CS10110 Introduction to personal computer equipment
|
|
- Laurel Hensley
- 7 years ago
- Views:
Transcription
1 CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating system is running; Use the command line to control those processes Create processes on other machines and investigate the behaviour of X windows in this situation; Observe user and kernel scheduling of processes and tasks in the MS Windows environment; Apply knowledge of virtual memory and paging gained in lectures to understand a variety of the more sophisticated measurable performance indicators provided by the Task Manager; Observe the effect of changing process priority; Investigate how poorly written software can impact on the performance of a system. Part 1 Unix Log in to Wiked/Minted and obtain a bash shell terminal window. In this worksheet I have used Minted. If you are logged on to Wiked (or any other machine) then substitute that machine name wherever I have used Minted. Controlling a process 1. Running a process is easy and you have done it before - simply type a command at the command prompt and press return! xclock or xeyes are suitable simple little applications. You will notice that the command prompt does not reappear. I'll assume from here you're using xclock, but you don't have to. 2. Stop the application process by using <CTRL> z. Watch your chosen application! Try obscuring and uncovering it with another window. What happens? 3. To prevent the shell from waiting for the application process to finish, add an ampersand (&) to the end of the command to place it in the background (xclock &) and allow the shell to continue running. Create another clock in the background now. Notice the information the shell returns to you (look at the man page for bash under the section entitled job control for details). You might want to run xman in the background as well to look at this) Finding out what processes are running. First try using the ps command without any options to see what processes are running under the shell you are using. Unfortunately there are different versions of the ps command around with different command options. Check the man pages for the system you are using and find out Page 1
2 how much memory and processor resources these processes are using. The l or the u options can be helpful, but there are lots of other useful ones. Look for the status column for each process. What is the difference in status between the stopped and working process you created above? Do this in a different terminal window so as not to confuse what you are doing. You could use an xterm & command to create another terminal (or you could use the GUI menus). There is a list of all the abbreviations for the process state codes on the man page. Also note that b or <CTRL> b allows you to go back a page when using man (or more) (Page Up and Page Down keys also work on some systems). You can also type /xxx to search for a phrase (i.e. xxx in this example). What about the stopped clock? There are several choices. You could either bring the clock to the foreground using the fg command, let it continue in the background (bg) or kill it off. Try bringing it to the foreground (check it starts again), stop it again, and then put it in the background. If a process is running in the foreground you can use <CTRL> c to kill the process. However if it is running in the background you need to tell the shell to kill off the process for you using the kill command. Get a process list (ps) and use this information (you need the process number) with the kill command to kill off one of your clocks now! Where are the rest of the processes So far you will probably only have seen the processes that are children of the shell you used the ps command from. Now use the ps command with appropriate options to find out: All of the processes you are running as a user All of the processes the system is running (hint: check man ps and take particular note of the e, f and u options) Is this what you expect there will probably be lots of xclocks, bash shells and ps processes being run by other users (especially if others are doing this worksheet at the same time as you)! Which processes are using the most cpu and memory resources? Don t forget that you can pipe output to more or even redirect it to a file if there is too much to see on the screen in one go or you want to keep it for later. Hopefully you remember the wc command? Type a command that will tell you how many processes you are running (use man wc if you've forgotten how to count lines). Now get a list of all processes running on the machine you are logged on to. Which process was created first when this machine was booted? Other than the date/time, how could you tell? Locate the first five Page 2
3 processes that were created. Do you recognise any of the important tasks the OS might be performing (think of io, swapping (virtual memory) etc). What is the oldest process that belongs to you? Is this what you expect? Watching things happen There are a number of ways of seeing how the system is performing dynamically. One of the simplest and most informative is the top command. It will display a variety of system statistics followed by the top most processor intensive activities. However, on the SUN computers, it is recommended that you use the command prstat instead. In fact, the top command is actually a symbolic link (see last practical) to prstat. Run the top command with no options and consider the number of processes running, the memory usage, load average for example. You might like to try this at some other time in the week when a CS10110 practical is not running and look at the difference. Please don t leave top running for a long time because it creates significant load on the machine. Remember this top command, if you're ever using your own UNIX/Linux PC, and it seems to be going slow. Maybe there's a bad process that needs to be killed. You can obtain the list of processes sorted in various ways, for example cpu usage, memory usage and runtime. Try these options and notice the difference in the results. Think about why this is so and remember the difficult job the scheduler/dispatcher is performing! Logging in to other machines So far we have only been considering processes running on a single machine. Of course there are many machines on the network and you will sometimes want to run a process on another machine. Reasons for this may be because the licence for some item of software may only exist on certain machines, the files you need to process are not locally accessible, or simply because there is more processing power available elsewhere. You remote login using the ssh (secure shell) command followed by the machine you want to log in to. You should have access to the information services machine called central. When you ssh to another machine for the first time, you will be asked if you want to trust this connection. Just say yes. This adds an appropriate key to the file ~/.ssh/known_hosts, so that if in the future another machine should try to pretend to be central (and, say, try to grab your password), it will fail. It also says to the ssh program that you trust the computer central.aber.ac.uk. Page 3
4 ssh to central and have a look at all the processes you are running on that machine. How many are there? and what are they? Ask a demonstrator if this is not what you expected. ssh is the preferred way of logging in to a remote machine; older machines may not have ssh. rlogin is an alternative method, as is telnet. These are safe enough to use within a closed network such as the university, but for more security you should use ssh. Running a process on a remote machine without logging in ssh <machine name>, followed by a command, will run a command on the remote machine, then exit. Try it; for example, try listing your central filestore from Wiked or Minted by typing: ssh central.aber.ac.uk ls Running Graphical programs on a remote machine Try running a graphical program on the central machine (eg xeyes or xterm) either in your remote login or as an ssh. You will probably get an error. The problem is that the remote machine does not know which X server to use. In other words it doesn t know which screen on the network the command should talk to! You can tell it by setting the DISPLAY environment variable. Environment variables hold useful information used by the shell and programs run from it. You can inspect all your environment variables under the bash shell by using the set command with no options. Look at the environment variables available in the shell running on central and also the shell running on wiked or minted. You might know (or make an educated guess) what information a few of the variables store for example PATH, MANPATH, and CLASSPATH. Are they the same? Returning to the display problem: you can set the display for the shell running on central once you know what it is called. Of course minted knows this so you can type echo $DISPLAY in a shell running on minted to show the value of the DISPLAY variable being used for the X server display you are sat in front of (this was set automatically when you logged in) and it should respond with something like: myserver.dcs.aber.ac.uk:0.0 (if it says something like localhost:0.0 then substitute wiked.dcs.aber.ac.uk or minted.dcs.aber.ac.uk in place of localhost). To set an environment variable in a bash shell use the export command. To achieve our aim of telling the shell on central where our Xserver is you can use export DISPLAY=myserver.dcs.aber.ac.uk:0.0 (substitute the correct display name and server name!) Page 4
5 Now try running a graphical application on central say, xclock, xeyes 1 or xterm and you should see it appear on your screen. Make sure you know what you have this is a process running on central and being displayed by an Xserver running on your machine. Minted is running a window environment manager to allow you to control the display, for example if you wish to use a menu. You can use ssh to run remote graphical applications but you must also make the Xserver known to the remote program. The easiest way of doing this is to give the display option to the remote program. All X Windows programs allow you to specify a display parameter, for example xterm display myserver:0.0 Now you can use this to start up a program on a remote machine using ssh and have the GUI displayed on your screen. Try it now. eg. something like: Minted~$ ssh central xclock display myserver.dcs.aber.ac.uk:0.0 (remember to substitute the server name and display name.) In case you are wondering about the 0:0 bit, it is included because it is possible for an X server to have several display devices you will only be likely to use one number 0! ssh actually has a smarter way of doing this: ssh -X (or ssh -Y if that fails which sometimes it does because of authentication) automatically sets an appropriate DISPLAY environment variable for you (though it may not look right to you just now!), so that the display comes to your screen. Try: ssh -X central xclock Part 2 - MS Windows Task manager Log into MS Windows and start the task manager. This is normally done by pressing <CTRL> <ALT> <DEL> and selecting Task manager. Initially you will see a list of the user programs that are running. This list may well be empty if you have just logged in. The other tabs on the Task manager show you process information and a graphical display of CPU and network activity. The system activity over time can be observed using the performance tab. Have a look at the information on the lower part of the task manager performance window. How much of the RAM is used by the kernel? To see something happen, start an application such as Word or PowerPoint and watch the system processor and memory activity. For something a bit more demanding try opening a multimedia player such as Windows media player (try running the sample movie for example). The task manager can separate the CPU time spent executing kernel code from the rest. Select View show kernel times. It is informative to consider the amount of time being used by the OS against the time spent 1 You might find xeyes doesn't work on central. It's on Minted and Wiked though; try it! Page 5
6 executing all other software. During the rest of this practical look back at these ratios as you put the system through some tests and think about what sort of OS activity the tasks might be causing to happen. Start by checking out Media Player it has to do a lot of calculations to decode a movie and therefore tends to generate a lot of non-kernel activity since the OS is not required to do the decoding. Compare this with other programs you will run later in the practical. Go to the list of tasks and quit any application programs you are running (except task manager!). Look at the process list and see how many processes are left and who owns them. These are all the programs that need to be running for the OS to operate (memory managers, schedulers etc), as well as all the other services that most users don t realise they need until they stop working such as network services, printer spooling, the file manager explorer etc. Which process is taking most of the CPU time? Bearing in mind that a microprocessor must continuously process instructions what do you think this process is doing? (Some processors have special sleep modes to save power but this is a special case) You can view a wide range of parameters associated with each process. In the process window the view Select columns tab will let you add new information to the list. Add page faults, paged pool and non paged pool to the list you will know already that pages are part of the virtual memory mechanism however you will need to check the help to find out exactly what Windows is telling you with these measures. Compare the amount of virtual memory your system has to access with the size of the RAM. Other measures include the numbers of interrupts caused by various sorts of I/O. These can be useful for identifying system performance problems and are worth knowing about. Look for the processes that seem to cause very many or very few of the various interrupts, try several different types of application and look at their processes, for example the windows calculator versus Media Player. Process Hierarchy You can use the task manager to forcibly end a process. This is useful when a process is no longer responding to the normal interface commands, for example if the program has crashed. The end process option in the task manager will only kill the process requested and not any children of this process. Since many programs create child processes, killing the parent will leave errant processes running on the system (often not visible on the GUI). Ending a task or a process tree will remove a hierarchy of processes. We can investigate the difference by noting that when you run commands from the command prompt they are separate processes, and the command prompt shell process waits for the child to finish. Run a command that does not complete without user input such as dir more Page 6
7 (run in a directory with lots of files in it) and find the cmd and more processes in the task manager. Kill the more process and observe what happens. Run the command again and kill the cmd process. Now what happens? What about when you let the more command finish? Repeat the experiment and use the end process tree instead of end process. What happens in both cases? Why? Priority Do not do this part of the practical on our UNIX machines! On the course web page under practicals you will find with this worksheet two short java programs called BusyCounter.java and Counter.java. Place these programs somewhere where you can compile them (D: or M:). You need to compile these two programs. If you know how to do this then go ahead then skip the next paragraph. Open a command prompt and change to the directory containing the two programs. To compile them into executable code type: javac BusyCounter.java javac Counter.java If all is well you will get no error messages and a command prompt. You can now run the busy counter program by typing java BusyCounter To investigate the effect of priority you need to run two processes that both require as much processor time as they can get. This is what BusyCounter does. Run BusyCounter and check the effect it has on CPU load and other system resources. Remember, you're running this program on a PC to which only you are logged in. Please don't run this program on a machine where others may also be logged in (such as Minted or Central)! Since the command prompt is an MS DOS emulator it does not allow you to run more than one command (process). Consequently there is no concept of background processes. You can run two command prompt windows however. Run the BusyCounter program in both command prompt windows and make sure you can see their output. Now find the processes in the task manager, get the task manager to display the priority of processes and consider the two BusyCounters (they should both be normal priority and taking a considerable chunk of the CPU). Try setting one of them to low priority (right click on the process) and observe the effects on the system resources being used by that process. Check also how it is performing on the screen. You can try other combinations of priority and see the effects. Have a look at the priority levels of the rest of the processes that are running. What do you notice about some of the system processes? Be careful if you change any of the priority settings for these because you can make the system act very strangely especially if you still have BusyCounter trying to take as much CPU as it can get! Page 7
8 A System Friendly Counter Quit all the counter programs and make sure the system load reduces to a low level. Now run the Counter program and observe its output and CPU load. Now run BusyCounter again and observe processor load. Is there any effect on Counter? Why should the two programs that perform the same task have such a different effect on the system? Use an editor to have a look at the source code determine the differences in the way the code operates. This is an extreme example, but it illustrates the importance of design decisions, especially for event driven programs that need to wait for (user) input and other events. System Calls in your program Try removing the line that includes the delay loop (for statement) from BusyCounter and recompile it. Run it and look at the difference on resource usage. Do any other processes increase their resource use? Why might this be? (hint: look at kernel usage). What happens if you minimize the DOS window to the taskbar. Can you explain these effects from your knowledge of operating systems? ais, November 2010 Updated: mfc5, September 2012 Page 8
PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007
PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the
More informationCisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationCS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson
CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,
More informationTutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
More informationHands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
More informationMONITORING PERFORMANCE IN WINDOWS 7
MONITORING PERFORMANCE IN WINDOWS 7 Performance Monitor In this demo we will take a look at how we can use the Performance Monitor to capture information about our machine performance. We can access Performance
More informationFundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
More informationLinux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
More informationRemote Desktop In OpenSUSE 10.3
Only for dummies Remote Desktop In OpenSUSE 10.3 Remote access to Linux GUI Environment from Windows Client Tedy Tirtawidjaja 5/14/2008 In Microsoft Windows environment we know Remote Desktop application
More informationThere s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh
To do this you need two pieces of software: (1) An X server running on your PC, and (2) A secure shell for making a network connection to a UNIX host. There s a variety of software that can be used, but
More informationHP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
More informationThirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
More informationMFCF Grad Session 2015
MFCF Grad Session 2015 Agenda Introduction Help Centre and requests Dept. Grad reps Linux clusters using R with MPI Remote applications Future computing direction Technical question and answer period MFCF
More informationNew Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
More informationUniversity of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics
University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics ESE250 Spring 2013 Lab 9: Process CPU Sharing Friday, March 15, 2013 For Lab Session: Thursday, March 21,
More informationINASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
More informationTera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
More informationKernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
More informationMonitoring, Tracing, Debugging (Under Construction)
Monitoring, Tracing, Debugging (Under Construction) I was already tempted to drop this topic from my lecture on operating systems when I found Stephan Siemen's article "Top Speed" in Linux World 10/2003.
More informationRemote Desktop Solution, (RDS), replacing CITRIX Home Access
Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace
More informationUnit 4 i5/os Work Management
Introduction to IBM System i Unit 4 i5/os Work Management Copyright IBM Corporation, 2006. All Rights Reserved. This publication may refer to products that are not currently available in your country.
More informationThe System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig
Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig 2 Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table.........................................
More informationWinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
More informationINSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University
INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University The first thing you will need is SSH. SSH is a program for accessing
More informationChapter 14 MS-DOS Operating System
Understanding Operating Systems, Fifth Edition 14-1 Chapter 14 MS-DOS Operating System At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics Additional
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationMobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative
MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative Author : admin Last 10+ years I worked on GNU / Linux as Desktop. Last 7 years most of my SSH connections
More informationRight now, the latest and greatest version of Java available for download is 1.4.0. Start with this link to find out more about it
Download and Install the Java Developer's Kit (JDK) Java is a great language to learn---unfortunately, probably the most difficult aspect of learning Java is leaning how to install it and configure it
More informationGrid 101. Grid 101. Josh Hegie. grid@unr.edu http://hpc.unr.edu
Grid 101 Josh Hegie grid@unr.edu http://hpc.unr.edu Accessing the Grid Outline 1 Accessing the Grid 2 Working on the Grid 3 Submitting Jobs with SGE 4 Compiling 5 MPI 6 Questions? Accessing the Grid Logging
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationOutline: Operating Systems
Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)
More informationSecure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
More informationAliOffice 2.0 Installation Guide
January 25, 2012 AliOffice 2.0 Installation Guide Overview This document contains instructions for installing AliOffice and readying the application for the completion and submission of compliance evaluations.
More informationRunning your first Linux Program
Running your first Linux Program This document describes how edit, compile, link, and run your first linux program using: - Gnome a nice graphical user interface desktop that runs on top of X- Windows
More informationSSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed.
Overview of MSU Compute Servers The DECS Linux based compute servers are well suited for programs that are too slow to run on typical desktop computers but do not require the power of supercomputers. The
More informationFEEG6002 - Applied Programming 6 - Working Remotely on Linux Server
FEEG6002 - Applied Programming 6 - Working Remotely on Linux Server Sam Sinayoko 2015-11-06 1 / 25 Outline Learning Outcomes Introduction Connecting to Linux server Transfering files to Linux server Text
More informationSystem Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring
CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in
More informationIntroduction to UNIX and SFTP
Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require
More informationMultiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching
IT 3123 Hardware and Software Concepts Operating Systems II October 26 Multiprogramming Two or more application programs in memory. Consider one CPU and more than one program. This can be generalized to
More informationLinux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More informationUnix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
More informationUsing Process Monitor
Using Process Monitor Process Monitor Tutorial This information was adapted from the help file for the program. Process Monitor is an advanced monitoring tool for Windows that shows real time file system,
More informationAN INTRODUCTION TO UNIX
AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 24, 2010 OUTLINE 1 SHELL SCRIPTS Shells 2 COMMAND LINE Command Line Input/Output 3 JOBS Processes Job Control 4 NETWORKING Working From
More informationOperating System Software
Operating System Software Lecture 7 The operating system Defines our computing experience. First software we see when we turn on the computer, and the last software we see when the computer is turned off.
More informationRouter Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
More informationMake a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
More informationUsing the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012
Using the JNIOR with the GDC Digital Cinema Server Last Updated November 30, 2012 The following is an explanation of how to utilize the JNIOR with the GDC Digital Cinema Server. Please contact INTEG via
More informationHow to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
More informationIntroduction to the UNIX Operating System and Open Windows Desktop Environment
Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems
More informationTeamViewer & DynGate Manual V 2.0
TeamViewer & DynGate Manual V 2.0 i Table Of Contents 1. OVERVIEW... 1 1.1. INTRODUCTION... 1 1.2. TEAMVIEWER RELATED DOWNLOADS... 2 1.3. ABOUT THIS MANUAL... 4 2. INSTALLATION... 5 2.1. CLIENT- AND HOST
More informationInstalling Java. Table of contents
Table of contents 1 Jargon...3 2 Introduction...4 3 How to install the JDK...4 3.1 Microsoft Windows 95... 4 3.1.1 Installing the JDK... 4 3.1.2 Setting the Path Variable...5 3.2 Microsoft Windows 98...
More informationCanto Integration Platform (CIP)
Canto Integration Platform (CIP) Getting Started Guide Copyright 2013, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trademarks of Canto, registered
More informationUnix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
More informationUser Guide For ipodder on Windows systems
User Guide Page 1 User Guide For ipodder on Windows systems Part of the ipodder Documentation User Guide Page 2 Table Of Contents 1. Introduction (p3) 2. Getting Started (p3) 1. Requirements (p4) 2. Installation
More informationSSH with private/public key authentication
SSH with private/public key authentication In this exercise we ll show how you can eliminate passwords by using ssh key authentication. Choose the version of the exercises depending on what OS you are
More informationVersion NOVO NORDISK INC. Online Supplier Registration System. Supplier User Guide
Version 1 NOVO NORDISK INC. Online Supplier Registration System Supplier User Guide C O P Y R I G H T 2 0 0 7-2 0 1 0 B Y C V M S O L U T I O N S, I N C. A L L R I G H T S R E S E R V E D. T H E M A T
More informationEMBnet Norway User introduction pack (instructions and services overview) George Magklaras Head Systems Engineer Version 3.
EMBnet Norway User introduction pack (instructions and services overview) George Magklaras Head Systems Engineer Version 3.2 (February 2008) How to connect a Windows workstation to the EMBnet servers using
More informationChapter 3. Operating Systems
Christian Jacob Chapter 3 Operating Systems 3.1 Evolution of Operating Systems 3.2 Booting an Operating System 3.3 Operating System Architecture 3.4 References Chapter Overview Page 2 Chapter 3: Operating
More informationICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com
ICS Technology PADS Viewer Manual ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com Welcome to PADS Viewer Page 1 of 1 Welcome to PADS Viewer Welcome to PADS (Public Area
More informationPreparing a SQL Server for EmpowerID installation
Preparing a SQL Server for EmpowerID installation By: Jamis Eichenauer Last Updated: October 7, 2014 Contents Hardware preparation... 3 Software preparation... 3 SQL Server preparation... 4 Full-Text Search
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationLab 1: Introduction to C, ASCII ART and the Linux Command Line Environment
.i.-' `-. i..' `/ \' _`.,-../ o o \.' ` ( / \ ) \\\ (_.'.'"`.`._) /// \\`._(..: :..)_.'// \`. \.:-:. /.'/ `-i-->..
More informationSharpdesk V3.5. Push Installation Guide for system administrator Version 3.5.01
Sharpdesk V3.5 Push Installation Guide for system administrator Version 3.5.01 Copyright 2000-2015 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written
More information4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
More informationHow to Use the IBM Tivoli Storage Manager (TSM)
HPCx Archiving User Guide V 1.2 Elena Breitmoser, Ian Shore April 28, 2004 Abstract The Phase 2 HPCx system will have 100 Tb of storage space, of which around 70 Tb comprises offline tape storage rather
More information1 Intel Smart Connect Technology Installation Guide:
1 Intel Smart Connect Technology Installation Guide: 1.1 System Requirements The following are required on a system: System BIOS supporting and enabled for Intel Smart Connect Technology Microsoft* Windows*
More informationHow To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same
Working from Home Tools and Technologies for Improving Your Programming Environment Daniel J. Hood danielhood@umbc.edu Overview Tools for MS Windows (and others OSs) SSH SCP X Windows Tunneling X Connections
More informationLevelOne MUS-1001. 1GB Smart Flash. User Manual V1.0.0-0610
LevelOne MUS-1001 1GB Smart Flash User Manual V1.0.0-0610 CONTENT CHAPTER 1 INTRODUCTION...4 1.1 About this Manual...4 1.2 Support Services...5 CHAPTER 2 PRODUCT OVERVIEW...6 2.1 Package Contents...6 2.2
More informationTELNET CLIENT 5.11 SSH SUPPORT
TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet
More informationExercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop
14/01/05 file:/data/hervey/docs/pre-sanog/web/ha/security/apache-ssl-exercises.html #1 Exercises Exercises: FreeBSD: Apache and SSL: pre SANOG VI Workshop 1. Install Apache with SSL support 2. Configure
More informationThere are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to):
Remote Connection Protocols There are many different ways in which we can connect to a remote machine over the Internet. These include (but are not limited to): - telnet (typically to connect to a machine
More informationBeyond Installing FileMaker Server
Beyond Installing FileMaker Server For Mac OS X 10.4 1. Introduction 2. Hardware 2.1. Processors 2.2. Storage 2.3. Memory 3. Operating System Selection and Configuration 3.1. Screen Saver and Power 3.2.
More informationICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationChapter 6, The Operating System Machine Level
Chapter 6, The Operating System Machine Level 6.1 Virtual Memory 6.2 Virtual I/O Instructions 6.3 Virtual Instructions For Parallel Processing 6.4 Example Operating Systems 6.5 Summary Virtual Memory General
More informationTable of Contents. FleetSoft Installation Guide
FleetSoft Installation Guide Table of Contents FleetSoft Installation Guide... 1 Minimum System Requirements... 2 Installation Notes... 3 Frequently Asked Questions... 4 Deployment Overview... 6 Automating
More information2X ApplicationServer & LoadBalancer Manual
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,
More informationOperating System Components
Lecture Overview Operating system software introduction OS components OS services OS structure Operating Systems - April 24, 2001 Operating System Components Process management Memory management Secondary
More informationRemote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
More informationCPS221 Lecture: Operating System Structure; Virtual Machines
Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of
More informationTunnels and Redirectors
Tunnels and Redirectors TUNNELS AND REDIRECTORS...1 Overview... 1 Security Details... 2 Permissions... 2 Starting a Tunnel... 3 Starting a Redirector... 5 HTTP Connect... 8 HTTPS Connect... 10 LabVNC...
More informationMicrosoft SQL Server Guide. Best Practices and Backup Procedures
Microsoft SQL Server Guide Best Practices and Backup Procedures Constellation HomeBuilder Systems Inc. This document is copyrighted and all rights are reserved. This document may not, in whole or in part,
More informationLOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
More information13 Managing Devices. Your computer is an assembly of many components from different manufacturers. LESSON OBJECTIVES
LESSON 13 Managing Devices OBJECTIVES After completing this lesson, you will be able to: 1. Open System Properties. 2. Use Device Manager. 3. Understand hardware profiles. 4. Set performance options. Estimated
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationTroubleshooting Citrix MetaFrame Procedures
Troubleshooting Citrix MetaFrame Procedures Document name Troubleshooting a Citrix MetaFrame environment v1.0.doc Author Marcel van As Last Revision Date 28 February 2006 Edited and released by: www.dabcc.com
More informationGet an Easy Performance Boost Even with Unthreaded Apps. with Intel Parallel Studio XE for Windows*
Get an Easy Performance Boost Even with Unthreaded Apps for Windows* Can recompiling just one file make a difference? Yes, in many cases it can! Often, you can achieve a major performance boost by recompiling
More informationAvalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationWINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationMiami University RedHawk Cluster Connecting to the Cluster Using Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.
More informationDemonstration of Windows XP Privilege Escalation Exploit
Demonstration of Windows XP Privilege Escalation Exploit This article is a tutorial on how to trick Windows XP into giving you system privileges. Using simple command line tools on a machine running Windows
More informationOPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
More informationACADEMIC TECHNOLOGY SUPPORT
ACADEMIC TECHNOLOGY SUPPORT Tegrity: Getting Started with Lecture Capture (Last updated: 2/23/15) ats@etsu.edu 439-8611 www.etsu.edu/ats Table of Contents: Table of Contents:... 2 Overview... 1 Objectives...
More informationGetting Started with Mplus Version 7.31 Demo for Mac OS X and Linux
Getting Started with Mplus Version 7.31 Demo for Mac OS X and Linux This document shows how to install Mplus Demo, how to use Mplus Demo, and where to find additional documentation. Overview Mplus Version
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationTech Tip: Understanding Server Memory Counters
Tech Tip: Understanding Server Memory Counters Written by Bill Bach, President of Goldstar Software Inc. This tech tip is the second in a series of tips designed to help you understand the way that your
More informationPersonal Virtual Server (PVS) Quick Start Guide
Personal Virtual Server (PVS) Quick Start Guide Copyright 2015 Pegasystems Inc., Cambridge, MA All rights reserved. This document describes products and services of Pegasystems Inc. It may contain trade
More informationUniversity of Toronto
1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.
More information