An Apple Iigs Emulator

Total Page:16

File Type:pdf, Size:1020Kb

An Apple Iigs Emulator About News Forum [http://www.emaculation.com/forum/] Emulators SheepShaver Basilisk II Mini vMac PearPC Other How-To Setup SheepShaver for Windows Setup SheepShaver for MacOS X Setup SheepShaver for Linux Setup Basilisk II for MacOS X Setup Basilisk II for Windows Setup Basilisk142 for Windows Setup Basilisk II for Linux Setup PearPC for Windows Setup Mini vMac for Windows More Guides Extras Interviews Compiling_&_Tidbits Macintosh ROM Images Compatibility Notes 68K Macintosh Software Mini vMac Games All Downloads Contact Kegs32: An Apple IIgs emulator (Last updated September 8, 2012) Information Kegs [http://kegs.sourceforge.net/] is an Apple IIgs emulator for Linux. There is a Windows port called Kegs32 [http://www.emaculation.com/kegs32.htm]. The Windows port is somewhat difficult to setup. Installing the GS/OS operating system and figuring out disk images are particularly tricky tasks. This guide provides some bootable GS/OS installation disks, a pre-prepared disk image and a few pointers for IIgs novices. I hope it helps. If you need some more assistance, I can be reached by e-mail [mailto:[email protected]], or on my forum [http://www.emaculation.com/forum]. The Emulator Download Kegs32 version 091 [http://www.emaculation.com/kegs/kegs32091.zip]. The homepage was lost when Geocities shut down, but a mirror is available here [http://www.emaculation.com/kegs32.htm]. ROM Image Asimov.net has a collection [ftp://ftp.apple.asimov.net/pub/apple_II/emulators/rom_images] of Apple II ROM images. For this emulator, you want to download gsrom01 or gsrom03. As far as the emulator is concerned, I guess that both are about the same. For what it is worth, I was using gsrom03 when I created the disk image (below) containing an installation of GS/OS. If you use my disk image, maybe you should use the same ROM. To select the ROM, run the emulator and hit f4 to enter the configuration screen. GS/OS The Apple IIgs featured the glorious Apple GS/OS [http://en.wikipedia.org/wiki/GS/OS]. You can get this into the emulator in a number of ways: The easiest is to download a disk image that already has the OS installed. I have one of those here [http://www.emaculation.com/kegs/gsosdisk.zip] (expands to 32 MB). To boot this disk, run the emulator and hit f4 to go to the config screen. After you have selected your ROM image, go the main config screen and select “disk configuration” and mount the disk image in the s7d1 slot (see figure one, below). This is the easiest way to get started with the emulator, but it is not entirely recommended… GS/OS components are installed individually (from the system disks) by the user and my disk image does not contain every component. If an application says that it requires a certain tool, you will need to copy that tool from the system disks. A better way to get started with the emulator is to download GS/OS install disks. You can download such disks for free from AppleCare support [http://www.info.apple.com/support/oldersoftwarelist.html]. Look for “Apple_IIGS_System_6.0.1” disks one through seven (probably near the top of the list). However, the only way those files can be turned into a form that is usable by Kegs is from within a real Macintosh. But don't worry, I've done that for you myself: download a package containing all seven installation disks (in a usable form) right here [http://www.emaculation.com/kegs/gsosinstalldisks.zip]. Correction Jorpho points out that using The Unarchiver for Windows, one can easily extract the install disks in Windows. Check out the instructions in this forum thread [http://emaculation.com/forum/viewtopic.php? f=3&t=7402]. Read the whole topic for instructions that reflect the most recent versions of The Unarchiver (the initial instructions given are a bit old). Installing GS/OS First, mount disk one in s7d1 and mount a blank disk image [http://www.emaculation.com/kegs/blankdisk.zip] in s7d2. Run the emulator. When prompted, choose to do an “Easy Install.” When you are asked for the next installation disk, hit f4 and mount the required disk in slot s5d1 (by going to “disk configuration” as described above) Close the configuration menu, and repeat this when you are asked for the next disk. Always mount the required disk in s5d1. Note that the easy install does not use all of the disks. When installation is completed, click “quit.” When the OS asks you what application you want to use, just hit cancel. Hit f4 to go back to the configuration screen. Now mount the (formerly) blank disk that you just installed to as sd71 (as you've noticed already, this is where all disks that you are going to boot from are mounted). Restart the emulator. You should have a very basic install of the GS/OS looking at you (see figure two, below). To install additional components of GS/OS (sound, for example), mount the first install disk in s5d1 and run the “installer” application contained within. Click “customize” and browse through the options available to you. Disk Images Create blank disk images (if needed) using CiderPress 3.0.0 [http://www.emaculation.com/kegs/CiderPress300.zip]. Just create through File–>New–>Disk Image. GS/OS can't handle disk images larger than 32 megabytes. The disk images should be formatted as ProDOS (the default setting of CiderPress). Software A good source of IIgs games in disk image format (ie: mountable in the emulator) is Virtual Apple [http://www.virtualapple.org/]. The site is all about a browser-based emulator of the IIgs, but when a game is selected to run, the website includes a download link. Mount these disk images in s5d1 (most of the time). A good source of serious software is SheppyWare [http://www.sheppyware.net/downloads/downloads- gs/index.html]. These files cannot be used in the emulator right away. To use the downloads, open them in CiderPress. Select “Action” from the menu bar and “Convert to Disk Image.” You should convert to a 800 KB disk for kegs. Give the disk some name and hit okay (see figure three, below). The disk image you've just created should be mounted in s5d1. About the Port The original kegs page [http://kegs.sourceforge.net/] will give you a different (rougher, older) Windows port. Both work about the same for me. I recommend Kegs32 here because it has a full-screen option and the mouse emulation seems a little bit smoother. There is also a Mac OS X port of Kegs available [http://www.casags.net/kegs-osx/index.html]. There is another IIgs emulator called XGS32, when this article was written I was unable to locate a copy. I have since been sent a copy. It can be downloaded here [http://www.emaculation.com/kegs/XGS.rar]. It was last updated in 2000. I haven't yet tried it out. Do e- mail me [mailto:[email protected]] if you have any success with it. Some Screenshots Figure one: Mount the disk image containing GS/OS in s7d1 Figure two: GS/OS running in Kegs Figure three: Converting to a usable disk image Fin Big thanks to Stephen [http://stevecoates.net/] for helping to test out this guide. kegs .txt · Las t modified: 2 0 1 2 /0 9 /0 8 1 4 :0 9 by c loc kwis e Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution- Noncommercial-Share Alike 3.0 Unported [http://creativecommons.org/licenses/by-nc-sa/3.0/].
Recommended publications
  • Digital Forensics and Preservation 1
    01000100 01010000 Digital 01000011 Forensics 01000100 and Preservation 01010000 Jeremy Leighton John 01000011 01000100 DPC Technology Watch Report 12-03 November 2012 01010000 01000011 01000100 01010000 Series editors on behalf of the DPC 01000011 Charles Beagrie Ltd. Principal Investigator for the Series 01000100 Neil Beagrie 01010000 01000011DPC Technology Watch Series © Digital Preservation Coalition 2012 and Jeremy Leighton John 2012 Published in association with Charles Beagrie Ltd. ISSN: 2048-7916 DOI: http://dx.doi.org/10.7207/twr12-03 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing from the publisher. The moral right of the author has been asserted. First published in Great Britain in 2012 by the Digital Preservation Coalition. Foreword The Digital Preservation Coalition (DPC) is an advocate and catalyst for digital preservation, ensuring our members can deliver resilient long-term access to digital content and services. It is a not-for- profit membership organization whose primary objective is to raise awareness of the importance of the preservation of digital material and the attendant strategic, cultural and technological issues. It supports its members through knowledge exchange, capacity building, assurance, advocacy and partnership. The DPC’s vision is to make our digital memory accessible tomorrow. The DPC Technology Watch Reports identify, delineate, monitor and address topics that have a major bearing on ensuring our collected digital memory will be available tomorrow. They provide an advanced introduction in order to support those charged with ensuring a robust digital memory, and they are of general interest to a wide and international audience with interests in computing, information management, collections management and technology.
    [Show full text]
  • THE PRES/URRECTION of DEENA LARSEN's “MARBLE SPRINGS, SECOND EDITION” by LEIGHTON L. CHRISTIANSEN THESIS Submitted in Part
    THE PRES/URRECTION OF DEENA LARSEN’S “MARBLE SPRINGS, SECOND EDITION” BY LEIGHTON L. CHRISTIANSEN THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Library and Information Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2012 Urbana, Illinois Adviser: Associate Professor Jerome McDonough © 2012 Leighton L. Christiansen Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License 2012 Leighton L. Christiansen Abstract The following is a report on one effort to preserve Deena Larsen’s hypertextual poetic work Marble Springs, Second Edition (MS2). As MS2 is based on Apple’s HyperCard, a software program that is no longer updated or supported, MS2, and other works created in the same environment, face extinction unless action is taken. The experiment below details a basic documentary approach, recording functions and taking screen shots of state changes. The need to preserve significant properties is discussed, as are the costs associated with this preservation approach. ii Acknowledgments This project would not have been possible without the help and support of many people. First I have to thank Deena Larsen for entrusting me with “her baby,” Marble Springs, and a number of obsolete Macs. Many thanks to my readers, Jerome McDonough and Matthew Kirschenbaum, who offered helpful insights in discussions and comments. A great deal of appreciation is due to my team of proofreaders, Lynn Yarmey, Mary Gen Davies, April Anderson and Mikki Smith. Anyone who has to try to correct my poor spelling over 3,000 pages deserves an award. Finally, thanks to my classmates, professors, and friends at GSLIS, who listened to me talk on and on about this project, all of whom had to wonder when I would finish.
    [Show full text]
  • The Art of Virtualization with Free Software Master on Free Software 2009/2010
    What is Virtualization Types of Virtualization The Art of Virtualization with Free Software Master on Free Software 2009/2010 Miguel Vidal, Jos´eCastro {mvidal,jfcastro}@libresoft.es GSyC/Libresoft – URJC April 24th, 2010 Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization (cc) 2010 Miguel Vidal, Jos´eCastro. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike 3.0 License, available at http://creativecommons.org/licenses/by-sa/3.0/ Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Agenda Part 1: What is Virtualization Part 2: Types of Virtualization Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization What is Virtualization Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization What is Virtualization Hardware/software combination, which allows a computer to act as several ones. It includes making a single physical resource (such as a server, an operating system, or storage device) appears to function as multiple logical resources. Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Definitions Virtualization is a methodology of dividing the resources of a computer into multiple execution environments. Virtualization applies one or more concepts or technologies such as partitioning, time-sharing, partial or complete machine simulation, emulation, quality of service, and many others. Colloquially, virtualization refers to the abstraction of computer resources. Miguel Vidal, Jos´eCastro The Art of Virtualization with Free Software What is Virtualization Types of Virtualization Hypervisors In modern computing, Virtual Machine Monitors (aka hypervisors) allow many different OS, tasks and software configurations exist on the same physical machine.
    [Show full text]
  • It Worked Yesterday: on (Re-) Performing Electroacoustic Music
    University of Huddersfield Repository Berweck, Sebastian It worked yesterday: On (re-)performing electroacoustic music Original Citation Berweck, Sebastian (2012) It worked yesterday: On (re-)performing electroacoustic music. Doctoral thesis, University of Huddersfield. This version is available at http://eprints.hud.ac.uk/id/eprint/17540/ The University Repository is a digital collection of the research output of the University, available on Open Access. Copyright and Moral Rights for the items on this site are retained by the individual author and/or other copyright owners. Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not-for-profit purposes without prior permission or charge, provided: • The authors, title and full bibliographic details is credited in any copy; • A hyperlink and/or URL is included for the original metadata page; and • The content is not changed in any way. For more information, including our policy and submission procedure, please contact the Repository Team at: [email protected]. http://eprints.hud.ac.uk/ It worked yesterday On (re-)performing electroacoustic music A thesis submitted to the University of Huddersfield in partial fulfilment of the requirements for the degree of Doctor of Philosophy Sebastian Berweck, August 2012 Abstract Playing electroacoustic music raises a number of challenges for performers such as dealing with obsolete or malfunctioning technology and incomplete technical documentation. Together with the generally higher workload due to the additional technical requirements the time available for musical work is significantly reduced.
    [Show full text]
  • Linux on IBM Z Networking: OSA-Express and Roce Express Side by Side — Stefan Raspl Linux on IBM Z Development
    Linux on IBM Z Networking: OSA-Express and RoCE Express Side by Side — Stefan Raspl Linux on IBM Z Development IBM Z / © 2018 IBM Corporation Trademarks The following are trademarks of the International Business Machines Corporation in the United States and/or other countries. AIX* DB2* HiperSockets* MQSeries* PowerHA* RMF System z* zEnterprise* z/VM* BladeCenter* DFSMS HyperSwap NetView* PR/SM Smarter Planet* System z10* z10 z/VSE* CICS* EASY Tier IMS OMEGAMON* PureSystems Storwize* Tivoli* z10 EC Cognos* FICON* InfiniBand* Parallel Sysplex* Rational* System Storage* WebSphere* z/OS* DataPower* GDPS* Lotus* POWER7* RACF* System x* XIV* * Registered trademarks of IBM Corporation The following are trademarks or registered trademarks of other companies. Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used under license therefrom. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. IT Infrastructure Library is a registered trademark of the Central Computer and Telecommunications Agency which is now part of the Office of Government Commerce. ITIL is a registered trademark, and a registered community trademark of the Office of Government Commerce, and is registered in the U.S. Patent and Trademark Office. Java and all Java based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • Download the Index
    41_067232945x_index.qxd 10/5/07 1:09 PM Page 667 Index NUMBERS 3D video, 100-101 10BaseT Ethernet NIC (Network Interface Cards), 512 64-bit processors, 14 100BaseT Ethernet NIC (Network Interface Cards), 512 A A (Address) resource record, 555 AbiWord, 171-172 ac command, 414 ac patches, 498 access control, Apache web server file systems, 536 access times, disabling, 648 Accessibility module (GNOME), 116 ACPI (Advanced Configuration and Power Interface), 61-62 active content modules, dynamic website creation, 544 Add a New Local User screen, 44 add command (CVS), 583 address books, KAddressBook, 278 Administrator Mode button (KDE Control Center), 113 Adobe Reader, 133 AFPL Ghostscript, 123 41_067232945x_index.qxd 10/5/07 1:09 PM Page 668 668 aggregators aggregators, 309 antispam tools, 325 aKregator (Kontact), 336-337 KMail, 330-331 Blam!, 337 Procmail, 326, 329-330 Bloglines, 338 action line special characters, 328 Firefox web browser, 335 recipe flags, 326 Liferea, 337 special conditions, 327 Opera web browser, 335 antivirus tools, 331-332 RSSOwl, 338 AP (Access Points), wireless networks, 260, 514 aKregator webfeeder (Kontact), 278, 336-337 Apache web server, 529 album art, downloading to multimedia dynamic websites, creating players, 192 active content modules, 544 aliases, 79 CGI programming, 542-543 bash shell, 80 SSI, 543 CNAME (Canonical Name) resource file systems record, 555 access control, 536 local aliases, email server configuration, 325 authentication, 536-538 allow directive (Apache2/httpd.conf), 536 installing Almquist shells
    [Show full text]
  • Enhanced Networking on IBM Z/VSE
    Front cover Enhanced Networking on IBM z/VSE Use LFP on Z/VM and in LPAR for selected applications Experience the benefits of OpenSSL Learn how to use IPv6 on z/VSE Joerg Schmidbauer Jeffrey Barnard Ingo Franzki Karsten Graul Don Stoever Rene Trumpp ibm.com/redbooks International Technical Support Organization Enhanced Networking on IBM z/VSE December 2014 SG24-8091-01 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. Second Edition (December 2014) This edition (SG24-8091-01) applies to z/VSE V5 R2. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . .x Preface . xi The team who wrote this book . xi Now you can become a published author, too! . xii Comments welcome. xii Stay connected to IBM Redbooks . xiii IBM Redbooks promotions . .xv Summary of changes. xvii December 2014, Second Edition . xvii Chapter 1. Networking options overview . 1 1.1 Overview . 2 1.2 Hardware options . 2 1.2.1 OSA-Express . 2 1.2.2 OSA-Integrated Console Controller . 3 1.2.3 OSA-Express in QDIO mode . 4 1.2.4 OSA-Express . 5 1.2.5 OSA for NCP support . 5 1.2.6 Intra-Ensemble Data Network support . 6 1.2.7 OSA-Express multi-port support . 7 1.2.8 Using VTAM (SNA) and TCP/IP (non-QDIO) parallel on the same CHPID . 8 1.2.9 HiperSockets (IQD).
    [Show full text]
  • Operating System Structure; Virtual Machines
    CPS221 Lecture: Operating System Structure; Virtual Machines last revised 9/9/14 Objectives 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of layered kernel architecture 2. Projectable of microkernel architecture 3. Projectable of place of virtual machine structure 4. Ability to show Mac Utillities, System Preferences 5. Ability to demonstrate Sheepshaver (use Letter Learner) 6. Ability to demonstrate VMWare Fusion on Mac I. Operating System Structure. A. We now turn from talking about what an operating system does to how it is implemented. (We will focus on the operating system proper - not the libraries and system programs.) B. The design of an operating system is a major task. 1. Historically, the complexity of OS design was a motivating factor in the development of software engineering - specifically OS/360. (See Frederick Brooks The Mythical Man Month.) 2. The complexity arises for two reasons a) Some of the services that the kernel must provide are inherently complex - e.g. those pertaining to managing directory structures, file permissions, etc. b) There are a lot of dependencies between components 1 C. There are several key principles that are important in operating system design. 1. The distinction between MECHANISMS and POLICIES. a) A policy is a specification as to what is to be done. (1)Example: round-robin is a scheduling policy we discussed when we looked at timesharing systems. (2)Example: large multiuser systems may specify the hours of the day when certain users can log in to the system, as a security policy.
    [Show full text]
  • Fireware XTM V11.6 Release Notes
    Fireware XTM v11.6 Release Notes Supported Devices XTMv, XTM 2, 3, 5, and 8 Series XTM 1050, XTM 2050 Fireware XTM OS Build 344207 WatchGuard System Manager 344359 Build Revision Date 10 July 2012 Introduction WatchGuard is pleased to announce the release of Fireware XTM v11.6 and WatchGuard System Manager v11.6.You can install Fireware XTM OS v11.6 on any WatchGuard XTM device, including 2 Series, 3 Series, 5 Series, 8 Series, XTM 1050 and 2050 devices, and with any edition of XTMv. The new features, feature enhancements, and bug fixes included in this release have been carefully chosen to improve the efficiency, performance, and reliability of all XTM devices. Feature areas with significant enhancements include: Authentication l Single Sign-On support for Citrix and Terminal Services environments l Authentication portal support for mobile devices l Authentication auto-redirect to host name to allow use of commercial CA-signed certificates WatchGuard Servers l Easy access to HIPAA and PCI Compliance Reporting on new Compliance reporting tab l Automatic WebBlocker database updates l New scheduled task options for OS updates, feature key synchronization, and reboots for Management Server management groups Networking l Increased maximum number of VLANs l Wireless Hot Spot splash screen updated to use HTTP l Configurable dynamic routing policies Branch Office VPN l Inbound IPSec pass-through l Improved VPN Phase 2 key expiration settings l VPN log message header improvements l New VPN Diagnostics Report Before You Begin Security Services
    [Show full text]
  • The Olive Executable Archive
    The Olive Executable Archive Presenter Daniel Ryan Curator of Executable Content Transforming the Role of Libraries Ability to archive static content transformed human history Ability to archive executable content will also transform human collaboration VM technology will play a starring role Library of Alexandria reaching back in time I wonder what Isaac’s model would say about this new data? Isaac’s archived VM image Olive: What and Why? Olive seeks to close a gap in the ability of libraries and cultural memory institutions to meet the preservation requirements of constituents producing executable content. • There is a high demand for access to and execution of early computer applications and games • Preservation of data or code alone is insufficient – users must be able to actually manipulate this content in its original environment • Offers precise replication of original executables (execution fidelity) Think of Olive as YouTube for software. With the click of a button, users can interact with a piece of archived software as if it were new. Funding Sloan Foundation Grant – January 2013. • Award: $400k over 2 years • Goal: To develop the technical framework for Olive which supports the long term preservation of executable content; To plan for an effective organizational structure to sustain the archive and provide access to executable content IMLS Leadership Grant – October 2012. • Award: $497k over 2 years • Goal: To understand what types of content can be ingested into Olive and to determine how an executable content archive can fit into existing trusted repository standards such as OAIS, OCLC, CRL and JISC Software or Stone Tablet? Unlike books, letters, and other traditional media, software is designed to be interpreted and executed by computers.
    [Show full text]
  • IBM Z/OS V2R2 CS TCP/IP Implementation Volume 3
    Front cover IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance Bill White Octavio Ferreira Teresa Missawa Teddy Sudewo Redbooks International Technical Support Organization IBM z/OS V2R2 Communications Server TCP/IP Implementation: Volume 3 High Availability, Scalability, and Performance August 2016 SG24-8362-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (August 2016) This edition applies to Version 2, Release 2 of z/OS Communications Server. © Copyright International Business Machines Corporation 2016. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii IBM Redbooks promotions . ix Preface . xi Authors. xii Now you can become a published author, too! . xiii Comments welcome. xiii Stay connected to IBM Redbooks . xiv Chapter 1. An introduction to IBM z/OS Communications Server high availability technologies . 1 1.1 Overview of high availability . 2 1.2 Fundamental technologies for z/OS TCP/IP availability . 2 1.2.1 Single z/OS system availability . 2 1.2.2 z/OS Parallel Sysplex availability . 3 1.2.3 Virtual IP addressing. 4 1.2.4 z/OS network connectivity and dynamic routing . 5 1.2.5 Single-instance and multiple-instance applications. 7 1.2.6 Balancing workload across multiple application instances . 8 1.3 Quick-start table . 11 Chapter 2. Virtual IP addressing . 13 2.1 Basic concepts of virtual IP addressing . 14 2.1.1 Static VIPA .
    [Show full text]