
MegaRAC G2 v. MegaRAC G3
MegaRAC G3 provides a management infrastructure or platform that can be extended limitlessly into
the future. The MegaRAC G2 and older generations offer a non-extendable pre-specified solution. The
MegaRAC G3’s main strength is extendability through the G3/PDK that allows many modules and
utilities to be developed and take care of the management policies that could not be done in the past.
The main differences between the two cards are described below:
1. Provisioning: this is the strongest feature that can be developed based on the G3 infrastructure.
2. Processing power: MegaRAC G3 uses a much higher-powered processor (400 MIPS), compared to 40
MIPS in the MegaRAC G2.
3. Memory: the processing power of the G3’s architecture allows more memory (up to 2 GB) in the
future (it currently has 32 MB installed). More features, functionalities and utilities can be
developed for installation for future releases.
4. Reliability and availability (RAS): with provisioning software (developed separately on the G3),
both the system’s reliability and availability can be addressed.
5. Tools – G3/PDK: the PDK provides the ability to develop and deploy software and utilities that can
run on the MegaRAC G3.
6. USB CD and floppy: a simultaneous presence of two virtual devices (CD and floppy) is unique for
the administrators.
7. Image-based boot: MegaRAC G3 can boot from a bootable image located at the client system.
Administrators can centralize the repository of all the bootable images needed for all servers.
8. IPMI style: MegaRAC G3 follows an IPMI-style event log management and alert mechanism that
comply with industry standard features.
9. RMCP: this allows for a common method to interact with the BMC in the system over a secured
TCP/IP connection. This helps tremendously in blade server management.
10. PEF and PET: Platform Event Filtering (PEF) and Platform Event Trap (PET) are two standards
defined by IPMI and are followed in the MegaRAC G3. This makes policy-based provisioning
software development easier for alert notifications and event logs.
11. SSH-based command line interface: this provides a command line interface (CLI) to the MegaRAC
G3, using a secured shell. Unix/Linux administrators can easily use this CLI from other Unix
systems.
12. Firewall: for the highest security purposes, MegaRAC G3 has a built-in firewall capability that
allows administrators to block desired TCP ports
13. User interface: the GUI has been improved and is based on the G3/PDK, which can be extended or
easily customized.
14. Multi-language support: MegaRAC G3 can support multiple languages, as it supports Unicode
(UTF8).
Conclusion
To understand the real capabilities and strengths of the MegaRAC G3, one final example is given.
Suppose someone purchased an electronic organizer that kept track of telephone numbers, addresses,
appointments. While these features were what they were looking for, they were limited. The person
did not purchase a Personal Digital Assistant (PDA), which did not have many features, but did have the
potential to offer more than the electronic organizer in the future in regards to the numerous utilities
and software that will be able to be deployed and run on the PDA.
This situation can be used to describe the MegaRAC G3. While it provides remote access features like
KVM/IP, remote power controls, remote monitoring, etc., it can also deploy and run future utilities
developed by its strong G3/PDK. In addition, several important management utilities will be written in
the future by AMI that will be specially designed for the MegaRAC G3.