![]() ![]() ![]() ![]() |
| Topics this page: |
|
| ![]()
Product Comparisons![]() G2Sys found a 25% improvement in performance between R4 and R5
| ![]() ![]() ![]() |
|
Service Name | Exe | nlnotes.exe Memory |
---|---|---|
Notes client | notes.exe | 16,224 |
Designer for Domino for creating and modifying applications. | designer.exe | 13,544 |
Domino Administrator to register users and servers; monitor and maintain the Domino environment. | admin.exe | 12,800 |
This graphic still under construction:
Download this Visio 2000 graphic file.
.nsf is the file extension for Notes data files.
nsf stands for Notes Storage Facility. The NSF version for all files are shown in SHOW DIRECTORY lists:
|
File ext. | NSF version | ODS | Capabilities |
---|---|---|---|
? | V3 | 17 | |
.ns4 or .nsf | V4 | 20 | |
.nsf | V5 | 41 | >4GB size, transaction logging, in-place compaction |
The compact command converts an R4 .nsf (not .ns4) database to R5 ODS. Its -R option reverses such conversion.
Lotus databases contain unstructured, or “loose” records. Each basic record, called a note, is created with a randomly generated 4-byte NoteID and a 16-byte UNID (Universal Note ID). These numbers are shown under the propeller hat tab. The Note-id (numbers prefixed with “NT”) is unique within a database. The UNID is unique across all replicas of its database because it contains the OF (Orginator id File) and ON (Originator id-Note) of the database being replicated.
The physical location of a NoteID is specified in its RRV (Record Relocation Vector).
The absolute size limit for each database is set when the database is created.
The Database Transaction log file is 192 MB by default, in \LOGDIR, with a maximum limit of 4096 MB.
When the first domino server is installed in a Domino Domain, the install program creates a new Domino Directory file (NAMES.NSF), called the Public Name and Address Book (PNAB) in previous versions. Subsequent servers receive a replica of that file. Additional directories are created from the PUBNAMES.NTF template.
All identifiers are based on the Cert.id created by the first Domino server installed. Each organization adds its stamp to it.
Within a Domino domain, Servers in different geographical locations or connected using a modem can be separated into subgroups called Domino Named Networks (DNN). Like a Microsoft Active Directory site, servers within each DNN are constantly connected with the same protocol. So DNNs is usually named with a combination of location name and protocol, such as “HOUSTON_IP”.
Lotus Domino organizes mail routing paths in a domain defined in a single Domino Directory.
Searches for users and groups reference, in turn, these services which use NAMES.NSF:
A database is enabled to receive mail by creating a Mail-in Database Server configuration document from within the Domino Directory. Author access with the "Create Documents" privilege and the Net Creator role are needed for this action. This contains the filename for the mail-in database.
The mail-in name for the database is the name used in the SendTo field of mail messages addressed to the database.
To repair a corrupted file:
IBM Redbook: Connecting Domino to the Enterprise Using Java
IBM Redbook: Using Domino Workflow examples
IBM RedPaper: Notes and Domino Connectivity - A Collection of Examples
using LotusScript Extension for Lotus Domino Connectors (LSX LC) and
LotusScript Data Objects (LS:DO).
IBM Redbook: Lotus Notes and Domino Take Center Stage: Upgrading from R4 to R5
IBM Redbook: Getting the Most From Your Domino Directory
IBM Redbook: XML Powered by Domino How to use XML with Lotus Domino
IBM RedPaper: Building a Portal with Lotus Domino R5
(step-by-step).
Using the general form of
| ![]() ![]() ![]() |
| ![]() ![]()
The Certification Log is not automatically created during installation. To renew a certificate: perform File | Tools | User ID | Certificates | Request Certificate This creates certlog.nsf using the template certlog.ntf.
| ![]() ![]() ![]() |
| ![]()
| ![]() ![]() ![]() |
|
![]() ![]()
| ![]() ![]() ![]() |
|
Action | Manager | Designer | Editor | Author | Reader | Depositor | No Access |
---|---|---|---|---|---|---|---|
Read public documents | Y | Y | Y | Y | Y | O | O |
Write public documents | Y | Y | Y | O | O | O | O |
Create documents | Y | Y | Y | O | N | Y | N |
Delete documents | O | O | O | O | N | N | N |
Create LotusScript/Java agents![]() | Y | O | O | O | O | N | N |
Create personal agents & folders/views | Y | Y | O | O | O | N | N |
Create shared Folders/views | Y | Y | Y | O | N | N | N |
Create/Modify all database design elements, Create full text search index | N | Y | N | N | N | N | N |
Encrypt database, Modify replication settings, Modify database ACL, Delete database | Y | N | N | N | N | N | N |
Shaded cells designate the data and who can push it for replication
Users obtain the highest level of group or explicit access
when assigned to multiple groups with different access levels.
To replicate, a server needs to be at least an Editor.
Only one server should have Manager access to a database. If the ACL of databases in a replica are changed, one of them would be lost during replication.
Access lists of design elements further restrict access granted by ACLs.
|
. | Replication Style | Command |
---|---|---|
Two-way replication mechanisms: |
|
![]() |
One way replication mechanisms: |
|
![]() |
|
![]() |
Indexes are not replicated.
Replications can pass through another server.
Topology | How | Uses | Limitations |
---|---|---|---|
End-to-End | Each server calls the next one. | Branch offices around the world | ACLs must be the same on every server participating in replication. |
Mesh | Every server replicates with each other server. | Trading | Practically, only 4 servers can participate. |
Hub-to-spoke | One server pushes changes to other servers. | Missives from a central HeadQuarters. |
Replicas can have a different filename than the database being replicated.
Replicas need not be on other machines. Several users can share an address book by making a replica of the names.nsf database with a different name (i.e., names2.nsf) on the same server. The other users get get ACL rights to open and bookmark the names2.nsf.
By default, replication is performed to all files identified with the same Replica ID displayed in Database Properties Information tab.
Replication occurs in this order:
To perform field-level replication, Domino compares the document's Sequence Number with the sequence number on a replication alert:
The highest level of detail in logs is controlled with this configuration parameter:
Here is a list of factors affecting replication, arranged in a way to better remember what goes where:
Layer | Identification | Controls | Processing | |
---|---|---|---|---|
Server | | | | |
Database | | | | |
Document | | | |
The Server Connection document specifies whether the replication task is enabled, the Replication Type Style, and the Time Limit.
Most replication problems occur because of inaccurate server ACL configuration settings in the databases.
So first replicate the partner's ACL in File > Replication > Setting > Advanced > Replicate Incoming > Access Control List.
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
|
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| ![]()
Certification Featured Stories Sample Test Questions![]()
Lucas W's Advanced CLP provides sample questions for elective LotusScript exam 273 and Transitioning exam 523.
| ![]() ![]() ![]() |
|
Links![]() ![]() ![]() ![]() ![]() ![]() ![]() Book Lists | ![]() ![]() ![]() |
![]() |
| ![]() ![]() |
| ||
![]() |
![]()
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page ![]()
Human verify:
Thank you!
|