HyperTransportв„ў System Architecture
A HyperTransport chain consists of a host bridge at one end and some collection of devices connected to it in a daisy-chain arrangement. At the end of the chain, there is a device with a single-link connection. This could either be an end (I/O hub) device, or a multi-link device (e.g. tunnel) which has its downstream link disabled. By contrast, a double-hosted chain has a host bridge at either end and some collection of multi-link devices between them. Figure 17-1 on page 428 illustrates a double-hosted chain. Note that there are no end (I/O hub) devices in a double-hosted chain. Figure 17-1. HyperTransport Double-Hosted Chain Configuration
Reasons For Implementing A Double-Hosted Chain
A double hosted-chain can be useful in fault-tolerant applications where a backup host interface takes over in the event of a failure of the primary interface. It also permits the sharing of a single set of resources and inter-processor communications by two CPUs in a clustering arrangement. Note: the HyperTransport I/O Link Specification Network Extensions allow extending the multiple-host concept to broader topologies using switch and router components . Refer to Chapter 19, entitled "Networking Extensions Overview," on page 443. PCI Configuration Plays Key Role In Chain Setup
PCI configuration cycles are used to program bridges, tunnels, and end devices in each HyperTransport all chain. Two key registers used in setting up double-hosted chain (DHC) parameters are the HyperTransport Host Command CSR for host bridges and the HyperTransport Slave Command CSR for interior devices such as tunnels. These two registers and the key fields pertaining to double-hosted chains are described below. Refer to Chapter 13, entitled "Device Configuration," on page 305 for a more complete description of PCI device configuration. Slave Command CSR
Figure 17-2 and Table 17-1 on page 429 show the format of the Slave Command Register used by all non-host interfaces; key fields used in double-hosted chain configuration are highlighted. Figure 17-2. Slave Command CSR: Key Fields In DHC Configuration
Table 17-1. Slave Command CSR: Definitions Of Key Fields In DHC Configuration
Host Command CSR
Figure 17-3 and Table 17-2 show the format of the Host Command Register used by all host interfaces; key fields used in double-hosted chain configuration are highlighted. Figure 17-3. Host Command CSR: Key Fields In DHC Configuration
Table 17-2. Host Interface Block Host Command CSR Bit Assignment
|