Inside OS/2 Warp Server for E-Business(PDF)

Inside OS/2 Warp Server for E-Business(PDF)

Inside OS/2 Warp Server for e-business Girish Basavalingaiah, Ron Bloor, Tonko De Rooy, Edgar Omar Gonzalez Espinosa, Roger Govind, Peter Marfatia, Oliver Mark, Frank Mueller, Indran Naick, Leon Van Der Linde, Frank Vanhulle International Technical Support Organization http://www.redbooks.ibm.com SG24-5393-00 SG24-5393-00 International Technical Support Organization Inside OS/2 Warp Server for e-business July 1999 Take Note! Before using this information and the product it supports, be sure to read the general information in Appendix C, “Special notices” on page 429. First Edition (July 1999) This edition applies to OS/2 Warp Server for e-business for use on Intel server hardware. Note This book is based on a pre-GA version of a product and may not apply when the product becomes generally available. We recommend that you consult the product documentation or follow-on versions of this redbook for more current information. Comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. DHHB, Building 003 Internal Zip 2834 11400 Burnet Road Austin, Texas 78758-3493 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1999. All rights reserved. Note to U.S Government Users – Documentation related to restricted rights – Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Contents Figures....................................................xi Tables................................................... xvii Preface...................................................xix The team that wrote this redbook. ..................................xix Commentswelcome............................................xxiii Chapter 1. Introduction and overview ...........................1 1.1Evolution...............................................1 1.1.1 Host computing: 1964..................................1 1.1.2 Personal computing: 1981 . ............................2 1.1.3 Client/Server: 1988. ..................................3 1.1.4 Network computing: The world today ......................4 1.2Overview...............................................6 1.2.1 About e-business . ..................................6 1.2.2Architectureandservices...............................8 1.3Aversatileserver........................................15 1.4 System requirements .....................................17 1.4.1 Hardware requirements ...............................18 1.4.2 Hard space disk requirements ..........................19 1.5 Replaced or discontinued components . ......................20 1.6Serverpackagingandlicensing.............................21 1.6.1386HPFSlicensing..................................21 1.7Theinstallationprocess...................................22 1.7.1 The bootable CD . .................................22 Chapter 2. Base operating system enhancements................23 2.1 Virtual memory support . .................................23 2.2 Intelligent input and output I2O .............................23 2.2.1 I2Oarchitecture.....................................24 2.3 1024 cylinder restriction . .................................32 2.3.1TheINT13hinterface.................................32 2.3.2 OS/2 boot process . .................................34 2.4 Kernel enhancements and file subsystems.....................38 2.5 SMP support and microprocessor affinity ......................40 2.6 Large file support . ......................................42 2.6.1 SES and large file support . ...........................44 2.7Java1.1...............................................45 2.8Netscape4.04..........................................46 2.9 Graphical locale builder . .................................47 © Copyright IBM Corp. 1999 iii 2.9.1Javalocale.........................................50 2.9.2 Euro currency support ................................50 Chapter 3. Adapters and protocol services .....................53 3.1 Overview of adapters and protocol services ....................53 3.1.1 Adapter and protocol support...........................53 3.1.2Socket/Multiprotocoltransportservices...................59 3.2 Installing adapters and protocol services ......................60 3.3 Additional configuration for adapters and protocol services . .....66 3.3.1ConfiguringSocket/MPTS..............................69 3.3.2NETBEUIparameters.................................72 3.3.3 Configuring more than four LAN adapters. ................72 3.3.4 DOS and Windows LAN applications on OS/2 . ...........79 3.3.5NetBIOSoverTCP/IPonOS/2WarpServerfore-business....80 3.4MPTS-Strongencryption.................................87 3.5 Removing adapters and protocol services .....................87 Chapter 4. Journaled file system and logical volume manager......89 4.1 OS/2 file system support . .................................89 4.1.1Fileallocationtable...................................89 4.1.2Highperformancefilesystem...........................91 4.1.3HPFS386..........................................92 4.1.4Journaledfilesystem.................................92 4.1.5HPFS386featuresnotavailablewithJFS..................93 4.1.6ComparisonoffeaturesofFAT,HPFS,andHPFS386JFS.....93 4.1.7Networkfilesystem..................................94 4.1.8CD-ROMfilesystem..................................94 4.2 Logical volume manager . .................................95 4.2.1LVMterminology.....................................95 4.2.2OverviewofLVM....................................96 4.2.3LVMandFDISK.....................................99 4.2.4 Key components of the LVM. ..........................100 4.2.5Bad-blockrelocation.................................112 4.2.6 LVM operation .....................................112 4.2.7 Logical volume manager benefits . .....................120 4.3Journaledfilesystem....................................121 4.3.1JFScache........................................121 4.3.2JFSstructure......................................123 4.3.3JFSdisklayout.....................................123 4.3.4JFSsystemstructure................................124 4.3.5 JFS utilities. .....................................136 4.3.6Acloserlookatchkdsk...............................140 4.3.7Systemlimits......................................141 iv Inside OS/2 Warp Server for e-business 4.3.8Performanceconsiderations...........................142 Chapter 5. File and print services ............................145 5.1Review...............................................146 5.2Installation............................................150 5.3Fileandprintservicesconfiguration.........................152 5.4Fileandprintservicesadministration........................156 5.5386HPFS............................................158 5.5.1 Attended installation of 386 HPFS with fault tolerance . ....158 5.5.2 Installing local security ...............................160 5.5.3Logfilescreatedduringinstallation......................160 5.5.4 Installing 386 HPFS using CID .........................160 5.5.5ExistingACLs......................................163 5.6 Functional rollups . .....................................163 5.6.1 IBM Neighborhood Browser Enabler 1.0 . ...............163 5.6.2 IBM Network Client 4.1 for Windows 95 . ...............164 5.6.3 IBM Network Client for Windows NT .....................165 5.7 Capacity enhancements . ................................166 5.7.1Overview.........................................166 5.7.2 Maximum number of connections . .....................167 5.7.3 Maximum open files . ................................168 5.7.4Maximumsearchvalue...............................169 5.7.5Maximumshares...................................171 5.7.6Summary.........................................172 5.8Multipleservernames...................................172 5.8.1Configuration......................................173 5.8.2 Scenarios .........................................174 5.9 Vinca StandbyServer ....................................177 5.10NewNETUSEswitch...................................178 Chapter 6. Integrating Windows NT Servers....................181 6.1Overview.............................................181 6.1.1Keyfeatures.......................................182 6.1.2 Benefits ..........................................182 6.1.3Limitations........................................185 6.2Architecture...........................................185 6.2.1 User accounts .....................................186 6.2.2 Windows NT Server alias support. .....................186 6.3Concepts.............................................187 6.3.1 Microsoft domain models . ..........................187 6.3.2 Microsoft workgroup model. ..........................189 6.3.3 User authentication . ................................189 6.3.4 The IBM Networks User Account Manager . ...............191 v 6.4Accesscontrol.........................................192 6.4.1AnoverviewofaccesscontrolonNT....................192 6.4.2Sharepermissions..................................192 6.4.3Permissionsonfilesanddirectories.....................194 6.4.4ACLs,SIDs,andsecurityrelatedissues..................199 6.4.5 Summary of domain security management . ...............201 6.5 Installation of IBM Networks User Accounts Manager for NT . ....201 6.5.1 Prerequisites tasks . ................................201 6.5.2InstallationontheNTserver...........................202

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    472 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us