Browse Prior Art Database

Schema for Incorporating Workstation Shadows for Network Installation

IP.com Disclosure Number: IPCOM000115995D
Original Publication Date: 1995-Jul-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 2 page(s) / 67K

Publishing Venue

IBM

Related People

Bunce, JL: AUTHOR [+3]

Abstract

Disclosed is a schema in which a network installation program can use workstation shadows outside of an install plan and how they can be migrated to an install plan. The burdens on network administrators have been rapidly growing in volume and complexity. Chief among them is the need for administrators to easily plan and execute the installation and configuration of software products on a group of workstations on a LAN. This schema for incorporating shadows of workstation objects can be used with any network planning, installation, and configuration program.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Schema for Incorporating Workstation Shadows for Network Installation

      Disclosed is a schema in which a network installation program
can use workstation shadows outside of an install plan and how they
can be migrated to an install plan.  The burdens on network
administrators have been rapidly growing in volume and complexity.
Chief among them is the need for administrators to easily plan and
execute the installation and configuration of software products on a
group of workstations on a LAN.  This schema for incorporating
shadows of workstation objects can be used with any network planning,
installation, and configuration program.

      Any network installation program will need objects to represent
workstations and groups of workstations.  Often times a workstation
will need to exist in two groups.  For example, a workstation may
belong to department X and also to an engineering team which needs
the same configuration as other engineering workstations.

      All the features of shadows would be exploited to allow
workstation objects with the same name exist in different groups that
would have otherwise required unique names across all groups.  These
features would include:
  1.  if a shadow gets deleted, the original does not;
  2.  if a shadow or the original gets modified, all shadows of the
       original get modified;
  3.  if an original gets deleted, all its shadows do too; and
  4.  an original object and its shadow cannot exist in the same
       container (the same rule holds true for two shadows from the
       same original object in the same container).

      A network installation program a...