Expand Configuration and Management Manual (G06.24+)

Managing the Network
Expand Configuration and Management Manual523347-008
19-5
Gaining Access to Remote Nodes
is part of a network that includes the \HERST node, you can start a TACL process on
\HERST by entering the following command:
\HERST.TACL
The TACL program returns the initial TACL prompt, and you can now log onto the
\HERST system.
A remote TACL started this way does not have a backup process. If you want the
remote TACL process to run as a process pair, enter the following command instead of
the previous command:
\HERST.TACL / NAME, CPU 1 / 2
The NonStop™ Kernel operating system assigns a name to the process pair and starts
the process in processor 1 with a backup process in processor 2.
If you do not know the processor numbers for the remote system, start the primary
process as follows:
\HERST.TACL / NAME /
Then, after you are logged on, determine the processor numbers for the remote
system and issue a BACKUPCPU command. For example:
BACKUPCPU 4
If you use the SYSTEM or VOLUME command to change your current default node,
you can start a remote TACL process without specifying the node name. For example,
the following commands start a TACL process in the node \HERST:
SYSTEM \HERST
TACL
When you are ready to quit the remote TACL process, enter the EXIT command. For
example:
5> EXIT
Are you sure you want to stop this TACL (\HERST.$Z100)?
Enter YES (or Y) to stop the remote process and return to the TACL process on your
local node. If you do not want to stop the process, enter any other character or simply
press RETURN.
Stopping a remote TACL process returns you to your local TACL process.
Running a Program on a Remote Node
When you want to run a program on the network, the program file must reside on the
node where the program is to run. You can use the explicit and implicit RUN
commands to run a program at a remote node the same way you would use these
commands to run a program on the local node.
Note. The following examples and explanations assume that the proper network access rights
are in effect.