Dell T310 Personal Computer User Manual


 
Dell
PowerEdge T310 Technical Guide 43
Intruder Detect. The Intel 3420 provides an input signal (INTRUDER#) that can be attached to
a switch that is activated by the system case being opened. The Intel 3420 can be programmed
to generate an SMI# or TCO interrupt due to an active INTRUDER# signal.
8.17 System Management Bus (SMBus 2.0)
The Intel 3420 contains an SMBus Host interface that allows the processor to communicate with
SMBus slaves. This interface is compatible with most I2C devices. Special I2C commands are
implemented.
The Intel 3420’s SMBus host controller provides a mechanism for the processor to initiate
communications with SMBus peripherals (slaves). Also, the Intel 3420 supports slave functionality,
including the Host Notify protocol. Hence, the host controller supports eight command protocols of the
SMBus interface (see System Management Bus
(SMBus) Specification, Version 2.0): Quick Command, Send Byte, Receive Byte, Write Byte/Word,
Read Byte/Word, Process Call, Block Read/Write, and Host Notify.
Intel 3420’s SMBus also implements hardware-based Packet Error Checking for data robustness and
the Address Resolution Protocol (ARP) to dynamically provide address to all SMBus devices.
8.18 Intel Anti-Theft Technology
The Intel 3420 introduces a new hardware-based security technology which encrypts data stored on
any SATA compliant HDD in AHCI Mode. This feature gives the end-user the ability to restrict access to
HDD data by unknown parties. Intel® Anti-Theft Technology can be used alone or can be combined
with software encryption applications to add protection against data theft.
Intel® Anti-Theft Technology functionality requires a correctly configured system, including an
appropriate processor, Intel Management Engine firmware, and system BIOS support.
8.19 Intel Virtualization Technology for Directed I/O
The Intel 3420 provides hardware support for implementation of Intel
®
Virtualization Technology with
Directed I/O (Intel VT-d). Intel VT-d Technology consists of technology components that support the
virtualization of platforms based on Intel Architecture Processors. Intel VT-d Technology enables
multiple operating systems and applications to run in independent partitions. A partition behaves like a
virtual machine (VM) and provides isolation and protection across partitions. Each partition is allocated
its own subset of host physical memory.
8.20 JTAG Boundary-Scan
Intel 3420 adds the industry standard JTAG interface and enables Boundary-Scan in place of the XOR
chains used in previous generations of the Intel 3420. Boundary-Scan can be used to ensure device
connectivity during the board manufacturing process. The JTAG interface allows system manufacturers
to improve efficiency by using industry available tools to test the Intel 3420 on an assembled board.
Since JTAG is a serial interface, it eliminates the need to create probe points for every pin in an XOR
chain. This eases pin breakout and trace routing and simplifies the interface between the system and a
bed-of-nails tester.