CN116719674A - Plug-in detection method, server and cabinet server - Google Patents

Plug-in detection method, server and cabinet server Download PDF

Info

Publication number
CN116719674A
CN116719674A CN202310478201.1A CN202310478201A CN116719674A CN 116719674 A CN116719674 A CN 116719674A CN 202310478201 A CN202310478201 A CN 202310478201A CN 116719674 A CN116719674 A CN 116719674A
Authority
CN
China
Prior art keywords
identification information
target
connector
network port
management controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310478201.1A
Other languages
Chinese (zh)
Inventor
席淼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XFusion Digital Technologies Co Ltd
Original Assignee
XFusion Digital Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XFusion Digital Technologies Co Ltd filed Critical XFusion Digital Technologies Co Ltd
Priority to CN202310478201.1A priority Critical patent/CN116719674A/en
Publication of CN116719674A publication Critical patent/CN116719674A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R31/00Arrangements for testing electric properties; Arrangements for locating electric faults; Arrangements for electrical testing characterised by what is being tested not provided for elsewhere
    • G01R31/50Testing of electric apparatus, lines, cables or components for short-circuits, continuity, leakage current or incorrect line connections
    • G01R31/66Testing of connections, e.g. of plugs or non-disconnectable joints
    • G01R31/68Testing of releasable connections, e.g. of terminals mounted on a printed circuit board
    • G01R31/69Testing of releasable connections, e.g. of terminals mounted on a printed circuit board of terminals at the end of a cable or a wire harness; of plugs; of sockets, e.g. wall sockets or power sockets in appliances
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Small-Scale Networks (AREA)

Abstract

The embodiment of the application provides a plug-in detection method, a server and a cabinet server. The method comprises the following steps: the management controller obtains first identification information of a target connector connected with a target network port. The target connector is one of a plurality of second connectors, and the target network port is one of a plurality of network ports; it is determined whether the first identification information is identical to the second identification information. The second identification information is preset identification information for prescribing a second connector connected with the target network port; if the first identification information is different from the second identification information, determining that the target connector is misplaced in the target network port. According to the embodiment of the application, the target connector of the misplaced target network port can be determined at the software level, the target connector of the misplaced target network port does not need to be identified manually, the complexity of detecting the target connector of the misplaced target network port is reduced, the environment of a service level is not required to be built, the workload of a test link is reduced, and the cost is reduced without depending on external test equipment.

Description

Plug-in detection method, server and cabinet server
Technical Field
The present application relates to the field of servers, and in particular, to a method for detecting plugging, a server, and a cabinet server.
Background
In the current solutions of complete cabinet servers (i.e., cabinet servers), a network of cabinets is built by means of cable backplanes. The whole cabinet server comprises, but is not limited to, a server and a cable backboard. The server comprises a cable module, wherein the cable module comprises a back board connector and a plurality of network port connectors connected with the back board connector, and the network port connectors can be connected with the back board connector through cables. The backboard connector is connected with the cable backboard, so that the server is connected to the cable backboard through the backboard connector, and blind insertion of the server node is achieved. The network port connector can be a small hot pluggable optical module (small form pluggable, SFP) plug, each SFP plug can be inserted into a network port on the network card side, and each SFP plug is provided with the network port into which the SFP plug is fixedly inserted. However, because the network cards and the network ports are more, when each SFP plug is inserted into the corresponding network port, the problem that the SFP plug is inserted into the network port by mistake easily occurs, and the upper layer service is wrong.
Therefore, how to detect whether the SFP plug is plugged into the wrong port becomes a technical problem to be solved.
Disclosure of Invention
The embodiment of the application provides a plugging detection method, a server and a cabinet server, which solve the technical problem of how to detect whether an SFP plug is plugged into a wrong network port.
In a first aspect, an embodiment of the present application provides a socket detection method. The method is applied to a management controller on a server, the server comprises a cable module, a plurality of network ports, a processor and the management controller, the processor is connected with the network ports, the cable module comprises a first connector and a plurality of second connectors connected with the first connector, one second connector is connected with one network port, the first connector is used for being connected with a cable backboard, and the management controller is connected with the processor. The method comprises the following steps:
the management controller obtains first identification information of a target connector connected with a target network port. The target connector is one of a plurality of second connectors, and the target network port is one of a plurality of network ports;
the management controller determines whether the first identification information is identical to the second identification information. The second identification information is preset identification information for prescribing a second connector connected with the target network port;
if the first identification information is different from the second identification information, the management controller determines that the target connector is misplaced in the target network port.
Compared with the method that whether the target connector is misplaced or not is detected manually, the method and the device can determine whether the target connector is misplaced or not at a software level, and complexity of detecting whether the target connector is misplaced or not is reduced. Compared with the test environment of the service layer built and the service test performed by the test equipment, so that whether the target connector is misplaced in the target network port is detected, the embodiment of the application does not need to build the environment of the service layer, reduces the workload of the test link, does not need to rely on external test equipment, and reduces the cost of detecting whether the target connector is misplaced in the target network port.
In one possible implementation, the method further comprises:
the management controller sends a first request message to the processor. The first request message is used for requesting network port identification information of the target network port;
the management controller receives a first response message from the processor. The first response message comprises network port identification information of the target network port;
and the management controller determines the second identification information based on the network port identification information.
In the embodiment of the application, the management controller cannot directly acquire the network port identification information of the target network port, the management controller needs to acquire the network port identification information of the target network port through the processor, and then the management controller acquires the network port identification information of the target network port from the processor. Compared with the method for reading information from the external storage device, the management controller in the embodiment of the application has the advantages of faster speed and higher efficiency in acquiring the network port identification information from the processor.
In one possible implementation, the determining, by the management controller, the second identification information based on the portal identification information includes:
and the management controller determines second identification information according to the network port identification information of the target network port and the identification information mapping relation table.
In the embodiment of the application, an identification information mapping relation table is preset. And the management controller can determine the second identification information according to the network port identification information of the target network port and the identification information mapping relation table. Under the condition that the first identification information is different from the second identification information, the management controller can determine that the target connector is misplaced in the target network port. Therefore, the embodiment of the application can determine whether the target connector is misplaced with the target network port or not in a software layer, does not need manual detection, improves the efficiency of detecting whether the target connector is misplaced with the target network port, and reduces the complexity of detecting whether the target connector is misplaced with the target network port or not.
In one possible implementation, each of the plurality of second connectors includes a memory, and the first identification information of the second connector is stored in the memory thereof. Illustratively, the second connector may be an SFP plug, and the first identification information of the SFP plug may be a custom manufacturer Serial Number (SN).
The management controller cannot directly acquire the first identification information of the target connector connected with the target network port. Therefore, the processor sends a third request message to the network card where the target network port is located so as to acquire the first identification information of the target connector connected with the target network port. The processor acquires a third response message from the network card where the target network port is located. The third response message includes first identification information of a target connector connected with the target portal. The management controller sends a second request message to the processor. The second request message is used for requesting first identification information of a target connector connected with a target network port; the management controller receives a second response message from the processor. The second response message comprises first identification information of a target connector connected with the target network port, and the first identification information is obtained from a memory of the target connector by a network card where the target network port is located.
According to the embodiment of the application, the first identification information of the second connector is stored in the memory, so that the label does not need to be manually added at the second connector, and the workload is reduced; the management controller obtains the first identification information of the target connector from the processor, and the label at the second connector does not need to be detected manually, so that the information obtaining efficiency is improved.
Illustratively, the central processing unit (central processing unit, CPU) runs an intelligent board level management agent (intelligent baseboard management agent, iBMA) program and sends a third request message to the network card where the target portal is located, so as to obtain the first identification information of the target connector connected to the target portal. The processor acquires a third response message from the network card where the target network port is located. The third response message includes first identification information of a target connector connected with the target portal. The management controller sends a second request message to the processor by running an intelligent out-of-band management controller (intelligent baseboard management controller, iBMC) program. The management controller receives a second response message from the processor. According to the embodiment of the application, the label is not required to be manually added at the second connector, so that the workload is reduced. The processor reads the first identification information by running the iBMA program, and the management controller acquires the first identification information from the processor by running the iBMC program, so that the tag does not need to be identified manually, and the information acquisition efficiency is improved.
In one possible implementation, the method further comprises:
the management controller displays an icon and a plugging identifier of each second connector on the interface, wherein the plugging identifier comprises an alarm identifier and a normal identifier. The alarm identifier is used for prompting the target connector to plug in the target network port by mistake, and the normal identifier is used for indicating the target connector to plug in the target network port.
According to the embodiment of the application, the icon and the plugging identification are designed on the interface in a humanized way, so that a user can more intuitively see the target connector of the misplaced target network port.
In a second aspect, an embodiment of the present application provides a socket detection method. The method is applied to a processor on a server, the server comprises a cable module, a plurality of network ports, a processor and a management controller, the processor is connected with the network ports, the cable module comprises a first connector and a plurality of second connectors connected with the first connector, one second connector is connected with one network port, the first connector is used for being connected with a cable backboard, and the management controller is connected with the processor. The method comprises the following steps:
the processor obtains a second request message from the management controller. The second request message is used for requesting first identification information of a target connector connected with a target network port. The target network port is one of a plurality of network ports, and the target connector is one of a plurality of second connectors;
And the processor sends a third request message to the network card where the target network port is located. The third request message is used for requesting the first identification information of the target connector connected with the target network port to the network card;
the processor acquires a third response message from the network card where the target network port is located. The third response message comprises first identification information of a target connector connected with a target network port;
the processor sends a second response message to the management controller. The second response message includes first identification information of a target connector connected with the target portal.
In one possible implementation, each of the plurality of second connectors includes a memory, and the first identification information of the second connector is stored in the memory, where the first identification information in the third response message is obtained by the network card from the memory of the target connector.
The advantages of the second aspect and its various possible implementations are referred to as the advantages of the first aspect and its various possible implementations and are not described in detail herein.
In a third aspect, an embodiment of the present application provides a server, where the server includes a box, a motherboard, a processor, a management controller, a plurality of network cards, and a cable module, where the processor and the management controller are both disposed on the motherboard, the processor and the management controller are both connected to the network cards through the motherboard, the network cards include network ports, the cable module includes a first connector and a plurality of second connectors connected to the first connector, each second connector is connected to one of the network ports on the plurality of network cards, the motherboard, the processor, the management controller, the network cards, and the plurality of second connectors in the cable module are all disposed in the box, the first connector in the cable module is disposed on the box, and one end of the first connector is located outside the box and connected to a cable back plate;
The management controller is used for determining that the target connector is misplaced in the target network port under the condition that first identification information and second identification information of the target connector connected with the target network port are different, wherein the target connector is one of a plurality of second connectors, the target network port is one of a plurality of network ports, and the second identification information is preset identification information for prescribing the second connector connected with the target network port.
In one possible implementation, each of the second connectors includes a memory, and the first identification information of the second connector is stored in the memory of the second connector, where the first identification information is obtained by the network card from the memory of the target connector, and the processor is configured to obtain the first identification information from the network card and send the first identification information to the management controller.
The advantages of the third aspect and its various possible implementations are referred to as the advantages of the first aspect and its various possible implementations, and are not described in detail herein.
In a fourth aspect, an embodiment of the present application provides a cabinet server, including a cabinet, a plurality of servers, a cable backboard, and a switch, where the plurality of servers, the switch, and the cable backboard are all disposed inside the cabinet; at least one server of the plurality of servers is the server according to the third aspect, wherein the first connector of the cable module of the server is connected to the cable back plate, and is connected to the switch through the cable back plate.
The advantages of the fourth aspect and its various possible implementations are referred to as the advantages of the first aspect and its various possible implementations and are not described here in detail.
In a fifth aspect, an embodiment of the present application proposes a plug-in detection device, including at least one processor, the processor being configured to execute a program stored in a memory, which when executed, causes the plug-in detection device to perform:
method and/or in the manner of the first aspect and its various possible implementations
As in the second aspect and its various possible implementations.
In one possible implementation, the plug-in detection device further comprises the above-mentioned memory. In the alternative, the processor and memory may be integrated.
In another possible implementation, the memory is provided outside the plug-in detection device.
In a sixth aspect, embodiments of the application propose a computer program product comprising instructions which, when run on a processor, cause a method as in the first aspect and its various possible implementations and/or a method as in the second aspect and its various possible implementations to be performed by the computer.
In a seventh aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, is executed as a method in the first aspect and its various possible implementations and/or as a method in the second aspect and its various possible implementations.
Drawings
FIG. 1 is a schematic diagram of a plug tested by a business layer function to identify a misplaced network port in one possible implementation;
fig. 2 is a schematic structural diagram of a whole cabinet server 200 according to an embodiment of the present application;
fig. 3 is a schematic structural diagram 300 of the server 220 according to an embodiment of the present application;
fig. 4a is a schematic diagram 400 of first identification information stored in a memory of a second connector according to an embodiment of the present application being 0x01, 0x02, 0x03, 0x04, 0x05, and 0x06, respectively;
fig. 4b shows that the field position in the EEPROM provided by the embodiment of the present application is the OxAO page field BYTE [44:53 defines a schematic diagram of SN;
fig. 5 is a schematic flow chart of a plug detection method 500 according to an embodiment of the present application;
fig. 6a is a schematic diagram 600a of a processor reading first identification information, such as 0x02, of a target connector connected to a target network port, such as the network port 1, according to an embodiment of the present application;
fig. 6b is a schematic diagram 600b of a processor reading first identification information of second connectors respectively connected to six network ports according to an embodiment of the present application;
fig. 7 is a schematic diagram 700 showing an icon and a socket identifier of each second connector on an interface according to an embodiment of the present application;
Fig. 8 is a flowchart of a plug detection method 800 according to an embodiment of the present application;
fig. 9 is a flowchart of a plug detection method 900 according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a plugging detection device 1000 according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of the embodiments of the present application will be given with reference to the accompanying drawings.
It should be noted that, in the present application, the term "and/or" is merely an association relationship describing the association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist together, and B exists alone. The terms first and second and the like in the description and in the claims of embodiments of the application, are used for distinguishing between different objects and not necessarily for describing a particular sequential order of objects. For example, the first identification information and the second identification information, etc., are used to distinguish different identification information from each other, and are not used to describe a specific order of the target object. In embodiments of the application, words such as "exemplary," "for example," or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described as "exemplary," "by way of example," or "such as" in embodiments of the application should not be construed as advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion. In the description of the embodiments of the present application, unless otherwise indicated, the meaning of "a plurality" means two or more.
In the current solution of the whole cabinet server, because the network ports inside the server of the whole cabinet server are more, the situation that the plug is misplaced in the network ports may occur. Once the plug is plugged into the wrong network port, the upper layer service error can be caused. Therefore, how to detect the plug of the misplaced network port becomes a technical problem to be solved by the embodiment of the application.
To solve the above technical problem, in one possible implementation, a production installer is instructed to insert a plurality of plugs into respective network ports by adding tags at the plugs and at the network ports, etc.
However, in this possible implementation, only the manual identification tag can be relied on to plug the plurality of plugs into the corresponding network ports respectively, so that the plug of the misplaced network port cannot be actively detected; the alarm can not be given after the plug is misplaced in the network port, and the misplug information can not be indicated; reliability depends on the quality of manually plugging multiple plugs into the corresponding network ports.
In order to solve the above technical problem, in another possible implementation, a service environment of the whole cabinet server is constructed, and a test is performed by a function of a service layer to identify a plug of a misplaced network port. As shown in fig. 1, the test equipment is interconnected with switches a-F. In one possible implementation, switches A-F are predefined to be interconnected with the network ports ETH0-5, respectively, through a cable backplane. That is, when detecting whether a plug is plugged into a wrong network port, it is only necessary to detect whether a network message received by a certain switch comes from a predefined ETH interconnected with the switch. If yes, determining that the plug is not plugged into the wrong network port. If not, determining that the plug is misplaced in the network port.
However, in such a possible implementation, a test environment for the service layer needs to be set up, the service test is performed by the test equipment, the test environment is complex, the requirement on the test equipment is high, and the test workload is large.
Therefore, in order to solve the above technical problems, an embodiment of the present application provides a socket detection method. For easy understanding, the application scenario of the embodiment of the present application is first briefly described.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a whole cabinet server 200 according to an embodiment of the application.
The entire rack server, i.e., rack server, may include a rack 210, a plurality of servers 220, a switch 230, and a cable backplane 240.
The plurality of servers 220, the switch 230, and the cable backplane 240 are all disposed inside the cabinet 210. Illustratively, a plurality of servers 220 are stacked within the cabinet 210. At least one server of the plurality of servers 220 is a server as shown in fig. 3, and a first connector of a cable module of the server is connected to the cable back plate 240 and is connected to the switch 230 through the cable back plate 240. The number of switches 230 is generally plural, and the switches 230 may be disposed in the middle of the cabinet and stacked with the plurality of servers 220, where the plurality of servers 220 are connected to the switches 230 through the cable back plate 240, so as to implement communications between the plurality of servers 220 and the switches 230, and implement communications between the plurality of servers 220.
In the embodiment of the present application, the connection manner between each server 220 and the cable backboard 240 is the same, and the connection manner between one of the servers 220 and the cable backboard is described below as an example.
As shown in fig. 3, the server 220 may include a box 310, a motherboard 320, a management controller 330, a processor 340, a plurality of network cards 350 (network interface card, NIC), such as NIC1, NIC2, NIC3, and a cable module. In one example, processor 340 and management controller 330 are both disposed on motherboard 320. The processor 340 and the management controller 330 are both connected to the network card 350 through the motherboard 320. The processor 340 is connected to the management controller 330. Network card 350 includes a network port, such as NIC1 includes a network port 01, a network port 02, NIC2 includes a network port 03, a network port 04, and NIC3 includes a network port 05 and a network port 06. The cable module includes a first connector L1 and a plurality of second connectors connected to the first connector, for example, the second connectors 10, 20, 30, 40, 50, and 60. Each of the second connectors is connected to one of the network ports on the plurality of network cards 350. Of course, in another embodiment, the management controller 330 may also include a network port, and the number of the second connectors is 7, where one of the second connectors is connected to the network port of the management controller 330.
The motherboard 320, the processor 340, the management controller 330, the network cards 350, and the second connectors in the cable module are all disposed inside the case 310. The first connector L1 is disposed on the box 310, and one end of the first connector L is located outside the box 310 and connected to the cable back plate 240, and is connected to the switch 230 through the cable back plate 240. The other end of the first connector L1 may be connected to a plurality of cables, and connected to a plurality of second connectors through a plurality of cables.
It should be noted that each second connector includes a memory. The second connector may be, for example, an SFP plug, and its memory may be, for example, a charged erasable programmable read-Only memory (EEPROM) for information storage. The first identification information of the second connector is stored in a memory thereof. As shown in fig. 4a, the first identification information stored in the memory of the second connector is 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, respectively. In one example, the first identification information of the SFP plug may be a custom manufacturer Serial Number (SN), and stored in its EEPROM.
It should be noted that, referring to fig. 4b, the field position in the eeprom is the OxAO page field BYTE [44:53 defines SN. The BYTE 53 identifies the SFP plug, that is, the BYTE 53 stores the first identification information of the SFP plug. It should be noted that BYTE 53 can support the first identification information of 16 SFP plugs at maximum.
The processor may be one or more central processing units (central processing unit, CPU), and in the case where the processor is a CPU, the CPU may be a single-core CPU or a multi-core CPU. The processor may be a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component. The general purpose processor may be a microprocessor or any conventional processor or the like.
The management controller may be a monitoring management unit, a management system in a management chip, a baseboard management controller (baseboard management controller, BMC) or a system management module (system management mode, SMM), etc. It should be noted that the embodiments of the present application are not limited to the form of the management controller, and the above description is merely exemplary. In the following embodiments, only a management controller will be described as an example of a BMC.
It should be noted that different servers are called BMCs differently, for example, some servers are called BMCs, some servers are called iLO (Integrated lights-out), and another server is called integrated dill remote control card (Integrated Dell Remote Access Controller, iDRAC). Either called BMC or iLO or iracc may be understood as BMC in embodiments of the present application. It should be noted that, the system architecture and the application scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided by the embodiments of the present application, and those skilled in the art can know that, with the evolution of the system architecture and the appearance of the new application scenario, the technical solution provided by the embodiments of the present application is equally applicable to similar technical problems.
For ease of understanding, the following exemplary description of the patch detection method 500 provided in accordance with embodiments of the present application is provided with reference to the accompanying drawings. The patch detection method may be performed by the management controller 330 and the processor 340 in the server 220 shown in fig. 3.
Referring to fig. 5, fig. 5 is a diagram illustrating a plug-in detection method 500 according to an embodiment of the application. In method 500, each of a plurality of second connectors in a cable module located on server 220 is connected to a respective one of a plurality of portals. The plurality of second connectors are connected to the cable back plate 240 through the first connector L1 in the cable module located on the server 220. Each second connector includes a memory. It will be appreciated that each portal has a second connector corresponding to the portal, and that the portal is connected to the corresponding second connector to enable communication, and that the second connector connected to the target portal is the second connector corresponding to the target portal. The second identification information of the second connector connected with the target network port is defined, and is preset identification information stored in a memory of the second connector corresponding to the target network port. The second identification information is position identification information of the second connector. The second identification information of the plurality of second connectors has a one-to-one correspondence with the network port identification information of each network port. That is, the portal into which the second connector should be inserted can be determined by the second identification information. The target network port is one of a plurality of network ports. The flow chart of the method 500 is shown in fig. 5, including S501-S508, and the specific implementation process is as follows:
It should be noted that, the management controller 330 needs to obtain the first identification information of the target connector connected to the target portal, see the specific implementation procedure of S501-S506 described below. After acquiring the first identification information, the management controller 330 determines whether the first identification information is the same as the second identification information, and if not, determines that the target connector is misplaced in the target network port, see the specific implementation process of S507-S508 described below. The target network port is one of a plurality of network ports, the target connector is one of a plurality of second connectors, and the second identification information is preset identification information for prescribing the second connectors connected with the target network port.
S501, the management controller 330 sends a second request message to the processor 340.
In an embodiment of the present application, the management controller 330 sends a second request message to the processor 340. The second request message is used for requesting first identification information of a target connector connected with a target network port.
In one possible implementation, management controller 330 may request first identification information of one or more target connectors respectively connected to one or more target portals from processor 340 at a time.
Illustratively, the management controller may be a BMC. The processor may be a CPU. The second connector may be an SFP plug. The preset identification information of the SFP plug may be its custom manufacturer serial number SN. The SFP plug includes an EEPROM. SN of the SFP plug is stored in its EEPR 0M.
In one example, the BMC may run an intelligent out-of-band management controller (intelligent baseboard management controller, iBMC) program that sends a second request message to the CPU. The second request message is used for requesting the SN of the target SFP plug connected with the target network port.
S502, the processor 340 acquires the second request message from the management controller 330.
In an embodiment of the present application, the processor 340 obtains the second request message from the management controller 330.
In one example, the CPU may run a smart board level management agent (intelligent baseboard management agent, iBMA) program to obtain the second request message from the BMC.
S503, the processor 340 sends a third request message to the network card where the target portal is located.
In the embodiment of the present application, the processor 340 sends a third request message to the network card where the target network port is located. The third request message is used for requesting the network card where the target network port is located for first identification information of the target connector connected with the target network port.
In one example, the CPU sends a third request message to the network card where the target portal is located, so as to obtain the first identification information of the target connector connected to the target portal.
It should be noted that, after the network card obtains the third request message sent by the processor 340, the first identification information in the memory of the target connector is read through the integrated circuit bus (inter-integrated circuit, IIC).
S504, the processor 340 acquires a third response message from the network card where the target portal is located.
In the embodiment of the application, the processor acquires the third response message from the network card where the target network port is located. The third response message includes first identification information of a target connector connected with the target portal. The first identification information in the third response message is obtained from the memory of the target connector by the network card. For example, fig. 6a shows a schematic diagram in which the processor reads first identification information, such as 0x02, of a target connector connected to a target portal, such as portal 1. Fig. 6b shows the processor reading the first identification information of the second connectors connected to the six ports, respectively. Referring to fig. 6b, the first identification information of the target connector connected to the portal 1 is 0x02, the first identification information of the target connector connected to the portal 2 is 0x01, the first identification information of the target connector connected to the portal 3 is 0x03, the first identification information of the target connector connected to the portal 4 is 0x04, the first identification information of the target connector connected to the portal 5 is 0x05, and the first identification information of the target connector connected to the portal 6 is 0x06.
In one example, the CPU obtains a third response message from the network card where the target portal is located. The third response message includes the SN of the target SFP plug connected to the target portal.
S505, the processor 340 transmits a second response message to the management controller 330.
In an embodiment of the present application, the processor 340 sends a second response message to the management controller 330. The second response message comprises first identification information of a target connector connected with the target network port, and the first identification information is obtained from a memory of the target connector by a network card where the target network port is located.
In one example, the CPU sends a second response message to the BMC. The second response message includes the SN of the target SFP plug connected to the target portal.
S506, the management controller 330 receives the second response message.
In an embodiment of the present application, the management controller 330 receives the second response message. That is, the management controller 330 acquires the first identification information of the target connector connected to the target portal.
In one example, the BMC receives the second response message. That is, the BMC obtains the SN of the target SFP plug connected to the target portal.
It should be noted that S501 to S506 are specific implementation processes in which the management controller 330 requests the processor 340 for the first identification information of the target connector connected to the target portal. In this embodiment of the present application, the processor 340 may also poll the management controller 330 for the first identification information after requesting the first identification information from the network card where the target network port is located.
S507, the management controller 330 determines whether the first identification information and the second identification information are identical.
It should be noted that, first, the management controller 330 may send a first request message to the processor 340. The first request message is used for requesting the network port identification information of the target network port. After receiving the first request message, the processor 340 obtains the portal identification information of the target portal. The processor 340 transmits a first response message to the management controller 330. The first response message includes portal identification information of the target portal. The management controller 330 receives the first response message from the processor 340. The management controller 330 determines the second identification information based on the portal identification information in the first response message.
In one possible implementation, the first request message may be used to request the portal identification information of the target portal and the first identification information of the target connector connected to the target portal at the same time.
It may be appreciated that the management controller 330 may determine the second identification information according to the network port identification information of the target network port and the mapping relationship table of the identification information (i.e. table 1). The identification information mapping relation table is used for representing the mapping relation between the network port identification information of the target network port and the second identification information. The second identification information of the plurality of second connectors has a one-to-one correspondence with the network port identification information of each network port. The second identification information is preset identification information for prescribing a second connector connected with the target network port.
In another embodiment, the second identification information of the plurality of second connectors is information having a one-to-one correspondence with the portal identification information of each portal, and is stored in the memory of the server. The corresponding second identification information may be retrieved from memory before the management controller 330 determines whether the first identification information is the same as the second identification information.
In an embodiment of the present application, the management controller 330 determines whether the first identification information is identical to the second identification information.
In one example, the BMC determines whether the first identification information is the same as the second identification information.
TABLE 1
Net mouth Network port identification information Second identification information Second connector
Net port 01 G1 0x01 Second connector 10
Net port 02 G2 0x02 Second connector 20
Net port 03 G3 0x03 Second connector 30
Net port 04 G4 0x04 Second connector 40
Net port 05 G5 0x05 Second connector 50
Net port 06 G6 0x06 Second connector 60
S508, if the first identification information is different from the second identification information, the management controller 330 determines that the target connector is misplaced in the target portal.
In the embodiment of the present application, if the first identification information is different from the second identification information, the management controller 330 determines that the target connector is misplaced in the target portal.
In one example, if the first identification information is different from the second identification information, the BMC determines that the target SFP plug is misplaced to the target portal. Compared with the target plug which relies on manual detection of the misplaced target network port, the method and the device can determine the target plug of the misplaced target network port on a software level, and reduce the complexity of detection of the target plug of the misplaced target network port.
Illustratively, table 2 shows first identification information of a target connector connected to a target portal. As can be seen from table 2, the second connector 20 is misplaced with respect to the port 01, and the second connector 10 is misplaced with respect to the port 02.
TABLE 2
Net mouth Network port identification information Second identification information First identification information Second connector
Net port 01 G1 0x01 0x02 Second connector 20
Net port 02 G2 0x02 0x01 Second connector 10
Net port 03 G3 0x03 0x03 Second connector 30
Net port 04 G4 0x04 0x04 Second connector 40
Net port 05 G5 0x05 0x05 Second connector 50
Net port 06 G6 0x06 0x06 Second connector 60
It will be appreciated that referring to fig. 7, in order for the user to more intuitively see the target connectors of the misplaced target portal, an icon and a plugging identifier for each second connector may be displayed on the interface. The plug-in identification comprises an alarm identification or a normal identification. The alarm identifier is used for prompting the target connector to plug in the target network port by mistake, and the normal identifier is used for indicating the target connector to plug in the target network port. As shown in fig. 7, the interface shows that the first identification information of the second connector 20 inserted into the port 01 is 0x02, the first identification information of the second connector 10 inserted into the port 02 is 0x01, the first identification information of the second connector 30 inserted into the port 03 is 0x03, the first identification information of the second connector 40 inserted into the port 04 is 0x04, the first identification information of the second connector 50 inserted into the port 05 is 0x05, the first identification information of the second connector 60 inserted into the port 06 is 0x06, and the black circle represents the alarm mark, the second connector identifying the misplug port 01 is the second connector 20, the second connector inserting the misplug port 02 is the second connector 10, the white circle represents the normal mark, and the second connectors 30, 40, 50, 60 are respectively inserted into the ports 03, 04, 05, 06.
According to the embodiment of the application, the management controller can query preset identification information, namely second identification information, of the second connector which is specified to be connected with the target network port according to the identification information mapping relation table. If the first identification information and the second identification information of the target connector inserted into the target network port are different, the management controller determines that the target connector is inserted into the wrong target network port. Compared with the method that whether the target connector is misplaced or not is detected manually, the method and the device can determine whether the target connector is misplaced or not at a software level, and complexity of detecting whether the target connector is misplaced or not is reduced. Compared with the test environment of the service layer built and the service test performed by the test equipment, so that whether the target connector is misplaced in the target network port is detected, the embodiment of the application does not need to build the environment of the service layer, reduces the workload of the test link, does not need to rely on external test equipment, and reduces the cost of detecting whether the target connector is misplaced in the target network port.
Based on the same concept as the method embodiment described above, the embodiment of the present application also provides a plug detection method 800. The method 800 is applied to a management controller on a server 220 as shown in fig. 3, where the server 220 includes a cable module, a plurality of ports, a processor, and a management controller, the processor is connected to the plurality of ports, the cable module includes a first connector and a plurality of second connectors connected to the first connector, one of the second connectors is connected to one of the ports, the first connector is used to connect to a cable back board, and the management controller is connected to the processor. The method 800 is particularly useful for implementing the method 500 described above. A flow diagram of method 800 is shown in fig. 8. The flow diagram comprises the following steps: S801-S803, the specific implementation process is as follows:
S801, the management controller acquires first identification information of a target connector connected with a target network port.
In the embodiment of the application, a management controller acquires first identification information of a target connector connected with a target network port. The target connector is one of a plurality of second connectors, and the target network port is one of a plurality of network ports.
In one possible implementation, each of the plurality of second connectors includes a memory, and the first identification information of the second connector is stored in the memory thereof.
In one possible implementation, the management controller sends a second request message to the processor. The second request message is used for requesting first identification information of a target connector connected with a target network port. The management controller receives a second response message from the processor. The second response message includes first identification information of a target connector connected with the target portal.
When the method 800 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation process of S801 is similar to the specific implementation processes of S501-S506, and will not be described herein.
S802, the management controller determines whether the first identification information and the second identification information are identical.
In an embodiment of the present application, the management controller determines whether the first identification information is identical to the second identification information. The second identification information is preset identification information for prescribing a second connector connected with the target network port.
In one possible implementation, the second identification information is determined by:
the management controller sends a first request message to the processor. The first request message is used for requesting the network port identification information of the target network port. The management controller receives a first response message from the processor. The first response message includes portal identification information of the target portal. The management controller determines second identification information based on the portal identification information. And the management controller determines second identification information according to the network port identification information and the identification information mapping relation table. The identification information mapping relation table is used for representing the mapping relation between the network port identification information of the target network port and the second identification information.
In one possible implementation manner, the management controller determines the second identification information according to the network port identification information of the target network port and the identification information mapping relation table.
When the method 800 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation process of S802 is similar to the specific implementation process of S507, and will not be repeated here.
S803, if the first identification information is different from the second identification information, the management controller determines that the target connector is misplaced in the target network port.
In the embodiment of the application, if the first identification information is different from the second identification information, the management controller determines that the target connector is misplaced.
When the method 800 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation procedure of S803 is similar to the specific implementation procedure of S508, and will not be described herein.
It will be appreciated that, in order for the user to more intuitively see the target connectors of the misplaced target portal, an icon and a plug identifier for each second connector may be displayed on the interface. The plugging identification comprises an alarm identification or a normal identification, the alarm identification is used for prompting the target connector to plug the target network port by mistake, and the normal identification is used for indicating the target connector to plug the target network port.
Based on the same concept as the method embodiment described above, the embodiment of the present application further provides a plug detection method 900. The method 900 is applied to a processor on the server 220, where the server 220 includes a cable module, a plurality of ports, a processor, and a management controller, the processor is connected to the plurality of ports, the cable module includes a first connector and a plurality of second connectors connected to the first connector, one of the second connectors is connected to one of the ports, the first connector is used to connect to a cable back board, and the management controller is connected to the processor. The method 900 is particularly useful for implementing the method 500 described above.
A flow diagram of method 900 is shown in fig. 9. The flow diagram comprises the following steps: S901-S904, the specific implementation process is as follows:
s901, the processor acquires a second request message from the management controller.
In an embodiment of the application, the processor obtains a second request message from the management controller. The second request message is used for requesting first identification information of a target connector connected with a target network port. The target network port is one of a plurality of network ports, and the target connector is one of a plurality of second connectors.
In one possible implementation manner, each of the plurality of second connectors includes a memory, and the first identification information of the second connector is stored in the memory, where the first identification information in the third response message is obtained by the network card from the memory of the target connector.
When the method 900 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation process of S901 is similar to the specific implementation process of S502, and will not be described herein.
S902, the processor sends a third request message to the network card where the target network port is located.
In the embodiment of the application, the processor sends a third request message to the network card where the target network port is located. The third request message is used for requesting the first identification information of the target connector connected with the target network port to the network card.
When the method 900 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation process of S902 is similar to S503, and will not be described herein.
S903, the processor acquires a third response message from the network card where the target network port is located.
In the embodiment of the application, the processor acquires the third response message from the network card where the target network port is located. The third response message includes first identification information of a target connector connected with the target portal.
When the method 900 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation process of S903 is similar to that of S504, and will not be described herein.
S904, the processor sends a second response message to the management controller.
In an embodiment of the application, the processor sends a second response message to the management controller. The second response message includes first identification information of a target connector connected with the target portal.
When the method 900 is specifically used to implement the method 500, in the embodiment of the present application, the specific implementation process of S904 is similar to S505, and will not be described herein.
The embodiment of the application also provides a server, which comprises a box body, a main board, a processor, a management controller, a plurality of network cards and a cable module, wherein the processor and the management controller are arranged on the main board, the processor and the management controller are connected with the network cards through the main board, the network cards comprise network ports, the cable module comprises a first connector and a plurality of second connectors connected with the first connector, each second connector is respectively connected with one network port on the plurality of network cards, the main board, the processor, the management controller, the network cards and the plurality of second connectors in the cable module are all arranged in the box body, the first connectors in the cable module are arranged on the box body, and one end of each first connector is positioned outside the box body and connected with the cable back plate;
The management controller is used for determining that the target connector is misplaced in the target network port under the condition that first identification information and second identification information of the target connector connected with the target network port are different, wherein the target connector is one of a plurality of second connectors, the target network port is one of a plurality of network ports, and the second identification information is preset identification information for prescribing the second connector connected with the target network port.
In one possible implementation manner, each second connector includes a memory, the first identification information of the second connector is stored in the memory of the second connector, the first identification information is obtained by the network card from the memory of the target connector, and the processor is configured to obtain the first identification information from the network card and send the first identification information to the management controller.
Referring to fig. 10, the embodiment of the present application further provides a plug-in detection device 1000, which is configured to implement the functions of the processor in the above-described method embodiment. The apparatus 1000 may be a system-on-chip. In the embodiment of the application, the chip system can be formed by a chip, and can also comprise the chip and other discrete devices. The apparatus 1000 comprises at least one processor 1010 for implementing the functions of the processor in the above-described method embodiments. The apparatus 1000 may also include a communication interface 1020. In an embodiment of the application, communication interface 1020 may be a transceiver, circuit, bus, module, or other type of communication interface for communicating with other devices over a transmission medium.
When the apparatus 1000 is configured to implement the functions of the processor in the above-described method embodiment, the processor 1010 obtains, through the communication interface 1020, a second request message from the management controller, where the second request message is used to request first identification information of a target connector connected to a target network port, where the target network port is one of multiple network ports, and the target connector is one of multiple second connectors; a third request message is sent to a network card where a target network port is located, wherein the third request message is used for requesting first identification information of a target connector connected with the target network port to the network card; acquiring a third response message from a network card where a target network port is located, wherein the third response message comprises first identification information of a target connector connected with the target network port; and sending a second response message to the management controller, wherein the second response message comprises first identification information of a target connector connected with the target network port.
The communication interface 1020 is also used to perform other steps or operations of receiving or transmitting as referred to in the above-described method embodiments. The processor 1010 may also be configured to perform other corresponding steps or operations in the above method embodiments other than transceiving, which are not described in detail herein.
The apparatus 1000 may also include at least one memory 1030 for storing program instructions and/or data. Memory 1030 is coupled to processor 1010. The coupling in the embodiments of the present application is an indirect coupling or communication connection between devices, units, or modules, which may be in electrical, mechanical, or other forms for information interaction between the devices, units, or modules. Processor 1020 may operate in conjunction with memory 1030. Processor 1010 may execute program instructions stored in memory 1030. In one possible implementation, at least one of the at least one memory may be integrated with the processor. In another possible implementation, the memory 1030 is located external to the device 1000.
The particular connection medium between communication interface 1020, processor 1010, and memory 1030 is not limited in this embodiment of the application. In the embodiment of the present application, the memory 1030, the processor 1010 and the communication interface 1020 are connected by a bus 1040 in fig. 10, where the bus is indicated by a thick line in fig. 10, and the connection manner between other components is merely illustrative and not limited thereto. The buses may be classified as address buses, data buses, control buses, etc. For ease of illustration, only one thick line is shown in fig. 10, but not only one bus or one type of bus.
The processor 1010 may be one or more central processing units (Central Processing Unit, CPU) by way of example, and in the case where the processor 1010 is a CPU, the CPU may be a single-core CPU or a multi-core CPU. The processor 1010 may be a general purpose processor, a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component, and may implement or perform the methods, steps and logic blocks disclosed in embodiments of the application. The general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present application may be embodied directly in a hardware processor for execution, or in a combination of hardware and software modules in the processor for execution.
By way of example, memory 1030 may include, but is not limited to, nonvolatile Memory such as Hard Disk Drive (HDD) or Solid State Drive (SSD), random access Memory (Random Access Memory, RAM), erasable programmable Read-Only Memory (Erasable Programmable ROM, EPROM), read-Only Memory (ROM), or portable Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), among others. The memory is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory in embodiments of the present application may also be circuitry or any other device capable of performing memory functions for storing program instructions and/or data.
Based on the same conception as the above method embodiments, the present application provides a computer readable storage medium having a computer program stored thereon, which when executed by a processor, is executed by a processor, as in fig. 5, 8 and/or 9, corresponding part or all of the steps are executed.
Based on the same conception as the above method embodiments, embodiments of the present application also provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform part or all of the steps corresponding to fig. 5, 8 and/or 9.
It should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. The utility model provides a grafting detection method which is characterized in that is applied to the management controller on the server, the server includes cable module, a plurality of net gapes, treater, management controller, the treater is connected with a plurality of net gapes, the cable module includes first connector and with a plurality of second connectors that connect of first connector, a second connector with one net gape is connected, first connector is used for being connected with the cable backplate, management controller with the treater is connected, the method includes:
Acquiring first identification information of a target connector connected with a target network port, wherein the target connector is one of a plurality of second connectors, and the target network port is one of a plurality of network ports;
determining whether the first identification information is the same as second identification information, wherein the second identification information is preset identification information for prescribing a second connector connected with the target network port;
and if the first identification information is different from the second identification information, determining that the target connector is misplaced in the target network port.
2. The method according to claim 1, wherein the method further comprises:
a first request message is sent to a processor, wherein the first request message is used for requesting network port identification information of the target network port;
receiving a first response message from the processor, wherein the first response message comprises network port identification information of the target network port;
and determining the second identification information based on the network port identification information.
3. The method of claim 2, wherein the determining the second identification information based on the portal identification information comprises:
and determining second identification information according to the network port identification information of the target network port and an identification information mapping relation table, wherein the identification information mapping relation table is used for representing the mapping relation between the network port identification information of the target network port and the second identification information.
4. A method according to any one of claims 1-3, wherein each of the plurality of second connectors comprises a memory, respectively, in which memory the first identification information of the second connector is stored;
the obtaining the first identification information of the target connector connected with the target network port includes:
sending a second request message to a processor, wherein the second request message is used for requesting first identification information of a target connector connected with the target network port;
and receiving a second response message from the processor, wherein the second response message comprises first identification information of a target connector connected with the target network port, and the first identification information is obtained from a memory of the target connector by a network card where the target network port is located.
5. The method according to any one of claims 1-4, further comprising:
and displaying an icon and a plugging identifier of each second connector, wherein the plugging identifier comprises an alarm identifier or a normal identifier, the alarm identifier is used for prompting the target connector to plug in the wrong target network port, and the normal identifier is used for indicating the target connector to plug in the target network port.
6. The utility model provides a grafting detection method which is characterized in that is applied to the treater on the server, the server includes cable module, a plurality of net gapes, treater, management controller, the treater is connected with a plurality of net gapes, the cable module includes first connector and with a plurality of second connectors that connect of first connector, a second connector with one net gape is connected, first connector is used for being connected with the cable backplate, management controller with the treater is connected, the method includes:
acquiring a second request message from the management controller, wherein the second request message is used for requesting first identification information of a target connector connected with a target network port, the target network port is one of a plurality of network ports, and the target connector is one of a plurality of second connectors;
a third request message is sent to a network card where the target network port is located, wherein the third request message is used for requesting first identification information of a target connector connected with the target network port to the network card;
acquiring a third response message from a network card where the target network port is located, wherein the third response message comprises first identification information of a target connector connected with the target network port;
And sending a second response message to the management controller, wherein the second response message comprises first identification information of a target connector connected with the target network port.
7. The method of claim 6, wherein each of the plurality of second connectors includes a memory, and wherein first identification information for the second connector is stored in the memory, and wherein the first identification information in the third response message is obtained by the network card from the memory of the target connector.
8. The server is characterized by comprising a box body, a main board, a processor, a management controller, a plurality of network cards and a cable module, wherein the processor and the management controller are arranged on the main board, the processor and the management controller are connected with the network cards through the main board, the network cards comprise network ports, the cable module comprises a first connector and a plurality of second connectors connected with the first connector, each second connector is connected with one network port on the plurality of network cards respectively, the main board, the processor, the management controller, the network cards and the plurality of second connectors in the cable module are all arranged in the box body, the first connectors in the cable module are arranged on the box body, and one end of each first connector is positioned outside the box body and connected with a cable backboard;
The management controller is used for determining that the target connector is misplaced in the target network port under the condition that first identification information and second identification information of the target connector connected with the target network port are different, wherein the target connector is one of a plurality of second connectors, the target network port is one of a plurality of network ports, and the second identification information is preset identification information for prescribing the second connector connected with the target network port.
9. The server according to claim 8, wherein each of the second connectors includes a memory, wherein first identification information of the second connector is stored in the memory thereof, wherein the first identification information is obtained from the memory of the target connector by the network card, and wherein the processor is configured to obtain the first identification information from the network card and send the first identification information to the management controller.
10. The cabinet server is characterized by comprising a cabinet, a plurality of servers, a cable backboard and a switch, wherein the servers, the switch and the cable backboard are all arranged in the cabinet; at least one server of the plurality of servers is the server of claim 8, wherein the first connector of the cable module of the server is connected to the cable back plane, and is connected to the switch through the cable back plane.
CN202310478201.1A 2023-04-27 2023-04-27 Plug-in detection method, server and cabinet server Pending CN116719674A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310478201.1A CN116719674A (en) 2023-04-27 2023-04-27 Plug-in detection method, server and cabinet server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310478201.1A CN116719674A (en) 2023-04-27 2023-04-27 Plug-in detection method, server and cabinet server

Publications (1)

Publication Number Publication Date
CN116719674A true CN116719674A (en) 2023-09-08

Family

ID=87863834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310478201.1A Pending CN116719674A (en) 2023-04-27 2023-04-27 Plug-in detection method, server and cabinet server

Country Status (1)

Country Link
CN (1) CN116719674A (en)

Similar Documents

Publication Publication Date Title
US9219644B2 (en) Automated configuration of new racks and other computing assets in a data center
CN106603265B (en) Management method, network device, and non-transitory computer-readable medium
US20090024764A1 (en) Tracking The Physical Location Of A Server In A Data Center
CN107193763B (en) Information processing method and electronic equipment
CN111289922B (en) Cable plugging detection method and related equipment
US20080034122A1 (en) Apparatus and Method to Detect Miscabling in a Storage Area Network
US11126239B2 (en) Systems and methods for network port occupancy state change monitoring using low energy wireless communications
CN109298266B (en) Test system, test method, test apparatus, and storage medium
CN109840232B (en) Storage device and element management method of storage device
US20150006700A1 (en) Establishing connectivity of modular nodes in a pre-boot environment
US20160156518A1 (en) Server for automatically switching sharing-network
CN111176913A (en) Circuit and method for detecting Cable Port in server
CN111637079B (en) Mainboard, fan control system and method
CN116048889A (en) Detection method and related device for cable connection of cabinet server
CN116126613A (en) Position detection method and device of PCIe (peripheral component interconnect express) equipment, electronic equipment and storage medium
CN116737640A (en) Information acquisition method, device, equipment and storage medium
CN116719674A (en) Plug-in detection method, server and cabinet server
CN112953788A (en) Network state detection method and device, BMC and storage medium
CN112596983A (en) Monitoring method for connector in server
US20130080669A1 (en) Dynamically Determining A Primary Or Slave Assignment Based On An Order Of Cable Connection Between Two Devices
CN117971608B (en) Method, device, equipment and medium for acquiring and sending hard disk logs
CN103365811A (en) Electronic apparatus and host determination method
CN112415296B (en) Test equipment and test system
CN115643223B (en) Interrupt signal transmission method and device
CN113778939B (en) Marine light chip management method, device and equipment based on substrate management controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination