Selective corrupted data transfered via Ethernet

Here's a stumper. The local Mac store didn't know what to make of it. And being a noob Mac guy, I'm totally lost.
The Machine:
G4 Quicksilver (circa 2001)
256MB RAM
766 Mhz
2 Drives, 30GB and 250GB
10.4.11 (freshly updated by downloading on my PC and using a USB thumbdrive to transfer the .img file)
The Problem(s):
For starters, software update does not work. It tries to check for updates then gives an error message to check and make sure I'm connected to the internet.
Secondly, data is selectively corrupted when transfered to the Mac over ethernet. Any .img or .dmg file gives a "codec overrun" error message when attepting to mount. Also, most noticeably, embedded jepg files in web pages are usually hosed, however, patience and the refresh button can clear that issue up. Prior to installing the 10.4.11 update, Safari seemed to behave with complicated webpages (ala www.apple.com) however, now it is corrupted intermitently as well.
I even connected my mac to my PC and pushed family photo's across from the PC to the Mac. All of them were corrupt, without exception (good thing I didn't move them, just copied).
I know I need more ram, but I'd like to get this figured out before sinking a bunch of $$$'s into a lost cause.
Any ideas?
Thanks
Matt

Here's a stumper. The local Mac store didn't know what to make of it. And being a noob Mac guy, I'm totally lost.
The Machine:
G4 Quicksilver (circa 2001)
256MB RAM
766 Mhz
2 Drives, 30GB and 250GB
10.4.11 (freshly updated by downloading on my PC and using a USB thumbdrive to transfer the .img file)
The Problem(s):
For starters, software update does not work. It tries to check for updates then gives an error message to check and make sure I'm connected to the internet.
Secondly, data is selectively corrupted when transfered to the Mac over ethernet. Any .img or .dmg file gives a "codec overrun" error message when attepting to mount. Also, most noticeably, embedded jepg files in web pages are usually hosed, however, patience and the refresh button can clear that issue up. Prior to installing the 10.4.11 update, Safari seemed to behave with complicated webpages (ala www.apple.com) however, now it is corrupted intermitently as well.
I even connected my mac to my PC and pushed family photo's across from the PC to the Mac. All of them were corrupt, without exception (good thing I didn't move them, just copied).
I know I need more ram, but I'd like to get this figured out before sinking a bunch of $$$'s into a lost cause.
Any ideas?
Thanks
Matt

Similar Messages

  • Transferring via Ethernet - is this ok?

    I am transferring over 150 GB from my MacBook Pro to my MacBook Air via Ethernet cable.
    It is going to take 4-hours.
    Can this length of time damage the files on my MacBook Pro in anyway?
    Thanks

    It shouldn't affect either the MBP or MBA files at all. This is assuming the connections are clean and left undisturbed. I set it to do it shortly before going to bed, let it get started and monitor it for about 15 - 30 minutes then let it finish while you're sleeping.
    I'm curious though are you using Migration Assistant or Startup assistant or did you just want to move 150GB of data over? If you're using MA or SA I'd recommend some other methods that are more reliable.
    Roger

  • Reg::  Error ZS 128 error  in R3 occuring while date transfering via XI

    Hi! Gurus,
    Actually I am involving in Production Support Project.
    Process is Customer is ordering in Store front site and it was moving towards Via Storefront>Webmethods>XI-->R3 and after Getting Sales order quotatiion it moving in reverse order.
    But here in one issue it reaches R3  P31 produciton server but with and error <b> ZS 128 </b> this issue is running from pst 2 months no body is getting where the error is.but finally they decided to resubmit again but finally after resubmitting every ody testing and theya are telling that probem is not from our side. But they are all telling that problem is on SAP XI X44 quality server.
    Finally hey are telling that problem is with one XI URL also but I am not able to access that .
    please study that gice sugestion ehat should I do and guide me in detail
    Regards:
    Amar Srinivas Eli
    <b> http://SAPR3001.geips.ge.com:54400/XISOAPAdapter/MessageServlet?channel=:X44:SOAP_Storefront_Order_Sender&version=3.0&Sender.Service=X44&Interface=http%3A%2F%2Fge-energy-xi.com%2FStoreFront_Order%5EMI_Storefront_Order
    </b>
    Here Ia m providing that URL: they are telling that prob is in this but also they are telling that
    So the service is getting failed at EAI. please check if this url is correct.
    My doubt is : It is XI X44 url right then Y the peroblem is from EAI tehy are mentioned.
    Please analyse on this tell me where the problem is?
    Edited by: Amar Srinivas Eli on Mar 14, 2008 6:17 AM
    Edited by: Amar Srinivas Eli on Mar 14, 2008 6:34 AM

    Hi! Gurus,
    Actually I am involving in Production Support Project.
    Process is Customer is ordering in Store front site and it was moving towards Via Storefront>Webmethods>XI-->R3 and after Getting Sales order quotatiion it moving in reverse order.
    But here in one issue it reaches R3  P31 produciton server but with and error <b> ZS 128 </b> this issue is running from pst 2 months no body is getting where the error is.but finally they decided to resubmit again but finally after resubmitting every ody testing and theya are telling that probem is not from our side. But they are all telling that problem is on SAP XI X44 quality server.
    Finally hey are telling that problem is with one XI URL also but I am not able to access that .
    please study that gice sugestion ehat should I do and guide me in detail
    Regards:
    Amar Srinivas Eli
    <b> http://SAPR3001.geips.ge.com:54400/XISOAPAdapter/MessageServlet?channel=:X44:SOAP_Storefront_Order_Sender&version=3.0&Sender.Service=X44&Interface=http%3A%2F%2Fge-energy-xi.com%2FStoreFront_Order%5EMI_Storefront_Order
    </b>
    Here Ia m providing that URL: they are telling that prob is in this but also they are telling that
    So the service is getting failed at EAI. please check if this url is correct.
    My doubt is : It is XI X44 url right then Y the peroblem is from EAI tehy are mentioned.
    Please analyse on this tell me where the problem is?
    Edited by: Amar Srinivas Eli on Mar 14, 2008 6:17 AM
    Edited by: Amar Srinivas Eli on Mar 14, 2008 6:34 AM

  • Internet via ethernet

    Greetings. I've searched posts for ages and never found a solution to connecting extra macs via ethernet so I can transfer not only files (and often big files hence not using wireless) and also connect to net.
    I'm setting up a new Mac Pro with Snow Leopard and have been transferring via ethernet files from older 2.66 MP which is running Leopard. I now need to download files off the web and the new MP can connect via wireless to my Belkin router but it's on the slow side.
    I really don't understand IP addresses auto/manual or DNS but am keen to learn.
    Thanks

    How are you connecting the Macs? directly computer to computer, or via a router? If your router/modem is your internet gateway it makes sense to do things things via the router.
    On the Macs, set Network Preferences so that Ethernet is the active network; Highlight it in the sidebar, dot should go green.
    Location (in the drop-down at the top) to automatic.
    Configure IPv4 > DHCP
    You need to access your router setup (usually via a web page). You'll need your router IP address (this should be with the router manual) or it may already be displayed in Network prefs.
    Ensure the router is set up to host DHCP on the internal network (LAN).
    If all's well there, an IP address should appear in the network prefs pane (a different one for each Mac).
    If it doesn't show immediately, click the button to Renew DHCP lease.
    Now go to all the connected Macs and enable file sharing in Sharing preferences.
    All being well, any Macs connected to the network will now show up in the Finder window sidebar under places.
    Click on one to connect. If you want more than guest access via the dropbox, you'll need to supply the correct log-in name and password for each Mac.
    Hope this helps.
    Message was edited by: noondaywitch

  • I recently purchased a MacBook Pro and transferred data from my MacBook via Ethernet cable. I did not consolidate my accounts and kept using my MacBook. Can I update the data transfer now using Ethernet and can I consolidate my accounts?

    I recently purchased a MacBook Pro and transferred data from my MacBook using Migration Assistant via Ethernet cable.  I was confused about consolidating my accounts, so I continued to use my old MacBook.  Can I now update the data transfer using the same process and begin using my new MacBook Pro exclusively?  How do I consolidate my existing accounts?
    Thank you.

    Of course. It does everything it did before Yosemite. You just won't be able to send or receive SMS messages with it.

  • Transfering files from PC to Mac via ethernet cable

    I have been unable to connect my Mac for file transfer. I followed the directions on the following sites:
    http://docs.info.apple.com/article.html?artnum=304721
    http://docs.info.apple.com/article.html?artnum=106471
    I connected both computer via an ethernet cable and used the 'Connect to Server' option in the finder. It searches for a while and then gives me the following error:
    The Finder cannot complete the operation because some of the data in "smb://5.173.180.164/SharedDocs" could not be read or written. (Error code -36).
    The folder i specified is open for sharing and i've run the network wizard on the PC. I can't seem to figure out what's wrong.
    I appreciate any help you can give.
    Message was edited by: jaboc77

    You can connect them via ethernet cable. It will work fine.
    No special software needed on either side.
    What is it you are trying to do? Share files? Printers? Internet?
    This article from iFelix may offer some help to you:
    http://www.ifelix.co.uk/tech/3020.html

  • Ip adress not recognized in windows explorer when trying to transfer data from my PC to my TC via ethernet.

    Hello,
    I currently have a Time capsule and a Pc with a Windows 7 operating system. Im trying to transfer data from my PC to my Time Capsule via ethernet cable because wirelessly takes too much time given that I have a lot of data to transfer. In my Airport Utility I already set my workgroup to "WORKGROUP" and the file sharing to "write and read", I also disconnected the Wifi on my Pc so the ethernet would work without confusions.  But when I type my Time Capsule's Ip address in my windows Explorer it opens a page that says something like "this website is not available". Maybe I did something wrong while setting up the time capsule for file sharing. What are the correct steps for me to be able to transfer data from my PC to my time capsule via ethernet cable?

    I do not normally use a PC, but we have a guest here this week with a PC using Windows 7 which allows for some "testing" on the network.
    What is the Ethernet connected IP address of the Time Capsule?  Mine is 10.0.1.2
    If we open Windows Explorer and type in
    \\10.0.1.2
    the Time Capsule drive is immediately seen on the PC once I enter the device password for the TC to connect.
    I can also type in the name of the Time Capsule and things work the same way. My Time Capsule name is TC
    \\TC
    brings up the same log in as the IP address method above
    We have not tried mapping the drive, but might. Will post on results if we do that.

  • Select Members in Data Forms via UDA or Substitutionvariable

    Hello,
    I want to select members in row or colum dimension of a Planning data form via an UDA. But it is only possible to select members via hierarchy (member, sibling, parent,...).
    Is there a possibility to select members via UDA?
    What I tried is:
    1.) in the definition of the dimension members for the dimension "Period" in the data form I filled in: "@UDA(Period,FC01)".
    I get the error "The member @UDA(Period does not exist or you do not have access to it."
    2.) Instead of the UDA I tried to use a Substitutionvariable "&PER_LIST"
    This works if the Substitutionvariable contains only one member. It doesn't work if it contains more than one member (comma-separated list).
    I get the error: "A substitution variable required for this calculation is undefined. Variable: PER_LIST" (even though the variable exists and I selected it in the member selection dialog)
    Can anyone help? I'm using Hyp. System 9.3.1.
    Thanks in advance,
    Nicole

    I would love to see the ability to select EDA's from Planning Forms, it would definately make life a little easier.
    As CL says, attributes are great at filtering forms and BR's, their only drawback is that you can only use them on sparse dimensional members.
    To get round this problem i've relied on security to filter out the accounts i do not need to see in the forms for the specific users, and kept the form selection on @IDESCENDANTS(Account_Parent).
    If you wish to filter on the Period dimension and this is a dense dimension, can you not get round the problem with rollups and, for example, @DESCENDANTS(Q1) to only return 3 months in the form, it really depends on your outline structure.

  • How to delete Master Data transferred from ECC to APO via CIF

    Hi, all
    I'm connecting SCM 5.1 with ECC 6.0 via CIF.
    When activating Integration Model in ECC, the following error occurred;
       "Location 0001 of type 1001 (BSG 592BUSGP) already exists in APO"
    This is because Location 0001 was already transferred from different ECC client via CIF, and not cleared.
    I'm now trying to initialise master data transferred from ECC to APO via CIF, but in vain.
    I suppose I have to first delete all master data CIFed from ECC in APO, or have to execute initialisation of APO master data with ECC data in ECC.
    Please tell me how to do this.
    For details, please read the followings;
    I connected APO client with ECC client 590.
    I transferred Plant and Material Master from ECC to APO via CIF.
    After that, I wanted to change ECC client from 590 to the other.
    I created the other client (592) by client-copying from 590 with SAP_ALL copy profile.
    I deactivated Integration Model in ECC 590, and activated the same in ECC 592.
    Here, I faced the problem.
    The initial data transfer failed due to the duplicate of data.
    Now I'm wondering how I can initialise master data in APO and transfer initial data from ECC.
    Due to testing purposes, I have to change ECC clients from one to the other this time, but I cannot initialise master data in APO and cannot tansfer initial data from different ECC client.
    thanks in advance,
    Hozy

    Hi all,
    Thank you very much indeed for lots of your replies.
    Thanks to all of your advices, I'm getting to understand what to do.
    Well, I'll say I have to create one more client for testing with other ECC clients or I have to rebuild the client by client-copying from 001 and implementing all transportation requests, for marking del flags to each master data and running del programme sound like tough work, and sound like odd ..
    Then, I've got next issue here.
    In SCM-APO, I use BI objects, and , if I have to create several clients for testing, I have to set up clients where you can use both BI objects and CIFed master data.
    I suppose I have to change 'BWMANDT' in RSADMINA and make RSA1 accessable in other SCM clients and implement tests.
    Also, I have to register BI System for newly created SCM clients in RSA1-SourceSystem.
    Well, if you have any experiences on this kind of use, and if you have any advice on it, please give me any tips.
    Particulary, I'd appreciate very much if you give me advice on which way you have chosen; creating several clients or rebuilding the one client in SCM-APO when you use both BI objects, CIFed master data and Demand Planning.
    Thanks in advance.
    Hozy

  • I transferred files and photos from MacBook to iMac via ethernet cable and using migration assistant. However every time I transferred, it created a separate user and it transferred all files and photos again and again. So now I have 3 users accounts ?

    I transferred files and photos from MacBook to iMac via ethernet cable and using migration assistant. However every time I transferred, it created a separate user and it transferred all files and photos again and again. So now I have 3 users accounts with all files and photos saved 3 times on same iMac !! Any idea how to avoid this ?

    Yes, you ran into a very understandable problem.
    When you use Migration Assistant, it cannot over-write the account that you happen to be using at the time. Upon migrating accounts, it will tell you that it is going to create a new one, but that message is easy to miss.
    If you have three identical accounts, log in to the account you want to keep, and delete the redundant ones in System Preferences > Users & Groups.
    Now that you know, the easiest way to migrate accounts is to use Setup Assistant when you first get a new Mac. That eliminates any possibility for this to occur, but most people are so eager to use their new Mac that they elect to migrate later.
    That's OK too, but in that case you would want to create a temporary account whose sole purpose is to run Migration Assistant so that you may migrate your old one with an identical name. Be sure to give the new account Administrator privileges. When that finishes you would log in to the newly migrated account, and delete the temporary account.

  • Transferring itunes to new itunes via ethernet cable

    I want to transfer the music from my old itunes to the itunes on my new computer. As my old computer is pretty much knackered, the easiest way for me to do this i figure is via ethernet cable. can this be done, and if so, how do i go about doing it?

    Sure, get a crossover ethernet cable.
    Windows has built-in utilities to get this done. You didn't say which OS you are using, but here is an example for XP
    http://www.microsoft.com/windowsxp/using/setup/getstarted/bott_fstw.mspx

  • No internet access via ethernet port

    Hi, have been using my emac via ethernet cable to router, for many months with NO problem accessing internet and others cabled to same router also having no problem and I have used my Pwr Mac wtih no problem and have never had to make any specific settings to either to access the net via the router which gets its wifi signal from elsewhere. With system preferences > network > ethernet open I can see the the router is being recognized cause it appears or dissappears as soon as I plug or unlug the ethernet cable. I open "Activity Monitor" and occasionally, very briefly, there will be data incoming( green spikes ) or outgoing( red spikes ). HD verified OK, ran disk permnissions and scripts. Have not yet run Apple or other( Micro-mat ) hardware testing programs tho I will later. Does anyone know if there is a PLIST file that can get corrupted that would affect ethernet port functioning properly? My guess it is hardware but since I can see the router is recognized makes me wonder about corrupt file ergo a system error or possibly inloaded some file that caused conflict. I also booted from my external drive and tried accessing from the cloned OS system and still did not work. The cloned system is the original has never been updated, nor has any of the applications in clone, so, if it was "system" problem the clone should have worked. However, I had cloned user ergo newest documents, library etc, so that would be the only possible source of conflicts when booted from clone system....Thx Ran

    Ping test should be interesting.
    Start by pinging router address. Should be able to ping building router if you can figure out it's address.
    Could you go wireless to building net? You might buy a usb dongle.
    USB dongle
    Introducting RokIt, a new wireless USB adapter that is compatible with Mac OS 10.3, 10.4, and 10.5 Leopard.
    http://rokland.com/store/productinfo.php?productsid=319
    Newer Technology MAXPower 802.11n/g/b USB Adapter. The easiest way to add Wireless Connectivity to ANY computer! 2 Year Warranty.
    http://eshop.macsales.com/item/Newer%20Technology/MXP802NU2C/
    There are usb to ethernet cable.
    You could try another browser.
    *MAC Address*
    Every ethernet port has a unique MAC Address. A router can block on a MAC Address. That is why I suggest you check out your router.
    Note MAC is not Mac. MAC is all upper case.
    definition: http://en.wikipedia.org/wiki/Mac_address
    *Ethernet port hardware*
    I'd say this was some kind of strange hardware problem.
    *Dns problem?*
    It has symptoms of a DNS problem. The little traffic is a symptom of the problem. You said all the numbers were the same, however.
    Verify DNS
    apple > system preferences > network
    Double click on network connection you are using.
    Pick the TCP/IP tab.
    Verify that you have a DNS Server. If you do not, look on your windows machine and see what the net address is. You can also pick using DHCF and still enter you DNS server address.
    You can use
    harddrive > applications > utilities > network utility
    to diagnose the situation.
    You can ping google.com. Result:
    Ping has started ...
    PING google.com (64.233.167.99): 56 data bytes
    64 bytes from 64.233.167.99: icmp_seq=0 ttl=244 time=215.362 ms
    64 bytes from 64.233.167.99: icmp_seq=1 ttl=244 time=279.597 ms
    64 bytes from 64.233.167.99: icmp_seq=2 ttl=244 time=189.747 ms
    64 bytes from 64.233.167.99: icmp_seq=3 ttl=244 time=250.657 ms
    64 bytes from 64.233.167.99: icmp_seq=4 ttl=244 time=183.232 ms
    64 bytes from 64.233.167.99: icmp_seq=5 ttl=244 time=243.753 ms
    64 bytes from 64.233.167.99: icmp_seq=6 ttl=244 time=173.108 ms
    64 bytes from 64.233.167.99: icmp_seq=7 ttl=244 time=230.239 ms
    64 bytes from 64.233.167.99: icmp_seq=8 ttl=244 time=180.639 ms
    64 bytes from 64.233.167.99: icmp_seq=9 ttl=244 time=232.177 ms
    --- google.com ping statistics ---
    10 packets transmitted, 10 packets received, 0% packet loss
    round-trip min/avg/max/stddev = 173.108/217.851/279.597/33.615 ms
    If that does work, try pinging 64.233.167.99 Result:
    Ping has started ...
    PING 64.233.167.99 (64.233.167.99): 56 data bytes
    64 bytes from 64.233.167.99: icmp_seq=0 ttl=244 time=189.655 ms
    64 bytes from 64.233.167.99: icmp_seq=1 ttl=244 time=213.471 ms
    64 bytes from 64.233.167.99: icmp_seq=2 ttl=244 time=257.873 ms
    64 bytes from 64.233.167.99: icmp_seq=3 ttl=244 time=172.745 ms
    64 bytes from 64.233.167.99: icmp_seq=4 ttl=244 time=226.723 ms
    64 bytes from 64.233.167.99: icmp_seq=5 ttl=244 time=171.883 ms
    64 bytes from 64.233.167.99: icmp_seq=6 ttl=244 time=260.308 ms
    64 bytes from 64.233.167.99: icmp_seq=7 ttl=244 time=172.963 ms
    64 bytes from 64.233.167.99: icmp_seq=8 ttl=244 time=198.840 ms
    64 bytes from 64.233.167.99: icmp_seq=9 ttl=244 time=181.215 ms
    --- 64.233.167.99 ping statistics ---
    10 packets transmitted, 10 packets received, 0% packet loss
    round-trip min/avg/max/stddev = 171.883/204.568/260.308/32.247 ms
    If pinging 17.254.3.183 works but pinging Google.com doesn't. You have a bad DNS Server address.
    BDAqua suggests in a post.
    You can use OpenDNS for looking up web addresses.
    Put these numbers in Network>TCP/IP>DNS Servers for a try...
    208.67.222.222
    208.67.220.220
    I think they now pretend you need to join to use, but you don't.
    https://www.opendns.com/homenetwork/start/device/apple-osx-tiger
    (Please note that you do not need to a joint Open DNS to use it.)
    http://discussions.apple.com/message.jspa?messageID=5908432#5908432
    Google provides free dns lookup too. There numbers are:
    8.8.8.8
    8.8.4.4
    Robert
    =======================================================
    I suggest that you try pinging Google.com.
    Macintosh-HD -> Applications -> Utilities -> Terminal
    mac $ ping -c4 google.com
    PING google.com (64.233.187.99): 56 data bytes
    64 bytes from 64.233.187.99: icmp_seq=0 ttl=245 time=177.617 ms
    64 bytes from 64.233.187.99: icmp_seq=1 ttl=245 time=251.899 ms
    64 bytes from 64.233.187.99: icmp_seq=2 ttl=245 time=169.291 ms
    64 bytes from 64.233.187.99: icmp_seq=3 ttl=245 time=250.119 ms
    --- google.com ping statistics ---
    4 packets transmitted, 4 packets received, 0% packet loss
    round-trip min/avg/max/stddev = 169.291/212.232/251.899/38.894 ms
    mac $ ping -c4 64.233.187.99
    PING 64.233.187.99 (64.233.187.99): 56 data bytes
    64 bytes from 64.233.187.99: icmp_seq=0 ttl=245 time=176.723 ms
    64 bytes from 64.233.187.99: icmp_seq=1 ttl=245 time=247.889 ms
    64 bytes from 64.233.187.99: icmp_seq=2 ttl=245 time=176.890 ms
    64 bytes from 64.233.187.99: icmp_seq=3 ttl=245 time=244.623 ms
    --- 64.233.187.99 ping statistics ---
    4 packets transmitted, 4 packets received, 0% packet loss
    round-trip min/avg/max/stddev = 176.723/211.531/247.889/34.744 ms
    mac $
    Analysis: If you cannot ping Goolge.com but you can ping 64.233.187.99, then you need to enter you dns address. For some reason Mac OS X sometimes doesn't set the dns. You can set it manually.
    apple > system preferences > network
    tcp/ip tab and enter address of dns servers
    example 162.33.160.100
    You will need to use a different number.
    PS.
    You are a little short on stating results. You state what you did, but I have to guess the result.
    Did: X
    Result: Y
    Did:
    1) Power Book's ethernet cable plugged into router port 5. Working to yahoo.com.
    2) Unplugged power book's ethernet cable from router
    3) Plugged eMac's ethernet cable into port 5.
    Result: eMac using Firefox was not able to access yahoo.com
    Robert

  • How to select the data efficiently from the table

    hi every one,
      i need some help in selecting data from FAGLFLEXA table.i have to select many amounts from different group of G/L accounts
    (groups are predefined here  which contains a set of g/L account no.).
    if i select every time for each group then it will be a performance issue, in order to avoid it what should i do, can any one suggest me a method or a smaple query so that i can perform the task efficiently.

    Hi ,
    1.select and keep the data in internal table
    2.avoid select inside loop ..endloop.
    3.try to use for all entries
    check the below details
    Hi Praveen,
    Performance Notes
    1.Keep the Result Set Small
    You should aim to keep the result set small. This reduces both the amount of memory used in the database system and the network load when transferring data to the application server. To reduce the size of your result sets, use the WHERE and HAVING clauses.
    Using the WHERE Clause
    Whenever you access a database table, you should use a WHERE clause in the corresponding Open SQL statement. Even if a program containing a SELECT statement with no WHERE clause performs well in tests, it may slow down rapidly in your production system, where the data volume increases daily. You should only dispense with the WHERE clause in exceptional cases where you really need the entire contents of the database table every time the statement is executed.
    When you use the WHERE clause, the database system optimizes the access and only transfers the required data. You should never transfer unwanted data to the application server and then filter it using ABAP statements.
    Using the HAVING Clause
    After selecting the required lines in the WHERE clause, the system then processes the GROUP BY clause, if one exists, and summarizes the database lines selected. The HAVING clause allows you to restrict the grouped lines, and in particular, the aggregate expressions, by applying further conditions.
    Effect
    If you use the WHERE and HAVING clauses correctly:
    • There are no more physical I/Os in the database than necessary
    • No unwanted data is stored in the database cache (it could otherwise displace data that is actually required)
    • The CPU usage of the database host is minimize
    • The network load is reduced, since only the data that is required by the application is transferred to the application server.
    Minimize the Amount of Data Transferred
    Data is transferred between the database system and the application server in blocks. Each block is up to 32 KB in size (the precise size depends on your network communication hardware). Administration information is transported in the blocks as well as the data.
    To minimize the network load, you should transfer as few blocks as possible. Open SQL allows you to do this as follows:
    Restrict the Number of Lines
    If you only want to read a certain number of lines in a SELECT statement, use the UP TO <n> ROWS addition in the FROM clause. This tells the database system only to transfer <n> lines back to the application server. This is more efficient than transferring more lines than necessary back to the application server and then discarding them in your ABAP program.
    If you expect your WHERE clause to return a large number of duplicate entries, you can use the DISTINCT addition in the SELECT clause.
    Restrict the Number of Columns
    You should only read the columns from a database table that you actually need in the program. To do this, list the columns in the SELECT clause. Note here that the INTO CORRESPONDING FIELDS addition in the INTO clause is only efficient with large volumes of data, otherwise the runtime required to compare the names is too great. For small amounts of data, use a list of variables in the INTO clause.
    Do not use * to select all columns unless you really need them. However, if you list individual columns, you may have to adjust the program if the structure of the database table is changed in the ABAP Dictionary. If you specify the database table dynamically, you must always read all of its columns.
    Use Aggregate Functions
    If you only want to use data for calculations, it is often more efficient to use the aggregate functions of the SELECT clause than to read the individual entries from the database and perform the calculations in the ABAP program.
    Aggregate functions allow you to find out the number of values and find the sum, average, minimum, and maximum values.
    Following an aggregate expression, only its result is transferred from the database.
    Data Transfer when Changing Table Lines
    When you use the UPDATE statement to change lines in the table, you should use the WHERE clause to specify the relevant lines, and then SET statements to change only the required columns.
    When you use a work area to overwrite table lines, too much data is often transferred. Furthermore, this method requires an extra SELECT statement to fill the work area. Minimize the Number of Data Transfers
    In every Open SQL statement, data is transferred between the application server and the database system. Furthermore, the database system has to construct or reopen the appropriate administration data for each database access. You can therefore minimize the load on the network and the database system by minimizing the number of times you access the database.
    Multiple Operations Instead of Single Operations
    When you change data using INSERT, UPDATE, and DELETE, use internal tables instead of single entries. If you read data using SELECT, it is worth using multiple operations if you want to process the data more than once, other wise, a simple select loop is more efficient.
    Avoid Repeated Access
    As a rule you should read a given set of data once only in your program, and using a single access. Avoid accessing the same data more than once (for example, SELECT before an UPDATE).
    Avoid Nested SELECT Loops
    A simple SELECT loop is a single database access whose result is passed to the ABAP program line by line. Nested SELECT loops mean that the number of accesses in the inner loop is multiplied by the number of accesses in the outer loop. You should therefore only use nested SELECT loops if the selection in the outer loop contains very few lines.
    However, using combinations of data from different database tables is more the rule than the exception in the relational data model. You can use the following techniques to avoid nested SELECT statements:
    ABAP Dictionary Views
    You can define joins between database tables statically and systemwide as views in the ABAP Dictionary. ABAP Dictionary views can be used by all ABAP programs. One of their advantages is that fields that are common to both tables (join fields) are only transferred once from the database to the application server.
    Views in the ABAP Dictionary are implemented as inner joins. If the inner table contains no lines that correspond to lines in the outer table, no data is transferred. This is not always the desired result. For example, when you read data from a text table, you want to include lines in the selection even if the corresponding text does not exist in the required language. If you want to include all of the data from the outer table, you can program a left outer join in ABAP.
    The links between the tables in the view are created and optimized by the database system. Like database tables, you can buffer views on the application server. The same buffering rules apply to views as to tables. In other words, it is most appropriate for views that you use mostly to read data. This reduces the network load and the amount of physical I/O in the database.
    Joins in the FROM Clause
    You can read data from more than one database table in a single SELECT statement by using inner or left outer joins in the FROM clause.
    The disadvantage of using joins is that redundant data is read from the hierarchically-superior table if there is a 1:N relationship between the outer and inner tables. This can considerably increase the amount of data transferred from the database to the application server. Therefore, when you program a join, you should ensure that the SELECT clause contains a list of only the columns that you really need. Furthermore, joins bypass the table buffer and read directly from the database. For this reason, you should use an ABAP Dictionary view instead of a join if you only want to read the data.
    The runtime of a join statement is heavily dependent on the database optimizer, especially when it contains more than two database tables. However, joins are nearly always quicker than using nested SELECT statements.
    Subqueries in the WHERE and HAVING Clauses
    Another way of accessing more than one database table in the same Open SQL statement is to use subqueries in the WHERE or HAVING clause. The data from a subquery is not transferred to the application server. Instead, it is used to evaluate conditions in the database system. This is a simple and effective way of programming complex database operations.
    Using Internal Tables
    It is also possible to avoid nested SELECT loops by placing the selection from the outer loop in an internal table and then running the inner selection once only using the FOR ALL ENTRIES addition. This technique stems from the time before joins were allowed in the FROM clause. On the other hand, it does prevent redundant data from being transferred from the database.
    Using a Cursor to Read Data
    A further method is to decouple the INTO clause from the SELECT statement by opening a cursor using OPEN CURSOR and reading data line by line using FETCH NEXT CURSOR. You must open a new cursor for each nested loop. In this case, you must ensure yourself that the correct lines are read from the database tables in the correct order. This usually requires a foreign key relationship between the database tables, and that they are sorted by the foreign key. Minimize the Search Overhead
    You minimize the size of the result set by using the WHERE and HAVING clauses. To increase the efficiency of these clauses, you should formulate them to fit with the database table indexes.
    Database Indexes
    Indexes speed up data selection from the database. They consist of selected fields of a table, of which a copy is then made in sorted order. If you specify the index fields correctly in a condition in the WHERE or HAVING clause, the system only searches part of the index (index range scan).
    The primary index is always created automatically in the R/3 System. It consists of the primary key fields of the database table. This means that for each combination of fields in the index, there is a maximum of one line in the table. This kind of index is also known as UNIQUE.
    If you cannot use the primary index to determine the result set because, for example, none of the primary index fields occur in the WHERE or HAVING clause, the system searches through the entire table (full table scan). For this case, you can create secondary indexes, which can restrict the number of table entries searched to form the result set.
    You specify the fields of secondary indexes using the ABAP Dictionary. You can also determine whether the index is unique or not. However, you should not create secondary indexes to cover all possible combinations of fields.
    Only create one if you select data by fields that are not contained in another index, and the performance is very poor. Furthermore, you should only create secondary indexes for database tables from which you mainly read, since indexes have to be updated each time the database table is changed. As a rule, secondary indexes should not contain more than four fields, and you should not have more than five indexes for a single database table.
    If a table has more than five indexes, you run the risk of the optimizer choosing the wrong one for a particular operation. For this reason, you should avoid indexes with overlapping contents.
    Secondary indexes should contain columns that you use frequently in a selection, and that are as highly selective as possible. The fewer table entries that can be selected by a certain column, the higher that column’s selectivity. Place the most selective fields at the beginning of the index. Your secondary index should be so selective that each index entry corresponds to at most five percent of the table entries. If this is not the case, it is not worth creating the index. You should also avoid creating indexes for fields that are not always filled, where their value is initial for most entries in the table.
    If all of the columns in the SELECT clause are contained in the index, the system does not have to search the actual table data after reading from the index. If you have a SELECT clause with very few columns, you can improve performance dramatically by including these columns in a secondary index.
    Formulating Conditions for Indexes
    You should bear in mind the following when formulating conditions for the WHERE and HAVING clauses so that the system can use a database index and does not have to use a full table scan.
    Check for Equality and Link Using AND
    The database index search is particularly efficient if you check all index fields for equality (= or EQ) and link the expressions using AND.
    Use Positive Conditions
    The database system only supports queries that describe the result in positive terms, for example, EQ or LIKE. It does not support negative expressions like NE or NOT LIKE.
    If possible, avoid using the NOT operator in the WHERE clause, because it is not supported by database indexes; invert the logical expression instead.
    Using OR
    The optimizer usually stops working when an OR expression occurs in the condition. This means that the columns checked using OR are not included in the index search. An exception to this are OR expressions at the outside of conditions. You should try to reformulate conditions that apply OR expressions to columns relevant to the index, for example, into an IN condition.
    Using Part of the Index
    If you construct an index from several columns, the system can still use it even if you only specify a few of the columns in a condition. However, in this case, the sequence of the columns in the index is important. A column can only be used in the index search if all of the columns before it in the index definition have also been specified in the condition.
    Checking for Null Values
    The IS NULL condition can cause problems with indexes. Some database systems do not store null values in the index structure. Consequently, this field cannot be used in the index.
    Avoid Complex Conditions
    Avoid complex conditions, since the statements have to be broken down into their individual components by the database system.
    Reduce the Database Load
    Unlike application servers and presentation servers, there is only one database server in your system. You should therefore aim to reduce the database load as much as possible. You can use the following methods:
    Buffer Tables on the Application Server
    You can considerably reduce the time required to access data by buffering it in the application server table buffer. Reading a single entry from table T001 can take between 8 and 600 milliseconds, while reading it from the table buffer takes 0.2 - 1 milliseconds.
    Whether a table can be buffered or not depends its technical attributes in the ABAP Dictionary. There are three buffering types:
    • Resident buffering (100%) The first time the table is accessed, its entire contents are loaded in the table buffer.
    • Generic buffering In this case, you need to specify a generic key (some of the key fields) in the technical settings of the table in the ABAP Dictionary. The table contents are then divided into generic areas. When you access data with one of the generic keys, the whole generic area is loaded into the table buffer. Client-specific tables are often buffered generically by client.
    • Partial buffering (single entry) Only single entries are read from the database and stored in the table buffer.
    When you read from buffered tables, the following happens:
    1. An ABAP program requests data from a buffered table.
    2. The ABAP processor interprets the Open SQL statement. If the table is defined as a buffered table in the ABAP Dictionary, the ABAP processor checks in the local buffer on the application server to see if the table (or part of it) has already been buffered.
    3. If the table has not yet been buffered, the request is passed on to the database. If the data exists in the buffer, it is sent to the program.
    4. The database server passes the data to the application server, which places it in the table buffer.
    5. The data is passed to the program.
    When you change a buffered table, the following happens:
    1. The database table is changed and the buffer on the application server is updated. The database interface logs the update statement in the table DDLOG. If the system has more than one application server, the buffer on the other servers is not updated at once.
    2. All application servers periodically read the contents of table DDLOG, and delete the corresponding contents from their buffers where necessary. The granularity depends on the buffering type. The table buffers in a distributed system are generally synchronized every 60 seconds (parameter: rsdisp/bufreftime).
    3. Within this period, users on non-synchronized application servers will read old data. The data is not recognized as obsolete until the next buffer synchronization. The next time it is accessed, it is re-read from the database.
    You should buffer the following types of tables:
    • Tables that are read very frequently
    • Tables that are changed very infrequently
    • Relatively small tables (few lines, few columns, or short columns)
    • Tables where delayed update is acceptable.
    Once you have buffered a table, take care not to use any Open SQL statements that bypass the buffer.
    The SELECT statement bypasses the buffer when you use any of the following:
    • The BYPASSING BUFFER addition in the FROM clause
    • The DISTINCT addition in the SELECT clause
    • Aggregate expressions in the SELECT clause
    • Joins in the FROM clause
    • The IS NULL condition in the WHERE clause
    • Subqueries in the WHERE clause
    • The ORDER BY clause
    • The GROUP BY clause
    • The FOR UPDATE addition
    Furthermore, all Native SQL statements bypass the buffer.
    Avoid Reading Data Repeatedly
    If you avoid reading the same data repeatedly, you both reduce the number of database accesses and reduce the load on the database. Furthermore, a "dirty read" may occur with database tables other than Oracle. This means that the second time you read data from a database table, it may be different from the data read the first time. To ensure that the data in your program is consistent, you should read it once only and then store it in an internal table.
    Sort Data in Your ABAP Programs
    The ORDER BY clause in the SELECT statement is not necessarily optimized by the database system or executed with the correct index. This can result in increased runtime costs. You should only use ORDER BY if the database sort uses the same index with which the table is read. To find out which index the system uses, use SQL Trace in the ABAP Workbench Performance Trace. If the indexes are not the same, it is more efficient to read the data into an internal table or extract and sort it in the ABAP program using the SORT statement.
    Use Logical Databases
    SAP supplies logical databases for all applications. A logical database is an ABAP program that decouples Open SQL statements from application programs. They are optimized for the best possible database performance. However, it is important that you use the right logical database. The hierarchy of the data you want to read must reflect the structure of the logical database, otherwise, they can have a negative effect on performance. For example, if you want to read data from a table right at the bottom of the hierarchy of the logical database, it has to read at least the key fields of all tables above it in the hierarchy. In this case, it is more efficient to use a SELECT statement.
    Work Processes
    Work processes execute the individual dialog steps in R/3 applications. The next two sections describe firstly the structure of a work process, and secondly the different types of work process in the R/3 System.
    Structure of a Work Process
    Work processes execute the dialog steps of application programs. They are components of an application server. The following diagram shows the components of a work process:
    Each work process contains two software processors and a database interface.
    Screen Processor
    In R/3 application programming, there is a difference between user interaction and processing logic. From a programming point of view, user interaction is controlled by screens. As well as the actual input mask, a screen also consists of flow logic. The screen flow logic controls a large part of the user interaction. The R/3 Basis system contains a special language for programming screen flow logic. The screen processor executes the screen flow logic. Via the dispatcher, it takes over the responsibility for communication between the work process and the SAPgui, calls modules in the flow logic, and ensures that the field contents are transferred from the screen to the flow logic.
    ABAP Processor
    The actual processing logic of an application program is written in ABAP - SAP’s own programming language. The ABAP processor executes the processing logic of the application program, and communicates with the database interface. The screen processor tells the ABAP processor which module of the screen flow logic should be processed next. The following screen illustrates the interaction between the screen and the ABAP processors when an application program is running.
    Database Interface
    The database interface provides the following services:
    • Establishing and terminating connections between the work process and the database.
    • Access to database tables
    • Access to R/3 Repository objects (ABAP programs, screens and so on)
    • Access to catalog information (ABAP Dictionary)
    • Controlling transactions (commit and rollback handling)
    • Table buffer administration on the application server.
    The following diagram shows the individual components of the database interface:
    The diagram shows that there are two different ways of accessing databases: Open SQL and Native SQL.
    Open SQL statements are a subset of Standard SQL that is fully integrated in ABAP. They allow you to access data irrespective of the database system that the R/3 installation is using. Open SQL consists of the Data Manipulation Language (DML) part of Standard SQL; in other words, it allows you to read (SELECT) and change (INSERT, UPDATE, DELETE) data. The tasks of the Data Definition Language (DDL) and Data Control Language (DCL) parts of Standard SQL are performed in the R/3 System by the ABAP Dictionary and the authorization system. These provide a unified range of functions, irrespective of database, and also contain functions beyond those offered by the various database systems.
    Open SQL also goes beyond Standard SQL to provide statements that, in conjunction with other ABAP constructions, can simplify or speed up database access. It also allows you to buffer certain tables on the application server, saving excessive database access. In this case, the database interface is responsible for comparing the buffer with the database. Buffers are partly stored in the working memory of the current work process, and partly in the shared memory for all work processes on an application server. Where an R/3 System is distributed across more than one application server, the data in the various buffers is synchronized at set intervals by the buffer management. When buffering the database, you must remember that data in the buffer is not always up to date. For this reason, you should only use the buffer for data which does not often change.
    Native SQL is only loosely integrated into ABAP, and allows access to all of the functions contained in the programming interface of the respective database system. Unlike Open SQL statements, Native SQL statements are not checked and converted, but instead are sent directly to the database system. Programs that use Native SQL are specific to the database system for which they were written. R/3 applications contain as little Native SQL as possible. In fact, it is only used in a few Basis components (for example, to create or change table definitions in the ABAP Dictionary).
    The database-dependent layer in the diagram serves to hide the differences between database systems from the rest of the database interface. You choose the appropriate layer when you install the Basis system. Thanks to the standardization of SQL, the differences in the syntax of statements are very slight. However, the semantics and behavior of the statements have not been fully standardized, and the differences in these areas can be greater. When you use Native SQL, the function of the database-dependent layer is minimal.
    Types of Work Process
    Although all work processes contain the components described above, they can still be divided into different types. The type of a work process determines the kind of task for which it is responsible in the application server. It does not specify a particular set of technical attributes. The individual tasks are distributed to the work processes by the dispatcher.
    Before you start your R/3 System, you determine how many work processes it will have, and what their types will be. The dispatcher starts the work processes and only assigns them tasks that correspond to their type. This means that you can distribute work process types to optimize the use of the resources on your application servers.
    The following diagram shows again the structure of an application server, but this time, includes the various possible work process types:
    The various work processes are described briefly below. Other parts of this documentation describe the individual components of the application server and the R/3 System in more detail.
    Dialog Work Process
    Dialog work processes deal with requests from an active user to execute dialog steps.
    Update Work Process
    Update work processes execute database update requests. Update requests are part of an SAP LUW that bundle the database operations resulting from the dialog in a database LUW for processing in the background.
    Background Work Process
    Background work processes process programs that can be executed without user interaction (background jobs).
    Enqueue Work Process
    The enqueue work process administers a lock table in the shared memory area. The lock table contains the logical database locks for the R/3 System and is an important part of the SAP LUW concept. In an R/3 System, you may only have one lock table. You may therefore also only have one application server with enqueue work processes.
    Spool Work Process
    The spool work process passes sequential datasets to a printer or to optical archiving. Each application server may contain several spool work process.
    The services offered by an application server are determined by the types of its work processes. One application server may, of course, have more than one function. For example, it may be both a dialog server and the enqueue server, if it has several dialog work processes and an enqueue work process.
    You can use the system administration functions to switch a work process between dialog and background modes while the system is still running. This allows you, for example, to switch an R/3 System between day and night operation, where you have more dialog than background work processes during the day, and the other way around during the night.
    ABAP Application Server
    R/3 programs run on application servers. They are an important component of the R/3 System. The following sections describe application servers in more detail.
    Structure of an ABAP Application Server
    The application layer of an R/3 System is made up of the application servers and the message server. Application programs in an R/3 System are run on application servers. The application servers communicate with the presentation components, the database, and also with each other, using the message server.
    The following diagram shows the structure of an application server:
    The individual components are:
    Work Processes
    An application server contains work processes, which are components that can run an application. Work processes are components that are able to execute an application (that is, one dialog step each). Each work process is linked to a memory area containing the context of the application being run. The context contains the current data for the application program. This needs to be available in each dialog step. Further information about the different types of work process is contained later on in this documentation.
    Dispatcher
    Each application server contains a dispatcher. The dispatcher is the link between the work processes and the users logged onto the application server. Its task is to receive requests for dialog steps from the SAP GUI and direct them to a free work process. In the same way, it directs screen output resulting from the dialog step back to the appropriate user.
    Gateway
    Each application server contains a gateway. This is the interface for the R/3 communication protocols (RFC, CPI/C). It can communicate with other application servers in the same R/3 System, with other R/3 Systems, with R/2 Systems, or with non-SAP systems.
    The application server structure as described here aids the performance and scalability of the entire R/3 System. The fixed number of work processes and dispatching of dialog steps leads to optimal memory use, since it means that certain components and the memory areas of a work process are application-independent and reusable. The fact that the individual work processes work independently makes them suitable for a multi-processor architecture. The methods used in the dispatcher to distribute tasks to work processes are discussed more closely in the section Dispatching Dialog Steps.
    Shared Memory
    All of the work processes on an application server use a common main memory area called shared memory to save contexts or to buffer constant data locally.
    The resources that all work processes use (such as programs and table contents) are contained in shared memory. Memory management in the R/3 System ensures that the work processes always address the correct context, that is the data relevant to the current state of the program that is running. A mapping process projects the required context for a dialog step from shared memory into the address of the relevant work process. This reduces the actual copying to a minimum.
    Local buffering of data in the shared memory of the application server reduces the number of database reads required. This reduces access times for application programs considerably. For optimal use of the buffer, you can concentrate individual applications (financial accounting, logistics, human resources) into separate application server groups.
    Database Connection
    When you start up an R/3 System, each application server registers its work processes with the database layer, and receives a single dedicated channel for each. While the system is running, each work process is a user (client) of the database system (server). You cannot change the work process registration while the system is running. Neither can you reassign a database channel from one work process to another. For this reason, a work process can only make database changes within a single database logical unit of work (LUW). A database LUW is an inseparable sequence of database operations. This has important consequences for the programming model explained below.
    Dispatching Dialog Steps
    The number of users logged onto an application server is often many times greater than the number of available work processes. Furthermore, it is not restricted by the R/3 system architecture. Furthermore, each user can run several applications at once. The dispatcher has the important task of distributing all dialog steps among the work processes on the application server.
    The following diagram is an example of how this might happen:
    1. The dispatcher receives the request to execute a dialog step from user 1 and directs it to work process 1, which happens to be free. The work process addresses the context of the application program (in shared memory) and executes the dialog step. It then becomes free again.
    2. The dispatcher receives the request to execute a dialog step from user 2 and directs it to work process 1, which is now free again. The work process executes the dialog step as in step 1.
    3. While work process 1 is still working, the dispatcher receives a further request from user 1 and directs it to work process 2, which is free.
    4. After work processes 1 and 2 have finished processing their dialog steps, the dispatcher receives another request from user 1 and directs it to work process 1, which is free again.
    5. While work process 1 is still working, the dispatcher receives a further request from user 2 and directs it to work process 2, which is free.
    From this example, we can see that:
    • A dialog step from a program is assigned to a single work process for execution.
    • The individual dialog steps of a program can be executed on different work processes, and the program context must be addressed for each new work process.
    • A work process can execute dialog steps of different programs from different users.
    The example does not show that the dispatcher tries to distribute the requests to the work processes such that the same work process is used as often as possible for the successive dialog steps in an application. This is useful, since it saves the program context having to be addressed each time a dialog step is executed.
    Dispatching and the Programming Model
    The separation of application and presentation layer made it necessary to split up application programs into dialog steps. This, and the fact that dialog steps are dispatched to individual work processes, has had important consequences for the programming model.
    As mentioned above, a work process can only make database changes within a single database logical unit of work (LUW). A database LUW is an inseparable sequence of database operations. The contents of the database must be consistent at its beginning and end. The beginning and end of a database LUW are defined by a commit command to the database system (database commit). During a database LUW, that is, between two database commits, the database system itself ensures consistency within the database. In other words, it takes over tasks such as locking database entries while they are being edited, or restoring the old data (rollback) if a step terminates in an error.
    A typical SAP application program extends over several screens and the corresponding dialog steps. The user requests database changes on the individual screens that should lead to the database being consistent once the screens have all been processed. However, the individual dialog steps run on different work processes, and a single work process can process dialog steps from other applications. It is clear that two or more independent applications whose dialog steps happen to be processed on the same work process cannot be allowed to work with the same database LUW.
    Consequently, a work process must open a separate database LUW for each dialog step. The work process sends a commit command (database commit) to the database at the end of each dialog step in which it makes database changes. These commit commands are called implicit database commits, since they are not explicitly written into the application program.
    These implicit database commits mean that a database LUW can be kept open for a maximum of one dialog step. This leads to a considerable reduction in database load, serialization, and deadlocks, and enables a large number of users to use the same system.
    However, the question now arises of how this method (1 dialog step = 1 database LUW) can be reconciled with the demand to make commits and rollbacks dependent on the logical flow of the application program instead of the technical distribution of dialog steps. Database update requests that depend on one another form logical units in the program that extend over more than one dialog step. The database changes associated with these logical units must be executed together and must also be able to be undone together.
    The SAP programming model contains a series of bundling techniques that allow you to group database updates together in logical units. The section of an R/3 application program that bundles a set of logically-associated database operations is called an SAP LUW. Unlike a database LUW, a SAP LUW includes all of the dialog steps in a logical unit, including the database update.
    Happy Reading...
    shibu

  • Can I connect my Airport Extreme Time Capsule via ethernet to another router (non-Apple)?

    I've been trying to figure this out for a few hours and have gotten nowhere. I have an Archer C7 AC1750 router set up in my office, connected to my Zoom 5341 DOCSIS 3.0 Modem; this has been my main router and has worked fine. I have moved some things around and now have my PS3 and PS4 in my master bedroom but can no longer hook them up via ethernet to the Archer C7. I have run ethernet through the attic into the master bedroom and want to use my Airport Extreme Time Capsule as a way to hook up the consoles via ethernet. If I can use the Airport Extreme to extend my wireless network back to the bedrooms that is even better, although that is an afterthought.
    I am not sure what the settings need to be to make this happen. I have searched and tried a number of things but have not found a working solution.
    Any help would be greatly appreciated.

    Please start over with a default reset on the Time Capsule. This will not affect any of the stored data that you might have on the drive. You can use the same device name and password that you used before if you wish.
    Power up the Time Capsule for a few minutes. Then hold in the reset button firmly for 10 seconds and release. Allow a full minute for the Time Capsule to restart to a slow, blinking amber light.
    Make sure that the Ethernet cable connection from the Archer router connects to the WAN "O" port on the Time Capsule
    Open up AirPort Utility
    Click on Other WiFi Devices
    Click on Time Capsule xxxxxx
    AirPort Utility will suggest a setup, which you want to ignore
    Instead, click the Other Options button
    Select the Create a new wireless network setting and click Next
    In the Network Name box, enter the exact name of your Archer wireless network
    In the Base Station name box, enter a name that you want to use for the Time Capsule device
    Uncheck the box to use a single password
    In the Network Password box, enter the password for the Archer wireless network
    Verify on the next line
    In the Base Staion box, enter a password that you want to use as a device password for the Time Capsule
    Verify on the next line
    Click Next and wait while the AirPort Utility creates a network
    Ignore the step about unplugging the modem and click Next
    Do not enable the Guest Network option and click Next
    Wait while the network is being set up. When you see the message that the wireless network is available, click Done
    The Time Capsule will now appear in AirPort Utility with a blinking amber light
    Click on the Time Capsule icon, and then click on Edit in the next small box that appears
    Click the Network tab at the top of the window
    Change the setting for Router Mode from DHCP and NAT to "Off (Bridge Mode)"
    Click Update at the lower right and click Continue
    Wait a full minute for the Time Capsule to restart and you should have a green light
    It would be an excellent idea to power off both the Time Capsule and Archer router now, wait a minute, then start the Archer router and let it run a minute. Then, start the Time Capsule up and give it a minute
    You should be all set. The Ethernet ports on the Time Capsule are now operable and the wireless network has been extended using AES encryption.

  • Printing 20" iMac to 24" iMac via ethernet and router issue

    Hi there, I hope someone can help me.
    We have in our office a 20" iMac that my boss uses and a 24" iMac that I use. the 24" is connected to an ADSL2 router via ethernet, which in turn is connected to an HP 2200dn also via ethernet.
    I have no problem printing from the 24" however, I can't seem to get the 20" to work. The drivers are the same and apparently the latest, and the print file does reach the printer, but upon reaching the printer it errors out... I've checked everything is set to sharing etc... but it still won't seem to work.
    Anyway - I'm hoping someone out there knows either why it isn't working or what needs to happen for it to work...
    Many thanks.
    Regards
    Piers

    HI Piers,
    Your profile indicates you are running 10.5.1 ?? If this is correct click the Apple Menu/Software Updates. Keeping your system software up to date can help.
    Try repairing disk permissions for the printer issue.
    Quit any open applications/programs. Launch Disk Utility. (Applications/Utilities) Select MacintoshHD in the panel on the left, select the FirstAid tab. Click: Repair Disk Permissions. When it's finished from the Menu Bar, Quit Disk Utility and restart your Mac. If you see a long list of "messages" in the permissions window, it's ok. That can be ignored. As long as you see, "Permissions Repair Complete" when it's finished... you're done. Quit Disk Utility and restart your Mac.
    Also, try turning off both iMacs and peripherals. Wait about 5 minutes and restart the iMacs and the printers.
    Carolyn

Maybe you are looking for

  • Can't print to remote printer

    I currently have a printer connected to my desktop as server. I use this with other computers on the local network with lprng on all. On the clients I have a simple printcap pointing to the printer on the desktop. I'm currently running Arch on a lapt

  • Problems with simple picture gallery

    I've got a website project where the client wanted a picture gallery. I don't really do much with Flash so I went on the web and found a tutorial on how to get what I want. Problem is that the instructions I followed are fairly old so I couldn't expo

  • Olympus E-M5 ISO100のRAW現像

    Olympus E-M5でISO 100が新しいファームウェア(Ver. 2.0)でサポートされました. ISO 100で撮影したRAWファイルをlightroom 5.3で読み込むと.かなり明るく読み込まれてしまいます. 明るさの程度はEV+1.0程度です. 他社のRAW現像ソフト(DxO Optics Pro 9.1.3)ではこういう事象が発生していません. ISO 200以上では問題ないように思います. DNGへ変換してから読み込んでも同様にかなり明るくなってしまいます. 対応方法がありま

  • I try to buy the music but is fall but i get a call from my bank say is be charge and because I try twice so it's charge twice too

    I try to buy the music from itunes store but is fall but I get a call from my bank say it's be charge and because I try twice so it's charge twice, too please help my                 by Sylvia

  • Missing Option in DHCP Network Wizard

    When I tried the DHCP Address Wizard, part of the DHCP Manager, there's a "Generate Client Names" option. It looks like it would be convenient, but it's grayed out. Are there any plans to update the package to make it work?