Gebruiksaanwijzing /service van het product SG24-4576-00 van de fabrikant IBM
Ga naar pagina of 235
International Technical Support Organization IBM PC Server and Novell NetWare Integration Guide December 1995 SG24-4576-00.
Take N ote! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xv. First Edition (December 1995) This edition applies to IBM PC Servers, for use with an OEM operating system.
Abstract This document describes the procedures necessary to successfully implement Novell NetWare on an IBM PC Server platform. It describes the current IBM PC Server line and discusses the technology inside the machines. It outlines step-by-step procedures for installing both NetWare V3.
Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Special Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Preface . . . . . . . . . . . . . . . . . . . . . .
1.8.5 Selectable Drive Startup ........................... 37 1.8.6 Unattended Start Mode ............................ 37 1 . 9 Systems Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 1.9.1 D M I . . . . . . . . . . . . . .
4.4.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 127 4.4.2 Software Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 127 4.4.3 Information Requested at Time of Installation ............. 127 4.4.4 Installation Files .
Figures 1 . SMP Shared Secondary Cache ......................... 5 2 . SMP wit h Dedicated Secondary Cache . . . . . . . . . . . . . . . . . . . . 6 3 . Two-Way Interleaved Memory Banks . . . . . . . . . . . . . . . . . . . . . 7 4 . Dual Path B us Implementation .
5 2 . Advanced Diagnostic Menu .......................... 100 5 3 . Test Selection Menu .............................. 100 5 4 . RAID Configuration Program - Adapter Selection ............. 102 5 5 . RAID Configuration Program - Main Menu ............
1 0 6 . NetFinity Network Driver Configuration ................... 145 107. NetFinity Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 1 0 8 . NetFinity Services for NetWare ........................ 148 109. NetFinity Installation - Copying Files .
Tables 1 . E C C Memory Performances . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2 . Summary o f Memory Implementations . . . . . . . . . . . . . . . . . . . . 12 3. SCSI Adapters Summary . . . . . . . . . . . . . . . . . . . . . . . . . .
Special Notices This document is intended for IBM customers, dealers, systems engineers and consultants who are implementing Novell NetWare on an IBM PC Server. The information in this publication is not intended as the specification of any programming interfaces that are provided by IBM.
The following terms are trademarks of other companies: C-bus is a trademark of Corollary, Inc. PC Direct is a trademark of Ziff Communications Company and is used by IBM Corporation under license. UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited.
Preface This document describes the procedures necessary to implement Novell NetWare on IBM PC Server platforms. It provides detailed information on installation, configuration, performance tuning, and management of the IBM PC Server in the NetWare environment.
Related Publications The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this document.
IBM employees may access LIST3820s of redbooks as well. Point your web browser to the IBM Redbooks home page at the following URL: http://w3.itsc.pok.ibm.
Chapter 1. IBM PC Server Technologies IBM PC Servers use a variety of technologies. This chapter introduces many of these technologies and gives examples of system implementations where they are used. 1.1 Processors The microprocessor is the central processing unit (CPU) of the server.
performance. (Please see 1.3, “Memory” on page 3 for a discussion of memory speeds and system performance.) The point is that you cannot compare system performance by simply looking at the speed at which the processor is running.
1. 2 Multiprocessing Multiprocessing uses two or more processors in a system to increase throughput. Multiprocessing yields high performance for CPU intensive applications such as database and client/server applications.
The key is to achieve a balanced design where the speed of the processor is matched to that of the external components. IBM engineers achieve a balanced design by using several techniques to reduce the effective access time of main system memory: • Cache • Interleaving • Dual path buses • SynchroStream technology 1.
• Write-Back Cache Write operations are also performed on the cache. Transfer to standard memory is done if: − Memory is needed in the cache for another operation − Modified data in the cache is needed for another application The third level of cache or L3 cache is sometimes referred to as a victim cache.
Dedicated Cache: This SMP design supports a dedicated L2 cache for each processor. This allows more cache hits than a shared L2 cache. Adding a second processor using a dedicated L2 cache can improve performance as much as 80%.
In interleaved systems, memory is currently organized in either two or four banks. Figure 3 on page 7 shows a two-way interleaved memory implementation. Figure 3. Two-Way In t er l e av e d Memory Banks Memory accesses are overlapped so that as the controller is reading/writing from bank 1, the address of the next word is presented to bank 2.
┌─────────┐ ┌─────────┐ ┌─────────┐ ┌─────────┐ │ CPU ├───┤ L2 Cache├───┤ Memory ├───┤ Memory │ │ ├───┤ ├───┤ Control.
1. 4 Memory Error Detection and Correction IBM PC servers implement four different memory systems: • Standard (parity) memory • Error Correcting Code-Parity • Error Correcting Code (ECC) memory • ECC Memory on SIMMs (EOS) Memory 1.
Figure 5. ECC Memory Operation As the data is read from memory, the ECC circuit again performs a scan and compares the resulting pattern to the pattern which was stored in the check bits. If a single-bit error has occurred (the most common form of error), the scan will always detect it, automatically correct it and record its occurrence.
Figure 6 on page 11 shows the implementation of ECC-P. When ECC-P is enabled via the reference diskette, the controller reads/writes two 32-bit words and 8 bits of check information to standard parity memory.
1.4.5 Performance Impact As previously discussed, systems which employ ECC memory have slightly longer memory access times depending on where the checking is done. I t should be stressed that this affects only the access time of external system memory, not L1 or L2 caches.
1.5.1 I S A Bus The Industry Standard Architecture (ISA) is not really an architecture at all but a defacto standard based on the original IBM PC/AT bus design. The main characteristics of the ISA bus include a 16-bit data bus and a 24-bit address bus.
Figure 7. Micro Channel - Basic Data Transfer ( 2 0 MBps) However, in many cases, blocks transferred to and from memory are stored in sequential addresses, so repeatedly sending the address for each 4 bytes is unnecessary.
The Micro Channel supports another mode of data streaming whereby the address bus can also be used to transfer data. This is depicted in Figure 9 on page 1 5 .
is available with previous bus architectures. In order to optimize performance, the PCI architecture strictly limits the number of loads (hence the number of adapters) on the bus. It therefore needs an I/O expansion bus to handle the more routine I/O devices.
4. Small Computer System Interface (SCSI) - T h e SCSI interface is a high speed parallel interface that transfers eight bits at a time rather than one bit at a time for the ST506 and ESDI serial interfaces. Thus data transfer rates for SCSI are measured in mega bytes versus mega bits and are considerably faster than those of the serial interfaces.
It defines an 8-bit interface with a data transfer rate of 5 MBps. SCSI-II is the second SCSI standard and is defined in ANSI standard X3T9.2/375R REV10K. It defines extensions to SCSI-I which allow for 16 and 32-bit devices, a 10 MBps transfer rate, and other enhancements discussed below.
SCSI bus bandwidth. If the controller held onto the bus while waiting for the device to seek, then the other devices would be locked out. This is also sometimes referred to as overlapped operations or multi-threaded I/O on the SCSI bus. This feature is very important in multitasking environments.
standard 8-bit SCSI devices. Up to seven SCSI physical devices may be attached to this adapter. This adapter has a dedicated 80C186 local processor on board, which allows it to implement advanced features such as TCQ. The dual bus design of the adapter prevents access to internal DASD from the external port.
In addition to the features supported with the IBM SCSI-2 F/W PCI Adapter, the IBM SCSI-2 F/W RAID adapter provides a RAID controller. Please reference 1.6.5, “RAID Technology” on page 22 for a discussion on RAID. 1.6.3.1 Summary The following tables summarize the features of the IBM SCSI adapters.
to the desired cylinder of the disk. The latency is the amount of time it takes for the disk to rotate to the proper sector on that cylinder. It should be noted that two disks of the same physical size, for example 3.5-inch disks, will differ in their access times with the larger capacity disk having a better access time.
Disks are often among the least reliable components of the computer systems, yet the failure of a disk can result in the unrecoverable loss of vital business data, or at the very least a need to restore from tape with consequent delays.
1.6.6.1 RAID-0 - Block Interleave Data Striping without Parity Striping of data across multiple disk drives without parity protection is a disk data organization technique sometimes employed to maximize DASD subsystem performance (for example, Novell NetWare ′ s data scatter option).
┌───────────────────┐ ││ │ ┌───────────┤ │ │ Disk ├───────────────┬────┬──.
│ ┌───────┴───────┐ │ Disk │ │ Controller │ └───────┬───────┘ │ │ ┌────────────┼───.
1.6.6.4 RAID-2 - Bit Interleave Data Striping with Hamming Code This type of array design is another form of data striping: it spreads the data across the disks one bit or one byte at a time in parallel.
1.6.6.5 RAID-3 - Bit Interleave Data Striping with Parity Disk The use of additional disks to redundantly encode customer ′ s data and guard against loss is referred to as check sum, disk parity or error correction code (ECC). The principle is the same as memory parity, where the data is guarded against the loss of a single bit.
│ ┌───────┴───────┐ │ Disk │ │ Controller │ └───────┬───────┘ │ │ ┌─────────────┬──.
1.6.6.8 Summary of RAID Performance Characteristics RAID-0: Block Interleave Data Striping without parity • Fastest data-rate performance • Allows seek and drive latency to be performed in paralle.
1.6.7 Recommendations • Use IDE on smaller systems IDE actually outperforms SCSI on systems where only one or two devices are attached. Several models of the IBM PC Server 300 and 320 lines implement IDE as an integrated controller on the planar board.
system memory because they occur across an I/O expansion bus. This means that when shared RAM adapters are involved, the CPU spends a significant amount of time doing the primitive task of moving data from point A to point B.
sometimes moves quickly to the CPU when servers are upgraded to incorporate LANStreamer technology. Of course, other components can emerge as the bottleneck as throughput increases. The wire (network bandwidth) itself can become a bottleneck if throughput requirements overwhelm the ability of the network technology being used.
• Attaching more than four Ethernet 10Base-2 segments to the server • Providing switching between 10Base-T and 10Base-2 segments • Conserving server slots An add-on to NetFinity provides an advanced Ethernet subsystem management tool.
1.8.1 Tamper-Evident Cover Systems equipped with a tamper-evident cover have a key lock for their covers and internal I/O devices. In the locked position, it mechanically prevents the covers from being removed. The key has been changed to a type that can be duplicated only by the manufacturer.
there is a power failure; the machine is able to recover with the keyboard lock still in place. 1.8.3.1 Privileged-Access Password Because the power-on and keyboard passwords can be defeated by deactivating the battery inside the system, another level of password protection is provided.
1.8.5 Selectable Drive Startup Selectable drive startup allows the system owner or administrator to select the IPL source and sequence. This allows the system owner to control the IPL source, but prevents the user from modifying the source and sequence.
manage those products. As DMI technology evolves, installation and management in desktops and servers will become easier. It should be noted that the DMI specs say nothing about the transport protocol that is used between the manageable products and the management applications.
The simplest MIF file contains only the component ID group, but MIFs can become as complex as needed for any given product. 1.9.1.3 Management Interface (MI) The management interface (MI) shields managements applications from the different mechanism used to obtain management information for products within a desktop system.
SNMP provides a means of communicating between the network management stations and the agents in the network resources. This information can be status information, counters, identifiers, etc. The SNMP manager continuously polls the agents for error and statistical data.
• Agents maintain vital information about their respective devices and networks. This information is stored in a MIB. • The SNMP manager polls each agent for MIB information and stores and displays this information at the SNMP manager station. In this manner, the system administrator can manage the entire network from one management station.
• System Profile Allows the systems administrator to define additional information for each system, such as location • System Monitor Provides system performance monitoring utilities, such as CPU,.
It also supports Novell NetWare. This means that there is a version of NetFinity Services which installs as a NetWare NLM on the file server and allows the server to be managed by a NetFinity Manager station. NetFinity Services can also be installed on a Windows NT server and used to manage this platform as well.
• File Transfer Can send/receive files to the remote system. • Remote Session Can open a remote console to the managed device. • Screen View Can take a snapshot of any screen on the remote device. • DMI Browser Enables you to view information about DMI compliant hardware and software.
Manager services and system module. This feature provide an extensive capability to merge dissimilar LANs into a single view of NetFinity managed assets. 1.9.3.4 D M I Support NetFinity is the first product available to customers that includes DMI support.
graphical drag and drop capability of OS/2 or AIX/6000. The primary benefit of the end-use dimension is the end-user productivity. Some examples of products that have implemented SystemView conforming.
• Open and extendable data model: This specifies the data definitions that represent the information processing data of an enterprise. The SystemView data dimension includes descriptions of the characteristics of resources and the relationships among them.
1.10.1 NetWare SFT III NetWare SFT III is a special version of the NetWare 3.x or 4.x NOS which adds a high degree of fault tolerance. It is composed of two servers, a primary and a secondary, which are mirrored together. To clients on the network, only the primary server appears to be active.
Mirrored Server Link (MSL): The MSL is a bidirectional point-to-point connection that is used by the two servers to synchronize with each other. Information such as client requests and acknowledgments are passed back and forth on the MSL. After a failure has occurred, the MSL is used to synchronize the memory and disk of the failed server.
Consequently, clients only receive reply packets from the primary server ′ s IOEngine; this is the same IOEngine to which they sent the original request packet. The clients view the mirrored server as any other NetWare server. Clients send a single request packet and receive a single reply packet from the same address.
The primary server sends the disk changes over the mirrored server link to update the repaired server and to mirror the contents of the disk. Disk mirroring occurs in the background during idle cycles.
1.11 Uninterruptible Power Supply (UPS) Digital computers require a clean source of direct current (DC). It is t he computer ′ s power supply which takes an alternating current (AC) from the input line and transforms it into clean DC voltages.
The primary service, however, that the UPS provides in the case of AC line problems is extra time. While a UPS can enable the server to continue operating even if there is a power loss, the primary benefit of a UPS is that the server software has time to ensure that all caches are written to disk, and to perform a tidy shutdown of the system.
Flex Events is programmable such that when an event occurs, you can configure PowerChute to take certain actions. Depending on the event you can: • Log that event • Send early warning pop-up messa.
Chapter 2. IBM PC Server Family Overview The IBM PC Server family contains three product lines which offer different features and capabilities: • The PC Server 300 series This series is targeted at small enterprises or workgroup LANs. These machines offer leading technology and are very price competitive.
2. 1 IBM PC Server Model Specifications The following tables show the specifications for each model in the current line. They are included for a reference of the standard features of each line.
2.1.2 IBM PC Server 310 Table 9. IBM PC Servers 31 0 Models System Model 8639 0XT 8639 MXT Processor Pentium 7 5 Pentium 7 5 Bus Architecture PCI/ISA PCI/MCA Disk Controller PCI SCSI-2 Fast PCI SCSI-2 Fast STD Hard File Size 1.08GB 1.08GB Memory Std/Max (MB) 16/192 16/192 L2 Cache (KB) 256 256 Graphics SVGA SVGA Chapter 2.
2.1.3 IBM PC Server 320 EISA Table 10. IBM PC Servers 32 0 EISA Models System Model 8640 0N0 8640 ONJ 8640 0P0 8640 0PT Processor Pentium 9 0 Pentium 9 0 Pentium 9 0 Pentium 9 0 SMP 1-2 P9 0 1-2 P9 0 .
2.1.4 IBM PC Server 320 MCA Table 11. IBM PC Servers 32 0 MC A Models System Model 8640 MX0 8640 MXT 8640 MYO 8640 MYT 8640 MYR Processor Pentium 7 5 Pentium 7 5 Pentium 9 0 Pentium 9 0 Pentium 9 0 SM.
2.1.5 IBM PC Server 500 Table 12. IBM PC Server 50 0 Models System Model 8641 0Y0 8641 1Y0 8641 0YT 8641 0YV 8641 0YR 8641 0YS Processor Pentium 90 Pentium 90 Pentium 90 Pentium 90 Pentium 90 Pentium .
2.1.6 IBM PC Server 520 EISA Table 13. IBM PC Servers 52 0 EISA Models System Model 8641 EZ0 8641 EZV 8641 EZS 8641 EZE Processor Pentium 1 00 Pentium 1 0 0 Pentium 1 00 Pentium 10 0 SMP 1-2 P 100 1-2.
2.1.7 IBM PC Server 520 MCA Table 14. IBM PC Servers 52 0 MC A Models System Model 8641 MZ0 8641 MZV 8641 MZS 8641 MZE 8641 MZL Processor Pentium 1 00 Pentium 10 0 Pentium 1 00 Pentium 10 0 Pentium 1 .
2.1.8 IBM PC Server 720 Table 15. IBM PC Servers 72 0 Models System Model 8642 0Z0 8642 1Z0 8642 2ZS 8642 4ZS Processor Pentium 1 00 Pentium 10 0 Pentium 10 0 Pentium 10 0 # of CPUs in base model 1 1 .
Chapter 3 . Hardware Configuration The different technologies used to implement the PC Server family require different methods for configuration. Unfortunately, there is no one common configuration program which can be run on a machine to completely configure it.
┌───────────────────────┐ │ What is the │ │ Server Architecture? │ └───────────┬───────────┘.
3. 1 The Setup Program The setup program is used to configure system options on ISA and EISA machines. The system options include such things as diskette and hard disk options, video subsystem, and system memory. These parameters are controlled by system BIOS and, hence, need to be modified before the operating system boots.
The Main panel contains fields which allow the user to: • Modify date and time • Configure the diskette drives • Configure the IDE disks • Configure the video • Enable/Disable level 2 system memory cache Notes: 1. Video BIOS Shadow This option allows the user to shadow the video BIOS into RAM for faster execution.
3.1.2.1 Advanced Menu - Boot Options By pressing the Enter key, a screen like that shown in Figure 25 will appear. Phoenix BIOS Setup - Copyright 1985-94 Phoenix Technologies Ltd.
If disabled, the system ignores the error and attempts to boot. 3.1.2.2 Advanced Menu - Peripherals To reach this menu: • Press ESC to quit the Boot options.
Memory Gap: Some ISA network adapters need to be mapped in system memory address space, normally at the upper end. Since the ISA bus is limited to 24-bit addressing (0-16 MB), systems with more than 16MB of memory installed will not accommodate these adapters.
Enter password If you enter the wrong password, the following message appears on the screen, and you are prompted again: Incorrect password After 3 incorrect attempts, the following message appears and you must turn off the server and start again: System disabled Notes: 1.
Note BIOS of PCI/EISA servers is located in a Flash ROM on the motherboard. I f necessary, it can be updated with a bootable diskette which has the new BIOS (.BIN) file. This file will be named: • M4PE _ Txx.BIN for DX2-66 models • M5PE _ Txx.BIN for Pentium models Where xx is the BIOS level as it appears when booting.
3.2 EISA Configuration Utility This utility is used when you add or remove an ISA or EISA adapter. We will use an example to illustrate the process. In our example we will add an Auto T/R 16/4 ISA adapter in slot 3 of a PC Server 320. The steps to complete the process are: 1.
┌───────────────────────────────────────────────────────────────.
After adding EISA or ISA adapters, you will often need to view and/or edit the settings for the adapter. To view or edit an adapter ′ s details: a. From the Main menu, select step 3 (View or Edit Details) with the arrow key. b. Press Enter to view configuration details.
┌────────────────────────────────────────────────────┐ │ System - IBM Dual Pentium.
3. 3 SCSI Select Utility Program This utility is used on PCI/EISA models of the IBM PC Server line and allows the user to: • View and modify parameters for the SCSI controller • View and modify pa.
The fields on this panel are described as follows: SCSI Parity Checking: Select this option to enable or disable SCSI Parity checking on the host adapter. If enabled, the host adapter will check parity when reading from the SCSI bus to verify the correct transmission of data from your SCSI devices.
┌──────────────────── SCSI Device Configuration ──────────────────────┐ │ │ │ SCSI Device ID #0 #1.
The SCSI-2 Fast and Wide adapter issues the start unit command to each drive one at a time. The SCSI-2 Fast/Wide Streaming RAID adapter issues the start unit command to two drives at a time. Note In order to take advantage of this option, verify that the auto-start jumpers have been removed on hard drives.
• Press Enter to edit the parameter. • Use the arrow keys to select the new value or press Esc to quit. • Press Enter to validate the new value. When finished: • Press Esc to quit the SCSI Advanced Configuration options menu. • Press Esc to quit the Configuration menu.
These programs are obtainable in several ways: • Shipped with the server on two diskettes called the reference diskette and the diagnostic diskette • Created from images for these diskettes on the ServerGuide CD-ROM shipped with the system.
Main Menu Select one: 1. Start Operating System 2. Backup/Restore system programs 3. Update system programs 4. Set configuration 5. Set Features 6. Copy an option diskette 7. Test the computer 8. More utilities Enter F1=Help F3=Exit Figure 39.
Periodically, updated versions of the reference diskette and diagnostic diskette are made available. This option copies a new version of the system programs to the system partition.
3.4.4 Backup/Restore System Programs Menu When you select this option from the Main Menu, a screen like the one in Figure 40 will appear. Backup / Restore System Programs Select One: 1.-Backup the system diskette 2.-Backup the system partition 3.
Set Configuration Select One: 1.-View configuration 2.-Change configuration 3.-Backup configuration 4.-Restore configuration 5.-Run automatic 6.-Display memory map 7.-Set and view SCSI device configuration Enter F1=Help F3=Exit Figure 41.
View Configuration Total System Memory Installed memory....................................32768KB(32.0MB) Usable Memory.......................................32584KB(31.6MB) Built In Features Installed Memory..................................
If a setting conflicts with another, an asterisk(*) appears next to the conflicts and the word conflicts appears at the right corner of the windows. You must remove all conflicts before the configuration can be saved. Note Some settings are set by the system and can not be overridden.
Memory Map 0C000H SVGA Adapter Micro Channel slot............................5 Size(in KB)...................................32 0C8000H IBM SCSI-2 Fast/Wide Streaming RAID Adapter Micro Channel Slot............................1 Size(in KB)....
Set and View SCSI Device Configuration SCSI Configuration Verification................[Enabled] Slot 1-IBM SCSI-2 Fast/Wide Adapter SCSI Address (ID)...........................7 SCSI Device Device type............................Hard Disk Device Address (ID,LUN).
Set Features Select one: 1.-Set date and time 2.-Set password and unattended start mode 3.-Set keyboard speed 4.-Set console 5.-Set startup sequence 6.-Set fast startup mode 7.-Set power-on features Enter F1=Help F3=Exit Figure 45. Set Features Menu 1 .
Set Passwords and Security features Select one: 1.- Set Power-On password 2.- Change Power-On password 3.- Remove Power-On password 4.- Set unattended start mode 5.- Set privileged-access password 6.- Change privileged-access password 7.- Remove privileged-access password 8.
c. Remove power-on password This option shows the instructions for removing the current power-on password which are: 1 ) Turn off the server and wait a few seconds; then turn it on. 2 ) When Enter password appears, type the current password followed by a space.
This option allows you to change the administrator password. You must know the current privileged-access password in order to complete the procedure. g. Remove privileged password This option removes the administrator password. You must know the current privileged-access password in order to complete the procedure.
This option lets you select the sequence of the drives on which the system searches for a valid boot record when you turn it on. The default startup sequence is the first diskette drive followed by the first hard disk. You can alter this sequence with this utility.
Set Power-On Features Serial-Port Power-On mode..................[Disabled] Real-Time-Clock Power-On mode..............[Enabled] Power-On day of the month.............01 Power-On time.........................12:00 System-error restart.........
3.4.8 More Utilities Menu When you select this option from the Main Menu, a screen like the one in Figure 49 will appear. More Utilities Select one: 1.- Display revision levels 2.- Display system error log 3.- Stand-alone utility information 4.
This displays and resets the entries in the error log. As errors occur, they are recorded in this log. Error log information is helpful when service is required.
1. Start t h e system programs. 2. When t h e system programs main menu appears, press and hold Ctrl and then press A. A message appears telling you to insert the diagnostic diskette. 3. Insert t he diagnostic diskette. After a few seconds, a screen like the one in Figure 52 appears.
Select this option to test the devices one time. If you use it, you will be asked to respond to questions about areas of the server hardware. Press and hold Ctrl and then press C to stop the test. 2. Run the test continuously Select this option to continuously test devices.
The common configuration tasks that will be described here are as follows: 1. Verify t h e configuration 2. Low-level format of the disks 3. Defining a hot-spare drive 4. Creating a disk array 5. Defining logical drives 6. Look a t th e drives information 7.
3.5.1 Drive Information During this first step, we will verify that all the installed units are recognized and available for future use. Select Drive Information on the main menu. The following screen appears: IBM RAID Controller Configuration Ver 2.
Note The RAID Utility shows device type and/or status for each device which it recognizes. The devices may take on several states which you may encounter when running the Utility. Here is a list of indicators used along with a description of each: • CDR = A CD-ROM device.
4. Press Enter to format the selected drives. Notes All the desired devices may be selected and formatted together to reduce the time necessary for formatting. The operation can be time consuming. It takes approximately 20 minutes to format six 2GB disks attached to the same adapter.
Stripe Unit size: This parameter should be chosen such that the stripe unit size is close to the size of the system I/O requests. The default is set to 8KB. Note: Once data is stored in the logical drive, the stripe unit cannot be changed without destroying data in the logical drives.
IBM RAID Controller Configuration Ver 2.12 Adapter in Slot 1 ┌────────────────────────────┐ ┌───────────┐ .
3.5.4 Creating a Disk Array 1. Select Create/Delete Array from the Main Menu. 2. Select Create Disk Array from the Create/Delete Array menu an d press Enter. 3. Using t h e Enter key, select each drive you want included in the array you are now defining.
3.5.5 Defining Logical Drives 1. Select Define logical drive from the Create/Delete Array menu. The following screen appears: IBM RAID Controller Configuration Ver 2.
Notes: a. If only one hard disk has been assigned to the array, RAID level 0 will be automatically assigned and the pop-up menu does not appear. b. If only two hard disks are assigned to the array, RAID-5 is not selectable, since at least three hard disk drives in an array are necessary to assign RAID level 5 to one of the logical drives.
IBM RAID Controller Configuration Ver 2.12 Adapter in Slot 1 ┌────────────────────────────┐ ┌───────────┐ .
3.5.6 Setting the Write Policy Now that the logical drives have been created, you may wish to change the write policy for these drives. If you want to change the write policy: 1. Select Advanced functions from the main menu. 2. Select Change write policy .
2. Select Backup config. to diskette . 3. Press Enter. 4. Enter t h e filename you want for backup (config is t he default). 5. Insert a diskette to ho ld the backup file. 6. Press Enter. To restore the configuration: 1. Select Advanced functions from the Main Menu.
Chapter 4. Novell NetWare Installation In this chapter, we examine the different steps required to install Novell NetWare. Novell NetWare can be installed in the following three ways: • With the ServerGuide CD-ROM • With the original product diskettes • With the original product CD-ROM We will focus on the ServerGuide process.
After the POST tests run, ServerGuide boots, and the ServerGuide language selection screen appears (see Figure 69 o n page 116). Figure 69. ServerGuide Language Select the language that you want to use during the software installation process.
Figure 70. ServerGuide Main Menu This menu contains seven options: Start Here: This option contains information to help you become familiar with ServerGuide features and the contents of the CDs. Software Installation: Select this option to install any of the software programs included with ServerGuide.
The performance tuning programs can tune your server automatically based on this input. Online Documentation: The online documentation includes: • Product documentation • Optional installation doc.
Figure 71. Installing NetWare The installing NetWare screen appears. This screen allows you to select the NetWare version to install. You also can specify whether you want to install NetFinity Services for NetWare on the server.
Figure 72. Configuring NetWare A screen like the one in Figure 7 2 will appear. This screen confirms your choice of country and keyboard and asks you to confirm the LAN adapter and Disk Controller that ServerGuide detected in the server. 7. Accept th e default or modify the values if you want to use a different configuration.
Figure 73. Configuring IB M NetFinity 8. Specify t h e following information: • Network Driver Type (Protocol) • System Name • System Keywords 9. Select OK . Note You can also use the NF config command from the server console to configure NetFinity after the initial installation.
Figure 74. Partitioning the Hard Disk A screen like the one in Figure 74 appears. ServerGuide defaults to create the following partitions: • DOS Startup Drive • NetWare • Free Space 1 0 . Select OK if you want to accept the values or change them.
Figure 75. Reviewing Configuration At this point, you will see a screen like the one in Figure 7 5 . You can review or change the selected options you have just entered. 1 1 . Select OK after you have verified any parameters you wish to recheck. At this point, the server is rebooted and the hard disk is partitioned by ServerGuide.
Figure 76. Unlocking Programs 1 2 . When the server comes back up, you will see a screen like the one in Figure 7 6 . Enter the activation keys for the NetWare version selected as shown in Figure 71 on page 119. 1 3 . Select Unlock . 1 4 . You are prompted to insert the NetWare CD and remove the license diskette.
1 9 . Type SERVER from the NWSERVER directory to restart NetWare. 2 0 . Install NetWare Directory Services. a. Type LOAD INSTALL and press Enter to start the installation utility. b. Select Directory Options(Install NetWare Directory Services) from the main menu and press Enter.
A screen like the one in Figure 79 on page 126 will appear. This is where the context for the server will be defined. Figure 79. Assigning a Context for the Server h. Specify the server context and type an administrator password. i. Retype the administrator password.
2 1 . Type DOWN at the colon prompt. 2 2 . Type EXIT at the colon prompt to return to DOS and finish the installation. 2 3 . Reboot the server and verify that the server comes up properly. The installation is complete. You are now ready to log on as the administrator and add users and applications.
This is the primary network operating system file that identifies the server as a NetWare 3.12 server. During installation it is copied to a directory on the DOS partition.
Figure 81. NetWare Installation 6. Select Install ne w NetWare 3.12 and then press Enter. 7. Select Retain Current Disk Partition and then press Enter. 8. Enter a server name and the press Enter. 9. Enter a n IPX internal network number or accept the default and then press Enter.
When the system asks whether the DOS AUTOEXEC.BAT should load the SERVER.EXE, select Yes and press Enter. At this point, SERVER.EXE is automatically invoked and the system console screen will appear. 1 8 . Load the disk driver. Enter the appropriate disk driver at the colon prompt.
2 2 . Select Create NetWare Partition and press Enter. You will see a screen like the one in Figure 84 on page 131. 2 3 . Press Esc. This will accept the default values, namely the partition size, which is the remaining free space on the drive. Figure 84.
3 0 . Place the cursor on the status field and press Enter. A screen like the one in Figure 86 on page 132 will appear. Figure 86. Volume St at us 3 1 . Select Mount Volume and then press Enter. 3 2 . Press Esc to return to the Installation Options menu.
For example if you are using an IBM 16/4 ISA Adapter you would type LOAD TOKEN , and then press Enter. 3 7 . Press Enter to accept the default value for the I/O port address, or change the address if your LAN adapter needs a specific value.
Figure 89. STARTUP.NCF File 4 5 . Press Esc and select YES to save the STARTUP.NCF file. 4 6 . Press Esc to return to the System Options menu. 4 7 . Select Create AUTOEXEC.NCF File . A screen like the one in Figure 90 will appear. All the console commands you have previously entered have been placed in the AUTOEXEC.
4. 5 Installing NetWare 4.1 with the Original CD-ROM In this section, we detail the procedures necessary to install NetWare 4.1 using the original product CD-ROM.
Figure 91. Installation Menu 7. Select NetWare Server Installation and press Enter. 8. Select NetWare 4.1 and press Enter. 9. Select t h e kind of installation that you want perform. There a re tw o options, as follows: • Simple Installation If you select this option, the installation program sets the default values.
1 8 . Specify the path where the AUTOEXEC.BAT file is located or press Enter to accept the default. The default is C: AUTOEXEC.BAT. A screen like the one in Figure 92 will appear.
Attention This number must be different from the IPX internal network number. 2 3 . Select Manually when the system asks you to choose the method for setting up the NetWare partition(s). 2 4 . Select Create, delete and modify disk partitions and press Enter.
2 9 . Press Enter to continue when the information for available disk space appears. A screen like the one in Figure 96 will appear. Figure 96. New Volume Information 3 0 . Press F10 to accept the defaults for volume SYS:. 3 1 . Select YES when the system asks whether you want to save the volume changes.
Figure 98. Install NetWare Directory S er vi ce s (N DS ) 3 5 . Select Yes, this is the first NetWare 4 server if this is the only NetWare 4.X server on your network.
Figure 100. Context fo r t he Server 3 9 . Specify the server context and type an administrator password. 4 0 . Retype the administrator password. 4 1 . Select Yes when the system asks whether you want to save the directory information. Figure 101. Server Context Information Attention Be sure to remember this information.
Figure 102. Editing STARTUP.NCF File 4 3 . Press F10 and select Yes to save the STARTUP.NCF file. A screen like the one in Figure 103 will appear. Many of the configuration parameters you have previously entered have been placed in the AUTOEXEC.NCF file for you.
Figure 104. File Copy S t at u s 4 5 . When all files have been transferred, a screen like the one in Figure 105 will appear. Figure 105. Other Installation Options 4 6 . Select Continue Installation and press Enter. 4 7 . Press Enter to exit to the system console screen and finish the installation.
4.6 NetFinity Services for NetWare NetFinity Services for NetWare allows you to monitor and manage NetWare servers remotely. With the NetFinity programs running on the server, the administrator can anticipate and correct many problems before they become serious enough to affect the server.
6 . T he installation program will prompt you to insert NetFinity Services for NetWare, Diskette #2. 7. Configure t h e Network Driver. After the program files have been copied onto your NetWare server, the following screen appears. Please note that in this example, the name of the NetWare server is PCSERVER.
1 1 . Set System Keywords. System keywords can help the NetFinity Manager system organize the systems on the network more effectively. Each system can have up to eight keywords. a. Type 4 and then press Enter. A numbered list of keywords and the following message appears: Choose keyword number to edit-> b.
The following lines need to be added to AUTOEXEC.NCF: SEARCH ADD SYS:NETFIN LOAD NETFBASE If you choose to update AUTOEXEC.NCF, AUTOEXEC.NCF will be backed up to AUTOEXEC.RPS. Otherwise, additions will be saved to the file AUTOEXEC.NEW in the path SYS:NETFIN.
5. Enter t h e source drive and directory name where th e NetFinity program files are located or accept A: as the default. 6. Enter t h e drive and directory name where th e NetFinity program files will be copied. The default is C: NETFIN. This should be the drive letter that you mapped to earlier.
9. Insert NetFinity Services for NetWare Diskette #2 and select OK . After the program files have been copied onto your NetWare server, a window like the one in Figure 110 will appear. Figure 110. Network Driver Configuration 1 0 . Enter a name for the server in the System Name field.
NetFinity will generate an alert whenever one of your NetFinity services is started by a remote user that is accessing the server. The alert includes the name of the service that was run and information about the user that started the service. To activate this option: a.
After you save these changes, the NetFinity base program will start automatically when the server is started. • If you do not want the NetFinity base programs to start automatically, you can start them manually. To start NetFinity manually: 1. Turn o n t h e server.
6. Type LOAD RAIDADM at the NetWare server console prompt and press Enter t o start the RAID Administration for NetWare Utility. Note Loading RAIDADM.NLM will automatically load RAIDASPI.NLM. A screen like the one in Figure 113 will appear. Figure 113.
configured. It is also assumed that the RAID administration in the server and the NetFinity Manager in a workstation are running. 4.8.1 Simulating with a Hot Spare Drive 1. Start t h e RAID Administration for NetWare Utility. A screen like the one in Figure 114 will appear.
Figure 115. Verifying Array Configuration The array configuration can also be verified from a workstation with NetFinity Manager installed using RAID manager (see Figure 116). Figure 116. Using RAID Manager to View Array Configuration The hot spare drive is enclosed in a box.
Figure 117. Detecting the Disk Failure If NetFinity has been configured properly, it will generate an alert. Figure 1 1 8 shows the NetFinity Alert Manager Log where such an alert has been generated. Figure 118. Disk Failure - NetFinity Alert In this example, two alerts were received.
Figure 119. Disk Failure - NetFinity RAID Service 4. Select t h e View Last Event option from the Administration Options menu. A screen like the one in Figure 120 will appear. Figure 120. View La st Event Message 5 . A t the end of the rebuild process, the RAID Administration for NetWare Utility sends a message.
Figure 121. RAID Administration - Recovery Message NetFinity also sends some alerts. Figure 122 shows the NetFinity Alert Manager Log for these alerts. Figure 122. NetFinity Recovery Alert Again, two alerts are received. The first refers to the logical drive which is now online and the second to the physical disk which is also now online.
Figure 123. Changes i n Array Configuration The changes in the array are as follows: • The original hot spare disk in bay 3 changed to status ONL (online). • The faulty disk in bay 5 changed to status DDD (defunct). We will now make the simulated failed disk the new hot spare disk.
Figure 125. RAID Administration - Verifying the Replacement of a Defunct Drive The new array configuration is as follows: • The disk status in bay 3 remains as ONL. • The disk status in bay 5 changed to HSP. 1 1 . NetFinity sends another alert. The NetFinity Alert Manager looks like Figure 1 2 6 .
Figure 127. NetFinity RAID Service - N ew Hot Spare You can see that a new disk is enclosed in a box. It is the new hot spare drive in the array configuration. This simulation is complete. 4.8.2 Simulating without a Hot Spare Drive To do the same test without a hot spare drive: 1.
Figure 129. NetFinity RAID Service - Verifying Configuration 3. Simulate a disk failure by unplugging it wit h the machine powered on . In this example the disk in bay 5 was unplugged. If you do this, you will see an asterisk next to bay 5 and a flashing asterisk in the View Last Event option.
Figure 131. NetFinity Alert Lo g In this example, two alerts were received. The first alert refers to the logical drive which was defined using the failed disk. This has been logged as a critical alert. The second alert relates to the physical drive which has failed.
6. Select View Last Event from the RAID Administration Utility to see the message. A screen like the one in Figure 133 will appear. Figure 133. Last Event Message Since there is no hot spare drive defined in this example, the disk can not be automatically replaced.
Figure 135. RAID Administration - Replace a Defunct Drive After the drive is started, the RAID Administration for NetWare Utility attempts to rebuild the new disk.
Figure 137. RAID Administration - Verifying t he Rebuild S t a t u s 1 1 . Press any key to complete the process. 1 2 . NetFinity sends two alerts. The NetFinity Manager looks like Figure 1 3 8 . Figure 138. NetFinity Alert - New Disk Online These alerts indicate that the new disk is online.
Chapter 5 . Performance Tu n i ng To get the optimal performance from your NetWare server, you need to consider the performance of both the hardware and the software. In this chapter, we examine the general performance characteristics of file server hardware.
LAN adapters and fast disk subsystems. In contrast, database servers typically need fast processors (or multiple processors) and fast disk subsystems. Both file and database servers require large amounts of memory for operating system caching.
Systematic measurements of server performance employing adequate resolution typically produce a graph shaped like the one shown in Figure 140 on page 16 9 . The characteristics that shape this graph are important for understanding potential bottlenecks in a file server.
which represents the maximum server transactions per second or throughput rate. After the peak throughput is reached, the curve begins to slope downward. As the number of users is increased, the caching engine of the operating system begins to break down.
Figure 141. Differences in LA N Adapters Upgrading the disk subsystem will tend to flatten out the top of the curve as it will provide a higher sustainable data transfer rate. In most cases, the disk subsystem becomes the bottleneck when a large number of users becomes active.
Figure 142. Differences in Disk Subsystems Improving performance of the disk subsystem will usually prolong the maximum transactions per second rate shown in Figure 1 4 2 .
• Flexible, user-definable interface • Reliable, accurate information • Continuous reports of top talkers, ring map (token-ring only), error conditions, statistics, and selected network data •.
Figure 143. MONITOR Utility The monitor utility allows you to check many important aspects of file server performance. It allows you check resource allocations and utilization of these resources.
4 . Yo u are the given a choice of parameters to either view or set. In the following sections, we look at many of these parameters and make recommendations for setting them. Note Many of the set parameters can be adjusted from the server console while the server is up and running.
5.3.1 Disk Subsystem The file server disk subsystem contains the files which are accessed by the LAN workstations. The efficiency at which access is performed is directly related to the file server performance.
5.3.1.2 Block Size (NetWare 4.1) In all versions of NetWare prior to NetWare 3.X, the block allocation unit was fixed at 4KB. In NetWare 3.X, larger allocation units are possible, but they result in a lot of unused disk space at the end of files. For example, if the last part of a file took up 1KB of a 16KB block, the remaining 15KB was wasted.
NetWare 3.12 and 4.1: Default = 5 minutes 29.6 seconds Increasing the Turbo FAT re-use wait time helps ensure that the index structures are not flushed if the file is reused quickly. For example, a large database file might be accessed frequently throughout the day, with many file load and save operations.
5.3.1.5 File Caching File caching has the most affect on overall file server performance. Because accessing data from cache is much faster than accessing data from disk, the more data than can be held in cache, the better the server performance. Hence, the number of file cache buffers available can greatly impact server performance.
size is equal to 4096, the amount of memory used in megabytes can be calculated as follows: system memory used = (original cache buffers - total cache buffers) x cache buffer size (3000 - 2500) x 4096.
5.3.1.7 Dirty Disk Cache Delay Time The dirty cache delay time controls the time taken to hold the write requests in the cache when the cache is not full. If your system has unused cache memory, and your typical server workload contains a high number of sequential write operations, then you may improve performance by increasing this value.
Attention Set this parameter to ON only if you are absolutely sure your backup strategy enables you to restore a file which has been deleted. 5.3.1.11 Enable Disk Read After Write Verify In NetWare, this read-after-write verify capability complements the hot fix function.
5.3.2.2 Packet Size Different network topologies will use different packet sizes. For example, a token-ring LAN adapter set to 16 Mbps can use packets of up to 4202 bytes. I f the packet size is left at the network default value, which is 1514 bytes, this could unnecessarily slow down the LAN adapter performance.
monitored using MONITOR.NLM. Use this value rather than the number of defined LAN users. For example: 1 . F o r 4 0 LAN users with 2 LAN adapters in the file server: 40 (users) + ((10 x 2) LAN adapters) = 60 buffers minimum; set the maximum to 160. 2 .
Recommendation • For networks without wide area (WAN) segments, set the maximum packet receive buffers to 300. • For networks that use WANs, set the maximum packet receive buffers to 1000. This should be adequate to handle the additional buffering needed for WAN links.
The size of the cache buffer pool is dynamic and determined by the amount of memory left over after the other pools have been allocated. As more buffers are allocated for NLMs and other system resources, this reduces the size of the cache buffers pool.
5.3.4 Memory Requirements The following sections present some guidelines for calulating total server memory requirements for both the NetWare V3.12 and V4.1 environments. 5.3.4.1 Calculating Server Memory Requirements (V3.12) To calculate the total system memory required, use the following guidelines: 1.
processing, this is an indication that the LAN adapter could be a bottleneck in the file server. In this case, the LAN adapter could be upgraded or another one added to balance the LAN load and use the system processor more efficiently.
Appendix A. EISA Configuration File Board Information IBM Dual Pentium PCI-EISA System Board System Manufacturer ................. Micronics Computers, Inc. ID ........................... MIC0054 Category ..................... SYS Board slot type ....
System - IBM Dual Pentium PCI-EISA System Board Jumper Name: W1 - Level 1 Cache. Default factory settings: OFF Change settings to: OFF +-------+ | o o | +-------+ 12 This jumper sets the level 1 (CPU ¢ s internal) cache to write-back or write-through mode.
Jumper Name: W10 - Level 2 Cache. Default factory settings: OFF ON Change settings to: OFF ON +-----------+ | o o---o | +-----------+ 1 2 3 This jumper along with W5 selects the level 2 cache size. Jumper pins 1-2 for 256K cache size. Jumper pins 2-3 for 512K cache size.
Jumper Name: W28 - PCI IDE IRQ. Default factory settings: ON OFF Change settings to: ON OFF +-----------+ | o---o o | +-----------+ 1 2 3 Jumper the pins to set the PCI IDE controller as the PRIMARY IDE controller at IRQ 14. Remove the jumper to disable the PCI IDE.
Board Information IBM Auto 16/4 Token-Ring ISA Adapter Slot 3 Manufacturer ................. PNP ID ........................... IBM0001 Category ..................... OTH Board slot type .............. Other Readable ID .................. No Skirt ...
Board Information PCI SCSI Controller Embedded Manufacturer ................. PCI ID ........................... 90047178 Category ..................... MSD Board slot type .............. PCI Readable ID .................. No Skirt ...................
Used Resources Resource Slot Function IRQ 0.................. System Reserved System Resources. IRQ 1.................. System Reserved System Resources. IRQ 3.................. System Serial Port B IRQ 4.................. System Serial Port A IRQ 6..
Available Resources ───IRQs──┬───DMAs──┬─────ISA I/O Ports───┬─Memory Amount───Address──── 5 │ 0 │ 100h - 2F1h │ 64K 0A0000h 10 │ 1 .
System Specifications Slot Slot Board Accept Max Bus- Slot Name Type ID Skirted Length master Tag(s) ────────── ────────── ─────── ─────.
Appendix B. Hardware Compatibility, Device Driver, and Software Patch Information One of the challenges that LAN administrators face is ensuring that the adapters they want to use are supported and then finding the latest level of device drivers for these adapters.
Figure 145. Sample Compatibility Report Showing Ethernet LAN Adapters In addition, it contains reports by NOS and by machine and model number which shows the testing done to certify the hardware against the operating system.
For OEM adapters, many manufactures have web and FTP sites which work very similar to the process outlined above. There is a one very useful web site which maintains an index to many OEM web sites which have device drivers for many popular boards. The site is called the LAN Drivers Page and the URL for this site is: • http://sunsite.
Appendix C. Configuring DOS CD-ROM Support This appendix is included to aid in configuring CD-ROM support in the DOS environment. C.1 Installing CD-ROM Support for PCI Adapters. To install CD-ROM support for an IBM PC Server with a PCI SCSI adapter: 1.
• MSCDEX.EXE 2 . A d d the following statements to the CONFIG.SYS file: DEVICE=C:SERVERIBMRAID.SYS DEVICE=C:SERVERRDASPII.SYS DEVICE=C:SERVERIBMCDROM.SYS /Q DEVICE=C:SERVERRDCDROM.SYS DEVICE=C:SERVERRAMDRIVE.SYS 2800 512 128 /E 3 . A d d the following statement to the AUTOEXEC.
List of Abbreviations ALU Arithmetic-Logic Unit APA all points addressable ASCII American Standard Code for Information Interchange ASPI Advanced SCSI Programming Interface BIOS Basic Input/Output Sys.
Index Special Characters .ADF files 85 .CFG file 75 Numerics 16/4 Token-Ring Bus Master Adapter 32 32-bit addressing 2, 1 6 8 80486DX2 2 80C186 19 A abbreviations 2 0 5 acronyms 2 0 5 active client, N.
defunct drives 1 5 8 design considerations availability 2 2 cost 2 3 performance and capacity 22 Desktop Management Interface (DMI) 37 browser in NetFinity 44 communicating service 38 Component Interf.
high availability 22 hot spare drive 15 4 HP OpenView, interoperability with NetFinity 45 I IBM LANStreamer MC32 32 IBM Quad PeerMaster Adapter 33 IDE See Integrated Drive Electronics (IDE) immediate file purging 18 1 Industry Standard Architecture (ISA) 12 INSTALL.
P P5 1 P54C 1 packet receive buffers 18 3 packet size 183 parallel port, configuration of 70 parity 9 parity placement, in RAID arrays 10 6 passive client, NetFinity 43 password jumper 36 password on .
security (continued) tamper-evident switches 3 4 unattended start mode 37 unattended start mode, MCA 94 user password, EISA 71 security manager, NetFinity 42 seek time 22 selectable drive startup 37 selecting a time zone 125 serial control service, NetFinity 42 serial port, configuration of 70 serial-port power-on 97 server components 16 7 SERVER.
T Tagged Command Queuing (TCQ) 18 tamper-evident switches 34 TCP/IP See Transmission Control Protocol/Internet Protocol (TCP/IP) TCQ See Tagged Command Queuing (TCQ) terminator, SCSI bus 79 testing the computer 97 throughput 1 6 9 time zone, NetWare 125 TOKEN.
ITSO Technical Bulletin Evaluation RED000 International Technical Support Organization IBM PC Server and Novell NetWare Integration Guide December 1995 Publication No. SG24-4576-00 Your feedback is very important to help us maintain the quality of ITSO Bulletins.
ITSO Technical Bulletin Evaluation RED000 SG24-4576-00 IBML Fold and Tape Please do not staple Fold and Tape NO POSTAGE NECESSARY IF MAILED IN THE UNITED STATES BUSINESS REPLY MAIL FIRST CLASS MAIL PERMIT NO. 40 ARMONK, NEW YORK POSTAGE WILL BE PAID BY ADDRESSEE IBM International Technical Support Organization Department HZ8, Building 678 P.
IBML Printed in U.S.A. SG24-4576-00.
Artwork Definitions id File Page References ITSLOGO 4576SU 1i Figures id File Page References ASYM CH1A 51 5 SYMM CH1A 62 6 INTERL CH1A 73 7 DUALP CH1A 84 7 ECCMEM CH1A 10 5 9 ECCP CH1A 11 6 11 STRM20.
71 27 71 CH313 CH3 74 28 74 CH314 CH3 74 29 74 CH315 CH3 75 30 74 CH316 CH3 75 31 CH317 CH3 76 32 76 CH318 CH3 77 33 76 CH308 CH3 78 34 78 CH309 CH3 78 35 78 CH310 CH3 80 36 79 CH311 CH3 81 37 81, 81 .
104 57 CH323 CH3 105 58 CH324 CH3 105 59 105 CH325 CH3 107 60 CH326 CH3 107 61 107 CH327 CH3 108 62 CH328 CH3 109 63 CH329 CH3 109 64 CH330 CH3 110 65 CH331 CH3 111 66 110 CH332 CH3 111 67 111 CH333 C.
133 312STF 4576CH4 134 89 133 312AEX 4576CH4 134 90 134 41NW01 4576CH4 136 91 135 NW41DD 4576CH4 137 92 137 NW41ND 4576CH4 137 93 137 NW41CP1 4576CH4 138 94 138 NW41V 4576CH4 138 95 138 NW41VOL 4576CH.
155 WRAID07 RAIDADM 156 119 155 WRAID08 RAIDADM 156 120 156 WRAID09 RAIDADM 157 121 156 WRAID10 RAIDADM 157 122 157 WRAID11 RAIDADM 158 123 157 WRAID12 RAIDADM 158 124 158 WRAID13 RAIDADM 159 125 158 .
Headings id File Page References NOTICES 4576FM x v Special Notices ii BIBL 4576PREF xviii Related Publications CH1 CH1A 1 Chapter 1, IBM P C Server Technologies xvii PROCESR CH1A 1 1.
40 1.9.2.4, Traps SERVS CH1E 41 1.9.3.1, NetFinity Services MG R CH1E 43 1.9.3.2, NetFinity Manager NARCH CH1E 44 1.9.3.3, NetFinity Architecture D M I CH1E 45 1.9.3.4, D M I Support INTEROP CH1E 45 1.9.3.5, Interoperability with Other Management Tools STRUC CH1E 45 1.
Index Entries id File Page References CPU CH1A 1 (1 ) central processing unit (CPU) ALU CH1A 1 ( 1) arithmetic logic unit (ALU) SMP CH1A 3 (1 ) symmetric multiprocessing (SMP) 3 DRAM CH1A 3 (1 ) dynam.
71, 71, 72, 92, 92, 94, 94 D M I CH1E 3 7 (1 ) Desktop Management Interface (DMI) 37, 38, 38, 38, 38, 39, 39, 44 MI F CH1E 38 (1) Management Information Format (MIF) M I CH1E 39 (1 ) Desktop Managemen.
Processing Options Runtime values: Document fileid ........................................................................................... EG244576 SCRIPT Document type ..............................................................................
Imbed Trace Page 0 SG244576 Page 0 4576SU Page 0 4576VARS Page 1 4576FM Page i 4576EDNO Page ii 4576ABST Page xv 4576SPEC Page xv 4576TMKS Page xvi 4576PREF Page xix 4576ACKS Page xx CH1A Page 1 6 CH1.
Een belangrijk punt na aankoop van elk apparaat IBM SG24-4576-00 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen IBM SG24-4576-00 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens IBM SG24-4576-00 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding IBM SG24-4576-00 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over IBM SG24-4576-00 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van IBM SG24-4576-00 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de IBM SG24-4576-00 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met IBM SG24-4576-00 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.