You are previewing IBM ProtecTIER Implementation and Best Practices Guide.
O'Reilly logo
IBM ProtecTIER Implementation and Best Practices Guide

Book Description

This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM TS7600 ProtecTIER® family of products. This guide provides all the latest best practices for using ProtecTIER Software Version 3.3 and the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.

The IBM System Storage® TS7650G ProtecTIER Deduplication Gateway and the IBM System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems that are configured for three available interfaces:

  • The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries.

  • The Symantec NetBackup OpenStorage (OST) API can be integrated with Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries.

  • The newly available File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets.


For your existing ProtecTIER solution, this guide provides best practices and suggestions to boost the performance and the effectiveness of the data deduplication with regards to your application platforms for your VTL, OST, and FSI systems.

When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best option and scenario for data deduplication for their environments. This guide helps you optimize your deduplication ratio, while reducing the hardware, power and cooling, and management costs.

This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS/CSS) Group, development, and Quality Assurance teams.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. The team who wrote this book
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Part 1 General best practices
  5. Chapter 1. ProtecTIER basics
    1. 1.1 Terminology
      1. 1.1.1 ProtecTIER Appliance terminology
      2. 1.1.2 ProtecTIER gateway terminology
      3. 1.1.3 ProtecTIER replication terminology
    2. 1.2 ProtecTIER basic concepts
      1. 1.2.1 ProtecTIER with deduplication disabled
    3. 1.3 ProtecTIER models for open systems
      1. 1.3.1 ProtecTIER appliances
      2. 1.3.2 ProtecTIER deduplication gateways
    4. 1.4 Remote support and Call Home
      1. 1.4.1 How to set up Call Home
    5. 1.5 ProtecTIER command-line interface
  6. Chapter 2. Deduplication considerations
    1. 2.1 HyperFactor data deduplication
      1. 2.1.1 HyperFactor, deduplication, and bandwidth savings
    2. 2.2 ProtecTIER HyperFactor deduplication processing
    3. 2.3 Components of a ProtecTIER system
      1. 2.3.1 ProtecTIER server
      2. 2.3.2 HyperFactor deduplication algorithm
      3. 2.3.3 Disk storage subsystem
    4. 2.4 Benefits of ProtecTIER HyperFactor
      1. 2.4.1 Flexibility
      2. 2.4.2 High availability
      3. 2.4.3 High performance, reduced storage requirements, and environment friendly
    5. 2.5 General ProtecTIER deduplication considerations
      1. 2.5.1 Rethinking your overall backup strategy
      2. 2.5.2 The number 32: The ProtecTIER product is not physical tape
      3. 2.5.3 Data reduction technologies should not be combined
      4. 2.5.4 Data streams must be in order
      5. 2.5.5 Data organization within your ProtecTIER repository
      6. 2.5.6 The dynamics of the ProtecTIER repository
      7. 2.5.7 ProtecTIER repository usage
      8. 2.5.8 Compression
      9. 2.5.9 Encryption
      10. 2.5.10 Database logs and other data types with high data change rates
      11. 2.5.11 Multiplexing
      12. 2.5.12 Tape block size
      13. 2.5.13 File size
    6. 2.6 Data types
      1. 2.6.1 Candidates for a high factoring ratio
      2. 2.6.2 Candidates for a low factoring ratio
  7. Chapter 3. Virtual Tape Library guidelines
    1. 3.1 ProtecTIER Virtual Tape Library introduction
    2. 3.2 General best practices for the Virtual Tape Library
    3. 3.3 Setting up the virtual library and cartridges
      1. 3.3.1 Creating libraries
  8. Chapter 4. ProtecTIER File System Interface: General introduction
    1. 4.1 ProtecTIER FSI network overview
      1. 4.1.1 ProtecTIER network
      2. 4.1.2 Network configuration considerations
      3. 4.1.3 Connecting a ProtecTIER server to the network
    2. 4.2 Configuring components for ProtecTIER FSI
      1. 4.2.1 Configuring a network
      2. 4.2.2 Replication
      3. 4.2.3 Disaster recovery: Test
      4. 4.2.4 Disaster recovery: Event
      5. 4.2.5 General FSI recommendations
    3. 4.3 File System Interface guidelines for NFS
      1. 4.3.1 ProtecTIER NFS authentication and security management
      2. 4.3.2 Configuration of a ProtecTIER FSI-NFS share
      3. 4.3.3 Understanding root squash
    4. 4.4 File System Interface guidelines for CIFS
      1. 4.4.1 ProtecTIER authentication and user management
      2. 4.4.2 Configuring your ProtecTIER system for FSI-CIFS
  9. Chapter 5. Networking essentials
    1. 5.1 Network terminology
    2. 5.2 General configuration considerations
    3. 5.3 Bonding and teaming
      1. 5.3.1 The three different bonding modes of ProtecTIER
    4. 5.4 Recommended ProtecTIER bonding configuration
      1. 5.4.1 Single team/bond (Layer 2) configuration
      2. 5.4.2 Individual IPs (Layer 3) configuration
      3. 5.4.3 Dual/Three teams (Layer 2+3) configuration
      4. 5.4.4 VLANs
      5. 5.4.5 IP addresses
      6. 5.4.6 Routing the IP traffic
  10. Chapter 6. OpenStorage guidelines
    1. 6.1 OpenStorage overview
      1. 6.1.1 Main components
    2. 6.2 Networking overview
      1. 6.2.1 Definitions and acronyms
      2. 6.2.2 Load distribution methodology
      3. 6.2.3 Bonding configuration
      4. 6.2.4 Broadcom NICs with Microsoft platforms
      5. 6.2.5 IBM AIX platforms
      6. 6.2.6 Solaris platforms
      7. 6.2.7 Configuring the network interfaces on the host media server
      8. 6.2.8 Configuring a ProtecTIER server to work with the OpenStorage environment
    3. 6.3 Performance optimization
    4. 6.4 NetBackup Storage Lifecycle Policies
    5. 6.5 OST functionality
      1. 6.5.1 Optimized duplication
      2. 6.5.2 Granular Recovery Technology
      3. 6.5.3 Auto Image Replication
      4. 6.5.4 Accelerator
      5. 6.5.5 Optimized Synthetic Backup
  11. Chapter 7. Host attachment considerations for VTL
    1. 7.1 General recommendations
    2. 7.2 Device driver specifications
      1. 7.2.1 AIX specifications to work with VTL
      2. 7.2.2 Solaris specifications to work with VTL
      3. 7.2.3 Linux specifications to work with VTL
      4. 7.2.4 Windows specifications to work with VTL
      5. 7.2.5 IBM Tape Device Driver
      6. 7.2.6 Control path failover and data path failover
      7. 7.2.7 Persistent device naming
    3. 7.3 LUN masking for VTL systems
      1. 7.3.1 LUN masking methods and best practices
      2. 7.3.2 LUN masking configuration steps
  12. Part 2 Back-end storage subsystems
  13. Chapter 8. Back-end storage overview
    1. 8.1 Overview
    2. 8.2 Dependencies from a back-end storage subsystem view
    3. 8.3 Dependencies from a ProtecTIER view
    4. 8.4 Smart storage subsystems
      1. 8.4.1 Rotate extents: Striping
    5. 8.5 Basic rules for a ProtecTIER server
    6. 8.6 Storage arrays configuration
      1. 8.6.1 General requirements
      2. 8.6.2 RAID considerations
      3. 8.6.3 LUNs
      4. 8.6.4 User data on SATA disks
      5. 8.6.5 Expanding the repository
    7. 8.7 Storage area network fabric
      1. 8.7.1 Two Fibre Channel paths to each storage controller
      2. 8.7.2 Inter-Switch Link
      3. 8.7.3 Dedicated zones
      4. 8.7.4 Front-end zones
      5. 8.7.5 Back-end zones
      6. 8.7.6 SAN paths
  14. Chapter 9. IBM Storwize V3700
    1. 9.1 V3700 overview
    2. 9.2 General V3700 considerations
    3. 9.3 Configuration steps
      1. 9.3.1 Creating empty user data and metadata storage pools
      2. 9.3.2 Creating the MDisk arrays or discovering unmanaged MDisks
      3. 9.3.3 Creating volumes with a sequential virtualization type
      4. 9.3.4 Creating a host connection for the ProtecTIER nodes by using the Storwize V3700 GUI
      5. 9.3.5 Mapping volumes to a host
      6. 9.3.6 Creating file systems and building the ProtecTIER repository
      7. 9.3.7 Expanding the repository
  15. Chapter 10. IBM SAN Volume Controller, IBM Storwize V7000, and IBM Storwize V7000 Unified Storage
    1. 10.1 Storage virtualization introduction
      1. 10.1.1 Terminology
    2. 10.2 General notes
    3. 10.3 Firmware level
    4. 10.4 Fibre Channel connection topology
    5. 10.5 User data and metadata pool: General recommendations
      1. 10.5.1 Metadata pool
      2. 10.5.2 User data pool
    6. 10.6 Configuration steps
      1. 10.6.1 Creating empty user data and metadata storage pools
      2. 10.6.2 Creating the MDisk arrays or discovering unmanaged MDisks
      3. 10.6.3 Creating volumes with a sequential virtualization type
      4. 10.6.4 Creating a host connection for ProtecTIER nodes in Storwize V7000 GUI
      5. 10.6.5 Mapping volumes to a host
      6. 10.6.6 Creating file systems and building the ProtecTIER repository
      7. 10.6.7 Expanding the repository
  16. Chapter 11. IBM XIV Storage System
    1. 11.1 XIV Storage System hardware
    2. 11.2 Fibre Channel switch cabling
      1. 11.2.1 Zoning configuration
      2. 11.2.2 Configuring the XIV Storage System for a ProtecTIER server
  17. Chapter 12. IBM System Storage DS8000
    1. 12.1 DS8000 series overview
      1. 12.1.1 Disk drives
      2. 12.1.2 Host adapters
      3. 12.1.3 RAID levels
    2. 12.2 General considerations
      1. 12.2.1 Planning tools
      2. 12.2.2 Metadata
      3. 12.2.3 User data
      4. 12.2.4 Firmware levels
      5. 12.2.5 Replication
    3. 12.3 Rotate extents: Striping
      1. 12.3.1 When not to use rotate extents
  18. Part 3 Backup management, VTL, OST, and FSI best practices
  19. Chapter 13. Backup management introduction
    1. 13.1 Introduction
    2. 13.2 General recommendations
      1. 13.2.1 Interoperability
      2. 13.2.2 Software compatibility
      3. 13.2.3 Software, backup application, and operating system
      4. 13.2.4 Tape library zoning
      5. 13.2.5 Compression
      6. 13.2.6 Encryption
      7. 13.2.7 Multiplexing
      8. 13.2.8 Tape block sizes
      9. 13.2.9 Type of data that is backed up
    3. 13.3 General advice for backups
    4. 13.4 ProtecTIER integration with backup applications
    5. 13.5 Backup application vocabulary cross-reference
    6. 13.6 Backup application catalog
    7. 13.7 Remote cloning of virtual tapes
  20. Chapter 14. IBM Tivoli Storage Manager
    1. 14.1 Tivoli Storage Manager VTL
    2. 14.2 Tivoli Storage Manager: Preferred options
      1. 14.2.1 LAN-free backups with the ProtecTIER product
      2. 14.2.2 Data streams
      3. 14.2.3 Reclamation
      4. 14.2.4 Collocation
      5. 14.2.5 Physical tape
      6. 14.2.6 Avoiding mount conflicts
      7. 14.2.7 Multiple streams from the client with resourceutilization parameter
      8. 14.2.8 Accommodating increased sessions
      9. 14.2.9 Tivoli Storage Manager storage pool selection
      10. 14.2.10 Technical overview
      11. 14.2.11 Advantages of a Tivoli Storage Manager environment with ProtecTIER
      12. 14.2.12 Tivoli Storage Manager version with VTL
      13. 14.2.13 Updating to a VTL library type
      14. 14.2.14 Defining and deleting Tivoli Storage Manager libraries with many drives
    3. 14.3 Tivoli Storage Manager: FSI
      1. 14.3.1 Setting up backup and restore on Tivoli Storage Manager
      2. 14.3.2 Performing backup and restore on Tivoli Storage Manager
      3. 14.3.3 Parameters for best performance with ProtecTIER FSI
  21. Chapter 15. Symantec NetBackup and BackupExec
    1. 15.1 NetBackup overview
    2. 15.2 Recommendations for NetBackup
      1. 15.2.1 General recommendations
    3. 15.3 NetBackup in a VTL environment
    4. 15.4 NetBackup in an OST environment
    5. 15.5 NetBackup in an FSI environment
      1. 15.5.1 NetBackup in an FSI-CIFS environment
      2. 15.5.2 NetBackup in an FSI-NFS environment
    6. 15.6 Symantec BackupExec in an FSI environment
      1. 15.6.1 Setting up backup and restore
  22. Chapter 16. EMC NetWorker
    1. 16.1 Overview
    2. 16.2 EMC NetWorker in a VTL environment
      1. 16.2.1 General recommendations
      2. 16.2.2 Recommendation if a ProtecTIER server is used as a VTL
    3. 16.3 EMC NetWorker in an FSI environment
      1. 16.3.1 Creating a Windows user for EMC NetWorker
      2. 16.3.2 Setting up for backup and restore
      3. 16.3.3 General configuration recommendations
      4. 16.3.4 Setting the information to be backed up
      5. 16.3.5 Setting the time for the backup
      6. 16.3.6 Performing a restore
      7. 16.3.7 Parameters for best performance with ProtecTIER FSI
  23. Chapter 17. HP Data Protector
    1. 17.1 HP Data Protector with ProtecTIER
      1. 17.1.1 HP Data Protector architecture with ProtecTIER
    2. 17.2 HP Data Protector in a VTL environment
      1. 17.2.1 Enabling the robotic barcode reader
      2. 17.2.2 Increasing the tape block size
      3. 17.2.3 Enabling the lock name
      4. 17.2.4 Disabling compression, encryption, and CRC chksum
      5. 17.2.5 Hosts multipath support
      6. 17.2.6 Load balancing
      7. 17.2.7 Using a mirroring functionality
      8. 17.2.8 Troubleshooting logs
  24. Chapter 18. IBM i and Backup, Recovery, and Media Services
    1. 18.1 IBM i overview
      1. 18.1.1 Integrated file system
      2. 18.1.2 Integrated database
      3. 18.1.3 Object-based architecture
      4. 18.1.4 Libraries
      5. 18.1.5 Backup considerations in IBM i
    2. 18.2 Integration of IBM i and ProtecTIER in a VTL environment
      1. 18.2.1 Backup considerations with ProtecTIER
      2. 18.2.2 Recommended ProtecTIER and IBM i configuration
    3. 18.3 Configuration of BRMS for ProtecTIER
      1. 18.3.1 BRMS overview
      2. 18.3.2 Recommended configurations of BRMS
    4. 18.4 Deploying ProtecTIER with BRMS for disaster recovery
      1. 18.4.1 BRMS available at the production site and DR site
      2. 18.4.2 No BRMS at the DR site
  25. Chapter 19. CommVault
    1. 19.1 CommVault introduction
      1. 19.1.1 CommVault components
    2. 19.2 CommVault with ProtecTIER VTL
      1. 19.2.1 CommVault configuration
      2. 19.2.2 Data multiplexing
      3. 19.2.3 Hardware compression
      4. 19.2.4 Data encryption
      5. 19.2.5 Alternative data paths
    3. 19.3 CommVault FSI
      1. 19.3.1 Setting up backup and restore in a CIFS environment
      2. 19.3.2 Parameters for best performance with ProtecTIER FSI-CIFS
      3. 19.3.3 Setting up backup and restore in an NFS environment
      4. 19.3.4 Parameters for best performance with ProtecTIER FSI-NFS
  26. Part 4 Application considerations
  27. Chapter 20. Application considerations and data types
    1. 20.1 Lotus Domino
      1. 20.1.1 Common server
      2. 20.1.2 Legacy backup and disk space usage
      3. 20.1.3 Domino attachments and object service
      4. 20.1.4 Applying the DAOS solution
      5. 20.1.5 ProtecTIER considerations
      6. 20.1.6 Preparing Domino databases for DAOS
    2. 20.2 Microsoft Exchange
      1. 20.2.1 Defragmentation
      2. 20.2.2 Recommendations for Microsoft Exchange
      3. 20.2.3 Microsoft Exchange 2010
    3. 20.3 Microsoft SQL Server
      1. 20.3.1 Integrating the ProtecTIER server with Microsoft SQL Server backup
      2. 20.3.2 Index defragmentation
      3. 20.3.3 Recommendations for Microsoft SQL Server
      4. 20.3.4 LiteSpeed for SQL Server
    4. 20.4 DB2
      1. 20.4.1 Combining DB2 compression and ProtecTIER deduplication
      2. 20.4.2 Upgrading the DB2 database to improve deduplication
      3. 20.4.3 DB2 DEDUP_DEVICE setting
      4. 20.4.4 Example of DEDUP_DEVICE setting
      5. 20.4.5 Excluding logs from the DB2 database backup
      6. 20.4.6 DB2 recommended settings without DEDUP_DEVICE
      7. 20.4.7 Example of DB2 command using sessions, buffers, and parallelism
    5. 20.5 Oracle
      1. 20.5.1 Recommendations for RMAN settings
    6. 20.6 SAP
      1. 20.6.1 SAP introduction
      2. 20.6.2 Data protection for SAP
      3. 20.6.3 Integration of Tivoli Storage Manager for ERP with SAP
      4. 20.6.4 Tivoli Storage Manager for ERP for Oracle database
      5. 20.6.5 Tivoli Storage Manager for ERP for DB2
      6. 20.6.6 SAP BR*Tools for Oracle using BACKINT
      7. 20.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager
      8. 20.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage Manager
      9. 20.6.9 Best practices for Tivoli Storage Manager for ERP with ProtecTIER
    7. 20.7 VMware
      1. 20.7.1 Technical overview
      2. 20.7.2 Settings and tuning for VMware and Tivoli Storage Manager
      3. 20.7.3 Backup solutions
      4. 20.7.4 Zoning
      5. 20.7.5 Configuring the ProtecTIER server
      6. 20.7.6 Installing the tape driver on the Tivoli Storage Manager server and the Tivoli Storage Manager storage agent
      7. 20.7.7 Tivoli Storage Manager storage agent configuration
      8. 20.7.8 Tivoli Storage Manager server configuration
      9. 20.7.9 Tivoli Storage Manager client installation
      10. 20.7.10 Disabling compression and deduplication on Tivoli Storage Manager
      11. 20.7.11 Configuring a full VM backup through the vStorage API
      12. 20.7.12 VMware Guest OS backup to ProtecTIER
  28. Part 5 Replication and disaster recovery
  29. Chapter 21. ProtecTIER replication
    1. 21.1 ProtecTIER IP replication
    2. 21.2 Native replication
      1. 21.2.1 One-to-one replication
      2. 21.2.2 Many-to-one replication
      3. 21.2.3 Many-to-many replication
      4. 21.2.4 VTL replication
      5. 21.2.5 OST replication
      6. 21.2.6 FSI replication
      7. 21.2.7 Replication grid
      8. 21.2.8 Replication topology group
    3. 21.3 Replication policies
    4. 21.4 Visibility switching
    5. 21.5 Principality
    6. 21.6 Replication Manager
    7. 21.7 Initial synchronization
    8. 21.8 Replication schedules
      1. 21.8.1 Continuous replication
      2. 21.8.2 Scheduled replication
      3. 21.8.3 Centralized Replication Schedule Management
      4. 21.8.4 Replication rate control
      5. 21.8.5 Setting replication rate limits
      6. 21.8.6 Limiting port bandwidth consumption
    9. 21.9 Replication backlog
      1. 21.9.1 SNMP alerts for replication backlog
      2. 21.9.2 Reserving space for local backup data
    10. 21.10 Replication planning
      1. 21.10.1 Bandwidth sizing and requirements
      2. 21.10.2 Replication throughput barriers
      3. 21.10.3 Calculating the replication data transfer
      4. 21.10.4 Calculating replication bandwidth
    11. 21.11 Bandwidth validation utility
      1. 21.11.1 Using the bandwidth validation utility to test the data flow
      2. 21.11.2 Repository replacement
    12. 21.12 Planning ProtecTIER replication
      1. 21.12.1 Deployment planning scenario: many-to-many
      2. 21.12.2 Many-to-one replication
    13. 21.13 The backup application database backup
    14. 21.14 ProtecTIER Planner tool
  30. Chapter 22. Disaster recovery deployment with backup applications
    1. 22.1 Disaster recovery operations
    2. 22.2 ProtecTIER replication overview
      1. 22.2.1 Replication data transfer
    3. 22.3 Disaster recovery operations with VTL
      1. 22.3.1 Managing cartridges after replication
      2. 22.3.2 Cartridge replication requirements
      3. 22.3.3 Importing/exporting slots allocation in VTL
      4. 22.3.4 Import/export slots searching
    4. 22.4 Disaster recovery operations with FSI
      1. 22.4.1 Replication Destination Directory
      2. 22.4.2 ProtecTIER FSI cloning
      3. 22.4.3 Replication best practices for FSI
    5. 22.5 Entering ProtecTIER DR mode
      1. 22.5.1 Working at the disaster recovery site
      2. 22.5.2 Inventory command options for a disaster recovery scenario
      3. 22.5.3 Commonly used disaster recovery queries
      4. 22.5.4 Returning to normal operations
    6. 22.6 The backup application catalog
      1. 22.6.1 ProtecTIER replication with Tivoli Storage Manager
      2. 22.6.2 Recovering the backup application catalog
      3. 22.6.3 Tivoli Storage Manager reclamation and housekeeping
    7. 22.7 Single domain and multiple domains
      1. 22.7.1 Single domain environment
      2. 22.7.2 Multiple domain environment
    8. 22.8 Replication best practices for OST
      1. 22.8.1 The OpenStorage operating environment
      2. 22.8.2 Automation of daily operation
      3. 22.8.3 Gauging the replication completion status
    9. 22.9 Deploying replication with specific backup applications
      1. 22.9.1 Recovery point objective
      2. 22.9.2 Tivoli Storage Manager
    10. 22.10 Symantec NetBackup deployment with ProtecTIER replication
      1. 22.10.1 Scripting the inject/eject commands
      2. 22.10.2 Scripting the inventory commands
      3. 22.10.3 Setting up NetBackup for backup and restore
      4. 22.10.4 Setting up NetBackup for disaster recovery
      5. 22.10.5 Cross-site backups
      6. 22.10.6 ProtecTIER disaster recovery with Symantec NetBackup
      7. 22.10.7 Single domain versus two separate domains
      8. 22.10.8 Disaster recovery scenarios
      9. 22.10.9 Determining what is available for restore at the disaster recovery site
      10. 22.10.10 Eject and inject commands from NetBackup software
    11. 22.11 EMC NetWorker deployment with ProtecTIER replication
      1. 22.11.1 Cloning physical tapes with ProtecTIER replication
      2. 22.11.2 Disaster recovery with ProtecTIER replication
    12. 22.12 CommVault
      1. 22.12.1 Prerequisites
      2. 22.12.2 Running the CommVault backup operation
      3. 22.12.3 CommVault resources
      4. 22.12.4 Disaster recovery operations with OpenStorage
  31. Appendix A. ProtecTIER parsers
    1. The ProtecTIER parser
  32. Appendix B. Entry-level and midrange disks
    1. General considerations
    2. The DS3000 series
  33. Appendix C. Networking
    1. Bonding on Linux and UNIX machines
    2. Teaming on Microsoft based machines
    3. Link aggregation and similar technologies on the LAN switches
  34. Appendix D. Managing cartridge sizes with ProtecTIER
    1. Effects of dynamic cartridge sizes
    2. The mechanism behind fluctuating cartridge sizes
  35. Glossary
  36. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  37. Back cover