U.S. Environmental Protection Agency
  Office of Administration and Resources Management
  Office of. Information Resources Management
  Washington, D.C. 20460
INFORMATION
  RESOURC
MANAGEMENT
 DIRECTIVES
     VOLUME 2:


MCC-IBM User's Guide
NCC-VAX User's Guide
LAN Technical  Guidiines

-------
   ARCHITECTURAL MANAGEMENT AND PLANNING BRANCH
        NATIONAL DATA PROCESSING DIVISION
      VS. ENVIRONMENTAL PROTECTION AGENCY
 LOCAL AREA NETWORK
TECHNICAL GUIDELINES
       VOLUME II
LAN TECHNICAL MANUAL
                          January. 1988

-------
                          Table of Contents - Volume II
APPENDIX E - SITE PREPARATION
    E.1 OVERVIEW 	E-3
    E2 CABLING	E-3
    E3 ELECTRICAL POWER	E-ll
    E.4 TELECOMMUNICATIONS ACCESS  	E-15
APPENDIX F - INSTALLATION GUIDELINES
    F.I OVERVIEW 	F-3
    F2 SITE PREPARATION	F-4
    F3 HARD WARE INSTALLATION AND TESTING	F-10
    F.4 OPERATING SYSTEM INSTALLATION AND TEST	F-17
    F.5 INITIAL NETWORK SETUP AND VERIFICATION	F-35
    F.6 APPLICATIONS LOADING AND VERIFICATION  	F-52
    F.7 COMMUNICATIONS TESTS  .	F-68
    F.8 BACKUP	F-80
Attachment F/l - NOVELL NETWARE PROCEDURES
    F/1.1 INSTALLING AND CONFIGURING SERVER SOFTWARE F/l-1
    F/1.2 ADDITIONAL MENU UTILITY FUNCTIONS	F/l-5
    F/13 MULTI-USER SECURITY VERIFICATION	F/l-5
    F/1.4 FILER SERVER CONFIGURATION- AT TYPE PCS  	F/l-9
    F/1.5 FILE SERVER HARD DISK FORMAT	F/MO
ATTACHMENT F/2 - NOVELL NETWARE COMMAND LINE UnLITIES
    F/2.1 COMMANDS WITH DOS EQUIVALENTS	F/2-1
    F/2.2 USER INFORMATION AND ACCESS COMMANDS  	F/2-1
    F/23 PRINTER COMMANDS	F/2-2
    F/2.4 ADVANCED COMMANDS	F/2-3
    F/2.5 SYS:SYSTEM DIRECTORY	F/2-3
ATTACHMENT F/3 - LICENSE AGREEMENTS AND COPYRIGHTS
    F/3.1 LICENSE AGREEMENTS	F/3-1
    F/3.2 COPYRIGHTS	F/3-2
    F/33 PUBLICDOMAIN SOFTWARE  	F/3-3

-------
   LAN Technical Guidelines
   ATTACHMENT F/4 - NOVELL SYSTEM LOGIN SCRIPT
   APPENDIX G - LAN OPERATIONS
      G.I PURPOSE AND OVERVIEW	G-3
      G.2FDLE SERVER MANAGEMENT AND MAINTENANCE	G-3
      G3 PRINT SERVER MANAGEMENT AND MAINTENANCE	G-13
      G.4 COMMUNICATIONS GATEWAYS MANAGEMENT	G-16
      G.5 SECURITY MANAGEMENT AND MAINTENANCE	G-17
      G.6 APPLICATIONS SOFTWARE MANAGEMENT  	G-17
      G.7 TECHNICAL SUPPORT MANAGEMENT	G-23
u

-------
                          Table of Contents - Volume I
FOREWORD
PREFACE
    HOWTO USE THIS MANUAL	ii
EXECUTIVE SUMMARY

CHAPTER 1 - INTRODUCTION
    1.1 OVERVIEW  	1-3
    12 PURPOSE	1-3
    1J BACKGROUND	1-5
    1.4 BENEFITS OF ALAN 	1-7
    1.5 COSTS OF ALAN	1-9
    1.6 ALTERNATIVES TO A LAN  	1-12
    1.7 OIRM POLICY AND STANDARDS FOR LOCAL AREA NETWORKS
      FOR MICROCOMPUTERS  	1-14
    1.8 SUPPORT CONSIDERATIONS	1-14
    1.9  SUMMARY	1-21
    NOTES:	1-22

CHAPTER 2 - PLANNING GUIDELINES
    Planning Overview
    2.1 NEEDS ANALYSIS AND ALTERNATIVES EVALUATION (STEP 1) 2-7
    22 NETWORK SYSTEM DESIGN (STEP 2) 	2-19
    23 SITE PREPARATION (STEP 3)	2-30
    2.4 TRAINING (STEP 4) 	2-33
    2.5 OPERATIONS PLAN (STEP 5)	2-35
    2.6 SUPPORT PLAN (STEP 6)	2-38
    2.7 NETWORK ADMINISTRATION PLANNING (STEP 7)	2-41
    2.8 SUMMARY	2-42
    NOTES	2-43
                                                          IU

-------
  Volume I - LAN Design A Planning
    PLANNING CHECKLISTS
    COST ANALYSIS WORKSHEETS


    CHAPTER 3 ~ PURCHASE GUIDELINES
       3.1 INTRODUCTION	3.3
       32 POLICIES AND STANDARDS  	3.7
       33 PRE-PURCHASE CONSIDERATIONS	.3.3
       3.4 ACQUISITION PROCESS	 3-&

    CHAPTER 4 - ADMINISTRATION GUIDELINES
       4.1 PURPOSE AND OVERVIEW	4.3
       4.2 ATTENDING LAN ADMINISTRATOR TRAINING 	.4.5
       43 PLANNING AND PROCUREMENT	4.5
       4.4 SITE PREPARATION	 4-7
       4.5 INSTALLATION AND TESTING	' . 4.7
       4.6 LOCAL POLICIES AND PROCEDURES	4_g
       4.7 DAILY OPERATIONS 	    4_12
       4.8 PERFORMANCE EVALUATIONS  	  4_12
       4.9 REPORTING REQUIREMENTS	4_13
       4.10 CHANGE CONTROL	......' 4-14
       4.11 EXPANSION PLANNING  	      4_15
       4.12 SUMMARY	    4.15

   APPENDIX A - DRAFT OIRM LAN POLICY


   APPENDIX B.1 - DESKTOP PUBLISHING COMPONENTS
   APPENDIX B J - DESKTOP PUBLISHING COST SPREADSHEET
   APPENDIX B J - DESKTOP PUBLISHING TRAINING
tV

-------
                                             Table of Contents
APPENDIX C.1 - LAN COMPONENTS
APPENDIX C.2 - LAN COST SPREADSHEET
APPENDIX C3 - LAN TRAINING
APPENDIX C.4 - LAN SERVICES

APPENDIX D - AVAILABLE MODEM CONTRACTS

GLOSSARY

BIBLIOGRAPHY

-------
                       APPENDIX E - SITE PREPARATION
Contents

E.1 OVERVIEW	E-3
E2 CABLING	E-3
    £,2.1 Cabling Design
    £.2.2 Cabling System Installation
    K2.3 Cabling System Testing and Verification
    E.2.4 Cabling Installation Summary
E.3 ELECTRICAL POWER	E-ll
    E.3.1 Site Power Evaluation
       E.3.1.1  Power Distribution
       E.3.1.2  Power Receptacles
    E.3.2 Power Conditioning and Surge Protection
                       *
       E.3.2.1  Power Strips
       E.3.2.2  Power Protection Equipment -- Surge Protertor/Noise Filter
       E.3.2.3  Uninterruptible Power Supply (UPS)
E.4 TELECOMMUNICATIONS ACCESS	E-15
                                                                    E-1

-------
Volume II - LAN Technical Manual



       Notes:
 E-2

-------
                                                                         Site Pfeparaffon
E.1   OVERVIEW

        In Section 3 of Chapter 2, Planning Guidelines, the general planning requirements
   for Site Preparation were discussed. In this appendix we attempt to address the topics of
   cabling, electrical power, space requirements, and telecommunications connections in suf-
   ficient detail to allow you install these physical "house" components of the LAN and verify
   their integrity and performance with the aid of appropriate technicians.

E.2   CABLING

        This section is an overview of wiring for the token-ring network designed to allow
   you to prepare preliminary plans and to communicate more effectively with consultants.
   It  is not designed as an exhaustive treatise on the subject  of LAN wiring theories or
   strategies. Numerous books and publications present the subject in considerably more
   technical detail, and several are listed in the bibliography. One suitable source of back-
   ground information is the report System Wiring Architecture for Data/Voice Transport Within
   Headquarters, EPA, available from NDPD. (Contact Don Worley of AMPB/NDPD for in-
   formation. FTS 629-2740) This report provides an introduction to many of the parameters
   involved in planning a data communications cabling system.
        There are three principal steps to install the cabling for your LAN:
        •  Lay out the routing of the cabling and the location of the connectors for the
           workstations and servers;
        •  Install the cabling; and
        •  Test the cabling.
        For LANs which will connect more than a single suite of offices, we recommend that
   you utilize the planning and support services available through the Agency's LAN contract
   with SMA. Recall that throughout this appendix we will use the terms "cabling" and "wiring"
   interchangeably, and that both refer to the wires which provide the physical data path be-
   tween PCs attached in the network.

        The topology of the recommended token-ring network is called a "star- wired ring."
   By this is meant a cabling layout that is physically star-shaped while the attached computers
   are actually attached serially around a ring. Figure E.I illustrates this concept In the star-
   wired ring, the cables from each of the attached computers, also called nodes and worksta-
   tions, are routed  to a wiring concentrator in a centrally located closet In the token-ring
   system this concentrator is called a Multistation Access Unit, or MAU. (The IBM litera-
   ture often refers to it solely by its part number, '8228'.) It is a passive device which provides
   the physical connections between the nodes.
                                                                               E-3

-------
 Volume II • LAN Technical Manual
                                        Wiring ConcOTttftor
                                                               Attaching
                                                               D*vic»
    Figure E.1 "Star-wired ring" LAN topology


        Although other topologies exist (star, ring, bus, tree, etc), the star-wired ring topol-
    ogy has numerous advantages which include:

        (1) Allowing problem determination procedures to be accomplished at a single point,
           and quick isolation of node cabling runs;
        (2) Additional nodes can be added easily without disrupting network operations;
        '(3) Workstations can be relocated easily without disrupting the network; and
        (4) Because the concentrator is passive (it is not powered), there is no single point
           of failure which can bring the whole network down.
        The primary disadvantage of the star-wired ring is that it takes considerably more
    cable than  an equivalent simple ring to connect the same devices at the same locations.
    However, the simple ring topology cannot be easily reconfigured or expanded without dis-
    rupting network services, and cabling fault isolation can be a real nightmare. The star
    topology has two prime disadvantages: (1) the file server is generally located at the hub of
    the star, and therefore if it should fail, all network operations would cease; and (2) because
    all LAN communications are routed through the star server, it is a significant bottleneck
    on a heavily-loaded network.
E.2.1 Cabling Design
        All wiring which is done for the installation of LANs within the Agency must con-
   form to the following codes:                                 ,
   E-4

-------
                                                                     Site Preparation
     •  National Electric and Local Building Codes;
     •  National and Local Fire Codes; and
     •  Occupational Safety and Health Act (OSHA).
     They must be in compliance with the following standards as they are applicable to a
particular installation;
     •  Institute of Electrical and Electronic Engineers (IEEE) Standards (802);
     •  Federal Information Processing Standards (FTPS);
     •  Federal Communications Commission (FCC) Regulations; and
     •  Federal Information Resources Management Regulations (FTRMR).
     Recall from Chapter 2 that when planning the wiring there are three factors which
must be allowed for:
     •  utilize existing wiring where feasible;
     •  document ALL wiring plans and installations; and
     •  plan for ultimate Agency-wide connectivity.
     These factors are discussed below. To begin this phase of the LAN planning, you will
need the following materials, as outlined in Chapter 2:
     •  Cable Schedules (for pre-installed  cabling) or building plans showing conduits
        and raceways;
     •  Floor plans for each area to be linked which indicate the location of wiring closets,
        cable troughs (if any), and work areas (scale should be suitable for accurate dis-
        tance measurements in feet);
     •  Worksheets from the IBM Token-Ring books (reproduced here as Attachment
        1 to this appendix.
     IBM has written a series of excellent manuals which provide all the details of the
token-ring wiring planning. Three books which form the basis for the following brief dis-
cussions, and which we recommend that every LAN Administrator acquire and study are:
     •  IBM Token-Ring Network Introduction and Planning Guide;
     •  IBM Token-Ring Network Telephone Twisted-Pair Media Guide; and
     •  IBM Cabling System Planning and Installation Guide.
     These may be ordered through the SMA contract
     The computers must be connected together with the two twisted pairs of wires (for
a total of four wires). This can be done either through the use of existing cables or with
new wire. In either case, the planning steps are very similar:
     (1) On the floor plans, identify the offices to be included on the network and the ap-
        proximate location of the data connector within the office. This should also be
        done for future connections. Figure £2 provides a simple example.
     (2) Identify the wiring centers where the distribution panels and MAUs will be lo-
        cated. Where possible, these should be selected in order to minimize the length
        of the ring and the lengths of the individual lobes. Although allowable in some
        cases, it is recommended that no lobe be longer than 330 feet ("Lobes" on a star-
                                                                            E-5

-------
Volume II • LAN Technical Manual
          100
         101
                     m
         102
         103
         104
                    109
         105
                    111
         06
                    112
                             113
                             114
                             115
                            117
                               .1015
                                1018
                               1017
                            118
                               1018
                                      6001
                                      6002
                                             1019
120
121
122
*
123
124
125
126
t27
128
129
130
131
                                                                      132
                                                                      133
                                                                      134
                                                                     135
                                                                     136
                                                                     137
                                                                     138
  Figure E.2 A Simple ROOT Plan with LAN Components & Cabling


          wired ring are the cables which run from the concentrator to the workstations.)
          For maximum flexibility and ease of testing and maintenance, it is advisable to
          locate the  MAUs in groups of three or more rather than scattering them
          throughout an office space.

       (3) Locate the conduits, raceways, plenums, risers, etc through which the network
          cabling will be routed.

       (4) Measure and record the lengths of the lobe wiring runs. Don't forget to allow
          for vertical drop distances if the wiring is going through the ceilings or between
          floors. On the Workstation Inventory (LPC-1), indicate the lobe length and the
          number of the ring to which each location will be attached.
       (5) Using the IBM Charts at the end of this chapter, and referring to NDPD/RTP
          LAN TSR (Appendix H) as an example, accurately document the cabling system
          for your LAN. This should include all connections between the MAUs and ihe
          offices, as well as all MAU-MAU cables and patch cables,

       (6) The IBM TRNIntroduction and Planning Guide provides tables for determining
          the maximum "Adjusted Ring Length" (ARL) for various-configurations of wiring
  E-6

-------
                                                                      Site Preparation
        closets and MAUs. The ARL equals the sum of all wiring closet-to-wiring closet
        cable lengths minus the length of the shortest wiring closet-to-wiring closet cable.
        If the ARL plus the length of the longest lobe in your installation exceeds about
        800 feet (for a Type 1 or Type 2 wiring installation), then you are approaching the
        allowable limits for the physical length of the ring, and you may need to consider.
        a bridge between two smaller physical rings, or a repeater between two wiring
        closets. In any case, for a ring of this size the planning is much more critical and
        should be done as accurately as possible.
     (7) Determine the required components for the ring, utilising the IBM Network Or- >
        dering Worksheet.  When  determining the number of MAUs to install, we
        recommend that you connect only six or seven PCs to each MAU, leaving the
        eighth connector of each assembly for expansion, testing, and replacement
     Where it is demonstrated to be feasible, existing wire should be used. The IBM TRN
Telephone Twisted-Pair Media Guide states on page 2-1,
     "Most of the Telephone wiring installed to date throughout the world has been
     designed for voice band (03 kHz - 4 kHz), analog phone applications. It was not
     designed for high-speed data (1 Mb/s) and is not functionally specified (that is,
     guaranteed) for such operation. [Bell System Technical Reference 48007 and
     ANSI/ICEA S-80- 576-1983] For example, such critical characteristics as charac-   •
     teristic impedance, attenuation, and pair-to-pair crosstalk are not quantified in
     the frequency range of interest for use in data transmission. Manufacturers of
     high- speed communication products must specify these characteristics to ensure
     successful operation of their products on telephone wiring.
     "However, token-ring transmission at 4 megabits per second is possible in most
     cases on telephone wire.   With careful planning, IBM Token-Ring Network
     products can be operated successfully on a wide variety of telephone twisted-pair
     media in many general office environments at an extremely low cost per attach-
     ing device."
     Many of the Agency's office spaces have the 25 twisted- pair telephone wiring already
in place within the walls and terminating at central wiring closets. The telephone system
generally uses no more than ten of the pairs, leaving the remaining fifteen pairs for expan-
sion. Consequently, cabling installation costs can be minimized if this existing wiring can
be utilized. This cost savings is the primary reason why using the existing telephone wiring
should be  considered.  At those sites which have adequate conduit space for new wiring,
or which do not require extensive runs, the cost difference between new Type 2 cabling
and existing telephone twisted-pair may represent a very small fraction of the total life-
cycle cost of the LAN. Factors which detract from telephone wire's utility and which may
make it undesirable to use are:
     • The telephone wire is unshielded, and therefore more susceptible to interference
        from electrical noise sources such as fluorescent lights or induced noise because
        of close proximity to high- voltage electrical power lines.  Performance can be
        degraded because of excessive errors and retransmissions.
                                                                             E-7

-------
Volume II • LAN Technical Manual
         •  A maximum of 72 devices can be attached to a physical ring wired with Type 3
            (telephone) cable.
         •  IBM 8218 Copper Repeaters will be required in the installation to compensate
            for the signal loss on the ring wiring if your ring will:
            -  Pass through more than two wiring closets;
            -  Have 330 feet lobes and more than one wiring closet; or
            -  Have two wiring closets that are farther than 390 feet apart.
         •  The wiring closets may not have adequate room for installation of the necessary
            data punch-down blocks and the MAU racks, or they may be inaccessible without
            telephone company personnel present
         •  You may not  own the telephone wire,  and  the  building superintendent or
            telephone company may be unwilling to allow its use.
         •  The telephone wiring may be poorly documented, so that it is difficult or impos-
            sible to determine lobe lengths and/or possible splice points.
         •  In any case, Type 3 wire must not be used to connect MAUs in separate wiring
            closets together. Type 1 wiring is required for this connection. This means that
            telephone twisted-pair wire is best-suited for small LANs which can installed
            from a single wiring closet
E.2.2 Cabling System Installation
        The cabling system for a token-ring local area network consists of four components:
         •  Dual twisted-pair wire (preferably IBM Type 2);
         •  Wiring concentrators (MAUs) and  patch cables to attach them to  the installed
            cables;
         •  Data connectors which terminate the individual wiring lobes; and
         •  Flexible data cables to attach PCs to the system at the  data connectors.
        These are illustrated in Figure EJ, from the IBM Token-Ring Network Introduction
   and Planning Guide. With the exception of the Type 2 cable itself, all the components are
   available through the LAN contract with SMA.

        The first step in the installation is to run the cable.  Contracting for the installation
   of the cabling or the separation and punch-down of the data pairs of the telephone media
   is beyond the scope of this guide.  You should utilize the services of electrical or com-
   munications contractors who are familiar with the type of installation you will perform.
   You should work closely with your building manager during this step.

        The next step is to install the data connectors to the cable. These can be permanent-
   ly installed in wall or floor face plates, or they may be attached to the loose ends of the
   cable for some applications. The installer must pay particular attention to proper connec-
   tion of the shielding.

        When the connectors have been installed, the MAUs can be attached to the system
   with their patch cables. Before the cables are attached to the lobe connectors, each MAU
   connector must b* 'conditioned* using the device supplied with the MAU. If you don't per-
   form this step now, you will come back, disconnect all the cable, and do it later.
  E-a

-------
                                                                                 Site Preparation
 Numbering Attaching
 Devices
    All attaching devices must be assigned a unique number to assist
    in problem determination procedures.


    Figure    < illustrates the numbering and labeling scheme for the
    network components. Sheets of adhesive labels may be ordered
    through the IBM Cabling Syittm Catalog.
                   2001
                                Daaaa
                                  a a a a
                                DO ODD
                                DODDD
                                3D aaa
 Wiring Closet A140
 All Pitch Cable*
 Within Rick are 8 ft.
Yellow Crossover
Patch Cables
                                                                            Room 118
                                                                            PCS7
Figure E.3 Token-Ring LAN Cabling Components
                                                                                         E-9

-------
 Volume II - LAN Technical Manual
 E.2.3 Cabling System Testing and Verification
         The wiring, for both existing and new installations, must be tested before attaching
    any PCs to the network. If new Type 2 cabling has been installed, then it must be tho-
    roughly stress tested. If it appears feasible to utilize existing telephone wiring, then that
    system should be certified acceptable according to the guidelines recommended by IBM.
    A walk-through checklist will help in spotting current or potential problems. Electrical
    measurements will assure the cabling is contiguous, and not severed or strained. And final-
    ly, as part of the network installation procedure (covered in the Appendix F, Installation.
    Guidelines), software diagnostics will verify proper signal transmission from each worksta-
    tion and the network file server.

         The IBM TRN Telephone Twisted-Pair Media Guide contains information useful in
    qualifying telephone cable planned for use on a network. Chapter 3 of the IBM document
    contains Guidelines for Site Qualification, and Appendix A of that guide contains a Walk-
    Through  Site Inspection Checklist  As stated there, a qualified telephony consultant
    should assist in performing the site evaluation.  IBM will perform the service on a fee basis,
    and personnel are also available through the Agency's LAN procurement contract with
    SMA. For consultation on possible tests, contact NDPD Telecommunications.
         One item which the LAN Administrator and his or her technical support personnel
    should acquire is the IBM Cabling System Tester Kit. The tester provides installation and
    maintenance personnel the ability to verify a new installation and quickly locate faults in
    an operating LAN. The tester can identify:
         •  Data Cable  Damage, including opens, shorts, and shielding damage;
         •  Connector assembly errors;
         •  Connector shorting bar failure; and
         • Tester failure - self-diagnosis.
        With a Telephone Attachment Kit, it can also be used to evaluate the unshielded
    telephone twisted-pair wiring. The kits come with brief, easy to follow instructions and are
    simple to use. Although the tester kit is not available under the SMA LAN contract, it can
    be ordered from IBM (IBM PN 4760500) and includes the tester, a data wrap plug, and a
    carrying case. The Telephone Attachment Kit  is IBM PN 4760509.
E.2.4 Cabling Installation Summary
        With proper planning, installing the cable for your LAN can be a straight- forward
   process. The IBM guides referred to provide excellent discussions of the necessary pro-
   cedures, and the only way to attempt a complete discussion of the topic would be to repeat
   them in their entirety here.  Key steps which cannot be overlooked if the cabling is to
   provide trouble- free linkage of the PCs attached to the network are:
        •  Carefully plan the installation with the assistance of qualified technical experts;
        •  Plan for future connectivity rather than for a lowest-cost solution;
        •  Label all wiring with meticulous fervor and document the layout with equal at-
           tention to detail; and
        •  Test each phase of the installation as it is completed.
   E-10

-------
                                                                        Site Preparation
E.3  ELECTRICAL POWER

        Prior to the installation of the file server(s) and workstations on the network, a sur-
   vey of the AC power sources is necessary. This survey will determine if the power avail-
   able to the computers is properly conditioned for computer usage. When a personal
   computer is operating alone, the state of its electrical grounding is not particularly critical.
   However, when PCs scattered throughout a building are linked with a LAN, intermittent
   operational problems which are quite difficult to isolate can develop if there is a "floating
   ground" - the AC power sources are not properly linked together. A building plan in-
   dicating the path and sources of all power outlets should be available from officials at your
   site. If possible, enlisting the aid of a building engineer that is familiar with the AC power
   system should prove valuable in determining current or potential problems in the power
   and cabling for your network.

        The monitoring and analysis of power and transmission media requires the use of
   specific testing devices for each type of measurement. The actual use of these devices
   should be performed by qualified personnel only.  If you are not knowledgeable about
   electrical measurement devices, engage the services of an electrician or engineer who is
   familiar with such devices. Also, it is important that the person performing the testing and
   measurements be familiar with the power specifications of computer equipment and of the
   transmission media used in the local area network. An example of the tests performed is
   contained in the report Site Survey Technical Evaluation for the EPA Region 4 Superfund
   Local Area Network Project, prepared in June, 1987, which is included as Appendix I.
E.3.1  Site Power Evaluation
        The quality of the AC current powering the network file server and network worksta-
   tions is critical to proper operation of the computer equipment The amount of noise, or
   interference, from other electrical equipment, can reduce the life expectancy of computer
   components, including the power  supply. The load on the power feed line for a particular
   work area can cause fluctuations in the current available for workstations on that line.
   Power outages can cause loss of data and possibly corrupt the hard disk on the file server
   or workstations. Additionally, simultaneous application of power to various components
   of a computer system can cause power surges which will also shorten the life expectancy
   of the equipment, or possibly cause serious damage to the equipment Proper power dis-
   tribution and current conditioning techniques will alleviate many of these problems,
        Complete floor plans, showing the proposed locations of all network workstations
   and file server(s) are required to perform a technical evaluation of the power conditions
   for the LAN.  The information from this plan will be useful in determining whether the
   feed lines being used for the network server and workstations are also being used by other
   equipment which may cause interference on the network.
        Typical power source situations that can cause problems for network usage include
   the following:
        • Shortage of power receptacles, resulting in excessive use of extension cords;
        • Use of power strips which provide only minimum surge protection;
                                                                             E-11

-------
Volume II • LAN Technical Manual
         •  Daisy-chain feed lines which are unconditioned and highly susceptible to electri-
            cally induced noise interference from other equipment; and
         •  Proximity to fluorescent lighting, fans, typewriters, etc. in work areas, which can
            introduce ambient electrical noise into the power supply.
        Additionally, lightning-induced surges and momentary power losses or complete out-
   ages can cause computer equipment to fail during critical disk accesses. An uninterrup-
   tible power supply (UPS) can provide temporary cut- in, or ride-through power, allowing
   time for network operations to be completed gracefully in the event of power loss. All net-
   work file servers should be attached to a UPS to minimi?* problems.
E.3.1.1 Power Distribution
        A comprehensive power distribution study is required to properly plan for the in-
   creasing requirements for electrical service. The scope of the power distribution study
   should include  telecommunications, computer, and other sensitive hardware environ-
   ments. Such a study would likely include all power in the building; as this would ultimate-
   ly enhance the performance and reliability of a  local area network.  The technical
   requirements for this study include:
         •  Load requirements, including:
            - present circuit loads;
            - high density load circuits; and
            - equipment load requirements.
         •  Analysis of the existing power distribution, including:
            - existing circuits;
            - existing load requirements; and
            - planned load requirements.
         • A critical or sensitive load analysis that will determine which equipment requires
           special attention due to the importance to network operation and performance;
         • A power monitoring and quality analysis, with all circuit load events monitored
           and analyzed.
        The results of such a power distribution study  should indicate the extent of recom-
   mendations for correcting existing or potential problems.  Recommendations that may
   result from the power distribution may include:
         • New circuits may need to be installed to meed load requirements;
         • Computer-grade specification circuit upgrades may be indicated;
         • A modified load distribution plan may alleviate current or potential problems by
           redistributing the load requirements for any one circuit.
E.3.1.2 Power Receptacle*
        The building's electrical site or floor plans should indicate the location of each
   electrical outlet to be used by a network workstation, file sever, or peripheral All power
   receptacles throughout the network should be of the three-prong grounded type. If not,
   an electrician should install a properly grounded circuit
   E-12

-------
                                                                        Site Preparation
        Power receptacles should not simply be added to an existing circuit without verify-
   ing that the circuit is capable of carrying the increased load. If the total amperage of equip-
   ment that is currently or planned to be connected to the receptacles of a circuit exceed the
   rated amperage for the circuit, then an additional circuit should be installed.
        Be sure that the number of receptacles available for workstations, peripherals, and
   the file server is adequate for current and future needs. Electrical conduits running along
   walls or baseboards tend to provide easy access and additional outlets for future expan-
   sion. It is possible that the number of outlets available will meet current needs, but may
   be insufficient if additional computers or peripherals are added to that workstation area.
   Planning for future needs for power receptacles will help to reduce the reliance on power
   strips when additional equipment is installed.
E.3.2 Power Conditioning and Surge Protection
        The use of a power analyzer (such as an ECOS1023 Power Analyzer) should be used
   to determine the quality and conditioning of the commercial power lines going to each
   workstation or file server location. It is conceivable that power quality would be adequate
   at certain points in the power feed line, but may be inadequate at other points of the power
   feed line. This would indicate that electrical interference from other sources is impeding
   the quality of the power source.                          '
        Of primary concern to power conditioning are the Common Mode Noise (CMN),
   and the verification of proper grounding. Common Mode Noise occurs between the hot
   and ground and/or neutral and ground; and influences highly susceptible switching power
   supplies found in computers.' Proper grounding is necessary to provide a low impedance
   path for load and fault currents to return to the transformer neutral A computer system
   requires a zero voltage reference to operate logic circuits. Any voltage above zero on this
   reference can introduce false signals and create logic errors in the system.
        The significance of these types of problems is the indeterminate nature of the
   problem's symptoms. Computer errors are most commonly attributed to hardware or
   software problems. If the cause of the problem is actually unconditioned or noisy current,
   the errors can be extremely difficult to trace. A proper analysis of the current condition-
   ing may help to alleviate these future problems.
        Various types of power protection equipment include uninterruptible power supplies
   (UPS), voltage spike and surge suppressors, and transient noise protection devices.
   Whether voltage spike, surge suppression, or transient noise protection is needed for com-
   ponents on the network will depend on the results of the power distribution study. Actual
   cause and effect relations should be drawn between power problems and equipment per-
   formance. Addi tionally, interviews with personnel concerning their observations of any
   irregular or unusual power fluctuations will often help isolate areas of concern. The isola-
   tion of actual problems and the application-specific measures of protection for those
   problems is the most cost-effective way of implementing power protection.
                                                                               E-13

-------
 Volume II • LAN Technical Manual
 E.3.2.1 Power Strip*

         When additional power receptacles are needed at a workstation location, it is quite
    easy to plug in a power strip or extension cord to accommodate the added equipment
    However, temporary use of power strips or extension cords can easily become permanent
    receptacles. Therefore, if possible, ensure that an adequate number of power receptacles
    are available before computer equipment is installed.

         Many power strips claim to offer surge protection and current conditioning in addi-
    tion to providing electrical outlets. Most of these units only provide minimal surge protec-
    tion. They only contain one metal oxide varistor (MOV) and should not be depended on
    for any significant surge or spike protection.

         Additionally, power strips often provide a main power on/off switch which is con-
    venient for switching power on or off to some or all of the devices plugged into the strip.
    Powering up all computer components at the same time causes a potentially damaging cur-
    rent surge that may affect sensitive components. The initial surge appears on the ground
    as a raised potential and ultimately affects the low-voltage direct current components. If
    printers are included on power strips, power supply interference may be introduced.
         Most standard extension cords provide no surge or spike protection and no power
    conditioning.  Furthermore, some extension cords do not provide a ground plug These
    extension cords should not be used at all. The ground is necessary in providing a common
    electrical reference for sensitive computer components.
E.3.2.2 Power Protection Equipment - Surge Protector/Noise Filter
         Ambient electrical interference can be caused by devices such as copiers, typewriters,
    or printers that are physically located near computer equipment, or connected to the same
    electrical circuit Electrical interference such as this may introduce noise on circuits used
    by computer equipment If testing isolates electrical interference in areas of dense equip-
    ment, the use of line conditioners or transient noise protection devices may alleviate cur-
    rent problems for the computer equipment Printers, in particular, should be isolated from
    circuits used by computers.  Alternatively, it may be easier to simply remove or relocate
    the offending office equipment or peripherals.
E.3.2.3  Uninterruptible Power Supply (UPS)
        Most buildings will at some time or another experience power outages. Even a
   momentary loss can cause a personal computer to go down. When this occurs, all work
   that has been performed since the data was saved on disk will be lost If a power loss should
   occur during a disk write operation, an entire file or even directory may be corrupted, with
   consequent major loss of data.  Since the most critical piece of equipment on the network
   is the file server, installing an uninterruptible power supply represents a sound investment
   in providing assurance against a  server failure and is strongly recommended by NDPD
   The file server runs the network operating system and provides disk storage for all network
   users. A UPS will provide users or the network supervisor the time necessary to bring the
   system down safely, without loss of data or a head crash; even in the event of a complete
   power outage.  UPSs are available on the  Agency's PC contract  However, it should be
   E-14

-------
                                                                      Site Preparation
   noted that the 300 watt output of the UPS, while adequate for the PCs on the contract, is
   not sufficient for the servers available on the Agency LAN contract NDPD and SMA staff
   can recommend suitable commercially available units, and you should include one for each
   server on your network. The UPS should be checked regularly to ensure that proper opera-
   tion is available when necessary. (A simple way to do this is to backup the server, make
   certain no users are accessing the server, unplug the UPS from the wall, and see what hap-
   pens.)

E.4  TELECOMMUNICATIONS ACCESS

        If your LAN will provide shared communications  ports, these must be planned,
   budgeted for, and acquired. The Telecommunication*; Worksheet (LPC-8) provides space
   for documenting the hardware and software which will provide these functions.  Shared
   asynchronous modems require telephone service for the server. The modems can be ac-
   quired through existing Agency contracts. Asynchronous communications  may also be
   available through a dataswitch if your facility has one. The SNA gateway will require a
   Telecommunications Service Request (TSR) and connection to the appropriate control-
   ler or modem.
                                                                            E-15

-------
Attachment E/1 - IBM Token-Ring Network Planning
                                      Sheets

-------
 •  Rack Inventory Chart


 •  IBM 8228 Cabling Chart


 •  IBM 8218 Cabling Chart


 •  IBM 8219 Cabling Chart


 •  Ring Sequence Chart


 •  Bridge Planning Chart


 •  Physical Location to Adapter Address Locator Chart


 •  Adapter Address to Physical Location Locator Chart


 •  Network Ordering Worksheet


 •  Rack Inventory Chart Template (in back cover pocket)


 Make as many copies of these charts as you need to plan your network. Save the blank originals for
 later copies.


You are hereby authorized to copy pages B-2 through B-ll only.
                                                            IBM PLANNING PORT'S -  1

-------
Rack Inventory  Chart
Wiring closet number    	
       Rack number    	
              Date    	
    Planner's initials    	

Instructions
Fill out a Rack Inventory Chart for each
equipment rack.
                                         1.
                                         2.
                                         3.
                                        4.
    Enter the wiring closet location
    number, the equipment rack
    identification number, and the
    planner's initials.

    Using the template for the
    Rack Inventory Chart that came
    with this manual, draw an  outline
    of each component that will be
    installed in  the rack.

    The slots at the bottom of the
    distribution panel tempate  are
    used only for the lowermost
    distribution panel in a rack.
    The slots indicate that there
    are 38.1 mm (1-1/2 in.)
    between that panel and the
    next unit in the rack.

    Write the unit identification
    number on  each component
    on the chart.
                                         Example:
                                                               21
     IBM PLANNING FORMS - 2

-------
                IBM 8228 Cabling  Chart
                                                       Date
Section 1 Identification
  Unit
  Number
Building •
Location
Rack-mounted  LJ  Rjng
Wall-mounted  LJ
Section 2  Receptacle Connections
 Section 3 Ring Connections
  A. Connect Rl of this 8228 to:

  B. Connect RO of this 8228 to:
                                                        IBM PLANNING POFMS - 3

-------
                 IBM 8218 Cabling  Chart
 Section 1
Date

Ring
                             Unit Number
               Building

               Location
               Rack-Mounted

               Wall-Mounted
Section 2
     Connect to:
                          Rl
                          RO
                               Yellow
                              Crossover
                               Cable
                                                   Rl
                                                      Connect to:
                                                  RO
                                                                     ssss^ss;
                                             YeJIow
                                            Crossover
                                             Cable
     IBM PLANNING FDRMS - 4

-------
                    IBM  8219 Cabling Chart
Section 1
Date

Ring
Section 2
                Unit Number

                  Building

                  Location

               Rack-Mounted

               Wall-Mounted
                 o-o
                                                         o-o
         Yellow
    Q  Crossover
         Cable
          or
    D Patch Cable
                                   OP or MB
                                  Connections
                                                         B-B
                                           *
                                                   Receive;
                                                   Transmit
                                                             Connect to:
                                                         fcpKSKKJKKKSSm-
          B - Black
          O • Orange
          MB - Optical Fiber Cable Mounting Bracket
          OP • Distribution Panel
 Yellow
Crossover
 Cable
                                                      IBM PLANNING FDIWS - 5

-------
                        Ring  Sequence Chart
Suggested Abb
            nionc
DP • Distribution Panel
P - Pitch Cible
YCP • (Yellow) Crossover Pitch Cable
OFP - Optical Fiber Pitch Cable




































— ^ ]
(component)
(location)
J 1
f , 	 	 J
fr
(component)
(location)
, 	 	 'I
fr 	 '
(component)
(location)
, 	 	 ) \
C f 	 J
fr
(component)
(location)
, 	 	 ) 1
f f 	 J
fr
(component)
(location)
} \
f . )
(r -
(component)
(location)
	 	 ) J

1 f
(component)
(location)
	 1 *•



































on page
                                                                       Page.
FP- Faceplate
MB - Optical Fiber
    Mounting Bracket
SS • Surge Suppressor
                                                    MSAU • IBM 8228 Multistation ACCOM Unit
                                                    RPTR- IBM 8218 Copper Repeiter
                                                    OFRPTR - IBM 8219 Optical Fib* Repeater
          IBM PLANNING FDRMS -  6

-------
                 Bridge Planning Chart
                    Date
                    Bridge Identification
  Section 1- Bridge Configuration  Parameters

                    Bridge Number (default = 1)	

                    Dump on Error (default = 0)   __	

                    Restart on Error (default = 1)	
  Primary Adapter
                                               Alternate Adapter
                  .  (001)  Ring Number   (002)
                    (Default)         (Default)

                   Hop Codnt Limit (Default = 7)

                  Limited Broadcast (Default = 1)

                   (D800)  Shared RAM (D400)
                   (Default)     '    (Default)

                   Locally Administered Address _
 Section 2 - Physical Connections
                               Location
Ring No.
               Cable No.
     8228
Location
8228 Unit No.
Lobe Receptacle
                     Faceplate
>. k.
ft
-5
*S
1 Alternate
Adapter |
                                     —0-
                Cable No.    Rin8 No-
                                       Faceplate
Computer No.
                              8228
                                                Location
                                                8228 Unit No.
                                                Lobe Receptacle
                                                  IBM PLANNING FDR'S - 7

-------
     Physical Location to Adapter Address
                  Locator Chart
Physical
Location
Adapter
Address
Device
Identification
Ring
Number
IBM 8228
Unit No.
  IBM PLANNING PDRMS - 8

-------
 Adapter Address to Physical Location
                Locator Chart
Adapter
Address
Physical
Location
Device
Identification
Ring
Number
IBM 8228
Unit No.
                                IBM PLANNING FORMS - 9

-------
Network Ordering Worksheet
1. Rack-mounted IBM 8228 Multistation Access Units
2. Wall-mounted IBM 8228 Multistation Access Units
Total Number of IBM 8228 Multistation Access Units
(P/N 6091014)

3. Rack-mounted IBM 8218 Copper Repeaters
4. Wall-mounted IBM 8218 Copper Repeaters
Total Number of IBM 8218 Copper Repeaters (P/N 6339532)

5. Rack-mounted IBM 8219 Optical Fiber Repeaters
6. Wall-mounted IBM 8219 Optical Fiber Repeaters
Total Number of IBM 8219 Optical Fiber Repeaters
(P/N 6339535)

7. 8-foot Patch Cables (for lobes)
8. 8-foot Patch Cables (for main ring path)
9. Spare 8-foot Patch Cables
Total Number of 8-foot Patch Cables (P/N 8642551)

10. 30-foot Patch Cables (for lobes)
11. 30-foot Patch Cables (for main ring path)
12. Spare 30-foot Patch Cables
Total Number of 30-foot Patch Cables (P/N 8642552)

13. 75-foot Patch Cables (for lobes)
14. 75-foot Patch Cables (for main ring path)
15. Spare 75-foot Patch Cables
Total Number of 75-foot Patch Cables (P/N 6339134)

16. 150-foot Patch Cables (for lobes)
17. 150-foot Patch Cables (for main ring path)
1 8. Spare 1 50-foot Patch Cables
Total Number of 150-foot Patch Cables (P/N 6339135)

1 9. Crossover Patch Cables
20. Spare Crossover Patch Cables
Total Number of Crossover Patch Cables
(IBM Specification 6339137)


,

















i














       IBM PLANNING FORMS - 10

-------
21. Optical Fiber BNC-to-Biconic Patch Cables
22. Spare Optical Fiber BNC-to-Biconic Patch Cables
Total Number of Optical Fiber BNC-to-Biconic Patch Cables
(IBM Specification 6165811)

23. 8-foot Optical Fiber Biconic-to-Biconic Patch Cables
24. Spare 8-foot Optical Fiber Biconic-to-Biconic Patch Cables
Total Number of 8-foot Optical Fiber Biconic-to-Biconic Patch
Cables (IBM Specification 6165812)

25. 45-foot Optical Fiber Biconic-to-Biconic Patch Cables
26. Spare 45-foot Optical Fiber Biconic-to-Biconic Patch Cables
Total Number of 45-foot Optical Fiber Biconic-to-Biconic Patch
Cables (IBM Specification 6825813)

27. Optical Fiber Dual Socket Mounting Clips (IBM Specification 6165847)
28. Component Housings
(one for each wall-mounted IBM 8228) (P/N 6091078)
29. Surface Mounting Brackets
(one for each wall-mounted IBM 8218 or 8219) (P/N 6339140)
30. Rack Mounting Assembly (one for each seven rack-mounted
IBM 8218 or 8219) (P/N 9339139)
31. IBM Token-Ring Network PC Adapter Kits (P/N 6339100)
32. IBM Token-Ring Network PC Adapter II Kits (P/N 67X0438)
33. PC Adapter Cables (P/N 6339088)
34. IBM Token-Ring Network Manager (P/N 6476046)
35. IBM Token-Ring Hardware Maintenance and Service (P/N 6465880)
36. IBM Token-Ring Network Bridge Installation Kit (includes two adapter Us,
diagnostic and bridge software) (P/N 6476041)
37. IBM Token-Ring Network Bridge Program (software only)
(P/N 6403831)























IBM PLANNING FORMS - 11

-------
	APPENDIX F - INSTALLATION GUIDELINES

 F.I OVERVIEW	F-3

 F2 SITE PREPARATION	F-4
     F.2,1 Ordering and Storage
     F.2,2 Coordination of Required Support Personnel and Consultants
     F.2.3 Required Hardware/Software Versions
 FJ HARDWARE INSTALLATION AND TESTING	F-10
     F.3.1 File Server Setup and Configuration
     F.3.2 Install and Test Server and Workstation Network Interface Cards
     F.3.3 Ring Test   .
     F.3.4 Network Bridge Adapter Installation
                                     *
 F.4 OPERATING SYSTEM INSTALLATION AND TEST	F-17
     F.4.1 Install and Configure Server Software
     F.4.2 Exercise Management/Monitoring Utilities
     F.4.3 Installing and Configuring Individual Workstations
     F.4.4 Test Access of Server Resources From Workstation
     F.4.5 NETWARE Basics - Directories, Security, Users, and Croups

 F^ INITIAL NETWORK SETUP AND VERIFICATION   	F-35
     F.S.I Create User Access Configuration Tables
     F.5.2 Using SYSCON
     F.5.3 Using FILER
     F.S.4 Prepare Workstation LOGIN Scripts

 F.6 APPLICATIONS LOADING AND VERIFICATION	F-52
     F.6.1 Install Software on Server and Workstations
                                                                      F-i

-------
LAN Technical Manual
        F.6.2 Applications Software
        F.6.3 Loading Applications Software
        F.6.4 Initializing Data Bases
        F.d.5 Verify Operation of Application, Including Multi-User Access and Resource
             Utilization

   F.7 COMMUNICATIONS TESTS	F-68
        F.7.1 Novell Bridge
        F. 7.2 Asynchronous Communications Server
        F.7.3 SNAISDLC Communications Server (SNA Gateway)

   F.8 BACKUP	F-80
        F.8.1 Installation of Tape Backup Hardware
        F.8.2 Installation of SY-TOS Backup Software
        F.8,3 Testing the File Server Backup System
    F-2

-------
                                                                    Installation Guidelines
F.1   OVERVIEW

        Local area networks have the potential to provide much greater functionality than a
   stand-alone personal computer. Because of this, they are more complex, and the installa-
   tion procedures involve many different components.  Consequently, two basic tenets of
   problem solving reflect the proper approach for installing a local area network: (1) the
   right tools for the job, and (2) everything in its place and at its time.
        By "the right tools for the job," we mean not only having the correct size screwdriver,
   but also that the staff involved in each phase of the LAN installation must possess the right
   skills for doing the job. Classes are available on installing local area networks, and all those
   involved with the installation process should attend the appropriate course or courses. (See
   Chapter 3, Purchase Guidelines, for details.)
        By "everything in its place and at its time," we mean the inherent need for organiza-
   tion and coordination of installing all physical components of the network.  Because some
   of the tasks, such as power load distribution analysis and LAN cabling testing may require
   skills not possessed within your work group, outside consultant services must be acquired.
   The coordination of such services is essential to a successful installation. Organization of
   tasks by in-house staff requires special consideration. First, some phases of installation are
   dependent upon successful completion of prior phases, and the tasks should be organized
   as such. Second, certain installation or testing phases require system resources which may
   compete with or directly hinder the performance of personnel working on other phases.
   Section F.2 outlines some of the cautions to be observed in coordinating time and resour-
   ces during installation.
        The information in this appendix not intended to replace the manuals provided with
   the hardware and software. It is intended to provide three services:
         • Supplement the IBM and Novell manuals with the aspects of a LAN installation
           which they don't address;
         • Provide a view of how the individual components all fit together; and
         • Provide a concise desciption of the relevant procedures by pulling together from
           the numerous manuals provided by the vendors. This appendix addresses only the
           installation and testing of the LAN. It assumes that you have completed a LAN
           TSR, have obtained NDPD approval, and have ordered appropriate components
           for your LAN. The appendix is divided into seven major headings. These are:
   F.2 - Site Preparation, covering topics such as ordering and storage of LAN components;
        coordination of required personnel, and required hardware and software versions.
   F3 - Hardware Installation and Testing, which covers the steps necessary for proper in-
        stallation and testing of the file server, workstations, and network interface cards.
   F.4 - Operating System Installation and Test, which details the steps necessary for install-
        ing and testing the Novell NetWare Advanced 286 operating system software on the
        network file server, and testing server resources from a single workstation. Most of
        the information in this section is available in the various manuals provided by Novell.
                                                                                F-3

-------
LAN Technical Manual
        Where these manuals provide superfluous information, this document has attempted
        to condense this information to the relevant installation steps.
   F.5 - Initial Network Setup and Verification provides a detailed description of using the
        NetWare utilities to configure the file sever for users, create user login scripts, and
        test the configuration from multiple workstations.  Again,  the information in this
        heading is condensed from several of the Novell NetWare installation and planning
        manuals.

   F.6 - Application Loading and Verification describes the steps involved in loading and con-
        figuring some of the more popular applications on the network file server, along with
        the initialization and testing of these applications. Additionally, compatibility and
        network usage issues of application software are discussed.
   F.7 - Communications Testing provides information necessary to install, configure, and
        successfully use the NetWare Asynchronous Communications Server package, and
        the PCOX 3270 SNA Gateway server on the network.
   F.8 - Backup covers the installation of the IBM 6157 Tape Backup System and the SY-TOS
        Tape Backup software, as well as covering some pertinent issues involved in proper
        network file server backup operations.

F.2   SITE  PREPARATION

        Many users are blase about installing and maintaining personal computers. This at-
   titude is somewhat justified, since stand-alone personal computers can be easily installed
   and repaired. When installing a local area network, this situation changes significantly.
   LANs are inherently more complex than stand-alone computers. Personal computers can
   be moved at will. Network cabling, once installed, is not portable; however, individual
   workstations on the network can be moved. Problems on a network can be more difficult
   to diagnose. When a stand-alone computer or a single workstation goes down, productivity
   of the office is not usually affected that much; however, when a critical network component,
   such as the file server or a printer, goes down, everyone dependent on the network may be
   affected. Proper preparation and coordination of the installation of a local area network
   will have an effect on the network's initial cost, reliability, maintenance, flexibility, and ex-
   pandability. The availability and ease of use of the network on a consistent basis will great-
   ly determine the users' opinions and use of the resources.
F.2.1 Ordering and Storage
        The Agency's Purchase Requisition form 1900-8 used  for ordering network com-
   ponents should indicate the line item numbers (CLJNs), as listed in Appendices B and C
   in Volume L Note that many line items actually contain more than one component For
   example, the Network Bridge Processor (NBP) contains the IBM PS/2 Model 60 (with 40
   MB Hard Disk) and IBM DOS 330 Program Package. After the network has been or-
   dered, a copy of the 1900-8 form and the Agency line item descriptions document should
   be kept available for verification of package components when they arrive. As each line
   F-4

-------
                                                                  Installation Guidelines
   item component is received, it should be checked off the copy of the requisition form. For
   more information on ordering, refer to the Purchase Guidelines, Chapter 3 of Volume L
        Contracts with SMA and FDC stipulate that all orders be shipped in their entirety,
   however, the reality is that this may not always be the case. In the event that line items are
   shipped according to vendor availability, it becomes critical that components are checked
   off upon arrival, and that a secure, temperate area is allocated for storage of network com-
   ponents.  The preferred  method is to ensure that all network components have been
   received before proceeding with the installation. In the event of long back-orders of some
   components, such as a Network Bridge Server, it is possible to install certain components
   of the network, such as the file server, if all components for the file server have been
   received.  It is not recommended to attempt installation of a network if the primary com-
   ponents are not in place.
        Please note that all components for a network may be ordered using CLJN numbers
   from the Agency Network Ordering Document, except the LAN cable itself. It is the LAN
   Administrator's responsibility to acquire and install the appropriate cable that goes in the
   wall. Many local firms and national firms, such as Anixter, stock the needed cable. With
   the exception of a small, ultra-office network, which can be cabled using the patch cords
   available on the contract,  this step must generally be coordinated with the building super-
   intendent
        The components ordered from SMA will arrive fully burned-in and tested. The disk
   on the file server unit will be formatted and the Novell operating system software will have
   been loaded. In addition, any application software ordered at the same time will have been
   loaded by SIV^A. This is an added bundled service that is not generally included with com-
   mercial purchases.
F.2.2 Coordination of Required Support Personnel and Consultants
F.2.2.1 Required Personnel
        For any LAN installation, several key personnel are to be designated and each will
   have certain responsibilities.  Additionally, specialists in wiring or consultants experienced
   in LAN installations, such as SMA, may be needed for testing, configuring, and guidance
   during certain phases of the installation process. Even though vendor support may be con-
   tracted or otherwise available, it is best not to depend entirely on such support The local
   LAN Administrator must be knowledgeable and understand the  installation and opera-
   tions of the LAN to manage it on a daily basis. If server installation is purchased from
   SMA, training for the LAN Administrator is included.
        The key personnel who should be appointed from in-house staff include:
        •  The SIRMO, whose function is to assign the LAN Administrator and forward the
           LAN TSR to NDPD for approval.
        •  The LAN Administrator, who is responsible for system configuration, repair,
           daily operation  and maintenance.and ensuring that the goals of network usage
           are met
                                                                              F-5

-------
LAN Technical Manual
         •  Electrical installation and testing personnel, who are responsible for installing
            and testing the inter-office LAN cabling.
         •  Qerical Support Staff may be responsible  for the daily operation and main-
            tenance of specific workstations and servers, such as maintaining the printer or
            backing up the servers.
         •  Advanced technical support staff should be available to respond to specific tech-
            nical issues. NDPD generally provides this support with additional support avail-
            able from SMA.
        Though these roles should be designated to specific staff, it is advisable that more
   than one person in the group be capable of performing any single network maintenance
   operation.  In this way, dependence upon certain people does not diminish the proper
   operation of the network during vacations, etc.
        Certain network installation functions, such as installing and testing the network
   cable and testing the power load distribution, may require expertise that is beyond the skills
   possessed by staff members. In these situations, obtaining the support of building staff or
   outside consultants is advisable for properly completing the network installation. For some
   phases of installation, support of the building electrical maintenance staff may be obtained.
   The SMA contract provides a mechanism for organizations to purchase installation and
   problem determination services on an as-needed basis. This support is invaluable for first-
   time installations or when appropriate personnel resources are limited.
F.2.2.2 Coordination
        After the roles described above have been defined for key personnel within your or-
   ganization, a critical evaluation of the skills required for network installation and the skills
   possessed by those key personnel should be performed. If there are phases of the instal-
   lation process which the in-house staff is uncertain about performing, purchase the SMA
   installation support for those phases.

        It is a fact that there are many distinct functions that must be performed to properly
   install a network. Many of these functions are phase dependent; that is, one phase depends
   on the completion of previous phases.  However, some aspects of installation are inde-
   pendent of any other component  It is strongly recommended that some type of critical
   path phase analysis be performed before actually beginning to install the network. For ex-
   ample, while the installation and testing of the network cable and power lines is not de-
   pendent on the installation of the network file server operating system software, the server
   installation and testing is dependent on the wiring. The planning section of this document
   (Chapter 2) provides additional information on this topic

        A simple table can be constructed to depict various functions of the installation, their
   dependencies, the responsible parties, and the timeframe. Figure F.I is an example of such
   a table for a workgroup where Ann is the LAN Administrator and Bob is her primary tech-
   nical support person.  Note that the status column should be checked off as each phase of
   the installation process is completed.
   F-6

-------
                                                                  Installation Guidelines
Code Function
A.
B.
C
D.


E.

F.

G.


H.

I.

J.

K.


L.

M.

N.

0.

P.
Q.
Power line test
Install LAN cable
Test LAN cable
Test network
file server (NetWare
installed by SMA)
Install/configure
workstations
Test server and
workstation NIC cards
Test network
communications
(Ring tests)
Add users/logon
scripts
Perform multiuser
tests
Load/configure
application software
Configure 3270 ports
On mainframe '

Configure 3270
gateway server
Test 3270 server
and workstations
Configure LAN ACS
server
Test ACS server
and workstations
System backup
User training
Dependency Responsible
Code Party
none
none
B
none


none

A.B.C

A.B.QF


D,E

A-H

A-I
*
none


A-K

A-L

A-J

A-N

A-K
A-P
MAINT
MAINT
MAINT
Ann, Bob


Ann

Bob

Bob


Ann

Ann, Bob

Ann

Bob,
NDPD Telecom
support
Bob

Bob

Ann,Bob

Bob

Ann
Ann,Bob
Time
Frame Status
wkl
wk2
wk2
wk2


wk2

wk2

wk2


wk3

wk3

wk3

wk3


wk3

wk4

wk4

wk4

wk4
wkS
Figure F.I LAN Installation Sequence and Schedule

     This is a simplified approach to a LAN phased installation organizational chart
However, it does make clear which functions are dependent upon the completion of other
functions, and the relationships and interactions of the responsible parties for installing
the network. The elements necessary for an efficient network installation are competent
personnel with complementary skills, and a realistic schedule which foregoes installation
bottlenecks and competing efforts. Based on EPA's pilots, installation is an all-consum-
                                                                               F-7

-------
 LAN Technical Manual
    ing process which significantly drains personnel resources for a limited (usually less than
    two weeks) time. The time depends on the number of workstations and the complexity of
    the network configuration. An example of competing efforts might be when one party is
    testing the gateway software while another is configuring or developing file server infor-
    mation. If the gateway software causes the system to hang, efforts by the party at the file
    server may be lost, or vice versa Coordination of functions in a manner which will mini-
    mize competing or conflicting resources, work space, and personnel will enhance the net-
    work installation efforts.

         Once  pre-installation coordination plans have been outlined, it is essential that a
    meticulous record of everything done in regard to the LAN  installation be made. An ac-
    curate record of procedures will often eliminate redundant efforts to resolve problems.
         For organizations ordering installation, a special warning is required. When SMA
    personnel arrive onsite, it will be assumed that all in-the-wall wiring and electrical circuits
    have been installed, tested and are ready for LAN installations. Any problems with these
    items could result in SMA personnel charging time but being unable to provide the ser-
    vices due to EPA problems. Careful coordination is crucial to make productive use of the
    SMA time purchased.

 F.2.3 Required Hardware/Software Versions
 F.2.3.1 Hard war*
         •  Workstation Memory Requirements - Hardware requirements for workstations
            on a network running Novell Advanced NetWare 286 are 640 KB RAM, the ap-
            propriate network interface card, and at least one floppy drive. If you are install-
            ing only new equipment ordered from the SMA or FDC contracts, then all of the
            workstations will meet the minimum requirements. However, if you plan  to
            upgrade existing computer equipment to run on the network, those computers
            must  have 640KB RAM, DOS 3.1 or later, and a network interface card to run
            the NetWare workstation software.  Memory expansion cards are available  to
            upgrade existing machines  to the required memory.
         •   Network Interface Card (NIC) - All personal computers on the network must
            have a Network Interface Card (NIC) installed. A standard bus AT, such as a
            Telex 1280 and Epson Equity m + being used as a file server or workstation must
            have a Token- Ring Adapter H card, which is available from the SMA contract
            A file server or workstation on the network which has the new micro-channel bus
            architecture (the PS/2) is required to have Token Ring Adapter/A cards. These
            are included with the Model 80 server, but the other processors require that you
            specifically order the adapters.
F.2.&2  Software
        •   Netware Operating System Software - In most cases, only one version of the Net-
            Ware operating system software will be installed: Advanced Netware 286. Based
            on experience and technical literature, all servers should be dedicated, such that
            the possibility of a user bringing down the network is minimi^  Initially, the

-------
                                                                Installation Guidelines
        dedicated Novell 286 Operating System will be used, but when the non- dedicated
        version is released, EPA may adopt that version for ease of operation. However,
        even with the new version of software, servers will remain dedicated.
     •  Workstation DOS - NetWare supports different versions of DOS.  In fact, dif-
        ferent workstations on the network can each log in to the file server with distinct
        versions of DOS. In practice however, it is ill advised to mix operating system
        versions. System installation,  configuration, and management  issues increase
        when different workstations are using various versions of DOS.  A factor which
        should be used to determine which version of DOS to use is the highest version
        available of DOS which is supported by all of the application software intended^
        to run on the network. For proper LAN operation, maintaining the most current
        release of DOS is recommended.
     •  Application Software - The focus of most computer use is in running software,
        such as dBase HI Plus. There are approximately 50,000 different software pack-
        ages available under MS-DOS on the  market as of this writing.  However, most
        users, even so-called "power users" actually use and obtain proficiency with only
        a few of these packages.  Additionally, within an organization with many com-
        puters and networks, the standardization of use on specific application software
        is encouraged for compatibility, support, and procurement reasons. In fact, EPA
        policy requires standard programs in four areas: Data base management (dBase
        m + ), Spreadsheets (Lotus  1-2-3), Communications (Crosstalk), and Word
        Processing (DCA compatible, such as Wordstar, WordPerfect, Multimate, or
        Microsoft Word).
     For clarification, there are three types of application software, and they will each be
specified when used. Agency standard commerically available software such as Lotus and
dBase will be referred to as "application software." Programs such as the CERCLJS
programs will be  referred to as "national application programs"; and programs written in
a higher level programming language, such  as dBase, will  be  referred to specifically as
"dBase application programs."
     For many software packages, different versions exist for various purposes or environ-
ments. To determine whether a specific version of application software is needed in your
networking environment, the intended use of the application must be understood. Net-
work software applications can be divided into two primary categories: (1) single user ap-
plications, and (2) multi-user applications.
     Single user applications can be described as situations in which the data generated
by one user running a program is totally independent of data generated by another user
using the same program at the same time. Multi user applications can be described as situa-
tions in which data residing on the file server is shared simultaneously among various users
on the network.
     Many word processing and spreadsheet applications fall into the single user category.
Slowly these vendors are migrating to true multi-user versions. However, since it is rare
that more than one person will be working on the same document or worksheet at the same
                                                                            F-9

-------
LAN Technical Manual
   time, this does not present significant problems. It is quite common, however, for com-
   mon files to exist on a file server that can be accessed sequentially by different users, and
   this usage is supported almost universally.

         The most common need for multi-user software is in data base applications. The most
   popular data base packages either support network use or have special multi-user versions
   available. The Agency standard dBase HI + provides multi-user functionality. Word-
   Perfect word processing software also provides a LAN feature. Advantages of using multi-
   user versions of application software are that only a single copy of the program needs to
   be loaded on the file server which saves disk space, software upgrades require upgrading
   only one copy on the file server, and each user can often maintain individual user profiles.
         Application software can further be divided into classifications regarding the type of
   vendor purchasing arrangements available. Depending on the software and vendor, some
   application software must be purchased once for each concurrent user on the network.  An
   example of this type of software is the Lotus 1-2-3 spreadsheet. Other vendors offer licen-
   ses for software usage, which may vary according to number of users allowed or by site.  An
   example of multiple user license software is dBase HI 4- data base management software.
   Some single-user application software, such  as Wordstar, runs without modification on a
   network, and requires no further licensing from the vendor. Since many data base pack-
   ages, such as dBase HI +, are currently supporting network versions of the data base,  the
   networking use of this software is inherent to the licensed use of the product
        The last major category of software discrimination is whether the application is copy
   protected or not. Many products that are copy protected simply will not load and run on
   a network.  Other application packages may be copy protected, but the vendor may offer
   different versions, which either have modified copy protection, or no protection at all, avail-
   able for network use.

        A more complete discussion of different types of licensing, copyrights, and copy
   protection can be found in section Attachment 3 to this document Regardless,  once  the
   networking applications have been decided, the most appropriate version of the  software
   for network use must be obtained. If the software is a new purchase, then ordering net-
   working versions, if available, is the most obvious approach. If single user versions of  the
   software are currently on-site, then contacting the vendor or distributor for information
   on upgrading to the appropriate version for network use is necessary. If the software  re-
   quires specific licensing arrangements for network use, then the vendor licensing arrange-
   ment must be completed before users actually begin using the application software on the
   network. The SMA contract provides many standard packages and should be the preferred
   source for these software packages.

F.3  HARDWARE INSTALLATION AND  TESTING

        The network cabling (inter-office cable) and power tests are described in the Plan-
   ning section of this document It is assumed that the cabling and power sources have been
   F-10

-------
                                                                   Installation Guidelines
   tested, corrected, and certified prior to setting up the network computers. The steps in-
   volved in preliminary hardware set up and installations include the following:
        •  File server set up and configuration
        •  Install and test token-ring adapter card at the file server and each workstation
        •  Perform ring tests at each workstation and at multiple workstations
        •  Install Network Interface Cards at workstations designated as bridges to other
           networks
F.3.1 File Server Setup and Configuration
        Novell NetWare is a high performance network operating system.  It achieves this
   performance by use of a proprietary disk operating system, which is installed on the net-
   work file server.  The network operating system requires a unique disk format, which is
   performed with the COMPSURF utility supplied by Novell. If you are purchasing the net-
   work file server from SMA, the contract specifies that SMA will perform the necessary for-
   matting and bum-in procedures on the file server. If you are purchasing the network file
   server from another vendor, such as FDC, or are using an existing PS/2 Model 80, or an
   AT or compatible computer as a file server, then Appendix J contains the steps necessary
   for proper hard disk formatting and burn- in procedures.
F.3.2 Install and Test Server and Workstation Network Interface Cards
F.3.2.1 Adapter Installation
        The file server on the SMA contract is a PS/2 Model 80 (CLIN 50160) and PS/2 Model
   60. These are supplied with Adapter/A NICs. The Adapter/A NIC is required for network
   operation on all PS/2 Model 50,60, and 80 computers. The Adapter II NIC is required for
   network operation on the PS/2 Model 30 and all AT class computers, such as the Epson
   Equity HI +. Each IBM Token-Ring Adapter/A or Adapter n card is shipped with an IBM
   Token-Ring Network PC Adapter Hardware Reference Library: Guide to Operations (TRN
   GTO) manual. This manual provides information relevant to configuring and installing
   the network interface card (NIC).
F.3.2.2 Setting TRN Adapter/A Parameters
         If you are installing the Adapter/A card in a PS/2 Model 50,60, or 80, then the con-
   figuration files supplied with the card must be copied to the IBM Product Two Diskette
   (reference  disk) for system configuration. After these files have been copied, re-boot the
   computer using the Product Two Diskette for configuring the Program Option Select,
   which will  designate parameters necessary for proper operation with the micro-channel
   bus. Refer to the TRN Guide To Operations for detailed instructions on configuring the
   micro channel bus for operation with the Adapter/A NIC
F.3.2.3 Setting TRN Adapter/11 Parameter*
         For network workstations that have the standard AT type bus, the Adapter TJ must
   be installed.  These cards contain a series of switches to configure the hardware to work
   appropriately with the software and other hardware present in the machine. Refer to the
                                                                              F-11

-------
LAN Technical Manual
   TRN GTO manual for a detailed description of any switches to determine the proper set-
   ting. Figure F2 indicates the purpose and settings for each of the switches.
F.3.2.4 Installing tht Adapter Cards
        If a network file server, gateway workstation, or console is purchased along with the
   appropriate NIC from the SMA contract, the NIC will be installed in the computer by SMA,
   If the NIC is purchased separately, then you will need to install the NIC in the appropriate
   computer. The NIC can be installed in any available slot in PS/2s or AT or compatible
   computers. If you have any concerns as to the procedure for installing the Adapter card in
   a slot, or re-installing the computer cover, refer to the TRN GTO manual
              Adapter Card Switch Settings

      SWITCH BLOCK 1
            GROUP             SWITCH     ON           OFF
            A                    1                          x
                                  2           x
                                  3           x
                                  4                          x
                                  5                          x
                                  6           x
            B                     7           x
                                  8           x

      SWITCH BLOCK 2
            GROUP             SWITCH     ON           OFF

            C                     1                          x
            D                     2           x
            (•On the second TRN NIC in bridges, set to ON.)

      GROUP DESCRIPTIONS
            A) Switch Block 1: ROM Switches
            B) Switch Block 1: Interrupt Level
            C) Switch Block 2: Adapter or Adapter n Card
            D) Switch Block 2: Primary-Alternate Switch
      Attach a label with the following information to the rear plate of the Adapter card
      before installation.
        • Primary (0) versus Alternate (1) Adapter card. Bridge adapters are considerec
          Alternate TRN NICs.
        • Ring Number.
        • LAN Administrator's phone number
   Figure F.2 Token-fling Adapter II Switch Settings
   F-12

-------
                                                                   Installation Guidelines
F.3.2.5 Checking the Installation of Patch Cable*
        Prior to running the IBM Token-Ring PC Adapter (TRN) Diagnostics, the patch
   cables connecting each computer's NIC with the inter- office LAN cabling should be check-
   ed for proper installation. Section 4 of the Planning and Site Preparation Guide details
   the planning and installation of patch cables on the Distribution Panels and 8228 Multi-
   station Access Units (MAU). The network planner or supervisor should visually inspect
   each of the path cable connections according to the Ring Sequence Chart prepared in Sec-
   tion 4. This chart indicates where the patch cables from Ring-In (RI) and Ring-Out (RO)
   receptacles of the 8228 should be connected. A visual inspection of the connections should
   verify the following:
        •  Patch cable connections should match the Ring Sequence Chart;
        •  Connections shown on RI and RO receptacles of the 8228 Cabling Chart should
           match those on the Ring Sequence Chan;
        •  The label at the lobe receptacle end of each patch cable should match the label
           at the distribution panel end.
F.3.2.6 Adapter Diagnostic*
        It is important to run the TRN Diagnostics on the file server and each of the worksta-
   tions. Each computer that will be on the network must be tested separately. Proper inde-
   pendent verification of each NIC will make problem determination of network access and
   performance easier by eliminating the network functions performed by each NIC The
   steps involved in testing NICs installed in each computer  attached to the network are
   described below.

        If the patch cable connections in the wiring closet are verified correctly, the next step
   should be to attach the file server to the network. Plug the appropriate end of the adapt-
   er cable in the network Adapter installed in the file server. The following procedures
   provide a general reference to the use of the TRN Diagnostics.

        (1) Turn the power switch on the file server or workstation to OFF.
        (2a) If your network uses the IBM Cabling System data grade media, leave the cable
           attached to the NIC in the computer, but disconnect the from the network con-
           nection (typically at the MAU or wall plate connections). The connectors are
           self-shorting when not installed.
        (2b) If your network uses telephone twisted-pair media, disconnect the Type 3 Media
           Filter from the NIC Install the wrap plug (attached to the Type 3 Media Filter)
           onto the NIC
        (3) Insert the TRN Diagnostics Diskette into the floppy drive A:, and close the drive
           door. If you are using a working copy of the Adapter Diskette,  make sure that
                                                                             F-13

-------
LAN Technical Manual
           the DXMAID.COM file is copied to the TRN Diagnostics Diskette before run-
           ning the diagnostics.
        (4) Turn the power to the file server ON.
        (5) The TRN Diagnostics should load.  The Copyright/Diagnostics Option screen
           should appear. Follow the instructions  on the screen to  run the diagnostic
           routines.
        (6) Select option 0, Run Diagnostic Routines. The screen should then indicate which
           Token-Ring Adapter(s) are installed in the computer. Verify whether the list is
           correct
        (7) You can then select whether to run the tests once or multiple times, or to log er-
           rors to a disk file or a printer (if connected). Select an appropriate option to run
           the diagnostic routines.
        (8) The screen will display the following status information:
           -  Adapter Address
           -  Code Level
           -  Interrupt Level
           -  ROM Address
        Verify that the information above is appropriate for that station's NIC The screen
   will prompt for the  appropriate cable configuration for your network adapter (PC Adap-
   ter Cable, or Modular Telephone Plug). Select the appropriate response and verify that
   the adapter cable is not connected to the network.
        Beneath the status information, the diagnostics will display any information pertain-
   ing to testing status and  error messages during the tests.  If an error is detected, the error
   message is displayed after the testing status message.
        If an error does occur, refer to Chapter 3 of the Token Ring Network- Guide To Opera-
   tions manual for a detailed description of the error message meanings  and the appropriate
   actions to take for each type of error.

F.3.3 Ring Test
        After the NICs have been installed and tested  in the network file server and each
   workstation to be attached to the network, a Ring Test should be performed to indicate
   proper operation of the  connections of all computers attached to the network.  The Net-
   Ware SYSCHECK utility is used as a diagnostic aid to test for proper communications
   among the network interface cards connected to the network. The requirements for using
   the  SYSCHECK utility  are the NetWare 286 DIAGNOSTIC  diskette, the
   DXMAID.COM and the NETBIOS.COM files from the TRN diskette.
        For the file server and each workstation on the network, the following steps should
   be completed. Note that the entire sequence of instructions should be completed for each
   workstation (or file server) before moving on to the next workstation.
   F-14

-------
                                                              Installation Guidelines
     (1) Turn the power switch to each computer to OFF.
     (2) The computer adapter cable should be attached to the network wall plate.
     (3) Insert a copy of the DOS diskette in floppy drive A: and turn the machine on.
        When DOS is booted, enter the correct date and time. The screen should display
        the A prompt.
     (4) Load the Adapter Support Interface program by inserting the TRN diskette in
        floppy drive A: and typing 'DXMAED'. The A prompt will return when the Adap-
        ter Support Interface has been loaded.
     (5) Load the Network Basic Input/Output System program by inserting the shell dis-
        kette described above in floppy drive A: and typing 'NETBIOS*. The A prompt
        will return when the NETBIOS.COM program  has been installed  in the
        computer's memory.
     (6) Load the NetWare SYStem CHECK utility by inserting the NetWare 286 Diag-
        nostic diskette in floppy drive A: and typing 'SYSCHECK*.  The SYSCHECK
        header information will appear on the indicating the program is loading.
     (7) A prompt will be displayed similar to the following:
            Unique User Information

     At this prompt, enter information that will identify the specific computer and distin-
guish it from any other workstation. An example might be "Station #1", or "Bill's Station",
or "Secretary's Station." The important factor is that the identifying information you type
in is unique for each computer.
     (8) After entering the user information, the screen will display information similar
        to the following:	
                                    Unique User
       Network   Node             Information Yr Mo Dy Hr Mn Sc •

       OOOOC     0000110           Station #1   87/08/24935:15*
     The information displayed includes the Unique User Information described above,
the network and node identifications, and the current date and time. The node identifica-
tion is the physical address assigned to the computer's network interface board. The
asterisk (') at the end of the line indicates that the current line is the workstation you are
currently viewing.
     The screen is updated every 15, seconds to indicate the proper time and additional
workstations that have been added to the network.
     (9) While the first computer is still displaying the user information, repeat steps 1
        through 8 above for the next computer connected to the network. If the worksta-
        tions are  cabled properly,  within 15 seconds the  second (or each  additional)
                                                                         F-15

-------
 LAN Technical Manual
            computer's screen will be updated to show the user information for all nodes in
            a format similar to the following.
                             Unique User
           Network   Node  Information Yr Mo Dy Hr Mn Sc •
           OOOOC      0000110 Station #1 87/08/249:42:10
           OOOOC      0000128 Station#2 87/08/24 9:42:10*
        The screens of each workstation that is currently running the SYSCHECK utility
   should appear the same, indicating all connected workstations. The only difference will
   be that the asterisk (•) will appear next to the information line for the current workstation.
   Repeat this procedure until all workstations are running the SYSCHECK utility. If proper-
   ly cabled, the screen of each workstation should display an  information line for every
   workstation connected to the network.

        If workstations that should appear on the SYSCHECK screen are not  all present,
   perform the following troubleshooting procedures for isolating network cabling problems.

        (1) Check the screen of each workstation to make sure that it is still running SYS-
            CHECK, with the screen being updated every 15 seconds.
        (2) Check all physical connections between the stations and the file server.  Make
            sure the network interface cards are cabled properly, and are seated properly in
            the bus slots in the workstations and file sever.
        (3) Make sure that all additional cards, other than the NIC, the floppy and hard disk
            controller cards, and the monitor adapter cards are removed from workstations
            that are not appearing on the SYSCHECK screens.  This will ensure that there
            are no conflicts with competing interrupt usage by foreign adapter cards.
        (4) Try another NIC and software from another station known to work.  If this fails,
           a wiring problem may exist
F.3.4 Network Bridge Adapter Installation
        A network bridge is a dedicated computer on the network that connects two or more
   physical rings such that all workstations appear to be on the same logical ring. The dedi-
   cated computer must have twoTRN NICs installed in order to function as a network bridge.
   If you are using an Epson Equity m -I- or other AT-compatible computer as a bridge, the
   adapters must be Adapter n cards. This computer is attached by lobes to each of the rings
   which it is connecting. The software for network bridge operation is supplied with the net-
   work operating system.  If you purchase a network bridge computer and NICs from the
   SMA contract, they will be property configured with the appropriate adapters and switch
   settings.

        If you use a computer purchased from FDC, such as the Epson Equity HI + with two
   TRN adapters, then you will need to verify proper NIC switch settings. Before installing
   F-16

-------
                                                                   Installation Guidelines
   the Adapter n card in a workstation, the adapter switches should be set to valid settings
   for bridge operation. Refer to Section F32 of this chapter for the proper NIC bridge
   switch settings. Note that one of the bridge NICs must be designated as the primary adapt-
   er, and the second NIC must be designated as the alternate adapter. Section FJ.2 of this
   chapter and Chapter 2 of the TRN Guide to Operations provide details for installing the
   Adapter n card in the computer cabinet
        The Adapter tests described above can be executed on the bridge workstation to in-
   dicate  proper performance of both the  primary and  alternate adapters  installed.
   Procedures for loading the TRN diagnostics tests are described above. Make sure that
   both the cards are indicated  during the test If not, then re-check the switch settings for
   both cards. If the diagnostic test still fails,  try using a different adapter card in place of
   either the primary or alternate adapter. In such an event, the failed adapter card should
   be returned for repair or replacement

F.4   OPERATING  SYSTEM INSTALLATION  AND  TEST

        This section describes the installation and testing of the Novell NetWare operating
   system. The topics discussed include:
        • Installing and configuring the server software;
        • Executing  file server utilities;
        • Installing and configuring a single workstation; and
        • Testing the access of server resources from workstations

F.4.1  install and Configure Server Software
        Novell NetWare is a more complex product than most other PC networks. NetWare
   has its own operating system and file structure, which must be installed prior to establishing
   any disk directories, installing user  applications, or adding users to the network.  The per-
   formance advantage offered by NetWare is in large part due to the network software
   bypassing many of the disk I/O requests usually handled by PC/MS-DOS. This allows more
   information to pass  between the server and the workstation with fewer requests. Installa-
   tion parameters for NetWare are highly flexible, allowing a wide range of features to be
   customized, which may result in optimized performance for a given network environment
        If the network server has been purchased from the Agency contract with  SMA, the
   server should arrive pre-configured with the NetWare software. SMA will configure the
   NetWare operating system according to the specifications of the purchase order. If the
   server operating system needs to be adjusted for fine tuning the network or to add an in-
   ternal bridge, the LAN Administrator may need to reconfigure the network operating sys-
   tem. If the network server has been purchased from other sources, the server operating
   system will need to be completely generated. Refer to Attachment 1 of this appendix for
   detailed instructions for NetWare installation procedures. Attachment 1 also contain*
   relevant information necessary for understanding the parameters and limitations of using
   the file server. Because of the proprietary and complex nature of the NetWare software,
   it is advisable to follow the directions for installation of the software closely. In most situa-
                                                                              F-17

-------
LAN Technical Manual
   tions the network software will not need to be customized, and installation should be fair-
   ly straightforward.

        If your file server arrived pre-configured, the vendor should also have supplied
   workstation diskettes that were prepared with the GENSH utility. Once the NetWare
   operating system has been loaded on the file server, the server can be turned on; or if it is
   already on, simply press the CTRL-ALT- DEL keys simultaneously.

        The Agency recommends that all file/print servers be dedicated to that task and not
   used for workstations. While non-dedicated versions of the operating system may be used,
   it is for the convenience of the LAN Administrator or operator only.
        If you have a dedicated file server, the server prompt, a colon (":"), should be dis-
   played on the server monitor.  If you have a non-dedicated file server (i.e., the server could
   be used as a workstation), then you must boot the server from floppy diskette. The steps
   involved in creating a bootable diskette for the non-dedicated operating system are:

        (1) Format a DOS floppy diskette using the FORMAT A: /S command;
        (2) Copy the  NETSOS.EXE file from the GENOS-3 diskette (prepared during
           operating system configuration) to the bootable floppy;
        (3) Create an AUTOEXEC.BAT file containing the single line, NETSOS;
        (4) Boot the floppy by pressing CTRL-ALT-DEL simultaneously,
        (5) To load the workstation shell, at the A prompt, type ANET3;
        (6) Type LOGIN SUPERVISOR, and the password;
        (7) To use the computer as the network console, type CONSOLE; you will now see
           the console prompt, a colon (':'); and
        (8) To use the computer as a temporary workstation, type  DOS at the colon (':')
           prompt

        Most application programs will run without problems on a non-dedicated file server
   in workstation mode; an exception to this are TSR  (Terminate and Stay Resident)
   programs such as Sidekick, Superkey, and Ready. Do not use these programs from a serv-
   er in workstation mode. If the server / workstation user executes an incompatible program
   in DOS mode, the entire network could be brought down, causing other users on the net-
   work to lose their work, crashing files and losing important FAT tables. For dedicated ser-
   vers, the server PC cannot be used except in the monitor mode.
        Deviations from the above guidelines for installing the network server software will
   involve additional planning. Future updates in the NetWare distribution disks may follow
   a slightly different sequence of events; but the principles for installing the software will
   remain the same.

F.4.2 Exercise Management/Monitoring Utilities
        Once the network server operating system software has been installed, the functions
   of the network console can be exercised. This will ensure that the software is working
   F-18

-------
                                                                 Installation Guidelines
   properly, and allow you to gain some familiarity with the console commands.  From the
   console prompt (":"), the network console operator is able to monitor and control various
   functions that relate to the usage of the network and the allocation of network resources,
   such as the printer queue.
F.4.2.1 Network Console Uses
        Once the network is up and running, the need to use the server console will be very
   limited  The LAN Administrator will normally use the server console in his/her manage-
   ment of the network and in file server backups. Typical examples of server console use in-
   clude the following:
        •  You wish to inform all network users via BROADCAST that the system will be
           shut down (using DOWN) in 5 minutes for system backup;
        •  You wish to inform a particular workstation (using SEND) that his print job has
           been cancelled (via KILL QUEUE) because of its length, and to resubmit it this
           evening;
        •  You need to use STOP PRINTER to change toner cartridges in a network laser
           printer. You need to use START PRINTER to resume printing where the printer
           was halted;
        •  You use the QUEUE command to check the status of a print job, and CHANGE
           QUEUE to move the status of a particular job to a higher priority,
        •  You have inserted pre-printed forms in a spooled  dot matrix printer, and use
           FORM CHECK to print a test pattern for alignment purposes; after the paper is
           aligned use FORM SET to set the top-of-form;
        •  A network printer breaks down, use KILL PRINTER to stop the printer and erase
           all jobs from the printer's queue; or use REROUTE PRINTER  to change the
           destination of all jobs in the queue to another printer;
        •  Twice a year, daylight savings time causes you to use SET TIME  to change the
           server's time to the correct time (the server's internal clock  should also be reset);
        •  A workstation is having trouble accessing a file on the server; use the MONITOR
           command to display all server requests, transactions made, and the five files most
           recently requested by that workstation, and the current status of each file.
F.4.2.2 Server Console Commands
        The server console commands and a brief description are listed below. Review them
   to obtain an understanding of the types of functions available through the network  con-
   sole. They are listed here by their category of function to the network. A more detailed
   description is available in the Novell NetWare Console Reference manual
        MESSAGE COMMANDS

        Use:
        •  The BROADCAST command should be used to warn users about bringing the
           server down
                                                                            F-19

-------
LAN Technical Manual
        •  always advising users before clearing or disabling logins
        BROADCAST - send messages to all stations logged in or attached to the file serv-
        er
        CLEAR MESSAGE - clears messages from the bottom of the console screen
        SEND - used to send console messages to specific stations (rather than Broadcast to
        all)
        NETWORK MONITORING COMMANDS
        Use:
        •  checking disk I/O demands for overload
        •  to see who is using which programs
        •  checking system CPU utilization
        MONITOR - checks the activity of any station attached to the file server; also checks
        certain aspects of the server's activity
        WORKSTATION ACCESS COMMANDS
        Use:
        •  to make sure everyone is off the server to prevent loss of data when performing
           server maintenance
        CLEAR STATION - removes a particular workstation's access to the file server
        DISABLE LOGIN - disallows additional workstations from logging in to the file serv-
        er
        ENABLE LOGIN - allows workstations to log in to the file server if they have been
        disabled
        MISCELLANEOUS COMMANDS
        Use:
        •  display current system configuration
        •  correcting the server clock, the time commands do not replace the need to set the
           server's internal clock
        •  DOWN is the command to use when preparing to turn the server off
        CONFIG - displays the network communication boards currently installed
        DOWN - ensures all data is secure before powering off the server
        NAME - displays the name of the file server
        OFF - turns off the monitor display and clears the console screen
        SET TIME - sets the date and time kept by the server
        TIME - displays the date and time kept by the server
   F-20

-------
                                                            Installation Guidelines
    PRINT SPOOLER COMMANDS
    Use:
    •  to manage the network printer resources
    •  to manage the queued print jobs
    CHANGE QUEUE - changes the order in which queued files are printed
    FORM CHECK - prints a test pattern for aligning continuous feed, pre- printed
    forms in a printer
    FORM SET - sets the spooler's top-of-form for continuous feed forms in a printer
    KILL PRINTER - stop a specified printer and delete all print jobs from the printer's
    queue
    KILL QUEUE - allows removal of a specific print job from a printer queue
    QUEUE - displays the current jobs in a printer's queue
    REROUTE PRINTER - allows the console  operator to specify a different printer
    for all jobs in a printer's queue
    REWIND PRINTER - allows to halt printing, back up a specific number of pages,
    then restart printing
    START PRINTER • used to restart a printer after a Stop Printer, Kill Printer, or
    Reroute Printer command
    STOP PRINTER - allows to temporarily halt a printer (for changing ribbons, paper,
    etc.)                                                                 ,
    NON-DEDICATED FILE SERVER COMMANDS
    Use:
     • by executing the DOS command, the server can be used as a temporary worksta-
       tion.
    CONSOLE - switches from DOS mode to console mode on a non-dedicated file serv-
    er, executed from the DOS prompt (e.g. 'A' or 'C)
    DOS - switches from CONSOLE mode to DOS mode on a non-dedicated file serv-
    er
    As indicated, the server console is capable of monitoring workstation activity, con-
trolling workstation access to the server, broadcasting messages to all or selected worksta-
tions, displaying system information, safely bringing the system down for powering off,
switching between modes on a non-dedicated server, and performing a variety of functions
that control the network's printers and printer queues.
                                                                      F-21

-------
LAN Technical Manual
F.4.2.3 MONITOR Command Function*
        The MONITOR command will display information about the server's operating sys-
   tem and six of the currently logged in workstations. It is an easy method to determine ac-
   tivity and usage on the server. The display shows:
        •  the server's operating system version number and release date;
        •  the transaction status of each logged workstation;
        •  the last type of request made by any station;
        •  the five  files most recently requested by each workstation, the drive each file is
           on, and the current status of each file; for example, program overlays or data files;
        •  the number of cache blocks that have not yet been written to disk; and
        •  the percent of file server utilitization.
        The MONITOR Display shows six workstations at a time; to display workstations 1-
   6, type MONITOR 1; for workstations 7-12, type MONITOR 7; for workstations 13-18,
   type MONITOR  13; etc. While the MONITOR display is active, you are still able to in-
   voke console commands. The colon prompt appears at the bottom of the screen while the
   MONITOR Display is active.
        While configuring the network, use of the MONITOR command is helpful in deter-
   mining the success of each workstation in  accessing  files on1 the server.  Since the
   MONITOR Display is updated in real-time, slight overhead is added to the server perfor-
   mance when the MONITOR is active. Once the 'network configuration is established, the
   MONITOR Display should be turned off (using the OFF command) whenever the display
   is not being used, as this will improve overall system performance, and prevent monitor
   screen phosphor burn.
        Once the NetWare operating system software has been Listalled, and before any of
   the network workstations have been configured and tested, try experimenting with some
   of the console commands. Most of them will have an effect only if a workstation is active
   on the network.   However, several console commands will function with or without
   workstations attached.  Among them are the MONITOR command, NAME, TIME, SET
   TIME, CONFIG, and DOWN. If you use tiie DOWN console command, the server must
   be powered off and back on before continuing operations. Refer to the Novell NetWare
   Console Commands reference manual for details concerning the syntax of each of the con-
   sole commands.
F.4.3 Installing and Configuring Individual Workstations
        Before configuring the users on the network server, a single workstation should be
   attached to the server to verify whether the network operating system software is working
   properly.  The procedures described here can then be replicated for each workstation
   added to the network. The following discussion presumes that the network interface card
   and the network  cabling have been installed for both the network server and a worksta-
   tion.
   F-22

-------
                        APPENDIX G - LAN OPERATIONS
Contents

G.I PURPOSE AND OVERVIEW	G-3
G.2 FILE SERVER MANAGEMENT AND MAINTENANCE 	G-3
    G.2.1 System Backup, Archiving, and Restoration
    G.2.2 Applications Software Access Management
    G.2.3 Disk Space Allocation
    G.2.4 User Lists
       G.2.4.1 Login Name and Password
       G.2.4.2 User Profile
       G.2.4.3 The Group EVERYONE
       G.2.4.4 Login Scripts
       G.2.4.5 Login Messages
       G.2.4.6 New Users
    G.2.5 Periodic Testing
G3 PRINT SERVER MANAGEMENT AND MAINTENANCE  	G-13
    G.3.1 Printer Server Operations
    G.3.2 Print Job Management
    G.3J Snaring Network Printers
    G.3.4 Separating Print Jobs
    G.3.5 Managing Production control — Special Forms and Large Jobs
G.4 COMMUNICATIONS GATEWAYS MANAGEMENT	G-16
G.5 SECURITY MANAGEMENT AND MAINTENANCE  	G-17
G.6 APPLICATIONS SOFTWARE MANAGEMENT AND MAINTENANCE  . . G-17
    G.6.1 Applications Software
       G.6.1.1 Application Installation and Initialization
       G.6.1.2 Application Sharing
    G.6.2 Distribution of Manuals
                                                                   G-1

-------
 Volume II - LAN Technical Manual
         G.6.2 Distribution of Manuals
         G.6.3 User Training
         G.6.4 Application Administration
         G.6.5 Production Control
         G.6.6 Software Upgrades
         G.6.7 Installing Software Upgrades
    G.7 TECHNICAL SUPPORT MANAGEMENT	G-23
         G.7.2 Hardware
            G.7.1.1 File Server Performance
            G.7.1.2 Network Printers
         G.7.1.3  Communications Gateways
         G.7.2 Software
            G.7.2.1 User Login Problems
            G. 7.2.2 User Access Problems
         G.7.3 Cabling
G-2

-------
                                                                       LAN Operations
G.1  PURPOSE AND OVERVIEW

        The LAN Administrator is responsible for performing the routine duties that are in-
   volved in keeping the network reliable, safe, secure, current, and easy to use. Network
   resources include file servers, print servers, and communication gateways.  The LAN
   Administrator's responsibilities include the proper installation and management of these
   resources. Installation of the network is covered in detail in Appendix F, LAN Installation
   and Testing. This appendix covers the performance of the network resources and the types
   of adjustments that might be appropriate to optimize that performance.
        There is usually one primary reason for having a LAN: sharing resources. Whether
   the resource is a high-speed laser printer, common disk space for departmental data and
   documents, or a communications gateway, the LAN Administrator is responsible for
   managing and maintaining it The LAN Administrator ensures the regular attention which
   the resources require in order to sustain effective services for the LAN users, and thus en-
   sures that these hardware and software resources are configured correctly and that they
   continue to perform as expected. He  or she organizes access to the resources such that
   routine jobs can be executed with a minimum of training and frustration. He or she main-
   tains the appropriate controls which prevent the users from tying up resources, corrupting
   each other's data, and gaining access to restricted resources (such as the operating system
   and sensitive data).
        Table G.I indicates some of the routine tasks that must be performed or delegated
   by the LAN Administrator, and this appendix provides the guidelines for executing these
   as well as other routine duties which ensure that the LAN is reliably maintained. All of
   these functions are essential to proper LAN management. Additional functions may be
   necessary for your particular network. The frequency may also vary, depending on the size
   of the network and its usage.
        The discussions presented in this  appendix assume that the previous sections of these
   guidelines: Planning, Site Preparation, and Installation and Testing, have been studied and
   implemented for your LAN. The management and maintenance of these major resources
   are covered here:
           File Server
           Print Server
           Communications Gateways
           Security
           Applications Software
           Technical Support

 G.2  FILE SERVER MANAGEMENT AND MAINTENANCE
 G.2.1 System Backup, Archiving, and Restoration
        Faithfully backing up the file server is one of the most critical tasks of the LAN Ad-
   ministrator. No one plans for a hard disk to go down or to accidentally delete one or more

-------
Volume II - LAN Technical Manual
                TASK
FREQUENCY
         Full server hard disk backup
         Partial backup
         Archive

         Check or change login message
         Check server disk space use
         Check integrity of MENU system
         Check integrity of security
         Check communications links
         Check printer paper
         Check supplies: paper, toner, forms
         Check print job sequencing
         Check server utilization
         Upgrade users, software, menus
Weekly
Daily
As needed for storage
or disk space recovery
As needed
Daily
Daily
Once or more per week
Daily
As required by usage
Weekly
Twice or more per day
Periodically
As needed —
Check library documentation Weekly
   Table Q.1 LAN Administrator's Responsibilities

   important files. The only insurance against an unforeseen disk or file disaster is preven-
   tive tape backups. The regularity of making tape backups determines the timeliness of the
   data. There are three functional types of backups: (1) ensuring that critical data is not lost
   and/or minimising the costs of reconstructing the data; (2) providing an image of the
   operating system configuration and directory structure; and (3) providing inexpensive but
   convenient off-line archival storage of information.
        The best method for backing up data is known as the round-robin approach. We
   recommend that five tapes be used,  one tape for each day of the week. There are two
   reasons for using this method. First, multiple copies of the data are available if one copy
   becomes corrupted. Second, a period of time may elapse before a problem with the file
   server or missing files becomes known. Having multiple backups provides a reasonable de-
   gree of assurance that at least one of the backups contains the uncomipted or missing data.
   If your group is using the LAN to perform a great deal of data entry, then you should con-
   sider performing twice-daily backups of the data. The primary criteria for determining the
   frequency of backup in your particular situation is "What will it cost me to reconstruct the
   data I have lost?" This must be measured against the costs of performing the backups.
        Using the tape utilities, data is backed up to these daily tapes only if the file has been
   modified since the last backup operation. This is done for two reasons: (1) the backup
G-*

-------
                                                                      LAN Operations
usually takes considerably less time because much less data will be transferred (no program
or operating system files will be transferred), and (2) fewer tapes will be required to hold
each day's data.
     We recommend that a full disk-image ("mirror") be performed on a weekly, or at
least routine, basis. It should always be performed after any major changes to the system
such as adding new users, adding or upgrading an application, or beginning a new project
This is done in order to capture a complete picture of the system configuration at one time.
Trying to reconstruct a menu system and set of user lists from the daily sequential backups
can be an extremely time-consuming action.
     Archival storage means that files are backed up to tape and then deleted from the
disk, and it can be performed for one of two reasons. The LAN Administrator may initiate
the procedure because the file server's hard disk has become full and additional free disk
space must be provided for active projects. (This will usually be the case.) Or a user may
request that the data for a completed project be archived so that the space can be re-used.
When archiving mission- critical data, it is wise to create two backups of the archived data
before it is deleted. Why? This provides a backup of the backup. It is always wise to have
two copies of any magnetic data.
                      *                                 »                         _
     Archiving can actually be performed as a regular service to the LAN users.  Users-'
copy or  move their files into designated directories on the server.  Then, on a daily or
regular basis, the LAN Administrator backs up these directories and deletes all the files in
them. Should a user then have a need for one of his or her files, she  can request that the'
file be restored. One  caveat that you as LAN Administrator must be aware of is that con-
stant requests for file restoration can rapidly consume inordinate amounts of your time. If
you find that your users are abusing this ability, thei* you must establish a reasonable policy
to protect your time while still providing a useful level of service.
     There are at least three situations in which a tape restore may be in order.  First, a
full system restore may be needed if the file server's hard disk has become corrupted. In
this case, the hard disk may need to be reformatted, and the NetWare software re-installed.
Care must be  taken when restoring a full system because corrupted data files may be writ-
ten to the disk during  the restore, depending on the type of disk error. Check the integrity
of files restored on a full restore.
     The second restore function occurs when a user indicates panic that certain critical
files have been erased, have mysteriously disappeared, or have become corrupted. In this
case, find out the last date the files were successfully used. Then take the tape backup that
is closest to that date  and attempt the restore.
     Third, as mentioned above, users may at times request that data or application files
that were previously archived be restored to the file server. When restoring archive tapes,
make sure that enough  disk space exists on the file server to successfully restore the ar-
chived tape.
     The SY-TOS software included with the EPA LAN Server available from SMA and
used for tape backup is menu-driven. The manual accompanying the software explains the
                                                                               G-5

-------
Volume II • LAN Technical Manual
   functions and options available using menu choices.  It is important for you to become
   familiar with the use of the tape hardware and software. Practice backing up to the tape
   will not affect data on the hard disk. However, remember that restoring data to the hard
   disk will overwrite any existing files with the same file name, if overwrite is allowed in the
   SY-TOS configuration. Restore functions should be used with caution. Therefore, when
   gaining familiarity with the restore functions, use sample data for practice. When restor-
   ing tape backups, be very careful that the file overwrite function is turned on or off, as ap-
   propriate to the specific situation.
G.2.2 Applications Software Access Management
        The convenience of using and proper functioning of applications is a primary goal
   for the LAN Administrator.  Correctly installing an application results in its proper
   functioning. Convenience of use is related to file placement of the application's executable
   and data files and security on the network.  Applications software files and directory struc-
   tures should be organized using the worksheets accompanying Appendix F.
        A network user's convenience in accessing an application can be greatly aided by in-
   cluding the application as an option on the system menu. Novell provides a menu program
   (called MENU) which can be used for most of the applications functions on the network.
   MENU uses a text file to indicate choices on the menu. Figure G.I illustrates the struc-
   ture of the text file used for an NDPD LAN test  MENU.  Indented lines beneath each
   menu choice indicate the series of commands to be executed when the immediately preced-
   ing item has been selected, similar to batch file operation.  Menu titles are indicated by
   preceding the menu name with a percent (%) symbol. A functioning Novell menu script,
   customized to Agency-standard software comes installed on each server ordered through
   the SMA contract
        There are three parts to the EPA menu. First users select either local or network
   services. If local is selected, the standard EPA menu appears. If network is selected, the
   network menu takes control

G.2.3  Disk Space Allocation
        Whether on a stand-alone computer or a network file server, users' disk storage even-
   tually expands to fill the available disk space. The community of users on a network needs
   to understand and agree on the use of file server disk space. Priorities for saving duplicate
   information and conventions regarding allocation  of disk space must be established.  The
   LAN Administrator needs to develop a plan for the way space should be used on the file
   server's hard disk. Two facets of disk space management must be considered when plan-
   ning and operating the network: (1) how much disk space will be required by the users, and
   (2) how much disk space will be allocated to each  user.
        Chapter 2, Planning Guidelines, in Volume I, discusses the need for estimating the
   amount of disk space that will be necessary for your network. An estimate of needed disk
   space is determined by (1) the number of users on the network, (2) the specific applica-
   tions to be accessed, and (3) the volume of data expected to be processed over the net-
   work.  This estimate can be useful in determining an appropriate plan for disk space
G-6

-------
                                                                       LAN Operations
             %EPA Region IV LAN Menu, 12,40
             WasteLAN
             wastelan
             MultiMate
             multimate
             Lotus 1-2-3
             %lotus menu
             dBASEIIH-
             n:
             dba
             TlmeUne
             %tlmellnt menu
             IBM Mainframe Terminal
             cxiw»
             Clout
             r
             clout
             ExKtheLAN
             echo off
             key-fake 27 13
             %Lotut Menu.12,40
             Lotus fora MONOCHROME workstation (no color)
             echo off
             I:
             lotus mono
             Lotus for a COLOR workstation
             echo off
             I:
             lotus color
             Return to LAN menu
             echo off
             key-fake 27
             %TlmeUne Menu.12,40
             Run TlmeUne
             ti
             Run Tutorial
             tutorial
             Return to LAN menu
             echo off
             key-fake 27
Figure G.I Novell Menu Text Fie Structure
                                                                                 G-7

-------
 Volume II - LAN Technical Manual

Directory
Root
Lotus
WordStar
dBase
Project 1
Project2
Personal
Personal/John
Personal/Susan
Totals
Steady
Size (Kb)
500
750
500
1500
250
2500
80
1500
500
7.6Mb
Variable

Min(Kb) Max (Kb)
0
0
300
0
100
1500
0
500
100
2.5Mb
100
1000
1250
8000
1500
10000
250
4000
2500
28.6Mb
   Table G.2 Disk Space Allocation Estimates

   management  Average and worst case disk space utilization should be estimated, and al-
   ternatives for archival or backup storage of unused files should be specified. Table G.2 is
   an outline of a server's disk space budget for a typical network. You should create a similar
   table summarizing the needs of the applications and users on your network. If users of
   your network have been using stand-alone PCs, their use and consumption of local storage
   should indicate the potential use on the file server.
        Note that normal usage requires a modicum of space, about 7.6 megabytes. However,
   during peak usage periods, the same directories might use over 28 megabytes. Such a varia-
   tion in disk space usage can occur when several projects coincide, and each of them re-
   quires additional disk space. The point in this is that if your group works on large projects,
   the LAN Administrator must be able to accommodate the disk usage requests or be able
   to suggest alternative procedures.

        The current version of Novell Advanced NetWare (version 2.01) does not allow the
   amount of disk space available to users to be controlled. Thus, users can fill the file server's
   hard disk at will. Care must be taken that users do not make unnecessary duplicate copies
   of large files, or if they do that they be promptly removed.

        The LAN Administrator should regularly search all file server directories to deter-
   mine where duplicate files and backup files exist Tools are available, such as the Norton
   Utilities' FTLEFIND, which can aid in determining  the location of duplicate or backup
   files. In a similar fashion, the Norton FTLESIZE can show the LAN Administrator which
   directories have become "fat" and are consuming excessive disk space. If duplicate or back-
G-6

-------
                                                                        LAN Operations
   up files exist, the offending user(s) should be reminded or warned of the condition. The
   daily login message can also be used to remind users to remove all unnecessary files from
   their directories.
        Disk space conservation should be a network policy, and must be developed in con-
   sultation with all your users. Prompt removal of unnecessary files is a habit that users will
   practice if the LAN Administrator guides them into appropriate behavior. The file archiv-
   ing service discussed above is one way to avoid the disk space crunch.
        A future release of Novell NetWare will allow presetting the amount of disk space
   available to each user. When this is possible, the LAN Administrator should prepare a
   disk space budget similar to that of Figure G2. The budget should allow enough disk space
   for each user for the amount of growth that is predictable during one year's use of the net-
   work,

G.2.4 User Lists
        EPA networks are generally applications-driven, and it is the users who are behind
   the wheel They must be properly "licensed and insured." This means keeping a user list
   There are three main components of a user list: (1) the user's name and password, (2) the
   user's profile, and (3) the user's login script. The user list for Novell Netware will be up-
   dated whenever a new user is added to the network, when a major application is added, or
   when a new project is begun. The information maintained within the user list data is used
   by the network operating system to communicate with the users, to control their access to
   the various directories and system resources, and to protect them from unauthorized use
   of their programs and data.
G.2.4.1 Login Nam* and Password
        The user login name and password are the first level of security on the network. They
   should not be taken lightly. AH other security levels are based upon the privacy of the user
   name and password.  In other words, if a user's login name and password are known by
   other network users, additional levels of access and security accorded to that user will be
   available to anyone who knows the correct login name and password.
        The user's name  is initially set up by the LAN Administrator with a standard
   password. The user must be encouraged to change this password initially, and make other
   changes during the year. It is the user's responsibility to maintain his/her own password,
   and may change it at any time. If the password is forgotten, the LAN Administrator, by
   using the SUPERVISOR login, can assign a new password for the user.
G.2.4.2 Us«r Profit*
        The user profile is comprised of the total access rights assigned to that user. Access
   rights are defined by the user's membership in groups and specific security equivalences
   assigned to that user.
        A group is a named entity, set up by the LAN Administrator,  and  assigned one or,
   more of eight security rights (READ, WRITE, MODIFY, etc.) that specifies to members
                                                                                  G-9

-------
Volume II - LAN Technical Manual
   of that group the type of access allowed to specific directories on the file server. The LAN
   Administrator, using the SYSCON utility, can make any user a member of a group.
        Group membership is the most efficient method of assigning access rights to in-
   dividual network users. If more than one user is to be assigned a access to specific direc-
   tories, then a group should be created with the  appropriate security  access to those
   directories. Users can then be added or removed as members of that group without having
   to recreate the security structure. The LAN Administrator should refer to Appendix F for
   specifics on creating groups and assigning user members to groups.
        A common method for creating groups is to divide the activities of users on the net-
   work into projects and/or responsibilities. For example, if duties for members of your
   workgroup are primarily word processing, data analysis, and bookkeeping, three groups
   could be created: WORDP, DATAANAL, and BOOKKEEP. These three groups could
   be assigned security access to the appropriate directories on the file server. Each user can
   then be made a member of the relevant group.
        LAN Planning CheckUsts-6 and /provide  space for these groups to be established,
   and they should be updated as changes are made in the system configuration.
G.2.4.3  The Group EVERYONE
        A special group called EVERYONE exists under NetWare.  This group cannot be
   deleted. Also, every user is automatically made a member of this group when the user's
   name is added to the user list by the LAN Administrator.
        NetWare allows the security access rights for the group EVERYONE to be modified.
   However, it is suggested that the access rights for this group not be modified. The reason
   for this is that the group EVERYONE represents the minimum rights on the system al-
   lowed to any user.  If the group EVERYONE is modified to allow extensive rights, then
   there would be no straight-forward method to restrict any user's rights.
        The LAN Administrator should retain control over directory access on the file serv-
   er.  By maintaining minimum rights for the group EVERYONE, the he or she will be
   capable of restricting access rights to any any user.
G.2.4.4 Login Scripts
        As discussed in Appendix F, a login script is a series of NetWare commands that are
   executed automatically when a user logs into the file server. There are two login scripts as-
   sociated with every login: SYSTEM LOGIN SCRIPT and USER LOGIN SCRIPT.
        The SYSTEM LOGIN SCRIPT is a series of NetWare commands that is applicable
   to fiYfiixuser that logs into the file server. The SYSTEM LOGIN SCRIPT is the first script
   executed when any user logs in.  Because it is applicable to every network user, the SYS-
   TEM LOGIN SCRIPT should contain the minimal NetWare commands necessary for net-
   work functioning.
        NetWare supplies a default SYSTEM LOGIN SCRIPT when the system is
   generated. The LAN Administrator can modify this default SYSTEM LOGIN SCRIPT
   using the SYSCON utility. Refer to Appendix F for details on login script commands and
G-10

-------
                                                                    LAN Operations
  using the SYSCON utility. The second login script to be executed when a user logs into the
  file server is the USER LOGIN SCRIPT. This script is also a series of NetWare com-
  mands.  The USER LOGIN SCRIPT should contain the commands that customize file
  server access for network users. Each user's USER LOGIN SCRIPT can be customized;
  however, the degree of customization should be minimal, if at alL Each user can edit
  his/her own script, and it is your responsibility as LAN Administrator to see that they un-
  derstand the proper uses of this function.
       The commands in the USER LOGIN SCRIPT should define the mapping of file serv-
  er directories to logical drives, define the directories to be searched to find files, display
  the daily login message, and execute the network menu. The LAN Administrator can use
  the SYSCON utility to modify each user's USER LOGIN SCRIPT. Additionally, each
  user, once logged into the file server, can modify his/own login script The simplest method
  of maintaining consistency across all network users is to create a text file which contains
  the commands to be included in the USER LOGIN SCRIPT. The only command that
  would need to be added to each user's USER LOGIN SCRIPT would  then be "#IN-
  CLUDE SCRIPT.LOG", assuming the name of the text file is "SCRIPT.LOG."
       The sample USER LOGIN SCRIPT in Appendix F is an example of what such a text
  should contain. File servers purchased from the SMA contract should already have a copy;
  of this text file in the SYS:LOGIN directory of the file server. When adding new users to *
  the user list, the LAN Administrator needs only to add the command "^INCLUDE
  SYS:LOGIN/SCRIPT.LOGB to the USER LOGIN SCRIPT for each user.
       Because the SCRIPT.LOG text file is stored in the SYS:LOGIN directory, each user
  will be able to modify his/her own USER LOGIN SCRIPT, but will not be able to modify
  the commands in the SCRIPT.LOG text file. The IAN Administrator should login to the
  file server using the SUPERVISOR login in order to make changes the SCRIPT.LOG text
  file.
G.2.4.5 Login Messages
       When users login to the file server, any important or workgroup- specific informa-
   tion should be displayed before the network menu is executed. The sample menu provides
   a means of accomplishing this by use of the NetWare FDISPLAY program. Messages are
   contained in a text file named "MESSAGE-TJCT."  In particular, any information that is
   relevant to new or changed use of the network should be included in the message text file.
  The LAN Administrator should update the MESSAGE.TXT file daily, or as needed, by
   editing the file using a word processor. The FDISPLAY program will filter some charac-
   ters from  the text file, but it is best to save the file as a standard ASCII text file. For ex-
   ample, WordStar allows this by editing the file in non- document mode; Word Perfect
   allows retrieving and saving the file via the text-in/text-out functions.
G.2.4.6  Ntw Users
       Standard procedures exist for adding new users to the network file server. The opera-
   tions involved include the following:
        •  Login to the file server as SUPERVISOR.
                                                                            G-11

-------
 Volume II - LAN Technical Manual
         •  Create a personal directory using the DOS MKDIR command. For example, if
            Jane is a new user, the commands would be:
             CD \PERSONAL
             MDJANE
         •  Use the SYSCON program to perform the following tasks.
            -  Add the user's name to the user list Note that users with the same names
               must be entered with unique names in the user list
            -  Add the user name as members of the appropriate groups.
            -  Add the line "^INCLUDE SYS:LOGIN/SCRIPTIXXj" to the user's login
               script
            -  Login under the new user's login name. Test that the login script and direc-
               tory and file access works as expected.
            -  Instruct the new user on login procedures, menu functions, and basic Net-
               Ware concepts. Make sure the new user understands which manuals in the
               network library will be helpful in diagnosing minor problems.
        Appendix F provides specific instructions for user lists, groups, and login scripts. If
   you are unsure about procedures, consult the appropriate sections in this guide or the Net-
   Ware manuals for instructions.
 G.2.5  Periodic Testing
        As indicated in the task chart above, the LAN Administrator should periodically test
   the integrity of various functions on the file server. The focus for testing applications is the
   network MENU system. Once a week, each menu choice should be tested to ensure proper
   functioning of the applications.

        Additionally, applications that involve usage counters, such as Lotus in the example
   above, should be tested to confirm that the number of concurrent copies that can be loaded
   performs as expected.

        File servers  delivered under SMA contract should include  a separate  network
   MENU for the login SUPERVISOR. Functions available under that menu are specific to
   network maintenance, such as SYSCON, FILER, QUEUE, SESSION, etc. An addition-
   al feature that could be added to the SUPERVISOR network menu would be to  clear ap-
   plication counter files.

        The applications counter works by copying a standard one line text file to a specific
   count name when an application is executed. If another user tries to run the application,
   the menu system checks to see if the counter file name exists. If it does, execution is denied
   for that application number. When the application is exited, the specific count file name
   is deleted. Examine the file "NORMAL.MNU" in the SYS:PUBUC directory to see how
   this works.

        To add a clear count file function to the SUPERVISOR menu, edit the file named
   "SUPER.MNU" in the SYS:PUBLIC directory in non-document or ASCII text file format
   For example, to add an option for clearing Lotus counter files, the following lines should
   be added in the file before the line "%Printer Menu."
G-12

-------
                                         Installation Guidelines • Attachments
    CD..
    CLS
    TYPE QOMSG.DAT
    PAUSE NUL
    NCOPYKiCXIUSROTJTjGZiFLAGS NUL
    DEL KiCXIUSROTJLG    NUL
    GOTO EXIT
    rem
    rERRORl
    CLS
    ECHO.
    ECHO.
    ECHO.
    ECHO.
    ECHO THIS MACHINE DOES NOT HAVE ENOUGH MEMORY TO RUN
THE ECHO WORKSTATION PROGRAM -
    ECHO.
    ECHO NEED 640K MINIMUM.
    ECHO.
    ECHO Any questions, contact the LAN Administrator ECHO.
    ECHO.
    ECHO Press any key to return to LAN menu...
    PAUSE NUL
    GOTO END
    :ERROR2
    els
    ECHO.
    ECHO.
    ECHO.
    ECHO.
    ECHO ALL WORKSTATION SESSIONS ARE IN USE...
                                                        F/4-5

-------
LAN Technical Manual
        ECHO.
        ECHO Walt a while and try again,
        ECHO.
        ECHO or contact the LAN Administrator OaExL xxxx
        ECHO.
        PAUSE
        CLS
        GOTO END
        :EXTT
        oderit NUL
        :END
        z:
        echo on
        • Region IV has reserved the eighth workstation for administrative use; ergo, the
   pool of workstations is seven although eight concurrent workstations can access the
   mainframe.
   F/4-6

-------
                                     Installation Guidelines • Attachments
:CXTWS03
IF NOT EXIST Z:FLAGS\CXIUSR03 JTLG GOTO CXIWS04
NCOPY Z:FLAGS\CXRJSRQ3 JLG K: NUL
DEL Z:FLAGS\CXIUSR03.FLG  NUL
CDCXIWS03
OOWS03
CD..
CLS
TYPECXIMSG.DAT
PAUSE NUL
NCOPY K:CXIUSR03.FLG P: NUL
DEL ICCXIUSR03.FLG  NUL
GOTO EXIT
rem
:CXTWS04
IF NOT EXIST Z:FLAGS\CXIUSR04.FLG GOTO CXTWS05
NCOPY Z:FLAGS\CXIUSR04.FLG K: NUL
DEL Z:FLAGS\CXIUSR04.FLG  NUL
CDCXIWS04
CXIWS04
CD..
CLS
TYPECXIMSG.DAT
PAUSE NUL
NCOPY K:CXIUSR04 JLG Z:FLAGS NUL
DEL K:CXIUSR04.FLG    NUL
GOTOEXTT
rem
rCXIWSOS
IF NOT EXIST Z:FLAGS\CXIUSR05.FLG GOTO CXIWS06
NCOPY Z:FLAGS\CXIUSR05FUG K: NUL
                                                    F/4-3

-------
LAN Technical Manual
      DEL Z:FLAGS\CXIUSR05.FLG  NUL
      CDCXIWSQ5
      CXIWS05
      CD..
      CLS
      TYPE CXIMSG.DAT
      PAUSE NUL
      NCOPY KiOOUSR05.FLGZ:FLAGS NUL
      DEL K:CXIUSR05.FLG   NUL
      GOTO EXIT
      rem
      :CXIWS06
      IF NOT EXIST Z:FLAGS\CXIUSR06.FLG GOTO CXIWS07
      NCOPY Z:FLAGS\CXIUSR06.FLG K: NUL
      DEL Z:FLAGS\CXIUSR06.FIjG  NUL
      CDCXIWS06
      CXTWS06
      CD..
      CLS
      TYPECXIMSG.DAT
      PAUSE NUL
      NCOPY K:CXIUSR06.FLG Z:FLAGS NUL
      DEL K:CXIUSR06.FLG   NUL
      GOTOEXTT
      rem
      :CXIWS07
      IF NOT EXIST Z:FLAGS\CXIUSR07 JLG GOTO ERROR2
      NCOPY ZiFLAGSXCXIUSROTJLGK: NUL
      DEL Z:FLAGS\CXIUSR07.FLG  NUL
      CDCXIWS07
      CXIWS07
  F/4-4

-------
      ATTACHMENT F/4 - NOVELL NETWARE LOGIN
                                                SCRIPT
   MAP K: = SYS:\USER\F_LASTNA (F is first name initial
              LASTNA is 1st 6 characters of last name)

   INCLUDE STAFFLOG.DAT

• STAFFLOGDAT
   MAP DISPLAY OFF
   DRIVE J:
   MAPL: = SYS:APPL/LOTUS
   MAP M: = SYS:APPL/MULTIMAT
   MAPN: = SYS:APPI7DBASEffl
   MAPO:= SYS:APPL/TEMP
   MAPP:= SYS:APPL/CXI
   MAPS1:=SYS:PUBUC
   MAP S2: = SYS:PUBUO%MACHINE/%OS/%OS_VERSION
   MAP S3: = SYS:APPL/DBASEm
   COMSPEC = S2:COMMAND.COM
   DOS SET NAME="STAFF

• CXI BATCH FILE FOR EIGHT* CONCURRENT USERS

• CHWS.BAT
   ECHO OFF
   CLS
   IF NOT EXIST Y:CXI-OK.DAT GOTO ERROR1
   TYPE CXIWATTDAT
                                                      F/4-1

-------
LAN Technical Manual
      NETBIOS NUL
      rem
      P:
      :CXIWS01
      IF NOT EXIST Z:FLAGS\CXIUSR01 JLG GOTO CXIWS02
      NCX)PYZ:FLAGS\CXIUSR01.FLGK: NUL
      DEL Z:FLAGS\CXIUSR01.FLG  NUL
      CDQOWSOl
      CXIWS01
      CD.
      CLS
      TYPE CXIMSG.DAT
      PAUSE nul
      NCOPY ICCXIUSR01.FLG Z:FLAGS NUL
      DEL K.-CXIUSR01.FLG    NUL
      GOTO EXIT
      rem
      :CXIWS02
      IF NOT EXIST Z:FLAGS\CXIUSR02.FLG GOTO CXIWS03
      NCOPY Z:FLAGS\CXIUSR02.FLG K: NUL
      DEL Z:FLAGS\CXIUSR02.FLG  NUL
      CDCXIWS02
      CXIWS02
      CD..
      CLS
      TYPE CXIMSG J5AT
      PAUSE nul
      NCOPY K:CXIUSR02.FLGZ:FLAGS NUL
      DEL KICXIUSR02JLG    NUL
      GOTO EXIT
      rem
  F/4-2

-------
                                                        Installation Guidelines • Attachments
        Additionally, some copyright notices will state explicitly whether the software may
   be used by multiple users on a network, whether only one user may access the software at
   a time, or whether the software may be run on only one machine at any time.

F/3.3 PUBLIC  DOMAIN  SOFTWARE

        Many popular application packages and utility programs are available that are public
   domain. Basically, this means that the software is passed from user to user, or down-loaded
   from public access bulletin boards. Generally, there is little or no charge for the software.
   However, to register the software with the author or  publisher a small fee is  required.
   Often, this fee will allow technical support for the software, in addition to making program
   upgrades available.  Public domain software is not always up to the quality of commercial-
   ly available software; but will many times perform the functions that are needed by the
   user.  Even though the quality of public domain software is increasing, it is preferable to
   standardize network usage on commercially available software; because, if data is to be ex-
   changed with various organizations, it is more likely that the different users will be using
   the same commercial software than the same public domain software. However, if you
   decide to use certain public domain software on your network, it is suggested that the
   software be registered with the author or publisher so that technical support is available;
   as this will likely be needed when attempting to run public domain software on a network.
                                                                             F/3-3

-------
       ATTACHMENT F/3 - LICENSE AGREEMENTS AND
	COPYRIGHTS


F/3.1  LICENSE AGREEMENTS

        The use of application software in a network environment raises the issue of license
   agreements between the vendor and users. Because most available software is intended
   to run only on a single computer, and partly because networks have not been a major fac-
   tor in the past, many vendors do not have well defined policies regarding use of their
   software on a network. Software that is written specifically to run in a network environ-
   ment usually has a specific network licensing policy.
        Licensing policies for software that is intended to be run on a network will vary from
   vendor to vendor. Some typical vendor policies are described below.
        •  Some vendors will require that multiple copies be purchased, typically with
           progressive discounts.
        •  Other vendors will offer a one time site license, allowing either limited or un-
           limited use of the software.
        •  Some vendors do not discriminate between their single-user license and  a net-
           work license, allowing unlimited network use, so long as only one copy  of the
           software is available on the file server.
        •  Some vendors do not address the network issue at all, requiring vendor inquiries
           before attempting installation of the software on a network.
        Quite often, there is a correlation between the ability of a software package to run
   in a multi-user environment and the vendor's network licensing agreements.  If single-user
   versions of an application will run without problems on a network, the vendor is more apt
   to be lenient in licensing agreements. However, if modifications to the software were re-
   quired for the software to run properly with multiple users, the vendor will likely be more
   strict in licensing multiple use versions of that software. Four types of vendor license agree-
   ments and their implications for network usage are described below.

F/3.1.2 SINGLE-USER  LICENSES

        The vast majority of MS-DOS application software available is sold with a single-
   user, single-machine license. The software is intended to be used by only one user on one
   computer. If you install software with this type of license on a network, it may be used by
   only one workstation at a time without violating the license agreement Some licenses fur-
   ther require that the software be run on only one machine. In this case, the software my
   be run from only one particular workstation in order to conform to the license agreement
                                                                          F/3-1

-------
 LAN Technical Manual
 F/3.1.3  MULTI-USER  LICENSES

         Some vendors approach the issue of multiple users by charging fees according to the
    number of users. Some of these policies are based on an agreement that a maximum num-
    ber of users will access the software at any one time.  Other vendors provide multi-user
    versions of their software which count the number of currently active users and restrict ad-
    ditional accesses.

 F/3.1.4  SITE  LICENSES

        The site license arrangement usually requires the user to pay a fixed fee for the right
    for an unlimited number of users to use the software at a particular installation. The fees
    range from reasonable to very expensive, depending on the vendor. The use of a site license
    within an agency or department can save money in the long run, and will make it more like-
    ly that a particular application package will become standardized among the network users.
    Additionally, adopting a site license for a popular application package will allay any legal
    worries concerning multiple users.

 F/3.1.5  UNLIMITED  LICENSES

        A few vendors have taken the approach of allowing users to run their applications on
    networks without worrying about multiple user access. Typically, software that falls in this
    category will not have problems running on a network. The only restriction may be that
    only a single copy of the software may reside on the file server. This type of licensing ar-
    rangement is the most convenient and hassle free from a supervisory,  legal, and financial
    point of view. Often, this type  of agreement is not explicitly stated in terms of a license,
    but is covered in terms expressed by the vendor's copyright notice.

        Some vendors may or may not have special versions of the software allowing network
   use; however, many vendors suggest or require that additional manuals be purchased for
   the number of users that will be accessing the software  on the network.

F/3.2   COPYRIGHTS

        Almost all commercially  available computer software is protected by the United
   States copyright law. Most popular software is further protected by international treaty
   provisions.  Copyright statements are generally included within the documentation for a
   software package. The copyright statement will inform the user of the vendor's legal claim
   regarding copying the software and the use of information produced by the software.
   Violation of copyright laws is difficult to enforce; however, several vendors have made ex-
   amples of large corporations and agencies that have flagrantly  violated software
   copyrights.  In order not to violate copyright laws, you  must read the vendor's copyright
   **f\t-t <-i^
   notice.
   F/3-2

-------
                                                     Installation Guidelines • Attachments
   SPOOL
       Used to direct output to the print queue for network printers. SPOOL is used when
       you cannot send a file to a directly to a printer by using the NPRINT command. It is
       executed prior to running an application program that will send its output to a printer.

F/2.4  ADVANCED COMMANDS
   ATTACH
       Used to log in to additional file servers.
   CASTOFF
       Used to prevent your workstation from receiving messages sent from other worksta-
       tions of from the system console (via SEND or MAIL).
   CASTON
       Used to reverse the effect of the CASTOFF utility.
   FLAG
       Used to view or change a file's attributes; such as read/write vs. read-only, or share-
       able vs. non-shareable).
   SALVAGE
       Used to recover the file or files marked for deletion with the last ERASE command
       issued from your workstation.
   SEND
       Used to send messages directly to other workstations or to the system console.
   SLIST
       Used to view a list of file servers attached to the network.

F/2.5  SYS:SYSTEM   DIRECTORY
       The directory  SYS:SYSTEM contains the network operating system
   (NETSOSJiXE), along with certain server utilities that only the network supervisor should
   be allowed access. These utilities are fully described in the NetWare Supervisor Reference
   manual A brief description of the important utilities follows.
   HIDEF1LE
       Hides a specified file.  Hidden files will not show in a directory search, nor can they
       be deleted or copied.
   SHOWFILE
       Makes a file visible. Reverses the effects of HTDFFTTF.
                                                                         F/2-3

-------
    ATTACHMENT F/2 - NOVELL NETWARE COMMAND
	LINE UTILITIES

F/2.1  COMMANDS WITH  DOS  EQUIVALENTS
   CHKVOL (CHKDSK)
        Used to determine the amount of disk space allocated to a given volume, and how
        much of that space has been used.
   USTDIR (TREE)
        Used to view the directory structure of a specified volume, drive, or directory. It also
        displays the maximum rights mask and the creation date for each directory below a
        specified directory.
   MAP (PATH)
        Used to assign network drives to directories and to display these assignments.
   NCOPY (COPY)
        Used to copy files from one directory to another. This command is similar to the
        DOS COPY command, but is faster, because the copy is made directly on the serv-
        er, without being processed by the requesting workstation.
   NPRINT (PRINT)
        Used as a method of transferring a file to a network printer. NPRINT is the network
        equivalent of the DOS PRINT command. However, unlike PRINT, NPRINT allows
        several users to print one or more files on shared network printers, by means of "queu-
        ing."
   SYSTIME (TIME)
        Used to view a file server's current time and date, and to synchronize your worksta-
        tion clock with the file server clock.
   UDIR (DIR)
        Used to globally search through a directory or directories for a specified file or files.
   VOUNFO (CHKDSK)
       Used to see how much space and how many directory entries have been allocated for
       each network volume, and how much space and how many directories are available
       for use.

F/2.2 USER INFORMATION AND ACCESS COMMANDS
   HELP
       A facility to receive on-line help in using any of the NetWare command line utilities.
                                                                    F/2-1

-------
LAN Technical Manual
   LOGIN
        Used to identify yourself as an active user on a file server.
   LOGOUT
        Used to end a session from a workstation. When finished working on a server, you
        should always use the LOGOUT command, as the server will then perform main-
        tenance operations on any pending open files and erased files.
   RIGHTS
        Used to view your EFFECTIVE rights in a particular directory.
   USERUST
        Used to view a list of users who are currently logged into the network, or to view login
        information about a specific user or users.
   SETPASS
        Used to create or change your login password.
   WHOAMI
        Used to display your username, the file server(s) currently attached, your connection
        number,  and the date and time of your last login.  The connection number is
        automatically assigned by the server software to each workstation that logs in to the
        server. Numbers from 1 to 100 are used; when one workstation logs out, that num-
        ber is placed back in the pool of available numbers.

F/2.3  PRINTER  COMMANDS

   ENDSPOOL
        Used to close and print files saved with the SPOOL utility, when you are ready to ac-
        tually print a file.
   PURGE
        Used to permanently delete files which have been previously marked for deletion.
        It only purges files marked for deletion from the requesting workstation. This is dif-
        ferent from the ERASE command, which only marks files as being deleted.  The
        PURGE command actually removes the file's data from the disk.
   Q
        The Q command allows the user to quickly display the current status of jobs in the
        print queue.
   QUEUE
        The QUEUE command will perform several functions. They are:
        • list the print jobs in a printer's queue,
        • delete unwanted entries in the print queue,
        • display spool information for a specific printer.
   F/2-2

-------
                                                     Installation Guidelines • Attachments
        CHKDSK program to fix errors that are found in the directory or file allocation
        table.  If you receive any error messages during execution of the CHKDSK
        program, you should go back and re-format the hard disk (starting with Step 1).
        Refer to the DOS manual for a more detailed discussion of the FORMAT and
        CHKDSK utility programs.
     If you have access to the Norton Utilities, a set of utility programs published by Peter
Norton,  an additional test of the hard disk integrity may be performed  The Norton
Utilities includes a program called 'DISKTEST or 'DT. If you do have access, execute
the program by performing the following actions:

     1) Insert the Norton Utilities disk in floppy drive A:;
     2) At the C prompt, type 'A:DISKTEST C:' (or alternately, typing 'A:DT C:'.
     3) The DISKTEST utility will prompt for whether to check for F)iles, D)isk, or B)oth.
        Select B) for both, as this is  the more complete test The DISKTEST utility
        program tests a disk to ensure that it is not damaged and performs some damage
        repair. The D)isk option reads every part of a disk, whether it is in use or not
        The  F)ile test reads each file  and directory, checking only the parts of the disk
        which are in use. Every sector of the disk will be read. Any sectors that cannot
        be successfully read will be reported as errors.
     4) If you encounter any errors at this stage, it would be advisable to go back and re-
        format the hard disk as described in the steps above.
     If you have any additional hard disk utilities that will verify proper read and write
operations, now is the time to use them. Once the NetWare operating system has been in-
stalled on the  hard disk, such utilities will not work correctly on the hard disk, and will like-
ly damage the NetWare  operating system and all  files residing on the server hard disk.
Each of these tests can be executed several times if you wish. Many times, if new equip-
ment is going to fail, it will do so in the initial period of operation. Therefore, before
proceeding to install  the network operating system, perform as many tests on the hard disk
in an attempt to make it fail, if it is going to.
                                                                         F/M1

-------
                                                      Installation Guidelines • Attachments
       2) RENAME TEST - if file creation was successful
               Type:
               REN TEST1TEST2
           Successful file renaming will be indicated by no messages being displayed, the
           command line prompt will return. Unsuccessful file renaming will be indicated
           by an error message being displayed. Verify whether the user has Modify access
           rights to this drive/directory, and if the message was appropriate for these rights.

       3) DELETE TEST - if file creation was successful
               Type:
               DELTEST2
           Successful file deletion will be indicated by no message being displayed. Unsuc-
           cessful file deletion will be indicated by an error message. Verify whether the user
           has Delete access rights to this drive/directory, and if the message was appropriate
           for these rights.
       E. If an access attempt either works when it should not, or does not work when it
           should, login as the SUPERVISOR and execute the SYSCON utility to correct
           the inappropriate access rights for that user. It may be that a user is a member of
           a group that has incorrect trustee rights. In that case, correcting the group's direc-
           tory trustee rights will correct all users that are members of that group. Also, if
           you have modified the Maximum Rights Mask for a particular  directory, those
           rights will take precedence over trustee rights. After correcting trustee or Maxi-
           mum Rights Masks, attempt the same access that did not perform appropriately.
       F. Repeat steps A through E for each workstation and each user that was created on
           the file server.
       The tests outlined above are very simple, and take little time to perform.  Several
   benefits are obtained in completing these tests.  Each user's logon script has been verified
   as being set up properly. The proper security access of each user to each drive/directory
   mapping has been checked.  Perhaps most significant is the fact that by performing these
   test, you, as the LAN Administrator, have gained valuable experience in  using the server
   MONITOR program, recognizing NetWare error messages, and taking corrective action.
   The value to users is that network configuration problems have been addressed prior to
   using application programs on the network.

F/1.4  FILER SERVER CONFIGURATION • AT TYPE PCS

       The IBM AT and most AT compatible clones require that the hard disk, system clock,
   and I/O devices be configured before the computer can be accessed by any DOS programs.
   The process for using the SETUP utility can be found in the instructions accompanying
   your computer. General guidelines for configuring your file server with the SETUP utility
   are given below (the SETUP options may not appear in the sequence listed below):
                                                                           F/1-9

-------
LAN Technical Manual
        1) Insert the SETUP utility disk in floppy drive A: and turn the machine on;
        2) Set the correct date and time for the system clock;
        3) If your hard disk is 32 megabytes or less, select the option to partition the entire
           hard disk as one logical drive;
        3b) If your hard disk is 32 megabytes or greater, select the option to partition the
           hard disk into logical drives of equal size;
        4) Verify the correct  number of serial and parallel ports installed in the computer
        5) Write the SETUP configuration to the computer's non-volitle RAM.

F/1.5  FILE SERVER HARD DISK FORMAT

        Formatting the hard  disk is the process in which the the physical layout of the disk
   media is structured into logical components which are used by the operating system for
   storing and keeping track of the location of all information written to the disk. Novell Net-
   Ware requires that the server hard disk is configured by a utility provided by Novell (refer
   to Section 5 of this document for details).  However, before the NetWare operating sys-
   tem is installed on the file server, it is a good idea to verify that the server and server hard
   disk are operating properly. This can be accomplished by formatting the server hard disk
   for normal operation as a single user workstation, using the utilities provided with DOS.

        General guidelines for formatting the file server with DOS are listed below:

        1) Insert the DOS 32 (or greater) master diskette in floppy drive A: and  turn the
           machine on;
        2) Enter the correct date and time, if they are not correct, when prompted;
        3) At the A prompt, type 'FORMAT C: /S'. The FORMAT command will  proceed
           to format the file server hard disk. The VS' parameter instructs the FORMAT
           command  to copy the operating system to the hard disk  so that you can boot
           directly off of the hard disk. Depending on the size of your hard disk, the format-
           ting process can take from 10 to 40 minutes.
        4) When the formatting is complete, information regarding the hard disk formatted
           parameters may be displayed, and you will be returned to the A prompt
        5) Open the door to  the floppy drive and re-boot the computer by simultaneously
           pressing the Control-Alt-Del keys. In a few moments,  you should again be
           prompted with the date and time. The date and time should be correct If not,
           then use the SETUP diskette to reinitialize the system clock.

        6) Close the door to the floppy drive and, at the C prompt, type 'COPY A: V. This
           will copy the DOS programs to the root directory of the hard disk.
        7) At the C prompt, type 'CHKDSK C: /F. This utility will analyze the directories,
           files, and the File Allocation Table on the hard disk and produce a disk and
           memory status report The VF parameter on the command line instructs  the
   F/1-10

-------
                                                      Installation Guidelines - Attachments
             SYSCON Tasks
Rights
             List servers logged in to                Any user
             Logging in to additional servers         Any user
             Select the current server               Any user
             Change to a different user of
                         current server            Any user
             Logging out of a server                 Any user
             List known NetWare servers            Any user
             View NetWare server information       Any user
             List the server groups                  Any user
             Create/Rename/Delete a server group   Supervisor
             View a group's full name               Any user
             Assign/change a group's full name       Supervisor
             View a group's ID                     Any user
             List a group's members                 Any user
             Add a user to a group                  Supervisor
             Delete a user from a group              Supervisor
             Assign a group trustee rights in a
                         directory                 Supervisor
             Modify/delete a group's trustee rights    Supervisor
             Listing users                •          Any user
             Create a user on a file server            Supervisor
             Rename/delete a user                  Supervisor
             View your own full name               Any user
             Assign/change a user's full name         Supervisor
             View a user's group membership         Any user
             View/create/modify personal login script Any user
             View/create/modify any user's login script Supervisor
             View/modify the system login script      Supervisor
             Change your own password             Any user
             View/assign/change any user's password  Supervisor
             View your security equivalences         Any user
             Assign a security equivalence to a user   Supervisor
             Delete a user's security equivalence      Supervisor
             View your trustee assignments          Any user
             View/assign any user's trustee  rights      Supervisor
             Modify/delete any user's trustee rights   Supervisor
             View a user's ID                       Any user
Table F/12 Novdl SYSCON Function*


     The MONITOR program (covered in Appendix F of this guide and in the NetWare
Installation Manual) provides a convenient method of monitoring all network access at-
tempts by each workstation on the network. Because the network server and the network
workstations will likely be physically separate, it would be wise to ask the assistance of a
                                                                          F/1-7

-------
LAN Technical Manual
   co-worker during network testing to view the MONITOR display. The supervisor and as-
   sistant should coordinate each access attempt so that the assistant will know whether the
   appropriate message is displayed on the MONITOR screen. When an inappropriate mes-
   sage does occur, the supervisor should immediately take corrective actions and attempt
   the questionable access again. The SEND command can be used to send messages be-
   tween the server and workstations to inform each other whether access attempts work as
   expected

        Prior to performing user tests, create a MESSAGE.TXT file in the SYS:PUBLIC
   directory. The simplest way to create this file is to:
        •  log in as the SUPERVISOR
        •  use your word processor to create an ASCII file named SYS:PUBLJC\MES-
           SAGE.TXT, that contains a sample testing message, such as:
        This is a network test verification message.

        If you are using WordStar, create this file in non-document mode, Word Perfect users
   can save it as a DOS text file.

        In performing the server/user access tests, copies of the worksheets created should
   be available to both the server monitor and the supervisor as each workstation is checked
   out. As each access is attempted, it should be verified against the worksheets to ensure that
   the accesss attempt performed as indicated on the worksheet plans.

        The outline below should serve as a guide to performing access tests at each worksta-
   tion.

        A, Login to a workstation as the designated user for that workstation. If workstations
           do not have designated users, then sequentially log on various workstations as
           each user indicated on the SERVER USERS worksheet
        B. Verify that the login message appears, and that the drive/directory mappings are
           indicated on the screen as expected.
        C. Change the default drive to each mapped drive/directory. This is done by typing
           'O:' Return to change to drive O:, 'P:' Return to change to drive P:, etc. The fol-
           lowing steps should be completed for each logged drive.
        D. For each mapped drive, attempt to perform Create, Rename, Copy, and Delete
           access rights on a file. A simple method of performing these tests is as follows.
        1) CREATE TEST
               Type:
               NCOPY SYS J»UBUC\MESSAGE.TXT TEST!
           Successful file creation will be indicated by the message '1 file(s) copied*. Un-
           successful file creation will be indicated by an error message, such as 'File crea-
           tion error1. Verify whether the user has Create and Write access rights to this
           drive/directory, and if the message was appropriate for these rights.
   F/1-8

-------
                                                      Installation Guidelines • Attachments
   sages such as "When you see the above messages, skip to the subheading LOADING NET-
   WARE UTILmES ON HARD DISK ZERO." Because the INSTALL utility provides
   for various options during installation, depending on the configuration, you will be in-
   structed to proceed to one section or another. Presuming you are installing NetWare on
   an AT-compatible PC as a dedicated file server, as recommended, the sequence of events
   will be:
        1) run INSTALL,
        2a) select default parameters if not installing a remote workstation, or
        2b) select alternate parameters if installing a remote workstation,
               A) allocate a partition (initialize),
               B) define the server's printers,
               C) specify the maximum number of open files,
               D) specify the cache buffer size,
               E) define the hard disk volume(s),
        3) name the file server,
        4) load the system and public files (you  are prompted to insert the appropriate dis-
          kettes),
        5) write down install parameters,
        6) boot the file server (by simultaneously pressing CTRL-ALT- DEL), installation
          is complete.

F/1.2   ADDITIONAL MENU  UTILITY  FUNCTIONS

        Many additional functions are available through both the SYSCON and FILER
   utilities other than those listed  in Appendix E.  Because the SYSCON and FILER
   programs are located in the SYStPUBLJC directory, both regular users and the network
   supervisor can execute the programs. The tasks a user may perform and the screens shown
   in a utility are determined by the user's trustee rights. Some tasks may be performed only
   by a supervisor, who has all trustee rights in all directories at all times. The tasks available
   for both programs and the required user rights to perform each task are listed in Tables 1
   and 2.

F/1.3   MULTI-USER  SECURITY  VERIFICATION

        A practical approach to multi-user and security verification on the network involves
   logging in to each workstation under each of the login names created, checking access rights
   in each of the directories on the file server, monitoring these access attempts en the net-
   work server, and correcting inappropriate accesses as they occur.
                                                                          F/1-5

-------
LAN Technical Manual
                FILER Tasks                         Rights

                View current directory information      Any user
                Change directory date and time          Supervisor
                View effective rights in a directory       Any user
                View directory Maximum Rights Mask   Any user
                Change directory Maximum Rights Mask Parental
                View a directory's owner               Any user
                Change a directory's owner              Supervisor
                Add/delete trustees of a directory        Parental
                List files                              Any user
                Delete files                           Delete
                Rename files                          Rename
                View file attributes              .       Any user
                Add/delete file attributes               Modify
                Copy a file                            Open/Create/Del
                View a file's creation date               Any user
                Change a file's creation date             Supervisor
                View a file's last accessed date           Any user
                Change a file's last accessed date         Supervisor
                View a file's last modified date/time      Any user
                Change a file's last modified date/time    Supervisor
                View a file's owner                     Any user
                Change a file's owner                   Supervisor
                View a file's size                       Any user
                View a file's contents                   Read/Open
                View/change the current directory path   Any user
                Display General Defaults Menu          Any user
                Specifying file copy/delete confirmation   Any user
                Specifying file overwrite confirmation     Any user
                Specifying directory in/exclude patterns   Any user
                Specifying file in/exclude patterns        Any user
                Add/delete file search attributes          Any user
                Rename a group of subdirectory names   Modify/Parental
                Rename/Delete subdirecties & names     Delete/Parental
                Add subdirectories                     Create/Parental
                View subdirectory creation date/time     Any user
                Specify Maximum Rights for multiple dirs Parental
                Specify owner for multiple subdirs.       Parental
                View a subdirectory's Maximum Rights   Any user
                Change a subdirectory's Maximum Rights Parental
                View a subdirectory's owner             Any user
               Change a subdirectory's owner       .    Supervisor
               Add/Delete trustees of a subdirectory     Parental
               View volume information	     Any user
  Table F/1.1 Novell FILER Functions
  F/1-6

-------
                                                     Installation Guidelines - Attachments
than one partition are: 1) you want to use the server as a workstation when it is in DOS
mode; or 2) you may sometimes wish to use the server as a stand-alone computer. In both
of these cases, some of the hard disk must be set aside as a DOS partition. After installa-
tion is complete, the network partition cannot be changed without destroying the files on
the hard disk (i.e., files must be backed up, the partition reallocated, then the files must be
restored).  It is strongly recommended that the entire hard disk be allocated into only one
partition.  Allocating a single partition will make the installation process much simpler,
and the performance throughput for the network server will likely be greater.
     A partition can be thought of as the physical component of the server's hard disk.
Once a partition has been allocated for NetWare, that partition can be divided into logi-
cal components, called volumes. The logical components, or volumes, can be accessed by
the user as MS-DOS drives. Thus, if a partition is divided into two volumes, then a user at
a workstation would be able to access two drives (F: and G:) on the network server. When
a volume is defined, the volume name and the volume size must be specified. The first
volume on a disk must always be named 'SYS' (and is also known as hard disk 0); addition-
al volumes on a disk must conform to MS-DOS naming conventions, but are otherwise user
selected. The size is specified in terms of the number of megabytes to allocate to a volume.
A volume's size cannot be changed once it has been defined. One reason to specify several
volumes on the hard disk might be for grouping together similar programs or data; however,
the MS-DOS environment provides for the use of directories as a convenient method of
organizing programs and data on a drive (volume). Since NetWare provides security at
the directory level, there is little reason to divide a single hard disk into more than one
volume.

     Since NetWare does not act as a device driver for MS-DOS, but rather, is an operat-
ing system unto itself, the methods for storing and accessing information on the volume(s)
must be defined. These parameters include the cache buffer size, maximum number of
open files,  the number of directory blocks for a volume, and whether to cache the disk's
directory. Any or all of these four parameters can be modified at a later time without af-
fecting files on the disk. The default settings for these four parameters will most Likely suf-
fice for any particular network environment. However, to clarify their meaning, a brief
description of each parameter follows.
     •  The cache buffer size determines how much information is transferred on each
        disk I/O.  On a server PC with 640 kilobytes of RAM, the default buffer size of
        4096 bytes will generally improve performance throughput by performing fewer
        disk I/O's. On a server PC with only 512 kilobytes of RAM, 2048 bytes of cache
        buffer is the largest allowed.
     •  The maTimnm number of open files will depend on several factors. The number
        of workstations on the network, along with the type of application software each
        workstation will be running will determine the  number of open files required.
        File intensive applications such as dBase or many accounting programs will like-
        ly need to have several files open simultaneously; while spreadsheet program*
        such as Lotus will tend to only be working with one file at a time. Also, since each
        open file  will consume 40 bytes of memory in the server, the number must  be
                                                                         F/t-3

-------
LAN Technical Manual
           weighed against the cache buffer size. On a server PC with 640 kilobytes of RAM,
           Novell suggests starting by allowing 100 open files, and adjusting if necessary. On
           a server PC with only 512 kilobytes of RAM, 32 is an acceptable number of open
           files.
        •  Since the difference between the cache size and number of open files is significant
           on 512K machines versus 640K machines, it is strongly suggested that your net-
           work server be upgraded to 640K, if not already. The price of RAM in a PC is
           negligible compared to the investment in the networking hardware and software,
           and will greatly improve overall performance on the network.
        •  The number of directory blocks refers to the amount of disk storage to set aside
           as space specifically for directory entries (files).  Each directory block will hold
           128 files; and Novell suggests that five blocks (or 1024) entries for each two
           megabytes of volume size is sufficient Thus, if 40 megabytes were assigned to a
           volume, then 100 directory blocks would be appropriate.
        •  Caching a directory simply means that the directory information will be kept in
           the server's RAM memory. This will result in the software being able to locate
           any particular file much faster than having to re-read the data from disk.
        The network server's shared, or spooled printers will be used by all of the worksta-
   tions as if the printers were attached locally to each workstation. Each file server may have
   as many as five network printers attached. At most, two of them may be serial printers,
   and three of them may be parallel printers.  The default settings will allocate all of the net-
   work server's serial and parallel ports as printer ports. If you configured your operating
   system for remote workstations, then you must reserve the appropriate number of serial
   (COM) ports you selected when you configured the NetWare Remote software. For ex-
   ample, if your system has two serial and two parallel ports, and you specified one port during
   NetWare Remote software configuration, then you would specify one serial port as a
   printer port  NetWare will automatically assign the parallel ports as printer ports. The
   default communication parameters for serial printer ports are outlined above.  Most serial
   printers have DIP type switches to allow setting the communication parameters. If your
   serial printer is unable to be adjusted to these settings, then you  will need to modify the
   default communication parameters to suit those of your printer(s). The parameters for
   each printer may be adjusted individually.

        Almost all networks will be able to use the default settings for initializing the net-
   work server.  The most likely exception will be the case where a remote workstation is
   planned to be attached.  Whether or not you use the default settings, or customize your
   network, when you finish initializing the server and loading the NetWare utilities, the IN-
   STALL program will display a screen of the NetWare parameters chosen. You should
   write these parameter values on a form  (one is provided with the NetWare manual), and
   keep  this form secure and available for  future reference should you ever need to modify
   the server or repeat the entire process.

        The chapter in the NetWare manual on initializing the network software is a step by
   step guide for using the INSTALL utility.  It is rather important that you read each word
   in the manual as you proceed with the installation. Particularly, at times there will be mes-

-------
    Attachment F/1 - NOVELL NETWARE PROCEDURES


F/1.1  INSTALLING AND CONFIGURING SERVER SOFTWARE

       Before you begin installing the network software on your server, please make copies
   of all the NetWare distribution diskettes. One of the most exasperating experiences is to
   overwrite or ruin one of the original diskettes, and find that you must wait days to receive
   new copies of the diskettes before you can proceed.
       An INSTALL utility program (on the NetWare 286 Install diskette) is provided that
   will automate most of initializing process. There are two methods of using the INSTALL
   utility: 1) to use the.recommended default parameters; and 2) to customize the parameters
   to your  particular hardware environment  Using the default parameters is by far the
   simplest method of completing the network software initialization process.  However,
   there are basically two occasions on which you may wish to customize the installation
   process. If you intend to add a remote workstation to the network, or if you wish to allo-
   cate only part of your server hard disk to the network, then you must customize the instal-
   lation by typing the appropriate responses for parameters when prompted by the INSTALL
   program.

       Three conditions must be met before using the INSTALL program.
       A) Your AT-compatible PC (such as the Epson Equiity ffl + available from FDC)
   must have already been configured using the SETUP program provided with the computer
   and formatted with MS-DOS using the 'FORMAT C: /S' command. To be sure there were
   no errors in formatting your hard disk, use the DOS command 'CHKDSK C: /F.  If the
   CHKDSK command indicates that you have 'Bad' or 'Lost Ousters' then go back and re-
   format the hard disk using the 'FORMAT C: /S' command.
       B) Your server hard disk must be properly formatted using the NetWare COM-
   PSURF utility program. Use of the COMPSURF program is outlined in Chapter 2 of the
   NetWare 286 Maintenance manual
       C) If you are installing the SFT NetWare 286 (any Level) with the NetWare Trans-
   action Tracking System (TTS), you must run the NetWare PREPARE utility program to
   allocate space and set up files for the Tracking System,  The PREPARE program is out-
   lined in the SFT NetWare 286 Installation Supplement
       Note that the sequence of events is:
       1)  use the SETUP utility and format using the DOS FORMAT command,
       2)  run COMPSURF,
       3)  run PREPARE (if applicable), and then
       4)  run INSTALL.
                                                                      F/1-1

-------
LAN Technical Manual
        Use of the INSTALL utility program is described in Chapter 2 of the NetWare 286
   Installation: Part II manual Basically, the INSTALL program will do several things to
   prepare the server for network use. These are:
        1) allocate a partition for NetWare on the PC/AT hard disk,
        2) divide the partition into one or more volumes,
        3) initialize the volumes with the directory structures used by NetWare, and
        4) define and configure the server's printers.
        5) name the file server
        6) load the network utilities
        When the INSTALL program is run, you will be asked whether-to accept the default
   parameters for initializing the network server. If you accept the default parameters, the
   entire process will be done for you automatically.  If you do not accept  the default
   parameters, then you must answer questions for each of the parameters. It is strongly sug-
   gested that, unless you will be using a remote workstation on the network, accept the default
   parameters suggested by the INSTALL program. The NetWare default parameters are:
           Partition size - the entire disk
           Cache buffer size - 4096 bytes
           Number of open files - optimized for available memory
           Number of directory blocks - optimized for disk space
           Directory caching - yes
           Spooled printers
           -  all serial ports, all settings at:
           -  9600 baud
           -  Parity disabled
           -  1 Stop bit
           -  8 Data bits (Word length)
           -  No handshaking (XON/XOFF disabled)
           -  all parallel ports
        The paragraphs below briefly describe the NetWare initialization parameters, and
   how they will affect your system's performance. Note that the parameters that do not in-
   volve allocation of disk space can be modified at a later time without affecting information
   residing on  the disk.

        A partition on a hard disk is the method by which the operating system, in this case
   NetWare knows how much, or what percentage, of that hard disk can be used by the operat-
   ing system.  This means that more than one operating system can reside on a hard disk. If
   that is the case, the hard disk is known as a 'non-dedicated' server, because the entire hard
   disk is not 'dedicated* to one operating system. For the purposes of this discussion, the en-
   tire hard disk will be allocated into one partition for the purposes of running NetWare;
   and will  thus become a 'dedicated* server.  Two reasons you may desire to allocate more
   F/1-2

-------
                                                                  Installation Guidelines
   through the manuals that accompany these devices to ensure that they have been installed
   in the PS/2 according to the instructions.
        If purchased from a non-SMA source, the Tape Backup hardware and interface card
   should be installed in the file server according to the instructions.  Additionally, the Tape
   Backup Adapter/A support diskette should contain configuration files for use in configur-
   ing the PS/2 Program Option Select feature.  These files should be copied to the IBM
   Product Two Diskette (reference diskette). The system should then be re-booted from the
   Product Two diskette for configuring the micro-channel operation.

F.8.2 Installation of SY-TOS Backup Software
        If the  file server is purchased from the SMA contract, the software for use with the
   IBM 6157 Tape Backup System, SY-TOS, should be pre-installed on the file server. If the
   system  is purchased from a non-SMA source, the software needs to be copied to a direc-
   tory that is available only to users with Supervisor Effective Rights. This software should
   not be available to users not responsible for backing  up the network. If additional backup
   software configuration is required, it may be purchased as a Server Installation service from
   SMA.
F.8.3 Testing the File Server Backup System
F.8.3.1 Backing Up to Tap*
        The SY-TOS software should be executed only by a person who is familiar with the
   network console operation. It should never be executed while other workstations are ac-
   tive on the  network. The proper procedure for backing up the network file server is to
   issue the following commands from the network console:
        (1) BROADCAST   "Network will be shut down in 5 min. for backup" (followed by
           the 5 minute period to allow users to gracefully save work and exit their applica-
           tions.
        (2) Execute the SY-TOS software to backup the network file server
        The SY-TOS software allows two modes of operation: file- by-file backup, and image
   copy. The file-by-file copy provides the option to back up only those files modified since
   the previous backup. The recommended procedure for system backup is as follows:

        (1) A full system backup should be made initially
        (2) Two (or preferably three) tapes should be dedicated for file-by-file backup.
           These tapes should be alternated in the "grandfather- father-son" method of back-
           up.  For example, the following scenario might  be followed for  a three tape
           backup procedure.
                Week 1     Tape 1
                Week 2     Tape 2
                Week3     Tape 3
                Week 3     Image copy (separate tape)
                                                                             F-81

-------
LAN Technical Manual
                Week 4    Tape 1
                WeekS    Tape 2
                Week 6    Tape 3
                Week 6    Image copy (separate tape)
             ...and so on.


        The tapes themselves should not be stored near the file server unit If a disaster oc-
   curred which destroyed the server, the tapes should be available to restore the file server
   when replacement equipment is installed.
F.3.3.2 Restoring From Tap*
        Two methods are provided with the SY-TOS software for restoring to the file serv-
   er, file-by-file and image. The purpose of using either method depends on the need for
   restoring.
        It is a fact of life that at some point in a hard disk's lifetime, partial or severe corrup-
   tion of data or the media may occur. This is the reason for backups. If the file server hard
   disk becomes corrupted, a complete image restore, possibly following the reconfiguration
   of the NetWare operating system, may be required to bring the system back on line.  Image
   restores from tape will recreate the file structure on the file server that existed at the time
   of the previous image backup. The use of an image restore is usually the last resort in resur-
   recting a hard disk, and should only be performed as such.
        File-by-file restores can be performed in regard  to specific user's needs. For ex-
   ample, a user may request that a previous version of a document be restored to recover in-
   formation that was deleted accidentally. Also, if file-by-file backups are performed in
   order to archive certain data sets, they may be retrieved using the file-by-file restore fea-
   ture in order to access the previously archived data.
        Backups of data, especially on a file server with multiple users, are a critical part of
   system maintenance. Most experienced users agree that it is not if your hard disk goes
   down, but rather when it goes down.  Consistent and frequent backups provide a sense of
   security, not only for the LAN Administrator, but for all users on the network.
        We hope that you will not need to use the tape restore frequently. However, due to
   the critical nature of the backup, it is recommended that a test of the backup system be
   performed on a regular basis. Even if the backup/restore system works when initially in-
   stalled, it is possible for one or more of the hardware or software components to malfunc-
   tion. A simple test, performed periodically consisting of copying some files into a dummy
   directory, backing them up on tape, deleting the files from die server, then restoring them
   from tape, will ensure the proper operation of the backup system on a continuing basis.
   F-82

-------
                                                               Installation Guidelines
     Alternate methods for sharing the available Work Authorization Disks among a
greater number of users are available and involve maintaining the IWSKEY.BIN and flag
files in a public directory rather than in the user's private disk space. The method used in
Region 4 works satisfactorily.  It depends upon several criteria being satisfied first. The
LAN Administrator must construct the appropriate LAN disk hierarchy, create user login
scripts which will map the first search drive to SYSrPUBLIC and the second search drive
to the DOS corresponding to the user's personal computer, build batch files, and include
a STAFFLOG.DAT file in the login script Attachment 4 provides a facsimile of the
Region 4 files. These files can be readily adapted to the specific configuration of the LAN.

• Test SNA/SDLC Gateway
     The arduous preparation of the gateway begins with the planning and development
of the TSR and culminates with this the testing phase. If the procedures for configuring
and loading the hardware and software have been followed, the test procedure will proceed
rapidly and without problems.  Before attempting to test the gateway, the LAN status
should be rechecked. If the gateway is to be installed on a new LAN, it is advisable to begin
the gateway testing with only the file server, the gateway server, and one workstation. Until
the gateway and one workstation have been successfully tested, it is not advisable to con-.
figure the remaining workstations.                                               -y
     The first step should be to confirm with telecommunications that the gateway has
been configured as specified in the TSR. This step should be accomplished in advance of
the testing and telecommunications should be alerted to the gateway testing schedule.
     The second step is to configure the software for the gateway server and workstation
control programs as discussed earlier. This is followed by loading the software onto the
file server as indicated. Determining the best implementation for the specific LAN in-
cludes adapting/adopting a method of invoking concurrent workstation users without
violating the copyright of the  software. The Region 4 batch files have been included to
demonstrate one method of implementation. The LAN administrator may determine that
all workstations are to be treated equally; i.e, there is no administrative workstation. He
can also decide to bypass copying some workstation files into the user's directory such as
the profile save and restore files. The particular LAN configuration can have other than
one host and one printer session per workstation. Once these factors have been deter-
mined and the software configured and loaded, the hardware installation can proceed.
Note that the installation must conform to the TSR,
      There is only one hardware item to be installed on the LAN - the SNA adapter. It is
recommended that this be installed in a dedicated workstation. When configured, the LAN
administrator assigned an interrupt for the adapter. Usually interrupt level 3 is chosen (in-
terrupt level 2 is reserved for the token-ring adapter required for the LAN). Configure
the adapter switches to reflect the interrupt level selected and install the adapter. Con-
nect the adapter to the modem or to the null-modem to provide the data path to the LMF
 or IBM 3090 mainframe. This step likewise requires planning and a TSR for proper im-
plementation. A special IBM cable will be required if the installation is directly connected
                                                                          F-79

-------
LAN Technical Manual
   to the LMF without modems (see INSTALL THE PCOX REMOTE INTERFACE
   BOARD above).
        Telecommunications should be called to have them at ready to bring the telecom-
   munication line up. The next step is to load and execute the gateway software.  Telecom-
   munications personnel will verify that the gateway has been established and that the line
   is active. If problems occur, telecommunications will be able to assist in detecting and cor-
   recting the problems. NetView will be used to monitor the line, determine the status of
   the emulated controller, and inform the LAN administrator when the workstation is being
   polled. The CXI PCOX gateway thoroughly emulates an IBM 3274 controller; it must be
   treated as one which means that occasionally the line has to be dropped, the controller
   reset, and on rare occasion, the power must be turned oft. Corresponding actions with the
   gateway software include having  the telecommunications personnel drop the line, reac-
   tivate the line, and having the LAN administrator reboot the gateway server.  Normally,
   the gateway PC remains up and running, as does the file server. When the gateway has
   been turned off or rebooted, the gateway must be restarted before any workstations are
   brought up. If workstations are connected when the gateway is taken down, these also must
   be reinitialized by  rebooting and executing the Workstation Control Program.
        When a good line is established, the first workstation's software can be loaded and
   executed.  Assistance as described in the preceding paragraph may be required to estab-
   lish the line the first time. Thereafter, this process will be routine and transparent to the
   workstation users.  Following successful mainframe connections with the first workstation,
   the remaining workstations should be activated to ensure that concurrent operations (to
   the limit of the license) can be performed. The PCOX software has tutorial software which
   will enable the LAN administrator and workstation users to familiarize themselves with
   the software before the gateway is installed. This software does not require the physical
   link to execute the tutorials.

F.8   BACKUP

        One of the benefits of using a network as described in this document is that backing
   up the programs and data that is stored on the file server involves only one operation; as
   opposed to performing a similar operation for each workstation. However, if workstations
   also have a hard disk, programs and data on the workstation's disk drive(s) should also be
   backed up. Backing up information resident on local workstation drives is outside the
   scope of this document, and users should refer to the appropriate documentation for back-
   up procedures.
F.8.1 Installation of Tape Backup Hardware
        The IBM 6157 Tape Backup System and IBM Tape Backup Adapter/A comprise the
   hardware components of a tape backup system that is DC-600 compatible. The hardware
   should arrive with  all jumpers and switches pre-configured for LAN operation.
        If the file server package is purchased from the SMA contract, the IBM 6157 Tape
   Backup System and Adapter/A interface card should arrive pre- configured by SMA. Read
   F-80

-------
                                                               Installation Guidelines
 the customizing screens will indicate choices that depend on the settings for the host con-
 nection. For example, the SDLC encoding, normally NRZ, depends on the configuration
 of the 3705/3725 port Table F.I indicates relevant information for various screen panels
 and shows EPA recommended settings.

 •  Install and Configure Workstation Users' Disks
     Files on the Workstation Users' Disks allow the following functions to be performed.
     (1) Operation of the gateway Workstation Control Program, which includes:
        - Loading the Workstation Control Program;
        - Unloading the Workstation Control Program;
        - File Transfer between Workstations and Host Sessions.
     (2) Support of resident applications in the workstations, in particular
        - PCOX 3270 Series Application Program Interface (API);
        - CXI subset of the IBM 3270 API;
        - IRMASUBS BASIC Subroutine Interface.
     Only one executing copy per Workstation Authorization diskette is allowed.
     To install the Workstation User's Disks for use on the network, the Workstation Con-
 trol Program files must be copied to a public directory on the LAN file server. The files
 that need to be copied to the public directory are:
     CXIWS70S.EXE Workstation Control Program (no print)
        or
     CXIWS70P.EXE Workstation Control Program (with print)
     (The difference between the "S" and "P" versions is that "S"=no printer session, and
 "P"=with printer session).
     CXISTD l.MAP  U.S. English Keyboard/Display File
     CXTOSTD1.XLT U.S. English EBCDIC/Buffer Code Table
     CXIPSTD1.XLT  U.S. English EBCDIC/ASCII Table

     After the files have been copied, the Workstation Control Program must be cus-
 tomized.
     The PCOX Workstation Control Programs are much easier to configure than the
 Network Server Control Program. There is no hardware interface customization,  as all of
 these are controlled by the Network Server Control Program. Instead, there is a Worksta-
 tion Customization panel, used to define the workstation to server connectivity. Worksta-
 tions can be customized for a PC session, up to two notepads and one to five host sessions.
 Host sessions can be 3278/79 display sessions (LU Type 2), or 3287 printer sessions (LU
 Type 1).

     To customize the Workstation Control Program, enter the  command CXICFIG
program-name, where program-name is the name of the Workstation Control Program
                                                                        F-75

-------
LAN Technical Manual
                                                 Settings
Comments
      • Hardware Customization Panel
               Interrupt Level for Interface Board      3
               SDLC Encoding                     NRZ
               I/O Port Address                    380
               Memory/Plus Board in PC             Yes

      • SDLC Control Unit Option Customization Panel
               Invalid Codes Return as Op Chk        Yes
               SDLC Control Unit Address           01
               PUID                             00000

      • Network Server Customization
               Unique Server (Node) Name           GS1
               Total Number of Host Sessions         16
               Number of Polling Dispatch Cycles      2000
               Network Transmission Timeout (in sees) 60
               Number of NCBs to Reserve           8
IfTRNisl
Per Telecom

IfTrue
Per Telecom
Per Telecom
Per Telecom
Arbitrary
Per package
Per Telecom

Per CXI
      • Local Address Type Definition Panel
               Local Address Type (2 = display, 1 = printer)
               Model (for Type 2, the 3270 emulation mode)
               Access Code (maintained by the customization program)

      • Configure Workstations

        WS1, WS2, WS3, WS4, WS5, WS6, WS7, WS8 as Model 2 Displays with one Hos
    Session and one Host Printer Session. Ergo, the following:
               ACCESS    LOGICAL UNIT
               CODE      ADDRESSES
               WS1        02  03
               WS2        04  05
               WS3        06  07
               WS4        08  09
               WS5        OA OB
               WS6        OC OD
               WS7        OE OF
               WS8        10  11
   Table F.I CXI Configuration Parameters
   F-76

-------
                                                           Installation Guidelines
The LAN Administrator should configure the eight authorized workstation files as "WS01",
"WS02", etc. rather than individual user names.
     Table F2 shows the display panels and parameters necessary for completing a single
workstation customization procedure; the other workstation customizations are similar.
•  Workstation User Files
     Each user on the network should have a private directory set up, either on the LAN
file server, or on local hard disk, in order to access files and data particular to each user's
host sessions. The following files should be copied to each user's private directory.
     CXISAVE.REC   These files contain the user's
     CXISAVE.AUT   saved Autokey recordings, notepad,
     CXISAVE.NOT   and screen profiles.
     CXISAVE.SCR
     IWSKEY.BIN   Unique Workstation Authorization file
     The following files should be copied to the common, public directory that will be ac-
cessed by all gateway users.
     CXIEXIT.EXE  Workstation Unload Command
     CXISAVE.EXE   Screen/Notepad/Autokey Save Command
     CXIRSTR.EXE   Screen/Notepad/Autokey Restore Command
     IWSCTRL.EXE   Workstation Control Initialization Overlay
     FTP.EXE     File Transfer Program
     FTBFG.EXE    File Transfer Batch File Generator
     SEND.EXE    IBM-compatible SEND Command
     RECEIVE.EXE   IBM-compatible RECEIVE Command
     PCRESET.EXE   LAN Adapter Reset  Command
     PCSTAT.EXE   Workstation LAN Adapter Status Command
     CXIWS70S.EXE  Workstation Control Program (no print)
     CXIWS70P.EXE  Workstation Control Program (with print)
     IKYBD.EXE    CXI Standard Keyboard Driver
     Additionally, batch files should be created for each user that will automate the fol-
lowing procedures:
     •  Change to the appropriate private directory;
     •  Load the correct Workstation Control Program; and
     •  When finished, unload the Workstation Control Program.
                                                                     F-77

-------
LAN Technics! Manual
                                                   Settings
            Comments
        Workstation Customization
               Unique Workstation (Node) Name
               Up to 4 server names
S01(...WS08)
GS1
               Access Code for Server Local Device Pool WS1
               Is a Memory/Plus Board installed?       No
            (..WS8)
            If True
        General Session Customization
               Is PC Session desired
               Number of Notepads desired
               Number of Host Sessions desired
               PC Session Name
               Notepad 1 Session Name
               Notepad 2 Session Name
Yes
Two
Two
A.PC
B.NOTEPAD1
QNOTEPAD2
(One Printer)
        Host Session n Customization (n = session number)
               Session Logical Unit Type (1 or 2)       LU Type 2
               Host Session Name                   D.HOST1
               Session Screen Size (Model Number)    Model 2 (24x80)

        Host Session n Customization (n = session number)
               Session Logical Unit Type (lor 2)       LUTypel

        API Interrupt Customization
               Interrupt Number for API              111

        Character Translation Customization
               Language for keyboard character set     CXI
               Source of Keyboard translation tables    U.S. English

        Printer Customization Panel
               Enter LPT1 Escape Sequence:
               Enter LPT2 Escape Sequence:

               Enter LPT3 Escape Sequence:

               Enter COM1 Escape Sequence:

               Enter COM2 Escape Sequence:
6 Line/In:
8 Line/In:
6 Line/In:
8 Line/In:
6 Line/In:
8 Line/In:
6 Line/In:
8 Line/In:
6 Line/In:
                                                   8 Line/In:
               EBCDIC/ASCH Translation Table File Name: CXDPSTDl.XLT
        * Generally the default value can be accepted; the printer to be used determine
    hese values.
   Table F.2 PCOX Workstation Customization Parameters
   F-78

-------
                                                                  Installation Guidelines
F.7.3.1 Install, Configure, and Test the SNA/SDLC Communications Server (SNA Gateway)

   •  Generate and Configure 3274 Port on Mainframe
        The configuration of the 3274 port is dependent upon local needs and associated
   hardware. The presence and number of host print sessions, the number of concurrent ses-
   sions to be active per workstation, the total number of sessions available with the gateway,
   and the number of concurrent workstation users determine the configuration. A typical
   EPA configuration for the LAN 3270 gateway is eight users, each of which has a mainframe
   host session and a printer session. In addition to the elements of session configuration, the
   method of connecting the gateway port to the mainframe is an important consideration.
   The connection can be a remote connection via a synchronous modem using telephone
   services or it can be directly attached to a local mainframe (LMF) via a modem eliminator
   and attendant cabling.  The planning activity includes the preparation of a TSR for the
   gateway. This must be done by the LAN designers/planners.  The TSR must be submitted
   with the LAN Plan so the proper interfaces will be available when the LAN is installed
   Telecommunications will gen the gateway controller from the TSR.

   •  Install and Test SNA/SDLC Communications Gateway
        The CXTs PCOX gateway product consists of a hardware component and a number
   of software components. The hardware component is an interface board, which resides in
   a workstation whose role will be that of Gateway Network Server. The interface board al-
   lows attachment of the server as an IBM 3174 or 3274 controller remotely to an IBM 3725
   FEP. It can be attached via communications link or modem to a remote IBM or compatible
   host

   •  Install the PCOX Remote Interface Board
        The CXI interface card is designed to reside in any slot on an AT type compatible
   bus. Current CXI interface cards are self- configuring, require no jumper settings, and
   conform to the existing hardware in the  gateway server. The interface card may require
   an I/O address setting via a DIP switch. Refer to the CXI documentation for appropriate
   DIP switch settings.
        The CXI gateway is supplied with a modem cable. If not connecting the board to a
   modem (DCE device), a null-modem cable may be necessary to attach to another DTE
   device. To directly connect to a LMF (Logical Mainframe), IBM Type A PN # 7837395
   (ECOA 39478) cable must be separately ordered. After connecting the cables to the ap-
   propriate devices, the board installation is complete.

   •   Install and Configure Gateway Software
        The PCOX software is distributed as two sets of disks.  These include the LAN
   Administrator's Disks, and the Workstation Users' Disks. A  set of Workstation Users'
   Disks is provided for each port; i.e. from the SMA contract, eight sets of Workstation Users'
   Disks are provided. The installer should verify the contents of each of the diskettes
   provided by checking the files listed in the documentation with those on  the diskettes.
                                                                             F-73

-------
LAN Technical Manual
   Please note that each Workstation package includes a single diskette, containing a unique
   and encrypted User Authorization file. Thus, software for each workstation must be in-
   dividually configured and have a unique workstation name and access code. The LAN ad-
   ministrator will be responsible for configuring the workstation unique files so that eight
   simultaneous users can be active without regard to which workstation authorization file is
   associated with what user.  (Region 4's implementation follows later in this section).
        Nota Bene: Currently installed 3270 SNA gateways using CXI PCOX software have
   known software problems which have attendant patch diskettes. Release 12 of the
   PCOX/GATEWAY-16 control software and Release 13 of the PCOX/GATEWAY-16
   workstation software require PATCH 017, all diskettes. Releases after 12 require patches
   to the workstation products and the miscellaneous files software but not to the control
   software. Therefore, do not use the PATCH 017 diskette labeled "Gateway-16 Fix for use
   with Novell 12A- Affected Products: PCOX/GATEWAY-1612" for later releases. Con-
   tact SMA or NDPD before using these or other early CXI PCOX gateway releases.
         •  LAN Administrator's Disks' Functions
         Files on the LAN Administrator's Disks allow the following functions to be per-
   formed.
         (1) Customizing the gateway Network Server Control Program.
         (2) Operating the gateway Network Server Control Program, including:
            -  Loading the board-level code;
            -  Establishing sessions with the host and workstation;
            -  Monitoring the operation and status of gateway; and
            -  Unloading the board-level code.
         Only one executing copy of the Gateway Network Server Control Program is allowed
   by the license agreement for each copy of the gateway package.

    • Install and Configure the LAN Administrator's Disks
         The LAN Administrator should logon the network as the network supervisor to per-
   form the following functions. All of the files on the LAN Administrator's Disks should be
   copied to the network file server. An appropriate common or public directory should be
   set up  to  contain these files. An example of such a  common directory might be:
   SYS:PUBLJC/CXI.  Details of customizing the Network Server Control Program can be
   found in Chapter 12 of the PCOX 3270 Series Administrator's Guide. The following dis-
   cussion should be viewed as an overview of the functions of the installation procedure.
         Enter the command CXINSFIG CXIGS74A; where CXIGS74A designates the name
   of the Control Program to be customized. A copyright screen will indicate the version of
   the program running, and prompt for a *Y* to continue.
         Upon continuing, the next screen screen displays the hardware customization panel
   Additional screens for various functions relating to the network file server, gateway serv-
   er, communications link, and host configuration will be displayed. Each of these requires
   parameters which should be specified according to the particular configuration. Some of
    F-74

-------
                                                              Installation Guidelines
        -  PCOX/REMOTE Synchronous Serial Interface;
        -  PCOX3270-FT Software;
        -  Eight copies of PCOX/ONE LAN Version, for use with eight simultaneous
           users on the network.
     •  Additionally, the SMA contract allows for single copies of the following software
        to be purchased:
        -  PCOX-ONE LAN Version;
        -  PCOX3270-FT Utility.
     Through emulation hardware and software a workstation on the network can per-
form the same functions as the 3270 terminal  Additionally, the network workstation can
receive and store files from the host computer, modify or reformat display data, run local
application programs, and send the output to the host computer.
     The host computer for an IBM 3270 emulation session can be a IBM System 370,
IBM 308X, or IBM 43XX processor. The 3270 LAN gateway operates over a local or
remote SDLC line and appears as an IBM 3274 controller to the host Because the 3270
emulation is a type of gateway, virtual circuits are established between the host and the
network workstations.
     The emulation software allows the network workstation to look as either the 3278 or
3279 terminal The 3278 Model 2 display is compatible with the normal PC display, with
24 lines by 80 characters. The 3278 Model 3 has a 32-line display; and the Model 4, a 43-
line display. To handle more lines or columns than will fit on the workstation display, the
emulation software provides scrolling with the cursor control keys. EPA recommends con-
figuring the workstations as IBM 3278 Model 2 terminals although EGA monitors are
capable of handling the screen capacities of Model 3 and Model 4 terminals.
     The 3279s are color terminals. The 3279 display resolution is higher than typical per-
sonal computer display resolutions. Therefore, to use the 3279 emulation on a network
workstation, the 3279 text mode should be used instead of the graphics mode. Alterna-
tively, a 3270 Personal Computer monitor can be attached to the network workstation.
     All of the keyboard functions of the 3278/3279 terminals are provided on network
workstations. The gateway software includes keyboard template overlays which facilitate
function key usage.

•  The Mainframe SNA Gateway
     Although gateways are available to support the X^S and asynchronous communica-
tions protocols, the SNA gateway is the primary LAN to mainframe link. The PCOX 3270
SNA SDLC gateway consists of one hardware component, the gateway's interface board,
and several software components. The PCOX/REMOTE is a synchronous serial interface
board with an RS-232C interface that connects a LAN via synchronous modem to an IBM
3705 or 3725 communications controller.  In this capacity, the interface emulates an a
SNA/SDLC IBM 3174 or  3274 cluster  controller.  The gateway server  software,
PCOX/G W-3270, converts the micro-to- mainframe hardware into a LAN gateway. This
makes it possible for PCs on a LAN to communicate with a mainframe. Any number of
                                                                        F-71

-------
LAN Technical Manual
   gateways can be installed on one LAN and there is virtually no limit to the number of users
   on a LAN who can connect concurrently with a mainframe. The workstation software,
   PCOX/ONE LAN Version, gives the user access to mainframe applications and files
   through 3278/79 terminal emulation; one host session and one DOS session are available.
   PCOX/TWO LAN Version supports a host printer session in addition to the same
   capabilities as the PCOX/ONE. An additional product provided under the SMA contract
   is the file transfer utility software, PCOX/3270 FT. This product allows users to upload
   and download data between the PC and the mainframe.
        Workstations on the LAN can initiate a 3270 session with the mainframe through the
   gateway. To start the session, the workstation simply loads the emulation software. No spe-
   cial hardware is necessary at the workstation; the hardware resides in the 3270 gateway
   server attached to the network.
        Gateways have a fixed number of ports, each of which supports a mainframe session.
   Remote gateways come in configurations of from 5 to 64 port versions. The PCOX gateway
   on the SMA contract is a 16 session version.  One of the gateway's advantages is that as
   many as 5 simultaneous mainframe sessions can be active on a single workstation. Depend-
   ing upon the user profiles, each session may take up the entire screen or be displayed in
   concurrent windows, and users can switch from one session to another. Eight simultaneous
   workstation users can use the gateway.
        The LAN mainframe gateway requires only one connection between the LAN and
   the mainframe. In addition to the significant cost saving incurred over workstation emula-
   tion boards and mainframe ports for each connecting workstation, the gateway permits bet-
   ter management of communications and mainframe processing resources. The number of
   simultaneous sessions from the LAN to the mainframe is limited by the total number of
   gateway ports available.  As needs for additional mainframe connectivity grows on a net-
   work, additional gateways can be added to the network.

   •  Advantages of 3270 Workstations
        Numerous advantages exist for attaching a networked computer as a mainframe 3270
   workstation. Among these are:
        •  The ability to switch back and forth between PC application software on the LAN
           and mainframe sessions.
        •  The ability to capture a complete mainframe session, for later review or analysis.
        •  The ability to extract mainframe information and manipulate it  locally on the
           LAN workstation. Small computational work is downloaded to the local level,
           reducing the workload on the mainframe.
        •  The ability to manipulate downloaded mainframe data with personal computer
           application programs. Not only does this save in mainframe costs and resources,
           but PC applications are typically easier to use and are often more sophisticated
           for specific applications.
   F-72

-------
                                                                  Installation Guidelines
   option for the other. Two operating system configuration numbers are available for each
   configuration - 0 and 2 for primary, and 1 and 3 for alternate. No two token ring adapters
   to be installed in the same file server or bridge may have the same configuration number.
   Switch settings for these configurations are indicated in the Novell NetWare Installation
   Supplement for IBM PC Token-Ring Network.
        If you are installing a network adapter other than Token-Ring, you will need to refer
   to the instructions for the  adapter as well as the Novell Netware Installation Supplement
   for that particular adapter.
        The NetWare operating system will now have to be reconfigured using the GENOS
   utilities.  Detailed instructions on configuring the NetWare operating system are given in
   Chapter 2 of the NetWare 286 Installation Manual. Care must be exercised during this
   process to specify the correct configuration numbers for the different boards installed, and
   to select a configuration option that provides the same Interrupt Request, Base I/O Ad-
   dress, etc. that have been set on each of the adapters. Once this process is completed, the
   newly-configured NetWare operating system (the NETSOS.COM file) will have to be in-
   stalled in the server (bridge) using the INSTALL routine provided with NetWare.
        Testing of the internal bridge can be accomplished by accessing from a workstation
   on each  network the servers on the other networks. Messages can also be  sent from a
   workstation in one network to workstations in other networks connected by the bridge.
        It must be noted that the internal bridging capability that is currently available in
   Novell NetWare is restricted to bridging networks which operate under Novell NetWare
   but use different networking hardware.  If, for instance, the server (bridge) is connected
   to a network which operates under a different networking software, then access to that net-
   works server would not be possible. However, any workstation on that non-Novell net-
   work can be made a workstation on the Novell network, by rebooting it with a Novell
   workstation shell (specially gen'ed for the networking hardware in the workstation).
        External bridging is  accomplished by running special bridge software in a worksta-
   tion, and connecting the networks you wish to bridge to that workstation. Each external
   bridge can be can connect up to  four networks. More information on this will be made
   available in future updates of this document

F.7.2 Asynchronous Communications Server
        The asynchronous communication server (ACS) is a dedicated personal computer
   with adapter cards that provide both incoming and outgoing asynchronous services to all
   network users. An ACS controller board can have four or more ports available to users.
   The principle use of the ACS is to provide access to the Agency E-Mail System. A secon-
   dary use is to pool communications resources; fewer modems and communications lines
   serve more users.
        The ACS connects with another computer through its ports by use of modems and
   dial-up telephone services or by an RS-232 serial cable, using the modem eliminator wiring
                                                                            F-69

-------
LAN Technical Manual
   convention. Equipment involved in asynchronous communications on a network includes
   the following:
        •  An asynchronous communications server, which is typically a dedicated worksta-
           tion on the network;
        •  RS-232 serial ports. Up to three ACS cards, each with four serial ports may be
           installed and used simultaneously on dedicated ACS server by other workstations
           on the network;
        •  The Novell ACS package. This software allows terminal emulation and file trans-
           fer on network workstations to other computers connected to the dedicated ACS
           server.
        Several types of terminals, including the DEC VT100 series and the IBM 3101, are
   widely used.  If a workstation desires to connect to a host computer to run an application
   that interfaces with a VT100 terminal, the workstation can configure the ACS software to
   emulate this type of terminal to communicate interactively with the host The ACS through
   NetWare ASCOMIV software can emulate VT100, VT52, VIEWPT, ADM3A, DASHER,
   HAZ1500, TV1912, and IBM 3101 terminals.  Dial-in capability is provided by PC
   ANYWHERE and ATERM software in conjunction with the Asynchronous Communica-
   tions Server.             .                              ,
F.7.2.1 Install, Configure, and Test Asynchronous Communications Server
        The asynchronous gateway on the SMA contract is Novell's ACS. This product has
   been installed in Region IV and has severe deficiencies in the current release. The outgo-
   ing communications (supported 'by ASCOMTV) is  relatively solid.  The incoming com-
   munications, for all intent and purpose, does  not work. The Agency is  evaluating this
   situation and the vendor of the ACS on the SMA contract, Novell, has announced a re-
   placement package.  When a final decision has been reached regarding the asynchronous
   communications software, installing, configuring, and testing will be addressed in this docu-
   ment
F.7.3 SNA/SDLC Communications Server (SNA Gateway)
        The most popular type of mainframe terminal is the full screen 3270 series from IBM.
   The 3270 terminals are used in on-line, interactive  sessions with an IBM  type host com-
   puter. The Agency mainframe host is an IBM 3090 and the distributed hosts are IBM 4381
   processors. The most efficient terminal access to these systems  is the 3270 full screen,
   synchronous terminals. This service is provided to network users via the 3270 SNA com-
   munications gateway. The hardware and software available through the SMA contract for
   3270 type communications on a network includes the following.
        •  A dedicated 3270 SNA communications server. The gateway on the SMA Con-
           tract currently requires an AT-compatible  bus. This gateway server is not suited
           to be used as a user workstation on the network because of memory and process-
           ing requirements.  Also, there is a potential problem of a user hanging the serv-
           er PC and crashing all terminal sessions to the mainframe.
        •  CXI PCOX 3270 Communication Server Package:
           -  PCOX/GW-3270 IAN Gateway Software;
   F-70

-------
                                                                Installation Guidelines
        the alternate printers. Print the sample document on each of the alternate net-
        work printers.
     (7) Repeat steps 1 through 6 for each workstation and user (or user login from each
        user group) that will have access to the network.
     (8) Use the FLAG command on a file to provide Non-sharable Read-Write security
        (e.g. "FLAG file name.txt NSRW). Have users at two workstations attempt to
        access the FLAG~ged file concurrently. NetWare should provide the second user
        an error message.
     If any problems are diagnosed, use the guidelines outlined above, and consult the
program's documentation to correct the problem and attempt the file or resource access
again.  Repeat these procedures until all file, printer, or other resource accesses work as
expected.  If you cannot resolve a problem, contact NCC User Support. They will route
you to the person who can best help you.
     • Data Base Management Systems
     (1) Log on each successive workstation as a different user.
     (2) At each workstation, and under each user logon name, load the database program.
     (3) If application programs are available for the database program, run each of those
        application programs in turn.  If an application program is not available, then
        create a simple database for  testing purposes, preferably in a directory created
        for the purposes of storing database files.
     (4) Because databases are more fixed to a particular directory than document or
        worksheet files are, you need to only check whether records can be added to the
         database and written to disk in the default database directories. Check that only
         users that have been granted write access have the capability to update records,
         and that users with read/only access are denied the ability to update records.
      (5) If running an application program, select the print option to print the sample data
         entered to the default network printer. If creating a sample database outside of
         an application, use the appropriate command line syntax to re-route the output
         to the default printer.
      (6) If there is more than one printer attached to the file server, use the QUEUE com-
         mand to change the default network printer, or re-route printer output to one of
         the alternate printers. Print the sample data on each of the alternate network
         printers.
      (7) Repeat steps 1 through 6 for each workstation and user that will have access to
          the network.
      If any problems are diagnosed, use the guidelines outlined above, and the database
 or program application documentation to correct the problem and attempt the file or
 resource access again. Repeat these procedures until all file, printer, or other resource ac-
 cesses work as expected.
                                                                             F-67

-------
LAN Technical Manual
 F.7     COMMUNICATIONS TESTS

         Connectivity among all Agency computer resources is a strategy goal for the Agen-
    cy. Connectivity to a mainframe and the Agency E-Mail System is considered an integral
    part of establishing networks within the EPA environment A network should not be set
    up just to establish connectivity with Agency mainframes, but if there are valid justifica-
    tions for networking, the Network Installation Plan should include consideration of the
    best method for establishing mainframe connectivity.

         The purpose of this section is to configure and test the telecommunications links that
    will exist on the local area network. The different links that can exist on the LAN include
    the following:
         •  Novell LAN-to-LAN Bridge
         •  Asynchronous Communications Server
         •  SNA/SDLC Communications Server
F.7.1   Novell Bridge
         Bridges make separate physical networks look as one logical network. Bridges link
    one physical local area network with another physical local area network. Bridges can have
    several configurations: bridges can be internal or external and bridges can be local or
    remote.

         Internal and external relate to the subject LAN topology. Internal indicates that the
    bridge shares the same processor as the file server.  External indicates that the bridge
    resides on a separate workstation. External bridges can either be on a workstation dedi-
    cated to that bridge, or they can be on a non- dedicated workstation, implying that the
    bridged computer is sometimes used as a network workstation, EPA recommends that all
    external bridges be on dedicated workstations. Multiple physical networks can be inter-
    nally bridged in a single physical personal computer.

         Remote and local bridges indicate the type  of communication between networks.
    Local bridges link networks that are physically close enough to be linked by cable, either
    coax or twisted pair (Type 1 or Type 3 cable). Remote bridges link networks through
    regular telephone service via modems or through leased lines such as Tl carriers.
        The Agency recommends the use of external bridges for large networks since the file
    server functions are  generally critical to the performance of a network and are impacted
    by sharing the processor with a bridge's functions.
F.7.1.1 Install, Configure, and Test Novell Brtdg*
        Internal bridging is accomplished by putting multiple network boards (up to 4) in one
    file server. This allows one to connect up four like or unlike networks simultaneously. No
    additional software besides Novell's Advanced NetWare (Version 2.0 or above) under
   which the server operates is necessary.

        If you are installing two Token-Ring adapters in the same file server or bridge, you
   must use a primary configuration option for one adapter and an alternate configuration
   F-68

-------
                                                                  Installation Guidelines
   mand sequence, such as the SET ALTERNATE command at the dot prompt while the
   program is running.

        If dBase applications are to be loaded on the file server; they should be copied into
   the appropriate public directories.  Read the application documentation for information
   regarding whether directory location of applications can be configured from within the ap-
   plication program, or whether the application will assume that both the dBase program
   and the application program files must co-exist in the same directory.
        Many dBase applications programs require that default directories for data files be
   designated, and that the databases for the application be initialized prior to using the ap-
   plication. Consult the dBase application documentation for specific directions for initialig-
   ing databases.
        Of primary concern when running dBase applications on a network is whether the
   application itself was written intentionally for running on a network. dBase in Plus in-
   cludes commands in its programming language designed to provide record LOCKing and
   UNLOCKing functions. Any dBase application program written prior to the introduction
   of dBase m Plus could not be written specifically for network usage. If the application
   programs allow modification to the source code record locking can be added to them. Use
   of database applications, or any database in command mode under dBase, that does not
   make use of record locking should be governed cautiously. Simultaneous record updates
   by multiple users, or modification of database structures can quite easily result in a cor-
   rupted database. Additional information for application developers is available in the Ap-
   plication Engineering Guide.
F.8.4.3 Application Program end Data File Security
        After all application programs have been loaded, configured and initialized, file .
   security for sharable and non-sharable files should be set up. The NetWare FLAG com-
   mand provides a means by which individual files' or entire directories'  attributes can be
   specified.  A complete description  of the FLAG command can be found in the NetWare
   User Reference, Part III: Command Line Utilities manual. Use the FLAG utility with cau-
   tion; never change a file's attributes while another user is using this file. The parameters
   available for use on files or directories with the FLAG command include (the letters in
   brackets indicate acceptable abbreviations for the command parameters):
        •  [N] NORMAL - File attributes will be Non- Shareable, Read/Write. These are
           the default attributes of a network file.  This is the default security.
        •  [S] SHAREABLE - More than one user may access the file at a time.
        •  [NS] NON-SHAREABLE - Only one user may access the file at a time. (Default
           - implied by [N])
        •  [RW] READ/WRITE - Users may read the file and write to, or modify the file.
           (Default - implied by [N]; exclusive from [RO])
        •  [RO] READ/ONLY - Users may only read the file; they cannot modify it (Ex-
           clusive from [RW])
                                                                            F-65

-------
LAN Technical Manual
        Examples of each follow.
        • FLAG/LOTUS/".* SRO  - makes all files in the /LOTUS directory shareable,
           and read-only.
        • FLAG /PROJECT1/V N  -  makes all files in the /PROJECTl directory non-
           shareable, with read-write access.
        Note that if a user's Effective Rights do not allow access to a directory, then the file's
   attributes will not have any significance for that user. However, if a user does have com-
   plete rights to files in a directory, the file's attributes will take precedence over the user's
   Effective Rights.

F.6.5 Verify Operation of Application, Including Mum- User Access and Resource
   Utilization
        After all application programs have been loaded, configured, and initialized, and the
   appropriate file attributes have been specified, a systematic check of application program
   functions and resource access should be made prior to general use of the applications by
   network users.

        The steps involved in verifying proper application  and printer access functioning are
   somewhat tedious, but do not require a great deal of time and effort, especially when com-
   pared to the time, effort, and frustration that can result from tracking down an application
   problem once users are using the network. The procedures for checking out program func-
   tions for each of the three types of applications described in this document are summarized
   below.  For verification of multi-user file access, it will be easier if you obtain the help of
   a co-worker so that each can us a workstation, and any error messages can be reported.
        • Word Processing and Spreadsheets
        (1) Log on each successive workstation as a different user.
        (2) At each workstation, and under each user logon name, load the word processing
           program. If may users are on the user list, then one user login from each user
           group would be a sufficient test
        (3) Create a simple document for testing purposes.
        (4) Save the test document in each of the public, shared, and private directories avail-
           able on the network. Check to  be sure that the document saves correctly in the
           directories that user has appropriate rights to; and that the document is not saved
           in the directories for which that user does not have write access.
        (5) Print the  sample document to the default network printer and to a local printer,
           if available.
        (6) If there is more than one printer attached to the file server, use the QUEUE com-
           mand to change the default network printer, or re-route printer output to one of
   F-66

-------
                                                                  Installation Guidelines
   accommodate the needs of different workstation displays and display adapters. If this is
   done, each workstation can access separate copies of the program configured specifically
   for the appropriate workstation display type.
       Obviously, loading multiple copies of software is more costly and takes up valuable
   disk space. When an application allows, create multiple versions of configuration or setup
   files with different names. When and application is to be loaded, copy the appropriate con-
   figuration or setup file to the valid name expected by the application using DOS batch files.
   The standard EPA menu system provides an example of application batch file execution.
        •  DATA BASE MANAGEMENT SYSTEMS
       dBase requires no special configuration per se. However, before the program can
   be executed, a program called "ID" must be executed. On the first copy of dBase, enter the -
   owner as the EPA. This program will also prompt for the serial number off of the distribu-
   tion diskettes. Existing Agency copies can be used; simply load the software on the file
   server and enter the existing serial number.  This procedure ensures that you have pur-
   chased original copies of the distribution diskettes, and configures the program to indicate
   the owner of the application. Note that these copies should not be used on other PCs.
       Other database management programs may have separate configure utilities that re-
   quire more specific information regarding program file directories. Consult the installa- \
   tion documentation for the application program you have loaded on the file server for
   detailed instructions.
F.6.4.2 Program Initialization
       In addition to running a configure program prior to executing an application, many
   packages have "setup" options which allow the specification of certain default parameters
   that pertain to normal program usage. These parameters are loaded as the current
   parameters each time the application is executed. Applications that do not have particular
   menu items specified for "setup" often have default selection procedures built into different
   program aspects.  A general discussion of the initialization procedures for each of the three
   types of applications covered in this document; word processors, spreadsheets, and
   database managers, are described below.
        •  Word Processors
       The most prevalent default configuration option specified for word processing
   programs is the printer type. A separate "printer install" program is included for some ap-
   plications; for others, the printer is defined during the initial configuration program, or op-
   tions may be built into the program to allow specification of the current default printer(s).
   Depending on your word processor, one or more printers may be selected from a list of
   available printer drivers to be used as the default printer configuration. Only one printer
   can be specified at a time to be the current printer for any .program, though additional
   printers may be specified as alternate printers with some  word processors.  Other
   parameters that may be available for printer configurations include:
           -  Page length
           -  Top and bottom margins
           -  Page number type and positions
                                                                             F-63

-------
LAN Technical Manual
            - Justification
            - Widows (minimum number of lines from a paragraph allowed at the top of a
              page)
            - Orphans (minimum number of lines from a paragraph allowed at the bottom
              of a page)
        Additionally,  some word processors allow the page format and other command
   keyboard sequences to be defined by the user. If a standard set of keyboard command se-
   quences has been specified for use on your network, these keyboard sequences should be
   configured prior to network use of the program.
        If current documents, boilerplates, or style sheets are needed for use on the network;
   they should be loaded into the appropriate shared, public, or private directories.
        •  Spreadsheets
        Lotus and other spreadsheets require little printer configuration; they are designed
   to work with most printers. Any printer control sequences that are necessary for print for-
   matting are entered in the Printer Setup menu options. Most of the other global configura-
   tion options are set to valid default values upon initial program execution.
        Users with Write Access to the spreadsheet program directory can update the default
   printer setup control sequences at any time. As different network printers are specified
   on the file server, the network supervisor or network users may need to specify different
   printer setup control sequences. Program and configuration files can be protected against
   corruption by use of the FLAG utility (refer to the section on Application Program and
   Data File Security below, section 5 of this guide, and the NetWare Command Line Utilities
   manual).
        As with word processors, if any worksheet data files currently exist that will be used
   on the network, they should be loaded into the appropriate shared, public, or private serv-
   er subdirectories.  As describe in the section on Application  Program and Data File
   Security and the section on Application Software Categories, the FLAG command can be
   used on files in public or shared directories to protect against multiple concurrent acces-
   ses of the same file.
         •  Database Management Systems
        dBase ffl Plus requires no menu configuration for default printer, directories, or
   other parameters. Unlike most word processors and spreadsheets, dBase can be driven by
   either a  menu, via  the Assist function, or the command line, by typing commands at the
   "dot" prompt.
        The default configuration that is used when the program is initially loaded into
   memory is read from a file called "CONFIG.DB" in the current directory. This file con-
   tains information used by dBase which indicate the default values for parameters such as
   the program editor to be used, the state of the status and indicator lines, the state of the
   application generator, and various other parameters. A complete description of the op-
   tions available  to be included in the "CONFIG.DB" file can be found in the  dBase IE
   reference manual.  Other options, such as output routing can be specified by typing a com-
    F-64

-------
                                                                    Installation Guidelines
        EPA requires that if the dBase application was developed outside of your installa-
   tion, then the application must allow that the application program files and database files
   can be stored in directories separate from the dBase program itself.
F.6.3 Loading Applications Software
        When installing an application program on the server, make sure that no other users
   are on the network.  Because the proper installation of application programs is a critical
   step, it is best not to have other users accessing the file server which may add unnecessary
   complications. The LAN Administrator must establish a software install and upgrade pro-
   cedure that will minimiTg interference with normal network use.
                                                                                 "
     For example, if installing a new version of an accounting system, and other network
users are using the old version of that software during the install procedure, data could be
lost due to copying new configuration files during the installation.
     There are basically two procedures for loading software onto a file server.  Some ap-
plications either require  or suggest the use of a provided "install" utility. This "install1
program will typically perform functions such as creating the necessary directories, copy
the appropriate files to the directories, and perform some application configuration. Other
application packages provide no "install" program, but rather require that the programs on
the distribution diskette(s) be copied to the appropriate directories on the hard disk (file
server).
     Before attempting to load an application program on a file server, read the program's
documentation. Typically, a section is provided explicitly for installing the software on a
hard disk and/or network. It is usually best to follow the installation instructions provided
in the manual. Also, the documentation should indicate whether the program  files need
to be loaded into a specific directory. Most applications that do require specific directories
will also provide an "install" utility to aid in ensuring the appropriate directories are created,
and files are loaded in the correct hard disk directories. None of the programs mentioned
in the section above (WordStar, WordPerfect, MultiMate, DisplayWrite IV,  Lotus, or
dBase HI Plus) require that the program files reside in any specific directory.
     To load an application on the file server, the following steps should serve as a guide.

     (1) Log in to the network as the user  SUPERVISOR, or as a user with  appropriate
        directory trustee rights,
     (2) Change  to the appropriate directory,  using the DOS command "CD  \direc-
        tory_name". This directory should already exist on the file server (refer to Section
        5 of this document and the NetWare Basics manual for information on designing
        and creating the server directory structure).
     For programs without auto-install procedures:

     (3a) Insert the first program disk in  floppy drive A; and type the DOS command
        "COPY AiV".  This will copy all of the files from the floppy to the currently
        logged file server directory.
     (4a) Repeat step 3 for each program distribution diskette for the application.
                                                                              F-61

-------
LAV Technical Manual
        For programs with auto-install procedures:

        (3b) The program documentation should indicate the name of the program to run to
           initiate loading the application on the hard disk. Typical install program names
           are "INSTALL" or "HINSTALL". Not all programs on distribution diskettes
           named "INSTALL" will actually  copy the files; certain applications have "IN-
           STALL" programs intended for configuration of the application after it has been
           copied to hard disk.  Read the installation documentation to be sure. Some in-
           stall programs require that the logged drive be changed to floppy, while other
           programs require that the hard disk be the currently logged drive. Additionally,
           some install programs will require command line parameters, typically to indi-
           cate the target drive for installation. An example of this might be: "AjINSTALL
           C". Also, certain install programs, when executed will prompt for the target drive
           and directory.
        (4b) Generally, most install programs will  simply copy the appropriate files to the
           hard disk.  When required, the install program will prompt for you to insert the
           appropriate distribution diskettes in the floppy drive to complete the copying of
           files to the hard disk.
F.6.4 Initializing Data Bases
F.8.4.1 Initial Application Configuration
        Most application programs, when first loaded to a hard disk, require that a configura-
   tion program be run prior to actually executing the application. The programs mentioned
   in this document (word processing, spreadsheet,  and database management) all have dif-
   ferent configuration needs. Refer to the  program's installation documentation for the
   name and instructions for the configure program.
        •  WORD PROCESSORS
        Word processors typically need to be informed of the types of printers available for
   the document Some word processors allow for multiple printers to be configured for the
   application, and  the user can select among those available at print time.  Other word
   processors allow specification of the default document directories. For use on a network,
   when default directories  are required, public directories may be the easiest method of
   maintaining document storage compatibility among users. Certain word processors include
   utility programs that will perform specific tasks, such as speeding up the keyboard.  Note
   that some of these utility programs will hinder proper functioning of the word processor
   over the network. Fore  example, MultiMate Advantage is shipped with the keyboard
   speedup enabled. You must change this default for MultiMate Advantage to work over
   the network.
        •  SPREADSHEETS
        Lotus as well as other spreadsheet programs requires that a configuration program
   be run prior to executing the application. The most important function of Lotus' configura-
   tion program is to install the correct screen drivers for use with the application. This means
   that if monochrome and color graphics adapters are on different  workstations, multiple
   copies of the Lotus program or setup files  may need to  be loaded on to the file server to
   F-62

-------
                                                                  Installation Guidelines
   propriate current printer. Users may also have the rights to temporarily route print output
   to alternate printers with the QUEUE facility.
        Also, the EPA MENU facility includes an option for user to specify the SPOOLING
   output to be routed to any of the attached network printers. The SPOOLed output can be
   reassigned from the NetWare MENU system.
F.6.1.4 Printer UM and Maintenance
        One final consideration deals with the networked printers themselves. Printers will
   regularly run out of paper.  Laser printers require special consideration, because of the
   small amount of paper typically allowed in the input paper tray.  Laser printers have an ad-
   ditional problem: the output tray also has a limited capacity. Paper jams can occur in any =
   type of printer, and ribbons or toner cartridges will need regular replacement on printers.
   When used as local printers, it is obvious when one or more of these problems occur; but
   when used on a network, the problems can exist for a long time before network users be-
   come aware of them. The NetWare QUEUE facility display indicates which print job(s)
   are in progress and which jobs are in queue. If, by examination of the  QUEUE display, it
   appears that any one job is taking too long to print, then printer problems may be suspect

F.6.2 Applications Software
        There are three primary classifications of software that will be loaded on a network
   file server. They are: word processors, spreadsheets, and data base management systems.
   Additionally, data base management system applications, such as the CERCLIS Wastelan
   program may be loaded on the network file server.               ,.
F.6.2.1 Word Proceaaore
         One of the most common uses of personal computers is word processing.  It is rare
   that more than one person would need to update the same file at the same time. If it is
   questionable whether more that one person may access a document  simultaneously, the
   document can be protected against corruption by using the NetWare  FLAG facility. For
   this reason,  the use of single-user word processors on a network should work without
   problems.
         The network file server should be used to store the program files for the word proces-
   sor, and the document files created by each user. The placement of the program files may
   be dictated by the application program itself, but more likely the location can be deter-
   mined by the server directory structure designed by the network supervisor. Document
   files should be stored either in user private directories on the network, in shared data direc-
   tories on the network, or on the user's personal system, depending on the document. If
   multiple users will be using documents stored in public directories, the documents can be
   protected by using the NetWare FLAG command (refer to Section 5 of this guide and the
   NetWare Command Line Utilities manual). If the FLAG command is executed with Non-
    Sharable Read-Write (NSRW) prior to working with a document, the first user will have
    normal access to the document, but subsequent attempted accesses by other users will
    receive a NetWare message indicating the file is in use. After the original user finishes
    with the file, another user can access the file.
                                                                             F-59

-------
LAN Technical Manual
         Several different word processors are available to run on the Novell network. Those
    available on the EPA SMA contract are:  WordStar (MicroPro), WordPerfect (Word-
    Perfect Corporation), MultiMate (Ashton- Tate), DisplayWrite 4 (IBM), and Leritype
    Plus. These word processors will be supported by EPA,
         Some word processors make use of style sheets, or boilerplates, useful in preparing
    documents in a common format If available, style sheets should be placed in common, or
    shared directories, so that different users can have access to them. This will enforce more
    consistency among users for document formats.
         Quite often, users on a network will work on preparing documents by storing them
    in private directories. When documents are completed, they can be placed in a common,
    or shared directory for final review by the appropriate users.
F.6.2.2 Spreadsheets
         The agency standard for spreadsheet use  is Lotus 1-2-3 (Lotus Development Cor-
    poration). This program has set the standard by which all other spreadsheets are judged.
    The Lotus program files should be loaded in the Lotus directory, and worksheet files should
    be stored in separate private or public data directories or on the user's personal system.
         Use of a spreadsheet program on a network may be similar to that of word proces-
    sors.  Individual  users may prepare worksheets in private or public subdirectories; then
    perhaps share the worksheets with other users for review or additional modifications by
    placing them in shared directories. Refer to the paragraphs above on Word Processing for
    information on file protection.
         Additionally, shared directories will allow commonly used spreadsheet templates
    and macros to be available to other users. These shared templates or macro routines can
    save users a lot of time by having access to commonly used functions. More and more  fre-
    quently, applications are allowing the incorporation of Lotus worksheet data directly or
    through special DIP files. The use of data shared between applications can be made easier
    by storing such data in shared, or public directories.
F.6.2.3 Data Base Management Systems
         The most popular database application development system available on microcom-
    puters is dBase (Ashton-Tate).  Many single-user Agency  applications have already been
    developed to run under dBase. Additionally, dBase allows development in a networking
    environment
         Beginning with the version of dBase called dBase m Plus, special distribution  dis-
    kettes (the Administrator diskettes) are provided by the vendor to allow use of dBase on
    a network. dBase m Plus allows multi-user access including updates todata files, with
    record locking, across a network.

         If a dBase application is being developed internally,  then the application developer
   can stipulate, either through configuration options, or by direct coding, which directories
   the developed program code, application programs, and data files are to be stored.
   F-60

-------
                                                               Installation Guidelines
     Novell NetWare provides sharing of printers connected to the file server. There can
only be up to three serial ports and two parallel ports. These printers are known to the
operating system as COM1: through COM3: and LPT1: through LPT2:. PC/MS-DOS also
recognizes the PRN: syntax as the default print device. NetWare redirects print output
from an application by routing the output through the spooler and to the appropriate
printer port. The default printer port is configured in the NetWare QUEUE command;
but output can also be routed by a user to another printer port (refer to Section F.4 of this
chapter, and to the NetWare Command Line Utilities manual).

     (1) Direct Hardware Access
     Most application programs will send output directly by an PC/MS-DOS call to the
PRN: or LPTx: device. Some application programs send output to the print device by ac-
cessing the printer via low-level BIOS system calls. NetWare is capable of intercepting
these low level calls and routing them to the appropriate printer. However, if an applica-
tion directly access printer port hardware on a local workstation, there is little that can be
done to  get that application to use a network printer. Typically, applications access local
hardware printer ports when configured to work with serial printers (COM1:...COM3:),
but use standard MS-DOS or BIOS interface calls when configured to work with parallel
printers. Even if a serial printer is designated as the current printer on the file server, it is
possible to get the application to work by configuring for a parallel printer, and reassign-
ing the printer port on the server by use of the NetWare QUEUE command (refer to the
NetWare Command Line  Utilities manual).
     (2) Application Buffering
     Occasionally, an application software program will have its own print spooler. For
example, many word processors will buffer output while allowing the user to continue edit-
ing a document These programs will sometimes check the hardware directly for printer
status information that is not available from MS-DOS or BIOS. If the application allows
disabling the print spooler (or print buffer), doing so may alleviate any possible problems.
The network printers are controlled by the NetWare Spool program, so buffered printing
is automatic when printing on networked printers.
     Some applications allow printing to either a printer or a file. If you are having trouble
printing to a printer, try printing to a file; then copy the printed file to the network printer.
After the application has printed to a file, this can be done by typing: 'NPRINT file_nameff
or by issuing the 'COPY file_name LPT1:' command. More preferably, users can use the
NetWare SPOOL command to send files directly to the network spooler by typing: 'SPOOL
file name' (refer to the NetWare Command Line Utilities manual).
     (3) Network Filtering of Control Codes
     If an application program sends control codes to a printer in order to perform spe-
cial functions, some of these codes may have special significance to the NetWare queue
facility. This occurs most frequently when attempting to print graphics images or use sper
rial printer functions (such as microspacing, superscript, or subscript) on a network printer.
Graphics images and special printer functions send a variety of control codes, and it is pos-
                                                                          F-57

-------
LAN Technical Manual
   sible that strange effects may occur if specific character sequences are sent to a networked
   printer. If you experience problems, try the problem print commands on a local printer
   attached to a workstation. If the printing works correctly, then the problem is likely to be
   control code interference over the network. NetWare does not perform much print com-
   mand filtering and this type of problem should be minimal, if at all; however, several com-
   mand sequences do control the queue parameters for networked printers.
        (4) NetWare Formatting Conflicts
        An additional problem can occur when a print job is not formatted correctly. This
   can be caused by unmatched print parameters between the NetWare QUEUE facility, the
   networked printer settings, and the  application program settings for printing. Most ap-
   plication programs will attempt to control the print output format internally; therefore, the
   easiest solution is to reset the network printer to default configuration parameters, such
   as single space, page length, etc If problems still persist, the application program print
   parameters can be adjusted to accommodate the network printer's settings.  Typical
   parameters that can cause problems if the settings are in conflict include:
           -  Page length (66 lines for an 11 inch page is  standard);
           -  Line length (80 character lines are standard); and
           -  Margins, Borders, and Page Offset (the printer and spooler should be set to
               the physical limits of the paper being used;  e.g. top  and bottom margins of 0,
               left and right borders of 0, and page  offset of 0).
        (5) Application Conflict in Printer Parameter Setting
        A major concern of the use of shared network printers is an application's use of spe-
   cial printer functions. Many application programs, such as word processors will send the
   printer special codes to indicate boldface, condensed print, or other special features. Most
   printers, once a special mode has been set, will remain in that mode until either explicitly
   reset with  another control code, or physically reset by turning the printer off and back on.
   When an application does not reset special printer functions, another user may attempt to
   print, only to find that the output is not formatted correctly due  to the prior print format-
   ting commands. While this is true for standalone computers, it is more of a problem in a
   networked environment
        The most common type of application that frequently uses special printer commands
   is the word processor. Spreadsheet programs, like Lotus, will also allow users to send spe-
   cial printer commands, such as condensed print,  in order to print more information on a
   page. Database programs, such as dBase ffl Plus, allow special printer control commands
   to be sent, but are seldom used in database applications.
        Most application programs will send a minimum of print  formatting commands to
   printers. In order to accommodate different types of printers, most applications contain a
   configure utility or menu which allows the selection of the type of printer currently being
   used. If a network server has several different types of printers attached, then many of the
   application programs may need to  be re-configured to operate  correctly with the  ap-
   F-58

-------
                                                                Installation Guidelines
when attempting to adapt single-user application software to run under the NetWare
operating system. These include:
     (1) Copy protection (including Lotus versions 1 and 2 as described above);

     (2) Simultaneous file updates;
     (3) Disk accesses; and
     (4) Printer and resource sharing.
     Several problems exist when attempting to run a single user application on a network.
They are:
         -  Concurrent access and update to data files
         -  Sequential program configuration or profile updates
         -  Application temporary file information updates
      The first problem involves updating a data file that two or more users are working
 on simultaneously. If the application program was net designed for multiple users, chan-
 ges made by one user can be lost if the file is later written to disk by another user. The
 typical scenario might be: User 1 and user 2 both load an application program; both users
 also load the same data file or document; user 1 makes changes to the file and writes it to
 disk; user 2 makes changes to his copy of the original file and later writes it to disk, over-
 writing the file as modified by user 1. User 1's changes are lost
      The solutions to this problem in a networking involvement center around organiza-
 tion. When files are to be shared by single user applications, communication between users
 about current work files becomes critical. The use of the FLAG facility to make data files
 Non-Sharable is crucial
      The second problem involves application programs that load configuration files upon
 initiation. For example, a program may behave differently if configured with a monochrom ?
 versus color monitor. Some applications allow users to configure default parameters or _
 user profiles that will be in effect upon subsequent loads of the program. There are three
 methods of handling this type of situation. First, if the applications allows specifying dif-
 ferent configuration or profile file names, then each user can set up a separate configura-
 tion or profile file in the application directory, and load the configuration file when the
 program is up and running. Second, if the application will load and run successfully if ex-
 ecuted from a directory other than the application directory, then each user may be able
 to save the default configuration or profile file in a working subdirectory, and when the ap-
 plication is loaded the configuration file is read from the current directory. Third, each
 user can be provided with his or her own copy of the software in a private network direc-
 tory. The last recourse is the least preferable; it may not be possible due to licensing restric-
 tions, and it will consume extra file server disk space.
       The third problem exists with certain application programs that write temporary files
  to disk during execution of the program. If two or more users are accessing this type of ap-
  plication simultaneously, then one user's temporary file can become corrupted by another
  user. Two possible solutions to this problem include:
                                                                             F-55

-------
LAN Technical Manual
        (1) If the application allows specification of data file directories, then each user can
           specify different directories after the program is loaded (or in the configuration
           parameters at discussed above).
        (2) Access to the program can be restricted to one user at a time.
        If you are not sure if a particular application program writes information to disk
   during execution, conduct an experiment by loading the application into a read-only or
   write-protected subdirectory on the file server, and run the application. If the program
   functions without problems, it does not need to write to the disk, and can be shared over
   the network among multiple users, within license and copyright provisions.
        If the suggestions above fail to solve multi-user access for a particular application,
   the problem can usually be avoided by loading separate copies of the application on the
   user's workstation disk drive. This is not recommended for most applications. If licensing
   and technical issues can be resolved, having one copy of an application on the file server
   is the preferred method because less disk space is consumed by the application and main-
   taining application revisions and updates is less complicated.
F.6.1.3 Printer Sharing
        Spooling is the method by which multiple print jobs can be submitted to a shared net-
   work printer. As each job is submitted, it is placed in a queue. Print jobs can be added and
   removed from the queue, and the print job's priority can be changed.
        Novell provides "SPOOL," a resident program which intercepts normal printer out-
   put from programs and routes  it to the network printer.  Routing stops when the
   "ENDSPOOL" command is issued.
        Most applications, whether or not they are shared applications, will work with the
   network print method described above. The problem areas that can occur, depending on
   how the application communicates with the printer, include the following:
        •  Direct hardware access by the application (uses non- standard DOS print  func-
           tions);
        •  Network software filtering of control codes (application print formatting  com-
           mands are not passed by the NetWare print facilities);
        •  Network software interjection of control codes (NetWare printer commands con-
           flict with the application formatting commands);
        •  Conflict between the network and application print buffering (an application that
           uses non-standard DOS functions to buffer output may conflict with the NetWare
           spooler);
        •  Non-release of shared printers by the application (an application does not issue
           the ENDSPOOL command necessary to release the spooler for subsequent print
           jobs); and
        •  Setting of printer parameters by different  applications (one user sets the printer
           to condensed print, does not reset the printer at the end of the job, and the next
           person's memo is printed in condensed instead of normal type).
   F-56

-------
                                                                   Installation Guidelines
   This will differentiate them from standard application programs, such as Lotus, MultiMate,
   and dBase.
        Differences in single user versus network usage of any particular application software
   program should be documented and if necessary, users should be given a demonstration
   or training on the use of applications on the network. Additionally, the network supervisor
   should be responsible for ensuring that application software copyright or licensing agree-
   ments are not violated by multiple users accessing  a single copy of certain software.
   Benefits of using application software on a network include sharing data files and system
   resources, such as printers, and having to pay for fewer copies of some software.  It is the
   supervisor's responsibility to ensure that multi-user data files and shared printers and other
   resources can be properly accessed by all network application software packages.

F.6.1 Install Software on Server and Workstations
        After directories, users, passwords, and rights are defined, the application files you
   plan to use (word processors, spreadsheet programs, etc.) must be loaded into the ap-
   propriate directories. File rights, if necessary, should be set up. Issues of concern to the
   network supervisor include:
        •  Vendor and publisher agreements that pertain to the number of users accessing
           an application program simultaneously.                                    ,
        •  Whether or not the application software is designed to be used in a multi-user
           environment
        •  Actual installation and configuration of application software on the file server.
        •  Modification of multi-user software file rights to allow application files to be
           shared.
F.6.1.1 Vendor and Publisher Agreements
        Software vendors have always tried to protect their investment  in developing applica-
   tion software. This is accomplished by imposing either physical or legal methods which re-
   quire that their software is used as intended.  The physical method of protection is known
   as copy protection.  Two legal methods of protection are license agreements and the
   copyright laws.  One additional type  of vendor-user arrangement that has  become
   prevalent is the "shareware." Though not as strict as licenses, shareware software and some
   public domain software generally requires that users pay a small fee register use of software
   in order to obtain software upgrades and support from the vendor.
         •  Copy Protection
        The use of copy protection in the MS-DOS arena has been declining, most of the best
   selling MS-DOS software packages are not  copy protected. Some methods of software
   copy protection and their use in a network environment are described below. In general,
   it is best to avoid copy protected software altogether, unnecessary  problems often result
   from its uses, especially in a network environment However, in some situations, suitable
   non-protected software may not be available, and use of copy-protected may be un-
   avoidable.
         •   Key Disk Schemes
                                                                              F-53

-------
LAN Technical Manual
         Some copy protected software allows the software to be loaded onto a hard disk, even
   a network file server; but requires insertion of a "key disk" in the local floppy drive before
   the application will run. Since the "key disk" cannot be copied, only one user can run the
   software at a time.  Some vendors may allow users to purchase additional "key disks" which
   would allow multiple users to run the software simultaneously. Generally, vendors will
   supply additional "key disks" only if they agree to have their software used over the net-
   work. Otherwise, entire packages have to be purchased for each user or the key disk(s)
   must be passed around.
         • Hard Disk Protection Schemes
         As hard disks became more popular, users complained about the use of "key disks"
   in running applications. Vendors began to use a form of copy protection that loaded the
   application software onto  a hard disk and did not require the use of "key disks."  Such
   protection methods generally employ some form of physical protection related to the struc-
   ture of the hard disk media. Such protection methods use low level details about the hard
   disk organization that may not be duplicated on a file server. For example, the protection
   scheme may directly access the hard disk controller, bypassing the operating system and
   not allowing the NetBIOS  software to work correctly; or may depend on the exact place-
   ment of the protected programs on the hard disk, which would be endangered if the file
   server were backed up and later restored. Because of this, use of software that employs
   this type of copy protection is strongly discouraged.  Some software in this category may
   function properly on a network. However, a burden still exists on the network supervisor
   to enforce the single user,  single machine license restriction. If it is necessary to attempt
   installation of such software on a file server, it is always best to do so before other applica-
   tions have been loaded, and prior to database initialization or other network usage. Spe-
   cial care must be taken when backing up a server containing this type of software.
         • Site License Agreements
         License agreements  from software distributors range from the simple to the very
   complex. Several large businesses and agencies, have been successfully sued for failure to
   comply with these license agreements  It is therefore critical that you understand the exact
   nature of licensing for the particular software you use. Appendix K of this guide contains
   a more complete discussion of the types of the licensing agreements available.
F.8.1.2 Application Sharing Concerns
         Most application software currently available was designed to run on single user ap-
   plications.  Some software vendors have either re-written their software to run on net-
   works, or have special versions available for network use.   However, since network
   hardware was developed before network application software, the network operating sys-
   tem software was designed to allow most existing POMS-DOS software to be adapted to
   network use without modifications. Several considerations must be taken into account
   F-54

-------
                                                                 Installation Guidelines
       For the first user login script:
       (1) Select the User Information option on the SYSCON menu. A list of users on the
          file server will be displayed.
       (2) Position the cursor bar and select the user on the list whose script you wish to
          create. The T Tser Information menu will be displayed.
       (3) Select the T rtpin Script option on the T Tsgr Information menu. The ReaHTrtgin
          Script for User entry box will be displayed.  It contains the name of the user
          selected in specified in step B. Press RETURN to accept the current user's name.
          A screen for creating and editing login scripts will be displayed.
       (4) Type in the user login script Your system will likely have some variaion to the
          EPA standard directory structure and parameters than the one described above.
          In this case, you will need to modify the sample script above to suit your particular
          needs. Refer to the NetWare Supervisor Reference manual for a complete
          description of login script commands and their usage.
       If you are using the EPA distributed sample  login script, it should be in the
  SYS:PUBLIC directory. Then the only line that needs to be entered under SYSCON is:

              SINCLUDE SYS:PUBUC/SCRIPT.EPA                               i

       (5) When the login  script is complete, press the ESCAPE key. A confirmation box
          will ask if you wish to save this login script. Respond by selecting "YES".

       To copy the first login script to other users:

       (1) Repeat steps A through B above, selecting the next user for which you wish to
          prepare a login script
       (2) Select the Login Script option on the T Jser Information menu. The Read Login
          Script for User entry box will be displayed. It contains the name of the user just
          selected from the list of users. To copy the script created above, use the BACK-
          SPACE key to erase the name in the box, and type in the name of the user for
          which the login script was created above.
       (3) If the script for this user needs to be modified, then make the changes. After any
          modifications to the script, or if none are necessary, press the ESCAPE key and
          verify that you do wish to save the login script
       (4) Repeat steps (1) through (3) for each user that you wish to create a login script
       Note that if scripts for users are created in this manner, changes to all user's scripts
   may be implemented by making changes only to the included SCRIPT.EPA file. Your
   users should be advised against removing the SCRIPT.EPA file from their individual
   scripts.
F.5.4.4 Supervisor's (LAN Administrator) Password
       A password must be assigned to the user SUPERVISOR.  Some users on the net-
   work will experiment with all of the network functions available. Even with good inten-
   tions, an untrained user can foul up the server or user configuration tables, creating work
                                                                            F-51

-------
LAN Technical Manual
   for the supervisor in sorting out and restoring the server configuration. The name "SU-
   PERVISOR" is not secure from any user that has access to the NetWare manuals. Adding
   a password to SUPERVISOR may be appropriate in order to restrict access to the
   supervisor's functions.   It is very  important that  you maintain  access to  the
   SUPERVISOR'S password at all times. It is also important that at least one other person
   either know or have access to that password. The SUPERVISOR password must be writ-
   ten down and stored in a secure place. Remembering a password when it is created may
   seem trivial; however, remembering a password several months later may be impossible.
   If other users' login names are added to the system that have security equivalences to the
   SUPERVISOR, then the same rules should apply to those users.
F.5.4.5 Multi-User Testing and Adjusting System Parameters
        After the server directory structure has been created, users have been added, and
   user security assigned, the access to server directories on all network stations by all user
   logins should be tested. The easiest method is to simply determine if the system works
   properly  after applications have  been loaded and users are accessing the  network.
   However, if a problem develops with the "wait-and-see" method, it would probably be more
   difficult for the LAN Administrator to determine the phase at which the problem occurred
   and take corrective action. Therefore, it is essential to take the time to verify each step of
   development as it occurs, whenever possible.
        Attachment 1 provides step-by-step instructions for testing the login and security
   functions on the network. The tests described in the appendix are very simple. In addition
   to verification of the network configuration, practical experience in monitoring network
   activity will assist in future network problem solving.
        Several parameters that pertain to the actual performance of the network, such as
   the number of file buffers, and the number of open files will also need to be monitored and
   adjusted.  These parameters are modified as part of the operating system installation pro-
   cedure (covered in Section  F.5).  However, assessing performance of these parameters
   depends primarily on the performance of the application programs on  the file server.
   Therefore, additional testing of operating system parameters will need to be performed
   after the application software has been loaded on to the file server.

F.6  -  APPLICATIONS LOADING AND VERIFICATION

        The focus of work on either a single-user workstation or a network is the use of ap-
   plication software. It is the job of the network supervisor to load application software, con-
   figure and initialize the software, and ensure that the users have the appropriate access to
   the application software. Network users will, for the most part, presume that application
   software being used on the network will perform in a manner similar to using that software
   on a standalone workstation.
        Because of the use of applications that have been developed using an application
   programming language, as in dBase, such uses will be refered to as dBase applications.
   F-52

-------
                                                              Installation Guidelines
VISOR, it will be to perform system main tenance tasks; and as such will most likely need
to perform such operations from the SYS:SYSTEM directory.


     Remark: Set search paths
           MAP      S1: = SYS:PUBLIC; S2: = C:\DOS; S3: = SYS:\DBASE;
S4: = SYS:WORDSTAR
     The next REMARK statement indicates that the following MAP command will
specify search paths for network use. A search path is the network equivalent of the DOS
PATH command  Search paths will be checked, in numerical order (SI through S16),
whenever a command needs to open a file that isn't on the current drive. Search paths are
checked by any Open File request  In the example above, two search paths are specified
using one MAP command line, separated by a semicolon. The first assigns SYS:PUBLJC
to SI; and the second assigns C:\DOS to S2.  The reason for these two maps are that
SYS:PUBLJC contains the network command line and menu utilities that are available to
network users; and the C:\DOS will allow the user to execute DOS or other commands
that are located in the DOS directory (if it is set up, as per the standard EPA configuration
recommen dataions) on the local hard disk (drive C:).
     REMARK: Display today's login message
     FDISPLAY SYS:PUBLJC/MESSAGE.TXT

     PAUSE
     The next REMARK indicates that a login message will be displayed. This is ac-
complished by using the script command FDISPLAY. It will search for a file called MES-
SAGE.TXT in the SYS:PUBLJC directory (it can be any valid name); and if found, will
display the contents of that file on the workstation's screen, This is very convenient for dis-
playing important reminders for network users or information regarding system usage. The
message file (MESSAGE.TXT) can be created using any word processor or text editor.
The file should be plain ASCII, without special control characters. After the message is
displayed, the PAUSE command will display the message "Press any key to continue" and
wait for the user to strike a key before continuing.
     DOS SET PROMPT = "$P$G"
     The next line, is included so that the command line prompt will indicate the worksta-
 tion default drive and directory. This convention is useful in reminding the user of the cur-
                                                                        F-49

-------
LAN Technical Manual
   rently logged drive and directory.  Refer to the DOS manual for a description of valid
   PROMPT parameters.
        MAPDISPIAYON
        MAP
        The next line turns the screen display of MAP information back on; one of the pre-
   vious commands had turned it off. Then a MAP command without any parameters will
   display all of the current directory/drive and search drive mappings on the workstation
   screen.
        EXIT program_name


        The last line of the login script, "EXIT program_name" is a method of terminating
   execution  of the login script command file  and executing a command or program.
   "Program_name" can be any valid DOS command, batch file, or executable program file
   (COM or EXE). An example of automatic program executions might be to execute the
   MENU program (the script line would read "EXIT MENU"). If a program name is not
   specified, the script file simply exits.
        The MENU utility is a program provided by NetWare that integrates many of the
   command line utilities and menu utilities so that users can execute NetWare commands
   from a pop-up menu system. The MENU utility also allows custom development of menus
   for applications on the network. An advantage to using the MENU utility is that users will
   not need to remember lengthy syntax required for executing certain application programs.
   Disadvantages of using the MENU utility are  that if users become accustomed to using
   MENU, then they will not be as eager to develop skills required for using DOS commands;
   and proficient users on the network may feel that the MENU utility slows them down.
        A sample disk containing a user login script and customized menus for the MENU
   utility should arrive on the server when shipped from SMA.
F.5.4.3 Creating th« UMT Login Scripts
        The SYSCON menu utility is used to create user login script files. SYSCON provides
   the ability to copy one user's login script to another user, thereby eliminating the need to
   re-type the same login script for multiple users. A complete description of the use of SYS-
   CON for preparing login  scripts can be found  in the NetWare Supervisor Reference
   manual The process of preparing a single user script and copying it for use by other users
   follows.
   F-50

-------
                                                            Installation Guidelines
login scripts. An description of each line in the script will explain the use of these com-
mands.
     WRITE 'Good %GREETING_TIME, %LOGIN_NAME.'
     WRITE "You are logged in as workstation '^TATION

     These first two WRITE lines make use of a valuable feature in the login script com-
mand set, that of using identifier macros.
     By using combinations of the WRTTE command with macro identifiers, very infor-
mative and specific messages can automatically be displayed when each user logs in to the
network. The macro identifiers can also be used with some other login script commands,
such as the IF..THEN construct; an example of which follows later in the script
     For example, if a user logs in at 9 o'clock in the morning with the command "LOGIN
BILL" on workstation 3, the system will respond to the login command with:

         Good morning, BILL.
         You are logged into station 3

     MAP DISPLAY OFF
     MAP ERRORS OFF
     The next two lines, MAP DISPLAY OFF and MAP ERRORS OFF, simply ensure
 that subsequent MAP commands or MAP errors will not be echoed on the display as they
 are executed.
     REMARK: Set 1st network drive to 1st letter after LASTDRJVE
     REMARK: Set drive P: to be the home directory for each user
      The lines that begin with "REMARK:.." are inserted simply to comment the inten-
 tion of commands which follow the remarks. "REMARK" is a valid script command.
      MAP P:=SYSJ»ERSONA1V%LOGIN_NAME
                                                                      F-47

-------
LAN Technical Manual
        MAP •!: = SYS:WORDSTAR

        MAP «2: = SYS:PUBUC

        MAP«3: = SYS:DBASE

        MAP«4: = SYS:LOTUS

        MAP-5: = SYS:TEMP
        The next six script command lines assign directories on the network drive to logical
   drives for the user. Note that the first maps assign the personal directory to a specific drive
   letter (P). Since everyone will have a personal directory, the mneumonic convention will
   always exist, and the map can be specific. The conventions of "•!", "*2" indicate the first
   and second available drives for network use. If the CONFIG.SYS file on each workstation
   has been set up with the "LASTDRIVE = M" parameter, then the first available network
   drive will be I:; and "• 1" will be the same as drive I:, ""2" for drive J:, etc.
        For consistency, all workstations should have application directories mapped to the
   same drive letters. Therefore, in our example, the first MAP command specifies that the
   user's home directory (for private files) be mapped to drive P:. The subsequent MAP com-
   mands specify that  the SYS:PUBLIC directory  be mapped to drive I:, the SYS:WOR-
   DSTAR directory to drive J:, the SYSrDBASE directory to drive K:, the SYS:PROJECT1
   directory to drive L:, and the SYS:PROJECT2 directory to drive M:.
        The NetWare manuals are somewhat ambiguous over the use of DOS directories and
   paths. There is a provision for specifying the directory paths (DOS SET PATH = ) in the
   login script command language; however, Novell warns that certain normal DOS com-
   mands will not work properly under network use; among them are COPY and PATH. Be-
   cause of this, it is suggested that directories on the network drive (s) be  mapped to logical
   drives, as shown in the example above. Another  reason for the validity of this approach is
   that certain application programs do not work particularly well with DOS subdirectories.
   An example of this type of program is dBase. In dBase, it is much easier  to specify a search
   path as a drive instead of a default directory.  Other application program, such as Lotus,
   provide an easy method of working with subdirectories, but will just as easily work with
   drive specifications for data files. Overall, the presiding reason for mapping network direc-
   tories to logical drives is the fact that NetWare  may not work correctly with directories
   when running certain DOS commands or application programs.
       IF "%!' = 'SUPERVISOR' THEN MAP P: = SYSrSYSTEM
       The next command in the sample login script is a conditional "IF-THEN" branch.
  This lines specifies that if the first parameter on the LOGIN command line (e.g. LOGIN
  name) is the user name "SUPERVISOR", then map the SYS:SYSTEM directory to the
  first network drive. The purpose for this is that most often when a user logs in as SUPER-
  F-48

-------
                                                                  Installation Guidelines
   to monitor directory entry availability. If there is a need to remove trustee assignments to
   create more space for files, then certain steps must be followed to ensure the operating
   system integrity. They are:
        (1)  Delete trustees;
        (2)  Bring the server down (via BROADCAST/DOWN); and
        (3)  Reboot the file server.
        These steps will inform the operating system of a change in the parameters for free
   directory entries, and additional files may then be added to directories. Also, the best time
   to perform this action is at night, after everyone has logged off the network.             :

F.5.4 Prepare Workstation LOGIN Scripts
        A standard EPA login script should be installed on file servers purchased from SMA.
   This script is contained in a file named SCRIPT.LOG in the SYS:PUBLIC directory. The
   commands in the standard EPA login script can be included for each user by use of the IN-
   CLUDE directive, which is described below.
        A login script is a series of special NetWare commands that are executed automati-.
   cally each time a user logs in. A system login script is automatically created when the v t
   operating system initialized.  This system script can be customized by anyone having su-.
   pervisor rights. Additionally, each user can have a unique login script, cus tomized for par-
   ticular applications or uses.  The system login script exists for all users, and is  executed
   when users first log in to the file server. If a user login script exists, it is executed after the
   system login script.  Each user can modify his/her own user login script by using the SYS-
   CON utility.
        Some of the  login script commands allow  conditional execution of commands,
   depending on the parameters specified on the LOGIN command line (e.g. login name,  ,
   login password, and other optional parameters on the command line). It is  the LAN
   Administrator's responsibility to prepare a login script for each user on the network ini-
   tially; however, users may later modify their login scripts if desired.  Login scripts are
   created and modified by using the SYSCON utility.  In order to create login scripts for each
   user, you must be logged in to the network as the SUPERVISOR.
        Login scripts can include commands which will automate many functions necessary
   for proper use of the network, and provide the users with useful information as to the cur-
   rent status of the network. Some features of login script commands include:
            Mapping directories to be accessed as logical drives;
            Mapping directories to be searched for program execution;
            Informing the user of the current workstation number other network and operat-
            ing system parameters;
            Displaying text messages reminding users of important network information; and
            Executing batch files or programs upon termination of the login script;
                                                                             F-45

-------
LAN Technical Manual
F.5.4.1 identifier Macro*
       Identifier macros are variables that the script language recognizes and substitutes the
   appropriate values for the macros in their place. The identifier macros available for the
   WRITE and other login script commands are:
       • DATE AND TIME IDENTIFIERS
       HOUR               Hour of day or night (1-12).
       HOUR24              Hour (00-23).
       MINUTE              Minute (00-59).
       SECOND              Second (00-59).
       AM_PM               Day or night (am or pm).
       MONTH              Month number (01-12).
       MONTH_NAME        Month name (January, June, etc.) .
       DAY                 Day Number (01-31).
       NDAY_OF_WEEK      Weekday number (1-7, Sunday is 1).
       YEAR           •  Year in full format (1983, '1987,
       SHORT_YEAR        Year in short format (83, 87, etc.
       DAY_OF_WEEK       Day of week (Monday, Friday, etc.)
       •  OTHER IDENTIFIERS
       LOGIN_NAME        User's unique login name.
       FULL_NAME         User's full name  (from SYSCON file
       STATION           Workstation number.
       P_STATION         Physical station  (12 hex digits)
       GREETING_TIME     Morning, afternoon, or evening.
       SHELLJTYPE        Shell type number (0, 27, 3, etc.)
       OS               The workstation's operating system
       OS_VERSION        The version of the workstation's D
       MACHINE           The machine for which the shell wa
       written:e.g.IBM_PC).
       SMACHINE          Short machine name (e.g. IBM).
F.5.4.2 EPA Standard Login Script
       The following EPA login script, which corresponds with the example directory struc-
   ture (in section F.5.1), outlines some of the more useful commands available in preparing
   F-46

-------
                                                                 Installation Guidelines
   following subdirectories could be created: \PERSONAL\JOHN, \PERSONAL\BILL,
   \PERSONAL\LOU1SE, \PERSONAL\JANE, and \PERSONAL\DAN.  Using this
   structure, the appropriate program and data files would be installed in their respective
   directories, and each user would have his/her own personal directory to store private files.
F.5.3.2 Specifying Maximum Rights For Subdirectories
        The process of adding or removing rights from the Maximum Rights Mask for a direc-
   tory is as follows.
        (1) Select the Select Current Directory option on the FILER main menu.
        (2) A window for typing the new path will be displayed containing the current direc-
           tory.  Use the backspace key to delete the directory information displayed and
           type the directory name for which you will be setting Maximum Rights.
        (3) Select the Current Directory Information option on the FILER main menu.
        (4) The Current Directory Information menu will be displayed for the directory you
           entered. Select the Maximum Rights option on this menu; the Maximum Rights
           list for the current directory will be displayed. It lists the rights that may be ex-
           ercised in the current directory.
        (5) To add a right to the list, press the Ins key. The Other Rights list will be displayed.
        (6) Select the right you wish to add; the right will be added to the Maximum Rights
           Mask.
        (7) To delete a right from the Maximum Rights Mask, select the right to remove from
           the Maximum Rights list and press the Del key. The Revoke Right confirmation
           box will be displayed. Confirm whether this right is to be deleted.
        The eight security rights (refer to Section FJ for an explanation of security rights)
   that may be granted or revoked, are available as Trustee Rights and Directory Rights. As-
   signing Maximum Trustee Rights is described in the section on SYSCON. Specifying Max-
   mimum Rights for Subdirectories refers to the ability to grant or revoke the eight security
   rights that may be exercised in a directory. Even though a user or group may have certain
   trustee rights, a directory must also grant those rights for the user or group to have Effec-
   tive Rights.
        For example,  if the  group ADMIN is granted READ-WRITE rights to the
   SYS^DBASE directory, but the directory's  Maximum Rights Mask specifies READ-
   ONLY, then the group ADMIN's Effective Rights in that directory are READ-ONLY.
        The Maximum Rights for a directory can also be displayed by typing "RIGHTS" at
   the DOS prompt while in that directory. Anyone having Parental rights in a specific direc-
   tory may set Directory rights by editing the directory's rights mask using the FILER utility.
                                                                            F-43

-------
LAN Technical Manual
F.5.3.3 Specifying Trustees of • Directory (Groups and Users)
        The process of adding or removing trustees of a directory is as follows.
        (1) Select the Select Current Directory option on the FILER main menu.
        (2) A window for typing the new path will be displayed with the current directory
            shown. Use the backspace key to delete the directory information displayed.
            Type the directory name for which you will be specifying trustees, or press the Ins
            key and select from a list of available directories.
        (3) Select the Current Directory Information option on the FILER main menu.
        (4) The Current Directory Information menu will be displayed. Select the Trustees
            option on the menu.
        (5) The Trustee Name/Trustee Type/Rights list will be displayed. If the list is blank,
            then no trustees have been added to the directory yet
        (6) To add a trustee, press the Ins key. A list of the available users and groups will
            be displayed.  Select the user or group you wish to make a trustee.  For public
            programs and data directories, it is easiest to select the group EVERYONE as
            the directory trustee. For private and/or restricted directories, select each user as
            a trustee of that directory.
        (7) To delete a trustee, position the cursor  over the directory trustee you wish to
            delete and press the Del key.  The Delete Trustee From Directory confirmation
            box will be displayed. Confirm whether  the trustee should be deleted from the
            directory.
        (8) Repeat steps (2) through (7) for each of the directories that were created.
        Specifying Trustee  of a Directory is functionally the opposite of assigning Group
   Trustee Rights in a Directory, which is described above under SYSCON. Using the S YS-
   CON method, a group is first selected, then directories are added to that group's trustee
   rights. The current FILER method specifies that a  directory is first selected, to which users
   or groups are added as trustees.
        Trustee basically means "having rights to". Which rights are determined by the Max-
   imum Rights Mask for the group and for the directory.
F.5.3.4 Directory Limitations
        Certain limitations should be noted when creating directories and assigning trustee
   rights to directories. When the operating system was installed, the number of directory
   blocks for directory entries was specified. By default this number was maximized accord-
   ing to available disk space. Each directory block allocated will hold 128 file entries. When
   a trustee is assigned to a directory, the information is stored on the server as part of a direc-
   tory entry.  Each five trustee assignments take up one directory entry. Normal assignment
   of trustee rights will not usually cause a problem, but if your particular configuration in-
   volves an unusually high number of trustee assignments, then it would be wise to monitor
   the number of free directory entries.  This  is done by using  the command line utility
   VOLINFO. On such configurations, regular usage of VOLJNFO will allow the supervisor
    F-44

-------
                                                                 Installation Guidelines
          list of available directories will be displayed from which you may choose the ap-
          propriate directory.
       (6) Repeat step (5) until all of the necessary directories have been added for the
          group.
       (7) Repeat steps (3) through (6) for each of the groups on the file server.
       For example, suppose the group we created above, ADMIN, required  access to
   several directories, \BUDGET, \WORDSTAR, and \AIRDATA; and the group AIRQ
   required access to the \DBASE and \AIRDATA directories. Steps (3) and (4) would first
   be executed for the ADMIN group; step E would then be repeated to add the \BUDGET,
   \WORDSTAR, and \AIRDATA directories to that group. Then Step (3) and (4) would
   be executed for the AIRQ group, and step (5) would be repeated to the \DBASE and
   \AIRDATA directories to that group.
F.5.2.4 Assign • User to • Group
       All users are automatically assigned membership  to the group EVERYONE.
   However, users must be manually assigned membership to special groups, as  described
   above. The process of assigning a user membership to a group is as follows.
        (1) Select the firnnp Information option on the SYSCON main menu.
        (2) The current groups on the file server will be dis played.
        (3) Position the cursor and select the appropriate group. The firnnp  Information
           menu will be displayed.
        (4) Select the Member T.ist option on the menu; the current group members will be
           displayed.
        (5) To add a user to a group, press the Insert key. The Not Group Members list will
           be displayed.  This is a list of all users on the file server that are not currently
           members of that group.
        (6) Position the cursor over and select the user to be added. The user will then be-
           come a member of that group. Optionally, if you know the login name of the user
           to add, that name may be typed instead of selecting the name from  the list.
         (7) Repeat these steps to add users to each appropriate group.
        To continue with our example, the ADMIN group would be selected in step (3).
    Steps (5) and (6) would be repeated to add John, Bill, and Louise to the ADMIN group.
    The AIRQ group would then be selected as in step (3); and Jane and Dan can be add as
    members of the AIRQ group.
         The SYSCON program is sensitive to a user's trustee rights. That is, any user can ex-
    ecute SYSCON, but the program will only allow the user to add, delete, or modify infor-
    mation at a level equal to or lower  than those of the user. Thus, every user can modify
    his/her own login script and password, but is only able to modify trustee rights to those
    directories for which that user is the owner. Ownership of directories is discussed below.
                                                                            F-41

-------
LAN Technical Manual
F.5.3 Using FILER
        The FILER program is used to control volumes, directories, subdirectories, and files
   on a file server. A complete description of the operation of FILER can be found in the
   NetWare User Reference, Part II- Menu Utilities manual. FILER is a menu driven program
   and is very easy to use. Basically, the use of FILER involves selecting options on layers of
   pop-up menus until the action you desire is displayed on one of the menus.
        FILER implements many of the NetWare command line utilities in addition to
   providing a few unique services of its own. Like SYSCON, the user must have appropriate
   trustee rights for that function in order to use the FILER functions to add, delete, or modify
   many of the parameters. Various functions require trustee rights equivalent to those of
   the user SUPERVISOR, Parental rights  to that directory, or appropriate Open,  Read,
   Write, Modify, Create, or Delete rights where indicated. A complete list of functions and
   rights requirements can be found in Attachment 2.
F.5.3.1 Creating Directories
        Note that SMA will create the standard EPA directory structure on file servers and
   much of the following discussion will pertain to additional directories to enhance the EPA
   standard directories. The process of creating new directories and subdirectories on the
   file server is as follows.

        (1) Select the Select Current Directory option on the FILER main menu.
        (2) A window for typing the new path will be displayed. Use the backspace key to
           delete the directory information displayed. Type 'SYSr/*. This will ensure the
           current directory is the root directory.                          ;
        (3) From the FILER main menu, select the Subdirectory Information option on the
           menu
        (4) A list of Subdirectories will be displayed. The directories that were created when
           the operating system was installed should be displayed; they are PUBLIC, MAIL,
           SYSTEM, and LOGIN.
        (5) Press the Ins key.  A window for typing the new directory name will be displayed.
          Repeat this step for each of the directories you wish to create directly off of the
          root directory.
        (6) To create subdirectories, change the current directory to the directory which will
          contain the subdirectories (step B); then repeat the steps for adding directories
          as outlined in steps (3) through (5).
        The DOS command function MKDIR can also be used to create new directories, and
   the RMDIR command can be use to remove directories. If you are proficient in the use
   of DOS, these commands may be somewhat easier and faster to implement a directory
   structure than use of the FILER program.

        The basic EPA directory structure is shown in Figure F3 above. For example, fol-
   lowing directories could be created off of the SYS: root directory: \WORDSTAR,
   \DBASE, \LOTUS, \TEMP and \PERSONAL. Under the \PERSONAL directory, the
   F-42

-------
                                                                  Installation Guidelines
   Details of preparing the system and user login scripts can be found in Section F.6 of this
   appendix.
        Because most application programs, including WordStar and dBase, do not need to
   write to files in the  application directories during execution, all files in the application
   directories should be flagged as Read-Only/Sharable. This will allow multiple users to ac-
   cess programs simultaneously, but will prevent users from accidentally modifying the
   program files. The FLAG command is also discussed further in Section F.6.
        That is all there is to it Once the types of application programs, the public and private
   data, and the users have been described, then all of the information is ready for creating
   directories and assigning user rights. The real value in preparing worksheets is that when,
   you sit down at the computer to begin work, referring to the worksheets for organization
   will simplify the task.
F.5.2 Using SYSCON
        The SYSCON program is used to control users, groups, directories, and file server
   access. A complete description of the operation of SYSCON can be found in the NetWare
   User Reference, Part II - Menu Utilities manual and the NetWare Supervisor Reference
   manual.  Basically, the use of SYSCON involves selecting options on layers of pop-up
   menus until the action you desire is displayed on one of the menus.
        SYSCON is a powerful program that integrates many of the NetWare command line
   utilities in addition to providing a few unique services of its own. Many of the functions
   available in SYSCON will allow the user to display the current parameters for a topic. In
   order to use the SYSCON functions to add, delete, or modify many of the parameters, the
   user must have trustee rights equivalent to those of the user SUPERVISOR. A complete
   list of functions and rights requirements can be found below in the section labelled Addi-
   tional Menu Utility Func  tions. To use the utility, just type SYSCON from the DOS
   prompt
F.5.2.1 Adding and Deleting User*
        The process of adding new users and removing existing users from the file is as fol-
   lows.
         (1) Select the User Information option on the SYSCON main menu.
         (2) The current users on the file server will be dis played. Initially, only the users SU-
           PERVISOR and GUEST will appear in this list
         (3) To add a new user, press the Insert (Ins) key. The Usemame entry box will be
           displayed. By typing a new user's name, the user will be created on the file serv-
           er. New users are automatically assigned as members of the group EVERYONE.
         (4) To delete  a current user, position the cursor over the user to be deleted on the
           list of file server users. Press the Delete (Del) key. The user's profile and access
           rights will  be deleted from the file server.
         For example, suppose John, Bill, and Louise need to be given access to the file serv-
    er. Steps (1) and (2) would be followed exactly as described above.  Step (3) would then
                                                                             F-39

-------
LAN Technical Manual
   be repeated three times, once for each new user. In other words, all new users could be
   added by pressing the Ins key, then typing the user's name, once for each new user, as
   described in Step (3).
F.5.2.2 Creating • Server Group
        In many cases, it will suffice for users to belong only to the group EVERYONE, which
   i« assigned automatically. However, if you wish to assign users to a group, and use the group
   trustee rights to restrict or grant access to particular directories, then a unique group can
   be created, and the appropriate users assigned membership to that group.  The process of
   creating a Server Group follows.

        (1) Select the Group Information option on the SYSCON main menu.
        (2) The current groups on the file server will be dis played. To add a group, press the
            Insert key. The Group Name entry box will be displayed.
        (3) After typing the group's name, the group will be created on the file server.
        For example, if John, Bill, and Louise are all part of the division's administrative staff,
   a group name ADMIN might be created on the server. Further, Jane and Dan perform
   technical analysis related to Air Quality studies. A group named AIRQ might be created
   for these users. In the next step, ADMIN can be assigned access rights to particular direc-
   tories that pertain only to administrative functions; and AIRQ can be be assigned access
   rights pertaining to Air Quality research. Later, John, Bill, and Louise can be added to the
   group ADMIN; and Jane and Dan can be added to the AIRQ group.
F.5.2.3 Assign Group Trustee Rights In • Directory
        All users are assigned to the group EVERYONE; the group EVERYONE should
   be given trustee rights to all public directories.  In those cuses where it is appropriate to
   define a special group for restricted access to directories, the group may be assigned trus-
   tee rights to particular directories and the appropriate users made members of that group.
   Note that it is only necessary to assign group trustee rights to those directories that will
   have restricted access. If users are members of the group EVERYONE, then all direc-
   tories available under EVERYONE will also be available to those users. The process of
   assigning Group Trustee Rights in a directory is as follows.
        (1) Select the Group Information option on the SYSCON main menu.
        (2) The current groups on the file server will be dis played.
        (3) Position the cursor and select the appropriate group. The Group Information
           menu will be displayed.
        (4) Select the Trustee Assignments option on the menu. The group's current trustee
           assignments will be displayed.
        (5) To add a directory to the group's trustee rights, press the Ins key. A window for
           typing the directory name will appear. If you know the directory name to add,
           simply type it in. If you are not sure of the directory name, press the Ins key; a
   F-40

-------
                                                                Installation Guidelines
     •  Accounting
     •  Other
     In many instances, several users on a network will frequently use the same applica-
tion programs, but will be working on fundamentally different projects.  An additional
division of work functionality can further help organize the storage of data on the network
server. On a simple level, work function divisions can be initially defined something like
the following:
        Shared documents
        Private documents
        Shared databases
        Private databases
        Shared other
        Private other
     Because there will often be shared and private files that are used with one type of ap-
plication, a method must be developed to maintain the appropriate security. When users
must access shared files, a directory should be created specifically for those files. A shared
data directory could be defined in terms of the application program used to work with those
files, or in terms of a multi-person project that will use several application programs in  ^
preparation of reports and documents.
     Each user on a network will need to maintain a directory of files to which only that
user will normally have access.  These personal directories can be grouped together in a
single directory called PERSONAL (or any appropriate name), under which users can have
subdirectories named as their  login ID.  Optionally, each user could own directories
created directly off the root directory. However, if a large number of users are on the net-
work, the root directory could quickly become cluttered with user directories. Therefore,
in the EPA environment, users will have subdirectories off the directory PERSONAL, and  i
all user files must be in that directory. Shared files will be in subdirectories for the specific
application or a single directory called TEMP. TEMP will be an area in which all users will
have Read/Write access. This area will be erased and purged on a regular basis.
     If the suggested guidelines are put into an example, the directory structure for a small
set of applications and users might be structured like the example in Figure F3. Note that
this example does not show the system directories (SYSTEM, PUBLIC, MAIL, LOGON)
created when the operating system is installed.
                                                                             «.
     In this example, the program files for dBase and WordStar are each put in their own
directories, and all appropriate users have read-only access to them. Since both John and
Jane are working with files for Project 1 and Project2, the files are kept in directories created
for that purpose. Files which are not intended for other users to read can be stored in per-
sonal directories.  In the example above, JOHN would not be able to read files stored in
the SYS:\PERSONAL\JANE directory. Access to personal directories should not be as-
signed to user groups, but rather to individual users.
                                                                           F-37

-------
LAN Technical Manual
SYS:\(ROOT)
1
1
\DBASE
1
1
files
for
dBase

1
\WORDSTAR
1
1
files for
WordStar


1
1
1
\PROJECT1 \PROJECT2 \PERSONAL
1
1
shared
data
files

1
1
shared
data
files

1 1
1 1
\JOHN\JANE
1 1
private private
files files
   Figure F.3 Example Directory Structure

        Your particular server directory structure should facilitate your particular needs.
   The purpose of planning the directory structure is to avoid users haphazardly creating files
   in unrelated directories, making them difficult to locate; and to restrict access to private
   files and to allow access to shared files. Careful planning will greatly aid in the ability to
   locate particular files (particularly older files), and make the day to day maintenance of
   file security an easier task.                                             -'
        You may wish to assign a common password for each user at this time. Users should
   change their passwords after they have begun using the network.  Pay particular attention
   to the column labelled User Rights.  Entries in this column will define what access rights
   each user will have to the directories. A more complete discussion of access rights can be
   found in the User Reference, Port 1: NetWare Basics manual, and in the NetWare/286 In-
   stallation manual.
F.5.1.2 Servtr Files
        The Server Files worksheet specifies that the following information be filled in:
         •  Program Name
         •  Type (Application or Data)
         •  General Category
         •  Directory
        The WordStar  and dBase directories contain the files necessary for running the ap-
   plications. Both of these applications consist of numerous files such as overlays, configura-
   tion files, and help files.  NetWare provides a SEARCH command (similiar  to the DOS
   PATH command) which allows specification of particular drives and directories to be sear-
   ched for loading applications. A SEARCH command should be  specified for each direc-
   tory containing public applications, and should be made a part of the system  login script
    F-38

-------
                                                                  Installation Guidelines
   password and grant security rights (trustee assignments and security equivalences). When
   you feel very comfortable with the SYSCON utility and its uses, delete all practice users
   and groups you created.
        It is very important that the supervisor for your network become familiar with all
   aspects of both the FILER and the SYSCON utility programs before actually setting up
   the hard disk with real directories and real users and user groups. If you attempt to learn
   how to use these utilities while setting up the actual directory structure and users, you will
   likely find that many decisions  you make will be incorrect, and additional work will be
   created by attempting to rectify your mistakes. The concepts involved in creating a direc-
   tory structure  and users are not difficult; and they are perhaps best learned by using the
   FILER and SYSCON programs on practice data.  EPA has identified a file and directory
   structure to be used on each server, and familiarity with this structure is equally important

F.5  INITIAL NETWORK SETUP AND VERIFICATION

        The success of many network installations depends largely upon the degree of com-
   fort users experience in their initial sessions on the network. Some factors influencing this
   are the proper performance of the network, the ease of use in performing daily tasks, and
   the competence of the network supervisor. Proper network performance means that when
   users attempt to perform basic computer tasks, such as running an application program or
   printing a file, the system operates as expected, and in a timely manner. Proper prepara-
   tion in allowing a user to log in to a network with an appropriate default configuration will
   minimise the number of commands a user must remember to perform basic tasks, and thus
   enhance the ease of use.  The competence of the network supervisor will be recognized by
   users based partly upon the appropriateness of any written or verbal instructions, the ability
   to answer questions and solve problems, and timely communications between users and
   the network supervisor. The supervisor's own confidence and competence will grow with
   experience.
F.5.1 Create User Access Configuration Tables
        After the network operating system software has been installed and prior to loading
   application programs, the structure of file organization and user access and security must
   be specified. Just as planning the network topology is an essential step in installing net-
   work cabling and hardware, planning the server file organization and user access is a neces-
   sary part of the successful installation of application software. The steps involved in
   preparing the server for application software and user operation include:

        (1) Planning;
        (2) Creating a directory structure on the file server;
        (3) Creating user profiles, including passwords; and
        (4) Specifying user, directory, and file security.
        The requirements for completing these four steps are a thorough understanding of
   DOS directory structures and the NetWare programs FILER and SYSCON. Directories
                                                                             F-35

-------
LAN Technical Manual
   provide the means by which to organize program and data files on the file server. The
   FILER is a menu-driven- program used to create and manage directories on the file serv-
   er. The DOS MKDIR command can be used to create and remove directories instead of
   the FILER utility.  Users are added and given access to certain directories by using the
   SYSCON program.
        DOS directory structures are covered in detail in both the DOS manual and the Net-
   Ware Basics manual  In general, directories can be thought of as having a tree or hierar-
   chial structure. That is,, there is a root directory, from which branch directories, each of
   which may contain additional subdirectories, and so on. The advantage of this type of or-
   ganizational structure is that it allows program and data files for a particular application
   program to be kept separate from files that belong to a different application. Instead of
   searching through a long; list of files from a variety of applications, locating a file involves
   changing to the appropriate subdirectory and searching through files that are relevant only
   to a particular application. Additionally, from a networking point of view,  directories
   provide a means of assigning and restricting access to groups of files, by means of trustee
   rights, security equivalences and directory Maximum Rights Masks, which are described
   in more detail later in this section.
        You should develop a written plan before actually beginning to set up directories,
   users, and security. Volume I, Chapter 2, Planning Guidelines, provides information which
   should be reviewed andworksheets for preparing the server for use. LAN Planning Check-
   lists-6 and 7 provide space, for establishing your users' access rights and group member-
   ships. After the planningis: completed, use the SYSCON utility tp add user lists and groups
   and to define user rights^and the FILER utility to create directories.
F.5.1.1 Server Users
        Typically, a networfrenvironment will be correlated with a lab, group, or division staff
   of workers. Each worker wHl have a generally defined role, in terms of the type of work
   the employee normally performs. If the employee is currently using a personal computer,
   then some of the programs that employee will need to access  on the network are already
   defined. If the employee is new to computing, then that person's role must be specified in
   terms  of the type of applications to be used on the network.  The various roles network
   users assume generally comprise the user groups that will be created. User groups might
   correspond with job responsibilities, such as Secretary, Scientist, Technician, Data Process-
   ing, etc.
        Even though access:to various applications may overlap,  the network security will be
   set up according to the group(s) to which users belong.  Typical application program
   divisions can be defined such as:
            Spreadsheets
            Data base and data analysis
            Graphics
            Word processing
            Communications
    F-36

-------
                                                               Installation Guidelines
  while other utilities are network counterparts to their DOS equivalents. This means that
  some of the normal DOS commands should not be used, or their use may be restricted,
  while nmning under the NetWork shell. The DOS commands which do not work proper-
  ly on network drives are: ASSIGN, CHKDSK, COPY, DIR, LABEL, PATH, and PRINT.
  Novell provides network equivalents for these commands.
       A detailed description of all PUBLIC commands can be found in the NetWare User
  Reference, Part III: Command Line Utilities, and in the NetWare User Reference, Part II:
  Menu Utilities. A brief description of each of the commands in the PUBLIC directory, or-
  ganized by functions, are included in Attachment 2 to this appendix. The functional groups
  of utilities include:
        •  Commands with DOS equivalents
        •  User Information and Access Commands
        •  Print Spooler Commands
        •  Advanced Commands
  (2) SYS:SYSTEM Directory
       The  directory SYS:SYSTEM contains the  network  operating system
  (NETSOS.EXE), along with certain server utilities that only the network supervisor should.
  be allowed access. These utilities are fully described in the NetWare Supervisor Reference
  manual Brief descriptions of the important utilities are also included in Attachment 2.
       The user SUPERVISOR has full access rights to the SYSTEM directory.  The user
  GUEST, and all users created as members of the group EVERYONE, have no rights to
  this directory.
  (3) SYSiOGIN Directory
        The LOGIN directory is created by the operating system during installation. Initial-
  ly, there are only two files residing in the LOGIN directory:  LOGIN.COM and
  SLJST.EXE.  The LOGIN.COM file is the program which is executed when you type
  'LOGIN name* at a workstation. It functions to provide the initial right to access the file
  server by verifying the user name and password that was entered with a valid name in the
  server user access table. The SLIST.EXE file is a program that lists all servers and their
  names that are currently attached to the network (Le. Server LIST).
        The user SUPERVISOR has full rights to this directory. The user GUEST and all
  users created with security equivalence to the group EVERYONE have read-only rights
  to this directory. The LOGIN directory is unique in this respect, and certain applications,
  such as special menus, may be installed in this directory. This feature allows users to ex-
  ecute programs that they have been told about, while denying them the ability to search
  the directory and then possibly execute programs and commands which they should not
F.4.5.4 MENU Utilities
        NetWare provides two programs, FILER and SYSCON that are the primary means
   of performing all directory and user maintenance operations. These two programs will be
  used most frequently by the LAN Administrator. Other users may be run these programs,
                                                                          F-33

-------
LAN Technical Manual
   but with restricted functionality.  They are described in detail in Section 6 of this docu-
   ment. A brief discussion of each follows.
   (1) FILER
        The FILER program is a menu driven utility that is used to create a directory struc-
   ture. It is the primary means by which all directories are created and deleted from the net-
   work server. It is very important that LAN Administrator or the person responsible for
   managing the network structure be familiar with all aspects of using the FILER utility.
   Management functions accomplished with FILER  are discussed in greater detail in Sec-
   tion F.53. FILER is executed by typing FILER at the network command prompt (e.g. at
   the N prompt, type 'FILER'). The program will load and display a menu of available func-
   tions which will be similar to the following:
           Current Directory Information
           File Information
           Select Current Directory
           Set Defaults
           Subdirectory Information
           Volume Information                             >
        Carefully study the information presented on the FILER program in the NetWare
   Menu Utilities manual.  After reading all the information on FILER, practice using it
   Create several practice directories. Once you feel very comfortable with the FILER, delete
   all practice directories you created.
   (2) SYSCON
        The SYSCON program is a menu Utility used to create objects (users and groups)
   and to assign security rights to those objects. It is the method by which new users are added
   to the network, and old  users are removed. It is also the method by which trustee rights
   are granted to users and groups, and the method by which a user is made a member of a
   group. It cannot be stated strongly enough, that the network supervisor should become
   very familiar with using the SYSCON utility. It is the one program which controls what ac-
   cess rights users will have on the network.
        The  SYSCON utility is executed by typing SYSCON  at the  netware command
   prompt The program will load and display a menu of available functions, which will be
   similar to the following:
           Change Current Server
           Filer Server Information
           Group Information
           System Login Script
           User Information
        Carefully study the information on the SYSCON utility presented in the NetWare Su-
   pervisor Reference manual. After you have read all of the information on the SYSCON
   program, practice using it Create several practice users and groups, and  assign them a
    F-34

-------
                                                                  Installation Guidelines
        The chart below indicates how users rights might be distributed over several direc-
   tories.
      DIRECTORY              RIGHTS      USER

      SYS:SYSTEM              All rights      LAN Administrator or equivalent
                                 Read only     Barbara
      SYS:PUBUC               Read only     All users
      SYS:DBASE                Read only     Jim, Paul, Sue
                                 Read/Write   Barbara, John
F.4.5.2 User Groups
        As mentioned above, the network supervisor can define various user groups. Each
   user group can have a specific set of trustee rights granted allowing access to various direc-
   tories. The utility of creating user groups becomes evident when one or more directories
   are created, and you wish to assign trustee rights to several users for those directories. In-
   stead of individually assigning each user trustee rights to each directory, you can simply
   create a user group with the appropriate trustee rights, then make users a member of that
   group. Likewise, if you wish to add or remove access of all those users to the same or ad-
   ditional directories, you can simply change the user group's trustee rights, and all users that
   are members of that group will automatically have their trustee rights modified.
        In the example above, three groups could be created to account for the various levels
   of security for all users.  A group, SLJPER2, could be created with restricted access to
   S YS:S YSTEM. Users in this group would likely perform certain system maintenance tasks.
   A second group, DBASE_RW,  could be created for users that need Read and Write ac-
   cess to the SYS:DBASE directory. The third group, DBASE_R, would allow members of
   that group only read access to the SYS:DBASE directory.
        When the NetWare server software is installed on a file server, the INSTALL utility
   automatically configures the server for initial use. It does this by.
        A) creating four directories, which are:
           1) SYS:SYSTEM

           2) SYS:LOGIN

           (Users are allowed Read but not Search access rights)
           3) SYS:PUBUC, and

           4) SYSiMAIL

           ("SYS:" is always the name of the first file server on a network);
                                                                            F-31

-------
LAN Technical Manual
        B) adding two users, SUPERVISOR and GUEST; and
        C) adding one group, EVERYONE.
        NetWare refers to users, groups, and servers as objects. Thus, the objects that are
   automatically created by the server's operating system are the users SUPERVISOR and
   GUEST, and the group EVERYONE.
   (1) The User SUPERVISOR
        The user SUPERVISOR is permanent It cannot be deleted or renamed Further-
   more, the user SUPERVISOR always has ALL rights in all servers and directories. The
   SUPERVISOR'S rights cannot be revoked. If desired, additional users can be added that
   have a security equivalence to user SUPERVISOR, in that such users will have full rights
   to all servers, volumes, and directories. However, note that the proliferation of users with
   SUPERVISOR security equivalences can quickly lead to confusion and contradictions in
   implementing network security.
   (2) The Group EVERYONE
        The group EVERYONE is created by the operating system as a special group to
   which all new server users are assigned as members. The group EVERYONE is made a
   trustee of the SYS:PUBUC directory with Read, Open, and Search rights in that direc-
   tory. All users, as members of the group EVERYONE, are given rights to run the Net-
   Ware user utilities, which reside in the PUBLIC directory. Assigning all users as members
   of the group EVERYONE is also a convenient method of maintaining the trustee rights
   for all users on the network. The group EVERYONE can be deleted, but it is strongly
   recommended not to do so. If it is deleted, then the supervisor will need to manually grant
   trustee rights for each directory to each current network user.
   (3) The User GUEST
        The network operating system automatically creates the user GUEST. The purpose
   of GUEST is for anyone who needs temporary access to a file server. It circumvents the
   need to add a new user and then remove the user after short term use. The user GUEST
   is  automatically given  the security equivalence of the group EVERYONE.  If the
   EVERYONE group is later modified to allow read, write, delete, and create access to cer-
   tain directories, you might consider creating your own "guest" user name that restricts ac-
   cess, so that the "guest" will not be able to change or delete files.
F.4.5.3 Default Directories
        The four directories created by NetWare are permanent directories, they cannot be
   deleted Each of these directories has a specific purpose, contains certain files, and is as-
   signed specific trustee rights for the group EVERYONE and the user SUPERVISOR.
   (1) SYSiPUBLIC Directory
        The first directory which is automatically created by the operating system during in-
   stallation is the PUBLIC directory. The PUBLIC directory contains all of the NetWare
   user utilities. Some of these utilities are specific to network management and information,
   F-32

-------
                                                                Installation Guidelines
     •  Some directories will contain programs that will be shared by all users on the net-
        work, and all users will have at least read access to those directories. Note that
        some application programs write to files in the program directory, necessitating
        that the users also have write access to those directories. EPA will generally
        create directories for software such as dBase m Plus that allow users the right to
        read, etc, but will not allow copying.
     •  Some directories will contain data that will need to be read by some or all users,
        but only selected users should be allowed to write (update or modify) that data.
        For example, Bill and John may be given Read access rights, and Sue may have
        Read and Write access to a directory.
     •  Some directories will contain programs and/or data that will be accessed by only
        selected users on the network. Only the selected users will have read and/or write
        access to these directories. All other users will not be granted any trustee rights
        for these directories. This would be a good use of creating a special group for
        users to allow access to a particular directory. The group would be given access
        rights to the directory. To restrict access to other users, simply do not add them
        to the group.
     •  Users with restricted trustee read/write access rights should also have restricted
        parental rights. Only users that need to have the ability to add and delete direc-
        tories, or grant other users trustee rights should be given parental rights to any
        directory.
     NetWare also allows the LAN Administrator to assign trustee rights to a user group.
When a user is made a member of a group, the access rights applicable for the group are
assigned to the user. This is known as a security equivalence. Assigning a user the security
equivalence of that a group eliminates the need to assign individual directory rights to each
user. If several users on a network will have similar access rights, then it is much easier to
first assign trustee rights to a group, then give the user a security equivalence to that group.
One user or user group may have up to 32 security equivalences.
     For example, two groups could be created, DATA_ENTRY and DEVELOP.  The
DATAJENTRY group is assigned access rights  to a directory for entering data, and the
DEVELOP group is given access to the directory containing source code under develop-
ment The data entry personnel, Sue, Fred, and  John could simply be made members of
the group DATA_ENTRY, and Barbara and  John could be made  members of the
DEVELOP group.*Note that John can belong to both groups, whereas Barbara is restricted
to DEVELOP, and Sue and Fred are restricted to DATA_ENTRY.
     A user's trustee  rights are calculated as the rights assigned directly to the user plus
the trustee rights assigned to any user group with which the user has a security equivalence.
Thus, if Sue were also given individual rights to SYS:BUDGET, a directory containing
budget information, then her trustee rights would include those of the DATA_ENTRY
group and the SYS:BUDGET directory.
                                                                          F-29

-------
LAN Technical Manual
        Carefully examine the rights a user has before giving another user equivalent rights.
   Also note that if rights of the first user are changed, the same changes would apply to the
   second user.

   (3) Directory Security
        NetWare allows the supervisor to assign a "Maximum Rights Mask" to each direc-
   tory. These rights are similar to the eight trustee rights, but they supercede the trustee
   rights in any given directory.  This allows the supervisor to edit the marimtim rights mask
   for a directory, restricting access by trustees of that directory, without actually changing
   the users' trustee rights to that directory. Directory security applies only to one specific
   directory. It does not extend to succeeding subdirectories as do trustee rights.
        Directory rights should be restricted only in special situations.  In most cases, trus-
   tee rights should suffice to restrict access for users to various directories. However, if the
   need arises to restrict directory rights, then users with trustee rights to that directory should
   be informed. Otherwise, the network supervisor may end up calming panicked users that
   normally would have access to that directory. For example, if John has all eight directory
   access rights to the directory SYS:\DEVELOP, and the LAN Administrator changes the
   maximum rights mask to that directory to disallow Write access, then John will be able to
   Read but not Write to the SYS:\DEVELOP directory.
        Note that directory maximum rights mask does not take the place of directory access,
   or trustee rights. If a user does not have directory access, then it doesn't matter to that user
   what the maximum rights mask is for that directory.
   (4) File Attributes Security
        File attributes security refers to the ability to control whether an individual file has
   read-only, or read-write access by all users. File level security takes precedence over all
   other forms of security. The primary reason for making a file read-only is to prevent ac-
   cidental erasure of that file. Typically, files which  are read by many users (public files),
   might be restricted as read-only, so that a user will not accidentally change or erase the in-
   formation in that file. If users flag files as read- only, they need to understand that they will
   not be able to rename the file or save changes to it until they change the flag back to write-
   enabled.
   (5) Effective Rights
        NetWare terms EFFECTIVE RIGHTS to be those rights a user may exercise  in a
   given directory. EFFECTIVE RIGHTS for a given directory are determined by a user's
   trustee rights  and  the Maximum Rights  Mask for that directory; The Maximum Rights
   Mask having precedence over the trustee rights, but only if the user has directory access
   rights in the first place. In all cases, a file attributes right of read-only will take precedence
   over a user's EFFECTIVE RIGHTS.
   F-30

-------
                                                                   Installation Guidelines
   DOS prompt will indicate that the default drive is N: (if the 'LASTDRTVE = M* com-
   mand in CONFIG.SYS was used), and the current directory is \LOGIN (the prompt will
   be 'N:\LOGIN*).

F.4.5 NETWARE Basics - Directories, Security, Users, and Groups
        Prior to running any of the network management software, you should understand
   how DOS directories are organized, the basics of NetWare security, and the concepts of
   users and user groups.
        The DOS manual provides information about directory organization. The NetWare
   User Reference, Part 1: NetWare Basics manual provides additional information about net-.
   work directories, network security,  and users and user groups.  The information in this
   manual is essential for proper management of the file server and users, and you should
   familiarize yourself with it before proceeding any further.
F.4.5.1 Network Security
        Security, or the ability to control who may access particular information (directories
   and files) is crucial in a multi- user environment NetWare provide four levels of security
   access on the network. They are:

        (1) Login/Password Security
        (2) Trustee Security
        (3) Directory Security
        (4) File Attributes Security
        On a typical network with several users a combination of these security methods will
   be in effect
   (1) Login/Password Security
        Login/Password security determines who may access a particular file server; and thus
   access information on the server.  Login security applies to all users. Each user must have
   a login or ID that has been assigned by the network supervisor. Typically, a user's first in-
   itial and last name is used as a login name. The user login name gives the user the access
   right to the file server. Passwords should be assigned or setup for each user. Each user
   can change his/her own password. Users should be encouraged to change their passwords
   at least every three months. When LOGIN is performed, the name and password are asked
   for. If either is incorrect, the LOGIN fails. However, the errant user doesn't know which
   is incorrect, and both the name and password must be resubmitted. Although this can cause
   consternation, it also provides a little more security.
   (2) Directory Access (Trustee) Security
        Trustee security is Novell's terminology for directory access security. Directory ac-
   cess security enables or disables a user to access a directory and the files within that direc-
   tory. Using  a combination of the trustee rights for each user  and each  directory, the
   majority of the security required for most networks can be achieved.
                                                                             F-27

-------
LAN Technical Manual
        Without access rights a user may be able to access the server but will not be able to
   access anything on the server. The network supervisor is the most powerful user on any file
   server, having access to all directories on the server. Therefore, the network supervisor
   typically grants users access to individual directories. Access rights can be granted to in-
   dividual users, or to a group (defined below) to which the user belongs. Access to a direc-
   tory gives access to all subdirectories within that directory.
        Because most users will have their own directories on the server and each user will
   generally be using the server for specific applications, granting trustee rights is the simplest
   and most direct method of granting and restricting access to directories and applications.
        The NetWare menu utility SYSCON allows the SUPERVISOR to assign the various
   access rights to be assigned to users and groups. Eight different types of access rights allow
   a variety of combinations for directory security. These different rights include:


             R- Read from open files
             W - Write to open files
             O- Open existing files
             C- Create new files
             D - Delete existing files
             P - Parental, which allows the trustee to:
                a) Create,  rename, and erase subdirectories of the directory   4
                b) Set trustee and directory rights in the directory
                c) Set trustee and directory rights in the subdirectories
             S- Search the directory
             M -  Modify file attributes
         Any combination of the eight access rights can be assigned to a user. However, cer-
    tain combinations of the access rights will not make sense. For example, it would be use-
    less to assign a user Create access if the user did not also have Write access.  However,
    Read access without Search access would mean that a user can run a program that he has
    been informed or instructed about, but cannot perform a directory listing to see what is
    available in that directory.  If a user is given trustee rights in a directory, those rights ex-
    tend through all subdirectories of that directory, until the rights are redefined at some lower
    level
         On a typical network, trustee rights can be described as falling into the following
    categories.
         •  All users will have all eight access rights within their own, private directories.
    F-28

-------
                                                                Installation Guidelines
       Novell NETBIOS.COM and ANET3.COM were generated for your workstation(s)
   during the operating system generation. They can be found on the GENSH1 diskette. To
   use them, they need to be copied to your working disk: the NETWORK BOOT FLOPPY
   (for floppy based system); or to drive C: (for hard disk systems). These files should be
   placed in the root directory of the appropriate disk. To do so, insert the GENSH1 diskette
   in floppy drive A:, and type:
       •  for floppy based systems -
       COPY AiNETBIOS.COM B:
       COPY AiANETS.COM B:
       (inserting the NETWORK BOOT FLOPPY when needed)
       •  for hard disk based systems -
       COPY AiNETBIOS.COM C:\
       COPY A:ANET3.COM C:\
       The LAN Administrator can create one copy of the the NETWORK BOOT FLOP-
   PY and distribute it for all workstations, either to use or to copy to hard disks. When copy-
   ing to hard disks, be sure that if a CONFIG.SYS file already exists, any necessary lines in
   the old file are retained in the new copy of CONFIG.SYS.
F.4.3.3 Starting (Booting) the Workstation
       There are two methods of loading the network shell software. If you plan on using
   the workstation for tasks that do not involve the network server, then you can manually
   load the network shell software on an as needed basis. If you intend to use a particular
   workstation solely for network use, then it is a good idea to automate the loading of the
   network shell software. The EPA network MENU system will prompt users through the
   login procedures. However, the manual loading method should be known to all network
   users.
       The procedures for installing the necessary levels of interfaces are different for the
   two types of personal computers that we have within the Agency. The Epsons and other
   PC/AT-compatibles which are running DOS 3.1 or 32 will have a program called TOK-
   REUI loaded as part of the AUTOEXEC procedure. The PS/2 servers and bridge proces-
   sors available through the SMA contract run DOS 33, and they require a slightly dlffernet
   setup.  The interfaces for them, part of what's called the IBM LAN Support Program, are
   installed in the CONFIG.SYS file  automatically by running a program called DXMAHX
       To manually load the network shell software, you need to first run the NIC driver
   program, the NETBIOS.COM program, then the ANET3.COM program.  This is done
   simply by typing:
       DXMAID (or TOKREUI) (Enter)
       NETBIOS (Enter)
       ANET3 (Enter)
       You should see the network shell being loaded.
                                                                          F-25

-------
LAN Technical Manual
        To automate loading the network shell software, you need to create a file named
   AUTOEXECBAT in the root directory of the boot disk. The AUTOEXEC.BAT is a DOS
   batch file; a batch file is a text file containing commands that are executed in sequence as
   though they were typed at the keyboard. The AUTOEXECBAT is a special batch file that
   is automatically run (if it exists) each time DOS is booted.  Use the Wordstar nondocu-
   ment feature to create a file containing the following lines.
        (TOKREUI - for PC/AT-compatibles. Omit for PS/2 systems where you have run
   DXMAID.)
        NETBIOS
        ANET3
        Thus, to load the network shell, DXMAID (TOKREUI), NETBIOS and ANET3
   must be executed. To run them manually, simply type the program names. To automati-
   cally run the network shell each time DOS is booted, create the AUTOEXECBAT con-
   taining the shell program names.

F.4.4  Test Access of Server Resources From Workstation
        In order to test the access of server resources from a workstation, you will need to:
   (1) boot the network server; and (2) run the network shell software on a workstation. Once
   these two conditions are satisfied, the workstation is said to be attached to the  server.
   However, to access the server resources, the workstation user must  'login' to the server.
   The process of logging in to the network server performs several functions. When a
   workstation logs in the server, the server assigns a number to the workstation. This num-
   ber is assigned dynamically; the sequence of workstations logging in to the server has more
   to do with determining the workstation number that the physical location of the worksta-
   tion. The workstation number is one method that the network server uses to keep track
   of where information is coming from and where it is being sent The other method is deter-
   mined by the network interface card address, which is stored on a read-only memory chip
   on the network interface card. Each network interface card has a unique address,  and for
   practical purposes cannot be modified.
        The process of logging in to the server is accomplished by executing the command
   'LOGIN name* (where name is the network user access name). If you do not specify a
   name on the command line, then a prompt will ask you to enter a name. Only valid names
   which have been configured on the network server are allowed. When the network operat-
   ing system was installed on the server, NetWare configured two users. The names of these
   two users are SUPERVISOR and GUEST. The SUPERVISOR logon name is intended
   for use by the person who has the responsibility to manage and maintain network usage.
   Because the SUPERVISOR has complete access on the network, use should be restricted
   to the LAN Administrator and his/her backup only. The GUEST logon name is intended
   for use by persons that will only access the network on an occasional basis, and should have
   very limited access rights.
        To log in to the network, type 'LOGIN SUPERVISOR.' NetWare will display mes-
   sages which describe the current drive/volume configuration. After logon is complete, the
   F-26

-------
                                                                 Installation Guidelines
       The procedure for installing and configuring an individual workstation consists of:

       (1) Starting the network server,
       (2) Booting DOS from a workstation;
       (3) Creating or modifying the CONFIG.SYS file for the workstation to adapt it for
           the network operating environment;
       (4) Loading ANET3 from the GENSH1 diskette to the workstation boot disk(ette);
           and
       (5a) running ANET3, or
       (5b) creating an AUTOEXECBAT file to load network shell, and rebooting the
           workstation.
       If the network operating software has been properly installed, then booting the net-
   work server is as simple as turning it on.
F.4.3.1 TTie CONFIG.SYS Fife
       When a PC is powered on (or rebooted suing CTRL-ALT-DEL), DOS reads a spe-
   cial file in the root directory which tells it how to configure the system for the desired opera-
   tions.  The number of open files, the number of buffers available to DOS, and the last local
   drive are among many parameters which can be modified by editing this file.
       Many programs that run under the DOS environment often require that several files
   be open simultaneously. Additionally, the network shell running on a workstation requires
   added file access. The default DOS number of open files is 8. A value between 20 and 40
   will result in better performance for network use.
       DOS will also allocate a specific number of buffers to be used in storing the most
   recently transferred data between memory and the disk. The more buffers DOS has, the.
   more  data is in memory, and the fewer disk I/O requests are necessary. The default DOS
   number of buffers is 2. A value between 16 and 30 is appropriate for most network use,
   depending on the applications which will be run from the workstation. If a user complains
   of poor network disk access performance, you should increase these values.
         Normally, the number of local drives on a workstation would not affect the name of
   the first network drive. The default man'mnm local drives is E:. Thus, the first network
   drive  is called, by default, F:. If, however; a workstation has a number of peripherals (drives
   or RAM disks) that extend to  drive letter F: or beyond, the first network drive would be
   shifted down (e.g. to L:) to accommodate the local drives. In order to make the network
   access more consistent across all workstations, it is appropriate that the first network drive
   be accessed by the same drive letter at all workstations. One approach to standardizing on
   the network drive would be to name it N: (for network). In order to do this, you need to
   tell DOS what the maximum letter for local drives is; this wfll determine where the net-
   work  drive letters will begin. To name the network drive N:, the last local drive letter must
   be M:, accomplished by the command LASTDRIVE=M in the CONFIG.SYS file.
                                                                            F-23

-------
 LAN Technical Manual
        The CONFIG.SYS file is a standard text file. Use the Wordstar nondocument for-
    mat, or the WordPerfect text in/out feature to create a standard ASCII text file which con-
    tains the following command lines:
        FILES = 24
        BUFFERS = 20
        LASTDRIVE = M

        Note that the CONFIG.SYS file must reside in the root directory of the drive from
    which the system booted (A: if a floppy system, or C: if a hard disk system). The parameters
    and use of the CONFIG.S YS file are explained in detail in the DOS manual. Refer to the
    index for CONFIG.SYS. The workstation must be re-booted (with CTRL-ALT-DEL) for
    DOS to recognize the changes made in the CONFIG.SYS file.

        CONFIG.SYS can also contain commands which load special files, called "device
    drivers" into memory, making them part of DOS. Examples of this type of file are
    ANSI.SYS and VDISK.SYS which come with DOS. ANSI.SYS, when loaded, allows
    programs to send a standard set of control sequences to the screen, which in turn affect the
    characters and attributes which are displayed. This is particularly useful for applications
    such as communications programs which may have  originally been written for some other
    computer. The VDISK.S YS file makes part of RAM memory appear to the user as if it
   were a  disk drive. Other uses include print spoolers, special graphics display protocols,
   and communications interfaces.

       The network interface card is a communications device, allowing the PC to "talk" at
   4 million bits per second with other PCs on the LAN. Suffice it to say that getting infor-
   mation  from an application program to the LAN is quite complex (otherwise we wouldn't
   have had to bother with this manual at all). There are essentially three layers
F.4.3.2 The Novell Netware Shell
       After the CONFIG.SYS file has been created, the last step involved in configuring a
   workstation for network use is to copy the Novell network basic input/output system (NET-
   BIOS.COM), the network shell (ANET3.COM), and the NIC driver program to  the boot
   disk.  On the PS/2 Models 50  through  80, the NIC driver program is named
   DXMAID.COM, on the PS/2 Model 30 and AT class machines (such as  the Epson Equi-
   ty m +) the NIC driver program is named TOKREUI.COM. The NIC driver is a program
   ^at provides a means to communicate between NETBIOS and the network interface card
   The NETBIOS.COM file and the ANET3.COM files are programs that run concurrently
   with DOS on a workstation. They determine if workstation commands require network ac-
   cess, and perform the appropriate action if necessary.

       The NIC driver is distributed on the IBM NETWORK SUPPORT SOFTWARE dis-
   kette, and should be copied to the boot disk by inserting the diskette in drive A:, and typing:
       .  for floppy based systems - COPY A:TOKREUI.COM B: (inserting the NET-
          WORK BOOT FLOPPY when needed)
       •  for hard disk based system - COPY A:TOKREULOOM C:\
  F-24

-------
   	LAN Operations

        Clear Lotus Files
             DEL \PUBUC\LOT1
             DEL \PUBUC\LOT2
             DEL \PUBUC\LOT3
        The number of DEL commands should equal the number of concurrent copies al-
   lowed. Note that this command should never be executed when other users are on the net-
   work.

        As LAN Administrator, you should become familiar with these and similar functions
   available under the MENU system. Mastering the MENU system can greatly simplify the
   use and management of the entire network.

G.3  PRINT SERVER MANAGEMENT AND MAINTENANCE

        Accessing files on a network disk server is generally considered straight-forward by
   most users because it is done just like local disks once the login scripts have been adapted
   to each user's particular needs. Likewise, file server management will require only a small
   portion of the LAN Administrator's time during routine operations. A shared printer, on .
   the other hand, will require regular, frequent attention, and variations in its use can be :
   much more noticeable to the users than loading differences on the network disks. Users'
   rancor will demonstrated when they are waiting for output or discover that a big job has
   not printed because the printer was out of paper. Service that the printer requires includes:
        •  Regular checking of the printer paper  in tray for laser or letter quality printers;
        •  Regular checking of the paper box level for dot matrix continuous form printers;
        •  Regularly separating the print jobs from the printer's paper out tray, and storing '
           each user's print jobs in appropriate out baskets located in the printer room;     *
        •  Regular checking of the toner level indicator on laser printers. Visual inspection
           of print quality may help determine the status of toner in laser printers;
        •  Regular checking print ribbons for letter quality or dot matrix printers; and
        •  Printer supplies inventory should be checked weekly for paper, toner, ribbons,
           and special forms. Extra paper, toner, ribbons and forms should be stocked at all
           times.
        Routing output to the printer server will cause the users some initial concern, and
   many of the LAN Administrator's routine user-assistance duties will involve the printer. •
   Some management considerations and strategies are discussed here.
G.3.1 Printer Server Operation*
        NetWare provides for five standard printers on a file server, two are parallel, and up
   to three serial printers. Appendix F discusses the parameters for standard and custom con-
   figuration for each of the network print devices.
        Additionally, network workstations  may have local printers attached. These local
   printers can be used in the normal way, even while a user is logged into the network. The
                                                                              G-13

-------
 Volume II- LAN Technical Manual
   usual commands for printing through DOS, the Print Screen function, or application print-
   ing will send output to the local printer.
        To use a network printer, the SPOOL command must be executed. The SPOOL
   command tells NetWare to intercept any print job and send it to the network print spooler,
   which is a special area on the file server hard disk. Multiple print jobs are stored in the
   spool area in a sequence called the "queue." Care most be taken to execute the SPOOL
   command prior to entering an application program if you want print jobs from the ap-
   plication to be rooted to a network printer. Without parameters, the SPOOL command
   routes output to the default network printer. Network printers are numbered beginning
   with 0 (zero). "Zero" is the first and the default network printer. Thus, issuing the SPOOL
   command by itself sends data to network printer 0. To send print output to network printer
   1, the command would be SPOOL/PI, network printer 2 would be SPOOL/P2, and so forth.
        Several other parameters can be specified on the SPOOL command line. For ex-
   ample, the command SPOOL/P2/C4/NB directs the system that 4 copies be printed on net-
   work printer 2, without banner pages printing. The banner page will print unless otherwise
   specified, as in the example. The banner page is useful in separating user print jobs.
        Once the SPOOL command has been issued, the application can be used for print-
   ing just as in a single-user environment Output from the application is sent to the network
   spooler on the file server hard disk. However, the NetWare spooler will not release the
   print job for printing until the spooler receives the ENDSPOOL command. When Net-
   Ware receives the ENDSPOOL command, the print job is executed. The most effective
   way to implement these required functions is either in DOS .BAT files or as pan of a
   MENU selection.                                              •

        An alternative method of releasing a print job for printing is to specify the TIMEOUT
   parameter on  the SPOOL command line.  For example, the  command
   SPOOL/TIMEOUT=30 informs the spooler that the print job is finished after a 30 second
   interval with no information received from the workstation. The spooler will automatical-
   ly send the data to the network printer after the time has expired. The amount of time to
   wait can be  specified according to the particular application being  executed.
   TIMEOUT = 15 is sufficient for WordStar because it sends its printout in a steady stream,
   and this is actually an effective way to separate print jobs without having to leave and re-
   enter WordStar. NDPD experience has shown that TIMEOUT should be set to a mini-
   mum of 30 for dBase UL
        Note that all parameters for the SPOOL command should be executed on one com-
   mand line. SPOOL/C2/NB/nMEOUT=45 is a valid command. If SPOOL/C2 is issued
   followed by  SPOOL/TIMEOUT=45, then the latter command is the only one in effect
        The ENDSPOOL command is also used to finish all network printing activity at a
   workstation. After the ENDSPOOL command is issued, subsequent print jobs will be
   routed to the local printer.
G-14

-------
                                                                      LAN Operations
G.3.2 Print Job Management
        Once print jobs have been sent to the network spooler, the QUEUE command can
   be executed from workstations to list or delete print jobs from the print queue. Each user
   can only affect his or her jobs. The file server console provides additional functions for
   managing the spooler. The command REROUTE PRINTER allows print jobs to be
   redirected from one network printer to another. KILL PRINTER 2 stops network printer
   number 2 and erases all print jobs from the printer's queue. KELL QUEUE 13 removes
   the third print job from the print queue for network printer number 1.
        Special file server console commands are available which aid in the management of
   forms for networked printers. "FORM CHECK 1" causes a row of asterisks to be printed
   at the top of of form in printer number 1. This command is useful when various forms are
   used and a printer must be repeatedly adjusted. "REWIND PRINTER 15" stops printer
   number one, backs up 5 pages in the file being printed, then restarts the printer. This com-
   mand is useful when paper has become jammed in the printer, and part of the output needs
   to be reprinted.
G.3.3  Sharing Network Printers
        Many networks will have more than one printer attached to the file server available
   to users. In most situations, one of the printers will be a high quality output device, such *
   as a laser printer, and another printer will likely be a draft quality device, such as a dot
   matrix printer.
        Since the output of a laser printer is much better than that of a dot matrix printer and
   it is much faster than a daisy-wheel printer, most users, if given the choice, will opt to print
   on the laser printer.  Dot- matrix or daisy-wheel printers may be used to print special forms
   such as continuous-form labels or multi-part forms.
        The LAN Administrator should determine if networked printers are becoming bot-
   tlenecked by regularly looking at the print job status with the QUEUE program. If most
   print jobs are regularly scheduled for printing on only one printer, a second printer may be
   needed, or a faster printer may be needed.

G.3.4  Separating Print Jobs
        Even on small networks, simultaneous print jobs end up stacked together in the paper
   out tray of printers. The easiest method of separating different print jobs is to use the Net-
   Ware spooler banner page, which is printed by default The banner page prints the user
   login name  in large stylized letters, along with the date and time of printing.
        Laser printers require regular paper feeding; the capacity is 100 to 200 sheets at a
   time, although a high-capacity printer is available from the SMA contract that holds up to
   500 sheets at a time. This means constantly checking and filling the printer's paper-in tray.
   Network printers will most likely live and work in or near someone's office, possibly that
   of a secretary. It is easy to presume that the secretary can be responsible for keeping paper
   in the printer. However, most secretaries have other tasks to perform and a heavily used
   printer could require attention that would degrade other office duties.  Also, a variant of
   Murphy's Law states that a designated paper changer will not be in his/her office when the
                                                                               G-15

-------
Volume II • LAN Technical Manual
    paper runs out One simply policy would request that, since most people take regular
    breaks from their work to visit the water fountain or restroom, a detour past the printer to
    check the printer status light would not only keep the printer fed, but would allow users to
    get a little exercise and contribute to the efficient operation of the LAN.
        A simple but effective practice for handling output is to install paper-out trays in the
    printer room for all network users. The person checking the printer could then separate
    the print jobs in the appropriate paper out trays. If a continuous forms printer is being
    used, the print jobs for that printer could be handled in a similar manner.

G.3.5  Managing Production control - Special Forms and Large Jobs
        The handling of special form paper requires that the standard paper be unloaded,
    the special form loaded, a test pattern may need to be printed, the  forms print job sub-
    mitted, the printing checked, and the standard forms reloaded.
        Network printing on special forms requires special attention to  the print queue. Be-
    cause the spooler continuously prints queued jobs, printing special forms intermixed with
    regular print jobs in the queue is a haphazard, if not pointless task. When printing special
    forms on the network, the print job should be the only queued job  in the spooler. The
    beginning and end of the day may be the best time to attempt printing special forms. Al-
    ternatives would be to print the special form job on a local workstation printer, or if a net-
    work printer can  be devoted  to one task, a dedicated special forms printer could be
    available on the network at all times.

        Large print jobs create their own problems, particularly when a number of people
    share a single printer. User frustration and loss of productivity result when writers find
    themselves parked beside the printer waiting for their output For this reason, long reports
    or lengthy documents should be held for designated "printing windows." If user demand
    is great, the simplest solution to this problem is probably acquiring a second high- speed
    printer and designating one to be an "express" printer with no jobs SPOOLed to it that are
    greater than 10 pages long.

G.4   COMMUNICATIONS  GATEWAYS  MANAGEMENT AND MAIN-
     TENANCE

        Once the communications links have been installed and tested,  very little main-
    tenance should be necessary to keep the links functioning property. Reconfiguration to
    add new users or to optimise performance would follow the procedures described in Ap-
    pendix F.
        The two types of links that may exist on your network are the Asynchronous Com-
    munications Server and an SNA gateway. As part of the on-going daily operations, these
   links should be tested to confirm they are working property at the beginning of each day.
   This task can be assigned to someone who would normally be using the gateway. The onty
   duty would be to report any problems to the LAN Administrator.
G-16

-------
                                                                     LAN Operations
G.5  SECURITY MANAGEMENT AND MAINTENANCE

        Security has been defined in Chapter ^Administration, as system reliability and data
   confidentiality and integrity.  System reliability is maintained by conforming to these
   guidelines, particularly in the areas of site preparation, installation and testing, and file
   server backup. Without properly installed LAN components and cabling, erratic network
   behavior is almost guaranteed.
        Data integrity, data that is correct, is maintained in similar fashion — by adhering to
   these guidelines as they instruct you in the areas of applications programs installation and
   testing. Data confidentiality is directly proportional to the vigor with which user passwords
   and access rights are guarded and managed. One tool which the LAN Administrator has
   available for monitoring data access on the network is LANTrail from the SMA contract
   This package can provide you with a log of all system accesses, and therefore can be ex-
   tremely valuable as an aid in detecting unauthorized access.
        Your most potent weapon in this arena, however, is effective training for and adver-
   tising to your users. They wUl contribute to your efforts only to the degree that you make
   them understand and  respect its importance.
                                                      »
G.6  APPLICATIONS  SOFTWARE MANAGEMENT AND  MAIN-
     TENANCE

        Software on the network can be divided into two types: applications software and sys-
   tem software. Commercial applications software includes packages such as WordStar,
   Lotus, dBase, FOCUS, and SAS. User developed applications include programs written
   in programming environments such as dBase HI Plus. Syste'm software is the Novell Net-
   Ware file server operating system, workstation shell programs, and network menu and
   command line utilities. Users of the network will work directly with applications software,
   but will not have direct interaction with the system operating system or workstation shell
   programs, other than to assure they are loaded before attempting to login to the file serv-
   er.  Network users will, however need to understand the basics of using NetWare menu
   and command line utilities.
        The LAN Administrator is responsible for ensuring that applications and system
   software perform as expected, that users have proper documentation and training on the
   use of the software, and that users have access to technical support for specific questions
   regarding the software.

G.6.1 Applications Software
        The responsibilities of the LAN Administrator concerning network use of applica-'
   tions software include the installation  and initialization of applications software and
   databases, and ensuring the integrity of applications sharing.
                                                                             G-17

-------
 Volume II • LAN Technical Manual
 G.6.1.1 Application Installation and Initialization
         Information regarding how to configure the file server directory structure for applica-
    tions, install applications on the file server, and initialize applications data files has been
    discussed in Appendix F and in Section G2 of this appendix.
         Any application that is intended for use by normal, non-SUPERVISOR, network
    users should be given access through the NetWare MENU program. Section G2 discus-
    ses the use of the MENU program to automate applications loading. Additionally, the
    sample MENU script at the end of this chapter should be used as a reference for modifica-
    tion that may be needed to the MENU script as supplied by SMA.
         The LAN Administrator must be cognizant of licensing agreements on specific
    software. For example, if three copies of Lotus have been purchased by your workgroup,
    then the MENU script should check that only three copies of Lotus are in use simultaneous-
    ly by network users. The sample MENU script contains a specific example of how this is
    accomplished, using Lotus to illustrate the technique.
         If personal programs, or other applications exist that should not be listed on the net-
    work MENU system, the LAN Administrator should install  the programs in appropriate
    directories and train the users on using the programs from the DOS command line prompt
    Access can be restricted by adding individual or group trustee rights for the appropriate
    users.
         If applications exist on the MENU system, but restricted access to those programs is
    desired, the LAN Administrator can simply create a special group allowing access rights
    to the applications directories and adding the appropriate users as members of that group.
    Group membership is discussed in detail in Appendix F and in Section G.2 of this chap-
    ter.
G.6.1.2 Application Sharing
         In terms of using applications software on the network, there are basically two types
    of software: single-user applications and multi- user applications. The distinction between
    the two types of software is in how data files are used. If the data files are used by only one
    person at a time, the application is single-user. If more than one person can use the same
    data file at the same time, the application is multi-user.
         Some vendors sell network specific versions of their  software, but these are still
    primarily single-user applications. For example, word processors, and spreadsheets are in-
    herently single-user; only one user should be working with a single document or spread-
    sheet at a time. The difference between single-user and network specific versions of word
    processors and spreadsheets is that the network specific versions usually include a section
    of code that is resident on the file server to control various user configurations and to per-
    form the file server I/O.
        True multi-user applications, such as dBase HI Plus, execute on each user's worksta-
    tion, but control simultaneous access to records in a data base stored on the file server
    through file and record locking processes.
G-18

-------
                                                                       LAN Operations
        Most of the single-user software packages recommended by the Agency will allow
   multiple users to execute the application simultaneously. It is therefore up to the user and
   the LAN Administrator to restrict access to data files used by these applications to a single
   user at a time.
        The NetWare FLAG utility allows temporarily restriction of file access for user ap-
   plications. The FLAG utility can be executed via menu batch commands for each applica-
   tion, allowing the file locking procedures to be transparent to the user. Files are normally
   created as Non-Shareable/Read- Write. If they are to be shared, FLAG is needed, if not,
   the protection is there by default However, due to the nature of multiple users, it would
   be safest to not assume the condition of files other users may have left The Novell MENU
   script, available from SMA or NDPD, includes an example of the use of FLAG from the
   network menu.

G.6.2 Distribution of Manuals
        An important issue, often overlooked during LAN implementation, is documenta-
   tion for using applications software and network utility programs.  Users will doubtless
   have questions concerning the use of applications and network utilities. Since the majority.
   of questions can be answered by reading documentation, it is of special interest to the LAN
   Administrator to ensure that access to appropriate documentation is available to all users.
   Otherwise, undue time will be spent by the LAN Administrator answering questions, or
   worse, showing users what an index or table of contents is, and how they are used.
        All single-user applications packages are sold with only one copy of documentation.
   Some multi-user applications packages are sold with several copies of documentation. The
   Novell NetWare documentation contains only one copy of each manual per installation.
        Some software vendors allow the purchase of multiple copies of the documentation.
   MicroPro, for example, allows users to buy the documentation for WordStar at a greatly
   reduced priced. The solution then, is to create a library for applications and NetWare
   documentation so that all users are allowed common access. If needed, and if the vendor
   complies, multiple copies of documentation for specific applications can be purchased.
   Depending on the number of users, multiple copies can either be distributed, or stored in
   the common library. Ideally, a log should be kept, so that users can sign out for documen-
   tation to take back to his/her own office, which is where it is most likely needed. The dif-
   ficulty of such a system is in getting users to return the documentation to  the common
   library. If a policy is established and users adhere to that policy, such a system can be ex-
   tremely effective.
G.6.3 User Training
        There are two areas of concern to the LAN Administrator regarding user training
   First, users must be competent in the use of the network MENU system, NetWare menu
   utilities, and NetWare command line utilities. Second, users must be aware of the differen-
   ces in running applications on the network, whether they are single-user or multi- user ap°~
   plications.
                                                                               G-19

-------
Volume II - LAN Technical Manual
        It is obvious that the LAN Administrator will be asked, from time to time, for help
   on specific problems. However, a great many of the "start-up" problems inherent to new
   network users can be overcome by demonstrating the use of the network in a class environ-
   ment.

        Because of the number of issues involved in networking, it is best not to cover all
   aspects of using the network in a single class. Instead, a separate one or two hour class
   should be devoted to each topic. This not only helps keep the user's attention, but doesn't
   overload them with too much information at one time.
        Possible topics for separate classes include:
            Signing on and using the network MENU utility
            Printer functioning and maintenance
            NetWare command line utilities
            NetWare menu utilities
            Managing public and private data files
            Communication gateway functioning and management
            Use of specific applications software on the network
        Additionally, copies of this guide could be distributed to each network user. Though
   much of this guide contains information not relevant to daily use of the network, users will
   benefit by having access to the information. As a LAN Administrator, it is better to have
   informed users than ignorant users. Informed users will be better able to assist you in keep-
   ing the file server organized and functioning properly.
G.6.4 Application Administration
        Appendix F and Section G2 of this chapter provide instructions and tips for install-
   ing and initializing applications for use on the network file server. The primary daily task
   of the LAN Administrator concerning applications is to ensure that the programs work as
   expected.

        In this regard, the LAN Administrator should verify each of the items in the follow-
   ing checklist on a regular basis.
        •  Menu choices should work as expected; applications load and when exited, the
            network menu should reappear.
        •  Menu choices that invoke applications with copy counters should be tested on
            multiple workstations to confirm that the menu script works as expected.
        •  Applications that are not on the network menu should load and work as expected.
        •  Applications that load by executing the FLAG command for program and/or data
            file security should be tested by attempting simultaneous access. The worksta-
            tion attempting access second should receive a message indicating the non-ter-
            rible status of the files.
        •  Applications that share data files (true multi-user programs) should be tested to
            confirm data integrity during multiple access of the same data file and/or records.
G-20

-------
                                                                       LAN Operations
        If any problems exist in regard to applications functionality, the program's configura-
   tion should be checked. Appendix F and section G2 and section G.5 of this chapter provide
   information concerning how applications should be installed to conform to the appropriate
   access methods.
        When removing applications from the network, the following checklist should be
   used as a guide.
        •  All program and data files should backed up to tape.
        •  The program and data files (if appropriate) should be deleted from the file serv-
           er.
        •  The directories for the applications should be removed from the file server using
           the DOS "RMDIR diraame" command.
        •  The MENU script file should be edited to reflect the removed application.
        •  Trustee rights and security equivalences for the applications directories should
           be deleted or edited to reflect the change.
        •  Drive and Search mappings should be edited in both the SYSTEM LOGIN
           SCRIPT and USER LOGIN SCRIPTS (the SCRIPT.LOG include file) to reflect
           the removed application.
        •  Standard logins should be tested to confirm that drive/search mappings, direc-
           tories, group and trustee security, and the network menu function as expected.

G.6.5 Production Control
        A "job" in this discussion is meant to indicate any program execution submitted by a
   user. There are two classifications for identifying jobs on the network. First, jobs can be
   classified as production work or development work.  Second, jobs can be classified accord-
   ing to the type of resources they use. The resource tasks used by jobs can be further defined
   as being compute intensive, disk intensive, and print (or other I/O) intensive.
        Almost all network jobs can be classified as production type.  This means they are
   part of the normal "producing" of information. Development jobs are part of the process
   of testing out programs and datasets, correcting problems, and resubmitting them until
   they work as desired.
        Development jobs must usually be performed during the normal work day. Whatever
   resources are compromised as part of the development process are the prices that must be
   paid.  If possible, development work can occur outside of production work hours.
   However, the LAN Administrator should be prepared to compromise network resources
   during the development phases of tasks.
        Production jobs should be monitored by the LAN Administrator for possible net^
   work resource competition. If a single production job tends to take over the file server, or
   if the printer is tied up for one or more hours, the rest of the network suffers. A solution
   to large production jobs is to schedule them, if possible, to run at the end of normal work-
   ing hours, on weekends, or during designated hours on designated days.
                                                                               G-21

-------
  Volume II - LAN Technical Manual
 G.6.6 Software Upgrades
         All commercial applications software and network software should be registered with
     the vendor as soon as it is verified that the software functions properly. Vendors will then
     inform registered owners of any upgrades available.

         When notices concerning upgrades for software are received, the  LAN Ad-
     ministrator should review the enhanced functionality gained by ordering the upgrade. If
     the enhancements are of value to network users, the upgrade should be ordered and in-
     stalled on the network, If the enhancements are not pertinent for your installation, the
     LAN Administrator may choose to wait for future upgrades.

         However, the best rule is to maintain the latest version of software whenever pos-
     sible. If technical support from the vendor is requested, the vendor will generally assume
     you are working with the latest version. Once it is clear you are working with  a previous
     version, the vendor support person will promptly suggest that you get the upgrade; it may
     solve your problem.  Right?

         Compatibility with other users is another reason to maintain the latest  version of
     software. When data needs to be exchanged, it is safest to presume that other users will
     also be maintaining the latest version of software.

         One other reason for keeping your software upgraded is the degree of difficulty in
    upgrading beyond single increments in software versions.  If you skip minor release
    upgrades and later decide to upgrade for a major software release, the technical difficul-
    ties may be greater than they would have been if the software had been kept upgraded.
 G.6.7 Installing Software Upgrades
         Software upgrades for network use fall into several classifications. They include:
         •  Operating system upgrades;
         •  Server-based applications, which can be either single-user upgrades, or multi-
            user (LAN) upgrades; and
         •  Workstation based applications upgrades.
         The following checklist should serve as a guide when making server-based software
    upgrades.
         •  Always make a archive tape backup of the old software and data files associated
            with the software before upgrading.
         •  Make sure all other users  have logged off the file server before beginning the
            upgrade procedures.
         •  Most software packages contain an install  utility or instructions for performing
            upgrades from previous to current releases. Always follow the install instructions
            to the last detail
         •  If upgrading from single-user to multi-user versions of software, check whether
            a conversion needs to be run on the application's data files. If so, then proceed
            as per the instructions.
G-22

-------
                                                                      LAN Operations
        •  If upgrading operating system software, verify that all operations perform as ex-
           pected after the file server has been rebooted.
        •  If upgrading applications software, check that it performs as expected. Also,
           check that the network menu works properly, some software upgrades may in-
           volve name changes for the executable files.
        Software upgrades for programs that reside on workstations should always be per-
   formed when the workstation is in standalone mode, Le. not logged into the file server.
   (E.g., WordStar changed from WS.COM in its 331 release to WS.EXE in 4.0.  This has
   caused problems for users of the EPA BASIC Menu System.)
        Information about upgrading EPA-developed custom applications can be obtained
   by contacting support personnel at NDPD.

G.7  TECHNICAL SUPPORT  MANAGEMENT

        In isolating problems and finding solutions, the guidelines below should be reviewed.
   If the suggestions provided do not resolve your problem, contact support personnel at
   NDPD for corrective actions.

G.7.1 Hardware
        Hardware problems may involve  the network file servers, printers, communication
   gateways, and workstations. The following discussions are provided to aid in determining
   possible problem areas for each type of hardware device.
                           «
G.7.1.1  File Server Performance

    • Problem: Network Runs Slowly
        Check the server MONITOR program.  If the server utilization is running high
   (80%), check each workstation's MONITOR window. If any of the workstations appear
   to constantly attempt redundant I/O, ask the user to exit the suspicious task. If perfor-
   mance improves, aid the user in determining the reasons for the program operating in a
   degrading manner.
        Ask users to log off the file server.  Use the server MONITOR program. Look for
   the server utilization figures.  If the server is running constantly  above nominal levels
   (around 10%), try bringing the server DOWN, and rebooting.
        Check the network cabling system.  If any new electrical devices such as fluorescent
   lights, copy machines, or typewriters have been installed, turn those devices off to see if
   performance improves. If necessary, the cable may be shielded, or the other equipment
   moved.
        Check the network print queue.  If too many jobs have been submitted, the system
   could bog down in management of those print jobs. Delete some of the jobs from the queue
   and ask the user to resubmit.
                                                                              6-23

-------
Volume II • LAN Technical Manual
    •  Problem: File Access or Loading Errors
        The file server hard disk may occasionally develop bad spots. When these occur, the
   best temporary solution is to attempt to copy the offending file, then rename it
   "BADBLK.XXX". This keeps the disk sectors from being used. Then load a fresh copy of
   the file from the original disk or backup.
        Commercial and public utilities that attempt to lock out bad sectors may have dis-
   astrous effects on a NetWare COMPSURF formatted hard disk. These utilities should be
   avoided on the  file server. However, if a workstation's disk develops similar problems,
   utilities such as  MACE or the Norton Utilities may be used to recover or mark damaged
   disk sectors.

    •  Problem: Workstation Locks Up During Use

        Some programs, especially older ones, do not inform the user that the program is
   performing computing or I/O operations. Always allow ample time, depending on the ap-
   plication, for a program to complete its functions. Otherwise, the workstation may need to
   be re-booted.

    •  Problem: File Server Does Not Boot

        First, check that the power cord, monitor cables, and keyboard are all plugged in.
        Next, check that the server power supply is running. If necessary, remove the cover
   to the file server (with the power turned off). Turn the machine on. The power supply fan
   should be spinning. If not, then the problem is a faulty power supply. This is not major. It
   simply means replacing the old supply with a new one. Contact support personnel at SMA
   for replacement information and instructions.
        If the power supply appears to be working, turn the machine off. Check the cables
   leading from the power supply to the computer's motherboard. Next check the cables lead-
   ing from the power supply to the disk drives.  Make sure all cables are secure. Turn the
   machine back on.

        If the file server still refuses to boot, try to reboot with a floppy diskette. The file
   server may need to be reformatted. Refer to Appendix F for instructions on formatting
   and installing the NetWare operating system. (This will demonstrate why you make back-
   ups!)

        If reformatting does not work, or if you prefer, call support personnel at SMA or
   NDPD for instructions on repair, or for return authorization.
        The big questions is: Did you back it up yesterday? If you answer "no" to this ques-
   tion, then you have a problem. If you answered "yes," then you may be frustrated, but the
   problem can be  resolved.
        If you have to send the file server back for repair, consider removing the tape back-
   up from the file server first This way, if the repair time is greater than you can wait, an op-
   tion would be to install the tape drive in another computer. To prepare the new computer
G-24

-------
                                                                        LAN Operations
   for use, refer to Appendix F for instructions. After NetWare is operational on the new
   computer, the latest tape backup can be restored.
        If you have received a repaired file server, first check to see if it boots. Then check
   to see if all files are on the hard disk. Sometimes, repair involves either reformatting the
   disk or replacing the drive. If it appears as though your files are missing from the returned
   drive, install the tape software, then restore your files from the latest full system tape back-
   up.
G.7.1.2 Network Printers
        All network printers should be checked at the start of each work day for proper
   functioning. In the event a network printer does not work, the following tests should be
   performed:
        • Check that the printer power cable is plugged in.
        • Check the printer parallel or serial cable is properly connected to the file server
           port
        • Check that the printer power-on or self test works properly.
        If, after performing these tests, the printer still fails to work, the LAN Administrator
   should call the appropriate server representatives for repair.

G.7.1.3 Communications Gateways
        If either the SNA or ACS gateways fail to connect properly to host computers, the
   LAN Administrator should perform the following functions to test possible link failures
   on the network.
        • If using dial up services, check that the phone connection is working.
        • Check that the gateway cabling is properly connected, and that cable plugs are
           seated properly in the machine ports.
        • Check that the appropriate communications drivers are accessible from worksta-
           tions.
        • Check that modems are plugged in and working.
        • Check that the switch settings for the modems and for the communications boards
           are properly configured.
        • Check that the configuration for the communications software is property set for
           the appropriate host connection.
        • If the communications software indicates an attempt to access the host computer,
           the problem may reside at the host end of the connection. Call support person-
           nel in User Services for the appropriate host connection to request a line status
           report If the host line is at fault, then you must wait until the host connection is
           available. If the host line is reported to be operational,  then repeat steps 1
           through 6 above.
                                                                                 6-25

-------
 Volume II • LAN Technical Manual
 G.7.2 Software
         Problems with software are often related to incorrect drive mappings, incorrect login
    script commands, and security inconsistencies. Consult Appendix F for information and
    instructions on using the NetWare SYSCON and FILER utilities.
 G.7.2.1 User Login Problems
         Check the user information in the SYSCON utility.  If necessary, the user can be
    deleted from the system and added again.
 G.7.2.2 User Access Problems
         Check the system and user login script commands for drive/search mappings. Drive
    mappings should be consistent across all network workstations. Also check that the search
    paths are valid for all appropriate directories.

         If a user has added additional equipment at his/her workstation, check that the
    LASTDRIVE parameter in the local CONFIG.SYS file matches the appropriate number
    of local devices.

         If a user has trouble accessing certain programs or data files, check that the user has
    appropriate access granted via groups or individual access rights using the SYSCON utility.
         If a user experiences problems with a program crashing while attempting  to access
    certain data files, check whether other users are accessing  the same program/data com-
    binations. If so, then verify that the FLAG utility is being executed properly for all of the
    appropriate files.

         If a NetWare error message indicates the directory entry limit is being exceeded,
    several actions may take place. The size of the directory entry table may be expanded.
    Refer to Appendix F for instructions on this procedure. Additionally, unneeded files can
    deleted, some of the files can be moved to a less crowded  directory, and the number of
    groups or users granted access to that directory can be reduced. All of these actions will
    increase the available space in the directory entry table for that directory.
         If applications do not work as expected, check that the program has been  properly
    configured and data files initialized, if necessary.

         If a user experiences an  error message regarding COMMAND.COM not being
    found, copy the DOS COMMAND.COM file to the application directory. Some applica-
    tions, particularly those that allow a user to exit to DOS during the program execution, re-
    quire that a copy of COMMAND.COM is available either in the current directory, or in
    the root directory of the boot drive.

        If a message stating Incorrect DOS Version appears, it is likely that the  user has
    booted from a disk containing an  incompatible version of DOS. Though NetWare will
    function with different versions of DOS, it is desirable to have all workstations working
   with the same version. Different versions of DOS require different versions of many of
    the DOS utilities, thus increasing the management overhead for the LAN Administrator.
G-26

-------
                                                                         LAN Operations
G.7.3 Cabling
        Cabling problems can be the most elusive of all network problems. Always first check
   that cable plugs are installed and secure.
        If any new electrical devices such as fluorescent lights, copy machines, or typewriters
   have been installed, turn those devices off to see if performance improves. If necessary,
   the cable may need to be shielded, or the other equipment moved.
        If local building personnel installed the cable, check with them to see if any recent
   changes have been made in the cabling route. If so, find out what they were. If electrical
   interference is suspected, attempt to resolve the interference problems by rerouting the
   cabling or, better, by removing the cause of the electrical interference.
                                                                                  G-27

-------
Appendix H - NDPD LAN TSR

-------
MEMORANDUM

Monday, June 15, 1987

SUBJECT:  Detailed Plans and Recommendations for NDPD Token-Ring
          Network Installation

FROM:     John Shirey

TO:       Carolyn Chamblee

     Attached is the document you requested.  I hope it fills the
bill.  Items of detailed planning which it does not address are
minor:

     o    Specifics of the TSR for the cabling and the contract
          with the electricians to install the wall connectors.

     o    Approval, if required, for the installation of the two
          data racks in Rooms A313 and A338.

     o    Exactly where to place the data connector wall plates
          (location on wall and height above floor).

     o    Specific cable identification and labeling.

     o    Anixter has sent me catalogs which should arrive mid-
          week.

-------
                   Local Area Network
        Recommendations and Installation Details
                           for
                        NDPD/RTP
Prepared for:  Architectural Management and Planning Branch
               National Data Processing Division
               U.S. Environmental Protection Agency
               Research Triangle Park, NC
Prepared by:   CRC Systems, Incorporated
               4501 Alexander Drive
               Research Triangle Park,  NC 27709

-------
NDPD-TRN 6-15-87
Page 1
OVERVIEW

     NDPD has determined a need for connecting its workgroup
personal computers with a local area network for pilot evaluation,
information sharing, and anticipated future applications.  This
document briefly describes the required hardware and software for
the immediate installation of the core system including cabling
for all offices and connecting the personal computers presently
installed.

     The pilot network to be installed is the IBM Token-Ring
Network (TRN) with the Novell Advanced Netware/286 network
operating system running on a dedicated IBM PC/AT server.  The
token-ring network, as the name implies, has a ring topology.
However, for improved performance, reliability, ease of problem
determination, and orderly expansion, the physical layout is what
is referred to as a "star-wired ring," with the actual cables being
routed to wiring concentrators (called Multi-Station Access Units,
or MAUs, by IBM).  The cables will be routed under the raised
flooring to wall outlets in each office.  Connections to the 2nd
floor will pass through the conduit located in room A332.

     This pilot installation includes all the EPA NDPD staff
offices on the 3rd floor of the ERC, as well as one office, A209,-
on the 2nd floor, which is occupied by CRC personnel involved with
local area network planning and evaluation.  A207 will be
established as an equipment evaluation suite for personal
computers, peripherals, and other local area networks.  It will ,
house a standalone TRN which may be bridged 'to the NDPD TRN for '
testing.  The offices will be connected from three MAU clusters.
Two are located on opposite corners of the 3rd floor in rooms A313
the supplies storage room, and A338, a telephone wiring closet.
The 3rd MAU will be located in room A209
to accommodate the 2nd floor staff offices.

     AMPB presently has a 14-node PC Network installed.  The file
server is located in the Technical Library, A324, and a shared
laser printer is located in A322 (Cotty Potter's office)  and
attached to an IBM PC/XT.  Because the Novell Advanced Netware/286
operating system and server software runs only on a 80286 computer
(e.g., IBM PC/AT, Epson Equity IXI+), an additional PC/AT must be
acquired for the file/print server to be located in A222.  The
existing PC/AT in the Technical Library will provide the SNA
gateway to the 3090 mainframe.

     Expansion of the network to include the Unisys offices on the
3rd floor can be accomplished easily by installing a 4th MAU in an
appropriate location on the wing and running the drop cables to the
workstations to be included.  When such a step is anticipated,
server performance should be closely monitored over a period of
time to determine the need for implementing other file and/or

-------
 NDPD-TRN 6-15-87
 Page 2
 print servers to meet the anticipated additional demands.
 performance and/or security considerations may dictate that a
 ^£ara*em£ing,be estabHshed with a  bridge connection between the
 two.   A TRN ring established for the 2nd  floor SDC offices could be
 dfd??^J°r>?e^PD ring siailany-   Each bridge requires a
 ™iS£?\.PCwWJ?1 tW° Token-Rin* Adapter  Us installed, and with
 appropriate bridge software running.
REQUIRED
                            description, the numbers in parentheses
                           in the component order list, Table 1.
                * dia9ramaatically the components required for the
             «of the TRN fo* NDPD.  Each PC contains an adapter
           M 5 con.nected to the wall outlet with a flexible
           Under-floor shielded, dual-twisted-pair cable(io) which
              e IBM MType  in Cable specification runs from each
              !a4Cfnnect?r (3'4) to the MAUs(5) in the wiring
              twifted-pair cables are actually terminated in

                            the ^ connections
     The network operating system and server software, Novell
       ? Netware/286 (17), will be running on the EpsoA Equity
       },£fle^?fln? S6rver located in A222.  A LAN version of dBase
       ,19) will also be available on the server.  This data base
management system will allow utilization by up to five simultaneous
^T  ^C?SWhe 3°9° mainfran* ^r tho.S users who require 1?
can be obtained via the CXI PCOX/Gateway 16(13), which will allow
up to 8 simultaneous sessions in the configuration ordered.

     An accurate inventory of cabling and MAUs is maintained in
order to facilitate problem diagnosis and expansion.  IBM has
provided numerous guidance documents and materials to assist with
this effort.  Attachments to this document provide the detailed
labeling and ring planning for the NDPD Token-Ring Network.

-------
                                      r Type 2 Cables
                                          Use Type 1
                                          Cables between
                                          Wiring Closets
             oo
             do oao
             oa aoa'
              aaaa
              aaaa
                ODD
                aaa
                                             a
                                           aaaa
                                           aaa
                                           aoa
                                           aaa
                                           aaoa
                                           a aao
    Wiring Closet
This figure shows only
how the cables are
connected, not how
they should be routed.
Wiring Closet
All Patch Cables
Within Racks Are
8 Feet
                                                                     Work Area
                             Figure  1-4.  Multiple-Whinf .Closet Installation Assumptions


                                - For conversion factors for IBM Cabling System types 6, 8,
                                   and 9, see Appendix A.                             :


                                — For information on using IBM Cabling System type 5
                                   optical fiber cable, see "Using IBM 8219 Optical Fiber
                                   Repeaters" later in this chapter.
      FIGURE It DIAGRAMMATIC  COMPONENT DESCRIPTION

-------
 NDPD-TRN 6-15-87
 Page 4
 Table 1:  Local Area Network Configuration Required Components
 No | Description
            (Part
   (Vendor (Number |Price|Qty|Total (Notes
1|PC Token Ring Adapter
2 (PC TRN Adapter Cable
3 (Data Connector
4 j Data Connector Faceplate
5 (Multistation Access Unit
6 | Distribution Rack 72"
7 j Distribution Panel
8 (Grounding kit for Panel
9 (Component Housing
10 j Shielded twisted-pair wire
11 (Patch Cable - 8' (MAU panel)
12 (Epson Equity III+ Server PC
13 (CXI PCOX/Gateway 16
14 j Identification Labels
15 j Location Chart
16 (Data Test Plug
17 (Advanced Netware 286
18 (dBase III Plus upgrade
19 j dBase III Plus LANpack
20 | TRN HW Maint. & Serv. Manual
| IBM (63391001 452 1
| Anixter |8892 51 | 35|
j Anixter (07584 9 | 9)
| Anixter (07 5852 j 3|
| IBM (6091014 j 429 |
| Anixter (050032 | 210 |
j Anixter j 07 5 8 57 j 206|
| Anixter (075861 | 7)
| IBM (6091078) 64 |
| Anixter j (below) j 274 j
| IBM (86425511 34 |
| FDC j 10010 I2.9Q5I
| TSI |
j Anixter J 075869
| Anixter (075868
| Anixter (079627
(Novell |
I TSI |
I TSI |
1 IBM (Z270024
|1,704|
1 20|
5)
1 34)
U, 954|
851
i **•* i
612
1 0|
40|
39 |
39)
39 |
8|
2|
2)
2|
3|
48|
i
•*• I
H
H
4|
11
1
2
* i
11
18,080) 3
1,365) 7,10
351| 7,10
117) 7,10
3,432) 3
420J 3,7
412) 3,7
14) 3,7
64) 3,9
822 | 8
1,632| 6
1,704|
20) 7
5 j 7
136 (-7, 11
1,954(^4
85 | 2,5
1224 1 9 <»
, **•» | & , o
0|
   TOTAL =>
                                                         $34,832)
Table 2:  Manuals recommended for an IBM Token Ring Installation with
DESCRIPTION
                                     Part
(Vendor (Number   |Price|Qty|Total|Notes
IBM Token-Ring Local Area i
Network Introduction and
Planning Guide
IBM Token Ring Network
Installation Guide
IBM Token-Ring Network
Administrator's Guide
IBM Token-Ring Network
Problem Determination Kit
IBM Local Area Network (LAN)
Cabling System Planning and
Installation Guide

IBM

IBM

IBM

IBM



GA27-3677

GA27-3678

GA27-3748

SX27-3710


IBM IGA27-3361
Netware User's Guide, Vol.1 (Novell j
i
i
1
17
— i
j
1
16)
1
j
i
7
• 1
j
60
1
i
i
13
I
20)
i
1
11
* i
i
1
1
— i
j
I
11
* i
l
i
1)
^ 1
j
I
j
l
1
• 1
i
1
171
•* • l
I
1
161
O.W |
1
1
71
' 1
j
601
WW |
1
1
1
1
13 1
200) 4
TOTAL
                                                          $313

-------
NDPD-TRN 6-15-87
Page 5


(Assumptions and Notes)

1.   No installation costs are included.

2.   TSI, Technology Services Incorporated,  is a firm specializing
     in providing PC hardware and software to the government on a
     mail order basis.  They have a GSA schedule and usually
     favorable pricing.  They carry products such as the Ashton-
     Tate dBASE ill* LANpack software.   TSI's phone number is FTS
     202-631-1177 (Commercial area code - 703).  Their address is
     14130-B Sullyfield Circle, Chantilly, VA  22021.

3.   Each user and server PC requires a token ring adapter.   Each
     MAU supports 8 device adapters and therefore a minimum of 5
     are required for this pilot of 36 systems.  The NDPD LAN will
     use 7 in order to allow for redundancy and expansion.  The
     component housing will be used in A207, where a rack will not
     be installed.  The distribution rack and panel are recommended
     as it is easier to administer the LAN with these components.

4.   Netware comes with one set of manuals.   Volume 1 of the User's
     guide is the only manual that all users need access to.  The
     actual number of manuals required must be determined by the
     NOPO users.

5.   Only the file server needs dBase III Plus and with the LANpack
     a total of five concurrent users are supported.

6.   Patch cables will be needed in two locations:  from the wall
     plates to each attached PC,  and from the twisted-pair
     termination panels to the MAUs in each wiring concentrator.
     Patch cables are required to connect MAUs.  IBM sells longer
     patch cables for applications which  may require them.

7.   Anixter is a supplier of IBM Cabling System components.  IBM
     does not supply many of the components  of the IBM Cabling
     System.  Anixter has an office in Morrisville,  North Carolina.
     Their phone number is 919-469-8303,  and Gray Durham is  a
     contact person.

8.   The shielded dual twisted-pair wire  available from Anixter
     meets IBM specification 4716748 (non-plenum,  PVC jacket)  and
     is part number 317-036-2202-IBM, with a cost of $274/1000 ft.
     The plenum cable with teflon jacket  meeting IBM specification
     4716749 is Anixter part number 325-023-2202-IBM,  with a cost
     of $868/1000 ft.  Any length may be  ordered at these prices.
     Table 3 demonstrates a need for 2,955 feet of the wire.  We
     presently have 500 feet on hand,  thus the order for an
     additional 3,000 feet to allow for waste during installation.

9.   The MAU located on the 2nd floor will not be rack-mounted, but
     rather will be installed in the component housing supplied by

-------
 NDPD-TRN 6-15-87
 Page 6


      IBM.

 10.   Each  PC attached to the network,  except those  in room A209,
      will  be connected via the PC adapter cable running from the
      token-ring adapter in the computer to the wall-mounted data
      connector.  This cable is 6  feet  in length.  The patch cords
      discussed in Note 6 above can be  used to extend this cable if
      required for a particular office.  The connector on the PC
      adapter is a 9-pin "D" connector, as opposed to the TRN data
      connector found on the patch cables.

 11.   The Data Test Plug is required  for testing the cables.  Four
      have  been ordered in order to facilitate the testing process.

 12.   The CXI Gateway will support up to 16 sessions.  As priced, we
      £E?«.?r°VJd*2 f?r * license  for the minimum 8 user stations.
      Additional stations can be added  up to a total of 16
 CABLING STTMMAPY
             £K   ?T  rd f^°°r ?ffices is attached to this document
   ™            v.f100r plan shows the approximate locations of the
 ring  and drop  cables and possible locations for the wall outlets.
 The cable runs are made in groups and under the corridors as much
 as possible  in order to facilitate maintenance of the wiring.
 Communications hardware specialists should be consulted to
 determine if there is any concern about crosstalk with existing
 cables beneath the corridors.

      The suggested locations for the wall plates reflect current
 office setups.  The  EPA Project Officer should poll the staff
 members to determine if the proposed locations are suitable.
 Should alternate  locations be agreed to, each new position should
 be measured  to determine if additional drop cabling will be
 required.  Flexible  patch cables in lengths up to 30 feet are
 available from IBM,  so that a future office rearrangement will not
 present a difficult  reconnection problem.

 **< Table 3 shows the office locations, the MAU to which each
 office will be attached, and the approximate distance from the MAU
 to the office's wall  outlet.  The distances indicated reflect the
 height of the MAU and the wall plate above the floor,  and the
height of the raised  flooring above the concrete subfloor,  uoon
which the cables will  lie.  These factors add an estimated 10 feet
 to the actual lateral  floor run for each cable,  and this fact has
been taken into account for the amount of twisted-pair wiring to
 order.

-------
NDPD-TRN 6-15-87
Page 7
Table 3:   NDPD Staff Locations and MAU Connections
Office
Staff Member
       Approximate
MAU    Cable Length
A301
A302
A303
A304
A305
A307
A309
A3 10
A3 12
A3 14
A324
A325
A326
A332
A333
A3 16
A318
A3 19
A320
A321
A322a
A322b
A323
A327
A329
A330
A331
A334
A335
A335
A336
A337
A341
A342
A343
A344
A345
A332
A209
A209
A207
Ted Harris
Maureen Johnson
Dennis Schur
Don Fulford
Sherry Birk
Billie Vick
Evelyn Sauerbier
Joan Bivins
John Coggin
Tom Clemmer
Tech Library
Ernie Watson
Wade Harris
Bruce Almich
Tom Rogers
Conference Room
Bob Denny
Jerry Slaymaker
Joan Swain
Tom Birk
Cotty Potter
Jean Murray
Don Worley
??
Small Conference Rbom
George LaForest
Walt Shackelford
Mickey Cline
Carolyn Chamblee (a)
Carolyn Chamblee (b)
Jon Clark
Bill Rackley
Jim Obenschain
Bob Lewis
Kathy Krizek
Aline Rolaff
Maurgerite Horton
AB MAU Connector
2nd Floor MAU Drop
John Shirey
Mike Gurkin
Testing Lab
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
B
B
B
. B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
A
C
C
C
45
50
60
70
90
100
90
65
40
35
60
70
80
70
85
95
95
90
95
65
70
85
85
70
60
65
70
70
60
60
45
30
40
65
75
60
55
120
100
0
0
0





































(dual-cable run)
(dual-cable run)
(patch cords only)
(patch cords only)
(patch cords only)
Total Type 1 shielded twisted-pair wire:  2,955  feet

-------
 NDPD-TRN 6-15-87
 Page 8
 ™«r,~       reflectf cabl« lengths for lobe  drop cables  and MAU
 connector cables from wiring closets in Rooms A3 13  and A3 3 8  at
 opposite corners of the 3rd floor office spaces  of  NDPD.  These are
        ?Ji2nf  6St suited for installation of the racks for  the
                Presently a wiring closet for the telephone system.
                         rack may re9uire minor relocation of the
                                space vouid need to
TNSTAT.TATIQN
                   INSTALLATION SCHEDULE SUMMARY


Action                        «j        Pre~           Responsible
    °                                   requisites     staff
1.  Funding approval          NOW       None
2.  Order components                    !
3.  Locate outlet boxes       NOW       None           staff
4.  install outlet boxes                23            ftaff'
                                        Receipt        Almich (TSRs)
               _	connectors      4.5            ?         .
7.  Configure server                    2              r>,a»v,i^
8.  install/test workstation cards      Receipt        Unisys
9.  Configure workstations              8              rh™vo«
10. Distribute user IDs                 9              ChamhT*
11. User training seminar(s)            10


CONFIGURATION AND TNSTAT.TATION NOTES

     o    Access to A313 and A338, the wiring closets.  Both are
          locked.  I'm not certain who has keys to A338, other than
          General Services people.

     o    A contractor must be hired to install the outlet boxes
          and then connect the wiring to the faceplate outlets.   It
          is assumed that Unisys/SDC will run the cabling, as
          requested via an appropriate TSR.

     o    There is no gateway to the 3090 or the Prime computers
          included in the installation described.   It is assumed
          that everyone requiring a connection to them has the
          necessary hardware and software presently.   Installation
          of a gateway can be performed at any time.

-------
                                                                                                                      (AMI)
                                                                                                                      209.25 so.rr
                                                                                                                      IfD MABBIt
                                                                                                                      (AJ04)
                                                                                                                      2«.o son.
                                                                                                                      OOMALO ruuom
off u

-------
                        Ring  Sequence  Chart
 Ring Number
cable from
on page _
                          I
                                               Date
ef/2^7
                         (component)
                         (Iocatioo)
                                                       77
                         (component)  Af 5/4 ^   3/ P 3?>\
                       (loe«ion>
                       (component)
                       (location)   A 3 13 ~
                      It
                       (oomponm)
 OP - DettritHition Pcnel            FP - Feeeplne
 I9E • O'cllow) Crooovw Patch Catta      Megntina Brat±at
 OFP - Optical Ffear Patch Cabie      SS - -—IT?[ana»
                                                    r.
                                                     T,
                                                  77
Page J_ of   2-
                                                              cableto
                                                    WM 9339 Muhaatkm Aceaaa Unft
                                              OFRPTR - IBM t2H OpticeHRbeT Ra
B-6   IBM Token-Ring Network Introduction and Pluming Quid*

-------
   Ring Number


  cable from
          •

  on page	L
DP.Dtotata
Pj_Pweh CiMe

        Ifiber
Ring Sequence Chart


   f                  oat.  6-12-87
                      (component)  M$AU,  3303

                      Creation)L*,*- 0i
                                                 7
                             IT
                      (component)
                      (location)
                                 2301
                      (component)
                      (teeation)^^7
                      f
                      (component)
                      (location)
                                                 K
                     ( component)
                     (location)
                     f
                     (component)   t)P3ll

                     <>ocrton>  A3Sft-3tl- Al
                                 P&
                     (
                     (location)
                                          Page.
                                                                        of
                        f- 	
                        MB - OptM Fiber
                        SS
                        MSAU • IBM <228 Mudtoden
                        R^TM-IBM 8218
                        orarm -
                                                                    Unfe
B-6  IBM Tokea-Riof Network Introduction and Plmnninf Quid*

-------
     Rack Inventory Chart
                         A 3/3
       NSAR
       MSAU
 Wiring closet number
        Rack number
               Date
     Planner's initials

 Instructions
 Fill put a Rack Inventory Chart for each
 equipment rack.
                                              1.
2.
 Enter the wiring closet location
 number, the equipment rack
 identification number, and the
 planner's initials.

 Using the template for the
 Rack Inventory Chart that came
 with this manual, draw an outline
 of each component that will be
 installed in the rack.

 The slots at the bottom of the
 distribution panel tempate are
 used only for the lowermost
 distribution panel in a rack.
 The slots indicate that there
 are 38.1 mm (1-1/2 in.)
 between that panel and the
 next unit in the rack.

Write the unit identification
number on each component
on the chart
                                              Example:
B-2   IBM Token-Ring Network Introduction and Planning Guide

-------
                  Rack Inventory Chart
: • .
                                     3IPI
                    fASAU
3102-
                                     3103
                      Wiring closet number
                             Rack number
                                    Date
                          Planner's initials             	

                      Instructions
                      Fill put a Rack Inventory Chart for each
                      equipment rack.
                                                           ' *
                      2.
                                                           3.
 Enter the wiring closet location
 number, the equipment rack
 identification number, and the
 planner's initials.

 Using the template for the
 Rack Inventory Chart that came
 with this manual, draw an outline
 of each component that will be
 installed ii'i the rack.

 The slots at the bottom of the
 distribution panel tempate are
 used only for the lowermost
 distribution panel in a rack.
 The slots indicate that there
 are 38.1 mm (1-1/2 in.)
 between that panel and the
 next unit in the rack.

Write the unit identification
number on each component
on the chart
                                                           Example:
              B-2  IBM Token-Ring Network Introduction and Planning Guide

-------
                IBM  8228 Cabling Chart
                                                      Date
Section 1 Identification
  Unit
  Number
          Building.
          Location
                 Rack-mounted
                 Wall-mounted
                   Ring
Section 2 Receptacle Connections
 Receptacle
                                6
                        6
                         8
 Connect to:
A&&
3/y-
 44
5/1
A6
311*
                                                   AS38
                             AS38-
                                    A?
 Device
Section 3 Ring Connections
 A. Connect RI of this 8228 to:   DP &U ~ A 2-
 B. Connect RO^f this 8228 to:   M5A14 ~ 3fO ?-
                                                  Appendix B. Pluming Form*  B-3

-------
                IBM 8228 Cabling Chart
                                                      Date
Section 1 Identification
  Unit      lln'L,      Building  ffftfc
  Number   JtQT^	  Location   ***
                  Rack-mounted  ET
                  Wall-mounted  D
Section 2 Receptacle Connections
 Receptacle
                                                     6
                                         8
 Connect to:
              5/X-
              er
         3*1-
M38-
in-
                C7
        Vff
 Device
                     A527
                       A334-
Section 3 Ring Connections
 A. Connect Rl of this 8228 to:

 B. Connect RO $1 this 8228 to:
3101
3/03
                                                  Appendix B. Flanaiaf Pom* B-3

-------
              IBM  8228 Cabling Chart
Date
                                                          '87
Section 1 Identification
Unit o j -3 Building -£K£~ . ,.
Number *(" ^ \ fKjfT'on A33&

Section 2 Receptacle Connection*
Receptacle 1234
AJty" AW8~ A^^f" A?5
Connect to: ?//- ///— 3'/- 3I^/-
P6 P7 ^"4 £"f

n . fi&St> A356 A 33? A5
Device
•
*
Section 3 Ring Connections
A. Connect Rl of this 8228 to: 3/OZ
B. Connaet RO *f this 8228 to: 2>P~ 3// ~
Rack- mounted
Wall-mounted


6 B
ft' A?35- A?38~
3it- 3V-
r e& £7

41 A342 A343


A/ fSo 7>f32
tf
Q Rm(
"•

7
3H-
F4

A34 +


1)
i
1 — 1 —


8
l*£r

A**







t


\
•1


                                            Appendix B. Planning Form*  B-3

-------
                 IBM 8228 Cabling  Chart
                                                        Date
Section 1 Identification
  Unit
  Number
 Building-
 Location   All*
         Rack-mounted Ud D.
         Wall-mounted D Rl"8
Section 2 Receptacle Connections
 Receptacle
                                               8
 Connect to:
                             43/3-
               A4
fif
A?
Device
A30I
WL
A203
A3o+
A3of
*3o?


Section 3 Ring Connections
 A. Connect Rl of this 8228 to:  T)P~ 32/~ At    (fa**

 B. Connect R0$f this 8228 to:
                                                   Appendix B. Planning Form*  B-3

-------
                 IBM  8228  Cabling Chart
                                                        Date
Section 1  Identification
  Unit
  Number
Building    f-ajw-
Location    A 3 13
Rack-mounted \S  R.
Wall-mounted  D    9
Section 2  Receptacle Connections
Receptacle
Connect to:

1
m-
Bt>
2
AM-
w~
87
3
*$:
C +
4
A*}-
C5
5
w*
c&
6
«*:
C7
7


8



Device
w
A3/o
A3t2.
A3I+
&5&
AH*


Section 3 Ring Connections
 A. Connect Rl of this 8228 to:

 B. Connect RO $f this 8228 to:
                                                    Appendix B. Planning Forma  B-3

-------
                 IBM 8228 Cabling Chart
                                                        Date
Section 1  Identification
Unit      JlffSdt      Building
Number   **W

                                              Rack-mounted
                                              Wall-mounted
Section 2 Receptacle Connections
Receptacle
Connect to:
1
r&
2
P30
3
AZof-
4
A209-
5

6

7

8


Device
Z/Ai-
PC*
SIM-
PC.
*&•
PC.
&




Section 3 Ring Connections
 A. Connect Rl of this 8228 to:  2301"   VP'321

 B. Connect RO of this 8228 to:
                                                   Appendix B. Planning Forms  B-3

-------
          Physical Location to Adapter Address
                       Locator Chart
                               Device      '
                               Identification
B-8  IBM Token-Ring Network Introduction and Pl«anin» Guid*

-------
           Physical Location to Adapter Address
                        Locator Chart
      Physical
      Location
    A 324
Adapter
Address
    A 32 5"
    A 326
    A327
    A 329
    A330
   A337
   A34I
   A344-
Device
Identification
A-331
A33Z
A 333
A 334-
.






Ring
Number
                           /
IBM 8228
Unit No.
                                                      3292.
B-8 IBM Token-Ring Network Introduction and PUaninf Guid*

-------
          Physical Location to Adapter Address
                       Locator Chart
     Physical
     Location
Adapter
Address
Device
Identification
Ring
Number
IBM 8228
Unit No.
                                                      3/03
                                                      2ioo
   A2o7fc
                                                      Z/cr
                                                      2 id
   A20<}1>
B-8 IBM Token-Ring Network Introduction and Planning Guide

-------
 Adapter Address to Physical Location
                Locator Chart
Adapter
Address
Physical
Location
Device
Identification
Ring
Number
IBM 8228
Unit No.
                                     Appendix B. Planning Forma B-9

-------
Network Ordering Worksheet
1



































1. Rack-mounted IBM 8228 Multistation Access Units
2. Wall-mounted IBM 8228 Multistation Access Units
Tnfal Miimhar nt IBM 8228 Multistation ACCBftS Unit*
(P/N 6091014)

3. Rack-mounted IBM 8218 Copper Repeaters
4. Wall-mounted IBM 8218 Copper Repeaters
Total Number of IBM 8218 Copper Repeater* (P/N 6339532)
•
5. Rack-mounted IBM 821 9 Optical Fiber Repeaters
6. Wall-mounted IBM 8219 Optical Fiber Repeaters
Total Number of IBM 8219 Optical Fiber Repeater*
(P/N 6339535)

7. 8-foot Patch Cables (for lobes)
8. 8-foot Patch Cables (for main ring path)
9. Spare 8-foot Patch Cables
Total Number of 8-foot Patch Cables (P/N 8642551)

10. 30-foot Patch Cables (for lobes)
1 1 . 30-foot Patch Cables (for main ring path)
1 2. Spare 30-foot Patch Cables
Total Number of 30-foot Patch Cables (P/N 8642552)

1 3. 75-foot Patch Cables (for lobes)
14. 75-foot Patch Cables (for main ring path)
15. Spare 75-foot Patch Cables
Total Number of 75-foot Patch Cables (P/N 6339134)

16. 150-foot Patch Cables (for lobes)
17. 150-foot Patch Cables (for main ring path)
18. Spare 1 50-foot Patch Cables
Total Number of 160-foot Patch Cables (P/N 6339135)


20. Spare Crossover Patch Cables
Total Number of Crossover Patch Cables
(IBM Specification 6339137)
£
/
rr
f

•

0



?

*e>
&
•2-
4f>>

1
0
1
z




0




¥



0
 B-10  IBM Token-Ring Network Introduction and Planning Guide

-------
21. Optical Fiber BNC-to-Biconic Patch Cables
22. Spare Optical Fiber BNC-to-Biconic Patch Cables
Total Number of Optical Fiber BNC-to-Biconic Patch Cables ~*
(IBM Specification 6165811)

23. 8-foot Optical Fiber Biconic-to-Biconic Patch Cables
24. Spare 8-foot Optical Fiber Biconic-to-Biconic Patch Cables
Total Number of 8-foot Optical Fiber Biconic-to-Biconic Patch
Cables (IBM Specification 6165812)
•
25. 45-foot Optical Fiber Biconic-to-Biconic Patch Cables
26. Spare 45-foot Optical Fiber Biconic-to-Biconic Patch Cables '
Total Number of 45-foot Optical Fiber Biconic-to-Biconic Patch
Cables (IBM Specification 6825813)

27. Optical Fiber Dual Socket Mounting Clips (IBM Specification 6165847)
28. Component Housings
(one for each wall-mounted IBM 8228) (P/N 6091078)
29. Surface Mounting Brackets
(one for each wall-mounted IBM 8218 or 8219) (P/N 6339140)
30. Rack Mounting Assembly (one for each seven rack-mounted
IBM 821 8 or 821 9) (P/N 9339139)
31. IBM Token- Ring Network PC Adapter Kits (P/N 6339100)
32. IBM Token-Ring Network PC Adapter II Kits (P/N 67X0438)
33. PC Adapter Cables (P/N 6339088)
34. IBM Token-Ring Network Manager (P/N 6476046)
35. IBM Token-Ring Hardware Maintenance and Service (P/N 6465880)
36. IBM Token-Ring Network Bridge Installation Kit (includes two adapter Us,
diagnostic and bridge software) (P/N 6476041)
37. IBM Token- Ring Network Bridge Program (software only)
(P/N 6403831)



-------
ADDENDUM TO NDPD LAN PLAN DATED 6-15-87

DECEMBER 20, 1987


THIS ADDENDUM PROVIDES "AS-BUILT" INFORMATION FOR THE TOKEN-RlNG
LOCAL AREA NETWORK INSTALLED IN THE OFFICES OF THE NATIONAL DATA
PROCESSING DIVISION.  MAJOR CHANGES INCLUDE:

     o    FLOOR PLANS INDICATE THE ACTUAL ROUTING OF THE TEFLON-
          COATED TYPE I CABLE INSTALLED BENEATH THE RAISED FLOORING
          AT NDPD.

     o    CABLING (AND SYSTEMS) HAVE BEEN INSTALLED WITHIN THE
          UNISYS SPACES ON THE 2ND AND 3RD FLOORS OF THE A-WING OF
          THE ERC, IN ACCORDANCE WITH THE RECOMMENDED EXPANSIONS OF
          THE JUNE MEMO.

     O    MAUS WERE INSTALLED IN GROUPS BENEATH THE FLOORS FOR TWO
          PURPOSES:
          - TO SHORTEN THE OVERALL RING LENGTH
          - BECAUSE SPACE IN AND ACCESS TO THE PROPOSED WIRING
          CLOSETS WERE BOTH LIMITED AND PROBLEMMATIC.

     0    IN ACCORDANCE WITH THE REQUIREMENTS OF THE LAN TSR
          PROCESS, STEVE STONEMAN HAS BEEN IDENTIFIED AS THE LAN
          ADMINISTRATOR FOR THE NDPD LAN.  BRIAN AUSTIN is HIS
          BACKUP.  BOTH HAVE ATTENDED THE NOVELL. "SYSTEMS AND
          SUPPORT" COURSE IN PROVO, UTAH.  IN ADDITION TO SERVING
          AS THE LAN ADMINISTRATORS, BOTH ARE ON THE UNISYS
          NATIONAL LAN SUPPORT STAFF.

     o    AN IBM PS/2 MODEL 80 LAN SERVER, ORDERED FROM THE SNA
          CONTRACT, HAS BEEN SET UP AS THE FILE SERVER FOR THE
          SYSTEM.  A 115MB HARD DISK HAS BEEN ORDERED TO SUPPLEMENT
          ITS 70MB DRIVE.  AN HP LASERJET 500 WILL BE ATTACHED AS
          PRINTER 0 AND LOCATED IN THE NDPD MAILBOX AREA ON THE
          THIRD FLOOR.

     o    ACCOMPANYING PLANNING CHECKLISTS IDENTIFY THE USERS WHO
          WILL BE ATTACHED TO THE LAN AND DEMONSTRATE MANY OF THE
          PLANNING CONCEPTS DISCUSSED IN THE TEXT OF THE LAN
          GUIDELINES.

-------
IK'\
itt&V* Mi/wfrf/
In-
stall
ROOM Staff Noter Oat*
System Space*:
1§t Floor Cooputtr ROOB
Ml* S«rv*r 1 87
Fil* Server 2 Futur*
Steve Stonann 87
• I*|*M AIM tit* 9CT
•rleVi AUVllrl Q*
T. Tracy Mow
network Control
HCF PC f 1 MOM
MCF PC 02 MOM
MCF PC n MOM
NCF PC M Now
CXI 3270 Gateway PC MOM
Novell ACS PC U
EPA Office*:
AVAf T«w4 U*iff*f»f «l U«MJ
AJUI ICQ nornv HOW
A302 Maureen Johnson MOM
A303 Dennis Schur Future
A304 Don Fulford Now
A303 Joan Blvtns 88
A307 Billie Vlek Now
A309 Sherry 81 rk Future
A310 Sherrie Jameson 88
A312 Becky Patrick Now
A3U Ton Cleaner Now
A316 Conference Roc* Future
A318e Barbara Dagger Now
A3186 Jean Murray Now
A319 Jerry Slsynsker Now
A320 Joan Swain Futur*
A321 Tom 1 irk Now
A322a Cotty Potter Now
A3226 John Coggln Future
A323 Don Uorley Now
A32& Jcdin Shirav U|Wv
XT
XT
Epson
Pri«*
XT
3279
XT

AT
AT
Epson
AT
Epson
Spec
AT
Epson
Epson
Epson
Approx
Lob*
NAU Length


24
26
22
rf
mf
U

2
2
2
2
2
2
5«
3*
5 35
S 38
5 37
10 53
10 39
9 25
5 29
4 11
4 23
9 20
9 23
10 20
10 24
10 22
10 19
18
13
24
if
^ •
34
35
25
26
24
15
32
29
22
99
££
20
26
40
38
31
52
48
7 56

11 40
12 17
11 17
11 22
11 20
11 31
12 38
12 38
11 20
12 55
Applications needs:
D
•
W S N





XXX
X X

X X
X X
X




X X
X X

X
X





X X
XXX
X X
X X
XXX
XXX
X
X
X X
XXX
X
XXX
X
X X




X X
X X


X










X
X
XXX
E A Hosts: F
N S 3 P 0
1 M 9 N I A U A M





XXX
X X

X X
X
X


X

XX X XXX
XX X XXX
X
X
X
X
X
X
X
X X
X
X
X X
X X
XX X
X X
X
X
X
X X
XX X
XX X
X X
XX XX
XXX
XX X
XX X
X X
X X
XX XXX
XX XX
XXX
X X
XXX
XXX

X X
X X
X X
X X
X X
X X
X X
X X
X X
XXX XXXXX
G P 0
R R T
P G E





XXX
Xw
A








XXX
XXX





X X




X X


X





XXX




X
X

XXX
X X
X X













X 8

-------
UDRKSTATION CONFIGURATION INFORMATION
EPA LAN PLANNING CHECKLIST • 2
                                                                          ORGANIZATION:    • VIS7"L>
                                                                          BATE;       /«g-/-/37
CONFIGURATION / USER NAME:

Personal computer vendor ft
DOS Version f:

Video Adapter(s):
  ^^^ PvA MonocnroMV
  	 CCA Color/graphic*
  ^X EGA Enhanced graphics
  	 Hercules
                                Ef>$»fl
                               l:
                                    Epson
                                      .3* 2*-
                              	NCCAdBM PS/2 Nodtl 30)
                              	 VGA (PS/2 Nodtl  50/60/80)
                              	Othcrt 	
       KCtss Mory (RAM):
  X 640Kb       	512Kb       	256Kb    	Kb
  	Mb EMS (Lotus/Intel/MfcroSoft txpwvfed •anory)
  	Mb Extended (•ddrmsed abovt XMOOOO')
                                                                Monltor(s)t
                                                                    M^^p^fc^^
                                                                ^^^ MOnOC
                                                                    Color
                                                               X-
                                                                	Multisync
                                                                    Others
Disk itorege:
  Floppy disks:     5. 25 -/360Kb   5.2SV1.2Mb   3.5"/720Kb   3.5-/1
                A:  _        .X          _       _
                                                           ~
                               , _
  Herd Oisk(s):  C: drive      3O_ Mb
                0: drive       _ Kb
                Additions! drive(s):
                Bernoulli drives:  _
                Other (specify):
                                       10*10
                                                     20*20
Nuifcer of Ports: Serial (RS-232C)
                                         Parallel Printer
Peripheral
                   Manufacturer
                                       Model *
CspacIty/Speed/Etc.

	Mb
Tape Backup
Printer
Mouse
                                                            baud
Workstation Software  Package
                                        Publisher
                                                            Version
word Processing
Integrated Spreadsheet
Data Base Manay merit
Async. Ca»icat1ons  Cfextbll Xtfl
                                                             +0
                                   f
                                                             /•I
                                                             3*61

-------
IMPLEMENTATION OBJECTIVES
EPA LAN PLANNING CHECKLIST - 3/1
                                                                ORGANIZATION:
                                                                DATE: 	/O-/-67
1.   What It the objective you wish to acconpllsh with the Installation of thU LAN7
2.
Quantities of personal computers and terminals do you have fn place and planned?

                             NOW        NEXT ft       W/IN 3 TRS
     PC* •
          PC/XT
          PC/AT-co*Mtfbl«
          Colu^lts  (not LAN<
     Macintosh Plu»/SE/II
     Ltxltrons
     Othtr
               3278/79 tcrainal*
     Prioe Terainals
     VT 100/200 DEC  VAX Ttralruls
                                                        to
3.   Wh«t fona of  infonmtlon •hiring/distribution do you roquiro? Indicatt nu^tr of user* requiring access to tach  rnourc*
     Conmctlvity
          E-Mail
          Other Async  Hosts
          NDPO Mainframe
          Regional  LMF
          PriM
          Laboratory VAX
          Other LANs
     Resource sharing
          Laser printer
          Plotter
          CD-RON  reference
          Other high-cost
     Data sharing
                       TOTAL
                                         IMMEDIATE .......
                                              SIMULTANEOUS
                                                  FUTURE
NO
          Local sultl-user data base
          Local eultl-user spreadsheet
          Local scheduling/project sent
          national application database
            &raoh if f
      •gfl.
                                                                                                                  LPC-3/1

-------
 IMPLEMENTATION OBJECTIVES
 EPA  LAN PLANNING CHECKLIST - 3/2
4.   ttiat PC application* aofttare do you need to chare?
                                        -— NLMBEI Of USERS	
                                        TOTAL        SIMULTANEOUS
Uord ProcMBtng
Spreadsheet
Data la»e Management Syati
Graphic* Preparation
Project Management
FOCUS
SAS
Natural Connection
                                          /fr
                                          IQ
5.   What alternative* have you evaluated?

     Mo (mediate Need                    TES   ^     NO
     Prime Office automation              YES   S     NO
     VAX terninal*                        YES   */     NO
     3270 tenainala for aainfrm          YES   r      NO
                                                                                                                LPC-3/JL

-------
APPLICATIONS
EPA LAN PLANMIHC CHECKLIST - 4
                                ORGANIZATION:
                                DATE:
JOB DESCRIPTION
PACKAGE
                                                                  USERS (GROUPS)
                                                   4. O
  RFP
~Ekb Use
     "D/tfrihuticn
                                 XDP0M
                                                                                                         LPC-4

-------
 APPLICATIONS SOFTWARE WORKSHEET
 EPA LAN PLANNING CHECKLIST • 5/1
                                                                         ORGANIZATION:
                                                                         DATE:
 Program Nam:
 Vendor:
                      Alt*  TET +
Version:
WoricstBtion Requirements;

Nfcroco»puter:     }£__ PC/AT-coppetibl«

DOS Version:     Lowntt  2. • \

Display ft Adapter:
                                                   Apple Macintosh SE/I I
    ry (RAM):             Required
                 256Kb
                 512 Kb
                 640 Kb
               	Kb	
   EMS expanded	Mb  */*r KflUgfP
   Extended     	Mb  MOT unutr»
                                          Rec
                                                             Acceptable
Disk storage:  (Indicate Required/Recannended/Acceptable as
               applicable  for  each)
     Floppy disk A:  5.25"/1.»b
                    3.5"/720Kb
     Floppy disk B:  5.25"/1.»b	*
                    3.5"/720Kb      \
     Hard Disk(s):
          C: drive            l&  Mb
          D: drive             */ Mb
          Additional drivc(s):
                                        S.ZS-/360Kb
                                        3.5"/1.UMb
                                        S.Z3V360Kb
         BemoulU drives:  10*10 _     20*20
         Other (specify):    e»**y  3fa**~4t«-t
                                                   DOS
     RecoRnended CONFIG.SYS parameters:
          FILES     » _2£
          BUFFERS   •  l&
          DEVICE    »    AM-	
Printers Scpportad:  (Manufacturer and Nodal i's as appropriate  for your systea)
Other rsqulred/supported peripherals:
                                                                                                             LPC-5/1

-------
 APPLICATIONS SOFTWARE WORKSHEET
 EPA  LAN PLANN1HC CHECKLIST  - 5/2

 Prograsi Mm:     Jfatt Tlf +	Version:  A/

 Server Requirement!:

 Dedicated Servers   	Reojjlred     	»sfcsMiiieJ       *   tfo

       •cent •Mory:
     Shared Marys         ^  Kb
     Un»h«red •Bfjs       ^ Kb
Disk storage:
     Shared read-only:      t°&  Kb
     Shared read/write:     ^^__ Kb
     Unshared read-only:    __^_ Kb
     Unshared read/writes   ____ Kb

     Muter of files used:
     Program and configuration files:     /^*
     Files per user application:          U*/i~,'/t4
Printers:
                                 FORMS                 DEMAND (X of  Capacity)
     P1
     n
     P3
     P4
     P5
Other shared peripherals:
     Modem:
     Plotter:      »JO
     Others:  	
                                                                                                             LPC-5/Z

-------
3RD FLOOR ERC BLDG ( 78-WING )

-------
                                        DRAFT
3RD FLOOR A-WING ( 8 —/ING) OF E.R.C, BLDG

-------
SECOND FLOOR SYSTEMS AREA (A-260) ('81 WING )

-------
!    ICOMMCN.IIMU
                                            A200 - A237  WING ("74 WING SECOND FLOOR)

-------
SECOND FLOOR COMPUTER ROOM (A-240) f'78 WING )

-------
    VA/'
  SUPPLY & HARDWARE STAGING ROOM
 CJiLLLJJ
srhH
 PRINT ROOM
COMMUNICATION SUPPORT AREA
             ^^m
             SS
 I/O CONTROL ROOM
                                                                        UPS ROOM
                     COMPUTER  MAINFRAME AREA
        FIRST FLOOR COMPUTER ROOM     (A140)  ('78 WING )

-------
Appendix I - Region 4 Site Survey

-------
            SITE SURVEY TECHNICAL EVALUATION

                          FOR THE

                       EPA REGION 4
             SUPERFUND LOCAL AREA NETWORK
                          PROJECT


                  CRC PROJECT NO.: 8450.106
                        Presented to:

                 Environmental Protection Agency
                          Region 4
                     345 Courtland Si, N.E.
                     Atlanta. Borgia 30365
                        Prepared by:

                      CRC Systems, Inc.
                    11242 Waples Mill Road
                    Fairfax, Virginia 22303
                        (703)359-9400
                                                   June 16,1987
&EPA
                                               TIM Sytttmi SpicMlttt

-------
                       The Systems Specialists
         CflC Systems Incorporated
11242 Waples Mill Road, Fairfax, Virginia 22030
             (703) 359-9400
                                                                June 16,1987
       Mr. Jack Sweeney
       Branch Chief for
       Information Resource Management
       Environmental Protection Agency
       Region 4
       345 CourtlandSt., N.E.
       Atlanta, Georgia 30365

                          Super fund LAN On-site Survey

       Dear Mr^S^eeney:

                   Please find  enclosed  four copies of  the  results  of CRC
       System s June 2 and 3, 2987 on-site engineering survey.  This document details
       the conditions  found in  the Region 4 building where  the Super fund LAN
       project is to be installed.

                   We sincerely appreciate the time and effort of your staff in
       assisting our efforts. Their cooperation was invaluable.  If you  have any
       questions, please feel free to contact me or Drew Nowak at the number above.
                                            Sincerely,
                                           Aichard E. Carlson
                                          ' Director, Distributed Networks
                                            Division
      REC/dn

-------
                    TABLE OF CONTENTS




SECTION                DESCRIPTION                  PAGE
     TASK DESCRIPTION




     1.1
     1.2   PURPOSE
     2.2   ON-SITE SYSTEMS SURVEY
     3.1   GENERAL Disnifisinisj
     4.1   POWER DISTRIBUTION STUDY
          POWER PROTECTION EQUIPMENT




     43   TRANS5nSSION MEDIA ._
                                                     M
     TECHNICAL EVALUATION PROCEDURES __ 2-1




     2.1   LAN DOCUMENTATION _ _
     2 J   PERSONNEL BRIEFING ___ 2-6





     TECHNICAL EVALUATION FINDINGS— _ 3.1
          POV^TR SYSTEM ANALYSIS _ _ 3.2




     3J   TRANSMISSION MEDIA ANALYSIS _ ,3.3




     3^   INDIVIDUAL WORKSTATIONS ANALYSIS _ M





     RECOMMENDATIONS _ ___                     _

-------
                   TABLE OF CONTENTS




SECTION               DESCRIPTION                  PAGE
     4.4   SUMMARY

-------
                       LIST OF EXHIBITS

  EXHIBIT                DESCRIPTION                  PAGE
EXHIBIT 2-1
         REGION 4 GROUND FLOOR PLAN                   2-2

EXHIBIT 2-2
         REGION 4 FIRST FLOOR PLAN                      2-3

EXHIBIT 2-3
         REGION 4 SECOND FLOOR PLAN                   2-4

-------
                                                           CRC-EPA-4450.106
                               SECTION 1
                         TASK DESCRIPTION
 U          GENERAL
             CRC Systems, Inc. is under task with the Environmental Protection
Agency (EPA) - Region 4 to design and configure a Local Area Network (LAN) for
installation in the EPA Region 4 Superfund Project offices. The LAN is to consist of
an IBM Token Ring  using Novell Netware and file servers.  The network will
connect 13 PCs (including 2 file servers), a gateway to an IBM 3090 mainframe, and
an asynchronous gateway using a dedicated PC

L2          PURPOSE

             The first step of this task is  performing a  subtask to verify the
preparations made for the  LAN at the EPA site.  This subtask, called a technical
evaluation, consists of the following step:
             o     Examining available LAN documentation;
             o     Performing a two-day engineering site survey; and
             o     Briefing EPA on the state of the site.

            The main feature of this subtask is the engineering site survey. The
engineering site survey is a technical evaluation conducted  on-site that examines
power supplies, operating environment, transmission media, and overall plan. This
document is a report of the findings of this subtask - the technical evaluation.
                                1-1

-------
                                                         CRC-EPA-8450.106


                              SECTION 2
             TECHNICAL EVALUATION PROCEDURES

            Three steps were performed in this subtask, as mentioned in Section 1.

 2.1         LAN DOCUMENTATION

            Two documents were obtained from EPA Region 4 personnel They
 included:

            o    Complete  floor plans, showing the proposed locations of the
                 LAN workstations; and

            o    IBM Token-Ring Network/ Telephone  Twisted-Pair  Media
                 Guide.

            The floor plans are shown as Exhibits 2-1 through 2-3. They indicate
 11 LAN workstation locations. This includes 10  user workstations and 1  system
 administrator workstation.  The 11 locations are distributed throughout the ground,
 first, and second floors.  The numbering of the workstations as shown on the floor
 plans will be used throughout this document. The computer room where the two file
 servers will be located is on the ground floor.

2.2          ON-SITE SYSTEMS SURVEY

            CRC Systems engineers performed  a technical  evaluation, at each
workstation location, as well as two alternative locations,  including the  computer
room. The workstation locations were examined f on

            o    Commercial and/or conditioned power sources;
            o    Quality of the transmission media to be used on the LAN;
            o    Environmental conditioning;
            o    Interviews with key personnel; and
            o    Overall site plan.
                               2-1

-------
                                                      CRC-EPA-*450.106
ft. TOYMI*
             N. MAKSM
                        0. KLUCSNE*
                          113
            E

            ter.
                                                 At HAMKC .
                                             G.
                                               K. DAO
A.  DAVIS
              P. AMOCKtOM
                  REGION 4 GROUND FLOOR PLAN
                            EXHmiT2-l
                             2-2

-------
                                                        CRC-EPA-S450.106
LJ   Woco Pcoctc=. UMIT


1^1   WP UMir  OK LAN



                UW.T Ow LAM
                                     tcy
                                     SSL
                                  Q
                                          v.
<••—«»•». &T|
s: *•*•>''  I




m?


 *• Jorr   I
fr —^*   I
  tr,*f-**fr) I
                                                                 r
F
                                                  ^•C
                                                     W.
                                                                  •
                                                                   a. **•**+
                                            . -/
                                                iJ
                                                   luacrci

                                         HA  CeTi
                                                                 •«|T •«!€•
                 REGION 4 FIRST FLOOR PLAN

                          EXHIBIT 2-2
                            2-3

-------
                                                              CRC-EPA-8450.106
          7. WIAVI.
                  8. SXAVC*

                   me.
                  s®
   X Y
                           PIU.
^.
                                          EM*.
                                                         EM*.
                                                                         A»MIM,
f. BAIWITT
C. WAlftCM

 '**.
             C3C
              CSC
                   PKC.
                   . Moiw.il

*.. CA«A.T.«

0. MA— ,.^
CMF.
(VA^AWT)
P. Or*iu
"v®
t.»««.-
coc

S. &AKOMCJL
'**•
*""»*
CM*.
C. TACU.M
ADMIX.
A. Si-lvcuS
ADMIW.

                 « Cot*
                                         C. Ovu
                                          'KM.
                                                            C.
                                                      (Mm
                                                                        L. STACT
                                   *.. TbWKBAM
                                                C.
                                                            C.
                                                                     5". "
     Ovr.tc
    a
                        REGION 4 SECOND FLOOR PLAN
                                  EXHIBIT 2-3
                                   2-4

-------
                                                            CRC-EPA-8450.106

              The on-site engineering  survey plan used  for Region 4 by CRC
 Systems engineers is in complete accordance with the preinstallation portion of the
 guidelines established in Appendix B of the IBM Token Ring Telephone Twisted-.
 Pair Media Guide. These guidelines describe:
              o   Power line tests;
              o   Telephone wire safety, ground, and resistance tests; and
              o   Telephone wire characteristics.
              Of primary concern during the on-site survey were the following areas:
              o   Any presence of alternating current (AC) on the twisted-pair
                  wmng;                                               *
             o   Common Mode Noise (CMN) occurring between the hot and
                  ground and/or  neutral and  ground, which  influences highly
                  susceptible switching power supplies in computers; and
      -
(Mpr
  tp
             °    Xerifi^fc£x°/ P.r°P" grounding, as per National Electrical
                  Code (NEC) Article 250, to provide a low impedance path for
                  load and fault currents to return to the transformer neutral. A
                  computer system requires a zero voltage reference to operate its
                  logic circuits.   Any voltage  above zero on this  reference can
                  introduce false signals and create logic errors in the system.
             To perform the power and transmission media testing, the following
 equipment was used:
             °    ECOS 1023 Power Analyzer;     $100.
             o    ECOS 7106 Ground/Circuit Tester,
             o    Hewlett/Packard Digital Multimeter;
             o    IBM Analog Multimeter, and
             o    Amperage Tester.

             PERSONNEL BRIEFING

       -     On the last day of the on-site survey, CRC Systems engineers briefed
EPA personnel from Region 4 and RTP on the  results of the survey. The lurvey
results that were discussed are contained in Section 3. The EPA personnel included:
                                2-5

-------
                                             CRC-EPA-8450.106
o     Jack Sweeney;




o    . Randall Davis;




o     Carolyn Chamblee (RTF); and



o     Paul Vincent (SDC).
                   2-6

-------
                                                           CRC-EPA-8450.106
                               SECTIONS
                TECHNICAL EVALUATION FINDINGS

             The technical evaluation performed essentially two functions:
             o    A  checfc  of the  commercial  power sources supplied to the
                  workstation locations; and
             o    An evaluation of the unshielded twisted-pair wiring to be used as
                  the LAN transmission media.

 3.1          GENERAL DISCUSSION

             The  general condition  of  the preparations  made  by Region  4
 personnel for the LAN is excellent.  Considerable effort has been put forth by key
 personnel to create a suitable operating environment. The  following personnel are
 commended on their efforts  for maintaining a professional  environment and for
 their assistance during this project:
             o     Rick SheckeD;
             o     John Keefer, and
             o     RickyFelton.

             Mr. Keefer, as the LAN system administrator, is highly motivated in
 achieving  a successful LAN implementation.  Mr. Felton completed a highly
 professional installation of the  unshielded twisted-pair  wiring to be  used for the
 LAN.

            The history of (he EPA Region 4  headquarters does not indicate
 system or persistent hardware problems. However, in discussion with a number of
 personnel in both the information management and user community, a consistency
 existed in the opinion that they were experiencing power  or power-related problems
 occasionally, but have accepted these problems as "part of the environment"

       -    Although some power-related problems  have occurred  and been
noticed, no formalized study has been made  to measure the  effects of these
problems.  Generally, they have not been severe enough to cause a major impact on
the operations of the Region 4 systems.

                               3-1

-------
                                                            CRC-EPA-S450.106



3.2          POWER SYSTEM ANALYSIS


             The commercial power supplied to Region 4 headquarters, including

the proposed LAN workstation locations, is generally unprotected or conditioned.

The computer room where the file servers are to be located has a Liebert power

transformer.  In general, the following areas of concerns exist with the workstation
power supplies:
                  ™t, *"?*  8upP]y CU*8)  ejdsts  tor  data
                  protection,   even  in  the  computer  room.     Frequent
                  thunderstorms, causing power outages in the area, make this an
                  even  more   important  concern.    The  l.iebert  isolation
                  transtormer,  in the computer room, only provides the proper
                  final utilization voltages. No useful energy ;b stored in it, §o no
                  extension of  nde-through is provided by  the Liebert during a
                  power input interruption. Ride-through  energy storage requires
                  supplemental apparatus;                              M«««
                 ™«tr^ta!!°nS*u re p,nmarily Powered from a daisy-chained feed
                 contained in the cubicle/partitioned system. The cubicle power
                 teed from floor risers, is unconditioned and highly susceptible to
                 electrically-induced noise interference;            uw,epuwc «o

                 A general  shortage of  power  receptacles, resulting  in an
                 excessive use of extension cords;

                 A distribution problem exists throughout the entire building,
                 especially in the northwest corner of the second floor where
                 power supply characteristics found were unacceptable;

                 Use of fluorescent lighting, fans, typewriters, etc. in work areas
                 is introducing significant noise into the power supply; and

                 Use  of power strips throughout the  buildings for computer
                 equipment.  These units only provide minimal  surge protection.
                 They only contain one metal oxide varistor (MOV) and should
                 not be depended on for any significant surge/spike protection.
                 Also of concern is the habit of powering up 3l components from
                 the strips main  power  switch.   Powering up all computer
                 components at the same  time causes a  potentially damarinff
                 current surge that may affect sensitive  components. The initial
                 S«8ia?pe^s on ?e 8round M a raisedpotential and ultimately
                 affects the low-voltage direct current (DC) components.  Alsa

                 *C0>mtOT  O *' f°9m  *****
                               3-2

-------
                                                            CRC-EPA-8450.106
 3.3          TRANSMISSION MEDIA ANALYSIS

             The  transmission media to be  used for the Token-Ring  LAN is
 unshielded twisted-pair telephone wire. This wiring has been recently installed for
 this  purpose.  In general, its installation is ideal  Uninterrupted wiring runs are
 strung between the  Type 66 connection block in the computer room  to  each
 individual workstation area.  These runs are strung through telephone closets and
 risers to reach their particular locations.

             The  unshielded twisted-pair wiring, as the name implies, is highly
 susceptible to  electrically-induced  interference.  The wiring was found to be
 acceptable, except for one workstation location. Workstation #3 (telephone jack
 #208), has a high, fluctuating reading that often exceeded 100 ohms. This indicates.
 the contact along the twisted-pair run with an AC field, probable a high frequency
 source such as a fluorescent lighting fixture.

3.4          INDIVIDUAL WORKSTATIONS ANALYSIS

             The following breakdown summarizes the results of the site-survey at
each workstation, alternate workstation, and computer room. The workstations are
identified by the number given for it on the floor plans, as well as the number of the
telephone jack used for the twisted-pair.
            Workstation #1 (Jack #57)
                  Power - Acceptable (Note: An adjacent cubicle which has its
                  power from a ceiling feed has a neutral-ground short)
                  Twisted-pair - Acceptable
            Workstation #2 (Jack #6)
             .     Power-High 6.2 VAC CMN
                  Twisted-pair - Acceptable
            Workstation #3 (Jack #208)
                  Power • No power
                  Twisted-pair - Very high and unacceptable impedance (CMN),
                  in excess of 100 ohms.                                   *
            Workstation #4 (Jack #224)
                 Power - Acceptable
                 Twisted-pair - Acceptable
                                3-3

-------
                                              CRC-EPA-8450.106
 Workstation #5 (Jack #217)
      Power - Acceptable
      Twisted-pair - Slightly high impedance (CMN) at 21 ohms.

 Workstation #6 (Jack #234)
      Power-Acceptable
      Twisted-pair - Acceptable

 Workstation #7 (Jack #176)
      Power - High 6 VAC impedance (CMN)
      Twisted-pair - Acceptable

 Workstation #8 (Jack #250)
      Power - Acceptable
      Twisted-pair - Not installed yet

 Workstation #9 (Jack #143)
      Power • Acceptable
      Twisted-pair - Acceptable

 Workstation #9A
      Power - Open ground fault, faulty fixture.
      Twisted-pair - None.  .

 Workstation #10 (Jack #127)
      Power - High 6.2 VAC impedance (CMN)  .
      Twisted-pair - Acceptable

 Workstation #11 (Jack #122)
      Power - High 7.0 VAC impedance (CMN)
      Twisted-pair - Acceptable

 Workstation #11A
     Power - Riser power, High 7.0 VAC CMN. Power strip power,
      acceptable                                    e *
     Twisted-pair - None

Computer room and Type 66 Connection Block
     Power-Liebert isolation transformer for computer components.
     No UPS protection. Temporary power strip from commercial
     power by Type 66 block has High 6.2 VACCMN.
     Twisted-pair - All LAN twisted-pair runs terminate on Type 66
     connection block. File servers will interface here. Acceptable.
                   3-4

-------
                                                            CRC-EPA-8450.106
                               SECTION 4
                         RECOMMENDATIONS

             Based on the technical evaluation  of the Region 4 Headquarters, the
 following recommendations are offered. These recommendations reflect a "total
 system" approach to defining, isolating, and correcting system problems.

 4.1          POWER DISTRIBUTION STUDY

             A comprehensive power distribution study is required to properly plan
 for the increasing requirements for electrical  service  throughout  the Region  4
 building. This is especially true in the microcomputer high density areas. The scope
 of the power distribution study should include telecommunications, computer, and
 other sensitive hardware environments.  A significant goal of this study should be to
 eliminate the excessive use of extension cords and power strips, circuit contention,
 and noise interference problems. This study wfll take into account all power in the
 building, ultimately enhancing the performance and reliability of the Superfund
LAN  project To properly accomplish the power study, the following technical
requirements must be met:

             o     A load requirements study detailing the following:
                 •  present circuit loads,
                 •  high density load circuits, and
                 •  equipment load requirements;
            o    An analysis of the existing power distribution system including:
                 -  existing circuits,
                 •  existing load requirements, and
                 •  planned load requirements;
                 A critical/sensitive load analysis that  wfll define those items of
                                                  due w ** tapoltance to
            o    A power monitoring and quality analysis with an events recorded
                 and analyzed. This session should be no longer than 5 working
                 OBYS.
                               4-1

-------
                                                            CRC-EPA-S450.106


              From  the  power  distribution  study, precise  recommendations  for.
 improving the electrical environment of Region 4 should be provided:  These
 recommendations should include:

              o     New circuits requirements to meet load requirements;

              o     Computer-grade circuit specifications; and

              o     Load distribution plan.

 42           POWER PROTECTION EQUIPMENT

              Initial indications from the technical evaluation show that  there is a
 need for power protection, especially for the LAN file servers. Power protection
 equipment includes,  but  is not limited to, unintemiptable power supplies (UPS),
 voltage spike  and surge  suppressors,  and transient noise  protection devices.
 Presently, the computer room only offers a Liebert isolation transformer system.

             However,   before  specific   power  protection  measures   are
 recommended, the results of the power distribution study must be evaluated and the
 actual cause and  effect  relationships between  power problems  and equipment
 performance must be isolated. In this manner, the measure of protection applied
 will fit the actual problem.  This is the most cost-effective way of accomplishing'
 power protection.

 4J          TRANSMISSION MEDIA

             The transmission media to be used for the LAN is unshielded twisted-
 pair.  This twisted-pair is generally acceptable for use on the LAN.  Its inherent
 limitations  may affect future LAN workstation installations and performance.
 Currently, the twisted-pair run to workstation #3 is unacceptable. The interference
 measured on this particular run, caused by high-frequency AC, must be corrected. It
 may be corrected by merely identifying the source of the high frequency interference
 and relocating the wiring, or restringing the run with a length of shielded twisted-
pair.  In the future, the use of unshielded twisted-pair in adding LAN workstations ?
will more than likely increase interference and performance problems.  A LAN is a
                                 4-2

-------
                                                                  CRC-EPA-8450.106
       highly sensitive electrical network, reflecting interference and noise problems along
       the entire network.  It is recommended that all future LAN workstations locations
       use shielded twisted-pair to  minimize  any interference,  noise  and subsequent
       performance problems.  It is also recommended that, if in  the future, the original
       unshielded twisted-pair workstation locations are found to be causing network
       problems, that they be retrofit with shielded twisted-pair wiring.
                   SUMMARY

                   With  one exception (a twisted-pair run), the current operational
       environment is within acceptable tolerances for use of the Token-Ring LAN. The
       interference experienced on the twisted-pair  run  to Workstation #3  must be
       corrected.  However, there  are problems that do exist which may influence the
       performance of the LAN. The most serious of these problems is the condition of
       power supplied to the workstation areas. The Common Mode Noise measured at
       several locations may cause that particular station or the entire LAN to fail.  The
       basis of the power problems is a lack of available electrical service to critical areas,
       causing an  extensive use of power strips and  a severe contention for electrical
       service. There  are  no computer-grade circuits for LAN workstations.   Ideally,
       NEMA 5-15 (IG) type receptacles and dedicated circuits with separate ground and
       neutral should be installed for LAN workstations. From an operational standpoint,
       the contention for electrical service among sensitive hardware and noise producing
       equipment such  as printers, typewriter, heaters, and  fans  may  cause  serious
       reliability problems.
  •                    ** m°St C08t cffective solution for surge suppression and noise
 ft,-  isolation, use of an ISOBAR AC line filter receptacle unit is recommended.  The
      ISOBAR is oneofjhe most effective electronic filters on the market  They cost
      approximately($68 Qfwiece. It provides:

      *£&"      °    Complete  common and  transverse  mode  surge and  spike
       ^              protection;                                  *       F
              .    o    Complete capacitive and transformer filtering of RFI and EML
      .                 End
5'*"                   r>
t,o*<*u*          °    Complete isolation between adjacent receptacles to prevent
f                      feedback from peripherals, such as printers.           P
 C M */•'*< /»* kt£i) /» 3 »»J
                                      4-3

-------
                                                            CRC-EPA-8450.106

             If installed now, the LAN would operate; however, excessive errors
 and retransmissions are .predicted.  The recommendations are essentially low cost
 solutions to  significantly enhance reliability and system performance.  After the
 Token-Ring LAN is operational is is further recommended the performance of the
 LAN is monitored and tested

             After the installation, the following procedures, given in Appendix B
 of the IBM Token-Ring Telephone Twisted-Pair Media Guide, will provide the first
 step  in identifying any environmental  conditions  still hampering the  LAN's
 performance. They include:

             o    Functional  testing with the Token-Ring  Network,  involving
                  running the IBM Token-Ring Network PC Adapter Advanced
                  Diagnostics on an IBM PC with a Token-Ring Adapter installed
                  and connected to the wire loop; and
             o    Error rate tests.  If the Advanced Diagnostics program runs
                  successfully, a data error rate monitor test is performed.

             Finally, the Region 4 personnel involved in the planning, preparations,
and installation for the Superfund LAN should be commended.  Working within the
limitations of budget and the existing environmental conditions, they have helped
insure a smooth and  successful LAN implementation.
                                4-4

-------
Appendix J - NDPD LAN Support Roles

-------
**  Q  \        UNITED STATES ENVIRONMENTAL PROTECTION AGENCY
\ ^\$- *                  Research Triangle Park. NC 27711
                                   January 15, 1988
                                                                          OFFICE OF
                                                                       ADMINISTRATION
                                                                       AND RESOURCES
                                                                        MANAGEMENT
    MEMORANDUM

    SUBJECT:   National Data Processing Division (NDPO) Support for LANs
    FROM:      Donald W. Fulford. Director
               Natlonal Data Processing Division (MD-34)

    TO:        PC Site Coordinators
               OIRM Division Directors


         The Agency 1s now poised to Integrate personal computer local  area
    networking (LAN) as an Integral part of the Agency computing resources.  The
    following document Identifies the NDPD support structure for these local  area
    networks (LANs).  The roles of various NDPD staff members are shown.   Addition-
    ally,  we have anticipated six (6) user questions and have Included our response
    to  these Items.

         This support structure, combined with our NDPD Technical Guidelines  to
    be  released this month, should provide a good resource for Program Offices
    Interested 1n using this technology.  Please feel free to contact those
    Identified with any questions you may have regarding their areas.

    Attachments

    cc:  Ted Harris
         Maureen Johnson
         Dennis Schur
         Charlie Webb
         Bob Denny
         Jerry Slaymaker
         Don Worley
         Carolyn Chamblee
         Bruce Almlch
         Bob Lewis
         Ernie Watson
         M1ke Stein
         Denny Daniel
         Dwlght Rodgers

-------
         Roles of Organization  1n LAN  Implementation  and Support


NDPD/AMPB

   Don Worley:
          Coordinate LAN requests with AOPOHB

        Unisys
          Define Acceptable Class of Service (ACS)  for  LANs
          Develop long-range plans for LAN support  of the Agency telecom-
             munications system
          Develop 1nter-LAN backbone architectural  plans
          Provide review and approval  for LANs not  meeting the  Accepted
             Class of Service (ACS) under TSRs

   Carolyn Chamblee:
          Develop proposed policies, standards, and guidelines
          Conduct pilot studies as appropriate
          Continue technology assessment 1n this arena
          Develop guidance documents
          Develop Agencywlde contracts to cover LAN technology
          Provide consultation to other groups as needed

NDPD/ADPOMB

   Bruce Almlch
          Review all LAN TSRs with regard to facility wiring and connectivity,
              Identification of a LAN Administrator, and the  configuration
              1ayout
          Coordinates Washington LAN TSRs with the WIC
          Responding to telecommunications requests to connect  LANs to
              other Agency  resources
          Coordinating NDPD resources needed for any LAN Installations
          Develop and manage TSR process for LANs
          Manage the distribution  and testing of the network operating
              system.

         Unisys
          Troubleshooting  network  and telecommunications.problems with LANs
          Court  of  last resort for network wiring  (not applications) problem
              resolution
          Provide operating system support to  Include menu development,
              software distribution, testing of new releases  of the network
              operating  system with notification to LAN Administrators that
              they should upgrade their  operating system copies, and supporting
           "   older  versions of the operating system  for a period not to

-------
             exceed six months after notification to LAN Administrators to
             upgrade.
          Respond to LAN Administrator questions regarding LAN software
             problems

NDPD/PMSB

   Bob Lewis
          Provide training function utilizing SMA contract.  Information
             Centers, Unisys, and/or other sources
     Unisys
          Provide management, scheduling, registration, and  evaluation for
             courses offered centrally
          Provide the user support function for non-telecommunications
             problems specifically Including the micro to mainframe communi-
             cations area
          Direct Incoming LAN Administrator questions  and problems to
             Network Support Group and/or Telecommunications for  resolution

   Ernie Watson
          Provide Project Officer for LAN contract  who will  coordinate all
             procurement Issues with PCMD and SMA,  serve as  management
             Hason for the contract, set priorities,  conduct quality
             assurance reviews, develop contracting procedures, develop
             communications with the LAN Administrators as  a group, and
             oversee all aspects of the contract

NDPD/ICB - Each Information Center's Staff

          Provide application support for Lotus, dBASE, etc., as  1s currently
             done for standalone PCs
          Provide the LAN Administrator services for  organizations on a
             cost basis as documented and approved  1n the Operation Service
             Agreement (OSA)

NDPD/ICB/HIC

   Hike Stein
          Principal point of contact for LANs 1n Washington, DC

   Denny Daniel
          Provide application support for Lotus,  dBASE, etc. In Washington,
             DC as  Is currently done for standalone PCs
          Provide the LAN Administrator resources  for Washington, DC organizations
             on a cost basis as documented and approved 1n  the Operation
             Service Agreement  (OSA)

   Dwlght Rogers
         .Review all Washington, DC LAN TSRs with  regard  to facility wiring
             and connectivity,  Identification of  a LAN Administrator, and
             the configuration  layout.

-------
  Coordinates  Washington LAN TSRs with NDPD 1n Research Triangle
     Park  as required
  Responding to Washington, DC telecommunications requests to
     connect LANs  to other Agency resources
  Coordinating NDPO resources needed for any Washington, DC LAN
     Installations
  Develop  and  manage the Washington, DC TSR process for LANS In
     concert with  the  national NOPD TSR process
Unisys
     Troubleshooting Washington, DC network and telecommunications
        problems with  LANs

-------
From a User's Viewpoint:

1.  If a user organization wants  a LAN but does not know how to begin their
    plan, whom do they call?

    There are several  points  of contact for users needing Information and
    assistance.  The local Information centers are good resources.  Also,
    Bryon Griffith of OIRM, NCC Telecommunications, Dan Johnston of SMA,
    Ernie Watson, Carolyn Chamblee 1n AMPB, etc. are all able to provide the
    users Initial Information.  NDPO Is requiring a TSR for each LAN.  A good
    starting point would  be to complete the TSR outlining briefly what your
    Interests and requesting  support.  The TSR would go through NDPO TSR
    processing procedures and support would be provided.  One outcome of the
    TSR process may be to recommend that  the user organization contract with
    SMA to provide planning and design services.

2.  If a national program office  1s planning to provide or require LAN systems
    1n the Regional Offices,  who  should they contact (other than the Regional
    Office ADP Coordinator) to coordinate the planning?

    The National Program Project  Manager  should coordinate with Bryon Griffith
    in OIRM and and the Regional  ADP Branch Chief.  LAN TSRs'must be submitted
    to NDPD regarding these LANs.

3.  Who does a user call  for  support?

    The user must always contact  the local LAN Administrator for help.  The
    LAN Administrator may resolve the problem, refer the user to the Information
    Center when applicable, contact NCC User Support at FTS 629-7862 or
    Telecommunlcatons at FTS  629-4506 to  request LAN support.  NCC User
    Support will register the call  and contact the Systems Support Group
    or Telecommunications Support to resolve the problem.

4.  Who does a LAN Administrator  call for support?

    The LAN Administrator calls NCC User  Support who will register the call
    and then contact the Network  Support  Group  (Steve  Stoneman) or Telecommuni-
    cations Support to resolve the  problem.  LAN Administrators can also call
    Telecommunications Support at FTS 629-4506 for support.  If the LAN
    Administrator Is 1n Washington, the call will be forwarded to WIC Telecom-
    munications when appropriate.

5.  Can user organizations contact  SNA directly for help  in planning and/or.
    resolving problems?

    User organizations can contact  SMA directly for help  1n planning.  For
    problems, users should work  through their LAN Administrator.  The LAN
    Administrator will contact NDPD on  problems that can  not be solved at the
    local level.

-------
6.  How much time Mill the LAN Administration duties require?

    The following 1s  our estimate of the manpower required for the Installation
    and ongoing  operation.  The time shown 1s based on the LAN Administrator
    Installing cards  1n PC to be connected, as well as the servers.  If
    multiple people are available, the calendar time will be less.  Note that
    after Installation, the time will not generally Involve e fixed number of
    hours each week.  When problems occur, the LAN Administrator may need to
    devote full  time  until the problem 1s resolved.  Also, these numbers do
    not Include  the time required to develop applications for users or to
    provide user support for applications.  These numbers may be revised
    after more experience 1s gained with the technology.  During Installation,
    the LAN Administrator must be available on a full-time basis.


                 ESTIMATE OF MANPOWER FOR LAN ADMINISTRATORS

              Nodes     Installation   1st 3 months   Ongoing
                         (manweeks)	(%)	(%)
<10
10-25
25-100
100+
2
3
3-12
12 .
35-50
50-75
50-100
100
10
50.
50-100
100

-------
    APPENDIX K - PHONE NUMBERS FOR LAN
                                  ADMINISTRATORS
SOURCE
CONTACT
FTS
COMMERCIAL
ORDERING QUESTIONS, ACQUIRING SERVICES, & TRAINING
    SMA                                    919/544-6311 (NC)
                                            800/356-7813
PRINCIPAL POINT OF CONTACT
    National    Bruce Almich
    HQ       Mike Stein
                    629-3306    919/541-3306
                    202/488-5981
CONTRACT PROBLEMS
    Ernie Watson
                    629-2143    919/541-2143
LAN SUPPORT & TROUBLESHOOTING:
    National    User Support
              LANSYS
    HQ       WIC
                    629-7862    919/541-7862
                    629-2804    919/541-2804
                    202/488-5900
TELECOMMUNICATIONS!
 Initiatives
    National    Bruce Almich
    HQ       Dwight Rodgers
 Problems
    TELECOM
                    629-3306    919/541-3306
                    202/382-2075

                    629-4506    919/541-4506
NON-'ACCEPTED CLASS OF SERVICE" LANS:
    Carolyn Chamblee                 629-2553
                              919/541-2553

-------