|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: Unsolicited Data.
I've published the new text to this list a while ago. Please look-up the
archives. Julo
"BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)" <matthew_burbridge@hp.com> on
06-06-2001 17:35:38
Please respond to "BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)"
<matthew_burbridge@hp.com>
To: "'ips@ece.cmu.edu'" <ips@ece.cmu.edu>
cc:
Subject: RE: Unsolicited Data.
The current spec states that the F bit is "set to 1 when the immediate data
that accompany the command are all the data associated with this command.
It
is an error if the Length and Expected Length do not match and this bit is
set to 1".
I interpret this as there is no more data to follow and not that the
initiator has opted not to use the unsolicited data feature. Therefore the
spec needs to be modified to indicate that if unsolicited data has been
negotiated (i.e. InitialR2T=no), then the initiator MUST send unsolicited
data of length = min( FirstBurstSize, ExpectedTransferLength ) minus any
immediate data sent).
Matthew Burbridge
NIS-Bristol
Hewlett Packard
Telnet: 312 7010
E-mail: matthewb@bri.hp.com
-----Original Message-----
From: Ayman Ghanem [mailto:aghanem@cisco.com]
Sent: Tuesday, June 05, 2001 6:31 PM
To: ips@ece.cmu.edu
Subject: RE: Unsolicited Data.
If the initiator decides not to send immediate or unsolicited data when it
has negotiated to do so, then the initiator must set the F-bit in the
command PDU. This prompts the target to send R2T.
I still agree that the spec should indicate that the initiator MUST use the
resources it has negotiated. If it has negotiated the option to send
immediate data or unsolicited data then it should do that to the limits
allowed. If it has negotiated a PDU length, it must not send data PDUs less
than the negotiated limit except for last one. While most implementation
may
do that for performance reasons, I would prefer defining this in the spec.
-Ayman
> -----Original Message-----
> From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of
> BURBRIDGE,MATTHEW (HP-UnitedKingdom,ex2)
> Sent: Tuesday, June 05, 2001 11:58 AM
> To: 'ips@ece.cmu.edu'
> Subject: Unsolicited Data.
>
>
> I'm not sure if this has been discussed before but it is causing some
> confusion. The statement below implies that if immediate data has been
> negotiated then the initiator MAY use it.
>
> "If ImmediateData is set to no and InitialR2T is set to no then the
> initiator MUST NOT send unsolicited immediate data but MAY send one
> unsolicited burst of Data-OUT PDUs."
>
> Therefore the target must wait for the initial burst of unsolicited data
> before issuing the first R2T (if there is subsequent data). If the
> initiator decides not to send it then the target must timeout and
> issue the
> R2T for the initial data. Can the spec be changed to state that if
> unsolicited data has been negotiated, then the initiator MUST use it.
>
> Thanks
>
> Matthew Burbridge
> NIS-Bristol
> Hewlett Packard
> Telnet: 312 7010
> E-mail: matthewb@bri.hp.com
>
>
Home Last updated: Tue Sep 04 01:04:31 2001 6315 messages in chronological order |