CS10110 Introduction to personal computer equipment

Size: px
Start display at page:

Download "CS10110 Introduction to personal computer equipment"

Transcription

1 CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating system is running; Use the command line to control those processes Create processes on other machines and investigate the behaviour of X windows in this situation; Observe user and kernel scheduling of processes and tasks in the MS Windows environment; Apply knowledge of virtual memory and paging gained in lectures to understand a variety of the more sophisticated measurable performance indicators provided by the Task Manager; Observe the effect of changing process priority; Investigate how poorly written software can impact on the performance of a system. Part 1 Unix Log in to Wiked/Minted and obtain a bash shell terminal window. In this worksheet I have used Minted. If you are logged on to Wiked (or any other machine) then substitute that machine name wherever I have used Minted. Controlling a process 1. Running a process is easy and you have done it before - simply type a command at the command prompt and press return! xclock or xeyes are suitable simple little applications. You will notice that the command prompt does not reappear. I'll assume from here you're using xclock, but you don't have to. 2. Stop the application process by using <CTRL> z. Watch your chosen application! Try obscuring and uncovering it with another window. What happens? 3. To prevent the shell from waiting for the application process to finish, add an ampersand (&) to the end of the command to place it in the background (xclock &) and allow the shell to continue running. Create another clock in the background now. Notice the information the shell returns to you (look at the man page for bash under the section entitled job control for details). You might want to run xman in the background as well to look at this) Finding out what processes are running. First try using the ps command without any options to see what processes are running under the shell you are using. Unfortunately there are different versions of the ps command around with different command options. Check the man pages for the system you are using and find out Page 1

2 how much memory and processor resources these processes are using. The l or the u options can be helpful, but there are lots of other useful ones. Look for the status column for each process. What is the difference in status between the stopped and working process you created above? Do this in a different terminal window so as not to confuse what you are doing. You could use an xterm & command to create another terminal (or you could use the GUI menus). There is a list of all the abbreviations for the process state codes on the man page. Also note that b or <CTRL> b allows you to go back a page when using man (or more) (Page Up and Page Down keys also work on some systems). You can also type /xxx to search for a phrase (i.e. xxx in this example). What about the stopped clock? There are several choices. You could either bring the clock to the foreground using the fg command, let it continue in the background (bg) or kill it off. Try bringing it to the foreground (check it starts again), stop it again, and then put it in the background. If a process is running in the foreground you can use <CTRL> c to kill the process. However if it is running in the background you need to tell the shell to kill off the process for you using the kill command. Get a process list (ps) and use this information (you need the process number) with the kill command to kill off one of your clocks now! Where are the rest of the processes So far you will probably only have seen the processes that are children of the shell you used the ps command from. Now use the ps command with appropriate options to find out: All of the processes you are running as a user All of the processes the system is running (hint: check man ps and take particular note of the e, f and u options) Is this what you expect there will probably be lots of xclocks, bash shells and ps processes being run by other users (especially if others are doing this worksheet at the same time as you)! Which processes are using the most cpu and memory resources? Don t forget that you can pipe output to more or even redirect it to a file if there is too much to see on the screen in one go or you want to keep it for later. Hopefully you remember the wc command? Type a command that will tell you how many processes you are running (use man wc if you've forgotten how to count lines). Now get a list of all processes running on the machine you are logged on to. Which process was created first when this machine was booted? Other than the date/time, how could you tell? Locate the first five Page 2

3 processes that were created. Do you recognise any of the important tasks the OS might be performing (think of io, swapping (virtual memory) etc). What is the oldest process that belongs to you? Is this what you expect? Watching things happen There are a number of ways of seeing how the system is performing dynamically. One of the simplest and most informative is the top command. It will display a variety of system statistics followed by the top most processor intensive activities. However, on the SUN computers, it is recommended that you use the command prstat instead. In fact, the top command is actually a symbolic link (see last practical) to prstat. Run the top command with no options and consider the number of processes running, the memory usage, load average for example. You might like to try this at some other time in the week when a CS10110 practical is not running and look at the difference. Please don t leave top running for a long time because it creates significant load on the machine. Remember this top command, if you're ever using your own UNIX/Linux PC, and it seems to be going slow. Maybe there's a bad process that needs to be killed. You can obtain the list of processes sorted in various ways, for example cpu usage, memory usage and runtime. Try these options and notice the difference in the results. Think about why this is so and remember the difficult job the scheduler/dispatcher is performing! Logging in to other machines So far we have only been considering processes running on a single machine. Of course there are many machines on the network and you will sometimes want to run a process on another machine. Reasons for this may be because the licence for some item of software may only exist on certain machines, the files you need to process are not locally accessible, or simply because there is more processing power available elsewhere. You remote login using the ssh (secure shell) command followed by the machine you want to log in to. You should have access to the information services machine called central. When you ssh to another machine for the first time, you will be asked if you want to trust this connection. Just say yes. This adds an appropriate key to the file ~/.ssh/known_hosts, so that if in the future another machine should try to pretend to be central (and, say, try to grab your password), it will fail. It also says to the ssh program that you trust the computer central.aber.ac.uk. Page 3

4 ssh to central and have a look at all the processes you are running on that machine. How many are there? and what are they? Ask a demonstrator if this is not what you expected. ssh is the preferred way of logging in to a remote machine; older machines may not have ssh. rlogin is an alternative method, as is telnet. These are safe enough to use within a closed network such as the university, but for more security you should use ssh. Running a process on a remote machine without logging in ssh <machine name>, followed by a command, will run a command on the remote machine, then exit. Try it; for example, try listing your central filestore from Wiked or Minted by typing: ssh central.aber.ac.uk ls Running Graphical programs on a remote machine Try running a graphical program on the central machine (eg xeyes or xterm) either in your remote login or as an ssh. You will probably get an error. The problem is that the remote machine does not know which X server to use. In other words it doesn t know which screen on the network the command should talk to! You can tell it by setting the DISPLAY environment variable. Environment variables hold useful information used by the shell and programs run from it. You can inspect all your environment variables under the bash shell by using the set command with no options. Look at the environment variables available in the shell running on central and also the shell running on wiked or minted. You might know (or make an educated guess) what information a few of the variables store for example PATH, MANPATH, and CLASSPATH. Are they the same? Returning to the display problem: you can set the display for the shell running on central once you know what it is called. Of course minted knows this so you can type echo $DISPLAY in a shell running on minted to show the value of the DISPLAY variable being used for the X server display you are sat in front of (this was set automatically when you logged in) and it should respond with something like: myserver.dcs.aber.ac.uk:0.0 (if it says something like localhost:0.0 then substitute wiked.dcs.aber.ac.uk or minted.dcs.aber.ac.uk in place of localhost). To set an environment variable in a bash shell use the export command. To achieve our aim of telling the shell on central where our Xserver is you can use export DISPLAY=myserver.dcs.aber.ac.uk:0.0 (substitute the correct display name and server name!) Page 4

5 Now try running a graphical application on central say, xclock, xeyes 1 or xterm and you should see it appear on your screen. Make sure you know what you have this is a process running on central and being displayed by an Xserver running on your machine. Minted is running a window environment manager to allow you to control the display, for example if you wish to use a menu. You can use ssh to run remote graphical applications but you must also make the Xserver known to the remote program. The easiest way of doing this is to give the display option to the remote program. All X Windows programs allow you to specify a display parameter, for example xterm display myserver:0.0 Now you can use this to start up a program on a remote machine using ssh and have the GUI displayed on your screen. Try it now. eg. something like: Minted~$ ssh central xclock display myserver.dcs.aber.ac.uk:0.0 (remember to substitute the server name and display name.) In case you are wondering about the 0:0 bit, it is included because it is possible for an X server to have several display devices you will only be likely to use one number 0! ssh actually has a smarter way of doing this: ssh -X (or ssh -Y if that fails which sometimes it does because of authentication) automatically sets an appropriate DISPLAY environment variable for you (though it may not look right to you just now!), so that the display comes to your screen. Try: ssh -X central xclock Part 2 - MS Windows Task manager Log into MS Windows and start the task manager. This is normally done by pressing <CTRL> <ALT> <DEL> and selecting Task manager. Initially you will see a list of the user programs that are running. This list may well be empty if you have just logged in. The other tabs on the Task manager show you process information and a graphical display of CPU and network activity. The system activity over time can be observed using the performance tab. Have a look at the information on the lower part of the task manager performance window. How much of the RAM is used by the kernel? To see something happen, start an application such as Word or PowerPoint and watch the system processor and memory activity. For something a bit more demanding try opening a multimedia player such as Windows media player (try running the sample movie for example). The task manager can separate the CPU time spent executing kernel code from the rest. Select View show kernel times. It is informative to consider the amount of time being used by the OS against the time spent 1 You might find xeyes doesn't work on central. It's on Minted and Wiked though; try it! Page 5

6 executing all other software. During the rest of this practical look back at these ratios as you put the system through some tests and think about what sort of OS activity the tasks might be causing to happen. Start by checking out Media Player it has to do a lot of calculations to decode a movie and therefore tends to generate a lot of non-kernel activity since the OS is not required to do the decoding. Compare this with other programs you will run later in the practical. Go to the list of tasks and quit any application programs you are running (except task manager!). Look at the process list and see how many processes are left and who owns them. These are all the programs that need to be running for the OS to operate (memory managers, schedulers etc), as well as all the other services that most users don t realise they need until they stop working such as network services, printer spooling, the file manager explorer etc. Which process is taking most of the CPU time? Bearing in mind that a microprocessor must continuously process instructions what do you think this process is doing? (Some processors have special sleep modes to save power but this is a special case) You can view a wide range of parameters associated with each process. In the process window the view Select columns tab will let you add new information to the list. Add page faults, paged pool and non paged pool to the list you will know already that pages are part of the virtual memory mechanism however you will need to check the help to find out exactly what Windows is telling you with these measures. Compare the amount of virtual memory your system has to access with the size of the RAM. Other measures include the numbers of interrupts caused by various sorts of I/O. These can be useful for identifying system performance problems and are worth knowing about. Look for the processes that seem to cause very many or very few of the various interrupts, try several different types of application and look at their processes, for example the windows calculator versus Media Player. Process Hierarchy You can use the task manager to forcibly end a process. This is useful when a process is no longer responding to the normal interface commands, for example if the program has crashed. The end process option in the task manager will only kill the process requested and not any children of this process. Since many programs create child processes, killing the parent will leave errant processes running on the system (often not visible on the GUI). Ending a task or a process tree will remove a hierarchy of processes. We can investigate the difference by noting that when you run commands from the command prompt they are separate processes, and the command prompt shell process waits for the child to finish. Run a command that does not complete without user input such as dir more Page 6

7 (run in a directory with lots of files in it) and find the cmd and more processes in the task manager. Kill the more process and observe what happens. Run the command again and kill the cmd process. Now what happens? What about when you let the more command finish? Repeat the experiment and use the end process tree instead of end process. What happens in both cases? Why? Priority Do not do this part of the practical on our UNIX machines! On the course web page under practicals you will find with this worksheet two short java programs called BusyCounter.java and Counter.java. Place these programs somewhere where you can compile them (D: or M:). You need to compile these two programs. If you know how to do this then go ahead then skip the next paragraph. Open a command prompt and change to the directory containing the two programs. To compile them into executable code type: javac BusyCounter.java javac Counter.java If all is well you will get no error messages and a command prompt. You can now run the busy counter program by typing java BusyCounter To investigate the effect of priority you need to run two processes that both require as much processor time as they can get. This is what BusyCounter does. Run BusyCounter and check the effect it has on CPU load and other system resources. Remember, you're running this program on a PC to which only you are logged in. Please don't run this program on a machine where others may also be logged in (such as Minted or Central)! Since the command prompt is an MS DOS emulator it does not allow you to run more than one command (process). Consequently there is no concept of background processes. You can run two command prompt windows however. Run the BusyCounter program in both command prompt windows and make sure you can see their output. Now find the processes in the task manager, get the task manager to display the priority of processes and consider the two BusyCounters (they should both be normal priority and taking a considerable chunk of the CPU). Try setting one of them to low priority (right click on the process) and observe the effects on the system resources being used by that process. Check also how it is performing on the screen. You can try other combinations of priority and see the effects. Have a look at the priority levels of the rest of the processes that are running. What do you notice about some of the system processes? Be careful if you change any of the priority settings for these because you can make the system act very strangely especially if you still have BusyCounter trying to take as much CPU as it can get! Page 7

8 A System Friendly Counter Quit all the counter programs and make sure the system load reduces to a low level. Now run the Counter program and observe its output and CPU load. Now run BusyCounter again and observe processor load. Is there any effect on Counter? Why should the two programs that perform the same task have such a different effect on the system? Use an editor to have a look at the source code determine the differences in the way the code operates. This is an extreme example, but it illustrates the importance of design decisions, especially for event driven programs that need to wait for (user) input and other events. System Calls in your program Try removing the line that includes the delay loop (for statement) from BusyCounter and recompile it. Run it and look at the difference on resource usage. Do any other processes increase their resource use? Why might this be? (hint: look at kernel usage). What happens if you minimize the DOS window to the taskbar. Can you explain these effects from your knowledge of operating systems? ais, November 2010 Updated: mfc5, September 2012 Page 8

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007 PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the

More information

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

Tutorial Guide to the IS Unix Service

Tutorial Guide to the IS Unix Service Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular

More information

Hands-On UNIX Exercise:

Hands-On UNIX Exercise: Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal

More information

MONITORING PERFORMANCE IN WINDOWS 7

MONITORING PERFORMANCE IN WINDOWS 7 MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful

More information

Remote Desktop In OpenSUSE 10.3

Remote Desktop In OpenSUSE 10.3 Only for dummies Remote Desktop In OpenSUSE 10.3 Remote access to Linux GUI Environment from Windows Client Tedy Tirtawidjaja 5/14/2008 In Microsoft Windows environment we know Remote Desktop application

More information

There s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh

There s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh To do this you need two pieces of software: (1) An X server running on your PC, and (2) A secure shell for making a network connection to a UNIX host. There s a variety of software that can be used, but

More information

HP-UX Essentials and Shell Programming Course Summary

HP-UX Essentials and Shell Programming Course Summary Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,

More information

Thirty Useful Unix Commands

Thirty Useful Unix Commands Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a

More information

MFCF Grad Session 2015

MFCF Grad Session 2015 MFCF Grad Session 2015 Agenda Introduction Help Centre and requests Dept. Grad reps Linux clusters using R with MPI Remote applications Future computing direction Technical question and answer period MFCF

More information

New Lab Intro to KDE Terminal Konsole

New Lab Intro to KDE Terminal Konsole New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line

More information

University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics

University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics ESE250 Spring 2013 Lab 9: Process CPU Sharing Friday, March 15, 2013 For Lab Session: Thursday, March 21,

More information

INASP: Effective Network Management Workshops

INASP: Effective Network Management Workshops INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network

More information

Tera Term Telnet. Introduction

Tera Term Telnet. Introduction Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start

More information

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system

More information

Monitoring, Tracing, Debugging (Under Construction)

Monitoring, Tracing, Debugging (Under Construction) Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003.

More information

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Remote Desktop Solution, (RDS), replacing CITRIX Home Access Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace

More information

Unit 4 i5/os Work Management

Unit 4 i5/os Work Management Introduction to IBM System i Unit 4 i5/os Work Management Copyright IBM Corporation, 2006. All Rights Reserved. This publication may refer to products that are not currently available in your country.

More information

The System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig

The System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig 2 Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table.........................................

More information

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

WinSCP PuTTY as an alternative to F-Secure July 11, 2006 WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated

More information

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University

INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University The first thing you will need is SSH. SSH is a program for accessing

More information

Chapter 14 MS-DOS Operating System

Chapter 14 MS-DOS Operating System Understanding Operating Systems, Fifth Edition 14-1 Chapter 14 MS-DOS Operating System At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics Additional

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative

MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative Author : admin Last 10+ years I worked on GNU / Linux as Desktop. Last 7 years most of my SSH connections

More information

Right now, the latest and greatest version of Java available for download is 1.4.0. Start with this link to find out more about it

Right now, the latest and greatest version of Java available for download is 1.4.0. Start with this link to find out more about it Download and Install the Java Developer's Kit (JDK) Java is a great language to learn---unfortunately, probably the most difficult aspect of learning Java is leaning how to install it and configure it

More information

Grid 101. Grid 101. Josh Hegie. grid@unr.edu http://hpc.unr.edu

Grid 101. Grid 101. Josh Hegie. grid@unr.edu http://hpc.unr.edu Grid 101 Josh Hegie grid@unr.edu http://hpc.unr.edu Accessing the Grid Outline 1 Accessing the Grid 2 Working on the Grid 3 Submitting Jobs with SGE 4 Compiling 5 MPI 6 Questions? Accessing the Grid Logging

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Outline: Operating Systems

Outline: Operating Systems Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)

More information

Secure Shell. The Protocol

Secure Shell. The Protocol Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer

More information

AliOffice 2.0 Installation Guide

AliOffice 2.0 Installation Guide January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.

More information

Running your first Linux Program

Running your first Linux Program Running your first Linux Program This document describes how edit, compile, link, and run your first linux program using: - Gnome a nice graphical user interface desktop that runs on top of X- Windows

More information

SSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed.

SSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed. Overview of MSU Compute Servers The DECS Linux based compute servers are well suited for programs that are too slow to run on typical desktop computers but do not require the power of supercomputers. The

More information

FEEG6002 - Applied Programming 6 - Working Remotely on Linux Server

FEEG6002 - Applied Programming 6 - Working Remotely on Linux Server FEEG6002 - Applied Programming 6 - Working Remotely on Linux Server Sam Sinayoko 2015-11-06 1 / 25 Outline Learning Outcomes Introduction Connecting to Linux server Transfering files to Linux server Text

More information

System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring

System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in

More information

Introduction to UNIX and SFTP

Introduction to UNIX and SFTP Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require

More information

Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching

Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching IT 3123 Hardware and Software Concepts Operating Systems II October 26 Multiprogramming Two or more application programs in memory. Consider one CPU and more than one program. This can be generalized to

More information

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide

More information

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2

More information

Using Process Monitor

Using Process Monitor Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,

More information

AN INTRODUCTION TO UNIX

AN INTRODUCTION TO UNIX AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 24, 2010 OUTLINE 1 SHELL SCRIPTS Shells 2 COMMAND LINE Command Line Input/Output 3 JOBS Processes Job Control 4 NETWORKING Working From

More information

Operating System Software

Operating System Software Operating System Software Lecture 7 The operating system Defines our computing experience. First software we see when we turn on the computer, and the last software we see when the computer is turned off.

More information

Router Lab Reference Guide

Router Lab Reference Guide Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and

More information

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder. CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files

More information

Using the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012

Using the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012 Using the JNIOR with the GDC Digital Cinema Server Last Updated November 30, 2012 The following is an explanation of how to utilize the JNIOR with the GDC Digital Cinema Server. Please contact INTEG via

More information

How to test and debug an ASP.NET application

How to test and debug an ASP.NET application Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult

More information

Introduction to the UNIX Operating System and Open Windows Desktop Environment

Introduction to the UNIX Operating System and Open Windows Desktop Environment Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems

More information

TeamViewer & DynGate Manual V 2.0

TeamViewer & DynGate Manual V 2.0 TeamViewer & DynGate Manual V 2.0 i Table Of Contents 1. OVERVIEW... 1 1.1. INTRODUCTION... 1 1.2. TEAMVIEWER RELATED DOWNLOADS... 2 1.3. ABOUT THIS MANUAL... 4 2. INSTALLATION... 5 2.1. CLIENT- AND HOST

More information

Installing Java. Table of contents

Installing Java. Table of contents Table of contents 1 Jargon...3 2 Introduction...4 3 How to install the JDK...4 3.1 Microsoft Windows 95... 4 3.1.1 Installing the JDK... 4 3.1.2 Setting the Path Variable...5 3.2 Microsoft Windows 98...

More information

Canto Integration Platform (CIP)

Canto Integration Platform (CIP) Canto Integration Platform (CIP) Getting Started Guide Copyright 2013, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trademarks of Canto, registered

More information

Unix Sampler. PEOPLE whoami id who

Unix Sampler. PEOPLE whoami id who Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host

More information

User Guide For ipodder on Windows systems

User Guide For ipodder on Windows systems User Guide Page 1 User Guide For ipodder on Windows systems Part of the ipodder Documentation User Guide Page 2 Table Of Contents 1. Introduction (p3) 2. Getting Started (p3) 1. Requirements (p4) 2. Installation

More information

SSH with private/public key authentication

SSH with private/public key authentication SSH with private/public key authentication In this exercise we ll show how you can eliminate passwords by using ssh key authentication. Choose the version of the exercises depending on what OS you are

More information

Version NOVO NORDISK INC. Online Supplier Registration System. Supplier User Guide

Version NOVO NORDISK INC. Online Supplier Registration System. Supplier User Guide Version 1 NOVO NORDISK INC. Online Supplier Registration System Supplier User Guide C O P Y R I G H T 2 0 0 7-2 0 1 0 B Y C V M S O L U T I O N S, I N C. A L L R I G H T S R E S E R V E D. T H E M A T

More information

EMBnet Norway User introduction pack (instructions and services overview) George Magklaras Head Systems Engineer Version 3.

EMBnet Norway User introduction pack (instructions and services overview) George Magklaras Head Systems Engineer Version 3. EMBnet Norway User introduction pack (instructions and services overview) George Magklaras Head Systems Engineer Version 3.2 (February 2008) How to connect a Windows workstation to the EMBnet servers using

More information

Chapter 3. Operating Systems

Chapter 3. Operating Systems Christian Jacob Chapter 3 Operating Systems 3.1 Evolution of Operating Systems 3.2 Booting an Operating System 3.3 Operating System Architecture 3.4 References Chapter Overview Page 2 Chapter 3: Operating

More information

ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com

ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com ICS Technology PADS Viewer Manual ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com Welcome to PADS Viewer Page 1 of 1 Welcome to PADS Viewer Welcome to PADS (Public Area

More information

Preparing a SQL Server for EmpowerID installation

Preparing a SQL Server for EmpowerID installation Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

Lab 1: Introduction to C, ASCII ART and the Linux Command Line Environment

Lab 1: Introduction to C, ASCII ART and the Linux Command Line Environment .i.-' `-. i..' `/ \' _`.,-../ o o \.' ` ( / \ ) \\\ (_.'.'"`.`._) /// \\`._(..: :..)_.'// \`. \.:-:. /.'/ `-i-->..

More information

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01

Sharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01 Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written

More information

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access

4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access 4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows

More information

How to Use the IBM Tivoli Storage Manager (TSM)

How to Use the IBM Tivoli Storage Manager (TSM) HPCx Archiving User Guide V 1.2 Elena Breitmoser, Ian Shore April 28, 2004 Abstract The Phase 2 HPCx system will have 100 Tb of storage space, of which around 70 Tb comprises offline tape storage rather

More information

1 Intel Smart Connect Technology Installation Guide:

1 Intel Smart Connect Technology Installation Guide: 1 Intel Smart Connect Technology Installation Guide: 1.1 System Requirements The following are required on a system: System BIOS supporting and enabled for Intel Smart Connect Technology Microsoft* Windows*

More information

How To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same

How To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same Working from Home Tools and Technologies for Improving Your Programming Environment Daniel J. Hood danielhood@umbc.edu Overview Tools for MS Windows (and others OSs) SSH SCP X Windows Tunneling X Connections

More information

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610

LevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610 LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2

More information

TELNET CLIENT 5.11 SSH SUPPORT

TELNET CLIENT 5.11 SSH SUPPORT TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet

More information

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop

Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure

More information

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):

There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): Remote Connection Protocols There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): - telnet (typically to connect to a machine

More information

Beyond Installing FileMaker Server

Beyond Installing FileMaker Server Beyond Installing FileMaker Server For Mac OS X 10.4 1. Introduction 2. Hardware 2.1. Processors 2.2. Storage 2.3. Memory 3. Operating System Selection and Configuration 3.1. Screen Saver and Power 3.2.

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

Chapter 6, The Operating System Machine Level

Chapter 6, The Operating System Machine Level Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General

More information

Table of Contents. FleetSoft Installation Guide

Table of Contents. FleetSoft Installation Guide FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Operating System Components

Operating System Components Lecture Overview Operating system software introduction OS components OS services OS structure Operating Systems - April 24, 2001 Operating System Components Process management Memory management Secondary

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

CPS221 Lecture: Operating System Structure; Virtual Machines

CPS221 Lecture: Operating System Structure; Virtual Machines Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of

More information

Tunnels and Redirectors

Tunnels and Redirectors Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...

More information

Microsoft SQL Server Guide. Best Practices and Backup Procedures

Microsoft SQL Server Guide. Best Practices and Backup Procedures Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,

More information

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013 LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...

More information

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES

13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Troubleshooting Citrix MetaFrame Procedures

Troubleshooting Citrix MetaFrame Procedures Troubleshooting Citrix MetaFrame Procedures Document name Troubleshooting a Citrix MetaFrame environment v1.0.doc Author Marcel van As Last Revision Date 28 February 2006 Edited and released by: www.dabcc.com

More information

Get an Easy Performance Boost Even with Unthreaded Apps. with Intel Parallel Studio XE for Windows*

Get an Easy Performance Boost Even with Unthreaded Apps. with Intel Parallel Studio XE for Windows* Get an Easy Performance Boost Even with Unthreaded Apps for Windows* Can recompiling just one file make a difference? Yes, in many cases it can! Often, you can achieve a major performance boost by recompiling

More information

Avalanche Site Edition

Avalanche Site Edition Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,

More information

WINDOWS PROCESSES AND SERVICES

WINDOWS PROCESSES AND SERVICES OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

Miami University RedHawk Cluster Connecting to the Cluster Using Windows Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.

More information

Demonstration of Windows XP Privilege Escalation Exploit

Demonstration of Windows XP Privilege Escalation Exploit Demonstration of Windows XP Privilege Escalation Exploit This article is a tutorial on how to trick Windows XP into giving you system privileges. Using simple command line tools on a machine running Windows

More information

OPERATING SYSTEM SERVICES

OPERATING SYSTEM SERVICES OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered

More information

ACADEMIC TECHNOLOGY SUPPORT

ACADEMIC TECHNOLOGY SUPPORT ACADEMIC TECHNOLOGY SUPPORT Tegrity: Getting Started with Lecture Capture (Last updated: 2/23/15) ats@etsu.edu 439-8611 www.etsu.edu/ats Table of Contents: Table of Contents:... 2 Overview... 1 Objectives...

More information

Getting Started with Mplus Version 7.31 Demo for Mac OS X and Linux

Getting Started with Mplus Version 7.31 Demo for Mac OS X and Linux Getting Started with Mplus Version 7.31 Demo for Mac OS X and Linux This document shows how to install Mplus Demo, how to use Mplus Demo, and where to find additional documentation. Overview Mplus Version

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

Tech Tip: Understanding Server Memory Counters

Tech Tip: Understanding Server Memory Counters Tech Tip: Understanding Server Memory Counters Written by Bill Bach, President of Goldstar Software Inc. This tech tip is the second in a series of tips designed to help you understand the way that your

More information

Personal Virtual Server (PVS) Quick Start Guide

Personal Virtual Server (PVS) Quick Start Guide Personal Virtual Server (PVS) Quick Start Guide Copyright 2015 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems Inc. It may contain trade

More information

University of Toronto

University of Toronto 1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.

More information