8.4.4 Client Registered on Multiple RIS Servers ... ............... 8–4
8.4.5 Client Not in RIS Database ... ... .............................. 8–5
8.5 RIS Server Response .... ............................................. 8–6
8.5.1 Servers Using the bootpd Daemon ............................ 8–6
8.5.2 Servers Using the joind Daemon .............................. 8–8
8.5.3 Loading an Incorrect Kernel File . ............................. 8–9
9 Dataless Management Services
9.1 Overview ... ... ......................................................... 9–1
9.2 DMS Benefits .......................................................... 9–2
9.3 Relationship Between DMS Servers and Clients ................ 9–2
9.3.1 DMS Server . .. ... ... .............................................. 9–2
9.3.2 Environment Portion of DMS Area ............................ 9–3
9.3.3 Client Portion of DMS Area .... ... ............................. 9–5
9.3.4 Characteristics of DMS Clients . .. ............................. 9–5
10 Preparing DMS Servers and Clients
10.1 Requirements for DMS Servers .. ... .. .............................. 10–1
10.2 Requirements for DMS Clients .... ... .............................. 10–2
10.3 Allocating Disk Partitions on the DMS Server .. ................. 10–3
10.4 Setting Up a Local Area Network (LAN) . ... .. ... ................. 10–3
10.5 Setting Up a Network File System . ... ............................. 10–3
10.6 Planning Disk Space for DMS ... ... ... ............................. 10–4
10.6.1 Disk Space Required for DMS Environments ............... 10–4
10.6.2 Estimating Disk Space for Clients ............................ 10–6
10.6.3 Considering Typesof Kernel Builds .... .. ... ... ............... 10–6
10.7 Installing the Operating System on the DMS Server . ... ... .. .. 10–7
10.8 Registering DMS Clients ............................................ 10–7
10.8.1 Obtaining DMS Client Information .... ... ... .. ............... 10–8
10.8.2 Registering Clients Host Names and IP Addresses . ... .. ... 10–8
10.9 Considering Security Issues .. ... ... .. ... ............................ 10–9
11 Setting Up a DMS Environment
11.1 Ensuring DMS Server and Client Compatibility ................ 11–1
11.2 Installing Software in a New DMS Environment ................ 11–2
11.3 Adding Software to an Existing DMS Environment ... ... .. ... .. 11–6
11.4 Configuring DMS Environments . .. ... ............................. 11–9
11.4.1 Customizing /etc/.proto..* Files .... ............................ 11–9
11.4.2 Configuring the DMS Environment . ... ... .. ... ............... 11–11
11.5 Installing WLS Support in DMS ... ... ............................. 11–12
Contents v