home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Cream of the Crop 11
/
Cream of the Crop 11-1.iso
/
disk
/
suprdupe.zip
/
SUPRDUPE.DOC
< prev
next >
Wrap
Text File
|
1995-10-17
|
25KB
|
618 lines
No*STOP
SUPRDUPE
JULY 1995
NONSTOP NETWORKS LIMITED
20 Waterside
New York, New York 10010-2619
(212)481-8488
FAX (212)779-2956
For product Support:
Research and Development Center
311 Turner St., Suite 302
Utica, New York 13501
(315)738-1819
FAX (315)793-9248
Compuserve 76557,3724
This program is produced by a member of the Association of
Shareware Professionals (ASP). ASP wants to make sure that
the shareware principle works for you. If you are unable to
resolve a shareware-related problem with an ASP member by
contacting the member directly, ASP may be able to help.
The ASP Ombudsman can help you resolve a dispute or
problem with an ASP member, but does not provide technical
support for members' products. Please write to the ASP Ombudsman
at 545 Grover Road, Muskegon, MI USA 49442-9427, FAX 616-788-2765,
or send a CompuServe message via CompuServe Mail to
ASP Ombudsman 70007,3536.
Printed in USA 07/1995.
COMPANY PROFILE
NONSTOP NETWORKS LIMITED was formed late in 1988 to
provide specialty system software products to the burgeoning
local area network market. The founders, a small cadre of
computer software specialists, drew on their expertise in
operating system software, performance monitoring and data
base management to bring to market their first product,
NONSTOP NETWORK (since renamed No*STOP NETWORK ),
in 1989. This product was designed to provide full fault tolerant
operational capability to PC LANs. Fault tolerance is the ability
of a system to sustain failure of a file service and provide
continuous processing to the user with no loss of data. This
level of fault tolerance, in a multiple file server LAN, is called
Level 3 and NONSTOP NETWORKS LIMITED is recognized as
the only provider of a LEVEL 3 product that is truly generic to all
of the popular Network Operating Systems currently available.
NONSTOP NETWORKS LIMITED produces a family of disk
backup products and utilities. These products are software
solutions and reside on the workstations, generally requiring less
than 15k bytes of RAM. They are similar to each other in
function, but different in scope. The basic function that they
perform is that of providing automatic concurrent backup of all
activity on designated logical drives. In the event of drive
failure, the user is given the option to continue without backup.
The scope of the products is different in the following ways:
No*STOP MIRROR duplicates (provides constant backup for) all
disk activity on a primary logical drive to a secondary logical
drive, and provides nonstop data access in the case of either
primary or secondary drive failure. Logical drives must be local.
This product is typically used with external storage devices.No*STOP NETWORK duplicates (provides constant backup for)
all disk activity on one or more primary logical drives to
secondary logical drives, and provides nonstop data access
(continuous processing) in the case of either primary or
secondary drive failure. Logical drives can be either local or
network drives.
No*STOP NETWORK-MM replicates (provides constant,
multiple backup for) all disk activity on one or more primary
logical drives to up to three secondary logical drives for each
primary drive, and provides nonstop data access in the case of
failure of the primary or any of the secondary drives. Logical
drives can be either local or network drives.
No*STOP RECOVERY is a utility for recovering failed logical
drives (or servers). It creates an exact copy of a logical drive
and verifies that it is exact. It is marketed as a stand-alone
product and is also included as a utility with the other
NONSTOP NETWORKS LIMITED mirroring products.
No*STOP SUPRDUPE is a shareware utility for synchronizing
drives. It has the same functionality as No*STOP RECOVERY
but for local drives only. It will not synchronize network drives.
All NONSTOP NETWORKS LIMITED disk backup products
operate at the basic system level. Software which operates at
this level has unconstrained access to the fundamental
structures of the data and processes of the computer, and thus
has maximum power to be useful or to be destructive. Our
products have been extensively tested to ensure that they can
do no harm when properly used. Due to their necessary
complexity, these programs should only be modified by
NONSTOP NETWORKS LIMITED software engineers who are
familiar with them and who have access to design documents,
patents, source code and configuration control facilities. Any
attempt by others to modify or customize the code could result
in damage to the system and irretrievable corruption of data.
If you need customization of the product, contact the NONSTOP
NETWORKS LIMITED Research and Development Center.Before using the product, please read the README.DOC file on
your program diskette by entering the following instruction at the
DOS prompt:
TYPE A:README.DOC
For a hard copy, enter:
TYPE A:README.DOC >PRN
CAUTION......CAUTION......CAUTION
Bear in mind that No*STOP SUPRDUPE has the
power to destroy data. In this sense it is similar to
DOS functions such as: FDISK, FORMAT,
DELETE, and COPY. Be sure you assign SOURCE
and TARGET correctly. For instance,
"SUPRDUPE D: C:" will replace the contents of
your C: drive with the contents of your D: drive.
In most cases, this is not a good idea!
TABLE OF CONTENTS
1 DESCRIPTION . . . . . . . . . . . . . . . . .1
2 Usage . . . . . . . . . . . . . . . . . . . .1
2.1 Starting SUPRDUPE. . . . . . . . . . . . .1
2.2 Switches . . . . . . . . . . . . . . . . .2
2.3 Action Buttons . . . . . . . . . . . . . .3
3 Reports . . . . . . . . . . . . . . . . . . .4
3.1 Main Menu. . . . . . . . . . . . . . . . .4
3.1.1 Top of Screen - Summary Information
. . . . . . . . . . . . . . . . . . . . .4
3.1.2 Middle of Screen - Detailed Report. .5
3.1.3 Bottom of Screen - Help Display . . .5
3.2 Results Reports. . . . . . . . . . . . . .5
4 Characteristics and Items of Note . . . . . .6
4.1 Limitations of the Synchronization . . . .6
4.1.1 Restricted Files. . . . . . . . . . .6
4.1.2 SYSTEM Directories and Files. . . . .6
4.2 Extent of the Synchronization. . . . . . .6
4.3 SUPRDUPE and the Archive Bit . . . . . . .7
4.4 Disk and RAM Requirements. . . . . . . . .7
5 Batch File Usage. . . . . . . . . . . . . . .8
APPENDIX A - WARRANTY AND LICENSE AGREEMENT
. . . . . . . . . . . . . . . . . . . . . . . .9
INDEX. . . . . . . . . . . . . . . . . . . . . 13
1 DESCRIPTION
No*STOP SUPRDUPE creates an exact copy of a logical drive
and verifies that it is exact. A logical drive can be a floppy disk,
a virtual drive, or an entire hard disk. No*STOP SUPRDUPE
runs on a PC workstation under MS or PC-DOS 3.x, 4.x or 5.x,
6.x, Novell DOS 7.0, and DR DOS 5.0 and 6.0. No*STOP
SUPRDUPE greatly reduces the effort of duplicating complex
directory structures.
No*STOP SUPRDUPE performs its synchronization activity by
analyzing the two drives to determine the necessary activities to
be performed. If the target drive is a new, empty drive, all
directories and subdirectories on the source drive will be created
on the target drive, and all files will be copied from the source
drive. If the target drive was previously a mirror of the source
drive, but has diverged from the source drive, directories and
subdirectories on the source which do not exist on the target will
be created on the target and those existing on the target which
do not exist on the source will be removed; files on the source
which have a different date or size than those on the target, or
which do not exist on the target, will be copied from the source.
If a date:time is specified, all files on the source more recent
than that date:time will be copied to the target, whether or not
the dates and sizes are different. No*STOP SUPRDUPE will
not copy any files which are open. It will, however, record that
they need to be copied.
2 Usage
This section presents a description of the actions required to run
No*STOP SUPRDUPE and the interactions with it.
2.1 Starting SUPRDUPE
No*STOP SUPRDUPE can be invoked from the DOS command
line prompt (or from within a batch file) with all parameters
specified using the following format:
SUPRDUPE x: y: [date [time]] [switches]
where: x=source ("good") drive; y=target ("bad") drive
and: date:time=the date and time
(mm-dd-yy [hh:mm(a or p)]) when the drives
began to diverge (e.g., the date and time when
the target drive failed). If a date:time is
specified, all directories and files having
date:time stamps more recent than that specified
will be copied from the source to the target.
This parameter may be used to ensure that
critically important files always get recovered.
2.2 Switches
/R[:nn] Will perform the synchronization loop "nn" times.
The "nn" parameter may be used to specify a maximum
number of iterations from 1 (default) to 98. If 99 is
specified, the number of iterations is infinite. SUPRDUPE
may be terminated early by use of the /T switch, or by
pressing <F8> or <ALT><F8>. /T For use with the /R switch. Will cause the "nn"
iterations to be interrupted when the two drives have
reached synchronization.
/B Batch Mode. Will run with no screen display. For use
when running SUPRDUPE from a batch file. If the "/R"
switch is not used, the execution will be in Verify Only
Mode. See Section 5 for a description of batch file usage.
/W:nn Will wait "nn" minutes between each iteration of the
synchronization process. For use when running in Batch
Mode.
/S Will recover System files and directories. That is, will
copy System files and directories from the Source to the
Target if they exist on the Source but not on the Target;
and will delete them from the Target if they do not exist on
the Source. Unless this switch is specified, System files
and directories will be invisible to No*STOP SUPRDUPE
and will not be affected.
All options are case insensitive.
2.3 Action Buttons
If the Batch Mode (/B) switch is not specified, SUPRDUPE will
run interactively. A display, described in Section 3.1, will be
presented with the following choices described at the bottom of
the screen:
<F1> HELP
<F2> REG - Instructions for registering the product.
<F4> VERIF - Verify only. No modification to the Target will
be performed. A report is produced showing what
operations need to be performed.
<F5> STATS - Will present a report showing results of the
last Verify or Recover pass. The report for Verify Only
shows what needs to be done. The report for Full Verify
and Synchronization shows what has been done. This
report can be directed to your printer by pressing
<ALT><F5>. This provides a permanent audit record. (The
printer must be ON and ready.)
<F7> SYNCH - Full Verify and Synchronization. Files and
directories will be changed on the Target so that it matches
the Source. One pass will be performed.
<ALT><F7> LOOP - Perform Full Verify and Recover "nn"
times, based on the "/R:nn" switch described above and
subject to the "/T" switch, also described above. If there is
no "/R:nn" switch, SUPRDUPE will perform one pass and
stop.
<F8> EXIT - Stop recovering at the end of the current
pass. This key is also available when SUPRDUPE is
running in batch mode.
<ALT><F8> - Exit SUPRDUPE immediately. This key is
also available when SUPRDUPE is running in batch mode.
<CTL><C> - Same as <ALT><F8>.
<ESC> - Exit SUPRDUPE from Main Menu. De-activated
during Verify Only and Full Verify and Synchronization.
3 Reports
The following reports are generated and displayed on the
workstation monitor.
3.1 Main Menu
During each pass, a running status screen (the Main Menu) is
displayed, showing current activity. At the end of a pass (after
Verify if in Verify Only Mode, after Verify and Synchronization if
in Synch Mode), the screen is static. The screen is divided into
three rows of boxes:
3.1.1 Top of Screen - Summary Information
This section contains summary information concerning the
switches you chose and total activity against files and directories
during the current and previous passes.
3.1.2 Middle of Screen - Detailed Report
This section contains detailed information concerning activity
performed during the pass just completed. If Verify Only Mode
was performed, it shows what needs to be done.
Processed Directories
This box displays, in tree format, the structure of the Target
Drive after SUPRDUPE has processed it. Directories are color
coded according to the type of activity performed on them:
WHITE - No change
YELLOW - Directory or file added to the Target
RED - Directory or file removed from the Target
GREY - Hidden directory or file
BLUE - Read-Only directory or file
When a directory is added or deleted, the full structure of the
directory found on the Source, including files and subdirectories,
is added to, or deleted from, the Target.
Copy to Target and Remove From Target
These displays show activity for individual files within directories
which need attention. In this case, a directory exists on both
drives, but the contents of the two are dissimilar. The file
names are also color coded as described in the preceding
paragraph.
3.1.3 Bottom of Screen - Help Display
The Action Keys and legend are defined at the bottom of the
screen. A status line (in yellow) indicates current processing
and intermediate errors encountered.
3.2 Results Reports
At the end of a Verify Only pass, pressing <F5> will present a
report on the screen which describes the actions which need to
be taken to bring the Source and Target drives into
synchronicity. At the end of a Full Verify and Synchronization
pass pressing <F5> will present a report on the screen which
describes the actions which have been taken to bring the
Source and Target drives into synchronicity. These reports are
presented page at a time. To advance to the next page, press
any key. To direct either report to a printer, use <ALT><F5>.
4 Characteristics and Items of Note
4.1 Limitations of the Synchronization
All files and directories are recovered with the exception of
those discussed in the following subsections. This includes
Hidden, Read-Only and zero-length files. Files and directories
not recovered are:
4.1.1 Restricted Files
Files to which the SUPRDUPE user has no privileges or rights
will not be recovered. Normally the SUPRDUPE user should
have all privileges of the Supervisor or System Administrator.
Indeed, the Supervisor or System Administrator should be the
only person allowed to run SUPRDUPE.
4.1.2 SYSTEM Directories and Files
Except as discussed below, System directories and files will not
be recovered. That is, they will be neither copied from the
Source to the Target, nor deleted from the Target. Files within
System directories will also not be recovered, whether the files
are System or not. This also applies to sub-directories beneath
System directories, whether those sub-directories are System or
not. This facility of No*STOP SUPRDUPE enables the user to
exclude chosen directories from the synchronization process.
If the user wishes to recover System files and directories, the
"/S" switch must be chosen. See Section 2.3.
4.2 Extent of the Synchronization
When invoking No*STOP SUPRDUPE, the user provides a
source drive letter and a target drive letter. The synchronization
process operates from the root of these drive letters, not from
their current directories. Thus, if F: is given as the source and
G: is given as the target, No*STOP SUPRDUPE will perform its
operations from F:\ and G:\, even if F: is currently at F:\WORK
and G: is at G:\SYSTEM.
There may be areas on the target drive that you do not want
recovered, such as subdirectories which reside on that drive
only. Be sure to define your drive letters in such a way as to
exclude such areas, for example, for a machine with a C: and
a D: drive:
SUBST F: C:\WORK
SUBST G: D:\WORK
Or you can set the SYSTEM attribute for those files.
4.3 SUPRDUPE and the Archive Bit
SUPRDUPE 3.0 examines attributes as well as size and
date/time to determine if files need to be copied. This can, in
some cases, cause unnecessary file copies. A common
example would be the use of a tape backup utility. These
utilities typically save files to tape which have their archive
bits set. They then clear the bits. If the backup is performed,
for instance, from the Secondary Drive, the archive bits will be
cleared on that drive, but not on the other drive. If,
subsequently, it becomes necessary to use SUPRDUPE, it
will find a difference and will copy the files from the Source to
theTarget, even though they are identical in size and
date/time, thus increasing the time it takes to synchronize.
There are several procedures which can be followed to avoid
this unnecessary copying.
Probably the most contained and safe procedure would be to
do your tape backup from a batch file, including commands to
clear the archive bits on the uninvolved drive after running the
backup. For example:
BACKUP FROM D: TO TAPE
ATTRIB C:*.* -A
If this is always done, unnecessary copying will be avoided.
4.4 Disk and RAM Requirements
Intermediate report files created by No*STOP SUPRDUPE
require storage room on the drive and directory which were
current when No*STOP SUPRDUPE was invoked or on the
drive/directory defined in the TMP environment variable.
These files vary in size with the size of the synchronization
task, but should usually be in the low to medium thousands of
bytes. These temporary files may not get deleted if No*STOP
SUPRDUPE is terminated with a <ALT>F8> or <CTRL><C>
or if the machine stops abnormally. These files will have the
extension .$$$. They may be deleted when and if they are
seen.
No*STOP SUPRDUPE requires at least 256k of available
RAM.
5 Batch File Usage
No*STOP SUPRDUPE can be invoked within batch files to
perform user-defined processes automatically. To support
batch file processing, DOS error level codes are set as
follows:
ERRORLEVEL=0: No discrepancies were found during
verification. The drives are synchronized.
ERRORLEVEL=1: Discrepancies were found and
successfully resolved. The drives are synchronized.
ERRORLEVEL=2: Discrepancies were found but not
successfully resolved. This can happen, for instance, if
the user running SUPRDUPE does not have sufficient
rights to the files or directories nominated for recovering.
This setting is also made when SUPRDUPE has been
run in Verify Mode and discrepancies were found.
ERROERLEVEL=3: SUPRDUPE has been aborted by
the user.
APPENDIX A - WARRANTY AND LICENSE AGREEMENT
No*STOP
SUPRDUPE
LICENSE
This license allows any legitimate user the non-exclusive
right to use the No*STOP SUPRDUPE software and its
documentation for an unlimited time.
The product is warranted as described in the LIMITED
WARRANTY section below. Any modification of the software
voids the warranty. If the software is duplicated for any other
purpose than backup, the user will have violated copyright,
patent and other laws and becomes subject to enforcement of
Nonstop Networks Limited rights.
If the user wants to transfer this license, all (and not part)
of the documentation, software and backups thereof must be
transferred to the new user, who must agree with the terms of
this license and sign a copy indicating such agreement.
BACKUP AND TRANSFER
You may make archival copies of the software for the sole
purpose of backing up the software. You may sell your license
rights in the software to another party. You cannot sell your
license rights in the software to another party unless that party
also agrees to the terms and conditions of this Agreement.
TERMINATION OF LICENSE
You may terminate this license by returning the program,
together with any copies. This license will also terminate if you
fail to comply with any term or condition of this Agreement. You
agree upon such termination to return the program, together
with any copies.REGISTRATION
No*STOP SUPRDUPE is a shareware product. If you find it
useful you should register it according to the instructions found
in REGISTER.TXT. You may freely distribute the original
SUPRDUPE.ZIP file to others who may be interested.
LIMITED WARRANTY
With respect to the physical diskette and physical
documentation, NONSTOP NETWORKS LIMITED warrants that
these items will be free from defect in materials and
workmanship for a period of thirty (30) days from the date of
purchase. In the event of notification within the warranty period
of defects in materials or workmanship, the defective diskette or
documentation will be replaced so long as you mail, freight
prepaid, the defective material to NONSTOP NETWORKS
LIMITED. The sole remedy for breach of this warranty shall be
limited to the replacement of the defective document or diskette.
EXCEPT FOR THE ABOVE LIMITED WARRANTY, THIS
SOFTWARE PROGRAM IS PROVIDED "AS IS". THE ENTIRE
RISK AS TO THE RESULTS AND PERFORMANCE OF THE
PROGRAM IS ASSUMED BY YOU. NONSTOP NETWORKS
LIMITED DOES NOT WARRANT, GUARANTEE, OR MAKE
ANY REPRESENTATIONS REGARDING THE USE OF, OR
THE RESULTS OBTAINED WITH THE PROGRAM IN TERMS
OF CORRECTNESS AND RELIABILITY. THE ABOVE IS THE
ONLY WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE THAT IS MADE BY NONSTOP
NETWORKS LIMITED. IN NO EVENT SHALL NONSTOP
NETWORKS LIMITED BE LIABLE FOR ANY LOSS OF PROFIT
OR ANY OTHER COMMERCIAL DAMAGE INCLUDING BUT
NOT LIMITED TO SPECIAL, INCIDENTAL, CONSEQUENTIAL
OR OTHER DAMAGES. SOME STATES DO NOT ALLOW
LIMITATIONS OR EXCLUSIONS OF LIABILITY SO THE
ABOVE LIMITATIONS OR EXCLUSIONS MAY NOT APPLY TO
YOU.
GOVERNING LAW
This Agreement shall be construed, interpreted and
governed by the laws of the State of New York. THIS
AGREEMENT CANNOT BE MODIFIED EXCEPT BY WRITTEN
AMENDMENT EXECUTED BY YOU AND AN AUTHORIZED
OFFICER OF NONSTOP NETWORKS LIMITED.
UPDATE POLICY
PATCHES
Patches will be made available via Compuserve downloads.
UPGRADES
Upgrades will be offered to registered users at a discount. An
upgrade is defined as a significantly new capability or a major
revision required to accommodate advances in software or
hardware technology. An upgrade will consist of a new
package, including at least a new 3 1/2" diskette (unless
otherwise requested) and manual.
REPLACEMENTS
Replacements for lost or damaged diskettes may be purchased
for $10. Additional Manuals may be purchased for $15. 1995 NONSTOP NETWORKS LIMITED
No*STOP MIRROR, No*STOP NETWORK,
No*STOP NETWORK-MM, No*STOP BACKUP,
No*STOP RECOVERY, No*STOP SUPRDUPE, are registered
trademarks of NONSTOP NETWORKS LIMITED.
All rights reserved. No part of this publication may be
reproduced, photocopied, stored on a retrieval system, or
transmitted without the express prior written consent of the
publisher.
TRADEMARKS AND COPYRIGHTS
IBM PERSONAL COMPUTER, IBM PC - International Business
Machines; WordPerfect - WordPerfect Corp.; EDLIN, "C",
WINDOWS, HIMEM, EMM386 - Microsoft Corp.; LOTUS 1-2-3 -
LOTUS Development Corp.; DBASE III, DBASE IV - Ashton-
Tate Corp.; DESQView, QEMM - Quarterdeck Office Systems;
NetWare, Network Navigator - Novell, Inc.; PROXY - Funk
Software; 10NET - Tiara ; Lantastic, Network Eye - Artisoft Corp
; WordStar - WordStar International Inc.; 3+SHARE - 3COM
Corp.; DR-DOS -Digital Research Inc.; 386MAX - Qualitas;
CEMM - Compaq Computer Corporation
INDEX
Batch File Usage 8
Characteristics 6
Continuous Processing i, ii
Disk and RAM Requirements 7
Drive Failure i, ii
ERRORLEVEL 8
Extent of the Recovery 6
Files Not Recovered 6
Reports
In-Progress Report 4
Requirements 7
Temporary Files
.$$$ 8
Usage
Command Line/Batch Invocation 1
Options 2
Run Time Commands 3
WARRANTY AND LICENSE AGREEMENT 9