Introduction, Overview, Related documents – Dell Intel PRO Family of Adapters User Manual
Page 2

Introduction: Intel® PRO Network Adapters WMI and CDM
Providers User Guide
Overview
Welcome to the Intel® PRO Network Adapters WMI and CDM Providers User's Guide. This document describes the external
view of the Intel PRO Network Adapters WMI and CDM Providers. The Windows Management Interface (WMI) Provider is a
network configuration block of Network Configuration Services (NCS), which is a means of deploying and managing all Intel
end-station networking technologies using industry standard methods. The Intel PRO Common Diagnostic Model (CDM)
Provider is an upper interface API that is compliant with the CIM 2.5 and WMI standards. On the lower interface, the CDM
Provider implements a client interface into lower layers of the PROSet software stack. Because of this, all PROSet mechanisms
for data integrity are maintained.
The WMI and CDM Providers are sets of software components that implements the Intel WMI network classes. These classes
are based on the Desktop Management Task Force (DMTF) CIM Schema version 2.5.
This document does not repeat information contained in the Managed Object Format (MOF) files provided with this product
(e.g., details of the meanings of individual attributes can be found in the MOF attribute descriptions).
This document describes how a WMI application such as Intel PROSet uses classes to configure a system's network and how a
how a WMI application uses classes to test an Intel network interface card. Readers should be familiar with WMI APIs and the
WMI SDK (available from
Related Documents
The following documents can be used to better understand WMI technology:
CIM schema version 2.0, 2.2 published by Desktop Management Task Force (DMTF). Available at
Microsoft Windows Management Interface (and other manageability information). Available at
Web-Based Enterprise Management (WBEM) initiative by DMTF. Available at
WMI (Microsoft CIM implementation) SDK. Available at
System Diagnostic Model White Paper by DFTM. Available at
WARNING: This product contains information that could be used to attack and/or disable a computer
system(s) or network(s). A thorough knowledge of Microsoft operating system security features should be a
prerequisite to any implementation of this product, and developers and users are strongly encouraged to
contact Microsoft regarding any security concerns that they may have prior to using any implementation of
this product in a production environment.
.
2