Adding hardware emulators into CRON

Size: px
Start display at page:

Download "Adding hardware emulators into CRON"

Transcription

1 Adding hardware emulators into CRON Lin Xue, Feb 2011 Add new type for hardware emulator Related database tables: node_types, node_type_attributes Add one column ishdemulator into table node_types to identify hardware emulator: mysql> alter table node_types -> add ishdemulator tinyint(4) NOT NULL default '0'; Query OK, 8 rows affected (0.08 sec) Records: 8 Duplicates: 0 Warnings: 0 Change editnodetype.php3 (/usr/testbed/www) to support ishdemulator Add one type for hdemulator: mysql> insert into node_types set class='hdemulator', ishdemulator=1, type='anue-hawaii'; Query OK, 1 row affected (0.00 sec) Add one new hardware emulator node into nodes table: 1

2 mysql> insert into nodes set node_id='hdem1', type='hdemulator', phys_nodeid='hdem1', role='testnode'; Query OK, 1 row affected (0.00 sec) Add one row in table_regex table for value verify. mysql> REPLACE INTO table_regex VALUES ('node_types','ishdemulator','text','redirect','default:boolean',0,0,null); Query OK, 2 rows affected (0.00 sec) User requires hardware emulator If user need a hardware emulator, the NS script in CRON should be something like this: set link0 [$ns duplex-link $node0 $node Mb 0ms DropTail HardwareEmulator] Add a tag of using hardware emulator into table virt_lans After user requires hardware emulator, we need to add a tag for identifying it in virt_lans mysql> alter table virt_lans -> add hardware_emulator tinyint(4) NOT NULL default '0'; Query OK, 81 rows affected (0.08 sec) Records: 81 Duplicates: 0 Warnings: 0 Source code changed: sim.tcl lanlink.tcl 2

3 Something regarding ASSIGN LoadVirtTypes(); Load virtual types from virt_vtypes LoadPhysInfo(); Load physical information from interface_capabilities, interface_type, nodes.. LoadExperiment(); Load experiments information from experiments LoadVirtNodes(); Load virtual nodes information from virt_nodes LoadVirtLans(); Load virtual lans information from virt_lans Then create virtual topology file like below by CreateTopFile(): Directory at boss, for example: /usr/testbed/expwork/cron/renoytopy boss# vi CRON-RenoYTopo top node node1 pc node node2 pc node node3 pc node router pc node tbdelay0 delay link linksdelaysrc/link1/node1:0,router:0 node1 tbdelay0 0 0 ethernet link linksdelaydst/link1/router:0,node1:0 router tbdelay0 0 0 ethernet 3

4 node tbdelay1 delay link linksdelaysrc/link2/node2:0,router:1 node2 tbdelay1 0 0 ethernet link linksdelaydst/link2/router:1,node2:0 router tbdelay1 0 0 ethernet node tbdelay2 delay link linksdelaysrc/link3/node3:0,router:2 node3 tbdelay2 0 0 ethernet link linksdelaydst/link3/router:2,node3:0 router tbdelay2 0 0 ethernet start run assign create ptop (physical topology file) like below: system("ptopgen $ptopargs > $ptopfile"); node datasw switch:1 *lan:* - - node pc9 pcsun4240:1 pc:1 delay:1 delay-pcsun4240:1 - OS-10015:0 OS-10016:0 OS-10017:0 OS-10018:0 OS-10019:0 OS- node pc3 pcsun4240:1 pc:1 delay:1 delay-pcsun4240:1 - OS-10015:0 OS-10016:0 OS-10017:0 OS-10018:0 OS-10019:0 OS- node pc7 pcsun4240:1 pc:1 delay:1 delay-pcsun4240:1 - OS-10015:0 OS-10016:0 OS-10017:0 OS-10018:0 OS-10019:0 OS- node pc6 pcsun4240:1 pc:1 delay:1 delay-pcsun4240:1 - OS-10015:0 OS-10016:0 OS-10017:0 OS-10018:0 OS-10019:0 OS- node pc1 pcsun4240:1 pc:1 delay:1 delay-pcsun4240:1 - OS-10015:0 OS-10016:0 OS-10017:0 OS-10018:0 OS-10019:0 OS- node pc2 SUN4240pc2only:1 pc:1 - OS-10025:0 OS-10026:0 OS-10023:0 OS-10027:0 OS-10029:0 OS-10031:0 OS-10033:0 OS :0 OS- node pc8 pcsun4240:1 pc:1 delay:1 delay-pcsun4240:1 - OS-10015:0 OS-10016:0 OS-10017:0 OS-10018:0 OS-10019:0 OS- 4

5 link link-pc3:eth4-datasw:(null) pc3:pc3/eth4 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc6:eth4-datasw:(null) pc6:pc6/eth4 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc7:eth6-datasw:(null) pc7:pc7/eth6 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc7:eth3-datasw:(null) pc7:pc7/eth3 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc7:eth7-datasw:(null) pc7:pc7/eth7 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc7:eth2-datasw:(null) pc7:pc7/eth2 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc8:eth4-datasw:(null) pc8:pc8/eth4 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc8:eth5-datasw:(null) pc8:pc8/eth5 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc9:eth4-datasw:(null) pc9:pc9/eth4 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc9:eth5-datasw:(null) pc9:pc9/eth5 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc2:eth4-datasw:(null) pc2:pc2/eth4 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc1:eth4-datasw:(null) pc1:pc1/eth4 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- link link-pc1:eth5-datasw:(null) pc1:pc1/eth5 datasw:(null) ethernet ethernet-datasw ethernet-mxge ethernet- node airswitch *80211:* *80211a:* *80211b:* *80211g:* *flex900:* *xcvr2450:* - - set-type-limit integer 0 result into assign.log, like below: exec("nice assign_wrapper2 $cmd $cmdargs > assign.log 2>&1"); seed = Physical Graph: 9 5

6 Calculating shortest paths on switch fabric. Virtual Graph: 7 Generating physical equivalence classes:6 Type precheck: Type precheck passed. Node mapping precheck: Node mapping precheck succeeded Pruning pclasses. pclass pruning complete: removed 2 pclasses, 4 remain. Type precheck: Type precheck passed. Policy precheck: Policy precheck succeeded Annealing. Doing melting run Reverting: forced Reverting to best solution Done BEST SCORE: 4.94 in iters and seconds With 0 violations Iters to find best score: 7 Violations: 0 unassigned: 0 pnode_load: 0 no_connect: 0 link_users: 0 bandwidth: 0 desires: 0 vclass: 0 6

7 delay: 0 trivial mix: 0 subnodes: 0 max_types: 0 endpoints: 0 Nodes: node1 pc6 node2 pc3 node3 pc2 router pc7 tbdelay0 pc9 tbdelay1 pc8 tbdelay2 pc1 End Nodes Edges: linksdelaysrc/link1/node1:0,router:0 intraswitch link-pc6:eth4-datasw:(null) (pc6/eth4,(null)) link-pc9:eth5-datasw:(null) (pc9/eth5,(null)) linksdelaydst/link1/router:0,node1:0 intraswitch link-pc7:eth6-datasw:(null) (pc7/eth6,(null)) link-pc9:eth4-datasw:(null) (pc9/eth4,(null)) linksdelaysrc/link2/node2:0,router:1 intraswitch link-pc3:eth4-datasw:(null) (pc3/eth4,(null)) link-pc8:eth4-datasw:(null) (pc8/eth4,(null)) linksdelaydst/link2/router:1,node2:0 intraswitch link-pc7:eth7-datasw:(null) (pc7/eth7,(null)) link-pc8:eth5-datasw:(null) (pc8/eth5,(null)) linksdelaysrc/link3/node3:0,router:2 intraswitch link-pc2:eth4-datasw:(null) (pc2/eth4,(null)) link-pc1:eth4-datasw:(null) (pc1/eth4,(null)) linksdelaydst/link3/router:2,node3:0 intraswitch link-pc7:eth3-datasw:(null) (pc7/eth3,(null)) link-pc1:eth5-datasw:(null) (pc1/eth5,(null)) End Edges End solution 7

Some clues for Emulab source code (v1.0)

Some clues for Emulab source code (v1.0) Some clues for Emulab source code (v1.0) Lin Xue lxue2@tigers.lsu.edu June 2010 NOTE This document is written step by step how Emulab works according to Emulab source code, including parse input, read/write

More information

Adding NetFPGA board into CRON. Change wires table, if you change the switch cable connection

Adding NetFPGA board into CRON. Change wires table, if you change the switch cable connection Adding NetFPGA board into CRON Lin Xue, lxue2@tigers.lsu.edu, LANET@LSU April 2011 Change wires table, if you change the switch cable connection Note: this might not related to adding a NetFPGA, but this

More information

Switched Ethernet Virtual LANs

Switched Ethernet Virtual LANs Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware

More information

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

itexamdump 최고이자최신인 IT 인증시험덤프  일년무료업데이트서비스제공 itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : 1z1-882 Title : Oracle Certified Professional, MySQL 5.6 Developer Vendor : Oracle Version : DEMO Get Latest & Valid 1z1-882

More information

Wikiprint Book. Title: Adding information about your switch, power controller, and serial. Subject: DeterLab Support - Installation/DatabaseSetup

Wikiprint Book. Title: Adding information about your switch, power controller, and serial. Subject: DeterLab Support - Installation/DatabaseSetup Wikiprint Book Title: Adding information about your switch, power controller, and serial Subject: DeterLab Support - Installation/DatabaseSetup Version: 22 Date: 05/07/18 21:00:41 Table of Contents Adding

More information

Getting started with MySQL Proxy

Getting started with MySQL Proxy Getting started with MySQL Proxy Giuseppe Maxia QA Developer - MySQL AB Sofia - OpenFest 2007 Agenda Overview Some fun Injecting queries Filtering and rewriting queries Working with results Proxy for logging

More information

Module 3 MySQL Database. Database Management System

Module 3 MySQL Database. Database Management System Module 3 MySQL Database Module 3 Contains 2 components Individual Assignment Group Assignment BOTH are due on Mon, Feb 19th Read the WIKI before attempting the lab Extensible Networking Platform 1 1 -

More information

How to Use JSON in MySQL Wrong

How to Use JSON in MySQL Wrong How to Use JSON in MySQL Wrong Bill Karwin, Square Inc. October, 2018 1 Me Database Developer at Square Inc. MySQL Quality Contributor Author of SQL Antipatterns: Avoiding the Pitfalls of Database Programming

More information

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.

Network Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro. Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to

More information

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri

S Quality of Service in Internet. Introduction to the Exercises Timo Viipuri S-38.180 Quality of Service in Internet Introduction to the Exercises Timo Viipuri 8.10.2003 Exercise Subjects 1) General matters in doing the exercises Work environment Making the exercises and returning

More information

HKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access

HKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access Databases and Microsoft Access Introduction to Databases A well-designed database enables huge data storage and efficient data retrieval. Term Database Table Record Field Primary key Index Meaning A organized

More information

More MySQL ELEVEN Walkthrough examples Walkthrough 1: Bulk loading SESSION

More MySQL ELEVEN Walkthrough examples Walkthrough 1: Bulk loading SESSION SESSION ELEVEN 11.1 Walkthrough examples More MySQL This session is designed to introduce you to some more advanced features of MySQL, including loading your own database. There are a few files you need

More information

Exam Questions 1z0-882

Exam Questions 1z0-882 Exam Questions 1z0-882 Oracle Certified Professional, MySQL 5.6 Developer https://www.2passeasy.com/dumps/1z0-882/ 1.Which statement describes the process of normalizing databases? A. All text is trimmed

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : 250-530 Title : Administration of Symantec Network Access Control 12.1 Vendors : Symantec

More information

What LinkSec Should Know About Bridges Norman Finn

What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Norman Finn What LinkSec Should Know About Bridges Rev. 2 Norman Finn, Cisco Systems IEEE 802 LinkSec SG 1/20 What Do Bridges Do? (1) A network of bridges emulates

More information

Being day six of the DBCC Command month at SteveStedman.com, today's featured DBCC Command is DBCC CHECKIDENT.

Being day six of the DBCC Command month at SteveStedman.com, today's featured DBCC Command is DBCC CHECKIDENT. DBCC CheckIdent Being day six of the DBCC Command month at SteveStedman.com, today's featured DBCC Command is DBCC CHECKIDENT. Description: DBCC CHECKIDENT is used for check on the current value in the

More information

MySQL Installation Guide (OS X)

MySQL Installation Guide (OS X) Step1- Install MySQL MySQL Installation Guide (OS X) Go to MySQL download page (http://dev.mysql.com/downloads/mysql/). Download the DMG archive version. Select the correct installer based on your system.

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

NS-2 Tutorial. Kumar Viswanath CMPE 252a.

NS-2 Tutorial. Kumar Viswanath CMPE 252a. NS-2 Tutorial Kumar Viswanath CMPE 252a kumarv@cse.ucsc.edu 1 What is ns-2? ns-2 stands for Network Simulator version 2. ns-2: Is a discrete event simulator for networking research packet level simulator.

More information

Installing Your Multifunction to Your Network for the First Time. MAXIFY MB2320 Mac OS

Installing Your Multifunction to Your Network for the First Time. MAXIFY MB2320 Mac OS Installing Your Multifunction to Your Network for the First Time MAXIFY MB2320 Mac OS 1 Preparing to Connect to the Network Network Requirements Before connecting the machine to the network, make sure

More information

Installing the Printer to Your Wireless Network. imageprograf PRO Mac OS

Installing the Printer to Your Wireless Network. imageprograf PRO Mac OS Installing the Printer to Your Wireless Network imageprograf PRO - 1000 Mac OS Setup and Installation Setup and Installation The instructions contained in this document apply equally to first-time installations,

More information

Lab Troubleshooting LAN Connectivity

Lab Troubleshooting LAN Connectivity Lab 9.2.4 Troubleshooting LAN Connectivity Device Host Name Interface IP Address Subnet Mask Default Gateway Switch Port R1 R1 Fast Ethernet 0/0 192.168.1.1 255.255.255.0 N/A Fast Ethernet 0/2 S1 S1 VLAN

More information

The following steps should be used when configuring a VLAN on the EdgeXOS platform:

The following steps should be used when configuring a VLAN on the EdgeXOS platform: EdgeXOS VLANs VLAN Overview This document provides an overview of what a VLAN is and how it is configured on the EdgeXOS platform. Use the step-by-step guide below to configure a VLAN on the Edge appliance

More information

Visual Nexus Endpoint. User Setup Guide. Version 3.0

Visual Nexus Endpoint. User Setup Guide. Version 3.0 Visual Nexus Endpoint User Setup Guide Version 3.0 30 th January, 2006 1 st Edition Tomen Cyber Business Solutions, Inc. & Visual Nexus Ltd Introduction Inquiries General Product-Related Information For

More information

Provider: MySQLAB Web page:

Provider: MySQLAB Web page: Provider: MySQLAB Web page: www.mysql.com Installation of MySQL. Installation of MySQL. Download the mysql-3.3.5-win.zip and mysql++-.7.--win3-vc++.zip files from the mysql.com site. Unzip mysql-3.3.5-win.zip

More information

A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note December 2002

A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note December 2002 A Solver for the Network Testbed Mapping Problem University of Utah Flux Group Technical Note 22-5 December 22 Revised version to appear in ACM SIGCOMM Computer Communications Review (CCR), issue dated

More information

<Insert Picture Here> Boosting performance with MySQL partitions

<Insert Picture Here> Boosting performance with MySQL partitions Boosting performance with MySQL partitions Giuseppe Maxia MySQL Community Team Lead at Oracle 1 about me -Giuseppe Maxia a.k.a. The Data Charmer MySQL Community Team Lead Long time

More information

NetVanta Series (with 56K/64K Network Interface Module)

NetVanta Series (with 56K/64K Network Interface Module) VPN WAN LAN PWR STAT TD RD TD RD TD RD VPN WAN LAN PWR STAT TD RD TD RD TD RD NetVanta 3200 NetVanta 3200 NetVanta Series (with 56K/64K Network Interface Module) Quick Configuration Guide 64200861L1-42A

More information

Effective Testing for Live Applications. March, 29, 2018 Sveta Smirnova

Effective Testing for Live Applications. March, 29, 2018 Sveta Smirnova Effective Testing for Live Applications March, 29, 2018 Sveta Smirnova Table of Contents Sometimes You Have to Test on Production Wrong Data SELECT Returns Nonsense Wrong Data in the Database Performance

More information

Configuring Port Channels

Configuring Port Channels CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels using Cisco Data Center Network

More information

Additional Scenarios A P P E N D I X

Additional Scenarios A P P E N D I X A P P E N D I X F Additional Scenarios Each chapter of this book focuses on a small set of related topics so that you can more easily digest the material. However, the CCNA exams require that you be able

More information

Configuring Enhanced Virtual Port Channels

Configuring Enhanced Virtual Port Channels This chapter contains the following sections: Information About Enhanced vpcs, page 2 Licensing Requirements for Enhanced vpc, page 4 Configuring Enhanced vpcs, page 4 Verifying Enhanced vpcs, page 5 Enhanced

More information

System Error Code 1241 Operand Should Contain 1 Column(s)

System Error Code 1241 Operand Should Contain 1 Column(s) System Error Code 1241 Operand Should Contain 1 Column(s) first i ll show you my code i got the error #1241 - Operand should contain 1 column(s), and if i use it work perfectly so where's the problem i

More information

Packet Tracer - Subnet Scenario 2 Topology

Packet Tracer - Subnet Scenario 2 Topology Topology 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5 Addressing Table Device Interface IP Address Subnet Mask Default Gateway G0/0 R1 S0/0/0 G0/0 S0/0/0

More information

Configuring Port Channels

Configuring Port Channels CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels in Cisco DCNM. For more information

More information

Project Network Simulation CSE 5346/4346

Project Network Simulation CSE 5346/4346 Project Network Simulation CSE 5346/4346 Project Overview This is a comprehensive project designed to be completed by 4 phases, and intended to demonstrate network performance and quality of service (QoS)

More information

ns-2 Tutorial Exercise (1)

ns-2 Tutorial Exercise (1) ns-2 Tutorial Exercise (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Adopted from Nicolas s slides Jianping Wang, 2002 cs757 On to the Tutorial Work in group of

More information

EXPRESSCLUSTER X for Windows. Quick Start Guide for Windows Server Container. (MySQL)

EXPRESSCLUSTER X for Windows. Quick Start Guide for Windows Server Container. (MySQL) EXPRESSCLUSTER X for Windows Quick Start Guide for Windows Server Container (MySQL) Version 3 May 10, 2017 Disclaimer The contents of this document are subject to change without notice. NEC Corporation

More information

An Integrated Experimental

An Integrated Experimental An Integrated Experimental Environment for Distributed Systems and Networks B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, A. Joglekar University of Utah www.netbed.org

More information

A database implementation of data analysis and quality control for the Brewer

A database implementation of data analysis and quality control for the Brewer A database implementation of data analysis and quality control for the Brewer The most frequent source of computer problems is computer solutions International Ozone Services Inc, Full Spectrum Science

More information

SLAACers. IPv6 Accountability without DHCPv6. Library and Information Services School of Oriental and African Studies London. Networkshop 39, 2011

SLAACers. IPv6 Accountability without DHCPv6. Library and Information Services School of Oriental and African Studies London. Networkshop 39, 2011 IPv6 Accountability without DHCPv6 Library and Information Services School of Oriental and African Studies London Networkshop 39, 2011 Objective Objective is to tie in accountability 1 (abuse@). IPv4 to

More information

Tracking Packet Flow Using Path Analysis

Tracking Packet Flow Using Path Analysis CHAPTER 4 Tracking Packet Flow Using Path Analysis Path Analysis is an operations and diagnostic application that traces the connectivity between two specified points on your network and the physical and

More information

Prime Fulfillment Process Diagram - Protection Management. Preconfiguration (incl. Discovery) Check Link Perf. Protection Management

Prime Fulfillment Process Diagram - Protection Management. Preconfiguration (incl. Discovery) Check Link Perf. Protection Management CHAPTER 40 This chapter describes the process of creating and managing the protection of network elements using automated protection tools. See Chapter 38, Basic Tunnel Management for a description of

More information

In this exercise, you will import orders table from MySQL database. into HDFS. Get acquainted with some of basic commands of Sqoop

In this exercise, you will import orders table from MySQL database. into HDFS. Get acquainted with some of basic commands of Sqoop Practice Using Sqoop Data Files: ~/labs/sql/retail_db.sql MySQL database: retail_db In this exercise, you will import orders table from MySQL database into HDFS. Get acquainted with some of basic commands

More information

Locating Users in the Network with User Tracking

Locating Users in the Network with User Tracking CHAPTER 3 Locating Users in the Network with User Tracking User Tracking allows you to locate end-user hosts and IP phones in the network. It uses information gathered from network devices to display data

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

Parameterizing an iway Data Quality Server SQL Statement From an Input File or the Command Line

Parameterizing an iway Data Quality Server SQL Statement From an Input File or the Command Line Parameterizing an iway Data Quality Server SQL Statement From an Input File or the Command Line This topic describes how to parameterize an iway Data Quality Server (DQS) SQL statement from an input file

More information

The DETER Testbed: Overview 25 August 2004

The DETER Testbed: Overview 25 August 2004 The DETER Testbed: Overview 25 August 2004 1. INTRODUCTION The DETER (Cyber Defense Technology Experimental Research testbed is a computer facility to support experiments in a broad range of cyber-security

More information

Cubro Packetmaster EX32100

Cubro Packetmaster EX32100 Cubro Packetmaster EX32100 PRODUCT OVERVIEW Network Packet Broker (NPB) At a glance The Packetmaster EX32100 is a network packet broker and network controller switch that aggregates, filters and load balances

More information

A Commands. Send comments to

A Commands. Send comments to This chapter describes the Cisco NX-OS Open Shortest Path First (OSPF) commands that begin with A. UCR-555 area authentication (OSPF) area authentication (OSPF) To enable authentication for an Open Shortest

More information

PART A SIMULATION EXERCISES

PART A SIMULATION EXERCISES PART A SIMULATION EXERCISES 1. Simulate a three nodes point to point network with duplex links between them. Set the queue size and vary the bandwidth and find the number of packets dropped. set ns [ new

More information

ESVT (Experiment Specification and Visualization Tools) Version III MANUAL

ESVT (Experiment Specification and Visualization Tools) Version III MANUAL EMIST GUI MANUAL ESVT (Experiment Specification and Visualization Tools) Version III MANUAL Web: http://emist.ist.psu.edu Newsgroup: pubnews.cse.psu.edu/psu.cse.research.emist ESVT (GUI) MANUAL Page 1

More information

Infotek Solutions Inc.

Infotek Solutions Inc. Infotek Solutions Inc. Read Data from Database and input in Flight Reservation login logout and add Check point in QTP: In this tutorial we will read data from mysql database and give the input to login

More information

Troubleshooting Can not access the router on

Troubleshooting Can not access the router on Troubleshooting Can not access the router on 192.168.0.1 Please note that when accessing the router s Web interface via http://192.168.0.1 you are not accessing some web site on the Internet. The router

More information

As a reference, please find a version of the Machine Learning Process described in the diagram below.

As a reference, please find a version of the Machine Learning Process described in the diagram below. PREDICTION OVERVIEW In this experiment, two of the Project PEACH datasets will be used to predict the reaction of a user to atmospheric factors. This experiment represents the first iteration of the Machine

More information

Using the Emulab network testbed to evaluate the Armada I/O framework for computational grids

Using the Emulab network testbed to evaluate the Armada I/O framework for computational grids Using the Emulab network testbed to evaluate the Armada I/O framework for computational grids Ron Oldfield and David Kotz Dartmouth Technical Report TR2002-433 Department of Computer Science Dartmouth

More information

Chapter 9: Working With Data

Chapter 9: Working With Data Chapter 9: Working With Data o Working with Data DML Component of SQL Used with much greater frequency than DDL Used to Add / Maintain / Delete / Query tables INSERT Used to enter new records o Data entry

More information

Configuring EtherChannels

Configuring EtherChannels CHAPTER 11 This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco NX-OS. This chapter

More information

IM and Presence Service Network Setup

IM and Presence Service Network Setup Configuration changes and service restart notifications, page 1 DNS Domain Configuration, page 2 IM and Presence Service Default Domain Configuration, page 6 IM Address Configuration, page 7 Domain Management

More information

Configuring VTP. Understanding How VTP Works CHAPTER

Configuring VTP. Understanding How VTP Works CHAPTER CHAPTER 13 This chapter describes how to configure the VLAN Trunking Protocol (VTP) on the Cisco 7600 series routers. For complete syntax and usage information for the commands used in this chapter, refer

More information

IBM DB2 UDB V7.1 Family Fundamentals.

IBM DB2 UDB V7.1 Family Fundamentals. IBM 000-512 DB2 UDB V7.1 Family Fundamentals http://killexams.com/exam-detail/000-512 Answer: E QUESTION: 98 Given the following: A table containing a list of all seats on an airplane. A seat consists

More information

Dominion KX II-101-V2

Dominion KX II-101-V2 Dominion KX II-101-V2 Quick Setup Guide Thank you for your purchase of the KX II-101-V2, the industry's most full-featured, enterprise-class, secure, digital KVM (Keyboard, Video, Mouse) switch. This Quick

More information

Database Systems. phpmyadmin Tutorial

Database Systems. phpmyadmin Tutorial phpmyadmin Tutorial Please begin by logging into your Student Webspace. You will access the Student Webspace by logging into the Campus Common site. Go to the bottom of the page and click on the Go button

More information

NetVanta Series (with E1/FE1 or E1/FE1 with G.703 Drop Network Interface Module)

NetVanta Series (with E1/FE1 or E1/FE1 with G.703 Drop Network Interface Module) VPN WAN LAN PWR STAT TD RD TD RD TD RD VPN WAN LAN PWR STAT TD RD TD RD TD RD NetVanta 3200 NetVanta 3200 NetVanta Series (with E1/FE1 or E1/FE1 with G.703 Drop Network Interface Module) Quick Configuration

More information

JSON Support in MariaDB

JSON Support in MariaDB JSON Support in MariaDB Vicențiu Ciorbaru Software Engineer @ MariaDB Foundation * * JSON & GeoJSON JSON (Java Script Object Notation), a text based, platform independent data exchange format MariaDB Supports:

More information

Chapter 2 Lab 2-5, EIGRP Authentication and Timers

Chapter 2 Lab 2-5, EIGRP Authentication and Timers Chapter 2 Lab 2-5, EIGRP Authentication and Timers Topology Objectives Background Review a basic configuration of EIGRP. Configure and verify EIGRP authentication parameters. Configure EIGRP hello interval

More information

Using the Setup Script

Using the Setup Script APPENDIX A Using the Setup Script The information herein applies to the Cisco AS5350, Cisco AS5400, and Cisco AS5400HPX universal gateways that the latter requires use of Cisco IOS release 122(2)XB or

More information

VLAN Features on Hanlong IP Phones

VLAN Features on Hanlong IP Phones About VLAN VLAN Features on Hanlong IP Phones VLAN (Virtual Local Area Network) is used to logically divide a physical network into several broadcast domains. VLAN membership can be configured through

More information

Customizing Wizards with Cisco Prime Network Activation Wizard Builder

Customizing Wizards with Cisco Prime Network Activation Wizard Builder CHAPTER 3 Customizing Wizards with Cisco Prime Network Activation Wizard Builder The following topics provide detailed information about customizing Network Activation wizard metadata files using the Cisco

More information

MySQL Schema Best Practices

MySQL Schema Best Practices MySQL Schema Best Practices 2 Agenda Introduction 3 4 Introduction - Sample Schema Key Considerations 5 Data Types 6 Data Types [root@plive-2017-demo plive_2017]# ls -alh action*.ibd -rw-r-----. 1 mysql

More information

The Hazards of Multi-writing in a Dual-Master Setup

The Hazards of Multi-writing in a Dual-Master Setup The Hazards of Multi-writing in a Dual-Master Setup Jay Janssen MySQL Consulting Lead November 15th, 2012 Explaining the Problem Rules of the Replication Road A given MySQL instance: Can be both a master

More information

Alcatel OmniPCX Enterprise

Alcatel OmniPCX Enterprise Alcatel OmniPCX Enterprise Duplication System with Spatial redundancy (CPU CS B) Configuration 1 OBJECTIVE: Describe the configuration of the CPU B in case of duplicated configuration with spatial redundancy

More information

Alcatel OmniPCX Enterprise

Alcatel OmniPCX Enterprise Alcatel OmniPCX Enterprise Duplication System with Spatial redundancy (CPU CS A) Configuration 1 OBJECTIVE: Describe the configuration of the CPU A in case of duplicated configuration with spatial redundancy

More information

Subject: ASC/2M Ethernet Connection Using Comtrol DeviceMaster RTS

Subject: ASC/2M Ethernet Connection Using Comtrol DeviceMaster RTS Reference: AN1064 Date: 6/22/05 GENERAL This application note describes a method and the required hardware components to implement an Ethernet type communications connection between an Aries Communication

More information

Chapter 4: Network Access. Introduction to Networks v5.1

Chapter 4: Network Access. Introduction to Networks v5.1 Chapter 4: Network Access Introduction to Networks v5.1 4.0 Introduction 4.1 Physical Layer Protocols 4.2 Network Media 4.3 Data Link Layer Protocols 4.4 Media Access Control 4.5 Summary 2013 Cisco and/or

More information

Chapter 5 Lab 5-1, Configure and Verify Path Control

Chapter 5 Lab 5-1, Configure and Verify Path Control hapter 5 Lab 5-1, onfigure and Verify Path ontrol Topology Objectives Background onfigure and verify policy-based routing. Select the required tools and commands to configure policy-based routing operations.

More information

Cubro Packetmaster EX48600

Cubro Packetmaster EX48600 Cubro Packetmaster EX48600 PRODUCT REVIEW Network Packet Broker (NPB) At a glance The Packetmaster EX48600 is a high performance network packet broker up to Layer 4 that aggregates, filters, duplicates,

More information

Database and MySQL Temasek Polytechnic

Database and MySQL Temasek Polytechnic PHP5 Database and MySQL Temasek Polytechnic Database Lightning Fast Intro Database Management Organizing information using computer as the primary storage device Database The place where data are stored

More information

Chapter 8: Working With Databases & Tables

Chapter 8: Working With Databases & Tables Chapter 8: Working With Databases & Tables o Working with Databases & Tables DDL Component of SQL Databases CREATE DATABASE class; o Represented as directories in MySQL s data storage area o Can t have

More information

rpafktl Pen source Sphinx Search Beginner's Guide using Sphinx J community experience distilled PUBLISHING

rpafktl Pen source Sphinx Search Beginner's Guide using Sphinx J community experience distilled PUBLISHING Sphinx Search Beginner's Guide Implement fulltext search with lightning speed and accuracy using Sphinx Abbas All rpafktl Pen source I I I IV* IV I J community experience distilled PUBLISHING BIRMINGHAMMUMBAI

More information

Chapter 4 Configuring Switching

Chapter 4 Configuring Switching Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under

More information

Configuring VTP. Understanding How VTP Version 1 and Version 2 Work CHAPTER

Configuring VTP. Understanding How VTP Version 1 and Version 2 Work CHAPTER 10 CHAPTER This chapter describes how to configure the VLAN Trunking Protocol (VTP) on the Catalyst 6500 series switches For complete syntax and usage information for the commands that are used in this

More information

Perl Interface to Tivoli Netcool Performance Flow Analyzer

Perl Interface to Tivoli Netcool Performance Flow Analyzer Perl Interface to Tivoli Netcool Performance Flow Analyzer April 2010 Perl Interface to Tivoli Netcool Performance Flow Analyzer Document version 1.1 PJ McKenna IBM Galway Laboratory Copyright International

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

MYRO My Record Oriented privilege system

MYRO My Record Oriented privilege system MYRO My Record Oriented privilege system Giorgio Calderone IFC - INAF Palermo, Italy Luciano Nicastro IASF - INAF Bologna, Italy April 29, 2015 Ver. 0.3.2-alpha3 http://ross.iasfbo.inaf.it/myro This page

More information

Using MySQL on the Winthrop Linux Systems

Using MySQL on the Winthrop Linux Systems Using MySQL on the Winthrop Linux Systems by Dr. Kent Foster adapted for CSCI 297 Scripting Languages by Dr. Dannelly updated March 2017 I. Creating your MySQL password: Your mysql account username has

More information

processing data from the web

processing data from the web processing data from the web 1 CTA Tables general transit feed specification stop identification and name finding trips for a given stop 2 CTA Tables in MySQL files in GTFS feed are tables in database

More information

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007

Evaluation Strategies. Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Nick Feamster CS 7260 February 26, 2007 Evaluation Strategies Many ways to evaluate new protocols, systems, implementations Mathematical analysis Simulation (ns, SSFNet, etc.) Emulation

More information

NGN Progress Report. Table of Contents

NGN Progress Report. Table of Contents NGN Progress Report Title: Simulator Scalability Testing Prepared by: Richard Nelson Date: 08 February, 2006 Table of Contents Introduction...2 Simulators...2 Test Method...2 Simulation Model...2 CPU Utilisation...2

More information

Drop Table If Exists Sql Command Not Properly Ended

Drop Table If Exists Sql Command Not Properly Ended Drop Table If Exists Sql Command Not Properly Ended Wait, this does not work! SQL_ drop table if exists t, drop table if exists t * ERROR at line 1: ORA-00933: SQL command not properly ended. Okay. It

More information

Traffic violations revisited

Traffic violations revisited Traffic violations revisited November 9, 2017 In this lab, you will once again extract data about traffic violations from a CSV file, but this time you will use SQLite. First, download the following files

More information

PureSight Log Server Installation Manual

PureSight Log Server Installation Manual PureSight Log Server Installation Manual ii PureSight Log Server Installation Manual Copyright Notice Copyright 2004 PURESIGHT INC. All rights reserved. Any technical documentation that is made available

More information

Lesson 2 RMAN Architecture

Lesson 2 RMAN Architecture RMAN Architecture 2.1 Lesson 2 RMAN Architecture An introduction to the architecture and components used by the RMAN utility. SKILLBUILDERS Author: Dave Anderson, SkillBuilders RMAN Architecture 2.2 2.2

More information

New Storage Architectures

New Storage Architectures New Storage Architectures OpenFabrics Software User Group Workshop Replacing LNET routers with IB routers #OFSUserGroup Lustre Basics Lustre is a clustered file-system for supercomputing Architecture consists

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

This lab will introduce you to MySQL. Begin by logging into the class web server via SSH Secure Shell Client

This lab will introduce you to MySQL. Begin by logging into the class web server via SSH Secure Shell Client Lab 2.0 - MySQL CISC3140, Fall 2011 DUE: Oct. 6th (Part 1 only) Part 1 1. Getting started This lab will introduce you to MySQL. Begin by logging into the class web server via SSH Secure Shell Client host

More information

ESVT (Experiment Specification and Visualization Tools) Version II MANUAL

ESVT (Experiment Specification and Visualization Tools) Version II MANUAL EMIST GUI MANUAL ESVT (Experiment Specification and Visualization Tools) Version II MANUAL Web: http://emist.ist.psu.edu Newsgroup: pubnews.cse.psu.edu/psu.cse.research.emist ESVT (GUI) MANUAL Page 1 of

More information

Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions

Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions Root-Cause Network Troubleshooting Optimizing the Process Tim Titus CTO, PathSolutions 1 Agenda Business disconnect Why is troubleshooting so hard? Troubleshooting methodology Tool selection Finding the

More information

Partitioning. Sheeri K. Cabral Database Administrator The Pythian Group, January 12, 2009

Partitioning. Sheeri K. Cabral Database Administrator The Pythian Group,  January 12, 2009 Partitioning Sheeri K. Cabral Database Administrator The Pythian Group, www.pythian.com cabral@pythian.com January 12, 2009 Partitioning Why What How How to Partition CREATE TABLE tblname ( fld FLDTYPE...

More information

Type Java.sql.sqlexception Error Code 0 Sql State S1000

Type Java.sql.sqlexception Error Code 0 Sql State S1000 Type Java.sql.sqlexception Error Code 0 Sql State S1000 sql query result parsing -SQL Error: 0, SQLState: S1000 - Unknown type '14 in column 3 of 4 in binary-encoded Browse other questions tagged java

More information