Subsystem Control Point (SCP) Management Programming Manual

SPI Programming Considerations for SCP
Subsystem Control Point (SCP) Management Programming Manual520619-001
3-7
D-Series Changes
D-Series Changes
These changes directly affect programmatic management of SCP processes:
SCP processes are based on the ZCMK definitions, and therefore include ZCMK-
defined tokens in commands and response messages and allow additional process
startup parameters.
Management applications can use the new subsystem manager process identification
token ZCOM-TKN-XMGR to identify the SCP process to which a command is
directed. See Command-Message Routing on page 3-3.
SCP processes forward new requester identification (REQID) tokens to converted
subsystems. See Requester Identification on page 3-5.
SCP processes use new token and token data type definitions to convey D-series
data structures. See Section 4, Common Definitions.
SCP processes support the ALTER, RESETSTATS, and STATISTICS commands
in addition to those commands supported by C-series SCP processes. See Section 5,
Commands and Responses.
SCP processes can issue ZCOM, ZCMK, and additional ZSCP event messages. See
Section 6, Event Messages.
D-series subsystems omit C-series tokens and fields from responses if those tokens
cannot accommodate D-series data. See Obsolete Fields in Structured Tokens
on
page 3-8.
Communications among SCP processes and other processes is restricted. See
Interprocess Communications Restrictions on page 3-9.
The tracing information structure ZCOM-DDL-TRACE-MODIF has been retired
and replaced by ZTRC-DDL-TRACE-MODIF.
An SCP process does not initiate Communications Management Process (CMP)
traces.
Implications for Management Applications
In general, an application that ran on a C-series node runs without modification at a low
PIN on a newer node. In particular, management processes currently running on a C-
series node should run identically on a D-series node or on a C-series node in a network
with a D-series node so long as all the processes involved are running at low PINs. The
SCP and subsystem processes that communicate with an unconverted management
application should be run at low PINs. This is the best way, other than converting the
application, to avoid the problems described in these subsections.
Obsolete Tokens in Responses
Even when an SCP process returns new tokens to convey data, it continues to include
the same information in previously used tokens if the data fits in the old tokens. If the
returned values do not exceed the range supported by the old tokens, an unconverted
requester sees no change. (The requester can ignore the additional new tokens included
in the response.)