• There are no items in your cart

ANSI INCITS 463 : 2010

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - FIBRE CHANNEL - GENERIC SERVICES - 6 (FC-GS-6)

Available format(s)

Hardcopy , PDF

Superseded date

24-04-2024

Language(s)

English

Published date

01-01-2015

Foreword
Introduction
1 Scope
2 Normative References
3 Definitions and conventions
4 Common Transport for Generic Services (CT)
5 Directory Service
6 Management service
7 Event Service
8 Key Distribution Service
Annex A: FC-4 Feature bits (Normative)
Annex B: Discovery (Informative)
Annex C: Time Service (Informative)
Annex D: Performance Server (Informative)

Deals with the services accessed by well-known addresses defined in FC-FS-3. Generic Services described in this document are: - Directory Service; - Management Service; and - Event Service.

Committee
T11.3
DocumentType
Standard
Pages
371
ProductNote
Reconfirmed 2010
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

ANSI INCITS 418 : 2006 FIBRE CHANNEL - SWITCH FABRIC - 4 (FC-SW-4)
ANSI INCITS 428 : 2007 STORAGE MANAGEMENT HOST BUS ADAPTER APPLICATION PROGRAMMING INTERFACE (SM-HBA)
IEEE 802.3-2012 IEEE Standard for Ethernet
ANSI INCITS 332 : 1999 INFORMATION TECHNOLOGY - FIBRE CHANNEL ARBITRATED LOOP (FC-AL-2)
ANSI INCITS 426 : 2007 FIBRE CHANNEL - SECURITY PROTOCOLS (FC-SP)
ANSI INCITS 447 : 2008 INFORMATION TECHNOLOGY - SCSI ARCHITECTURE MODEL - 4 (SAM-4)
ANSI INCITS 424 : 2007 FIBRE CHANNEL - FRAMING AND SIGNALING - 2 (FC-FS-2)
ANSI INCITS 419 : 2008(S2018) INFORMATION TECHNOLOGY - FIBRE CHANNEL - BACKBONE - 4 (FC-BB-4)
ANSI INCITS 408 : 2005 INFORMATION TECHNOLOGY - SCSI PRIMARY COMMANDS - 3 (SPC-3)
ANSI INCITS TR 20 : 1998 INFORMATION TECHNOLOGY - FIBRE CHANNEL - FABRIC LOOP ATTACH (FC-FLA)
ISO/IEC 646:1991 Information technology ISO 7-bit coded character set for information interchange
ANSI X9.30.2 : 1997 PUBLIC KEY CRYPTOGRAPHY USING IRREVERSIBLE ALGORITHMS - PART 2: THE SECURE HASH ALGORITHM (SHA-1)

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.