My Account Log in

3 options

IBM eserver certification study guide : Cluster 1600 managed by PSSP / [Dino Quintero ... et al.].

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Contributor:
Quintero, Dino.
International Business Machines Corporation. International Technical Support Organization.
Series:
IBM redbooks.
IBM redbooks
Language:
English
Subjects (All):
Electronic data processing personnel--Certification.
Electronic data processing personnel.
Parallel computers.
IBM RISC System/6000 computers.
Physical Description:
xx, 566 p. : ill.
Edition:
1st ed.
Place of Publication:
[S.l.] : IBM, International Technical Support Organization, c2003.
Language Note:
English
System Details:
text file
Summary:
This IBM Redbooks publication is designed as a study guide for professionals wishing to prepare for the certification exam to achieve IBM Certified Specialist - Cluster 1600 managed by PSSP. The Cluster 1600 managed by PSSP certification validates the skills required to install and configure PSSP system software and to perform the administrative and diagnostic activities needed to support multiple users in an SP environment. The certification is applicable to specialists who implement and/or support Cluster 1600 managed by PSSP systems. This book helps Cluster 1600 specialists seeking a comprehensive and task-oriented guide for developing the knowledge and skills required for certification. It is designed to provide a combination of theory and practical experience needed for a general understanding of the subject matter. It also gives sample questions that will help in the evaluation of personal progress and provides familiarity with the types of questions that will be encountered in the exam.
Contents:
Front cover
Contents
Notices
Trademarks
Preface
The team that wrote this redbook
Become a published author
Comments welcome
Chapter 1. Introduction
1.1 Book organization
1.2 The test scenario
Part 1 System planning
Chapter 2. Validate hardware and software configuration
2.1 Key concepts you should study
2.2 Hardware
2.2.1 Overview of the available frames
2.2.2 Tall frames
2.2.3 Short frames
2.2.4 SP Switch frames
2.2.5 Power supplies
2.2.6 Hardware control and supervision
2.3 Cluster 1600 nodes
2.3.1 Internal nodes
2.3.2 External nodes
2.3.3 POWER4™ technology
2.4 Dependent nodes
2.4.1 SP Switch Router
2.4.2 SP Switch Router attachment
2.5 Control workstation
2.5.1 Supported control workstations
2.5.2 Control workstation minimum hardware requirements
2.5.3 High Availability Control Workstation
2.6 Hardware Management Console (HMC)
2.7 Cluster 1600 feature codes
2.8 Boot/install server requirements
2.9 SP Switch and SP Switch2 communication network
2.9.1 Adapter placements for SP Switch and SP Switch2 adapters
2.9.2 SP Switch hardware components
2.9.3 SP Switch networking fundamentals
2.9.4 SP Switch network products
2.10 Peripheral devices
2.11 Network connectivity adapters
2.12 Space requirements
2.13 Software requirements
2.14 System partitioning with the SP Switch
2.15 Cluster 1600 configuration rules
2.15.1 Short frame configurations
2.15.2 Tall frame configurations
2.16 Numbering rules
2.16.1 The frame numbering rule
2.16.2 The slot numbering rule
2.16.3 The node numbering rule
2.16.4 The switch port numbering rule
2.17 Sample questions
2.18 Exercises
Chapter 3. Cluster 1600 networking
3.1 Key concepts you should study
3.2 Name, address, and network integration planning.
3.2.1 Configure SP Ethernet admin LAN adapter
3.2.2 Set routes
3.2.3 Host name resolution
3.2.4 DNS
3.3 Networks
3.3.1 The SP Ethernet admin LAN
3.3.2 Frame and node cabling
3.3.3 SP LAN topologies
3.3.4 Additional LANs
3.3.5 Switch network
3.3.6 Subnetting considerations
3.4 Routing considerations
3.5 Using NIS in a Cluster 1600 configuration
3.6 Using AFS® in a Cluster 1600 configuration
3.7 Related documentation
3.8 Sample questions
3.9 Exercises
Chapter 4. I/O devices and file systems
4.1 Key concepts you should study
4.2 I/O devices
4.2.1 External disk storage
4.2.2 Internal I/O adapters
4.3 Multiple rootvg support
4.3.1 The Volume_Group class
4.3.2 Volume group management commands
4.3.3 How to declare a new rootvg
4.3.4 Booting from external disks
4.4 Global file systems
4.4.1 Network File System (NFS)
4.4.2 The DFS and AFS file systems
4.5 Related documentation
4.6 Sample questions
4.7 Exercises
Chapter 5. Cluster 1600 installation and administration
5.1 Key concepts
5.2 Hardware attachment
5.2.1 Cluster 1600 overview
5.2.2 Cluster 1600 scaling limits and rules
5.2.3 External node attachment
5.3 Cluster 1600 installation requirements
5.3.1 System specific requirements
5.3.2 Software requirements
5.4 Installation and configuration
5.5 PSSP support
5.5.1 SDR classes
5.5.2 Hardmon
5.6 User interfaces
5.6.1 Perspectives
5.6.2 Hardware Management Console
5.7 Attachment scenarios
5.8 Related documentation
5.9 Sample questions
5.10 Exercises
Chapter 6. Cluster 1600 security
6.1 Key concepts
6.2 Security-related concepts
6.2.1 Secure remote execution commands
6.2.2 Using the secure remote command process
6.3 Defining Kerberos
6.4 Kerberos
6.4.1 Kerberos daemons.
6.4.2 Kerberos authentication process
6.5 Kerberos paths, directories, and files
6.6 Authentication services procedures
6.7 Kerberos passwords and master key
6.8 Kerberos principals
6.8.1 Add a Kerberos principal
6.8.2 Change the attributes of the Kerberos principal
6.8.3 Delete Kerberos principals
6.9 Server key
6.9.1 Change a server key
6.10 Using additional Kerberos servers
6.10.1 Set up and initialize a secondary Kerberos server
6.10.2 Managing the Kerberos secondary server database
6.11 SP services that utilize Kerberos
6.11.1 Hardware control subsystem
6.11.2 Remote execution commands
6.12 Sysctl is a PSSP Kerberos-based security system
6.12.1 Sysctl components and process
6.12.2 Terms and files related to the sysctl process
6.13 Related documentation
6.14 Sample questions
6.15 Exercises
Chapter 7. User and data management
7.1 Key concepts
7.2 Administering users on a Cluster 1600 system
7.3 SP User data management
7.3.1 SP User Management (SPUM)
7.3.2 Set up SPUM
7.3.3 Add, change, delete, and list SP users
7.3.4 Change SP user passwords
7.3.5 Login control
7.3.6 Access control
7.4 Configuring NIS
7.5 File collections
7.5.1 Terms and features of file collections
7.5.2 File collection types
7.5.3 Predefined file collections
7.5.4 File collection structure
7.5.5 File collection update process
7.5.6 Supman user ID and supfilesrv daemon
7.5.7 Commands to include or exclude files from a file collection
7.5.8 Work and manage file collections
7.5.9 Modifying the file collection hierarchy
7.5.10 Steps in building a file collection
7.5.11 Installing a file collection
7.5.12 Removing a file collection
7.5.13 Diagnosing file collection problems
7.6 SP user file and directory management
7.6.1 AIX Automounter.
7.7 Related documentation
7.8 Sample questions
7.9 Exercises
Part 2 Installation and configuration
Chapter 8. Configuring the control workstation
8.1 Key concepts
8.2 Summary of CWS configuration
8.3 Key commands and files
8.3.1 setup_authent
8.3.2 chauthts
8.3.3 k4init
8.3.4 install_cw
8.3.5 .profile, /etc/profile, or /etc/environment
8.3.6 /etc/inittab
8.3.7 /etc/inetd.conf
8.3.8 /etc/rc.net
8.3.9 /etc/services
8.4 Environment requirements
8.4.1 Connectivity
8.4.2 Disk space and file system organization
8.5 LPP filesets
8.5.1 PSSP prerequisites
8.6 PSSP filesets installation on the CWS
8.6.1 Copy of the PSSP images
8.6.2 Move prerequisite files for PSSP 3.5
8.6.3 Copy the minimum AIX image (mksysb)
8.6.4 Install PSSP prerequisites
8.6.5 Install the runtime files
8.6.6 Install the RSCT files
8.6.7 Install the HMC-controlled server files
8.6.8 Installation of PSSP filesets on the CWS
8.7 Setting the authentication services on the CWS
8.7.1 Authentication setting on the CWS for remote commands
8.7.2 Setting the authentication method for PSSP trusted services
8.8 Configuring and verifying the CWS
8.9 Sample questions
8.10 Exercises
Chapter 9. Frame and node installation
9.1 Key concepts
9.2 Installation steps and associated key commands
9.2.1 Enter site environment information
9.2.2 Enter Hardware Management Console (HMC) information (HMC-controlled servers only)
9.2.3 Enter frame information
9.2.4 Check the level of supervisor microcode
9.2.5 Check the previous installation steps
9.2.6 Define the nodes' Ethernet information
9.2.7 Discover or configure the Ethernet hardware address
9.2.8 Configure additional adapters for nodes
9.2.9 Assign initial host names to nodes.
9.2.10 PSSP security installation and configuration
9.2.11 Start RSCT subsystems
9.2.12 Set up nodes to be installed
9.2.13 spchvgobj
9.2.14 Verify all node information
9.2.15 Change the default network tunable values
9.2.16 Perform additional node customization
9.2.17 spbootins
9.2.18 Setting the switch
9.2.19 Configuring the CWS as boot/install server
9.2.20 Verify that the System Management tools were correctly installed
9.2.21 Network boot the boot/install server and nodes
9.2.22 Verify node installation
9.2.23 Enable s1_tty on the SP-attached server (SAMI protocol only)
9.2.24 Update authorization files in restricted mode for boot/install servers (optional)
9.2.25 Run verification tests on all nodes
9.2.26 Check the system
9.2.27 Start the switch
9.2.28 Verify that the switch was installed correctly
9.3 Key files
9.3.1 /etc/bootptab.info
9.3.2 /tftpboot
9.3.3 /usr/sys/inst.images
9.3.4 /spdata/sys1/install/images
9.3.5 /spdata/sys1/install/&lt
name&gt
/lppsource
9.3.6 /spdata/sys1/install/pssplpp/PSSP-x.x
9.3.7 /spdata/sys1/install/pssp
9.3.8 image.data
9.4 Related documentation
9.5 Sample questions
9.6 Exercises
Chapter 10. Verification commands and methods
10.1 Key concepts
10.2 Introduction to Cluster 1600 system checking
10.3 Key commands
10.3.1 Verify installation of software
10.3.2 Verify system partitions
10.3.3 Verifying the authentication services
10.3.4 Checking subsystems
10.3.5 Monitoring hardware status
10.3.6 Monitoring node LEDs: spmon -L, spled
10.3.7 Extracting SDR contents
10.3.8 Checking IP connectivity: ping/telnet/rlogin
10.3.9 SMIT access to verification commands
10.4 Graphical user interface
10.5 Key daemons
10.5.1 Sdrd
10.5.2 Hardmon
10.5.3 Worm.
10.5.4 Topology Services, Group Services, and Event Management.
Notes:
"December 2003."
Includes bibliographical references and index.
OCLC:
137342309

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account