Structure and method for reading/writing signature commands from/to a plurality of controller pairs
US6885898B1 (en) 2001-05-18 2005-04-26 Roy-G-Biv Corporation Event driven motion systems
US8032605B2 (en) 1999-10-27 2011-10-04 Roy-G-Biv Corporation Generation and distribution of motion commands over a distributed network
CA2389183C (en) 1999-10-27 2008-05-20 Roy-G-Biv Corporation Systems and methods for generating and communicating motion data through a distributed network
US7904194B2 (en) 2001-02-09 2011-03-08 Roy-G-Biv Corporation Event management systems and methods for motion control systems
WO2002071241A1 (en) * 2001-02-09 2002-09-12 Roy-G-Biv Corporation Event management systems and methods for the distribution of motion control commands
US6918026B2 (en) * 2001-03-30 2005-07-12 Agere Systems Inc. External device transmission system and a fast pattern processor employing the same
WO2003019397A1 (en) * 2001-08-31 2003-03-06 Roy-G-Biv Corporation Motion services protocol accessible through uniform resource locator (url)
US6901473B2 (en) * 2001-10-16 2005-05-31 Sun Microsystems, Inc. Apparatus and method for configuring an external device
TW552501B (en) * 2002-03-22 2003-09-11 Taiwan Semiconductor Mfg Version recording and tracking method
US7188336B2 (en) * 2002-04-17 2007-03-06 International Bussiness Machines Corporation Multi-platform software interface and documentation generator
US7085857B2 (en) * 2002-11-13 2006-08-01 Hewlett-Packard Development Company, L.P. Identifier module integrity
GB0307450D0 (en) * 2003-03-31 2003-05-07 Matsushita Electric Ind Co Ltd Method for interfacing storage devices
US7290086B2 (en) * 2003-05-28 2007-10-30 International Business Machines Corporation Method, apparatus and program storage device for providing asynchronous status messaging in a data storage system
US20040268359A1 (en) * 2003-06-27 2004-12-30 Hanes David H. Computer-readable medium, method and computer system for processing input/output requests
US20060064503A1 (en) 2003-09-25 2006-03-23 Brown David W Data routing systems and methods
US8027349B2 (en) 2003-09-25 2011-09-27 Roy-G-Biv Corporation Database event driven motion systems
EP1690173A4 (en) * 2003-11-17 2010-04-21 Roy G Biv Corp Command processing systems and methods
KR100892286B1 (en) 2006-12-05 2009-04-07 한국전자통신연구원 Multi Partition dependency supported Embedded Linux Kernel and Application Configuration method
US7685352B2 (en) * 2008-07-31 2010-03-23 International Business Machines Corporation System and method for loose ordering write completion for PCI express
JP2010176494A (en) * 2009-01-30 2010-08-12 I-O Data Device Inc Attachment/detachment type composite device
US10003466B1 (en) * 2015-09-15 2018-06-19 Amazon Technologies, Inc. Network traffic with credential signatures

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5363484A (en) * 1990-11-13 1994-11-08 International Business Machines Corporation Multiple computer system with combiner/memory interconnection system employing separate direct access link for transferring information packets
US5418960A (en) * 1990-06-29 1995-05-23 Sun Microsystems, Inc. Transparently self-configured option board using an option board protocol PROM
US5421014A (en) * 1990-07-13 1995-05-30 I-Tech Corporation Method for controlling multi-thread operations issued by an initiator-type device to one or more target-type peripheral devices

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1228677A (en) * 1984-06-21 1987-10-27 Cray Research, Inc. Peripheral interface system
US5724599A (en) * 1994-03-08 1998-03-03 Texas Instrument Incorporated Message passing and blast interrupt from processor

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5418960A (en) * 1990-06-29 1995-05-23 Sun Microsystems, Inc. Transparently self-configured option board using an option board protocol PROM
US5421014A (en) * 1990-07-13 1995-05-30 I-Tech Corporation Method for controlling multi-thread operations issued by an initiator-type device to one or more target-type peripheral devices
US5363484A (en) * 1990-11-13 1994-11-08 International Business Machines Corporation Multiple computer system with combiner/memory interconnection system employing separate direct access link for transferring information packets

Also Published As

Publication number Publication date
AU9681898A (en) 1999-04-27
US6078968A (en) 2000-06-20

Similar Documents

Publication Publication Date Title
US6078968A (en) Platform-independent communications protocol supporting communications between a processor and subsystem controller based on identifying information
US6694381B1 (en) Platform-independent communications protocol supporting communications between a processor and subsystem controller
JP5363776B2 (en) System and method for patching computer programs
US6289426B1 (en) Drive preparation methods for intelligent backup systems
US6374363B1 (en) Method for generating a footprint image file for an intelligent backup and restoring system
US7788537B1 (en) Techniques for collecting critical information from a memory dump
CN101551754B (en) Dynamic insertion and removal of virtual software sub-layers
US6598131B2 (en) Data image management via emulation of non-volatile storage device
US6789215B1 (en) System and method for remediating a computer
KR100773004B1 (en) System and apparatus for eliminating user interaction during hardware configuration at system boot
US6629158B1 (en) System, apparatus, and method for configuring an array controller
JP4448878B2 (en) How to set up a disaster recovery environment
KR20020035570A (en) Method, system and computer readable storage medium for automatic device driver configuration
US20020067504A1 (en) Method and apparatus for automatic upgrade of a product&#39;s printer driver
EP1119809B1 (en) Process monitoring in a computer system
US6374366B1 (en) Automated drive repair systems and methods
GB2318658A (en) Remote diagnostics after boot error
US7472052B2 (en) Method, apparatus and computer program product for simulating a storage configuration for a computer system
CN1834912B (en) ISCSI bootstrap driving system and method for expandable internet engine
US6971046B1 (en) System and method for performing input/output diagnostics
US6523103B2 (en) Disablement of a write filter stored on a write-protected partition
JP2000241460A (en) System and method for intelligent analytical probe
US6931422B1 (en) Enhanced backup and recovery methodology
US6842810B1 (en) Restricted access devices
US7587713B1 (en) System and method for controlling installation of one or more components for a data storage management system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: KR

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA