System information

48
AS/400 IBM Network Station: Techniques for Deployment in a WAN
In Table 9, the Network Stations are all chained to a single cable port. For
the 6180 adapter, faster times can be obtained if the Network Stations are
balanced across cable ports, with half on ports 0 through 3 and the other
half on ports 4 through 7. For example, in Table 10 on page 49, six
Network Stations with an 8K TFTP block size, without subnet broadcast,
booted in 157 seconds. If they were balanced, three on port 0 and two on
port 4, the initialization time would be 130 seconds or 17% faster.
If a Network Station has multiple paths, with the same network address, to
an AS/400 (such as, two IOPs that each have a path to the Network
Station), unexpected results can occur. Whenever the AS/400 server gets
a request from a Network Station, it uses the default path to get back to
the requesting Network Station. The return route (and any subsequent
request or replies) can be different from the original request. This implies
that there is no value to add a second IOP with the same network address
to gain additional TFTP performance.
TFTP jobs are assigned on a first come, first serve basis. There is no
mechanism to allocate a TFTP job to a particular IOP. This implies that it is
possible for Network Stations attached to one network to monopolize all
the TFTP jobs until completion of the kernel download. Other IBM Network
Stations can starve until a TFTP job is available.
3. Login
Login is just that, users enters their user ID and password and then the
desktop appears.
The load times can be found in the Table 10 on page 49.
4. Application Load
Applications are loaded when their respective desktop buttons are
selected. Load times vary by AS/400 machines size.
Getting to a 5250 sign-on display can require two steps:
a. From the menu bar, select the
5250
button to get to the host name
window.
Notice that subnet broadcast uses less AS/400 CPU. However, as
discussed previously, each twinax device on the subnet gets their own
copy of the broadcast data, even if they did not request it, which would
mean unwanted data on the twinax cable. In general, you should not use
twinax subnet broadcast. Subnet broadcast should be used on LANs.
Note