Dell

Intruder Detect. The Intel 3420 provides an input signal (INTRUDER#) that can be attached to a switch that is activated by the system case being opened. The Intel 3420 can be programmed to generate an SMI# or TCO interrupt due to an active INTRUDER# signal.

8.17 System Management Bus (SMBus 2.0)

The Intel 3420 contains an SMBus Host interface that allows the processor to communicate with SMBus slaves. This interface is compatible with most I2C devices. Special I2C commands are implemented.

The Intel 3420’s SMBus host controller provides a mechanism for the processor to initiate communications with SMBus peripherals (slaves). Also, the Intel 3420 supports slave functionality, including the Host Notify protocol. Hence, the host controller supports eight command protocols of the SMBus interface (see System Management Bus

(SMBus) Specification, Version 2.0): Quick Command, Send Byte, Receive Byte, Write Byte/Word, Read Byte/Word, Process Call, Block Read/Write, and Host Notify.

Intel 3420’s SMBus also implements hardware-based Packet Error Checking for data robustness and the Address Resolution Protocol (ARP) to dynamically provide address to all SMBus devices.

8.18 Intel Anti-Theft Technology

The Intel 3420 introduces a new hardware-based security technology which encrypts data stored on any SATA compliant HDD in AHCI Mode. This feature gives the end-user the ability to restrict access to HDD data by unknown parties. Intel® Anti-Theft Technology can be used alone or can be combined with software encryption applications to add protection against data theft.

Intel® Anti-Theft Technology functionality requires a correctly configured system, including an appropriate processor, Intel Management Engine firmware, and system BIOS support.

8.19 Intel Virtualization Technology for Directed I/O

The Intel 3420 provides hardware support for implementation of Intel® Virtualization Technology with Directed I/O (Intel VT-d). Intel VT-d Technology consists of technology components that support the virtualization of platforms based on Intel Architecture Processors. Intel VT-d Technology enables multiple operating systems and applications to run in independent partitions. A partition behaves like a virtual machine (VM) and provides isolation and protection across partitions. Each partition is allocated its own subset of host physical memory.

8.20 JTAG Boundary-Scan

Intel 3420 adds the industry standard JTAG interface and enables Boundary-Scan in place of the XOR chains used in previous generations of the Intel 3420. Boundary-Scan can be used to ensure device connectivity during the board manufacturing process. The JTAG interface allows system manufacturers to improve efficiency by using industry available tools to test the Intel 3420 on an assembled board. Since JTAG is a serial interface, it eliminates the need to create probe points for every pin in an XOR chain. This eases pin breakout and trace routing and simplifies the interface between the system and a bed-of-nails tester.

PowerEdge T310 Technical Guide

43

Page 44
Image 44
Dell T310 manual System Management Bus SMBus, Intel Anti-Theft Technology, Intel Virtualization Technology for Directed I/O

T310 specifications

The Dell PowerEdge T310 is a tower server designed to meet the needs of small businesses and remote offices looking for an efficient and reliable server solution. With its robust architecture and user-friendly features, the T310 provides a solid foundation for various applications, such as file sharing, data backup, and running virtual machines.

One of the standout features of the Dell T310 is its powerful processing capabilities. It is equipped with Intel Xeon processors, which deliver impressive performance and reliability. These processors are designed for multi-threaded applications and can handle intensive workloads, making the T310 suitable for demanding environments. The server supports up to two Intel Xeon processors, allowing businesses to scale their computing power as their needs grow.

Memory capacity is another key characteristic of the T310. It supports up to 32GB of DDR3 RAM, which is essential for running multiple applications simultaneously without any performance degradation. The memory can be expanded easily, allowing businesses to increase capacity as their data needs evolve.

Storage options on the T310 are flexible and extensive. The server features up to four hot-swappable 3.5-inch hard drive bays, supporting SATA and SAS drives. This allows for a maximum internal storage capacity of up to 8TB, giving businesses the space they need for data-intensive tasks. The hot-swappable design enhances uptime, enabling users to replace drives without shutting down the server.

In terms of connectivity, the Dell T310 is equipped with multiple USB ports, Ethernet ports, and optional expansion slots. It also supports various RAID configurations, ensuring data protection and redundancy. This flexibility makes it an excellent choice for organizations looking to maintain data integrity while maximizing performance.

Another notable aspect of the T310 is its energy efficiency. The server incorporates Dell’s energy-efficient technologies, helping businesses reduce their overall energy consumption and lower operational costs. The compact design of the T310 allows it to fit easily into standard office environments without taking up excessive space.

Overall, the Dell PowerEdge T310 stands out as a reliable and versatile tower server. Its combination of processing power, memory capacity, flexible storage options, and energy-efficient technologies make it a great choice for small to medium-sized businesses looking for a dependable server solution to support their critical applications and services.