Browse Prior Art Database

Dynamic Detection and Recovery of Errors during Installation and Configuration

IP.com Disclosure Number: IPCOM000112677D
Original Publication Date: 1994-Jun-01
Included in the Prior Art Database: 2005-Mar-27
Document File: 2 page(s) / 56K

Publishing Venue

IBM

Related People

Anand, VK: AUTHOR

Abstract

When users configure a product, the installation program does not check whether their customized configuration will work. Usually, if a product has a limitation to its resource configuration, it supplies a formula to find out whether the requested configuration is within workable limits. If the configuration program does not use this intelligence and detect an error during configuration, users waste a lot of time because they can detect this problem only during execution of the program or during initialization time whenever this constraint shows up. Then they have to reconfigure and start again.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Dynamic Detection and Recovery of Errors during Installation and
Configuration

      When users configure a product, the installation program does
not check whether their customized configuration will work.  Usually,
if a product has a limitation to its resource configuration, it
supplies a formula to find out whether the requested configuration is
within workable limits.  If the configuration program does not use
this intelligence and detect an error during configuration, users
waste a lot of time because they can detect this problem only during
execution of the program or during initialization time whenever this
constraint shows up.  Then they have to reconfigure and start again.

      The solution to this problem is to help users detect this
constraint during configuration itself.  The Installation and
Configuration program should do the following:

o   Make the calculations for users at the time of the configuration.

o   Correct the calculations based on the given factors.

o   Inform users that their configuration is not within configurable
    limits.

o   Inform users what values the installation and configuration
    program changed to make it work.

      A good example is IBM NetBIOS (NETBEUI) protocol stack
configuration.  Netbeui protocol stack has resource constraint.  All
the configurable resources except Sessions for Netbeui protocol stack
must fit within a 64K data segment.  And NetBIOS has a RAM usage
table (described in LAN Adapter...