Network 1 GB be enough?

Hello

We have an implementation of 5 ESXi servers with an iSCSI SAN (DELL EQUALLOGIC PS 6220). No vCenter. 80 physical machines will be converted to virtual machines.

There are 4 x 1 GB network adapters available for each of these 5 servers. The design of this vmware network configuration is attached to this message. The storage is connected using binding (alternate configuration) iscsi ports.

In vSwitch0, we have 2 network cards used for VMtraffic and network management. In vSwitch1, we have 2 network adapters used for iSCSI traffic only.

My question would be on the use of the network of these servers. Will be 1 GB NIC suffice for a host with 20 VM? Will there be any tightening of performance?

If necessary, we can allow frames. Please suggest.

Kind regards

Nithin

Don't know if these cards 1gbit network is for you, depends on your load of VMs. But from the point of view of security, it is not a good idea to put management-port and the virtual machines on the same switch. If any computer virtual got compromised, it could be used to attack against ESXi. In my humble OPINION management port should be completely separated from virtual machines.

Personally, I would use vSwitch0 for management and iscsi2/3 and vSwitch1 only to the VMs. depending on the traffic, you can later move a NIC to vswitch0 vswitch1 or vice versa...

Tags: VMware

Similar Questions

  • Desktop\SharedDocs is not accessible. You are not allowed to use this network resource. Not enough server storage is available to process this command.

    \\XXXDesktop\SharedDocs is not accessible. You are not allowed to use this network resource. Contact the administrator of this server to find out if you have the permission to access. Not enough server storage is available to process this command.
    I got the above message when I tried to access my room servert pc (XP Pro with Service Pack 3) from another pc Client (XP Home Edition with service pack 3) on a network share. I see all class document & readers who share in my network places on both PCs.
    There is no problem when I have access to XP Home Edition of XP Pro. I heard the pc installed with Acronis True Image to give to this question. But my two PCs are installed with it. Any solution.
    What I've tried so far on my pc (XP Pro):
    1. click on start, run, type regedit, and then click OK.
    2. Locate and double-click the following registry subkey:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa
    3. on the right side, double-click restrictanonymous setting.
    4. make sure that that the value in the value data box is set to 0, and then click OK_ (why the default value is 0. I change it to 1, but always the same)
    5. close the registry editor.
    6. restart the computer.
    I also tried to enable the allow anonymous enumeration of SAM accounts and shares on XP Pro (default value is Disable).
    File and printer sharing exception is enabled in firewall. Don't have a firewall part 3

    The two guest account are capable of Simple file sharing in XP Pro box checked also checked.

    Hello

    Please visit the following link.

    http://answers.Microsoft.com/en-us/Windows/Forum/windows_xp-networking/three-computers-networked-fine-then-suddenly-the/3976b554-bb9c-4920-881f-38eb64480ca7

  • Network access error: not enough server storage is available to process this command

    Hello
    I can't access the other computers on my network neighborhood.
    If I try to use \\computer\d$ running, I get "not enough server storage is available to process this command."

    I look in the case of newspapers and I have an error: "{the browser service has failed retrieve the backup list too many times on transport \Device\NetBT_Tcpip_{97851F92-8FAC-4FB2-A6C9-CAB1B0FE6593}." The secondary Explorer stops. »

    I enjoyed all the ideas. I hope I don't have to reinstall the system (Windows Vista Business 32 bit)

    Dan

    I'm glad that you got this sorting. You were one of the rare cases where there was not enough space on a hard drive. Generally, the "not enough space" is misleading. In all cases, it is good to know things work now. Thank you for taking the time to let us know. MS - MVP - Elephant Boy computers - don't panic!

  • What happens if Ipconfig enough to receive media disconnected do we still need to do ipconfig / renew

    What happens if Ipconfig enough to receive media disconnected do we still need to do ipconfig / renew

    Before using the ipconfig release command, make sure that you note down the old IP address.

    Yes, it is important and necessary to use the command ipconfig / renew to request a new IP address. Where a computer is connected to the network.

    ipconfig enough runs to force the client to immediately renounce its lease by sending the server a DHCP release notification updates the status information from the server, which marks the old customer IP address "as available."

    Hope this will help you.

  • Instructions for managing macs w ARD on the internet (no static IP address)

    Please excuse me if it's asked all the time, but I searched and can not find detailed instructions for this.

    I need to manage more than one Mac, on connections to the internet, the devices will not be on the static IP, they will constantly be moving around.

    All the videos I have found online seem to show how to connect and manage Macs on LANs w ARD.

    Details:

    ARD v3.8

    All Mac on El Capitan

    Very appreciated for any help!

    This question is not particularly related to Apple Remote Desktop; for ARD.  This is a configuration of generic firewall and networking question, so good enough instructions for your specific firewall will work here, as long as the firewall can redirect ports - port TCP 5900, in this case - or if your particular firewall has a VPN - Firewall Server average range and high-end frequently - or if you can implement a VPN server behind your firewall and configure the firewall to forward the VPN protocols (different ports) and ports necessary for the particular VPN.

    In general...  I would suggest three ways...   1: set up your firewall to port before port TCP 5900 to the client target.   Maybe TCP 5988.   Or set up a VPN server in your firewall and connect to that and use ARD via a VPN.    If you want to access more than one system on the target network, you will need to either use a range of ports to forward to specific systems behind your firewall and happens to be a problem with many customers - I don't know immediately off-hand if the ARD client allows even to select different target ports - or to set up and move to a VPN.    2: creation and configuration of the VPN server in the firewall allows access to all systems on your network target - a VPN connection makes your local system as it is directly connected to the target network.  3: If you have the VPN server running on a target system and accessible through the firewall port forwarding, this target system must always be available, and all VPN traffic is routed through this system.   It is more complex and can also be a bit difficult to set up.

    If you directly expose ARD ports to the Internet via port forwarding, you'll want to either restrict the available source IP ports (to reduce the magnitude of the attackers), and you'll want to be very careful about passwords on target systems.   Ports of the ARD are detected very fluent, and several people and botnets will attempt to access the system password-baited; trying to guess the users and passwords on the target system.   Once attackers have a login and a password, they will then try to spread throughout the rest of the network.  (It's part of why I prefer to use virtual private networks).

    Sierra of MacOS support PPTP VPN, so I wouldn't go with any configuration of VPN that you considered it.   I'd probably use L2TP/IPsec, because the customer is generally available in most of the other operating systems, Mac OS and iOS.

    There is information available on the network ports used by Apple devices.   If you enable VPN port forwarding, there are discussions on the ports and protocols required to according to VPN you use posted around the ' net and not all firewalls is particularly good to port-forwarding, the protocols and ports VPN. "  Low-end older firewalls and firewalls tend to have problems here.

    To locate on the networks of the target systems, you get to use dynamic DNS from client devices or other means to identify the public IP address that is associated with the target customer.   If customers are roaming on disparate networks and not simply roaming IP addresses on their private networks (these addresses can be fixed through DHCP configurations, too) and if you don't have access to intermediate firewalls, then you will probably have to rethink the entire approach, unfortunately.    Connection to mobile systems distance arbitrary is not especially it is possible, he must do something on the client that "tags" or "ad" its network metadata to your own server from tracking client or server monitoring of some other entity (for example messages to the DNS servers used by the dynamic DNS providers), or the management connection must be initiated from the client.    ARD does not support these mechanisms.   Discussions here can get pretty complex, too--in terms of network configuration, both in terms of security for the clients and servers.

    There are a few related discussions this general topic in the forums. See here, here, here, here or here.

  • Time Capsule, I get an error message

    iMac mid 2011, OSX El Capitan 10.11.6

    My Time Machine icon is grayed out in the menu bar. If I go in the preferences of M T I find T M turned OFF.

    I switch on, then select 'xxx airport Time Capsule. "

    Then this message comes after I entered the password.

    "There was a problem connecting to the server 'xxx airport Time Capsule'."

    How can I locate the problem please?

    Your iMac should be connected directly to the Treasury Board by ethernet (best method), or it must connect to its wireless.

    Having just the TC on the network is not good enough. The operating system won't be able to find it.

    Always had problems because you actually meet the above conditions.

    Reset the factory TC.

    Universal factory reset

    Turning off the TC... That is, remove the power supply cord or the power at the wall outlet, wait 10 seconds... Hold the reset button... be nice... Turn on always even now in reset... and keep holding in for another 10 seconds. You may need assistance because it is difficult to hold in reset and power on. It will show the success quickly flashing led front. Release reset... and wait a few minutes for the TC to reset and return with the factory settings. If the front LED flashes quickly you missed and simply try again. The reset is quite fragile in these... Press the key while it is just click away and not more... I've seen people bend lever or even break. I use a toothpick as a tool.

    NB. None of your files on the hard drive of the TC are removed... This simply clears the settings of the router of the TC.

    The installer the TC.

    Then redo the configuration of the computer that you want to use for TM using Airport utility.

    1. the use of very short names... NO APPLE RECOMMENDED names. Without the space and pure alphanumeric characters.

    for example TCgen5 for the base station and the name of the TCwifi wireless.

    If the wireless is still an issue defined wireless names like TC24ghz and assigned the 5 GHz other name... for example. TC5ghz

    2. use all passwords also consistent with 1. but maybe a little longer. IE 8 and 20 characters of mixed cases and numbers... no alphanumeric non-caracteres.

    ** 3. If the TC is router, you can ignore this point. It is only a problem when the TC is bridged.

    If ensure that the TC is always the same IP address... you will need to do this on the main router using a dhcp reservation... or a bit more complex setup by using the static IP address in the TC.

    Ignore this point if you don't understand it... after the return if you drop questions.

    4. be sure that IPv6 is set correctly in the computer. IE link-local only for ethernet or wireless depending on whether you are using. Car is not good enough.

  • HP 7680 connection to a wireless - out

    I have a printer all-in-one of HP7680 for about 9 months. Through this time, I tried various methods to connect the printer to our home wireless network. Each approach works with manual intervention - no solution has worked reliably. We only print or use the printer on a daily basis, but more than occasionally. The main problem we have is that the printer will work for a day or two, then when you want to print something 2 days later, the printer does not respond. A restart of the printer or the client device network he wakes up enough for this print job.

    Here are the configurations that we tried

    Approach 1 - network - adapter Linksys game client

    Connect to HP printer via ethernet to a wireless client port. Although this configuration has worked for installation and configuration, it would stop working after a few days. I played with different settings of the adapter Linksys game like having a static or dynamic IP address. It did not matter. We could send print jobs to it, but then after a few days - it would interrupt work - time to restart the adapter - which has sometimes worked. Other times, should be a reboot of the printer as well.

    Approach 2 - Airport Express customer

    Connect the HP printer via the USB interface on Airport Express client. Customer Express airport would recognize the printer, we could print to it, everything seemed good. Then, after a few hours of non-use of the printer, the Airport Express stops recognizing the printer. Same situation - restart / re - connect the printer on the client - then it works again.

    Has anyone found a configuration with a wireless client card that will work more than a day or two? It seems to me, that change must occur in the configuration of the HP printer, but I didn't know what it is.

    Any thoughts would be appreciated.

    Thank you

    James

    Well, maybe this isn't for you but I have 2 of them in my office and one to my girlfriend the other side of the House.

    I have 3 wireless routers that I use (1 as a router) and the other two as Access Points.

    I have office my wife, connected to a wireless router from Buffalo (acting as an AP) only because she has a few ethernet devices in his office.  Mine is connected to a Linksys router.

    As long as I don't do print... No problem... Still got no scan running via IP again.

    I use static IP addresses on my printers.

    Lt

  • (End 2007-leopard) IMac for macbook pro (end of 2014)

    I want to connect my imac (late 2007-leopard) for my macbook pro (yosemite end of 2014) in order to use the screen of I have mac because the macbook screen. Is this possible?

    No, not directly. Target display mode requires an iMac 2009 or newer to run. It will not work with an iMac 2007.

    Use your iMac as a display with the target - Apple Support Display Mode

    You might be able to use a software like ScreenRecycler, but there may be lag if your network is not fast enough.

    https://www.screenrecycler.com/ScreenRecycler.html

  • U410 - Wireless worsening performance - requires a reboot for operation

    Hi all

    I recently bought a U410 and I, like many others, am having problems with wireless connectivity. When I got to the laptop, I rarely had no problem with her. However, it slowly deteriorates and the possibility to connect to different networks is getting worse. More I cannot connect or have frequent dropouts.

    The real question, however, is that to be able to connect to a network once again, that I need to do a full reboot. Disabling the network card is not enough, or running the Windows 8 troubleshooting tools. It is incredibly frustrating to have to completely restart to get back online and lose my place in the browsers/documents/etc. Does anyone else know similar problems?

    I tried to contact Lenovo about a refund for my U410, but apparently the window of eligibility has spent two weeks and they refuse to make an exception. Needless to say that after years and years of Lenovo computers this will probably be my last, because performance is so much cheaper as I expect them...

    Thank you

    B


  • Hierarchical queries for subnets

    I need to write a hierarchical query for quite a number of (contiguous groups of IP addresses) IP subnets. What I'm hoping to do, is let the database do the bulk of the work here and I will not need to write code to do this. I'll do that if I have to but I would really rather not.

    General information may be in order for those who do not know subnets. IP subnets have unique characteristics, based on network management standards (caveat: I'm not a guru/subnet on the network, but I know enough to be dangerous). The first thing to know is that a subnet is a contiguous block of IP addresses that help define the IP network protocol. Another thing is that an IP address can be converted to a binary or decimal/numeric value. This is useful because it can take us out of the sphere of analysis of strings and comparing a group of text values, which will eventually be converted to numbers in order to make meaningful comparisons anyway.

    The result is that subnets can be defined by digital upper and lower limits. And the trick here is that some of these blocks of IP addresses live in the other blocks. Look at the data below and I'll explain if you need. In addition, the network address is the lower limit of the subnet and dissemination is the upper limit. This is a create table and examples of data from my dataset where you can see the IP addresses and name of each subnet and numeric limits for each subnet.

    CREATE TABLE "SUBNET_DECIMAL_VALS" 
       (    
        "SUBNET" VARCHAR2(4000 BYTE), 
        "CIDR_BLOCK" VARCHAR2(30 BYTE), 
        "NETWORK" VARCHAR2(4000 BYTE), 
        "BROADCAST" VARCHAR2(4000 BYTE), 
        "NETWORK_DEC" NUMBER, 
        "BROADCAST_DEC" NUMBER
       ) ;
    

    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.0.0/20','/20','128.110.0.0','128.110.15.255',2154692608,2154696703);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.1.0/24','/24','128.110.1.0','128.110.1.255',2154692864,2154693119);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.4.0/22','/22','128.110.4.0','128.110.7.255',2154693632,2154694655);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.8.0/22','/22','128.110.8.0','128.110.11.255',2154694656,2154695679);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.12.0/22','/22','128.110.12.0','128.110.15.255',2154695680,2154696703);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.16.0/21','/21','128.110.16.0','128.110.23.255',2154696704,2154698751);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.16.0/22','/22','128.110.16.0','128.110.19.255',2154696704,2154697727);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.20.0/22','/22','128.110.20.0','128.110.23.255',2154697728,2154698751);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.24.0/22','/22','128.110.24.0','128.110.27.255',2154698752,2154699775);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.28.0/22','/22','128.110.28.0','128.110.31.255',2154699776,2154700799);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.28.0/24','/24','128.110.28.0','128.110.28.255',2154699776,2154700031);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.29.0/24','/24','128.110.29.0','128.110.29.255',2154700032,2154700287);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.30.0/24','/24','128.110.30.0','128.110.30.255',2154700288,2154700543);
    Insert into SUBNET_DECIMAL_VALS (SUBNET,CIDR_BLOCK,NETWORK,BROADCAST,NETWORK_DEC,BROADCAST_DEC) values ('128.110.31.0/24','/24','128.110.31.0','128.110.31.255',2154700544,2154700799);
    

    SELECT * FROM SUBNET_DECIMAL_VALS
    subnet            cidr   network          broadcast        network_dec   broadcast_dec
    128.110.0.0/20    /20    128.110.0.0      128.110.15.255   2154692608    2154696703
    128.110.1.0/24    /24    128.110.1.0      128.110.1.255    2154692864    2154693119
    128.110.4.0/22    /22    128.110.4.0      128.110.7.255    2154693632    2154694655
    128.110.8.0/22    /22    128.110.8.0      128.110.11.255   2154694656    2154695679
    128.110.12.0/22   /22    128.110.12.0     128.110.15.255   2154695680    2154696703
    128.110.16.0/21   /21    128.110.16.0     128.110.23.255   2154696704    2154698751
    128.110.16.0/22   /22    128.110.16.0     128.110.19.255   2154696704    2154697727
    128.110.20.0/22   /22    128.110.20.0     128.110.23.255   2154697728    2154698751
    128.110.24.0/22   /22    128.110.24.0     128.110.27.255   2154698752    2154699775
    128.110.28.0/22   /22    128.110.28.0     128.110.31.255   2154699776    2154700799
    128.110.28.0/24   /24    128.110.28.0     128.110.28.255   2154699776    2154700031
    128.110.29.0/24   /24    128.110.29.0     128.110.29.255   2154700032    2154700287
    128.110.30.0/24   /24    128.110.30.0     128.110.30.255   2154700288    2154700543
    128.110.31.0/24   /24    128.110.31.0     128.110.31.255   2154700544    2154700799
    

    What I tried to do is a hierarchical query traditional and used more than and less than the comparisons in the where clause. I'm trying to find the limits of subnet (top and bottom numbers) that match among other numerical limits. This is an example, and it gives me the results I need.

    select level, subnet, cidr_block cidr, network, broadcast, network_dec, broadcast_dec
    from poc_subnet_decimal_vals
    connect by nocycle prior network_dec > network_dec and broadcast_dec < broadcast_dec
    

    Do I have to create from this, it is something like this:

    Level    Subnet           CIDR    Network        Broadcast         Network_Dec   Broacast_Dec
    1        128.110.0.0/20    /20    128.110.0.0    128.110.15.255    2154692608    2154696703
    2        128.110.1.0/24    /24    128.110.1.0    128.110.1.255     2154692864    2154693119
    2        128.110.4.0/22    /22    128.110.4.0    128.110.7.255     2154693632    2154694655
    2        128.110.8.0/22    /22    128.110.8.0    128.110.11.255    2154694656    2154695679
    2        128.110.12.0/22   /22    128.110.12.0   128.110.15.255    2154695680    2154696703
    1        128.110.16.0/21   /21    128.110.16.0   128.110.23.255    2154696704    2154698751
    2        128.110.16.0/22   /22    128.110.16.0   128.110.19.255    2154696704    2154697727
    2        128.110.20.0/22   /22    128.110.20.0   128.110.23.255    2154697728    2154698751
    2        128.110.24.0/22   /22    128.110.24.0   128.110.27.255    2154698752    2154699775
    2        128.110.28.0/22   /22    128.110.28.0   128.110.31.255    2154699776    2154700799
    3        128.110.28.0/24   /24    128.110.28.0   128.110.28.255    2154699776    2154700031
    3        128.110.29.0/24   /24    128.110.29.0   128.110.29.255    2154700032    2154700287
    3        128.110.30.0/24   /24    128.110.30.0   128.110.30.255    2154700288    2154700543
    3        128.110.31.0/24   /24    128.110.31.0   128.110.31.255    2154700544    2154700799
    

    Once, I get a hierarchical query of good work I can do the rest of the formatting with the values of the path and CYCLE but I'm not able to get a basic querying work. Does anyone have an idea of how to go on this subject using SQL only? I can write a PL/SQL procedure to add an ID of parent to each row, and then I know that I can create a hierarchical query from that but I was trying to avoid this method if possible.

    Hello

    Earl Lewis wrote:

    I need to write a hierarchical query for quite a number of (contiguous groups of IP addresses) IP subnets. What I'm hoping to do, is let the database do the bulk of the work here and I will not need to write code to do this. I'll do that if I have to but I would really rather not.

    General information may be in order for those who do not know subnets. IP subnets have unique characteristics, based on network management standards (caveat: I'm not a guru/subnet on the network, but I know enough to be dangerous). The first thing to know is that a subnet is a contiguous block of IP addresses that help define the IP network protocol. Another thing is that an IP address can be converted to a binary or decimal/numeric value. This is useful because it can take us out of the sphere of analysis of strings and comparing a group of text values, which will eventually be converted to numbers in order to make meaningful comparisons anyway.

    The result is that subnets can be defined by digital upper and lower limits. And the trick here is that some of these blocks of IP addresses live in the other blocks. Look at the data below and I'll explain if you need. In addition, the network address is the lower limit of the subnet and dissemination is the upper limit. This is a create table and examples of data from my dataset where you can see the IP addresses and name of each subnet and numeric limits for each subnet.

    1. CREATE TABLE 'SUBNET_DECIMAL_VALS '.
    2. (
    3. VARCHAR2 (4000 BYTE) "SUBNET."
    4. VARCHAR2 (30 BYTE) "CIDR_BLOCK."
    5. VARCHAR2 (4000 BYTE) 'NETWORK ',.
    6. "BROADCASTING" VARCHAR2 (4000 BYTE),
    7. NUMBER OF "NETWORK_DEC."
    8. NUMBER OF 'BROADCAST_DEC '.
    9. ) ;
    1. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.0.0/20','/20','128.110.0.0','128.110.15.255',2154692608,2154696703);
    2. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.1.0/24','/24','128.110.1.0','128.110.1.255',2154692864,2154693119);
    3. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.4.0/22','/22','128.110.4.0','128.110.7.255',2154693632,2154694655);
    4. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.8.0/22','/22','128.110.8.0','128.110.11.255',2154694656,2154695679);
    5. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.12.0/22','/22','128.110.12.0','128.110.15.255',2154695680,2154696703);
    6. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.16.0/21','/21','128.110.16.0','128.110.23.255',2154696704,2154698751);
    7. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.16.0/22','/22','128.110.16.0','128.110.19.255',2154696704,2154697727);
    8. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.20.0/22','/22','128.110.20.0','128.110.23.255',2154697728,2154698751);
    9. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.24.0/22','/22','128.110.24.0','128.110.27.255',2154698752,2154699775);
    10. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.28.0/22','/22','128.110.28.0','128.110.31.255',2154699776,2154700799);
    11. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.28.0/24','/24','128.110.28.0','128.110.28.255',2154699776,2154700031);
    12. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.29.0/24','/24','128.110.29.0','128.110.29.255',2154700032,2154700287);
    13. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.30.0/24','/24','128.110.30.0','128.110.30.255',2154700288,2154700543);
    14. Insert into SUBNET_DECIMAL_VALS (subnet, CIDR_BLOCK, NETWORK, BROADCAST, NETWORK_DEC, BROADCAST_DEC) values ('128.110.31.0/24','/24','128.110.31.0','128.110.31.255',2154700544,2154700799);
    1. SELECT * FROM SUBNET_DECIMAL_VALS
    2. subnet cidr network network_dec broadcast_dec broadcast
    3. 128.110.0.0/20 20 128.110.0.0 128.110.15.255 2154692608 2154696703
    4. 128.110.1.0/24 24 128.110.1.0 128.110.1.255 2154692864 2154693119
    5. 22 128.110.4.0/22 128.110.4.0 128.110.7.255 2154693632 2154694655
    6. 22 128.110.8.0/22 128.110.8.0 128.110.11.255 2154694656 2154695679
    7. 22 128.110.12.0/22 128.110.12.0 128.110.15.255 2154695680 2154696703
    8. 128.110.16.0/21 21 128.110.16.0 128.110.23.255 2154696704 2154698751
    9. 22 128.110.16.0/22 128.110.16.0 128.110.19.255 2154696704 2154697727
    10. 22 128.110.20.0/22 128.110.20.0 128.110.23.255 2154697728 2154698751
    11. 22 128.110.24.0/22 128.110.24.0 128.110.27.255 2154698752 2154699775
    12. 22 128.110.28.0/22 128.110.28.0 128.110.31.255 2154699776 2154700799
    13. 128.110.28.0/24 24 128.110.28.0 128.110.28.255 2154699776 2154700031
    14. 128.110.29.0/24 24 128.110.29.0 128.110.29.255 2154700032 2154700287
    15. 128.110.30.0/24 24 128.110.30.0 128.110.30.255 2154700288 2154700543
    16. 128.110.31.0/24 24 128.110.31.0 128.110.31.255 2154700544 2154700799

    What I tried to do is a hierarchical query traditional and used more than and less than the comparisons in the where clause

    . I'm trying to find the limits of subnet (top and bottom numbers) that match among other numerical limits. This is an example, and it gives me the results I need.

    1. Select the level, subnet, cidr_block cidr, broadcast network, network_dec, broadcast_dec
    2. of poc_subnet_decimal_vals
    3. nocycle to connect before network_dec > network_dec and broadcast_dec<>

    Do I have to create from this, it is something like this:

    1. Level of subnet CIDR network broadcast Network_Dec Broacast_Dec
    2. 1 20 128.110.0.0/20 128.110.0.0 128.110.15.255 2154692608 2154696703
    3. 2 128.110.1.0/24 24 128.110.1.0 128.110.1.255 2154692864 2154693119
    4. 2 128.110.4.0/22 22 128.110.4.0 128.110.7.255 2154693632 2154694655
    5. 2 128.110.8.0/22 22 128.110.8.0 128.110.11.255 2154694656 2154695679
    6. 2 128.110.12.0/22 22 128.110.12.0 128.110.15.255 2154695680 2154696703
    7. 1 128.110.16.0/21 21 128.110.16.0 128.110.23.255 2154696704 2154698751
    8. 2 128.110.16.0/22 22 128.110.16.0 128.110.19.255 2154696704 2154697727
    9. 2 128.110.20.0/22 22 128.110.20.0 128.110.23.255 2154697728 2154698751
    10. 2 128.110.24.0/22 22 128.110.24.0 128.110.27.255 2154698752 2154699775
    11. 2 128.110.28.0/22 22 128.110.28.0 128.110.31.255 2154699776 2154700799
    12. 3 128.110.28.0/24 24 128.110.28.0 128.110.28.255 2154699776 2154700031
    13. 3 128.110.29.0/24 24 128.110.29.0 128.110.29.255 2154700032 2154700287
    14. 3 128.110.30.0/24 24 128.110.30.0 128.110.30.255 2154700288 2154700543
    15. 3 128.110.31.0/24 24 128.110.31.0 128.110.31.255 2154700544 2154700799

    Once, I get a hierarchical query of good work I can do the rest of the formatting with the values of the path and CYCLE but I'm not able to get a basic querying work. Does anyone have an idea of how to go on this subject using SQL only? I can write a PL/SQL procedure to add an ID of parent to each row, and then I know that I can create a hierarchical query from that but I was trying to avoid this method if possible.

    This is the right forum. I can see why there is only a single forum for SQL and PL/SQL, but I do not see why they suggest that there are separate forums.

    I'm not sure that you understand the problem.  In the ouptu (the line whose number 11) you have

    1. 2 128.110.28.0/22 22 128.110.28.0 128.110.31.255 2154699776 2154700799

    I guess this level = 2 means that the row is a child of a few rows, but which?  It was numbered line 7:

    1. 1 128.110.16.0/21 21 128.110.16.0 128.110.23.255 2154696704 2154698751

    ?  This would mean that the child has a higher than its parent network_dec.

    I think you want something like this:

    WITH got_parent AS

    (

    SELECT s. *- or whatever the desired columns

    ,       (

    SELECT MIN (ss.subnet) DUNGEON (DENSE_RANK FIRST ORDER BY ss.broadcast_dec - ss.network_dec)

    OF subnet_decimal_vals ss

    WHERE ss.network_dec<=>

    AND ss.broadcast_dec > = s.broadcast_dec

    AND ss.subnet <> s.subnet

    ) As a parent

    OF s subnet_decimal_vals

    )

    SELECT LEVEL AS lvl

    subnet, cidr_block, network, broadcast, network_dec, broadcast_dec

    OF got_parent

    START WITH parent IS NULL

    Parent = subnet PRIOR CONNECTION

    ;

    The result is:

    LVL SUBNET NETWORK BROADCAST NETWORK_DEC BROADCAST_DEC CID

    --- ---------------- --- ---------------- ---------------- ----------- -------------

    1 20 128.110.0.0/20 128.110.0.0 128.110.15.255 2154692608 2154696703

    2 128.110.1.0/24 24 128.110.1.0 128.110.1.255 2154692864 2154693119

    2 128.110.4.0/22 22 128.110.4.0 128.110.7.255 2154693632 2154694655

    2 128.110.8.0/22 22 128.110.8.0 128.110.11.255 2154694656 2154695679

    2 128.110.12.0/22 22 128.110.12.0 128.110.15.255 2154695680 2154696703

    1 128.110.16.0/21 21 128.110.16.0 128.110.23.255 2154696704 2154698751

    2 128.110.16.0/22 22 128.110.16.0 128.110.19.255 2154696704 2154697727

    2 128.110.20.0/22 22 128.110.20.0 128.110.23.255 2154697728 2154698751

    1 22 128.110.24.0/22 128.110.24.0 128.110.27.255 2154698752 2154699775

    1 22 128.110.28.0/22 128.110.28.0 128.110.31.255 2154699776 2154700799

    2 128.110.28.0/24 24 128.110.28.0 128.110.28.255 2154699776 2154700031

    2 128.110.29.0/24 24 128.110.29.0 128.110.29.255 2154700032 2154700287

    2 128.110.30.0/24 24 128.110.30.0 128.110.30.255 2154700288 2154700543

    2 128.110.31.0/24 24 128.110.31.0 128.110.31.255 2154700544 2154700799

    Close enough to what you have requested, but not exact.  If this isn't what you want, explain how you can tell if a line is one ancestor of the other in the tree.

    I guess that this subnet is unique.  If this is not the case, the above query will have to be changed a little, but only a little.

  • Control/sleep of PL/SQL loop works only for expected less than 90 minutes

    Hi all

    I was wondering could someone help me. I've written a procedure that checks to see if a condition is true, and if it ends successfully. If the condition is not true he sleeps for a minute and then try again. If a time-out value is filled the procedure raises an error. This timeout is passed into the procedure in a few minutes.

    My problem is that the procedure only works if the smaller numbers are passed. I tested with success in 1,2,5,10,20 and 30 minutes, but if I spend 90 minutes it is regularly indefinitely (I let it run for more than 2 hours before killing him).

    CREATE OR REPLACE PROCEDURE proc_wait_test (p_minutes_wait, INTEGER)

    IS

    var_start_date DATE: = SYSDATE;

    var_check_result NUMBER: = 0;

    BEGIN

    WHILE TRUE

    LOOP

    -fake check which returns always false just to test the concept

    SELECT count (*) INTO var_check_result FROM DUAL

    WHERE 1 = 0;

    IF (var_check_result > 0)

    THEN

    EXIT;

    ON THE OTHER

    IF (SYSDATE > = (var_start_date + (p_minutes_wait/1440))) THEN

    RAISE_APPLICATION_ERROR (-20000,' procedure has expired, waiting specified limit of ' | p_minutes_wait |) "minutes exceeded.");

    END IF;

    END IF;

    DBMS_LOCK. SLEEP (60);

    END LOOP;

    EXCEPTION

    WHILE OTHERS THEN

    lift;

    END;

    The procedure is designed to integrate into an existing solution, so I can't change the basic features. Database version 10.2.0.2

    Thank you very much in advance for any help.

    Steve.

    Hello Steve,.

    We have this kind of question here: Firewall silently kills idle connections more N minutes (and when there is a high load on the firewall, the "N" decreases aggressivly).

    In the "Workaround", we used "DCD" (dead connection detection) as clients of the server pings on the side of all the N minutes (we use 10), the original purpose of the CR is to interrupt the session side server if the client is gone. but we are interested in a "side effect": This causes a part of the network traffic it is enough to "cheat" the watchdog of firewall.

    Very easy to implement: the server side, in sqlnet.ora:

    SQLNET. EXPIRE_TIME = 10

    (active next time the other is started)

    Best regards

    Bruno.

  • Could not open a file to VMDK using SAN transport using Netbackup 7.1 "you don't have access rights to this file.

    Hello

    I'm trying to backup VMware clients using Netbackup for VMWare 7.1 using the type of transfer to san, and the forum NBU told me that my vm-admin user has no right of access to the VMDK file. However, I checked and I can download the backup host VMDK files and take and remove snapshots as vm-admin user.

    The servers are configured as follows:

    vc01 is a Win2008R2 vSphere 5.1 Server

    ENC1-bl09 by enc1-bl12 are blades running ESXi 5.1

    VM-bak01 is a Win2008R2 NBU media server 7.1 server and is defined in NBU as backup VMWare host

    Data warehouses that contain the VMDK files for the guests are all about EMC and HDS storage accessible via the San by the NBU Media Server and ESXi servers (although mapped through different areas)

    ESXi servers have access to local data and NFS storage warehouses too, but none of these warehouses are used by clients.

    I could save a few guests we via NDB, but they finish in time because the network is not fast enough. Estimated time of 8 days for nightly backup!

    So I have to use a SAN to back up the guests, but he keeps fails with the error below...

    09/01/2014 10:25:16.0745: g_vdInterfaceLogger:.\libvix.cpp:1683 < INFO >: SAN: cannot access a SAN/iSCSI LUN support this virtual disk. (Tip: If you use vcbMounter, you can use the option "nbd m" to move to disk-based network access if that's what you want.) If you were trying to access at the file level, stop the vmount Service by typing "net stop vmount2" in a command prompt to force vmount to re-scan for the SAN LUNS and try the command again.

    09/01/2014 10:25:16.0745: g_vdInterfaceLogger:.\libvix.cpp:1683 < INFO >: DISKLIB-LINK: 'san://snapshot-1968 [WAS-B-DS01] FTL-PROD-SOAHTP02/FTL-PROD-SOAHTP02.vmdk@MAL-VC01?vm-admin/XXX': cannot open (you don't have access rights to this file).

    09/01/2014 10:25:16.0745: g_vdInterfaceLogger:.\libvix.cpp:1683 < INFO >: DISKLIB-STRING: 'san://snapshot-1968 [WAS-B-DS01] FTL-PROD-SOAHTP02/FTL-PROD-SOAHTP02.vmdk@MAL-VC01?vm-admin/XXX': cannot open (you don't have access rights to this file).

    09/01/2014 10:25:16.0745: g_vdInterfaceLogger:.\libvix.cpp:1683 < INFO >: DISKLIB-LIB: can't open 'san://snapshot-1968 [WAS-B-DS01] FTL-PROD-SOAHTP02/FTL-PROD-SOAHTP02.vmdk@MAL-VC01?vm-admin/XXX' with flags 0x1e, you have no rights to this file (3390).

    09/01/2014 10:25:16.0745: vdOpen:.\VixInterface.cpp:196 < ERROR >: VixDiskLib_Open() error. You leave

    09/01/2014 10:25:16.0745: openLeafSnapshotDisks:.\VixGuest.cpp:452 < ERROR >: vdOpen() error = 13. Call of closeLeafSnapshotDisks()

    09/01/2014 10:25:16.0745: openLeafSnapshotDisks:.\VixGuest.cpp:555 < ERROR >: you quit with failure

    09/01/2014 10:25:16.0745: vixMapObjCtl:.\VixCoordinator.cpp:904 < ERROR >: you leave with 23

    09/01/2014 10:25:16.0745: < ERROR > vix_map_objctl:.\libvix.cpp:1138: error 23

    Please someone on this forum explaining why VMWare is denied access to the VMDK file?

    The problem was solved by upgrading to 7.1.0.4

    http://www.Symantec.com/business/support/index?page=content&ID=TECH174128

    Thanks to Philippe of the Symantec Connect forum for the answer

  • Change DNS IP addresses on the ESX host server

    Hello

    I need to change the IP address of my Windows DNS servers on the my ESX hosts. I know I can do this through the vsphere client, but that requires a reboot of the servers. Is there a way I can do this via ssh by changing a file that will not cause a restart of the host? If so, please describe how to do this.

    Also, if the host is restarted, what will happen in the virtual machine of in the interval until the host is upward? It will cause the virtual machine to restart as well, or so I have to restart their after that the host is back? I also disabled HA until I did the DNS changes.

    Thank you.

    normally, I'm a "network service restart. sure enough...

  • With the code to run the session timeout

    I saw this problem asked and addressed on many other furums, but nobody came with a response, yet.

    I am trying to disconnect a user and end their session when they leave my site. How can I know when they leave my site? The only way I know is to wait a few seconds, and if they make a request to the server, they are gone. Disconnect them.

    I tried to just do a < cfajaxproxy > call to a cfc that returns just their application.sessiontimeout to 5 seconds, but it does not work. The session has no expiration time. I need to connect the outside user and the disconnection notice in a newspaper on the server and a logfile (not my idea. "This is the requirement of the customer.) I can get the cfc that I call by the tag < cfajaxproxy > to run log entries and I could kill the session here, but I need to give the page time to update and see if the user requests a page of my site or on an outside website. The problem is that if I do those things within the time of announcement of EFA execution with a counter or loop dlay, the page is not unload until the end of the call of CFCs. So, no matter how long lasts the delay, the session is already cleared bfore that loading of the next page.

    It's the old problem of want to logoff user when they leave the site, but not having is not a way to know where is located the landing page or the ability to delay a server action while the browser passes to the next query. If I can get a delay at work, the user can request a page on my site and I can reset the session before timeout. If they go to another site, eut session outside and they disconnects.

    Any help will be GREATLY appreciated. I spent days on this.

    Thank you

    CFGunny

    I had completely forgotten this post. I know it is very old, but I thought I'd post the real answer. The key was I needed establish if the user has left my site, unloading not only the current page and disconnect them if you leave my site. It is in fact not possible because there is no way to determine the URL TO which the browser will due to browser security restrictions, so I don't know if it's going to another page on my site or on another site. It's a little more complicated that just end a session when the page unloads. I didn't disconnect the user or kill their session each time that an empty page.

    The answer was to write a 'onUnload()' script that records the time of the unload event and the user's session ID (I actually used our user ID and put it in the database) and write a scheduled task that verifies all entries in the database against the current time and disconnects any users having a longer period, say 30 seconds. In order to avoid disconnecting all users (running every two minutes with a maximum time of 30 seconds, return all users), I wrote a script block in the onRequestStart in Application.cfc that checks the database for a record for this user and function, if the record exists, compares the time registration at the present time (now()). If the difference is greater than 30 seconds, the recording is marked and, if still connected, the user is disconnected and have to log in again. This ensures that the user is disconnected after thirty seconds, because the scheduled task runs only every two minutes. If the time is less than 30 seconds, the user continues without interference. Thus, if the user went to the site for more than two minutes, the scheduled task handles the database and actions disconnect. If the user is off-site for more than thirty seconds, but less than two minutes, the script in the onRequestStart function does the work.

    Thirty seconds time was a requirement of the customer and gives enough time for the next page to load, even if the user is on a slow network, but is short enough so that the user probably not going to another site, first. This method also allows the detailed collection of metrix, including the user, how many times they visit, how long they stay (on each page and an agregate), what URL, they came, etc., as well as normal metrix on-site as what pages they visited. These metrix became very important to the customer, is an agency of the federal Government and that they must justify their existence every year to get funding for next year, which part was my paycheck.

    I apologize to not include the code, but I left this project a year ago and do not have the code, not more. If I did it again, I'd probably write it a little differently (cleaning and CFScript), anyway. I hope this helps someone.

  • Three computers networked fine then suddenly the error message «...» Contact the administrator of this server to find out if you have access permissions. Not enough server storage is available to process this command. "

    I had a network that worked very well with three 2 computers running Windows XP Professional and Windows XP Home Edition 1. Suddenly, the network has just stopped allowing certain communications giving the above error message (I have another thread address with XP to Vista computers). The main computer with XP Pro, I'll call A, the second computer with XP Pro, I'll call B and third with XP Home will be C. All computers can share files and printers then without any changes to the system that occurred the following:

    A can access the documents and printers on B and C

    B may NOT have access to documents or printers on one, but access to documents and printers on C

    C cannot have access to the documents on one, but CAN access A printer and CAN access the documents and printers on B

    When access is denied error message is displayed:
    "\\A\My documents is not accessible. You might not have permission to use this network resource. Contact the administrator of this server to find out if you have access permissions. Not enough server storage is available to process this command. "(\\A\ being the computer that I am trying to access)

    As I said access from all computers on this network was working fine a week ago and there has been absolutely no changes made to the network. I checked the following

    1. workgroup name on all computers are the same
    2. file and printer sharing are enabled for all computers.
    3. all computers may been from each computers just denied in some cases.

    The firewall that runs on all three machines is AVG and there were no changes to the one last week, but I checked that sharing is allowed.

    I even tried to run the Configuration Wizard from the network on all computers to see if it works, but the same exact problems occur after doing this.

    I met this problem now THREE times. I can't believe that I'm the only one who has this problem and I can't believe that there isn't a solution for it. None of the Microsoft documentation has even a hint of a solution for this specific problem.

    I need a solution that closes completely the network at my church, and they cannot afford to buy printers and others for each of their computers.

    This error message is misleading. See article Knowledge Base Microsoft Antivirus software may Cause Event ID 2011 for a likely solution, specifying a value of IRPStackSize 15 on A computer.
    Boulder computer Maven
    Most Microsoft Valuable Professional

Maybe you are looking for

  • How to clean an Apple TV remote

    My computer button and the menu button do not work on my apple remote (4th generation). I suspect sticky food he screwed up. Someone had this problem? If so, how is the best way to clean it?

  • IQ504 a upgrade XP/7: remove the OP system all together to add 8 Winxows

    I've upgraded to windows 7 in 2010.  The computer does not completely all the drivers for updates, or will run it the recovery program to remove windows 7. I read the small print on the software of Windows 8 and it says that it cannot be installed on

  • Disable elements on a right click menu

    Hello I followed these instructions and created a right click menu for my chart: http://www.ni.com/white-paper/3171/en/ But now I want to turn on and off some this menu items programmatically, is this posible? And how? Best regards Thijs Boeree

  • Cannot open a word file by using the files on the desktop, but can open them in word

    I recently updated my RAM memory but the PC will not boot even in safe mode.  I have excahnged in the shop for another RAM works and that this time the PC crashes whenever I try to open a WOrd file via a file but they open up fine when I go in Word f

  • program called by a program does not run it go to the taskbar.

    I have a program that calls a Visual basic program. In this example visual basic XP program would open and run. Windows 7 visual basic executes the program, but I have to the task bar and click on it. How can I get the Visual basic program is display