62
|
Control and Monitoring
www.dell.com | support.dell.com
Usage
Information
The Single window protocol (SWP) provides flow control-based reliable communication between the
sending and receiving software tasks.
Important Points to Remember
•
A sending task enqueues messages into the SWP queue3 for a receiving task and waits for an
acknowledgement.
•
If no response is received within a defined period of time, the SWP timeout mechanism resubmits
the message at the head of the FIFO queue.
•
After retrying a defined number of times, the following timeout message is generated:
SWP-2-NOMORETIMEOUT
•
In the display output in
Figure 5-21
, a retry (Retries) value of zero indicates that the SWP
mechanism reached the maximum number of retransmissions without an acknowledgement.
show processes memory
Displays memory usage information based on processes running in the system.
Syntax
show processes
memory
{
management-unit | stack unit
{
0–5
|
all
|
summary
}}
Parameters
Command Modes
EXEC
EXEC Privilege
Command
History
High Mark
Highest number of packets in the queue at any point of time
#of to / Timeout
Timeout count
#of Retr /Retries
Number of retransmissions
#msg Sent/Msg Sent/
Number of messages sent
#msg Ackd/Ack Rcvd
Number of messages acknowledged
Retr /Available Retra
Number of retries left
Total/ Max Retra
Number of retries allowed
Table 5-1. Description of the
show processes ipc flow-control cp
output Command
Field
Description
management-unit
Enter the keyword
management-unit
for CPU memory usage of the stack
management unit.
stack unit
0–5
Enter the keyword
stack unit
followed by a stack unit ID of the member unit for
which to display memory usage on the forwarding processor.
all
Enter the keyword
all
for detailed memory usage on all stack members.
summary
Enter the keyword
summary
for a brief summary of memory availability and
usage on all stack members.
Version 8.3.17.0
Supported on M I/O Aggregator
Summary of Contents for PowerEdge M IO Aggregator
Page 14: ...12 Before You Start w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 40: ...38 File Management w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 80: ...78 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 90: ...88 u Boot w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 108: ...106 Data Center Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 114: ...112 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 128: ...126 Internet Group Management Protocol IGMP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 162: ...160 Interfaces w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 178: ...176 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 182: ...180 iSCSI Optimization w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 186: ...184 Link Aggregation Control Protocol LACP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 190: ...188 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 210: ...208 Security w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 246: ...244 Uplink Failure Detection UFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 262: ...260 Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...