Personal Computer User Manual
Table Of Contents
- Safety Instructions
- Preface
- Getting Started
- PowerEdge Cluster Components
- Minimum System Requirements
- Basic Installation Procedure
- Adding Peripherals Required for Clustering
- Setting Up the Cluster Hardware
- Cabling the Cluster Hardware
- Updating System BIOS/Firmware for Clustering
- Setting Up the Shared Storage Subsystem Hard-Disk...
- Setting Up the Internal SCSI Hard-Disk Drives
- Installing and Configuring Windows NT Server Enter...
- Installing and Configuring the Microsoft Cluster S...
- Installing PowerEdge Cluster Applications
- Checking the System
- Cabling the Cluster Hardware
- Configuring the Cluster Software
- Low-Level Software Configuration
- High-Level Software Configuration
- Installing Intel LANDesk® Server Manager
- Choosing a Domain Model
- Static IP Addresses
- IPs and Subnet Masks
- Configuring Separate Networks on a Cluster
- Changing the IP Address of a Cluster Node
- Naming and Formatting Shared Drives
- Driver for the RAID Controller
- Updating the NIC Driver
- Adjusting the Paging File Size and Registry Sizes...
- Verifying the Cluster Functionality
- Uninstalling Microsoft Cluster Server
- Removing a Node From a Cluster
- Setting Up the Quorum Resource
- Using the ftdisk Driver
- Cluster RAID Controller Functionality
- Running Applications on a Cluster
- Troubleshooting
- Upgrading to a Cluster Configuration
- Stand-Alone and Rack Configurations
- Cluster Data Sheet
- PowerEdge Cluster Configuration Matrix
- Regulatory Compliance
- Safety Information for Technicians
- Warranties and Return Policy
- Index

Index 1
Index
A
Apex switch cabling, 2-7
applications
setting up to run on a cluster, 4-1
audience level, ix
B
basic input/output system. See BIOS
BIOS
disabling on a RAID controller, 3-2
C
cabling
disconnecting SCSI cables, 2-7
mouse, keyboard, and monitor, 2-7
NIC, 2-5
SDS 100 storage systems, 2-1, 2-3, 2-4
SMB, 2-5
cautions, x
chapter summaries, ix
chkdsk /f
running on a quorum disk, 4-5
cluster
cabling, 2-1
checking the functionality, 3-5
components, 1-1
cluster (continued)
configuring the software, 3-1
running applications on, 4-1
troubleshooting, 5-1
verifying network communications, 3-6
cluster layout, 1-2
cluster node
adding peripherals, 1-4
back view, 1-5
changing the IP address, 3-4
removing from cluster, 3-7
cluster resources
verifying availability, 3-7
cluster service
verifying operation, 3-7
cluster software
high-level configuration, 3-3
low-level configuration, 3-1
conventions used in text, xi
D
domain
choosing for the cluster, 3-3
verifying operation, 3-6
drive letters
assigning to shared drives, 3-4










