You are on page 1of 5

VREPAIR.

NLM: What to do when your server asks you


for a name
You will need to run the Vrepair.nlm, when your Novell server boots and does not know
its name or you are unable to access a volume that was previously available. If you get
an error that a drive has been deactivated, you will have to reboot (power off and on) the
server and any external chassis to re-start the drive. If you continue to get an error
stating a drive is unavailable, you may have a physical problem with a harddrive or
harddrive controller which will need to be repaired before you can continue. Vrepair fixes
errors causes by improperly shutting down the system or because the has a corrupted
error file. Vrepair is designed to fix problems with Novells FAT and directory entries that
were not updated from the memory cache when someone shuts down the server without
Downing it first or a power failure causes the server to be shut down. It can also be set
to purge files when the error file becomes unusable.
To run Vrepair and repair a volume follow this procedure. If the server boots ok but does
not mount a volume other then SYS, skip to step three:

1. The server will most likely come up and prompt you for a server name. Type in ANY
name, at least 2 characters, because it is only TEMPORARY.

2. You will now be prompted for a network number. Here also use any 2 character
number, it is only TEMPORARY.

3. Now you should be returned to a Colon prompt ( : ). At this prompt you will need to
load the VRepair program. If you do not have a colon prompt, change to the Console
screen by executing a Ctrl-Esc and entering the number to choose the Console screen.
To do this there are 2 methods. A) Type LOAD C:VREPAIR or try LOAD VREPAIR. B)
IF this does not work then you will have to backtrack by DOWNING the server to enable
you to go to the hard-drive to do a directory to find the VREPAIR.NLM file. If it STILL can
not be found then you will need to instruct the customer to find their copy of Novell
software so VREPAIR.NLM can be loaded from the disk or copied the Novell startup
directory on the C: drive of the server. If indeed you do need to extract the program from
disk then redo steps #1 and #2 then at step number 3 at the colon prompt type in the
following, LOAD A:VREPAIR. NOTE: If you are dealing with Novell 3.12 then the
VREPAIR.NLM utility will be on System disk #1. If you are dealing with Novell 3.11 then
the VREPAIR.NLM utility will be on System disk #2.

4. If all the above steps were followed then at this point the customer will have the
VREPAIR menu in front of them. Select option number 1, repair volume. Note: If you
were unable to mount SYS because of a corrupted file (invalid deleted file) then you will
need to go to options and set Vrepair to Purge deleted files.
5. When it stops on its first error, select F1 for change options.

6. Select the option to NOT pause on each error.

7. Now select the option to continue.

8. When finished VREPAIR will prompt the option to write errors to disk, answer "YES".
Note: You MUST answer " YES " to correct your problems, if you do not then the utility
will not repair the needed volume.

9. Return to step #4a to re-run VREPAIR and continue through as previous. Run
VRepair multiple times until it returns without ANY errors. If you get an error that you
have run out of memory, continue with Vrepair. This message will clear and eventually
you will get no errors.

10. When Vrepair reports no errors, select exit the VREPAIR menu.

11. Down the server and Exit to c:\server.312

12. Reboot the server. You can power it off and then on again or type SERVER from
c:\server.312. It will now come up normally with the correct name and mount all volumes.

Using the ping command


The Internet Ping command bounces a small packet off a domain or IP
address to test network communications, and then tells how long the
packet took to make the round trip. The Ping command is one of the
most commonly used utilities on the Internet by both people and
automated programs for conducting the most basic network test: can
your computer reach another computer on the network, and if so how
long does it take?
If you are having connectivity problems, you can use the ping command to check the
destination IP address you want to reach and record the results. The pingcommand
displays whether the destination responded and how long it took to receive a reply. If
there is an error in the delivery to the destination, the pingcommand displays an error
message.

You can use the ping command to:

• Ping your computer (by address, not host name) to determine that TCP/IP is
functioning. (Pinging your computer does not verify that your network adapter is
functioning.)

• Ping the local router to determine whether the router is running.

• Ping beyond your local router.


The following table shows some useful ping command options.

-n Count

Determines the number of echo requests to send. The default is 4 requests.

-w Timeout

Enables you to adjust the time-out (in milliseconds). The default is 1,000 (a 1-second
time-out).

-l Size

Enables you to adjust the size of the ping packet. The default size is 32 bytes.

-f

Sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows
fragmentation.

The following example illustrates how to send two pings, each 1,450 bytes in size, to IP
address 131.107.8.1:

C:\>ping -n 2 -l 1450 131.107.8.1


Pinging 131.107.8.1 with 1450 bytes of data:

Reply from 131.107.8.1: bytes=1450 time<10ms TTL=32


Reply from 131.107.8.1: bytes=1450 time<10ms TTL=32

Ping statistics for 131.107.8.1:


Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate roundtrip times in milliseconds:
Minimum = 0ms, Maximum = 10ms, Average = 2ms

By default, ping waits 4,000 milliseconds (4 seconds) for each response to be returned
before displaying the "Request Timed Out" message. If the remote system being pinged
is across a high-delay link, such as a satellite link, responses may take longer to be
returned. You can use the -w (wait) option to specify a longer time-out.

To check connectivity by using the ping command, at the command prompt,


type ping and the IP address you want to reach.

A response of "Destination net unreachable" means there was no route to the destination.
You need to check the routing table on the router listed in the "Reply from" address in
the "Destination net unreachable" message.
A response of "Request timed out" means that there was no response to the ping in the
default time period (1 second). You can check for the following:

• A router is down.

To check the routers in the path between the source and the destination, use
the tracert command. For more information, see Using the tracert command.

• The destination host is down.

Physically verify that the host is running or check connectivity through another
protocol.

• There is no route back to your computer.

If the host is running, you can check for a return route by viewing the default
gateway and local routing table on the destination host.

• The latency of the response is more than one second.

Use the -w option on the ping command to increase the time-out. For example,
to allow responses within 5 seconds, use ping -w 5000.

Task Manager Overview


Task Manager provides information about programs and processes running on your
computer. It also displays the most commonly used performance measures for processes.
You can use Task Manager to monitor key indicators of your computer's performance.
You can see the status of the programs that are running and end programs that have
stopped responding. You can also assess the activity of running processes using as many
as fifteen parameters, and see graphs and data on CPU and memory usage.
In addition, if you are connected to a network, you can view network status and see how
your network is functioning.
If you have more than one user connected to your computer, you can see who is
connected, what they are working on, and you can send them a message.
Click one of the following for more information:
Programs that are running
The Applications tab shows the status of the programs running on your computer.
On this tab, you can end, switch to, or start a program.
• Update Task Manager data
• End a program with Task Manager
• Start a new program
• Switch to another program
• Networking fields overview
Processes that are running
The Processes tab shows information about the processes running on your computer.
For example, you can display information on CPU and memory usage, page faults, handle
count, and a number of other parameters.
• Assign a process to a processor
• Change the priority of a running program
• End a process with Task Manager
• Process counter column headings
• Sort the list of processes
• Specify process counter column headings
Performance measures
The Performance tab displays a dynamic overview of your computer's performance,
including:
Graphs for CPU and memory usage.
Totals, in kilobytes, for physical, kernel, and commit memory.
Totals for the number of handles, threads, and processes running on your computer.
• Update Task Manager data
• Change display options in Task Manager
• View your computer's performance
• Performance fields overview
• Process counter column headings
Viewing Network performance
The Networking tab displays a graphical representation of network performance. It
provides a simple, qualitative indicator that shows the status of the network(s) that are
running on your computer. The Networking tab is displayed only if a network card is
present.
On this tab, you can view the quality and availability of your network connection, whether
you are connected to one or more than one network.
• Networking fields overview
• View network connections
Monitoring Sessions
The Users tab displays users who can access this computer, and session status and
names. Client Name specifies the name of the client computer using the session, if
applicable. Session provides a name for you to use to perform such tasks as sending
another user a message or connecting to another users session.
the Users tab is displayed only if the computer you are working on has Fast User
Switching enabled, and is a member of a workgroup or is a standalone computer.
The Userstab is unavailable on computers that are members of a network domain.
• Users fields overview
• View user activity

database applications that are good candidates for upsizing to client server
are those whose database access consists of requesting subsets or summary
information from large tables.

You might also like