home *** CD-ROM | disk | FTP | other *** search
Text File | 1993-05-31 | 83.2 KB | 2,921 lines |
-
-
-
-
-
-
-
-
-
-
-
-
- REFLECT
-
- User's Guide
-
- Version: 4.0
-
-
- Copyright (C) 1992, 1993 by: CLone Star Software of
- Hockley, Texas. ALL RIGHTS RESERVED.
-
-
- This document and all accompanying software are copyrighted by CLone
- Star Software of Hockley, Texas and may not be copied, by any means,
- without the expressed written consent of CLone Star Software.
-
-
- REFLECT, ZCOPY, ALTEREGO, N-DIRECT, CDROMVUE, METERMADE, FAULT-FINDER,
- SMOOTH-SAIL, LOCKNESS, and UNISPOOL are trademarks of CLone Star Software of
- Hockley, Texas. All other products mentioned in this document are trademarks
- or registered trademarks of their respective manufacturers.
-
-
-
-
- Second Printing
- Published: June, 1993.
-
-
-
-
-
-
- TABLE OF CONTENTS
-
-
- Chapter One: Getting Started With REFLECT 1-1
-
- GETTING STARTED 1-3
-
- PLANNING FOR REFLECT 1-5
-
- DISK DRIVE SETUP 1-6
-
- Chapter Two: Preparing REFLECT Media 2-1
-
- MEDIA PREPARATION 2-3
-
- Chapter Three: Installing REFLECT 3-1
-
- INSTALLATION 3-3
-
- Chapter Four: Loading REFLECT 4-1
-
- LOADING REFLECT 4-3
-
- Chapter Five: Configuring REFLECT 5-1
-
- CONFIGURING REFLECT 5-3
-
- CONFIGURATION CAVEATS 5-6
-
- USING REFLECT WITH TAPE BACKUP PRODUCTS 5-8
-
- Chapter Six: The Fault-Finder Support Facility 6-1
-
- ABOUT FAULT-FINDER 6-3
-
- WHEN TO USE FAULT-FINDER 6-4
-
- HOW TO INVOKE FAULT-FINDER 6-5
-
- HARD TO DUPLICATE ERRORS 6-6
-
- WHAT TO DO WITH THE CAPTURE FILE 6-8
-
-
- TABLE OF CONTENTS
-
-
- Chapter Seven: The Smooth-Sail Facility 7-1
-
- ABOUT SMOOTH-SAIL 7-3
-
- RIGGING FOR SMOOTH-Sailing 7-4
-
- Chapter Eight: Global Command Line Options 8-1
-
- GLOBAL COMMAND LINE OPTIONS 8-3
-
- Chapter Nine: The ZCOPY Command 9-1
-
- USING THE ZCOPY COMMAND 9-3
-
- ZCOPY EXCLUSION FILE 9-7
-
- INITIALIZING DISK DRIVES WITH ZCOPY 9-11
-
- INCREMENTAL COPYING WITH ZCOPY 9-12
-
- RETRY PASSES WITH ZCOPY 9-13
-
- LOGGING ZCOPY ERRORS 9-14
-
- Chapter Ten: Network Configurations for REFLECT 10-1
-
- USING REFLECT WITH DOS-BASED NETWORKS 10-3
-
- INITIALIZING THE SECOND DOS-BASED
- FILE SERVER 10-4
-
- CLIENT SETUP FOR DOS-BASED
- FILE SERVERS 10-6
-
- USING REFLECT WITH NetWare NETWORKS 10-8
-
- INITIALIZING THE SECOND NetWare
- FILE SERVER 10-9
-
- CLIENT SETUP FOR NetWare NETWORKS 10-11
-
- NetWare INSTALLATION SUPPLEMENT 10-13
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 1
-
- Getting Started With REFLECT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 1-1
-
-
- GETTING STARTED
-
-
- REFLECT is an MS-DOS* compatible software product that provides the capability
- to establish a fault-tolerant environment for the disk storage needs of your
- personal computer or your network file server. REFLECT requires MS-DOS
- version 3.10 or later. REFLECT is a logical disk drive mirroring system which
- operates in real time; it is not a file copy program.
-
- You may already be familiar with one or more software products which perform
- various types of backup functions. REFLECT should not be confused with
- products of such classification. There are also some software products
- which claim to provide fault tolerance by way of their timed copy
- capabilities. You should not confuse REFLECT with any products of this
- classification either.
-
- REFLECT does not copy files from one disk to another. We have found that such
- techniques are extremely slow and not capable providing continuous file system
- fault tolerance. REFLECT can provide continuous file system fault tolerance.
- It does so by mirroring all configured file activity. How is this different
- from backup or timed copy programs ? Here is an example that will demonstrate
- the fundamental difference between REFLECT and other products which are
- simply backup solutions:
-
- Let's assume that you are using REFLECT to mirror a 30mb database file. Let's
- further suppose that you change a single byte in a single record of this
- database file. If you were using a backup or timed copy product, the entire
- 30mb database file would then need to be copied onto some other backup media.
- However with REFLECT, this is not necessary. REFLECT will cause the same
- single byte of the same single record of a mirror-copy of the 30mb database
- to be changed simultaneously.
-
-
-
- 1-3
-
-
-
- This approach allows REFLECT to achieve automatic continuous file service
- protection without the unforgivable overhead of copying files.
-
- When you are using REFLECT to mirror one or more file systems, your network
- clients are automatically protected against the sudden loss of one or more
- logical disk drives. Should your file server experience a critical error on
- one of the disk drives being mirrored by REFLECT, then REFLECT will
- automatically switch the file operations of your network clients to one or
- more mirror drives or file servers. This automatic switch over is performed
- in such a manner that will be transparent to the application programs being
- used by your network clients and transparent to your file server. If you do
- not want REFLECT to perform this switch over automatically, you can configure
- REFLECT to refrain from doing so and invoke the default DOS critical error
- detection mechanism instead.
-
- You should be aware that REFLECT is a SOFTWARE product. As such, REFLECT
- cannot fix the physical destruction of a disk drive. It is not the purpose of
- REFLECT to fix such problems. REFLECT will detect critical errors and then
- make an attempt to automatically continue the operation of your file server(s)
- by using alternate (working) file resources. If you should experience a
- critical failure on one of your disk drives, then you should follow the
- instructions of the disk drive manufacturer and have it repaired as soon as
- possible. By using REFLECT though, the effects of such a critical failure can
- be made far less bothersome.
-
- NOTE: YOU ARE ENTIRELY RESPONSIBLE FOR ANY AND
- ALL LICENSING DUTIES CREATED BY USING ANY
- PROCEDURE CONTAINED OR DESCRIBED IN THIS
- MANUAL. NO PROCEDURE CONTAINED OR DESCRIBED
- IN THIS MANUAL IS INTENDED TO BE CONSTRUED TO
- SUGGEST OR IMPLY THAT YOU SHOULD NOT
- COMPLETELY ABIDE BY THE COPYRIGHT LAWS OF THE
- UNITED STATES OR ANY OTHER APPLICABLE LAWS OF
- ANY OTHER COUNTRY.
-
-
-
- 1-4
-
-
- PLANNING FOR REFLECT
-
-
- This section contains information to guide you in the process of evaluating
- and applying your resources in the most effective manner for use by REFLECT.
- After you have studied this section of the User's Guide, you should have a
- good understanding of what REFLECT can do for you and what it cannot do.
-
- Before addressing the details of disk drive setup and configuration, there are
- a few terms that you should understand in order to make sense of the remainder
- of this User's Guide. The following four terms will be used many times
- throughout this manual and in the REFLECT configuration program: REFLECT.EXE:
-
- PRIMARY Drive
- MIRROR Drive
- MIRROR FROM Drive
- MIRROR TO Drive
-
- The terms PRIMARY and MIRROR FROM are used interchangeably throughout this
- document because they refer to the same concept. The terms MIRROR and
- MIRROR TO are also used interchangeably because they too refer to the same
- concept. Read further to discover the meaning associated with each term.
-
- When you perform work with an application, you will often save or store the
- product of your work on a disk drive. The identity of the disk drives which
- you normally use in the course of your daily work is important to the REFLECT
- mirroring concept and these drives are called: PRIMARY or MIRROR FROM drives.
- There is nothing terribly special about the terms PRIMARY or MIRROR FROM; they
- simply refer to the disk drives that you normally use to do your work.
-
- When you configure REFLECT mirroring relationships between different disk
- drives, you will be granting sole use of one or more disk drives to the
- REFLECT mirroring system.
-
- 1-5
-
-
-
- The purpose of this set of drives will be to allow REFLECT to maintain a
- mirror-image of your PRIMARY drives. The drives, upon which these mirror-
- images are maintained, are called: MIRROR or MIRROR-TO drives. Once
- established, you will not use these drives directly. MIRROR drives are for
- use solely by REFLECT, until such time as a critical error requires REFLECT
- to surrender one or more MIRROR drives to you.
-
- DISK DRIVE SETUP
-
-
- As previously indicated, REFLECT maintains a mirror-image of one or more disk
- drives on one or more mirror drives. However, the contents of your mirror
- drives must be initialized before REFLECT can use them so that the contents
- of your PRIMARY drives are reflected on your MIRROR drives. In order to
- accomplish this task, you will use the ZCOPY.EXE program which is included
- with the REFLECT software.
-
- In order to demonstrate the proper method for initializing a mirror drive or
- drives, please refer to the section of this document called: The ZCOPY Command
- for further instructions.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 1-6
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 2
-
- Preparing REFLECT Media
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 2-1
-
-
-
- MEDIA PREPARATION
-
-
- This section is intended to provide necessary information in order to
- demonstrate the process of preparing your MIRROR drives for use by REFLECT.
- As previously explained, REFLECT is effective only when your MIRROR drives
- have been properly prepared.
-
- Proper setup of a MIRROR drive is usually a one-time process. Once REFLECT is
- in full operation, it will maintain the MIRROR drives by making certain that
- changes to your PRIMARY drives are always exactly reflected on your MIRROR
- drives. However, it is necessary to setup your MIRROR drive(s) prior to
- allowing REFLECT to begin operations. This preparation is not difficult and
- requires the execution of one or more invocations of the ZCOPY command that
- is included on your program diskette.
-
- If you are using REFLECT to mirror one drive in your file server to a second
- drive in the same file server, then you might follow a procedure such as:
-
- 1. Assuming that your PRIMARY disk drive is [ C ]
- and your MIRROR disk drive is [ D ],
-
- 2. You would enter the following command:
-
- ZCOPY C:\ D:\ /S /E /C
-
- This will cause the entire logical contents of drive [ C ] to be duplicated
- onto drive [ D ].
-
- If you are attempting to establish server-to-server mirroring from your DOS
- workstations, then you will first need to establish workstation connections
- to the drive(s) on the other server(s) that you intend to MIRROR-TO. The next
- example will address this situation by making the following assumptions:
-
-
-
-
- 2-3
-
-
-
- 1. You wish to mirror drive [ C ] of your file server
- to another drive (named: REMOTE_DRIVE) on
- a different file server called: REMOTE_SERVER.
-
- In order to accomplish this, you would follow these procedures:
-
- 1. From your DOS workstation, you will first need
- to attach to the remote drive on the server
- named: REMOTE_SERVER. In order to do this,
- you might use the following command:
-
- NET USE D: \\REMOTE_SERVER\REMOTE_DRIVE PASSWORD
- NET USE C: \\MYSERVER\MYDISK PASSWORD
-
- 2. Now that you have access to the remote drive
- for use as a MIRROR drive, you would enter
- the following command:
-
- ZCOPY C:\ D:\ /S /E /C
-
- This will cause the entire logical contents of drive [ C ] on your file server
- (named: MYSERVER) to be duplicated on the REMOTE_DRIVE of the server called:
- REMOTE_SERVER. Once the ZCOPY command has completed, you can begin to use
- REFLECT in order to maintain the contents of your file server's drive [ C ].
- This example assumes that you will be using a PCLAN or compatible file server.
- If you were using NetWare* file servers, you would use a procedure similar
- to:
-
- 1. MAP C:=MYSERVER/SYS:USER/MY_DIR
- 2. MAP D:=REMOTE_SERVER/SYS:USER/MY_DIR
-
- The NetWare system requires you to use the MAP command as opposed to the
- NET USE command which is commonly seen in DOS-based file server environments.
-
-
-
-
-
-
-
-
- 2-4
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 3
-
- Installing REFLECT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 3-1
-
-
-
-
- INSTALLATION
-
-
- This section will guide you through the REFLECT installation process. It is
- only natural that you are probably very anxious to get REFLECT (and any other
- accompanying software) installed and operational as soon as possible and you
- may not be inclined to wander through the various sections of this (or any
- other) User's Guide in order to learn some of the finer points of mirroring
- disk drives.
-
- If you read no other section of this manual, then please read this section at
- the very least. At a minimum, follow these steps:
-
- 1. Place the REFLECT product disk into drive [ A ]
- of your PC.
-
- 2. Enter the following command:
-
- A:INSTALL (Press ENTER or RETURN key)
-
- 3. The install program will ask some questions
- regarding the placement of files which are
- included on your program diskette.
-
- 4. When the installation process has completed,
- you will need to decide which drives will be
- used as PRIMARY drives and which drives
- will be used as MIRROR drives. If you are
- unsure as to the meaning of these terms, then
- please refer to the section of this manual
- called: Planning For REFLECT.
-
- 5. When you know which drives will be PRIMARY
- drives and which drives will be used as
- MIRROR drives, you will need to use the
- REFLECT.EXE utility in order to configure and
- save this information. This information may be
- different for each client on your network.
- REFLECT allows each network client to have
-
-
- 3-3
-
-
-
- their own individual mirroring configuration.
-
- 6. When you have completed the REFLECT
- configuration, you are then ready to start using
- REFLECT. Please refer to the section of this
- manual called: Loading REFLECT.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 3-4
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 4
-
-
- Loading REFLECT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 4-1
-
-
-
-
- LOADING REFLECT
-
-
- Normally, the INSTALL program will be able to cause the loading of the
- REFLECTW or REFLECTB program to occur at the proper time. However, if you
- will be using REFLECT in a network environment, there are some additional
- rules which may apply to your installation that could require you to change
- the loading order of REFLECTW or REFLECTB.
-
- NOTE: REFLECTW.EXE will allow the mirroring of a maximum of 50 file handles
- simultaneously. If this limit is not enough for your PC, then you will need
- to substitute the REFLECTB.EXE program for REFLECTW.EXE.
-
-
- If you are using REFLECT to mirror drives which reside on one or more file
- servers, then the proper loading order for the REFLECT software is as follows:
-
- 1. Your network shell or redirector software.
- 2. REFLECTW or REFLECTB.
-
- If you are using REFLECT in order to mirror one or more drives on your PC,
- then you should use the following loading order for the software:
-
- 1. Load MS-DOS.
- 2. LOAD REFLECTW or REFLECTB.
- 3. Load the applications that you normally use.
-
- If you intend to use Microsoft Windows on your machine, then the REFLECT
- software must be loaded prior to loading the Windows environment.
-
-
-
-
-
-
-
-
- 4-3
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 5
-
-
- Configuring REFLECT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 5-1
-
-
-
- CONFIGURING REFLECT
-
-
- After you have installed the REFLECTW or REFLECTB TSR, you will need to
- complete the process of configuration. Configuration involves establishing
- two basic sets of information. They are:
-
- 1. Definition of your drive mirroring relationships.
-
- 2. Definition of any RESERVED NAMES which may
- be necessary or desirable for your file server
- environment.
-
- The REFLECT.EXE program exists for this purpose. It is not possible to
- execute the REFLECT.EXE program unless and until either the REFLECTW or
- REFLECTB TSR has been loaded into memory. You may execute the REFLECT.EXE
- program at any time after the REFLECTW or REFLECTB TSR has been loaded in
- order to enter or change any configuration details that you desire.
-
- The REFLECT configuration utility contains two sections. They are the
- main-menu section and the RESERVED NAMES section. Before proceeding with the
- execution of REFLECT.EXE, please take a moment and examine the following
- descriptions of the function keys that you will be using with the REFLECT.EXE
- program.
-
- ESC The ESC key is used to back-out of an operation.
- This means that pressing the ESC key will cause
- program execution to back-out to the previous
- screen or section. Pressing this key in the initial
- REFLECT.EXE main menu screen will cause
- REFLECT.EXE to exit to DOS.
-
- F1 This key is always used as the HELP key. The
- HELP available to you is context-sensitive,
- meaning that the HELP screens that you will see
- depend upon the function that you are trying to
- perform.
-
-
- 5-3
-
-
-
- F2 When this key is used from the main-menu
- screen, the REFLECT utility will attempt to save
- your configuration information, including any
- RESERVED NAMES, in your pre-defined
- configuration file.
-
- This key is not available in the RESERVED NAMES section of the REFLECT.EXE
- utility.
-
- F3 When this key is pressed, while the main-menu
- screen is being displayed, it will cause REFLECT
- to exit to DOS.
-
- If this key is pressed while the RESERVED NAMES screen is being displayed, it
- will cause the REFLECT program to return to the main-menu screen section.
-
- F4 When this key is pressed, while the main-menu
- screen is being displayed, you will be allowed to
- configure a drive mirroring relationship. This key
- is the MIRROR key.
-
- When this key is pressed, while the RESERVED NAMES screen is being displayed,
- you will be allowed to enter a new RESERVED NAME that will NOT be mirrored.
-
- F5 When this key is pressed, while the main-menu
- screen is being displayed, you will be allowed to
- UNMIRROR a PRIMARY drive. This can be used
- to suspend the mirroring relationship between a
- PRIMARY and MIRROR drive.
-
- When this key is pressed, while the RESERVED NAMES screen is being displayed,
- you will be allowed to remove one of the existing reserved names from the
- RESERVED NAMES list.
-
- F6 This key is only available in the main-menu
- section of the REFLECT utility. By pressing this
- key, you will enter the RESERVED NAMES
- section of the REFLECT utility.
-
-
-
- 5-4
-
-
- Please do not hesitate to use the HELP key should you become confused or
- uncertain as to the effects of information that you are about to enter via
- the REFLECT program.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 5-5
-
-
-
- CONFIGURATION CAVEATS
-
-
- The configuration rules under which REFLECT operates allow you to establish a
- relatively broad range of mirroring relationships. However, there are some
- circumstances under which the REFLECT configuration program will reject a
- proposed mirroring relationship. This section of the User's Guide will
- attempt to explain these forbidden relationship parameters so that they
- present no surprise for you.
-
- When you configure a mirroring relationship between two drives, you are type
- casting both drives. For instance, if you used drive C: as a primary drive,
- then that drive can never take on any other role in any other mirroring
- relationship. In the same way, a drive which is configured as a mirror drive
- can never be used as a primary drive in another mirroring relationship.
-
- You need not worry about accidentally breaking these rules because the
- REFLECT.EXE program contains logic to make certain that no such attempt on
- your part will ever be accepted. Some examples of this now follow.
-
- If you attempt to specify a drive as a primary or mirror-from drive, when
- that drive has already been defined as a mirror or mirror-to drive, you will
- see the following error displayed:
-
- ( GRAPHIC NOT INCLUDED IN TEXT MODE )
-
- 5-6
-
-
-
- You will notice that the REFLECT program does not allow the establishment of
- any relationship that would cause any disk drive to assume a multiple
- personality. In a similar manner, if you attempted to specify a drive for
- use as a mirror or mirror-to drive, when that particular drive had already
- been defined as a primary or mirror-from drive, then you would see the
- following error displayed:
-
- ( GRAPHIC NOT INCLUDED IN TEXT MODE)
-
- There is one additional configuration rule which you should remember.
- Mirroring relationships should be established between disk drives that are
- physically distinct entities. If this is not always possible for your
- particular situation then you should make certain that the logical drives
- which you define in your mirroring relationships at least reside in
- separate disk partitions.
-
- When modifying your CONFIG.SYS file, it will be necessary for you to make
- certain that the system-wide maximum file handle parameter is increased to a
- number that will allow REFLECT to have enough available file handles to
- insure that all necessary files can be mirrored. If your CONFIG.SYS file
- does not contain a statement such as:
-
- FILES = <some value>
-
- then you will need to add the following statement:
-
- FILES = 100
-
-
-
-
- 5-7
-
-
-
- If your CONFIG.SYS file already contains a statement such as:
-
- FILES=<some value>
-
- then you should modify this statement so that you will have a doubling of the
- maximum number of available file handles available to MS-DOS. Further, you
- should also make similar changes to the FILE HANDLES= statement in your
- SHELL.CFG (or NET.CFG) file for each DOS / NetWare workstation.
-
- You may need to insert a larger value if REFLECTB.EXE is loaded rather than
- REFLECTW.EXE.
-
- NOTE: If you find it necessary to change your CONFIG.SYS file, then you will
- need to re-boot your PC before attempting to use REFLECTW.EXE or REFLECTB.EXE.
-
-
-
- USING REFLECT WITH TAPE BACKUP PRODUCTS
-
-
- Prior to executing any type of tape backup software, it will be necessary for
- you to disable the REFLECT mirroring software. The manner in which many tape
- backup products work make this procedure necessary.
-
- The easiest way to accomplish this is to define a REFLECT configuration file
- for a phantom user.
-
- This particular REFLECT configuration file will specify no drives as being
- subject to mirroring. Here are steps which you can follow in order to
- establish a phantom user configuration that can be invoked prior to running
- your tape backup software:
-
- 1. When you are ready to run your tape backup
-
-
- 5-8
-
-
-
- software, enter the following commands:
-
- SET NOCFG=C:\PHANTOM.CFG
- REFLECT
-
- Now make certain that all drives are
- UNMIRRORED, use the F2 key to SAVE this
- configuration, and then exit to DOS. Now
- change the NOCFG environment variable back
- to what it was before you defined it to be
- PHANTOM.CFG. After doing this, you will
- execute the following command:
-
- REFLECTW (or REFLECTB)
-
- This will not allow the REFLECTW (or REFLECTB) TSR to load again, but it will
- restore the configuration that you were using prior to defining the
- PHANTOM.CFG file. You now have a null configuration file which can be
- invoked prior to executing your tape backup software.
-
- 2. When it comes time to run your tape backup
- software, you will enter the following:
-
- SET NOCFG=C:\PHANTOM.CFG
- REFLECTW (or REFLECTB)
- (Run your tape backup)
- SET NOCFG=<prior configuration file definition>
- REFLECTW (or REFLECTB)
-
- Now your server will have its normal REFLECT configuration restored.
-
-
- REMEMBER: Always disable the REFLECT mirroring software prior to running
- your tape backup software.
-
-
-
-
-
-
-
-
-
- 5-9
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 6
-
-
- The Fault-Finder Software Support Facility
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6-1
-
-
-
- ABOUT FAULT-FINDER
-
-
- Fault-Finder is a software support facility which has been integrated into the
- REFLECT software package. This software option provides a ready-made software
- support mechanism.
-
- One of the reasons for the continued widespread popularity of the MS-DOS
- operating environment is the availability of many thousands upon thousands of
- different application programs to fill the computing needs of millions of
- personal computer users throughout the world. Although Microsoft, the
- publisher of MS-DOS, has endeavored to establish recommended programming
- standards (rules) for DOS-compatible programs, there are still many available
- that attempt to work their own special brand of magic by means that are not
- entirely "clean" under all circumstances.
-
- For this reason, you may find, from time to time, an application which
- attempts to perform its work in a fashion that is not easily mirrored by the
- REFLECT product. This does not mean that you cannot use the REFLECT facility
- effectively with such an application, but it may mean that you need to tune
- the REFLECT environment in order to take such applications into account during
- its mirroring operations.
-
- In order to assist you in this effort and to allow delivery of the fastest
- and the most effective software support possible, the Fault-Finder feature
- has been integrated into the REFLECT product.
-
-
-
-
-
-
-
-
-
-
-
- 6-3
-
-
-
- WHEN TO USE FAULT-FINDER
-
-
- The vast majority of people who use REFLECT will never need to avail
- themselves of the Fault-Finder support facility. For those tiny few that do
- experience some form of difficulty in mirroring operations with a given
- application program, the Fault-Finder facility exists in order to collect a
- certain type and amount of information that will aid our software support
- technicians in locating the source of your difficulty and in providing a swift
- and accurate solution for you.
-
- Once you have activated Fault-Finder, you don't need to do anything else; just
- run your problem application as you normally would. When your problem
- appears, the Fault-Finder facility will capture the proper information needed
- to analyze the problem and will place this information into a special disk
- file.
-
- The decision of whether or not to use Fault-Finder is up to you, the customer.
- If you experience a problem in mirroring operations that you do not experience
- when REFLECTW is not loaded into your machine, then this is usually a good
- indication that a Fault-Finder session may help to solve your difficulty.
-
- If you call for technical support, you will often be asked to use the
- Fault-Finder facility in order to create a recording of the events which
- caused your difficulty. Once this information is in the hands of our support
- personnel, problem resolution usually follows in a very short time.
-
-
-
-
-
-
-
-
-
-
-
- 6-4
-
-
-
- HOW TO INVOKE FAULT-FINDER
-
-
- The Fault-Finder facility is invoked from the REFLECTW (or REFLECTB) command
- line as one or more special options. Normally, REFLECTW is invoked in the
- following manner:
-
- REFLECTW
-
- Simple enough, right ? If REFLECTW is invoked in this fashion, then the
- Fault-Finder facility is not activated and any memory which it might otherwise
- require is returned to the system memory pool for use by other applications.
- To invoke REFLECTW and activate the Fault-Finder facility at the same time,
- you would enter a command line such as:
-
- REFLECTW /L=C:\MARY\FALTFIND.LOG
-
- Notice that the ( /L ) option causes the Fault-Finder facility to become
- activated, but you must also provide a fully qualified drive, path, and
- filename for the Fault-Finder capture file. This file will not be mirrored
- even if you specify an output drive that is normally mirrored. The result
- of this command line will cause a file named: FALTFIND.LOG to be created on
- the drive and in the directory which is named on the command line.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6-5
-
-
-
- HARD TO DUPLICATE ERRORS
-
-
- If you used the example command line for REFLECTW, then the capture file
- ( FALTFIND.LOG ) will be allowed to grow to whatever size is necessary until
- you have caused your problem to occur. However, at times there are problems
- which are very difficult to recreate because they rely upon external factors
- and situations (such as in a network environment) that are not easily
- duplicated and can make the problem appear to be random in nature.
-
- In such situations, it can take a very long time to recreate the exact
- conditions which caused your difficulty to appear. It could also make your
- Fault-Finder capture file grow to a very large size. With this in mind, an
- additional option for the Fault-Finder facility has been created which allows
- you to limit the size of the Fault-Finder capture file.
-
- You are strongly urged to avail yourself of this option whenever you deem it
- necessary to invoke Fault-Finder. It prevents your disk drive from becoming
- needlessly filled while still allowing capture information to be collected on
- a continuing basis until such time as your problem occurs. To limit the
- size of the capture file, you would invoke Fault-Finder in the following
- manner:
-
- REFLECTW /L=C:\FALTFIND.LOG,S=50
-
- The ( ,S=50 ) portion of the command line causes the size of the capture file
- (FALTFIND.LOG) to be limited to 50K bytes. This does not mean that
- Fault-Finder will deactivate itself once your capture file reaches this size
- limit. It only means that the capture information will roll-over to the start
- of the file after the first 50K bytes have been written. You may specify a
- capture file limit in the range of 1 to 999K bytes. If you wish to use a
- capture file larger than 999K bytes, then you will have to invoke Fault-Finder
- without the ( ,S= ) parameter and use an unlimited capture file.
-
-
-
-
- 6-6
-
-
-
- There is one additional option that can be specified with Fault-Finder. The
- /X option can be used in order to capture additional types of diagnostic
- information. For example:
-
- REFLECTW /X /L=C:\FALTFIND.LOG
-
- Please note that using the /X option will attach a much greater speed penalty
- to your PC. Before using the /X option, it is a good idea to consult with our
- software support personnel.
-
- NOTE: There are no imbedded spaces in the portion of the example command
- lines that contain the ( /L and ,S ) Fault-Finder options.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6-7
-
-
-
- WHAT TO DO WITH THE CAPTURE FILE
-
-
- After you encounter your problem, you will probably want to restart your PC
- so that the Fault-Finder option is no longer enabled. You do not need to
- worry about whether or not the Fault-Finder capture file has been properly
- closed. You may rest assured that it has. Now that you have a completed
- capture file, you will need to do one of the following:
-
- 1. You may place the file onto a diskette and mail
- it to us along with an explanation of your
- difficulty.
-
- 2. You may upload the capture file to our BBS and
- then leave a message for the BBS SYSOP which
- explains the nature of your problem. Be sure
- that you leave your name, telephone number,
- and (very important) the name of the file that
- you have uploaded.
-
- One of our software support technicians will examine your problem and the
- capture file and will contact you regarding its solution. That's really all
- there is to using Fault-Finder.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 6-8
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 7
-
- The Smooth-Sail Facility
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 7-1
-
-
- ABOUT SMOOTH-SAIL
-
-
- Smooth-Sail is a name given to the REFLECT capability which allows automatic
- continuous file service in times of file system tragedy. Although the
- Smooth-Sail feature can be disabled by using the /D command line option, we
- do not think that you will want to do this for your PC unless you have
- unusual circumstances which dictate otherwise.
-
- Although we certainly hope that you will never need the capabilities which
- are offered by the Smooth-Sail feature, we also know that disk drives and
- file servers are built by fallible human beings and, therefore, they will
- fail sooner or later. Since this fact cannot be avoided, it is always best
- to plan for this event and to be ready for it.
-
- When you experience a primary file system failure, and you have not disabled
- the Smooth-Sail feature, the REFLECT system will automatically detect this
- event and will perform an automatic switch over of all of those logical drives
- that belong to the failed disk volume.
-
- For instance, if your primary logical drives C:, D:, and E: were all mapped
- to the same logical disk volume, then a failure by that volume would cause
- all three primary logical drives to be switched (to their mirror equivalents)
- at the same time. If your PC references any opened files on any failed
- volume, a mirror-equivalent of the failed file will automatically be
- substituted.
-
- This substitution will be transparent to your network O/S and transparent to
- the applications executing in your machine. You are informed of the failure
- by way of a small message. This message will appear the upper right corner
- of your console and will remain there for as long as you allow it to remain.
- If you have not configured a maximum time for the display of this message,
- then you will have to invoke a command called: OKOKOK.EXE in order to remove
- the message.
-
-
-
- 7-3
-
-
-
- RIGGING FOR SMOOTH-Sailing
-
-
- In order to activate the Smooth-Sail feature in REFLECTW or REFLECTB, it is
- usually only necessary to load either REFLECTW or REFLECTB. If you have a
- configuration file which has previously defined drive mirroring relationships,
- then the automatic volume mapping feature will be activated.
-
- Please note that this requires a previously defined configuration file.
-
- The practical effect of this statement is that, after the initial
- configuration of REFLECTW (or REFLECTB), you will have to either re-boot
- your PC or reload REFLECTW in order to activate the volume mapping capability
- of Smooth-Sail. This fact is very important as you should not attempt to use
- REFLECT immediately after your initial configuration without either
- re-booting your PC or attempting to reload REFLECTW or REFLECTB.
-
- If you attempt to reload REFLECTW, it will not really allow itself to be
- loaded a second time. However, it will force REFLECTW to reload all of the
- configuration details and to perform a re-mapping of all of the volumes that
- correspond to the logical drives which are contained in the configuration
- file.
-
- These details will be written into the previously loaded instance of REFLECTW
- (or REFLECTB) and you will be able to safely assume that the Smooth-Sail
- feature in REFLECT is completely armed.
-
-
-
-
-
-
-
-
-
-
- 7-4
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 8
-
- Global Command Line Options
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 8-1
-
-
-
- GLOBAL COMMAND LINE OPTIONS
-
-
-
- REFLECT contains several command line options which act in a global fashion.
- These options allow you to cause actions that will affect operations on all
- logical disk drives that are subject to the mirroring actions of REFLECT.
- Here is a list of the command line options which are currently recognized
- by the REFLECTW or REFLECTB programs:
-
- /D Disables the Smooth-Sail feature.
-
- /F Used with misbehaved applications which
- attempt to steal the critical error interrupt from
- REFLECT.
-
- /L Used to invoke the Fault-Finder facility.
-
- /X Used with the /L option.
-
- /T Used to specify the maximum amount of time
- that the critical drive switch over message
- is allowed to be displayed on your PC console.
-
- For instance: REFLECTW /T=30
- will allow a critical error message (if one is
- ever generated) to be displayed on your
- console for a maximum of 30 seconds.
- The allowable range for this option is:
- /T=0 to /T=999.
-
-
-
-
-
-
-
-
-
-
-
-
-
- 8-3
-
-
-
- /R This command line option is used to specify the
- maximum number of times that a failed file service
- request (which has resulted in a critical drive or
- server failure) will be retried before REFLECT
- considers the failure to be a true drive or file server
- failure. The allowable range for this option is:
-
- /R=00 to /R=99
-
- If you do not use the /R option, then the default is
- zero retries.
-
-
- /P This command line option is used on POWERLan
- workstations to ensure compatibility with the
- REFLECT Smooth-Sail mechanism. This option
- MUST be used on POWERLan workstations.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 8-4
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 9
-
- The ZCOPY Command
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 9-1
-
- USING THE ZCOPY COMMAND
-
-
- The process of initializing a MIRROR disk drive or an entire mirror file
- server can involve the copying of a considerable number of files and
- directories. This operation can also be required when attempting to bring a
- failed file server or disk drive back on-line.
-
- When you are faced with this requirement, you may be tempted to use the DOS
- XCOPY command. If you are attempting to establish the mirroring of one of
- your disk drives to another disk drive on you PC, then this method will
- normally work in a satisfactory manner. However, if you have ever attempted
- to copy the entire contents of one network drive to another network drive
- which exists on a different file server (using the XCOPY command), then you
- are probably already aware that the XCOPY command has some difficulty in
- accomplishing this operation.
-
- In order to solve this problem and to allow you to easily copy an entire
- network drive to a different network drive on another file server, we have
- included an additional utility with the REFLECT package called: ZCOPY.
-
- ZCOPY works in a manner, and produces results, which closely resemble the DOS
- XCOPY command. ZCOPY can be used to copy:
-
- 1. Local drives to other local drives.
- 2. Local drives to network drives.
- 3. Network drives to local drives.
- 4. Network drives to other network drives.
-
- ZCOPY contains a variety of options which allow you to copy entire disk drives
- or selected portions of a directory structure. During the copying operation,
- you may encounter files which cannot be copied because they are already in
- use by a different application. ZCOPY also contains capabilities which will
- allow special RETRY passes of the ZCOPY command in order to copy such files at
- a later time.
-
-
- 9-3
-
-
-
- The command line options available with ZCOPY are:
-
- /S Causes all subdirectories to be copied which exist under the
- source directory named on the ZCOPY command line.
-
- /E Causes empty subdirectories to be copied as well as those
- subdirectories which do contain files.
-
- /C Use of this option causes the ZCOPY program to continue
- copying files, even after it encounters an error while copying
- a file which is already in-use.
-
- /A Use of this option causes ZCOPY to attempt to copy only those
- files which have their archive flag SET. After copying, the
- archive flag on the source file is NOT reset. If this option is used
- with the /M option, then the /A option will take precedence.
-
- /M This option causes the same effect as the /A option, with one
- notable exception. After the copying operation has completed,
- the archive flag (on the source file) will be reset.
-
- /L=<filename> This option allows you to specify a file which will
- contain the names of all of the source and destination
- filenames which ZCOPY was unable to copy. You must
- specify a complete drive, path, and filename for use by
- the ZCOPY program. If this file exists it will be
- overwritten.
-
- /R=<filename> This command line option is used for special RETRY
- passes of the ZCOPY program. If you have used the /L
- option on a previous invocation of the ZCOPY program,
- and some files were not copied (for whatever reason),
- then you can invoke ZCOPY a second time by using this
- option and cause ZCOPY to make a second attempt to
- copy those files which it was unable to copy on a
- previous execution.
-
- /X=<filename> This command line option allows you to specify the
- name of an EXCLUSION file. An exclusion file contains
- drive, path, and filename specifications for files which
- should be excluded from the copying process. An
- exclusion file list may be used in conjunction with one
- or more of the command line exclusion qualifiers.
- Please refer to the ZCOPY EXCLUSION FILE section of
- this chapter which describes the format and use of the
- exclusion file.
-
-
-
-
-
-
-
-
- 9-4
-
-
- /I=<filename> This command line option allows you to specify the
- name of an INCLUSION file. An inclusion file contains
- drive, path, and filename specifications for files which
- should be included in the copying process. All files
- encountered in the source directory path specification
- which do not meet one or more of the inclusion file
- specifications are excluded from the copying process.
- This command line option may not be used with the /X
- option. Please see the ZCOPY EXCLUSION FILE section
- of this manual for details on the format of the inclusion
- file. Both formats are the same. When you use this
- option, only those files which match one or more of the
- inclusion file specifications will be copied.
-
- ZCOPY also allows the use of different file exclusion qualifiers on the ZCOPY
- command line. These qualifiers are used in order to specify attributes of
- files which should not be copied. The file exclusion qualifiers operate
- independently of the exclusion file option (/X). The following file
- exclusion qualifiers are recognized by ZCOPY:
-
- -S Use of this qualifier on the ZCOPY command line
- means that files which possess the SYSTEM
- attribute should be excluded from copying.
-
- -H Use of this qualifier on the ZCOPY command line
- means that files which possess the HIDDEN
- attribute should be excluded from copying.
-
- -W Use of this qualifier on the ZCOPY command line
- means that files which are marked as READ-ONLY
- (write protected) should be excluded from copying.
-
- -A Use of this qualifier on the ZCOPY command line
- means that files which have their ARCHIVE attribute
- set should be excluded from copying.
-
- NOTE: If you use the -A qualifier on the same command line with either the
- /A or /W options, then NO files will be copied by ZCOPY.
-
- File exclusion qualifiers can be entered separately or grouped together on the
- ZCOPY command line. Please note that entering exclusion qualifiers separately
- can produce different copying results as opposed to entering the same
- qualifiers together.
-
-
-
- 9-5
-
-
-
- The following example is intended to demonstrate the different results which
- can be obtained by grouping exclusion qualifiers.
-
- If you wished to exclude all SYSTEM files from the ZCOPY process, you could
- enter a command line such as:
-
- ZCOPY A: B: /S /E /C -S
-
- If you wished to exclude all HIDDEN files from the ZCOPY process, you could
- enter a command line such as:
-
- ZCOPY A: B: /S /E /C -H
-
- If you wish to exclude all files which possessed BOTH SYSTEM and HIDDEN
- attributes, then you could enter a command line such as:
-
- ZCOPY A: B: /S /E /C -SH
-
- Notice that the grouping of the S and H qualifiers, in the third example
- command line, produces a double condition which must be met by any file before
- it will be excluded from copying. You may, of course, enter a group of
- qualifiers using as many as four different exclusion attribute qualifier
- letters.
-
- Compare the foregoing results to the following command line:
-
- ZCOPY A: B: /S /E /C -S -H
-
- This command line will exclude any file which has its SYSTEM OR HIDDEN
- attribute set. Matching either attribute condition qualifies a file for
- exclusion from copying.
-
-
-
-
-
-
-
-
- 9-6
-
-
-
- ZCOPY EXCLUSION FILE
-
-
- The ZCOPY exclusion file contains one or more ASCII strings which act as
- exclusion qualifying definitions during the ZCOPY process. You can form a
- wide variety of copying exclusions by entering only a few exclusion
- definitions. This section is intended to provide information on the format
- and use of the ZCOPY exclusion file. The exclusions which are defined in the
- ZCOPY exclusion file operate independently of (that is, in addition to) any
- exclusion qualifiers which are entered on the ZCOPY command line.
-
- The best way to show the use of the exclusion file contents is by example.
- Therefore, this section will provide several examples which will demonstrate
- the possible uses of the exclusion file.
-
- EXCLUSION EXAMPLE # 1
-
- This example is a simple one, in that it will assume that you wish to exclude
- only one very specific file from the copying process. We will assume that
- this file is located on a network drive (mapped to drive F:) and that it has
- the following definition:
-
- F:\SYSTEM\NET$OS.EXE
-
- If you wished only to exclude this single file, then you would need to create
- a file (using whatever means are most appropriate for you) that contained a
- single line. That single line would be:
-
- F:\SYSTEM\NET$OS.EXE
-
- We will assume that the file you created for this definition is: EXCLUDE.CFG
- on drive C. You may, of course, use whatever name you wish. In order to
- cause ZCOPY to recognize this definition and exclude this single file from the
- copying process, you would enter a command line such as:
-
- ZCOPY F:\ G:\ /S /E /C /X=C:\EXCLUDE.CFG
-
-
-
-
- 9-7
-
-
-
- In copying files from drive F to drive G, ZCOPY will exclude the file named:
- NET$OS.EXE, if and only if, it happens to be found in the SYSTEM directory on
- drive F. If a file of the same name is located in a different directory of
- drive F, then ZCOPY will attempt to copy it.
-
- The next example will demonstrate methods which can be used to avoid copying
- a file with a specific name, regardless of which drive, or within which path,
- the file happens to exist.
-
- EXCLUSION EXAMPLE # 2
-
- As in example #1, we will assume that you do not want to copy the file named:
- NET$OS.EXE, regardless of where it happens to be encountered by ZCOPY. In
- order to accomplish this, you will use wildcard characters in your exclusion
- file. These wildcard characters operate in a manner which is slightly
- different than what you might expect, so please read the examples carefully
- so that you will know what to expect from ZCOPY. This example will assume
- that you want your exclusion definition to apply on all logical drives and in
- all directories. In this case, you would enter the following line in your
- exclusion file:
-
- *:\*\NET$OS.EXE
-
- Notice that the drive letter is replaced by an asterisk (*) character. The
- path definition is also replaced by a single asterisk character. ZCOPY will
- interpret the first asterisk character to mean that the exclusion definition
- should apply to all logical drives. The single asterisk which occurs in the
- directory field will cause ZCOPY to apply the exclusion definition against ALL
- directories, without regard to the number of directory levels encountered on
- the source disk drive specification. In other words, the \*\ path exclusion
- definition will match the directory:
-
- \ROOT\
-
- and will also match the directory:
-
- \ROOT\DIR1\DIR2\DIR3\DIR4\
-
- 9-8
-
-
-
- In this manner, the position in the directory tree where the file NET$OS.EXE
- is encountered is unimportant.
-
- There is a more simple manner for accomplishing the same result with ZCOPY.
- You could also use a shorthand definition in your exclusion file such as:
-
- NET$OS.EXE
-
- Since ZCOPY would not encounter a drive letter definition, it will
- automatically assume that the exclusion filename should be applied to any and
- all source drives in any and all directories. In a similar manner, it is
- possible to exclude all files from the ZCOPY process by entering a
- specification in your exclusion file such as:
-
- *.*
-
- Since all files will match this specification, then all files will be
- excluded from the copying process. It would be a relatively useless effort
- to enter the ZCOPY command in order to copy nothing. This particular example
- is offered only to demonstrate the importance of thoughtful consideration in
- the formation of any general exclusion definitions that you may wish to use.
- If you were to enter such an exclusion definition, then the only result you
- would achieve is a listing of every file on the source drive and path which
- exists. This happens because ZCOPY normally displays the names of all files
- which are excluded due to either an exclusion file definition or a command
- line exclusion qualifier. If you wish to suppress this display, then you
- must use the -D command line parameter.
-
-
- EXCLUSION EXAMPLE # 3
-
- This example will assume that you wish to use the ZCOPY command as a
- supplement to your conventional tape backup procedures. In so doing, this
- example will further assume that you do not wish to copy certain backup
- (.BAK) or temporary (.TMP) files which may be created by some of the
- application programs which are used by your clients. Since these files could
- exist in many different directories, you could enter two exclusion definitions
- in your exclusion file such as:
-
- 9-9
-
-
-
- *.BAK
- *.TMP
-
- These two definitions will cause all files with either of these extensions
- (regardless of where they are encountered) to be excluded from the copying
- process. Also, this example will assume that you only wish to copy those
- files which have undergone change since your last ZCOPY operation. To meet
- these requirements you could enter a command line such as:
-
- ZCOPY F: G: /S /E /C /A /X=C:\EXCLUDE.CFG
-
- This will cause ZCOPY to automatically exclude all files which do not have
- their ARCHIVE flag set as well as any files which match one or more of the
- definitions in your exclusion file.
-
- NOTE: When specifying an exclusion file on the ZCOPY command line, you must
- provide a fully qualified drive, path, and name for the exclusion file.
-
-
- Use of the /E command line option will, if necessary, cause the directory
- structure of your source definition to be automatically created on your
- specified output drive and path, without regard to the operation of any
- exclusion qualifiers which you use and without regard to the contents of an
- exclusion file.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 9-10
-
-
-
- INITIALIZING DISK DRIVES WITH ZCOPY
-
-
- In order to use the ZCOPY command to copy the entire contents of one disk
- drive to another disk drive, you might enter a command line such as:
-
- ZCOPY C:\ D:\ /S /E /C /L=A:\ZCOPY.LOG
-
- The /S option will automatically cause the destination drive (D:) to contain
- the entire directory-tree structure which exists on drive (C:). If the
- directories do not already exist on drive (D:), then they will be created.
- Use of the /E option will also cause empty directories on the source drive
- to be duplicated on the destination drive.
-
- Although the ZCOPY command can be used to copy the entire contents of one
- logical drive to another logical drive, it can also be used to copy only a
- portion of the directory structure of a drive to another drive. For example:
-
- ZCOPY C:\USERS D:\USERS /S /E /C /L=C:\ZCOPY.LOG
-
- would cause all files and directories listed under the \USERS directory of
- drive C: to be copied to drive D:.
-
- NOTICE
- Do not use the shorthand "dot" or "dot-dot" directory representations in
- either the source or destination directory specifications. Ex: C:..\DIR1
- is NOT a legal source or destination directory specification.
-
-
-
-
-
-
-
-
-
-
-
- 9-11
-
-
-
- INCREMENTAL COPYING WITH ZCOPY
-
-
-
- In instances where you wish to copy only those files which have undergone
- change since the last backup operation, you may want to avail yourself of the
- /A or /M command line option which is available with ZCOPY. Use of either of
- these two command line options causes ZCOPY to examine each file in the
- specified copying path. If ZCOPY finds that the archive flag for a given file
- is set, then ZCOPY will attempt to perform the copy. If ZCOPY finds that the
- archive flag for a given file is not set, then ZCOPY will bypass the file and
- proceed to the next available file.
-
- The /M option causes the archive flag (on the source files) to be reset after
- the copying operation has completed. The /A option causes the archive flag
- (on the source files) to be left undisturbed after the copying operation has
- completed. If you should use both the /A and /M options in the same command
- line, then the /A option will take precedence. This means that the archive
- flag (on the source files) will not be disturbed after the copying operation
- has completed.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 9-12
-
-
-
- RETRY PASSES WITH ZCOPY
-
-
-
- When copying files from one active file server to a different file server, you
- may encounter files which cannot be copied because they are currently in use
- by other applications running on the network. This does not mean that you
- will need to perform the entire copying operation from scratch. ZCOPY
- contains a command line parameter (/R) which causes it to operate in a RETRY
- mode. This mode does not require you to enter source and destination copying
- specifications because ZCOPY will draw this information from a RETRY file.
-
- A RETRY file is simply a log file which was created on a previous invocation
- of the ZCOPY command by using the /L option. When you invoke ZCOPY with the
- /R option, it is usually a good idea to also use the /L option as well in
- order to create a second log file to contain the names of any files which
- could not be copied during the retry pass of the ZCOPY program.
-
- An example command line would be:
-
- ZCOPY /R=C:\ZCOPY.LOG /L=C:\RETRY.LOG /S /E
-
- Please note that the use of the /L option is an implied use of the /C option
- as well.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 9-13
-
-
-
- LOGGING ZCOPY ERRORS
-
-
- In order to record the names of those files which ZCOPY is not able to process
- in a given invocation, you will use the /L option. This option is used as a
- prerequisite for the /R option (retry).
-
- In order to use the /L option, you would enter a command line such as:
-
- ZCOPY C:\ D:\ /S /E /L=A:\ZCOPY.LOG
-
- If there are any files which cannot be processed by ZCOPY, both the source and
- destination specifications are written in the ZCOPY.LOG file which is named in
- the command line. If you choose to invoke ZCOPY in a retry-mode, then you
- will use this ZCOPY.LOG file with the /R option. For instance, you could
- invoke a subsequent retry pass of ZCOPY by using the following command line:
-
- ZCOPY /R=A:\ZCOPY.LOG /L=A:\RETRY.LOG
-
- Please note that a retry pass of the ZCOPY command does not require the
- normal source and destination directory specifications. These are provided
- automatically by the file which is used with the /R option.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 9-14
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Chapter 10
-
- Network Configurations For REFLECT
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 10-1
-
-
-
- USING REFLECT WITH DOS-BASED NETWORKS
-
-
- Establishing and maintaining DOS-based mirrored file servers is a fairly easy
- task with REFLECT. The actual list of general steps that you will follow in
- order to accomplish this is small. If you are attempting to mirror NetWare
- file servers (regardless of the version of NetWare you are using), please
- refer to the section of this chapter called: Using REFLECT With NetWare
- Networks.
-
- Here is a list of the general steps which you will follow in order to
- establish a mirrored file server on your DOS-based file server network:
-
- 1. Configure your mirror file server. This means
- that you must load the software which is
- required in order to cause a second PC to
- act as a file server.
-
- 2. Initialize the mirror file server. This means
- that you will need to use one or more
- invocations of the ZCOPY command.
-
- 3. Setup of the network attachment / usage
- controls for your network clients and the loading
- / configuration of the REFLECTW (or
- REFLECTB) TSR for each of your network
- clients.
-
- The first step involves setup of the hardware and software for the DOS-based
- network O/S of your choice so that you will have a second file server. Since
- all file servers have a logical network name, you will need to give your
- second file server a name which is not used by any other file server on
- your network. The package which contains your network O/S software should
- contain sufficient details regarding this step of the setup procedure.
-
-
-
-
-
- 10-3
-
-
-
- INITIALIZING THE SECOND DOS-BASED FILE SERVER
-
-
- This section will offer an explanation of the steps involved in initializing
- your second DOS-based file server in order to prepare it for inter-server
- mirroring on your network. These procedures can also be invoked if you merely
- wish to establish mirroring between drives on a single file server. However,
- if your DOS-based file server supports the SMB (Server Message Block)
- protocol, then you should consider using the ALTEREGO product for this
- purpose. ALTEREGO is designed with very specific support for such DOS-based
- servers.
-
- From a network client station, you should issue the appropriate commands in
- order to establish two logical drive connections with your file servers. The
- first logical drive connection should attach to a resource on your primary
- file server which gives you access the to root portion of the disk drive which
- you have made available for sharing from your primary server. Please note
- that this does not necessarily mean that you must attach to the root
- directory of one or more of the disk drives on your primary file server; only
- the base-directory of that portion of the disk drive which you wish to have
- mirrored by REFLECT.
-
- The second logical drive connection which you will need to establish will
- allow you to access the same root directory of the drive on the second (or
- mirror) file server. The result of the initialization procedure will cause
- this drive to have the same directory structure and files as are contained on
- the primary file server resource.
-
- To illustrate this portion of the initialization procedure, the following
- example is offered:
-
- This example will assume that you have established two DOS-based file servers
- named: PRIMARY and MIRROR. Each of these file servers will offer a resource
- to the network called: DISK_ROOT and will require the use of a
-
-
- 10-4
-
-
-
- password called: PASSWORD in order to gain unrestricted access to these
- resource names. Under these circumstances, you might use the following
- commands:
-
- NET USE D: \\PRIMARY\DISK_ROOT PASSWORD
- NET USE E: \\MIRROR\DISK_ROOT PASSWORD
-
- You will now have two logical drives [ D: and E: ] that you can use for the
- remainder of this step in the initialization procedure.
-
- Now you will need to load the REFLECTW.EXE TSR into your net workstation.
- Once loaded, you will use the REFLECT.EXE utility in order to mirror drive D:
- to drive E:. Please note that, in the process of establishing this mirroring
- relationship, you should answer Y to both questions concerning the directory-
- auto-make and the mirror-auto-delete options. Once you have established this
- mirroring relationship, exit from the REFLECT utility by pressing the F3 key.
-
- You should now be ready to perform the actual initialization of the drive on
- the second file server. In order to accomplish this, you would enter the
- following command:
-
- ZCOPY D:\ E:\ /S /E /C
-
- This will cause all of the directories and files available through your
- logical drive D connection to be duplicated (along with their attributes of
- course) on logical drive E. When the ZCOPY command has completed, drive E:
- will now be in such a state that REFLECT will be able to maintain it for you
- as files are changed, created, deleted, copied, or renamed on drive D:. You
- are now ready for the third phase of the setup procedure which involves the
- modification of connection procedures that are invoked by your network
- clients.
-
-
-
-
-
-
-
-
-
- 10-5
-
-
-
- CLIENT SETUP FOR DOS-BASED FILE SERVERS
-
-
- The third phase of establishing mirrored DOS-based file servers involves
- modification of the connection procedures used by your network clients. Since
- mirroring is only effective to the extent that all of your network clients
- make use of it, you will need to make certain changes in the workstation
- attachments that are normally made by your network clients. Briefly, these
- changes will involve:
-
- 1. For each NET USE which is made by your
- network clients, an additional NET USE will
- be required in order to make a connection
- available for mirroring logical drives that are
- assigned to your primary file server.
-
- 2. Establishing one or more NOCFG=
- definitions for the REFLECT configuration
- file(s) that are to be used by your network
- clients in order to store their mirroring
- relationship parameters.
-
- 3. Force loading of either the REFLECTW or
- REFLECTB TSR in order to activate the
- mirroring action from each network client.
-
- These procedures can be the same or different depending upon exactly how you
- distribute and use the file resources on your DOS-based server network. The
- example offered in this section will assume that you wish to establish
- mirrored file servers; each with one disk drive (although multiple drives
- are certainly possible). This example will use the same names for the file
- servers that were used in the previous example. A typical workstation
- configuration before modification for REFLECT usage might be as follows:
-
- In the CONFIG.SYS file of the network client station, you might have a
- statement such as:
-
-
-
-
-
-
-
-
- 10-6
-
-
-
-
- FILES=20
-
- This statement will have to be modified so that the maximum number of
- allowable file handles is doubled. Therefore, you would change this
- statement to:
-
- FILES=40
-
- Before modification for REFLECT, the network client station might use the
- following attachment procedure:
-
- NET USE D: \\PRIMARY\APPS PASSWORD
- NET USE E: \\ PRIMARY\ UTILITY PASSWORD
-
- To modify this procedure for REFLECT, you would change it in the following
- manner:
-
- NET USE D: \\PRIMARY\APPS PASSWORD
- NET USE E: \\PRIMARY\UTILITY PASSWORD
- NET USE F: \\MIRROR\APPS PASSWORD
- NET USE G: \\MIRROR\UTILITY PASSWORD
- SET NOCFG=<drive:\path\name of configuration file>
- REFLECTW (or REFLECTB if required)
-
- If this is the first time that the network client station invoked this
- procedure, then you would load the REFLECT.EXE utility and mirror drives D:
- to F: and E: to G:. You would then use the F2 key to save this configuration
- and exit to DOS. The network client can then proceed to use all of the
- application programs which are normally used by this client station.
-
- Since you saved this mirroring configuration information in the configuration
- file defined for this network client, it will not be necessary to re-execute
- the REFLECT.EXE utility each time this network client goes through its startup
- procedure.
-
-
-
-
-
-
-
-
-
-
-
- 10-7
-
-
-
- USING REFLECT WITH NetWare NETWORKS
-
-
- Using REFLECT to mirror NetWare file servers requires some additional
- procedures for proper setup and operation. There are similarities for setup
- of REFLECT within DOS-based file server networks, but there are some
- NetWare-specific procedures that you will need to follow for proper operation
- with NetWare servers.
-
- The same three basic setup procedures, for NetWare operation, are required as
- were used for DOS-based server networks. The next few sections of this manual
- will deal with the procedures which you will need to follow in order to
- achieve proper operation of REFLECT on NetWare networks. As previously
- mentioned, the three basic steps which you must take are:
-
- 1. Configuration of your mirror server.
- 2. Initialization of your mirror server.
- 3. Setup of the network attachment and usage
- controls for your network clients as well as the
- loading and configuration of the REFLECTW
- (or REFLECTB) TSR for each of your network
- clients.
-
- Configuration of your mirror file server involves following the procedures
- which are published by Novell(R) in order to load the NetWare O/S on a
- computerso that it can operate as your second (or mirror) file server. The
- documentation provided with your NetWare O/S should be consulted for this
- operation.
-
-
-
-
-
-
-
-
-
-
-
- 10-8
-
-
-
- INITIALIZING THE SECOND NetWare FILE SERVER
-
-
- This section will provide an overview of the steps which you should undertake
- in order to properly initialize the second NetWare file server which you will
- be using as a mirror file server on your network.
-
- Once you have established your second NetWare file server, you will perform
- the following steps:
-
- 1. Each of the network clients which have user
- names, passwords, and any other accounting
- information or access privilege parameters,
- must also be reflected on your second
- NetWare file server. Use the Novell-provided
- utilities in order to accomplish this.
-
- 2. From a NetWare workstation, you will
- LOGIN to your primary NetWare file server
- as the SUPERVISOR user and you will
- also ATTACH to the second NetWare file
- server; also as the SUPERVISOR user.
-
- 3. You must now use the Novell MAP command in
- order to establish one logical drive connection
- for each of the NetWare file servers. Assuming
- that each server had only one disk drive and
- NetWare volume (SYS), you would need access
- only to the root directory of the SYS volume.
- If you have multiple volumes on each NetWare
- server, then you must establish logical drive
- connections to the root directory of each volume
- on both primary and mirror file servers.
-
- 4. You will now set the NOCFG= environment
- variable to point to your desired REFLECT
- configuration file. Once done, you may now
- load REFLECTW.EXE.
-
- 5. Now load REFLECT.EXE and establish
-
- 10-9
-
-
-
- mirroring relationships between the primary
- and mirror logical drives.
-
- 6. Use the ZCOPY utility to copy the files and
- directories from your primary volume(s) to
- the mirror volume(s) on the mirror server.
-
-
- When you have copied all of the files and directories (that you wish to have
- mirrored), you are ready to proceed with modification of the individual user
- LOGIN scripts.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 10-10
-
-
-
- CLIENT SETUP FOR NetWare NETWORKS
-
-
- Now that you have a second NetWare file server which contains all of the
- required files and directories that you wish to have mirrored, you must make
- adjustments to the LOGIN scripts which are invoked by your NetWare clients.
- Generally, the steps which you will follow are:
-
- 1. Modification of LOGIN scripts for each user on
- your primary NetWare server so that they will
- automatically ATTACH to the second (or mirror)
- NetWare server.
-
- 2. Establishment of LOGIN scripts for each user
- on the second NetWare server which will
- automatically ATTACH to your primary NetWare
- file server and will MAP the same volumes as
- are MAPped by the LOGIN scripts contained on
- the primary NetWare server.
-
- 3. MAP logical drive letters so that each user will
- have one set of drive letters which are mapped
- to the primary NetWare file server and an
- equivalent set of drive letters (different letters of
- course) that will be mapped to resources on the
- mirror NetWare server.
-
- 4. SETting the NOCFG= environment variable in
- the LOGIN script.
-
- 5. Force loading of either the REFLECTW or
- REFLECTB TSR into the NetWare workstation
- after all of the drive MAPpings have been
- performed.
-
- By following these procedures for each of your NetWare clients, you can
- achieve an environment that will cause the loss of a disk drive (or even an
- entire file server) to be far less bothersome than if your DOS NetWare clients
- were operating in a non-mirrored state.
-
-
-
-
- 10-11
-
-
-
- NetWare Installation Supplement
-
-
- This section of the REFLECT User's Guide is intended to present specific
- examples of the setup procedures which are used in NetWare environments.
- Although the overall objectives of the procedures which are described will be
- the same as in MS-DOS based file server environments, NetWare installations
- will experience some differences in setup procedures for inter-server
- mirroring.
-
- Previous sections of this document have already addressed the process of
- initializing the directories and files on the mirror file server, so those
- procedures will not be reviewed here.
-
- For purposes of this section and the examples contained herein, the following
- names will be used to refer to two NetWare file servers:
-
- 1. FS_1 Will be the name of the primary NetWare
- file server.
-
- 2. FS_2 Will be the name of the mirror NetWare
- file server.
-
- In order to ensure that your network clients will always be using your NetWare
- file servers properly, it will be necessary for you, as the network
- administrator, to make certain adjustments to each of the LOGIN scripts
- contained on the primary and mirror NetWare file servers. The overall goal
- of these LOGIN script changes will be to establish a set of mirror-drive
- definitions which will be used by the REFLECT system in order to maintain
- mirror images of each file modified by your network clients. As you will
- discover, this process is crucial to the operation of the REFLECT SMOOTH-SAIL
- continuous operation capability.
-
- LOGIN SCRIPT EXAMPLE # 1
-
- This example will assume the existence of two NetWare file servers. (FS_1
- and FS_2) Although REFLECT does not require that the disk drives on each
- file server be of the same
-
- 10-13
-
-
-
- same type or size, we will assume that the available space on file server
- (FS_2) is at least as large as the available space on file server (FS_1).
-
- In this example, we will further assume that FS_1 will always be designated
- as the primary file server and FS_2 will always be designated as the mirror
- file server. Later examples involving the use of the Server Load Sharing
- characteristic of REFLECT will present further information on establishing
- LOGIN scripts to allow both file servers to assume dual identities.
-
- For an example network client, who shall be called: BOB, a typical LOGIN
- script for the FS_1 server would look like:
-
- MAP G:=FS_1/SYS:USERS/BOB
- MAP S1:=FS_1/SYS:PUBLIC
- MAP S2:=FS_1/SYS:MAIL
- MAP S3:=FS_1/SYS:BORLANDC/BIN
- MAP S4:=FS_1/SYS:PUBLIC/DOS_500
- ATTACH FS_2/BOB PASSWORD
- MAP H:=FS_2/SYS:USERS/BOB
- MAP I:=FS_2/SYS:PUBLIC
- MAP K:=FS_2/SYS:MAIL
- MAP P:=FS_2/SYS:DRIVE_N
- MAP Q:=FS_2/SYS:PUBLIC/DOS_500
- MAP R:=FS_2/SYS:BORLANDC/BIN
- MAP N:=FS_1/SYS:DRIVE_N
- DOS SET BHELP="W:\\PUBLIC\\DOS_500\\BRIEF\\HELP"
- DOS SET BPATH="W:\\PUBLIC\\DOS_500\\BRIEF\\MACROS"
- DOS SET NOCFG="G:\\USERS\\BOB\\REFLECT.CFG"
- COMSPEC=C:\COMMAND.COM
- DRIVE G:
- DOS SET PROMPT="$P$G"
- FIRE PHASERS 4 TIMES
- EXIT "USERS.BAT"
-
- The file: USERS.BAT might contain the following:
-
- REFLECTW /T=5 /R=05
- BOBSMENU
-
- Many installations prefer that the NetWare LOGIN script result in the
- automatic loading of their favorite application or menu system. For this
-
-
- 10-14
-
-
-
- reason, the example ends processing of the LOGIN script by loading the REFLECT
- TSR from a suitable .BAT file.
-
- In the foregoing example LOGIN script, you will notice that each of the
- network drives mapped to FS_1 contains another logical drive which is mapped
- to an equivalent resource (and directory path) on server: FS_2. This is very
- important in order to achieve the maximum utility and protection from the
- REFLECT utility.
-
- The REFLECT configuration file for this user (BOB) should be established with
- the following mirroring relationships:
-
- DRIVE IS MIRRORED ON DRIVE
-
- G H
- N P
- W Q
- X R
- Y K
- Z I
-
- These drive mirroring relationships assume that the following drive mappings
- were achieved via the foregoing LOGIN script:
-
- G: FS_1/SYS:USERS/BOB
- N: FS_1/SYS:DRIVE_N
- W: FS_1/SYS:PUBLIC/DOS_500
- X: FS_1/SYS:BORLANDC/BIN
- Y: FS_1/SYS:MAIL
- Z: FS_1/SYS:PUBLIC
-
- You should always check the results of any LOGIN script which you devise in
- order to make certain that you choose the correct primary and mirror logical
- drive letters for any REFLECT configuration. Failure to do so can result in
- mirroring operations being performed against improper directory structures on
- the mirror drive(s).
-
- For the network client named BOB, the LOGIN process would consist of entering
- the following command line:
-
- LOGIN FS_1/BOB
-
- 10-15
-
-
-
- In this example, we make the assumption that the network client (BOB)
- maintains the same access password on both file servers. However, this is not
- necessary. In some instances, it may actually be better for overall
- operations if each network client maintains only their password on the
- primary server: FS_1. As an administrator, you can periodically change each
- client's password on the mirror server: FS_2. Keep in mind that (given the
- foregoing LOGIN script) you will also have to change the password in each
- LOGIN script which ATTACHes the client to the mirror file server during LOGIN
- script execution. In this manner, the maintenance of separate passwords can
- act to ensure that a network client will not casually LOGIN to the wrong file
- server as their primary or preferred file server.
-
- As you will see in the next example, there are times when the establishment of
- different passwords is not practical or desirable.
-
- LOGIN SCRIPT EXAMPLE # 2
-
- One of the most bothersome problems faced by network administrators is
- maintaining network and file server performance at levels acceptable to their
- clientele. By adding REFLECT mirroring to your network, you need not
- necessarily decrease the performance of your network file servers. By
- following the steps described in this example, you can configure your REFLECT
- network clients in such a way that they may achieve an increase in file
- service performance, as measured at their workstations. There are, of course
- many qualifying factors that will determine what, if any, performance increase
- will be experienced by your network clients.
-
- As in the previous example, we will be assuming the existence of two file
- servers (FS_1 and FS_2). However, this example will assign "dual identities"
- to each file server. In other words, FS_1 and FS_2 will each be acting in the
- role of primary and mirror file server at the same time.
-
- The previous example presented a typical LOGIN script for a single network
- client named: BOB. This example will assume the existence of a second network
- client named: MARY. In forming the LOGIN scripts for each network client, it
- will be necessary to establish different LOGIN scripts for each server. The
-
- 10-16
-
-
-
- overall goal of establishing these different LOGIN scripts will be to
- establish FS_1 as the primary file server for the client named: BOB and FS_2
- as the primary file server for the client named: MARY. In so doing, FS_2 will
- become the mirror file server for the client named: BOB and FS_1 will become
- the mirror file server for the client named: MARY. Why would we want to do
- this ? By splitting the primary and mirror server definitions between network
- clients, you can achieve an overall loading factor (for each file server)
- which is less than in the normal situation where FS_1 is made the primary
- file server for all network clients. Since all necessary file activity,
- including file locking, is performed on both file servers, and since file
- modifications on one file server are also automatically performed on the
- mirror file server, the actual results obtained from establishing servers
- with dual identities will be the same as in EXAMPLE # 1.
-
- For the client named: BOB we will establish the following LOGIN script on
- FS_1:
-
- MAP G:=FS_1/SYS:USERS/BOB
- MAP S1:=FS_1/SYS:PUBLIC
- MAP S2:=FS_1/SYS:MAIL
- MAP S3:=FS_1/SYS:BORLANDC/BIN
- MAP S4:=FS_1/SYS:PUBLIC/DOS_500
- ATTACH FS_2/BOB PASSWORD
- MAP H:=FS_2/SYS:USERS/BOB
- MAP I:=FS_2/SYS:PUBLIC
- MAP K:=FS_2/SYS:MAIL
- MAP P:=FS_2/SYS:DRIVE_N
- MAP Q:=FS_2/SYS:PUBLIC/DOS_500
- MAP R:=FS_2/SYS:BORLANDC/BIN
- MAP N:=FS_1/SYS:DRIVE_N
- DOS SET BHELP="W:\\PUBLIC\\DOS_500\\BRIEF\\HELP"
- DOS SET BPATH="W:\\PUBLIC\\DOS_500\\BRIEF\\MACROS"
- DOS SET NOCFG="G:\\USERS\\BOB\\REFLECT.CFG"
- COMSPEC=C:\COMMAND.COM
- DRIVE G:
- DOS SET PROMPT="$P$G"
- FIRE PHASERS 4 TIMES
- EXIT "USERS.BAT"
-
- On file server: FS_2, the following LOGIN script will be established for the
- client: BOB:
-
- ATTACH FS_1/BOB PASSWORD
-
-
-
-
- 10-17
-
-
-
-
- ATTACH FS_1/BOB PASSWORD
- MAP G:=FS_1/SYS:USERS/BOB
- MAP S1:=FS_1/SYS:PUBLIC
- MAP S2:=FS_1/SYS:MAIL
- MAP S3:=FS_1/SYS:BORLANDC/BIN
- MAP S4:=FS_1/SYS:PUBLIC/DOS_500
- MAP H:=FS_2/SYS:USERS/BOB
- MAP I:=FS_2/SYS:PUBLIC
- MAP K:=FS_2/SYS:MAIL
- MAP P:=FS_2/SYS:DRIVE_N
- MAP Q:=FS_2/SYS:PUBLIC/DOS_500
- MAP R:=FS_2/SYS:BORLANDC/BIN
- MAP N:=FS_1/SYS:DRIVE_N
- DOS SET BHELP="W:\\PUBLIC\\DOS_500\\BRIEF\\HELP"
- DOS SET BPATH="W:\\PUBLIC\\DOS_500\\BRIEF\\MACROS"
- DOS SET NOCFG="G:\\USERS\\BOB\\REFLECT.CFG"
- COMSPEC=C:\COMMAND.COM
- DRIVE G:
- DOS SET PROMPT="$P$G"
- FIRE PHASERS 4 TIMES
- EXIT "USERS.BAT"
-
- If BOB should LOGIN to the file server FS_2, instead of FS_1, this LOGIN
- script will perform the necessary drive mappings to ensure that the primary
- file server for BOB will be FS_1. For the network client named: MARY, the
- following LOGIN script would be established on FS_1:
-
- ATTACH FS_2/MARY PASSWORD
- MAP G:=FS_2/SYS:USERS/MARY
- MAP S1:=FS_2/SYS:PUBLIC
- MAP S2:=FS_2/SYS:MAIL
- MAP S3:=FS_2/SYS:BORLANDC/BIN
- MAP S4:=FS_2/SYS:PUBLIC/DOS_500
- MAP H:=FS_1/SYS:USERS/MARY
- MAP I:=FS_1/SYS:PUBLIC
- MAP K:=FS_1/SYS:MAIL
- MAP P:=FS_1/SYS:DRIVE_N
- MAP Q:=FS_1/SYS:PUBLIC/DOS_500
- MAP R:=FS_1/SYS:BORLANDC/BIN
- MAP N:=FS_2/SYS:DRIVE_N
- DOS SET BHELP="W:\\PUBLIC\\DOS_500\\BRIEF\\HELP"
- DOS SET BPATH="W:\\PUBLIC\\DOS_500\\BRIEF\\MACROS"
- DOS SET NOCFG="G:\\USERS\\MARY\\REFLECT.CFG"
- COMSPEC=C:\COMMAND.COM
- DRIVE G:
- DOS SET PROMPT="$P$G"
- FIRE PHASERS 4 TIMES
- EXIT "MARY.BAT"
-
-
-
-
- 10-18
-
-
-
- On server: FS_2, the following LOGIN script will be established for the
- client named: MARY
-
- MAP G:=FS_2/SYS:USERS/MARY
- MAP S1:=FS_2/SYS:PUBLIC
- MAP S2:=FS_2/SYS:MAIL
- MAP S3:=FS_2/SYS:BORLANDC/BIN
- MAP S4:=FS_2/SYS:PUBLIC/DOS_500
- ATTACH FS_1/MARY PASSWORD
- MAP H:=FS_1/SYS:USERS/MARY
- MAP I:=FS_1/SYS:PUBLIC
- MAP K:=FS_1/SYS:MAIL
- MAP P:=FS_1/SYS:DRIVE_N
- MAP Q:=FS_1/SYS:PUBLIC/DOS_500
- MAP R:=FS_1/SYS:BORLANDC/BIN
- MAP N:=FS_2/SYS:DRIVE_N
- DOS SET BHELP="W:\\PUBLIC\\DOS_500\\BRIEF\\HELP"
- DOS SET BPATH="W:\\PUBLIC\\DOS_500\\BRIEF\\MACROS"
- DOS SET NOCFG="G:\\USERS\\MARY\\REFLECT.CFG"
- COMSPEC=C:\COMMAND.COM
- DRIVE G:
- DOS SET PROMPT="$P$G"
- FIRE PHASERS 4 TIMES
- EXIT "MARY.BAT"
-
- You should note that half of the network clients will recognize FS_1 as their
- primary file server, while the other half of the network clients will
- recognize FS_2 as their primary file server.
-
- The REFLECT configurations used by both network clients will be the same as
- presented in EXAMPLE # 1, assuming of course that the sample drive mappings
- presented in EXAMPLE # 1 are the same as obtained on your network.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 10-19
-
-