Figure 33. The local client mounts over a high-level directory

There is a ªdownstreamº principle for mounting that is similar to the ªdownstreamº rule for exporting. Whenever you mount a remote ®le system over a local directory, all of the objects ªdownstreamº of the mount point are ªcovered upº. This renders them inaccessible to the local namespace. If you mount at a high level of a local directory tree, then you will cause most of your objects to become inaccessible.

Figure 34. The local client mounts over the /2 directory

If you mount remote ®le systems over a lower point of the local directory tree, then you will not ªcover upº as many of your objects, if any.

This ªcoveringº aspect of mounting causes whatever local data beneath the newly mounted ®le system to become ªinvisibleº to the user. They will not appear in the integrated ®le system namespace. ªCoveredº ®le systems are inaccessible until the mounted ®le system is unmounted. The client can dynamicallyunmount any ®le system that has previously been mounted. This action allows for the ªuncoveringº of a ®le system, directory, or object that has been mounted over. It also breaks the connection with the server (and therefore access) for that particular mounted ®le system.

Why Should I Mount File Systems?

Mounting ®le systems gives a client system the ability to work with ®les and other objects that were previously only available on the server. This is helpful in dispersing needed or important information to a wide variety of users and systems. Mounting also makes for less repetition when starting up a network. Each client can mount a startup con®guration directly from the server that can be re-con®gured spontaneously, if necessary.

Mounting gives the remote client ease and freedom in deciding how to structure directories. File systems can be dynamically mounted and unmounted at will. Furthermore, users can specify parameters and options on the mount command that give clients and servers the most resources and highest security possible.

Chapter 5. Client Mounting of File Systems 41

Page 59
Image 59
IBM AS/400E manual Why Should I Mount File Systems?, Local client mounts over a high-level directory

AS/400E specifications

The IBM AS/400E, now more commonly known as IBM i, is a robust and versatile midrange server that has been designed to provide a comprehensive computing solution for businesses of all sizes. First introduced in the late 1980s, the AS/400 series has undergone multiple enhancements and rebranding, with the AS/400E being one of the notable iterations. This powerful platform is closely associated with IBM's commitment to reliability, scalability, and integrated business solutions.

One of the main features of the AS/400E is its highly integrated architecture that combines hardware and software into a cohesive system. This integration allows for seamless operations, reducing the complexity typically associated with managing disparate systems. The system is powered by IBM's proprietary OS/400 operating system, which has evolved into IBM i, featuring advanced capabilities like object-oriented programming, integrated database management, and security features that are essential for enterprise environments.

A key characteristic of the AS/400E is its robust database support, primarily through the use of DB2 for i. This integrated database management system enables efficient data handling and retrieval, facilitating real-time business analytics and reporting. Furthermore, the platform supports a variety of programming languages, including RPG, COBOL, and Java, making it flexible for developers who require diverse tools for application development.

The AS/400E is also known for its exceptional reliability and uptime, making it a preferred choice for critical business applications in industries such as finance, healthcare, and manufacturing. This reliability is backed by advanced error detection and correction mechanisms, as well as redundancy features that help prevent data loss and minimize downtime.

In terms of scalability, the AS/400E can effortlessly expand to accommodate growing business demands. Organizations can increase processing power by adding more resources without significant disruption. This scalability, combined with the system’s built-in virtualization capabilities, allows businesses to optimize resource usage and streamline operations.

Security is another defining feature of the AS/400E. The platform incorporates various layers of security measures, including user authentication, encryption, and comprehensive auditing capabilities, ensuring that sensitive business data is protected against unauthorized access.

Overall, the IBM AS/400E remains a powerful tool in the enterprise computing landscape, providing businesses with an integrated, reliable, and secure solution for their technological needs. Its enduring popularity is a testament to its capability to evolve with changing business requirements while maintaining its core attributes of high performance and stability.