Flylib.com
List of Tables
Previous page
Table of content
Next page
< Day Day Up >
Chapter 1: Introduction
Table 1-1: Comparative advantages of using a high availability solution
Chapter 2: High Level Design and Architecture
Table 2-1: Commonly used cluster software - by platform
Table 2-2: Eliminating single points of failure
Chapter 3: High Availability Cluster Implementation
Table 3-1: Application definition for IBM Tivoli Workload Scheduler1 (TWS1)
Table 3-2: Application definition for Tivoli Workstation Scheduler2 (TWS2)
Table 3-3: Application server definition for tws_svr1
Table 3-4: Application server definition for tws_svr2
Table 3-5: TCP/IP Network definition
Table 3-6: TCP/IP network interface plan for tivaix1
Table 3-7: TCP/IP network interface plan for tivaix2
Table 3-8: Point-to-point network definition
Table 3-9: Definitions for shared volume groups /file system (tiv_vg1)
Table 3-10: Definitions for shared volume groups /file system (tiv_vg2)
Table 3-11: Definition for resource group tws1_rg
Table 3-12: Definition for resource group tws1_rg2
Table 3-13: Definition for cluster event
Table 3-14: NIC IP addresses
Table 3-15: DNS entries required for the cluster
Table 3-16: Shared drive partition table
Chapter 4: IBM Tivoli Workload Scheduler Implementation in a Cluster
Table 4-1: Communication interfaces to configure for network net_ether_01
Table 4-2: Communication interfaces to configure for network tivaix1_tmssa2_01
Table 4-3: Resource group movement combinations to test
Table 4-4: Installation media directories used in our environment
Table 4-5: IBM Tivoli Workload Scheduler workstation definition
Table 4-6: IBM Tivoli Workload Scheduler workstation definition
Table 4-7: IBM Tivoli Workload Scheduler workstation definition
Table 4-8: IBM Tivoli Workload Scheduler workstation definition
Table 4-9: IBM Tivoli Workload Scheduler workstation definition
Table 4-10: Tivoli Token Service definition for first instance
Table 4-11: Tivoli Token Service definition for second instance
Table 4-12: Tivoli Netman Service definition for first instance
Table 4-13: Tivoli Netman Service definition for second instance
Table 4-14: Tivoli Workload Scheduler definition for first instance
Table 4-15: Tivoli Workload Scheduler definition for second instance
Table 4-16: Cluster group settings for first instance
Chapter 5: Implement IBM Tivoli Management Framework in a Cluster
Table 5-1: SSA connection addresses of SSA disks on tivaix1 and tivaix2
Table 5-2: Identify SSA physical disks on tivaix1 available for logical assignments
Table 5-3: Identify SSA physical disks on tivaix2 available for logical assignments
Table 5-4: SSA connection addresses of SSA disks on tivaix1 and tivaix2
Table 5-5: Summary analysis table of disks to use for new shared volume group
Appendix B: TMR Clustering for Tivoli Framework 3.7b on MSCS
Table B-1: Installation setup
< Day Day Up >
Previous page
Table of content
Next page
High Availability Scenarios With IBM Tivoli Workload Scheduler And IBM Tivoli Framework
ISBN: 0738498874
EAN: 2147483647
Year: 2003
Pages: 92
Authors:
IBM Redbooks
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Designing Forms
Creating Shared Actions
Creating Web Agents Using Formulas and LotusScript
Creating Mail-Enabled Applications
Teamstudio Analyzer
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Telecommunications and Network Security
Security Architecture and Design
Business Continuity Planning and Disaster Recovery Planning
Appendix E The Information System Security Management Professional (ISSMP) Certification
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Crash Course in the Internet Protocol Suite
IDS and IPS Internals
Cisco Secure IDS
Security Business Issues
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Captology Looking Forward
Cultural Imperative: Global Trends in the 21st Century
From 2,000,000 B.C. to A.D.2000: The Roots and Routes of Culture
Culture and Religion
The Pacific Rim: The Fourth Cultural Ecology
Americanization versus Asianization
Epilogue After September 11
Understanding Digital Signal Processing (2nd Edition)
SIGNAL PROCESSING OPERATIONAL SYMBOLS
DFT MAGNITUDES
REFERENCES
REFERENCES
Section A.3. ARITHMETIC OPERATIONS OF COMPLEX NUMBERS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies