Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Introduction
Table 1-1: Comparative advantages of using a high availability solution
Chapter 2: High Level Design and Architecture
Table 2-1: Commonly used cluster software - by platform
Table 2-2: Eliminating single points of failure
Chapter 3: High Availability Cluster Implementation
Table 3-1: Application definition for IBM Tivoli Workload Scheduler1 (TWS1)
Table 3-2: Application definition for Tivoli Workstation Scheduler2 (TWS2)
Table 3-3: Application server definition for tws_svr1
Table 3-4: Application server definition for tws_svr2
Table 3-5: TCP/IP Network definition
Table 3-6: TCP/IP network interface plan for tivaix1
Table 3-7: TCP/IP network interface plan for tivaix2
Table 3-8: Point-to-point network definition
Table 3-9: Definitions for shared volume groups /file system (tiv_vg1)
Table 3-10: Definitions for shared volume groups /file system (tiv_vg2)
Table 3-11: Definition for resource group tws1_rg
Table 3-12: Definition for resource group tws1_rg2
Table 3-13: Definition for cluster event
Table 3-14: NIC IP addresses
Table 3-15: DNS entries required for the cluster
Table 3-16: Shared drive partition table
Chapter 4: IBM Tivoli Workload Scheduler Implementation in a Cluster
Table 4-1: Communication interfaces to configure for network net_ether_01
Table 4-2: Communication interfaces to configure for network tivaix1_tmssa2_01
Table 4-3: Resource group movement combinations to test
Table 4-4: Installation media directories used in our environment
Table 4-5: IBM Tivoli Workload Scheduler workstation definition
Table 4-6: IBM Tivoli Workload Scheduler workstation definition
Table 4-7: IBM Tivoli Workload Scheduler workstation definition
Table 4-8: IBM Tivoli Workload Scheduler workstation definition
Table 4-9: IBM Tivoli Workload Scheduler workstation definition
Table 4-10: Tivoli Token Service definition for first instance
Table 4-11: Tivoli Token Service definition for second instance
Table 4-12: Tivoli Netman Service definition for first instance
Table 4-13: Tivoli Netman Service definition for second instance
Table 4-14: Tivoli Workload Scheduler definition for first instance
Table 4-15: Tivoli Workload Scheduler definition for second instance
Table 4-16: Cluster group settings for first instance
Chapter 5: Implement IBM Tivoli Management Framework in a Cluster
Table 5-1: SSA connection addresses of SSA disks on tivaix1 and tivaix2
Table 5-2: Identify SSA physical disks on tivaix1 available for logical assignments
Table 5-3: Identify SSA physical disks on tivaix2 available for logical assignments
Table 5-4: SSA connection addresses of SSA disks on tivaix1 and tivaix2
Table 5-5: Summary analysis table of disks to use for new shared volume group
Appendix B: TMR Clustering for Tivoli Framework 3.7b on MSCS
Table B-1: Installation setup
< Day Day Up >
Previous page
Table of content
Next page
High Availability Scenarios With IBM Tivoli Workload Scheduler And IBM Tivoli Framework
ISBN: 0738498874
EAN: 2147483647
Year: 2003
Pages: 92
Authors:
IBM Redbooks
BUY ON AMAZON
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Managing IT Functions
Governance in IT Outsourcing Partnerships
Metrics and Models in Software Quality Engineering (2nd Edition)
Modeling Process
In-Process Metrics and Reports
How Do You Know Your Product Is Good Enough to Ship?
Measuring and Analyzing Customer Satisfaction
The Summarization Phase
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Exploring Chart Styles
Using Summation Functions
Computing Confidence Intervals
Shooting Boundary Value Problems
Calculating Future Value
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Organizational change
Leading change
Mergers and acquisitions
Cultural change
IT-based process change
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
3-D Layers from Photoshop Layers
Cause and Effect
Atmosphere, Film, and Noise Effects
Custom Scene Transitions
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Triggers
Indirect Privilege Escalation
Defeating Virtual Private Databases
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies