Presumably, the TSM server Activity Log has been inspected for any session 
failure issues, such as too-short timeout values or preemption.  And, 
hopefully, there's nothing in the client OS which is clobbering network usage 
(such as bad anti-virus software).

Unusual possibilities that I could think of might be a network access point 
with a "rotary IP" scheme such that addresses are changing during the session, 
or maybe even a server erroneously using DHCP, whose lease has expired.  A 
general thing to watch out for on Linux servers is default settings in iptables 
firewall being too restrictive.  As Andy suggests, a network trace is in order, 
which you could pursue using client sessions which could start with basic 
queries over a goodly period of time, and then backup exercises.

   Richard Sims  at Boston University

Reply via email to