CS 6CC3/4CC3. Advanced Operating Systems. Laboratory 6. O.S. Primitives for BOEWULF and NFS Clustering

Size: px
Start display at page:

Download "CS 6CC3/4CC3. Advanced Operating Systems. Laboratory 6. O.S. Primitives for BOEWULF and NFS Clustering"

Transcription

1 CS 6CC3/4CC3 Advanced Operating Systems Laboratory 6 O.S. Primitives for BOEWULF and NFS Clustering CIS trunk Ethernet mills birkhoff moore FDDI / 1 Gbps ritchie DNS server CAS branch Ethernet CAS branch router CIS DNS servers router/firewall RTOO.syslab ITB232-RTR lion RJ Mbps CISCO 100Mbps switch B1 B2 B3 B4 B5 B6 syslab twig Ethernet (ITB-134) File:lab6cnf.cfl Date:oct04/wfsp LAB to be done in round-robin form. File:4cc04lb6.doc Date:25oct04/wfsp Revision level: 0

2 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-2 INTRODUCTION This lab will introduce you to TCP/IP networking under the UNIX operating system. You will explore various networking facilities available under UNIX using a variety of TCP/IP based applications. You will also implement a client/server application to get a feel for distributed network communication and processing. OVERVIEW This lab is organized into two parts which each require one lab session to complete data collection. Part I will familiarize you with high level network utilities: how they are used and the protocols they employ. FOR THIS LAB GROUP ONLY, since the first session was far to disorganized, this lab will guide you though similar operations but data taking will be much more systematic and time plots of RMS (Record Management System or filesystem) accesses via rcp and cp commands will be made. Hence only Part I need be completed and handed into the marker as one lab report seven days after the end of the second session of the lab (this session). Also the lab will be done from either ITB-236 or ITB-235 under the Solaris machines using X-window access. BACKGROUND Computer networks have revolutionized our use of computers. They pervade our everyday life, from automated teller machines, to airline reservation system, to electronic mail services, to electronic bulletin boards. There are many reasons for the explosive growth in computer networks. The proliferations of personal computers and workstations during the 1990s helped fuel the interest and need for networks. Technology has greatly reduced the cost of establishing computer networks, and networks are now found in organizations of every size. Many computer manufacturers now package networking software as part of the basic operating system. Networking is no longer regarded as an add-on that only a few customers want. It is now considered as essential as a text editor. We are in an information age and computer networks are becoming an integral part in the dissemination of information. Computer systems were initially constructed to be stand-alone entities. Each computer was self-contained and possessed all the peripherals and software required to do a particular job. If a particular feature was needed, such as printer output, a printer was attached to the system. If large amounts of disk storage were needed, disks were added to the system. What helped change this is the realization that computers and their users need to share information and resources. Information sharing can be electronic mail or file transfers. Resource sharing can involve accessing peripherals on another system. Twenty years ago this type of sharing took place

3 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-3 by exchanging magnetic tapes, decks of punched cards, and printer output. Today computers can be connected together from across oceans by electronic networks. A network can be as simple as two personal computers connected via a serial line, or as complex as the TCP/IP Internet, which ties together over millions of systems across the world. The number of ways to connect a computer to a network, are many, as are the various things we can do once connected to a network. Some typical network applications are: Exchange electronic mail with users on other systems. It is almost as common place for address to be found on business cards as are phone numbers. Exchange information and files between systems. Information and data can reside in one place while others access via the network. This avoids having to distribute information via floppies, tapes, or paper. (This mode is often referred to as "sneaker net"!) Share peripheral devices. Efficient use can be made of peripheral devices like printers and tape backup units if they can be shared as a common resource. The cost of the network can be offset through the cost savings returned by the efficient sharing of resources. Distributed processing of computer programs. Networks can be used to distribute a complex application across multiple machines allowing for faster execution. Tasks, which once require the processing power of a Cray, can be handled by a network of smaller cheaper workstations, working in parallel. Remote login and network based file systems. Users can login to interconnected systems without having to physically change terminals. Large numbers of users can often be handle more easily by clustering multiple workstations together and using the network to transparently share a common file space. We will explore the underpinnings for each of these areas further in the lab. LAYERING Given a particular task that we want to solve, such as providing a way to exchange files between two computers, we divide the task into pieces and solve each piece. In the end we connect the pieces back together to form the final solution. We could write a monolithic system to solve the problem, but experience has shown that solving the problem in pieces leads to a better, and more extensible, solution. OSI Model The starting point for describing the layers in a network is the International Standards Organization (ISO) open systems interconnection model (OSI) for computer communications. This is a seven layer model show in figure 1(a). The OSI model provides a detailed standard for describing a network. Most computer networks today are described using the OSI model. Figure 1(b) shows how TCP/IP fits into the OSI model. The transport layer is important because it is the lowest of the seven layers that provides reliable data transfer between two systems. The layers above the transport layer can

4 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-4 assume they have an error-free communications channel. Details, such as sequence control, error detection, retransmission and flow control, are handled by the transport layer and the layers below it. Processes A fundamental entity in a computer network is a process. A process is a program that is being executed by the computer's operating system. When we say that two computers are communicating with each other, we mean that two processes, one running on each computer, are in touch with each other. (a) Layer 7 -- APPLICATION Layer 6 -- PRESENTATION (b) process process OSI layers 5-7 APPLICATION Layer 5 -- SESSION Layer 4 -- TRANSPORT Layer 3 -- NETWORK process TCP UDP ICMP IP IGMP OSI layer 4 TRANSPORT OSI layer 3 NETWORK Layer 2 -- DATA LINK Layer 1 -- PHYSICAL hardware ARP RARP OSI layers 1-2 DATA LINK Figure 1: (a) The Seven Layers of the OSI "Standard"; (b) The TCP Suite of Protocols Relative to this standard. Client-Server Model The standard model for a network application is the client-server model. A server is a process that is waiting to be contacted by a client process so that the server can do something for the client. A typical scenario is as follows: The server process is started on some computer system. It initializes itself, then goes to sleep waiting for a client process to contact it requesting some service. A client process is started, either on the same system or on another system that is connected to the server's system with a network. Client processes are often initiated by an interactive user entering a command to a time-sharing system. The client process sends a request across the network to the server requesting service of some form. Some examples of the type of service that a server can provide are: - Return time of day to the client - Print a file on the server's system - Exchange electronic mail - Read or write to the server's systems filespace - Execute a program

5 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-5 When the server process has finished providing its service to the client, the server goes back to sleep, waiting for the next client request to arrive. We can further divide the server process into two types. 1. When a client's request can be handled by the server in a known, short amount of time, the server process handles the request by itself. We call these iterative servers. A time-ofday service is typically handled as an iterative server. 2. Then the amount of time to service a request depends on the request itself (so that the server doesn't know ahead of time how much effort it takes to handle each request), the server typically handles it in a concurrent fashion. These are called concurrent servers. A concurrent server invokes another process to handle each client request, so that the original server process can go back to sleep, waiting for the next client request. An example of a concurrent server is the sendmail daemon, which accepts from remote sites. Lab Equipment This laboratory can be done using any TCP/IP based network with machines running a variant of the UNIX operation system called Linux. A formal lab has been established with multiple Intel based 586 PCs running either the older Slackware product or the newer Red Hat version of Linux. These machines are interconnected using SMC 10Mbps ethernet cards over a coax based ethernet (thin-net). The PCs have been configured to run X windows and all files, depending on login ID may or may NOT be shared across the machines via NFS. PARTs I & II Introduction The purpose of this lab is to introduce you to the UNIX and TCP/IP networking environment. We assume you have a working knowledge of basic UNIX commands like ls, cd, mkdir, vi, and other basic utilities. In this section you will use network utilities to get a feel for higher level networking functionality. You will use these higher level network utilities to move files through the network from one machine to another and you should make notes and comment on functionality, efficiency, and constraints for each method. Because the data taking is rather extensive, BOTH lab sessions will be used for the following operations. Please try to get as far as possible working your way through the procedures outlined below during Part I (the first session) of the laboratory. Session II will be used to complete the data acquisition. Network Utilities Most flavours of BSD UNIX include a core set of high level TCP/IP utilities. These are refered to as the "r" commands. They include rcp, rsh, rlogin, rdump, rusers, and rup. They, respectively, handle remote copying of files, remote (shell) execution of programs, remote login, remote backups, display of users on remote machines, and display

6 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-6 of uptime statistics of remote machines. Other commands, which are often part of the TCP/IP suite of utilities, are finger, telnet, ftp, and ping. These are used to query user information, log onto remote systems, do file transfers, and check network state of remote systems. The usage of all these commands are explained in online man pages (example "man ping"). Because these instructions require the involved computers to be TRUSTED components (i.e. not asking for login/password for every access), these activities are usually accomplished among computers which are behind a protective firewall. The details of how firewall works and configured are examined in other labs you will be doing later in the course. CIS trunk Ethernet ritchie DNS server FDDI / 1 Gbps birkhoff WOLFs iii ooo FOXes jjj ooo CAS branch Ethernet CAS branch router CIS DNS servers router/firewall RTOO.syslab ITB232-RTR lion RJ Mbps CISCO 100Mbps switch B1 B2 B3 B4 B5 B6 syslab twig Ethernet (ITB-134) File:lab6cnf.cfl Date:oct04/wfsp Figure 2: Architectural topology for the Beowulf clustering laboratory (#6) in cs4cc3/6cc3. Network File System The Network File System (or NFS) was developed by Sun Microsystems to allow files on separate machines to appear to be local to each machine. NFS was designed to allow transparent access to files without regard to where the actual file existed on the network. The NFS system is based on the client/server model and uses TCP/IP protocols for all file accesses. You will notice that regardless of what machine you log into within the Computer

7 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-7 Science Department you will see a consistent home directory. All your files are available from wolfs<n> and foxes<m> and the UNIX PCs in this TCP/IP lab. All UNIX workstations and UNIX PCs use NFS to "mount" users files from birkhoff. In this configuration, birkhoff is referred to as the File Server. See figure 3 for the distinction between file servers and display servers and clients to both, including NFS/local file attachment considerations. Note that for the X-window to function properly, the X-client MUST have authorization to use your console machine as an X-display server so that the.rhosts file must include the wolf and fox computer names for permission to do so. If any errors occur, such as "incorrect login" when the "remote" commands are attempted, contact a technical staff member or TA. Such problems may have occurred in the X-windows lab done individually as the first lab in this course. This may indicate that the machines are not sharing in a "trusted" domain relationship, which can occur when server reboots have recently been necessary to perform. In the case for our BOEWULF machines with have utilized a more global (and therefore highly risky situation but we are behind a firewall so things are OK), method using a file set by root privileges, called hosts.equiv. It can be found in the /etc/ directory of any of the BEOWULF machines and contains the text as shown below. Explain the meaning of the + signs and report on this in the lab write-up. File Transfers There are several ways to transfer files from one machine to another under most TCP/IP networks. (Again an inter-computer trusted environment is assumed) 1. rcp rcp file remote:file rcp remote1:file remote2:file

8 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-8 NOTE: rcp accesses files relative to your home directory on each machine. You must have an account with the same login name on both machines. 2. ftp (available but we will not be using this method here) ftp remote username: password: ftp send file-1 ftp get file-2 ftp quit 3. NFS NOTE: Only superuser can mount filesystems from other machines. All mounts have already been made for you as illustrated in figure 3. Hence a simple copy (cp) command could be employing user transparent NFS (remote) file systems (by previous linked mount), which could be the same as using the explicit rcp command. In this configuration the file path for root, "/" means the local file system and the home file path, "~" means the NFS mount which may or may not be a connection to the local Record Management System (RMS). This will be explored further in the lab session that follows. mount remote:/filesystem /remote cp file-1 /remote/file-2 cp /remote/file-1 file-2 Timing Commands You might wish to time how long it has taken a particular command to execute. You will need to do this to evaluate the efficiency of the various network file transfers you must perform. To time a command you simply pre-append the "time" command to the form of the command. Example: time rcp file remote:file The time taken will display as: 0.050u 0.080s 0: % 0+48k 1+0io 3pf+0w The first number is the amount of USER time taken in ms, the second number is the amount of SYSTEM time taken and the third number will be the amount of elapsed wall clock time. Take particular note of these three times as we shall be recording them and doing plots from a spreadsheet with them. You can ignore the other numbers.

9 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-9 Laboratory Procedures Section 1.0 In the group subdirectory (usually cs4cc3.dat) you'll find ten files named 512b, 1k, 2k, 4k, 8k, 16k, 64k, 512k, 1m, 2m, 4m and 8m. These filenames match the sizes of the respective files. You will be using two of the three file transfer methods mentioned previously to copy each of these files, say, from your home space on rtoo to your local NFS link NFS link NFS link "rtoo" (P266) CPU/RAM cs4cc3 login client cs4cd3 login client RMS cs4cd3 local space cs4cc3 home space "b3" (P75) CPU/RAM cs4cc3 login client cs4cd3 login client RMS cs4cd3 local space "b4" (P75) CPU/RAM cs4cc3 login client cs4cd3 login client RMS cs4cd3 local space lb6fg3.cfl wfsp/oct04 rlogin rtoo -l cs4cd3 rlogin rtoo -l cs4cc3 NFS link X-window display service Legend "WOLF"n - Solaris or "FOX"n - Solaris xtrm xtrm "birkhoff" (SUN-4500) CPU/RAM muss(cas) login client RMS CAS home space AS NFS File Server AS local File Server AS X-Server AS X-client SUN Ultra SPArc 5(10) console login CAS account Figure 3: Login and environment used for lab6 (Beowulf cluster) data extraction. space on the Beowulf (bn) machines. You are to time how long it takes each file to be transferred by each method and you are to plot the time taken in seconds versus the file size for each method. You should copy each file several times noting the transfer times for the first copy and the transfer times for subsequent copies. When plotting show time discrepancies as error bars on the graph. Also provide the OS system and user times as illustrations of the OS load during these transfers. The easiest way to do these transfers is probably to use the setup illustrated in figure 3. Here, a login with one group member s CAS or muss loginid and password will start an X-session. Start up two x-terminals and attach each to the

10 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-10 rtoo machine as two different loginids: cs4cc3/cs4cc3 and cs4cd3/cs4cd3. Next, within each xterm, use the Secure Shell (ssh) method (although a telnet session would work) to login to say the b3 machine. The difference, as noted in the diagram, is that cs4cc3 login has script files on the boewulf (bn) machines that establish a NFS link to rtoo, while the cs4cd3 logins do not. Figure 4: File configuration for the cs4cd3 login on b3 (left) and b4 (right) machines via ssh. The data files to be used for transfers should be found (that is, determine which directory they are in) on b3 for each login ID and also a temporary subdirectory should be created into which the copied files will be placed.

11 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-11 The two panels below illustrate where the data files are housed in b3 and b4, for example Since the logins are both under cs4cd3, these are local file space configurations. Figure 5: File configuration for the cs4cc3 login on the b3 machine via ssh. Figure 5 and 6 panels illustrate the configuration for the cs4cc3 login filespace, which is shared on rtoo. IN both cases, locate and reproduce in your lab writeup, what the NFS command did to make filespace shared such that it produces the listing under both disk free (df) and ls la commands as below.

12 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-12 Section 2.0 In order to obtain an appreciation for the difference in transfer times when copying files over the network versus copying locally on the same machine perform the following steps. Do this with most of the files present, although do not spend more than about 10 minutes on the largest nor bother with files that require sub-second times to transfer. For each transfer command listed do the same file transfer three times each in a row for each of the different file sizes. Using a script <filename> command may be useful rather than recording results by hand, since there will be so many. Figure 6: File configuration for the cs4cc3 login on the b4 machine via ssh.

13 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page NFS (sitting in front of the x-display server (wolf or fox) logged into cs4cc3 on b3 or b4) time cp /datdir/8m /some_tmp_dir/xyz Do the copy two more times and note how long it takes now and for subsequent copies. Note the time it takes to copy 8m file, 4m and the other files. Record the results and attempt to prognosticate on any consistent differences in timing. Plot the file size versus time required for the cp on NFS filesystems. 2.2 local (sitting in front of wolf or fox and logged into cs4cd3 on b3 or b4) time cp /datdir/4m /some_tmp/xyz time cp [-- second copy] etc. Do the copy two more times and note how long it takes now and for subsequent copies. Note the time it takes to copy 4m file, 2m and the other files. Record the results and attempt to prognosticate on any consistent differences in timing. Plot the file size versus time required for the cp on the local filesystem. 2.3 remote to local (sitting in front of wolf or fox and logged into cs4cd3 on b3 or b4) time rcp b3: 8m b4: 8m where it is assumed the correct subdirectories have been added to the files as prefixes to create the correct file specification path. Do this three times in total for each file and then for the usual set of files after that. In this step also do the reverse operations, that is, b4 to b3 remaining logged into whichever machine that was used in the first part of this section. Compare these times with the rcp that will be done next and comment on any difference found. Why do you suppose there is a difference? 2.3 remote/nfs to local (sitting in front of wolf or fox and logged into cs4cc3 on b3 or b4) time rcp b3: 8m b4: 8m where it is assumed the correct subdirectories have been added to the files as prefixes to create the correct file specification path. Do this three times in total for each file and then for the usual set of files after that.

14 2004/2005 CS 4CC3/6CC3 -- Laboratory 6 page 6-14 In this step also do the reverse operations, that is, b4 to b3 remaining logged into whichever machine that was used in the first part of this section. Is there a consistently different time taken to copy the 8m file from the directory /tmp/cs4cc3a? to the file 8m in the same directory, than to copy the 8m file from your home directory to the /tmp/cs4cc3a? directory? If so explain. In other words, ignoring the effects of buffering, why would remote-to-local be faster than local-to-local or visa-versa? There are several possible reasons -- name as many reasons as you can. Note1: /tmp/cs4cc3a is a directory on the local disk while your home directory is mounted via NFS from a disk on rtoo, as illustrated in figure 3. Note2: to defeat OS buffering of disk blocks when timing copies simply do the following: cp file file.tmp cp file.tmp file This will keep the file the same size and have the same contents but the OS will have to ignore any buffered blocks just in case the file has changed. <End of Part I and Part II> file:4cd04lb6.doc date:24oct04/wfsp revision level: 0

UNIX Essentials Featuring Solaris 10 Op System

UNIX Essentials Featuring Solaris 10 Op System A Active Window... 7:11 Application Development Tools... 7:7 Application Manager... 7:4 Architectures - Supported - UNIX... 1:13 Arithmetic Expansion... 9:10 B Background Processing... 3:14 Background

More information

What is a Network? TCP / IP. The ISO OSI Model. Protocols. The TCP/IP Protocol Suite. The TCP/IP Protocol Suite. Computer network.

What is a Network? TCP / IP. The ISO OSI Model. Protocols. The TCP/IP Protocol Suite. The TCP/IP Protocol Suite. Computer network. What is a Network? TCP / IP Computer network a set of computers using common protocols to communicate over connecting transmission media. Protocol a formal description of message formats and the rules

More information

Configuring Basic File Transfer Services

Configuring Basic File Transfer Services Using basic file transfer services, you can configure a router as a Trivial File Transfer Protocol (TFTP) or Reverse Address Resolution Protocol (RARP) server, configure the router to forward extended

More information

Introduction. An introduction to the equipment and organization of the Internet Lab.

Introduction. An introduction to the equipment and organization of the Internet Lab. Introduction An introduction to the equipment and organization of the Internet Lab. Some material in this slide set is copyrighted, Pearson Education, 2004 Internet Lab Equipment 4 Linux PCs 4 Cisco Routers

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) slide 1 References: Douglas Comer, Internetworking with TCP/IP, p430-432 Simson Garfinkel and Gene Spafford, Practical UNIX and Internet Security, p605-631 NFS is used by GNU/Linux

More information

IP fields. TCP/IP Support Protocols. IP datagram structure. IP fields. are another reason TCP/IPs popularity. total length

IP fields. TCP/IP Support Protocols. IP datagram structure. IP fields. are another reason TCP/IPs popularity. total length IP fields slide 3 TCP/IP Support Protocols slide are another reason TCP/IPs popularity version IHL type of service total length identification D F M F fragment offset time to live protocol source address

More information

CSE115 Lab exercises for week 1 of recitations Spring 2011

CSE115 Lab exercises for week 1 of recitations Spring 2011 Introduction In this first lab you will be introduced to the computing environment in the Baldy 21 lab. If you are familiar with Unix or Linux you may know how to do some or all of the following tasks.

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication

More information

TotalView. Installation Guide. November 2004 version 6.6

TotalView. Installation Guide. November 2004 version 6.6 TotalView Installation Guide November 2004 version 6.6 Copyright 1998 2004 by Etnus LLC. All rights reserved. Copyright 1996 1998 by Dolphin Interconnect Solutions, Inc. Copyright 1993 1996 by BBN Systems

More information

Network File System. Network File System (NFS) NFS Advantages. Network File System Disadvantages

Network File System. Network File System (NFS) NFS Advantages. Network File System Disadvantages Network File System (NFS) slide 1 Network File System slide 2 References: Douglas Comer, Internetworking with TCP/IP, p430-432 Simson Garfinkel and Gene Spafford, Practical UNIX and Internet Security,

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.

Preface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p. Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors

More information

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1 Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Installing Connector on Linux

Installing Connector on Linux CHAPTER 3 Revised: July 15, 2010 Overview This chapter provides a step-by-step guide to installing the Linux Connector on x86 and x86-64 servers running either Red Hat Enterprise Linux version 5 or Cent

More information

Software Engineering 4C03 Answer Key

Software Engineering 4C03 Answer Key Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 2-1 LAYERED TASKS We use the concept of layers in our daily life. As an example,

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

Using WestGrid from the desktop Oct on Access Grid

Using WestGrid from the desktop Oct on Access Grid Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you

More information

Basic File Transfer Services Commands

Basic File Transfer Services Commands Basic File Transfer Services Commands This chapter provides detailed descriptions of commands used to configure basic file transfer services on a Cisco routing device. For configuration information and

More information

Getting your department account

Getting your department account 02/11/2013 11:35 AM Getting your department account The instructions are at Creating a CS account 02/11/2013 11:36 AM Getting help Vijay Adusumalli will be in the CS majors lab in the basement of the Love

More information

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one] Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of

More information

EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION

EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION EXPERIENCES WITH VIRTUALIZATION TECHNOLOGY IN EDUCATION Timothy Bower Kansas State University at Salina 785-826-2920 tim@ksu.edu ABSTRACT This paper describes how virtualization technology was used to

More information

CS 2400 Laboratory Assignment #1: Exercises in Compilation and the UNIX Programming Environment (100 pts.)

CS 2400 Laboratory Assignment #1: Exercises in Compilation and the UNIX Programming Environment (100 pts.) 1 Introduction 1 CS 2400 Laboratory Assignment #1: Exercises in Compilation and the UNIX Programming Environment (100 pts.) This laboratory is intended to give you some brief experience using the editing/compiling/file

More information

Lab Command Line Fundamentals Instructor Version 2500

Lab Command Line Fundamentals Instructor Version 2500 Lab 2.2.9 Command Line Fundamentals Instructor Version 2500 Objective Log into a router and go to the user and privileged modes. Use several basic router commands to determine how the router is configured.

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

General Terms Node - File Permissions - file permissions file

General Terms Node - File Permissions - file permissions file CIS 375 General Terms Node - A networked computing device that takes a protocol address andcan initiate and respond to communication from other networked devices that employ similar protocols. File Permissions

More information

IBM AIX Operating System Courses

IBM AIX Operating System Courses IBM AIX Operating System Courses (Platforms: POWER4+ based) AIX Basics Fundamentals (3 days) AIX Basics Shell Scripting (Korn / Bash ) and awk Programming (3 days) Advanced IBM AIX Systems Programming

More information

7 Additional Information for Networking

7 Additional Information for Networking 7 Additional Information for Networking In this Chapter... Introduction, 7-2 Testhead IP Addresses, 7-3 The Private LAN, 7-5 The Public LAN, 7-7 Bridges, Routers, and Gateways, 7-9 Clients and Servers,

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE William Stallings F.1 TCP/IP LAYERS... 2 F.2 TCP AND UDP... 4 F.3 OPERATION OF TCP/IP... 6 F.4 TCP/IP APPLICATIONS... 10 Copyright 2014 Supplement to Computer

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza Sommario Shell command language Introduction A

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

CCNA Exploration Network Fundamentals

CCNA Exploration Network Fundamentals CCNA Exploration 4.0 1. Network Fundamentals The goal of this course is to introduce you to fundamental networking concepts and technologies. These online course materials will assist you in developing

More information

Distributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks.

Distributed Systems. Why use distributed systems? What is a distributed system? Intro to Distributed Systems and Networks. Intro to Distributed Systems and Networks Hank Levy Distributed Systems Nearly all systems today are distributed in some way, e.g.: they use email they access files over a network they access printers

More information

Table of Contents. Appendix A - More on Windows. M205/M206 Installation and Configuration Guide

Table of Contents. Appendix A - More on Windows. M205/M206 Installation and Configuration Guide Table of Contents Overview......................................... A-1 Key Features......................................... A-1 New Features......................................... A-1 M205/M206 Configuration.....................................

More information

Fedora Core: Made Simple

Fedora Core: Made Simple Table of Contents Installing Fedora...2 Before you begin...2 Compatible Hardware...2 Minimum Requirements...2 Disk Space Requirements...2 Help! Booting from the CD ROM Drive Fails!...2 Installing Fedora

More information

10 Defense Mechanisms

10 Defense Mechanisms SE 4C03 Winter 2006 10 Defense Mechanisms Instructor: W. M. Farmer Revised: 23 March 2006 1 Defensive Services Authentication (subject, source) Access control (network, host, file) Data protection (privacy

More information

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Esercitazione Introduzione al linguaggio di shell Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza

More information

03 The Internet Model and TCP/IP

03 The Internet Model and TCP/IP SE 4C03 Winter 2003 03 The Internet Model and TCP/IP Instructor: W. M. Farmer Revised: 16 January 2003 1 The OSI Model In 1977 the International Standards Organization (ISO) offered the Open Systems Interconnection

More information

The Client Server Model and Software Design

The Client Server Model and Software Design The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction

More information

Specialized Programme on Internetworking Design and LAN WAN Administration

Specialized Programme on Internetworking Design and LAN WAN Administration Specialized Programme on Internetworking Design and LAN WAN Administration OBJECTIVE OF THE PROGRAMME The main objective of the programme is to build capacity of the professionals drawn from industry,

More information

Network Programming. Introduction to Sockets. Dr. Thaier Hayajneh. Process Layer. Network Layer. Berkeley API

Network Programming. Introduction to Sockets. Dr. Thaier Hayajneh. Process Layer. Network Layer. Berkeley API Network Programming Outline Definitions Dr. Thaier Hayajneh Computer Engineering Department Berkeley API Socket definition and types Introduction to Sockets 1 2 Process Process Process Layer TCP SCTP UDP

More information

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File-Systems, Silberschatz, Galvin and Gagne 2009 Chapter 11: Implementing File Systems File-System Structure File-System Implementation ti Directory Implementation Allocation

More information

OPERATING SYSTEM. Chapter 12: File System Implementation

OPERATING SYSTEM. Chapter 12: File System Implementation OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management

More information

Shell Programming Overview

Shell Programming Overview Overview Shell programming is a way of taking several command line instructions that you would use in a Unix command prompt and incorporating them into one program. There are many versions of Unix. Some

More information

Using AutoInstall and Setup

Using AutoInstall and Setup Using AutoInstall and Setup The Cisco IOS software includes two features that simplify or automate the configuration of Cisco devices AutoInstall allows a network manager to load configuration files onto

More information

ADINA DMP System 9.3 Installation Notes

ADINA DMP System 9.3 Installation Notes ADINA DMP System 9.3 Installation Notes for Linux (only) ADINA R & D, Inc. 71 Elton Avenue Watertown, MA 02472 support@adina.com www.adina.com page 2 of 5 Table of Contents 1. About ADINA DMP System 9.3...3

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment 5. This chapter explains how to configure PRICOM in UNIX/Linux environment and how to print using LPD and FTP. For further information not covered in this manual, refer to the manual of workstation you

More information

Providing Users with Access to the SAS Data Warehouse: A Discussion of Three Methods Employed and Supported

Providing Users with Access to the SAS Data Warehouse: A Discussion of Three Methods Employed and Supported Providing Users with Access to the SAS Data Warehouse: A Discussion of Three Methods Employed and Supported Cynthia A. Stetz, Merrill Lynch, Plainsboro, NJ Abstract A Data Warehouse is stored in SAS datasets

More information

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems Operating System Concepts 99h Edition DM510-14 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation

More information

TJU Syllabus for Linux Fundamentals and Applications

TJU Syllabus for Linux Fundamentals and Applications TJU Syllabus for Linux Fundamentals and Applications Code: 2160281 Title: Linux Fundamentals and Applications Semester Hours: 40 Credits: 2 Semester Structure Offered by: for: Prerequisite: Hour Lecture:24

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing 521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief

OSI Reference Model. Computer Networks lab ECOM Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief Islamic University of Gaza Faculty of Engineering Computer Engineering Department Computer Networks lab ECOM 4121 OSI Reference Model Prepared By : Eng. Motaz Murtaja Eng. Ola Abd Elatief May /2010 OSI

More information

UPDATING FIRMWARE ON SUN FIRE

UPDATING FIRMWARE ON SUN FIRE UPDATING FIRMWARE ON SUN FIRE V20Z AND SUN FIRE V40Z SERVERS USING MICROSOFT WINDOWS 2000, WINDOWS XP, OR WINDOWS SERVER 2003 Pierre Reynes, Network Systems Group Sun BluePrints OnLine September 2005 Part

More information

N E T W O R K. MSC.Marc 2000 Network Version for UNIX. Installation and User Notes

N E T W O R K. MSC.Marc 2000 Network Version for UNIX. Installation and User Notes N E T W O R K MSC.Marc 2000 Network Version for UNIX Installation and User Notes MSC.Marc 2000 Network Version for UNIX Installation and Usage This document describes the installation and usage of the

More information

HP Advanced Server V5.1B-3 for UNIX. Overview

HP Advanced Server V5.1B-3 for UNIX. Overview Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

NFS Design Goals. Network File System - NFS

NFS Design Goals. Network File System - NFS Network File System - NFS NFS Design Goals NFS is a distributed file system (DFS) originally implemented by Sun Microsystems. NFS is intended for file sharing in a local network with a rather small number

More information

CSC 112 Lab 1: Introduction to Unix and C++ Fall 2009

CSC 112 Lab 1: Introduction to Unix and C++ Fall 2009 CSC 112 Lab 1: Introduction to Unix and C++ Fall 2009 Due: Friday, September 4 th, 9:00am Introduction The operating system of a computer is the coordinator of all of the computer s activities, including

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

M205/M206 v5.6.5 Release Notes

M205/M206 v5.6.5 Release Notes M205/M206 v5.6.5 Release s Microplex Systems Ltd. Fax: +1 604 444-4239 8525 Commerce Court Support: +1 800 665-7798 Burnaby, BC V5A 4N3 Internet: support@microplex.com Canada FTP: ftp.microplex.com Tel:

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

AMS 200: Working on Linux/Unix Machines

AMS 200: Working on Linux/Unix Machines AMS 200, Oct 20, 2014 AMS 200: Working on Linux/Unix Machines Profs. Nic Brummell (brummell@soe.ucsc.edu) & Dongwook Lee (dlee79@ucsc.edu) Department of Applied Mathematics and Statistics University of

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

CSCE 212H, Spring 2008, Matthews Lab Assignment 1: Representation of Integers Assigned: January 17 Due: January 22

CSCE 212H, Spring 2008, Matthews Lab Assignment 1: Representation of Integers Assigned: January 17 Due: January 22 CSCE 212H, Spring 2008, Matthews Lab Assignment 1: Representation of Integers Assigned: January 17 Due: January 22 Manton Matthews January 29, 2008 1 Overview The purpose of this assignment is to become

More information

RFC RFC. Configuring FTP Server. FTP Clients

RFC RFC. Configuring FTP Server. FTP Clients RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,

More information

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6 Users Manual OP5 System 2.4 OP5 AB. Page 1 of 6 Table of Contents INTRODUCTION...3 FUNDAMENTALS...3 SYSTEM...3 ACCESS...3 ACCOUNTS...3 CONFIGURATION...4 NETWORK...4 SHUTDOWN...4 SERVICES...5 UPGRADE /

More information

5. Write a capture filter for question 4.

5. Write a capture filter for question 4. Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

Chapter 11: File System Implementation

Chapter 11: File System Implementation Chapter 11: File System Implementation Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Installing a Cisco Prime Network Unit

Installing a Cisco Prime Network Unit CHAPTER 9 This chapter covers the typical installation of a Cisco Prime Network unit. This chapter includes: Before You Begin, page 9-1 Installing the Unit, page 9-2 Verifying the Unit Processes, page

More information

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

CCNA 1 Final Exam Answers UPDATE 2012 eg.1 CCNA 1 Final Exam Answers UPDATE 2012 eg.1 January 12th, 2012AdminLeave a commentgo to comments Which of the following are the address ranges of the private IP addresses? (Choose three.) 10.0.0.0 to 10.255.255.255

More information

File-System Structure

File-System Structure Chapter 12: File System Implementation File System Structure File System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured

More information

Requirements for ALEPH 500 Installation

Requirements for ALEPH 500 Installation PROJECT DOCUMENTATION Requirements for ALEPH 500 Installation Ltd., 2002, 2003 Last Update: July 31, 2003 Table of Contents 1. SERVER HARDWARE AND SOFTWARE REQUIREMENTS... 3 1.1 Server...3 1.2 Filesystem

More information

Veritas NetBackup Vault Administrator s Guide

Veritas NetBackup Vault Administrator s Guide Veritas NetBackup Vault Administrator s Guide UNIX, Windows, and Linux Release 6.5 12308354 Veritas NetBackup Vault Administrator s Guide Copyright 2001 2007 Symantec Corporation. All rights reserved.

More information

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup.

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup. Use a class C setting for maximum security. The class C setting is 255.255.255.0. 2 Click RoomWizard Setup. The Default Gateway is the IP address of the router or gateway that provides internet access.

More information

The Integrated File System Configuration Guide, Cisco IOS Release 15SY

The Integrated File System Configuration Guide, Cisco IOS Release 15SY The Integrated File System Configuration Guide, Cisco IOS Release 15SY Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information