Chapter 5. Client Mounting of File Systems

39

What Is Mounting?

39

Why Should I Mount File Systems?

41

What File Systems Can I Mount?

42

Where Can I Mount File Systems?

42

Mount Points

45

How Do I Mount File Systems?

45

ADDMFS (Add Mounted File System) Command

45

RMVMFS (Remove Mounted File System) Command

48

DSPMFSINF (Display Mounted File System Information) Command . . . . 50

Chapter 6. Using the Network File System with AS/400 File Systems . . . 55

″Root″ File System (/)

55

Network File System Differences

56

Open Systems File System (QOpenSys)

56

Network File System Differences

56

Library File System (QSYS.LIB)

57

Network File System Differences

57

Document Library Services File System (QDLS)

60

Network File System Differences

60

Optical File System (QOPT)

61

Network File System Differences

61

User-De®ned File System (UDFS)

62

Network File System Differences

63

Administrators of UNIX Clients

63

Network File System Differences

63

Chapter 7. NFS Startup, Shutdown, and Recovery

65

Con®guring TCP/IP. . . . . . . . . . . . . . . . . . . . . . . 65

Implications of Improper Startup and Shutdown

66

Proper Startup Scenario

66

STRNFSSVR (Start Network File System Server) Command

67

Proper Shutdown Scenario

70

Shutdown Consideration

70

ENDNFSSVR (End Network File System Server) Command

70

Starting or stopping NFS from Operations Navigator

72

Locks and Recovery

74

Why Should I Lock a File?

74

How Do I Lock A File?

74

Stateless System Versus Stateful Operation

74

RLSIFSLCK (Release Integrated File System Locks) Command

75

Chapter 8. Integrated File System APIs and the Network File System . . . 77

Error Conditions

77

ESTALE Error Condition

77

EACCES Error Condition

77

API Considerations

77

User Datagram Protocol (UDP) Considerations

77

Client Timeout Solution

78

Network File System Differences

78

open(), create(), and mkdir() APIs

79

fcntl() API

79

Unchanged APIs

79

Chapter 9. Network File System Security Considerations

81

The Trusted Community

81

ivOS/400 Network File System Support V4R4

Page 6
Image 6
IBM AS/400E manual Client Mounting of File Systems, Using the Network File System with AS/400 File Systems

AS/400E specifications

The IBM AS/400E, now more commonly known as IBM i, is a robust and versatile midrange server that has been designed to provide a comprehensive computing solution for businesses of all sizes. First introduced in the late 1980s, the AS/400 series has undergone multiple enhancements and rebranding, with the AS/400E being one of the notable iterations. This powerful platform is closely associated with IBM's commitment to reliability, scalability, and integrated business solutions.

One of the main features of the AS/400E is its highly integrated architecture that combines hardware and software into a cohesive system. This integration allows for seamless operations, reducing the complexity typically associated with managing disparate systems. The system is powered by IBM's proprietary OS/400 operating system, which has evolved into IBM i, featuring advanced capabilities like object-oriented programming, integrated database management, and security features that are essential for enterprise environments.

A key characteristic of the AS/400E is its robust database support, primarily through the use of DB2 for i. This integrated database management system enables efficient data handling and retrieval, facilitating real-time business analytics and reporting. Furthermore, the platform supports a variety of programming languages, including RPG, COBOL, and Java, making it flexible for developers who require diverse tools for application development.

The AS/400E is also known for its exceptional reliability and uptime, making it a preferred choice for critical business applications in industries such as finance, healthcare, and manufacturing. This reliability is backed by advanced error detection and correction mechanisms, as well as redundancy features that help prevent data loss and minimize downtime.

In terms of scalability, the AS/400E can effortlessly expand to accommodate growing business demands. Organizations can increase processing power by adding more resources without significant disruption. This scalability, combined with the system’s built-in virtualization capabilities, allows businesses to optimize resource usage and streamline operations.

Security is another defining feature of the AS/400E. The platform incorporates various layers of security measures, including user authentication, encryption, and comprehensive auditing capabilities, ensuring that sensitive business data is protected against unauthorized access.

Overall, the IBM AS/400E remains a powerful tool in the enterprise computing landscape, providing businesses with an integrated, reliable, and secure solution for their technological needs. Its enduring popularity is a testament to its capability to evolve with changing business requirements while maintaining its core attributes of high performance and stability.