®le systems

61, 15, 55, 56, 57, 58, 59, 60, 61mdit

(continued)

 

 

 

 

root (/) ®le system

 

 

 

case-sensitivity

56

 

Network File System differences

55

read/write options

56

 

user-de®ned ®le system (UDFS)

 

auxiliary storage pools (ASPs)

63

case-sensitivity

63

 

Network File System differences

62

what you can export

 

27

 

what you can mount

 

45

 

where you can mount

42

 

FSS/400

 

 

 

 

introduction

3

 

 

 

description 3

G

GIDs de®nition 83 introduction 83

K

Kerberos authorization 83 de®nition 83 encryption 83

M

monitored locks de®nition 11

MOUNT command 46 CODEPAGE parameter

data ®le code page 46 path name code page 46

description 45 display 46

examples

47

 

 

graphical user interface (GUI) 47

MFS parameter

46

 

MNOTOVRDIR parameter 46

options 13

 

 

 

options list

46

 

 

OPTIONS parameter

46

purpose

45

 

 

restrictions

45

 

 

TYPE parameter

46

 

mount daemon (MNTD)

 

description

10

 

 

displaying

 

68, 71

 

order of shutdown 70

order of startup

68

 

mount points

 

 

 

 

description

45

 

 

mounting ®le systems

42, 43, 48

/etc/fstab ®le 40

 

accessibility

40

 

 

ADDMFS command

45

mounting ®le systems

40, 43, 48 (continued)

covered objects

40

 

 

de®nition

1

 

 

 

description

39

 

 

 

display 46, 49, 50

 

 

DSPMFSINF command

50

examples

47, 50, 53

 

®le systems

 

 

 

mounting over

42

 

mounting over a mount 43

where you can mount

42

general description

1

 

graphical user interface (GUI) 47 how do I mount ®le systems? 45 introduction 39

MOUNT command 45 mount point 2 mount points 45 process 45 QSTRVPPGM program 40 restrictions 45, 49 RMVMFS command

description 48 purpose 48

simple graphical representation 1 STATFS command 50

what ®le systems can I mount? Network File Systems 42 Novell NetWare ®le systems 42 user-de®ned ®le systems 42

what is mounting? 39 what you can mount 45

where can I mount ®le systems? 42 why should I mount ®le systems? 41

N

namespace

auxiliary storage pools (ASPs) 23

byte-range locks 74

 

concept

4

 

 

de®nition

4

 

 

exporting ®le systems

26, 28

rules for exporting

28

mounting ®le systems

41

overview

4

 

 

scenario

4

 

 

security considerations

81

trusted community

81

 

TULAB namespace

7, 23, 26, 28, 43, 85, 86

user-de®ned ®le systems (UDFSs) 23

Network File System

8, 9, 10, 11, 12, 13, 14, 65, 66,

67, 70, 74, 75, 81

 

 

APIs 77

application programming interfaces (APIs) 77 brief history 3

byte-range locks

how do I lock a ®le? 74 recovery 74 RLSIFSLCK command 75 statefulness 74

108OS/400 Network File System Support V4R4

Page 126
Image 126
IBM AS/400E manual Order of shutdown

AS/400E specifications

The IBM AS/400E, now more commonly known as IBM i, is a robust and versatile midrange server that has been designed to provide a comprehensive computing solution for businesses of all sizes. First introduced in the late 1980s, the AS/400 series has undergone multiple enhancements and rebranding, with the AS/400E being one of the notable iterations. This powerful platform is closely associated with IBM's commitment to reliability, scalability, and integrated business solutions.

One of the main features of the AS/400E is its highly integrated architecture that combines hardware and software into a cohesive system. This integration allows for seamless operations, reducing the complexity typically associated with managing disparate systems. The system is powered by IBM's proprietary OS/400 operating system, which has evolved into IBM i, featuring advanced capabilities like object-oriented programming, integrated database management, and security features that are essential for enterprise environments.

A key characteristic of the AS/400E is its robust database support, primarily through the use of DB2 for i. This integrated database management system enables efficient data handling and retrieval, facilitating real-time business analytics and reporting. Furthermore, the platform supports a variety of programming languages, including RPG, COBOL, and Java, making it flexible for developers who require diverse tools for application development.

The AS/400E is also known for its exceptional reliability and uptime, making it a preferred choice for critical business applications in industries such as finance, healthcare, and manufacturing. This reliability is backed by advanced error detection and correction mechanisms, as well as redundancy features that help prevent data loss and minimize downtime.

In terms of scalability, the AS/400E can effortlessly expand to accommodate growing business demands. Organizations can increase processing power by adding more resources without significant disruption. This scalability, combined with the system’s built-in virtualization capabilities, allows businesses to optimize resource usage and streamline operations.

Security is another defining feature of the AS/400E. The platform incorporates various layers of security measures, including user authentication, encryption, and comprehensive auditing capabilities, ensuring that sensitive business data is protected against unauthorized access.

Overall, the IBM AS/400E remains a powerful tool in the enterprise computing landscape, providing businesses with an integrated, reliable, and secure solution for their technological needs. Its enduring popularity is a testament to its capability to evolve with changing business requirements while maintaining its core attributes of high performance and stability.