Lenovo ThinkPad 380ED TP 380Z On-line User's Guide that was provided with the - Page 131
Remote Program Load (RPL), Tivoli LCF Lightweight Client Framework
View all Lenovo ThinkPad 380ED manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 131 highlights
DMI BIOS Specification documents the standards for accessing this BIOS information. Tivoli LCF (Lightweight Client Framework) To install Tivoli LCF, double-click on System Management and follow the instructions on the screen. Remote Program Load (RPL) The remote program load (RPL) enables a network administrator to remotely control your computer. RPL enables your computer to start directly from a server over a LAN that has been configured for RPL. Network-management software, such as IBM LANClient Control Manager (LCCM), is required to take advantage of RPL. If you use RPL with LCCM software, you can use the Hybrid RPL feature. With Hybrid RPL you install hybrid images (or files) on the hard disk. Each time the computer starts from the network, LCCM recognizes your computer as a Hybrid RPL client, and a bootstrap program is downloaded to your computer. This bootstrap program is small and helps prevent network congestion. Working from the hybrid images, the bootstrap program starts the startup process from the hard disk drive of your computer. One of the advantages of Hybrid RPL is that the network load associated with standard RPL is avoided. | Note: You can use RPL or PXE (sometimes it is called DHCP) with | the ThinkPad port replicator with advanced EtherJet function, | the option of the ThinkPad computer. If your computer is | attached to the ThinkPad port replicator with advanced | EtherJet function and you want to use RPL or PXE, you need | to set up PXE or RPL by using a Advanced EtherJet Feature | flash utility diskette that is supplied with the ThinkPad port | replicator with advanced EtherJet function. 4 DMI is a standard defined by the Desktop Management Task Force (DMTF) for gathering information about the hardware and software in your computer so that network administrators can remotely monitor and control it. Chapter 7. Using System Management 127