If a client with a granted lock request should happen to fail, a speci®c set of operations will occur at startup time to recover the locks:

1.When the user restarts the NSM daemon on a system, the daemon will send a change of state RPC to other NSM daemons in the network. This message is transmitted only to the other NSM daemons that the failed system is aware of in the network.

2.After receiving a change of state from a remote system, the NSM uses RPC to communicate with the local NLM. The NSM informs the NLM that a lock was held at the time of system failure.

3.If the failed system is a server, then after recovery, the local server NLM attempts to re-establish ®le locks that client processes might have held. The

information about which remote clients held locks on the server is stored in the local ®le/etc/statd. Users should not edit or change this ®le in any way. Improperly changing this ®le may affect recovery from a server failure.

When the local system is a server, and the client never restarts, then an in®nite backlog of requests will build up for the locked ®le. This ®le willnever be released from its lock. This can be averted with the Release Integrated File System Locks (RLSIFSLCK) command.

RLSIFSLCK (Release Integrated File System Locks) Command

Purpose

The Release Integrated File System Locks (RLSIFSLCK) command can be used to release all Network File System (NFS) byte-range locks. These locks might be held by a speci®ed NFS client, or on a particular speci®ed object. This command should only be used to free resources that cannot be freed using normal means. When locks are released with this command, a successful return code is sent to the locking application.

For more information about byte-range locks, see the fcntl API in System API

Reference, SC41-4801.

Restrictions

1. You must have *IOSYSCFG special authority to use this command.

For more information about the RLSIFSLCK command and associated parameters and options, see CL Reference, SC41-4722.

Chapter 7. NFS Startup, Shutdown, and Recovery 75

Page 93
Image 93
IBM AS/400E manual Rlsifslck Release Integrated File System Locks Command, Purpose

AS/400E specifications

The IBM AS/400E, now more commonly known as IBM i, is a robust and versatile midrange server that has been designed to provide a comprehensive computing solution for businesses of all sizes. First introduced in the late 1980s, the AS/400 series has undergone multiple enhancements and rebranding, with the AS/400E being one of the notable iterations. This powerful platform is closely associated with IBM's commitment to reliability, scalability, and integrated business solutions.

One of the main features of the AS/400E is its highly integrated architecture that combines hardware and software into a cohesive system. This integration allows for seamless operations, reducing the complexity typically associated with managing disparate systems. The system is powered by IBM's proprietary OS/400 operating system, which has evolved into IBM i, featuring advanced capabilities like object-oriented programming, integrated database management, and security features that are essential for enterprise environments.

A key characteristic of the AS/400E is its robust database support, primarily through the use of DB2 for i. This integrated database management system enables efficient data handling and retrieval, facilitating real-time business analytics and reporting. Furthermore, the platform supports a variety of programming languages, including RPG, COBOL, and Java, making it flexible for developers who require diverse tools for application development.

The AS/400E is also known for its exceptional reliability and uptime, making it a preferred choice for critical business applications in industries such as finance, healthcare, and manufacturing. This reliability is backed by advanced error detection and correction mechanisms, as well as redundancy features that help prevent data loss and minimize downtime.

In terms of scalability, the AS/400E can effortlessly expand to accommodate growing business demands. Organizations can increase processing power by adding more resources without significant disruption. This scalability, combined with the system’s built-in virtualization capabilities, allows businesses to optimize resource usage and streamline operations.

Security is another defining feature of the AS/400E. The platform incorporates various layers of security measures, including user authentication, encryption, and comprehensive auditing capabilities, ensuring that sensitive business data is protected against unauthorized access.

Overall, the IBM AS/400E remains a powerful tool in the enterprise computing landscape, providing businesses with an integrated, reliable, and secure solution for their technological needs. Its enduring popularity is a testament to its capability to evolve with changing business requirements while maintaining its core attributes of high performance and stability.