Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0 Manual page 17

Table of Contents

Advertisement

LPT
USB
TCP peer-to-peer
In a peer-to-peer operation, one computer is designated the master computer,
and the other is designated the slave computer.
Table 1-1
describes the possible Ghost.exe processes and the master/slave
relationships that exist within these processes.
Master and slave computers
Table 1-1
Action
Disk-to-disk clone
Back up disk to image file
Restore disk from image file
Partition-to-partition clone
Back up partition to image file
Restore partition from image file
Select which computer is the master (the computer from which you control the
connection) and which is the slave (the other computer participating in the
connection). All operator input must occur on the master computer.
You must have two Ghost boot packages with which to start both the master and
slave computers. You can create the boot packages using the Ghost Boot Wizard.
Note: You must create both boot packages in the same version of Symantec Ghost.
You cannot use one boot disk that was created in Symantec Ghost 8.0 and one
boot disk that was created in Symantec Ghost 11.5 in the same task.
Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
A parallel connection cable
A USB 1.1 cable
A network connection
Master
Computer containing
source disk
Computer containing
source disk
Computer containing
destination disk
Computer containing
source partition
Computer containing
source partition
Computer containing
destination partition
Slave
Computer containing
destination disk
Computer receiving
destination image file
Computer containing
source image file
Computer containing
destination partition
Computer receiving
destination image file
Computer containing
source image file
17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ghost imaging foundation 7.1

Table of Contents