IBM Spectrum Scale and IBM Elastic Storage System Network Guide

Total Page:16

File Type:pdf, Size:1020Kb

IBM Spectrum Scale and IBM Elastic Storage System Network Guide Front cover IBM Spectrum Scale and IBM Elastic Storage System Network Guide Kedar Karmarkar John Lewars Sandeep R. Patil Sandeep Naik Kevin Gildea Rakesh Chutke Larry Coyne In partnership with IBM Academy of Technology Redpaper International Technical Support Organization IBM Spectrum Scale and IBM Elastic Storage System Network Guide February 2021 REDP-5484-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (February 2021) This edition applies to Version 5, Release 1, Modification 0 of IBM Spectrum Scale and Version 5, Release 3, Modification 4 of IBM Elastic Storage Server. This document was created or updated on February 17, 2021. © Copyright International Business Machines Corporation 2021. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii Authors. vii Now you can become a published author, too! . viii Comments welcome. ix Stay connected to IBM Redbooks . ix Chapter 1. IBM Spectrum Scale introduction . 1 1.1 How is IBM Spectrum Scale different from other network storage technologies. 2 1.2 Types of network traffic in IBM Spectrum Scale . 3 1.2.1 Control traffic. 4 1.2.2 Data traffic. 5 1.2.3 Administration traffic . 6 1.3 High-level network flow for data and control traffic . 6 1.3.1 IBM Spectrum Scale supported networks. 6 1.3.2 IBM Spectrum Scale expels . 7 Chapter 2. Network planning and best practices for IBM Spectrum Scale and IBM Elastic Storage System. 9 2.1 Network planning and sizing . 10 2.2 Bandwidth requirements . 10 2.2.1 Aggregate cluster bandwidth . 10 2.2.2 Single node bandwidth . 14 2.3 Deciding network bandwidth planning. 14 2.4 Network design considerations . 17 2.5 OSI Layer . 20 2.5.1 OSI Layer 1: Physical layer. 20 2.5.2 OSI Layer 2: Link layer . 21 2.5.3 OSI Layer 3+4. 22 2.6 Network multipathing. 25 2.6.1 Layer 2 multipathing . 25 2.6.2 Hosts-to-switch side . 25 2.6.3 Switch side . 26 2.6.4 Layer 3 multipathing . 27 2.7 Network infrastructure . 28 2.7.1 Common network topologies. 28 2.7.2 LAN and WAN considerations. 30 2.7.3 Network monitoring tools. 31 2.7.4 Flow control techniques . 31 2.8 Network considerations for special use cases . 34 Chapter 3. Implementation recommendations . 37 3.1 Network verification tools . 38 3.1.1 IBM Spectrum Scale mmnetverify command . 38 3.1.2 IBM Spectrum Scale nsdperf tool . 38 3.2 Ethernet Network Adaptor configuration settings . 38 3.2.1 Ring buffers. 39 © Copyright IBM Corp. 2021. All rights reserved. iii 3.2.2 Maximum transmission unit. 39 3.2.3 Transmission queue length. 40 3.2.4 Flow control. 40 3.3 TCP/IP settings . 41 3.3.1 TCP/IP send and receive buffers . 41 3.3.2 TCP/IP window scaling . 41 3.3.3 TCP/IP settings for network with packet loss . 42 3.3.4 Other TCP/IP setting. 42 3.4 Remote Direct Memory Access settings . 42 3.4.1 Settings to enable RDMA between nodes . 42 3.4.2 Tuning for RDMA . 43 3.5 Network multipathing settings . 43 Chapter 4. Network monitoring and troubleshooting . 45 4.1 Network-related issues overview . 46 4.2 Network monitoring with IBM Spectrum Scale GUI. 47 4.2.1 Monitoring Network Events Using the GUI . 47 4.2.2 Monitoring Network Performance Using the GUI . 47 4.2.3 Network Monitoring with IBM Spectrum Scale mmhealth command . 48 4.2.4 IBM Spectrum Scale call back commands to monitor network-related events . 49 4.3 Network troubleshooting with IBM Spectrum Scale mmdiag command . 50 4.4 Verifying network with IBM Spectrum Scale mmnetverify command . 53 4.5 Testing network performance with IBM Spectrum Scale nsdperf tool. 59 4.6 IBM Spectrum Scale mmuserauth check . 63 4.7 Using IBM Spectrum Scale log messages to debug network-related issues . 64 4.8 Node expels because of network issues. 65 4.9 Understanding and resolving the effect of network packet loss . 74 4.9.1 Overview and effect . 74 4.10 Resource issues . 79 Appendix A. IBM Spectrum Scale lease configuration variables effect on expel timing flows. 83 Lease configuration parameters related to disk leasing. 84 failureDetectionTime . ..
Recommended publications
  • A Comparison of TCP Automatic Tuning Techniques for Distributed
    A Comparison of TCP Automatic Tuning Techniques for Distributed Computing Eric Weigle [email protected] Computer and Computational Sciences Division (CCS-1) Los Alamos National Laboratory Los Alamos, NM 87545 Abstract— Manual tuning is the baseline by which we measure autotun- Rather than painful, manual, static, per-connection optimization of TCP ing methods. To perform manual tuning, a human uses tools buffer sizes simply to achieve acceptable performance for distributed appli- ping pathchar pipechar cations [1], [2], many researchers have proposed techniques to perform this such as and or to determine net- tuning automatically [3], [4], [5], [6], [7], [8]. This paper first discusses work latency and bandwidth. The results are multiplied to get the relative merits of the various approaches in theory, and then provides the bandwidth £ delay product, and buffers are generally set to substantial experimental data concerning two competing implementations twice that value. – the buffer autotuning already present in Linux 2.4.x and “Dynamic Right- Sizing.” This paper reveals heretofore unknown aspects of the problem and PSC’s tuning is a mostly sender-based approach. Here the current solutions, provides insight into the proper approach for various cir- cumstances, and points toward ways to improve performance further. sender uses TCP packet header information and timestamps to estimate the bandwidth £ delay product of the network, which Keywords: dynamic right-sizing, autotuning, high-performance it uses to resize its send window. The receiver simply advertises networking, TCP, flow control, wide-area network. the maximal possible window. Paper [3] presents results for a NetBSD 1.2 implementation, showing improvement over stock I.
    [Show full text]
  • Network Tuning and Monitoring for Disaster Recovery Data Backup and Retrieval ∗ ∗
    Network Tuning and Monitoring for Disaster Recovery Data Backup and Retrieval ∗ ∗ 1 Prasad Calyam, 2 Phani Kumar Arava, 1 Chris Butler, 3 Jeff Jones 1 Ohio Supercomputer Center, Columbus, Ohio 43212. Email:{pcalyam, cbutler}@osc.edu 2 The Ohio State University, Columbus, Ohio 43210. Email:[email protected] 3 Wright State University, Dayton, Ohio 45435. Email:[email protected] Abstract frequently moving a copy of their local data to tape-drives at off-site sites. With the increased access to high-speed net- Every institution is faced with the challenge of setting up works, most copy mechanisms rely on IP networks (versus a system that can enable backup of large amounts of critical postal service) as a medium to transport the backup data be- administrative data. This data should be rapidly retrieved in tween the institutions and off-site backup facilities. the event of a disaster. For serving the above Disaster Re- Today’s IP networks, which are designed to provide covery (DR) purpose, institutions have to invest significantly only “best-effort” service to network-based applications, fre- and address a number of software, storage and networking quently experience performance bottlenecks. The perfor- issues. Although, a great deal of attention is paid towards mance bottlenecks can be due to issues such as lack of ad- software and storage issues, networking issues are gener- equate end-to-end bandwidth provisioning, intermediate net- ally overlooked in DR planning. In this paper, we present work links congestion or device mis-configurations such as a DR pilot study that considered different networking issues duplex mismatches [1] and outdated NIC drivers at DR-client that need to be addressed and managed during DR plan- sites.
    [Show full text]
  • Intel® Audience Impression Metric (AIM) Suite User Guide July 2011 2 Document Number: 465720-1.1
    Intel® Audience Impression Metric (AIM) Suite User Guide July 2011 Revision 1.1 Document Number: 465720 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Any software source code reprinted in this document is furnished under a software license and may only be used or copied in accordance with the terms of that license. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
    [Show full text]
  • Intel Unveils All New 2010 Intel® Core™ Processor Family
    Intel Unveils All New 2010 Intel® Core™ Processor Family Industry's Smartest, Most Advanced Technology Available in Variety of Price Points LAS VEGAS, Jan 07, 2010 (BUSINESS WIRE) -- Intel Corporation: NEWS HIGHLIGHTS 1 ● Mainstream processors now offer Intel(R) Turbo Boost Technology , automatically adapting to an individual's performance needs ● First 32 nanometer processors and first time Intel is mass-producing a variety of chips at mainstream prices at start of new manufacturing process, reflecting last year's $7 billion investment during economic recession 4 ● Intel(R) Core(TM) i5 processors are about twice as fast as comparable existing PCs for visibly faster video, photo and music downloading experience ● Historic milestone: select processors integrate graphics directly on processors; also include Intel's second generation high-k metal gate transistors ● Beyond laptops and PCs, processors also target ATMs, travel kiosks, digital displays ● More than 10 new chipsets and new 802.11n WiFi and WiMAX products with new Intel(R) My WiFi features Intel Corporation introduced its all new 2010 Intel(R) Core(TM) family of processors today, delivering unprecedented integration and smart performance, including Intel(R) Turbo Boost Technology1 for laptops, desktops and embedded devices. The introduction of new Intel(R) Core(TM) i7, i5 and i3 chips coincides with the arrival of Intel's groundbreaking new 32 nanometer (nm) manufacturing process - which for the first time in the company's history - will be used to immediately produce and deliver processors and features at a variety of price points, and integrate high-definition graphics inside the processor. This unprecedented ramp and innovation reflects Intel's $7 billion investment announced early last year in the midst of a major global economic recession.
    [Show full text]
  • Improving the Performance of Web Services in Disconnected, Intermittent and Limited Environments Joakim Johanson Lindquister Master’S Thesis Spring 2016
    Improving the performance of Web Services in Disconnected, Intermittent and Limited Environments Joakim Johanson Lindquister Master’s Thesis Spring 2016 Abstract Using Commercial off-the-shelf (COTS) software over networks that are Disconnected, Intermittent and Limited (DIL) may not perform satis- factorily, or can even break down entirely due to network disruptions. Frequent network interruptions for both shorter and longer periods, as well as long delays, low data and high packet error rates characterizes DIL networks. In this thesis, we designed and implemented a prototype proxy to improve the performance of Web services in DIL environments. The main idea of our design was to deploy a proxy pair to facilitate HTTP communication between Web service applications. As an optimization technique, we evaluated the usage of alternative transport protocols to carry information across these types of networks. The proxy pair was designed to support different protocols for inter-proxy communication. We implemented the proxies to support the Hypertext Transfer Proto- col (HTTP), the Advanced Message Queuing Protocol (AMQP) and the Constrained Application Protocol (CoAP). By introducing proxies, we were able to break the end-to-end network dependency between two applications communicating in a DIL environment, and thus achieve higher reliability. Our evaluations showed that in most DIL networks, using HTTP yields the lowest Round- Trip Time (RTT). However, with small message payloads and in networks with very low data rates, CoAP had a lower RTT and network footprint than HTTP. 3 4 Acknowledgement This master thesis was written at the Department of Informatics at the Faculty of Mathematics and Natural Sciences, University at the University of Oslo in 2015/2016.
    [Show full text]
  • Use Style: Paper Title
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AUT Scholarly Commons Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty Nurul I Sarkar School of Computing and Mathematical Sciences School of Computing and Mathematical Sciences Auckland University of Technology Auckland University of Technology Auckland, New Zealand Auckland, New Zealand [email protected] [email protected] Abstract – Implementing IPv6 in modern client/server Ethernet motivates us to contribute in this area and formulate operating systems (OS) will have drawbacks of lower this paper. throughput as a result of its larger address space. In this paper we quantify the performance degradation of IPv6 for TCP The results of this study will be crucial to primarily those when implementing in modern MS Windows and Linux organizations that aim to achieve high IPv6 performance via operating systems (OSs). We consider Windows Server 2008 a system architecture that is based on newer Windows or and Red Hat Enterprise Server 5.5 in the study. We measure Linux OSs. The analysis of our study further aims to help TCP throughput and round trip time (RTT) using a researchers working in the field of network traffic customized testbed setting and record the results by observing engineering and designers overcome the challenging issues OS kernel reactions. Our findings reported in this paper pertaining to IPv6 deployment. provide some insights into IPv6 performance with respect to the impact of modern Windows and Linux OS on system II. RELATED WORK performance. This study may help network researchers and engineers in selecting better OS in the deployment of IPv6 on In this paper, we briefly review a set of literature on corporate networks.
    [Show full text]
  • Exploration of TCP Parameters for Enhanced Performance in A
    Exploration of TCP Parameters for Enhanced Performance in a Datacenter Environment Mohsin Khalil∗, Farid Ullah Khan# ∗National University of Sciences and Technology, Islamabad, Pakistan #Air University, Islamabad, Pakistan Abstract—TCP parameters in most of the operating sys- Linux as an operating system is the typical go-to option for tems are optimized for generic home and office environments network operators due to it being open-source. The param- having low latencies in their internal networks. However, this eters for Linux distribution are optimized for any range of arrangement invariably results in a compromized network performance when same parameters are straight away slotted networks ranging up to 1 Gbps link speed in general. For this into a datacenter environment. We identify key TCP parameters dynamic range, TCP buffer sizes remain the same for all the that have a major impact on network performance based on networks irrespective of their network speeds. These buffer the study and comparative analysis of home and datacenter lengths might fulfill network requirements having relatively environments. We discuss certain criteria for the modification lesser link capacities, but fall short of being optimum for of TCP parameters and support our analysis with simulation results that validate the performance improvement in case of 10 Gbps networks. On the basis of Pareto’s principle, we datacenter environment. segregate the key TCP parameters which may be tuned for performance enhancement in datacenters. We have carried out Index Terms—TCP Tuning, Performance Enhancement, Dat- acenter Environment. this study for home and datacenter environments separately, and presented that although the pre-tuned TCP parame- ters provide satisfactory performance in home environments, I.
    [Show full text]
  • EGI TCP Tuning.Pptx
    TCP Tuning Domenico Vicinanza DANTE, Cambridge, UK [email protected] EGI Technical Forum 2013, Madrid, Spain TCP ! Transmission Control Protocol (TCP) ! One of the original core protocols of the Internet protocol suite (IP) ! >90% of the internet traffic ! Transport layer ! Delivery of a stream of bytes between ! " programs running on computers ! " connected to a local area network, intranet or the public Internet. ! TCP communication is: ! " Connection oriented ! " Reliable ! " Ordered ! " Error-checked ! Web browsers, mail servers, file transfer programs use TCP Connect | Communicate | Collaborate 2 Connection-Oriented ! A connection is established before any user data is transferred. ! If the connection cannot be established the user program is notified. ! If the connection is ever interrupted the user program(s) is notified. Connect | Communicate | Collaborate 3 Reliable ! TCP uses a sequence number to identify each byte of data. ! Sequence number identifies the order of the bytes sent ! Data can be reconstructed in order regardless: ! " Fragmentation ! " Disordering ! " Packet loss that may occur during transmission. ! For every payload byte transmitted, the sequence number is incremented. Connect | Communicate | Collaborate 4 TCP Segments ! The block of data that TCP asks IP to deliver is called a TCP segment. ! Each segment contains: ! " Data ! " Control information Connect | Communicate | Collaborate 5 TCP Segment Format 1 byte 1 byte 1 byte 1 byte Source Port Destination Port Sequence Number Acknowledgment Number offset Reser. Control Window Checksum Urgent Pointer Options (if any) Data Connect | Communicate | Collaborate 6 Client Starts ! A client starts by sending a SYN segment with the following information: ! " Client’s ISN (generated pseudo-randomly) ! " Maximum Receive Window for client.
    [Show full text]
  • HP Zbook 15 G3 Mobile Workstation
    QuickSpecs HP ZBook 15 G3 Mobile Workstation Overview HP ZBook 15 G3 Mobile Workstation FRONT VIEW 1. WLAN antennas (2) 9. Lower right, center, left touchpad buttons 2. Internal microphone 10. Storage light indicator 3. Webcam light (with webcam) 11. Battery light indicator 4. Webcam 12. Power light indicator 5. Wireless button 13. Wireless light indicator 6. Volume mute button 14. Upper Right, Center, Left Touchpad buttons 7. Fingerprint reader (select models only) 15. Pointstick 8. Touchpad with scroll zone 16. Power button c04834946 — DA -15374 Worldwide — Version 2 — November 25, 2015 Page 1 QuickSpecs HP ZBook 15 G3 Mobile Workstation Overview LEFT VIEW 1. Security cable slot 4. USB 3.0 port (charging) 2. RJ-45 (Ethernet) 5. SD Card reader 3. VGA port RIGHT VIEW 1. Smart Card reader 5. (2) Thunderbolt™ 3* ports 2. Stereo microphone in / headphone-out combo jack 6. Power connector 3. (2) USB 3.0 Ports 7. Power LED 4. HDMI port c04834946 — DA -15374 Worldwide — Version 2 — November 25, 2015 Page 2 QuickSpecs HP ZBook 15 G3 Mobile Workstation Overview BOTTOM VIEW 1. Speakers c04834946 — DA -15374 Worldwide — Version 2 — November 25, 2015 Page 3 QuickSpecs HP ZBook 15 G3 Mobile Workstation Overview At A Glance Windows® 10 editions, Windows® 7 editions, or FreeDOS Mainstream full performance industrial design, Casted magnesium-reinforced chassis, top cover frame features soft touch paint with lightweight aluminum insert anodized in HP’s new “Space Silver” color with chemical etching. Backlight keyboard in full aluminum deck with magnesium bottom reinforcement, chemically strengthened glass touchpad, and updated system functions indicators.
    [Show full text]
  • DIGITAL WORKPLACE EXPERIENCES Powered by Aruba Mobile First Architecture Jason White Ojchief Nguyen Technologist – Hybrid I.T
    DIGITAL WORKPLACE EXPERIENCES Powered by Aruba Mobile First Architecture Jason White OJChief Nguyen Technologist – Hybrid I.T. Systems Engineering Manager [email protected]@hpe.com @networksjuice “Customer First, Customer Last” Dedicated Sales and Support HPE’s Intelligent Edge Business Unit Intelligent Edge Networking for the Mobile, Cloud, and IoT Era Founded: 2002 Innovation Pioneers IPO: 2007 Leader in Wired and Joined HPE: 2015 Wireless Networking Innovation Hubs Santa Clara, CA -HQ, Portland, Canada, China, Costa Rica, India Workplace experiences Operational experiences for mobile workforce with real-time insights INTELLIGENT EDGE INSIGHTS FROM THE CONVERGENCE OF PEOPLE, PLACES, AND THINGS Brand experiences IT experiences with fueling revenue automation and generation predictive analytics EVOLUTION OF INTELLIGENT EDGE 802.11n 20B Intel Microsoft Enables Connected Introduces Introduces Network “Things” Centrino Right-sizing Lync 2018 and 2003 2007 2009 2010 2013 2014 Beyond Apple iPad 1.5M servers Apple iPhone Enters in operation Drives BYOD Board Rooms INTELLIGENT EDGE DATACENTER, PRIVATE & PUBLIC CLOUD WAN CAMPUS BRANCH INDUSTRIAL SITE Mobile-First Mobile-First, Mobile-First, Cloud-First Cloud-First IoT Centric Mobile-First Campus Infrastructure Management Security Experience Campus AP Access AirWave ClearPass NetInsight Beacons Core / Agg Mobility Master IntroSpect Controllers Partnerships Mobile-First, Cloud-First Branch – “SD-Branch” Infrastructure Security Management Experience Branch Gateways Access Switches
    [Show full text]
  • Amazon Cloudfront Uses a Global Network of 216 Points Of
    Tuning your cloud: Improving global network performance for applications Richard Wade Principal Cloud Architect AWS Professional Services, Singapore © 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved. Topics Understanding application performance: Why TCP matters Choosing the right cloud architecture Tuning your cloud Mice: Short connections Majority of connections on the Internet are mice - Small number of bytes transferred - Short lifetime Expect fast service - Need fast, efficient startup - Loss has a high impact as there is no time to recover Elephants: Long connections Most of the traffic on the Internet is carried by elephants - Large number of bytes transferred - Long-lived single flows Expect stable, reliable service - Need efficient, fair steady-state - Time to recover from loss has a notable impact over the connection’s lifetime Transmission Control Protocol (TCP): Startup Round trip time (RTT) = two-way delay (this is what you measure with a ping) In this example, RTT is 100 ms Roughly 2 * RTT (200 ms) until the first application request is received The lower the RTT, the faster your application responds and the higher the possible throughput RTT 100 ms AWS Cloud 1.5 * RTT Connection setup Connection established Data transfer Transmission Control Protocol (TCP): Growth A high RTT negatively affects the potential throughput of your application For new connections, TCP tries to double its transmission rate with every RTT This algorithm works for large-object (elephant) transfers (MB or GB) but not so well
    [Show full text]
  • Intel® Core™2 Duo Mobile Processor for Intel® Centrino® Duo Mobile Processor Technology
    Intel® Core™2 Duo Mobile Processor for Intel® Centrino® Duo Mobile Processor Technology Datasheet September 2007 Document Number: 314078-004 INFORMATIONLegal Lines and Disclaimers IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined." Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
    [Show full text]