                          INVISIBLE LAN UPDATE
                              VERSION 3.43

                Copyright 1993 Invisible Software, Inc.



       [See GUIDE.TXT for a list of all manuals and text files.]



     This file describes new features added since the last printing of
the Invisible LAN instruction manual.



------------------------------------------------------------------------



TABLE OF CONTENTS:

 1.  Technical Support for Invisible LAN
 2.  Invisible Control For Windows
 3.  Windows Print Spooler Demon
 4.  Using Hyper-Extended Memory for Ultra Server
    4.1.  How to Determine What Memory Ultra Server Can Detect
    4.2.  Setting the Ultra Server Memory Usage Parameters
       4.2.1.  MAXIMUM EXTENDED
       4.2.2.  HYPER-EXTENDED START and HYPER-EXTENDED SIZE
 5.  New Procedure for Installing Invisible LAN Icons in Windows
 6.  Windows For Workgroups -- Getting Started
    6.1.  Installing Drivers Using Setup
    6.2.  Installing Drivers Using Control Panel
    6.3.  Checking CONFIG.SYS
    6.4.  Special Requirements for Servers
    6.5.  Starting Windows For Workgroups
 7.  Using CD-ROM with Invisible LAN
    7.1.  Installing MSCDEX
    7.2.  Accessing CD-ROMs
    7.3.  Technical Information



-----------------------------------------------------------------------



1.  TECHNICAL SUPPORT FOR INVISIBLE LAN


     Registered owners of Invisible LAN may obtain technical support by
calling Invisible Software at (407) 260-5007.  Our technical support
staff is on duty Monday through Thursday from 8:30 AM to 8:00 PM Eastern
Time, and Friday from 8:30 AM to 7:00 PM Eastern Time.

     Technical support is also available through our bulletin board
system at (415) 345-5509.  Set your modem to 300, 1200, 2400, or 9600
bits per second, 8 data bits, 1 stop bit, no parity.  The bulletin board
is normally available 24 hours a day.



-----------------------------------------------------------------------



2.  INVISIBLE CONTROL FOR WINDOWS


     Invisible LAN includes a new program called Invisible Control For
Windows.

     Invisible Control For Windows (ICW) is a remote control program for
your network.  From just one computer running Windows, you can take over
control of any or all of the other computers in the network.  Each
computer that you are controlling appears within a "monitor window." The
monitor window lets you view the computer's screen and enter keystrokes,
exactly as if you were sitting right in front of it.

     ICW is useful for any of the following functions:

     *  Starting and monitoring tasks on other computers.

     *  Remote modem access.

     *  Remote software configuration.

     *  User training and classroom instruction.

     *  Giving multiple users access to Windows virtual machines.

     Complete instructions for ICW are included in the text file
ICW.TXT.  Please refer to ICW.TXT for directions on installing and
running ICW.



-----------------------------------------------------------------------



3.  WINDOWS PRINT SPOOLER DEMON


     If your computer is configured as a network print server, and you
run Windows in 386 enhanced mode, you may find that the network print
spooler sends data to the printer very slowly.  In fact, depending on
which Windows applications you use, the network print spooler may not
send any data to the printer at all.  The most common situation in which
this occurs is if you run WordPerfect For Windows.

     The problem occurs when the Windows application uses up all of the
computer's time, leaving no time for the print spooler to operate.

     To correct this situation, we have developed a print spooler demon
program called PSDEMON.EXE.  It is called a "demon" program because it
is a Windows program that runs in background.  PSDEMON gets a share of
the computer's time, and gives its time to the network print spooler so
that print jobs can be printed.

     If you find that you need PSDEMON, we recommend that you install it
so that PSDEMON is started automatically whenever you start Windows.
There are two ways to do this:

     *  If you are using Windows 3.1, simply install PSDEMON.EXE in the
        StartUp group of Program Manager.

     *  Alternatively, you can place the following in your WIN.INI file:

                [windows]
                load = PSDEMON.EXE

     You can also start PSDEMON manually by clicking on the Print Demon
icon in Program Manager (see section 5 below for instructions on
installing Invisible LAN icons in Program Manager).

     Once PSDEMON is started, it appears as an icon at the bottom of the
screen.  You cannot open PSDEMON up into a window.

     PSDEMON runs in background, and does not interfere with any other
Windows programs.  Since PSDEMON only executes when other Windows
programs are idle, it should not slow down your Windows applications.

     If you want to close PSDEMON, you can click on the PSDEMON icon at
the bottom of the screen to display the system menu, and then choose
Close.



-----------------------------------------------------------------------



4.  USING HYPER-EXTENDED MEMORY FOR ULTRA SERVER


     There have been some changes in the way Ultra Server handles
hyper-extended memory.  (Hyper-extended memory is memory that is located
above the 16M boundary.)

     Ultra Server now attempts to detect hyper-extended memory
automatically.  However, the method used does not work on all computers.
Also, Ultra Server can detect at most the first 49M of hyper-extended
memory (that is, memory below the 65M boundary).

     In the advanced section of SETUP30, there are parameters you can
use to specify the start and size of hyper-extended memory.  If Ultra
Server can detect your hyper-extended memory, then you don't need to use
these parameters (i.e., leave the hyper-extended size set to zero).


4.1.  HOW TO DETERMINE WHAT MEMORY ULTRA SERVER CAN DETECT


     You can use the SHADOW program to see how much hyper-extended
memory Ultra Server will be able to detect.  With no network software
running, give the command

                SHADOW /E

     The program displays a message similar to this:

                Extended memory size:  xxxxxK

     In the message, xxxxx indicates the total amount of extended and
hyper-extended memory that Ultra Server can detect.  The following table
shows some typical values:


SHADOW          Amount of Hyper-Extended            Start of Undetected
Display       Memory Detected Automatically       Hyper-Extended Memory
-------       -----------------------------       ---------------------
15360K                      0M                             16M
19456K                      4M                             20M
23552K                      8M                             24M
27648K                     12M                             28M
31744K                     16M                             32M
35840K                     20M                             36M
39936K                     24M                             40M
44032K                     28M                             44M
48128K                     32M                             48M
52224K                     36M                             52M
56320K                     40M                             56M
60416K                     44M                             60M
64512K                     48M                             64M
65535K                     49M                             65M


4.2.  SETTING THE ULTRA SERVER MEMORY USAGE PARAMETERS


     In the advanced section of SETUP30, there are three parameters that
specify how Ultra Server uses memory:  MAXIMUM EXTENDED, HYPER-EXTENDED
START, and HYPER-EXTENDED SIZE.


4.2.1.  MAXIMUM EXTENDED


     MAXIMUM EXTENDED controls the usage of all the memory that Ultra
Server can detect automatically, regardless of whether it is above or
below the 16M boundary.  If you leave the parameter blank, then Ultra
Server uses all the memory that it can detect.

     Example 1:  Suppose that SHADOW /E returns 31744K.  This means that
Ultra Server can detect 15M of extended memory and 16M of hyper-extended
memory, for a total of 31M.  Let's say that you specify a MAXIMUM
EXTENDED of 24.  Then Ultra Server will use 24M of the memory that it
can detect, leaving 7M free.  On the other hand, if you leave MAXIMUM
EXTENDED blank, then Ultra Server will use the entire 31M.


4.2.2.  HYPER-EXTENDED START AND HYPER-EXTENDED SIZE


     HYPER-EXTENDED START and HYPER-EXTENDED SIZE specify a region of
hyper-extended memory that Ultra Server can use.  This is in addition to
whatever hyper-extended memory Ultra Server can detect automatically.
The region must not overlap with the hyper-extended memory that can be
detected automatically.

     Example 2:  Suppose that your computer has a total of 48M RAM,
which means it has 1M of DOS memory, 15M of extended memory, and 32M of
hyper-extended memory.  Suppose that SHADOW /E returns 15360K.  This
means that Ultra Server cannot detect any of your hyper-extended memory.
In this case, you should set HYPER-EXTENDED START to 16 and
HYPER-EXTENDED SIZE to 32.  Notice that the far right-hand column of the
table above gives you the value to use for HYPER-EXTENDED START.

     Example 3:  Suppose that your computer has a total of 128M RAM,
which means it has 1M of DOS memory, 15M of extended memory, and 112M of
hyper-extended memory.  Suppose that SHADOW /E returns 65535K.  This
means that Ultra Server can only detect the first 49M of hyper-extended
memory.  In this case, you should set HYPER-EXTENDED START to 65 and
HYPER-EXTENDED SIZE to 63.  Notice again that the right-hand column of
the table gives you the value to use for HYPER-EXTENDED START.  The
value for HYPER-EXTENDED SIZE is the amount of hyper-extended memory you
have, minus the amount that is detected automatically (63 = 112 - 49).



-----------------------------------------------------------------------



5.  NEW PROCEDURE FOR INSTALLING INVISIBLE LAN ICONS IN WINDOWS


     There is a new program called SETUPW that automatically installs
all the Invisible LAN icons in Windows.  SETUPW replaces the manual icon
installation procedure described in the printed instruction manuals.

     To install the Invisible LAN icons:

     1.  Activate Program Manager.

     2.  Select File on the menu bar, and then select Run on the
         pull-down menu.

     3.  Type "SETUPW" and then press Enter.

     This procedure assumes that SETUPW.EXE is located in your DOS PATH.
When you run SETUPW, it creates a Program Manager group called
"Invisible LAN" and automatically installs all the Invisible LAN icons
in the group.

     The Invisible LAN group includes the following eight icons:

     *  Invisible LAN Manager -- Starts the Invisible LAN Network
        Manager.  Refer to the Windows User Manual for details on the
        Network Manager.

     *  Drive Mappings -- Displays and changes your Invisible LAN drive
        mappings.

     *  Printer Mappings -- Displays and changes your Invisible LAN
        printer mappings.

     *  Invisible Control -- Start the Invisible Control For Windows
        (ICW) viewer program.  Refer to ICW.TXT for details on ICW.

     *  Invisible LAN Setup -- Starts the Invisible LAN Setup program.
        This is the DOS-based SETUP30 program.  Refer to the
        Installation Manual for details on SETUP30.

     *  Print Demon -- Starts the print spooler demon program.  Refer to
        section 3 above for details on the print spooler demon.

     *  Invisible LAN Help -- Displays the Invisible LAN help file,
        which includes a complete reference for Invisible LAN.

     *  Invisible Control Help -- Displays the help file for Invisible
        Control For Windows (ICW).



-----------------------------------------------------------------------



6.  WINDOWS FOR WORKGROUPS -- GETTING STARTED


     Invisible LAN now supports Windows For Workgroups.

     Windows For Workgroups is a special version of Microsoft Windows
that includes enhanced networking features.  Workgroups has built-in
peer-to-peer resource sharing, a mail system, a scheduling application,
and network DDE to allow applications to exchange data across the
network.

     This section tells you how to get Workgroups running on Invisible
LAN as quickly as possible.  The text file WORKGRP.TXT contains
additional infomation on installing and operating Workgroups.

     The procedures described in this section assume that:

     1. You have already installed Invisible LAN on your hard disk, and
        configured it to run on your system.

     2. You are using Ethernet network hardware.

     3. You are not using an NDIS driver (in other words, you did not
        select "NDIS" as the Network Hardware Type in SETUP30).

     If you are not using Ethernet hardware, refer to WORKGRP.TXT for
installation instructions.  Similarly, if you need to use an NDIS
driver, refer to WORKGRP.TXT for instructions.

     The installation can be performed using Windows Setup, or Windows
Control Panel.  If you are installing Workgroups for the first time, you
use Windows Setup.  If you have already installed Workgroups, and you
want to add support for Invisible LAN, you use Windows Control Panel.
These two procedures are described separately in sections 6.1 and 6.2
below.

     After installing the drivers, you may have to make some final
manual changes to the configuration.  These are described in sections
6.3 and 6.4.




6.1.  INSTALLING DRIVERS USING SETUP


     If you are installing Windows For Workgroups for the first time,
you use the Windows Setup program.  Proceed as follows:

     1. Proceed normally with Setup until the Add Network Adapter dialog
        box appears.

     2. Select "TransBIOS Ethernet Driver" from the list of adapters,
        and then choose OK.

        If "TransBIOS Ethernet Driver" is not included in the list of
        adapters, then select "Unlisted or Updated Adapter," choose OK,
        and type the directory where the Invisible LAN files are
        installed (usually C:\NET30).

        Workgroups displays the Settings dialog box.

     3. Choose Protocols.

        Workgroups displays the Protocols dialog box.

     4. Select "TransBIOS Protocol" from the list of available
        protocols, and then choose Add.

        If "TransBIOS Protocol" is not included in the list of
        protocols, then select "Unlisted or Updated Protocol," choose
        Add, and type the directory where the Invisible LAN files are
        installed (usually C:\NET30).

        Workgroups lists both "TransBIOS Protocol" and "Microsoft
        NETBEUI" in the list of protocols in use.

     5. Choose OK to exit from the Protocols dialog box.  Then choose OK
        to exit from the Settings dialog box.  Then choose Continue to
        exit from the Network Adapters dialog box.

        Workgroups displays the Compatible Networks dialog box.

     6. Select "Invisible LAN" from the list of available network types,
        and then choose Add.

        If "Invisible LAN" is not included in the list of networks, then
        select "Unlisted or Updated Network," choose Add, and type the
        directory where the Invisible LAN files are installed (usually
        C:\NET30).

        Workgroups lists "Invisible LAN" in the list of other networks
        in use.

     7. Choose OK to exit from the Compatible Networks dialog box.

     8. Continue with Setup normally.




6.2.  INSTALLING DRIVERS USING CONTROL PANEL


     Use Control Panel if you have already installed Windows For
Workgroups, and you want to add support for Invisible LAN.  Proceed as
follows:

     1. Start Control Panel by double-clicking on the Control Panel icon
        in Program Manager.  Then double-click on the Network icon in
        Control Panel.

        Workgroups displays the Network dialog box.

     2. Choose Adapters from the button bar.

        Workgroups displays the Network Adapters dialog box.

     3. If there is an adapter shown in the dialog box, choose Remove.

        Workgroups removes the adapter.  There should be no adapters
        shown in the dialog box.

     4. Choose Add.

        Workgroups displays the Add Adapter dialog box, which contains
        a list of supported adapters.

     5. Select "TransBIOS Ethernet Driver" from the list of adapters,
        and then choose OK.

        If "TransBIOS Ethernet Driver" is not included in the list of
        adapters, then select "Unlisted or Updated Adapter," choose OK,
        and type the directory where the Invisible LAN files are
        installed (usually C:\NET30).

        Workgroups displays the Settings dialog box.

     6. Choose Protocols.

        Workgroups displays the Protocols dialog box.

     7. Select "TransBIOS Protocol" from the list of available
        protocols, and then choose Add.

        If "TransBIOS Protocol" is not included in the list of
        protocols, then select "Unlisted or Updated Protocol," choose
        Add, and type the directory where the Invisible LAN files are
        installed (usually C:\NET30).

        Workgroups lists both "TransBIOS Protocol" and "Microsoft
        NETBEUI" in the list of protocols in use.

     8. Choose OK to exit from the Protocols dialog box.  Then choose OK
        to exit from the Settings dialog box.  Then choose Close to exit
        from the Network Adapters dialog box.

     9. Choose Networks from the button bar.

        Workgroups displays the Compatible Networks dialog box.

    10. Select "Invisible LAN" from the list of available network types,
        and then choose Add.

        If "Invisible LAN" is not included in the list of networks, then
        select "Unlisted or Updated Network," choose Add, and type the
        directory where the Invisible LAN files are installed (usually
        C:\NET30).

        Workgroups lists "Invisible LAN" in the list of other networks
        in use.

    11. Choose OK to exit from the Compatible Networks dialog box.

    12. Choose OK to exit from the Network dialog box.

        At this point, Workgroups informs you that you must reboot your
        computer for the new settings to take effect.




6.3.  CHECKING CONFIG.SYS


     Invisible LAN includes two device drivers that are installed in
CONFIG.SYS.  They are called CACHE30.SYS and N30DEV.SYS.  CACHE30.SYS
must be the very first device driver listed in CONFIG.SYS, and
N30DEV.SYS must be the very last device driver listed in CONFIG.SYS.

     When you install network drivers in Windows For Workgroups, the
CONFIG.SYS file is modified.  Therefore, after completing the network
driver installation, you need to check your CONFIG.SYS file to make sure
that CACHE30.SYS is the first device driver listed, and N30DEV.SYS is
the last device driver listed.  If this is not the case, then you need
to do one of the following:

     *  Use a text editor to edit the CONFIG.SYS file so that
        CACHE30.SYS is the first device driver and N30DEV.SYS is the
        last device driver.

     *  Alternatively, run the SETUP30 program and select "Modify
        CONFIG.SYS" from the main menu.  SETUP30 automatically inserts
        the CACHE30.SYS and N30DEV.SYS device drivers in the correct
        order.




6.4.  SPECIAL REQUIREMENTS FOR SERVERS


     If your computer is an Invisible LAN file server, you need to edit
your SYSTEM.INI file.  The SYSTEM.INI file is a text file located in
your Windows directory (usually C:\WINDOWS).


     *  If your computer is a server, you must remove the following line
        from the SYSTEM.INI file:

                [386enh]
                device = vshare.386


     *  If your computer is a server, and you are using COM1 as a
        shared network printer, you must add the following line to the
        SYSTEM.INI file:

                [386enh]
                COM1AutoAssign = 0


     *  If your computer is a server, and you are using COM2 as a
        shared network printer, you must add the following line to the
        SYSTEM.INI file:

                [386enh]
                COM2AutoAssign = 0




6.5.  STARTING WINDOWS FOR WORKGROUPS


     You always need to start Invisible LAN before starting Windows For
Workgroups.  A typical start-up sequence is:

                NET30
                WIN


     When you start Workgroups for the first time, you should install
the Invisible LAN icons.  See section 5 above for instructions on
installing the icons.



-----------------------------------------------------------------------



7.  USING CD-ROM WITH INVISIBLE LAN


     Invisible LAN supports the use of CD-ROMs on the network.

     There is really nothing special you have to do to access CD-ROMs.
A CD-ROM is "just another disk".  If the file server has a CD-ROM, you
can establish a mapping to the CD-ROM and access its files in exactly
the same way as you would access the server's hard disk.




7.1.  INSTALLING MSCDEX


     MSCDEX is a program that allows DOS to access CD-ROMs.  You should
have received a copy of MSCDEX when you bought your CD-ROM drive.

     MSCDEX should always be installed before you start the network
software.  For example, a typical start-up sequence might be:

                MSCDEX
                NET30


     You only install MSCDEX on computers where the CD-ROM drives are
physically located.  Do not install MSCDEX on network workstations that
only access CD-ROMs through the network.

     EXAMPLE:  Suppose you have four computers:  A, B, C, and D.
Computer A is a server with two CD-ROM drives.  Computer B is a
workstation which also has its own CD-ROM drive.  Computers C and D are
workstations which do not have their own CD-ROM drives.

     In this example, you would install MSCDEX on computers A and B,
since these computers have their own CD-ROM drives.  You would not
install MSCDEX on computers C and D, since these computers do not have
CD-ROM drives physically attached to them.

     In this example, computer B can access the two CD-ROMs on computer
A, as well as accessing its own CD-ROM.  Computers C and D can also
access the two CD-ROMs on computer A.  Computers C and D cannot access
the CD-ROM on computer B, since computer B is not configured as a file
server.




7.2.  ACCESSING CD-ROMS


     With MSCDEX properly installed, you can access a server's CD-ROM in
exactly the same way as you would access a server's hard disk.
Specifically, you can use the MAP command, the MENU program, or the
Windows Network Manager to establish a drive mapping to the server's
CD-ROM.  Once the drive mapping is established, you can read the files
on the CD-ROM just as if it were attached to your own computer.

     For example, suppose that MIKE is a file server, and suppose that
MIKE's drive D: is a CD-ROM.  You can establish a drive mapping with
the following command:

                MAP  F:  \\MIKE\D:

     Now, you can use drive letter F: to read any of the files on
MIKE's CD-ROM.  For example, the command "DIR F:" would display a list
of the CD-ROM's disk directory.




7.3.  TECHNICAL INFORMATION


     The following information is for programmers or advanced users
working with CD-ROM on the network.

     All CD-ROM files are automatically marked as "shareable" files.
This means that any file on a CD-ROM can be accessed by any number of
users simultaneously.  There is no way for one user to prevent other
users from accessing the file.

     There is no record locking for files on CD-ROM.  This means that it
is not possible for one user to lock out other users.

     When you establish a drive mapping to a CD-ROM, the network
redirector automatically simulates the behavior of MSCDEX.  Therefore,
you can run programs that depend on MSCDEX, even though MSCDEX is not
installed in the workstation.  The redirector provides the following
MSCDEX functions:

        Function 1500 - Get Number of CD-ROM Drive Letters
        Function 1501 - Get CD-ROM Drive Device List
        Function 150B - CD-ROM Drive Check
        Function 150C - Get MSCDEX Version
        Function 150D - Get CD-ROM Drive Letters

     If the workstation has a local CD-ROM drive, the network redirector
cooperates with the local MSCDEX.  Function calls that pertain to
network CD-ROMs are handled by the redirector, while function calls that
pertain to local CD-ROMs are handled by the local MSCDEX.
