Gdb commands we will use

Size: px
Start display at page:

Download "Gdb commands we will use"

Transcription

1 Ex 3: Discussion 93

2 Gdb commands we will use Gdb commands we will use next Help break function Info breakpoints frame continue backtrace full Clear Delete run quit What We will Observe Lists all gdb commands & functionality Sets breakpoint at function entry Shows all declared breakpoints shows the stack Proceeds till it hits breakpoint Prints backtrace of all stack frames Clears this breakpoint You will be asked Delete all breakpoints? Runs from the beginning Quits 94

3 Ex 4: One Core For All RX0 Data plane Tasks RX1 RX2 TX0 TX1 TX2 RX3 TX3 1 Core 95

4 Many cores of medium muscle Vs few cores of mighty muscle? 96

5 Flow App_config_init App_Init App_Init_Core_Map App_pipeline_type register App_init_swq App_init_pipelines rte_mp_remote_launch App_thread 97

6 Flow App_config_init App_Init App_Init_Core_Map App_Init_Eal Rte_eal_mp_remote_launch App_init_swq App_pipeline_type register App_pipeline_type register App_pipeline_type register App_pipeline_type register App_pipeline_type register App_init_pipelines App_init_threads rte_mp_remote_launch rte_mp_remote_launch rte_mp_remote_launch rte_mp_remote_launch rte_mp_remote_launch rte_mp_remote_launch App_thread 98

7 IP-PIPELINE 99

8 100

9 Software Prefetch Or Bulk? Let us say pipeline model Work Sharing S/W Prefetch What do you feel? 101

10 DATA PLANEs 102

11 Ex 5. Discussion Points 103

12 Ex 6 Add 2 cores addiional PASS-THROUGH PASS-THROUGH 104

13 rules Fail? 105

14 Ex 7 Add 1 More Core PASS-THROUGH STAGE & CORE PASS-THROUGH STAGE & CORE 106 ADD ONE MORE STAGE & CORE

15 107

16 108

17 export RTE_SDK=/home/intel/dpdk export RTE_TARGET=x86_64-native-linuxapp-gcc export -p 109

18 Run To Completion IP_PIPELINE Follow the scripts 110

19 Run To Completion IP-Pipeline cd examples/ip_pipeline./build/ip_pipeline f config/pcap.cfg You should get the 1 st screen shown here When you press RETURN, the prompt pipeline> will appear Type? to get help for pipeline commands shown in 2 nd screen 111

20 Save the Output files of Run To Completion Run Go to the other open ssh terminal You will see two output files, eth1.pcap & eth2.pcap Are they size 6344 and 814? YES NO Rename the two output files to say eth0_runtocompletion.pcap and eth1_runtocompletion.pcp and save them 112

21 pipeline> quit Firewall blocking all cd /home/user/dec8thhandson/dpdk-16.11/examples/ip_pipeline Chmod R 777 config/ cp p /home/user/dec8thhandson/edgerouterconfigfiles/*.* config/. cp p config/packets_upstream_65536.pcap config/packets.pcap echo $RTE_SDK [STOP if you don t see /home/user/dec8thhandson/dpdk Go Back & export again correctly] echo $RTE_TARGET [STOP if you don t see x86_64-native-linuxapp-gcc. Go Back & export again correctly] Cat /proc/meminfo Sudo modprobe uio Cd.. Cd.. Make C./examples/ip_pipeline RTE_TARGET=build 113

22 114

23 Cd examples/ip_pipeline./build/ip_pipeline f config/edge_router_upstream_pcap.cfg Screen will have rolling messages. Even after it stops. do not touch the keyboard, mouse or screen Go to the other screen and do ls al. What do you find in the other screen? Firewall blocking all 115

24 Firewall blocking all Do you see 4 output files named eth0.pcap, eth1.pcap, eth2.pcap and eth3.pcap? 4 output files. What size you see? Note down their sizes What else you see? Do you see the edge_router_upstream_pcap.cfg.out file? compare with pcap.cfg.out file of the previous run? Now go back to the screen with pipeline> prompt press enter pipeline> Pipeline > run config/upstream_firewall_blockall.sh Now note down the size of 4 output files. Note down their sizes What size you see? Have they increased in size? If so, why? If not, why not? 116

25 Router pipeline> run config/upstream.sh Now ls al in the other screen and see the output files 117

26 Type in? To find cli commands list Pipeline>? Pipeline> quit 118

27 Compare the cfg file to cfg.out file Let us see the output of.cfg.out file and find out the difference between.cfg and.cfg.out file What do you see? You have started with cfg file. Where from.cfg.out came about? Is it purely an output file or is it also an input file? 119

28 Exercise 4: Cost Optimized Setup 1 core for control plane 1 core for data plane./build/ip_pipeline f config/edge_router_costoptimized_upstream_pcap.cfg Screen will have rolling messages. Even after it stops. do not touch the keyboard, mouse or screen Go to the other screen and do ls al. What do you find in the other screen? Do you see edge_router_costoptimized_upstream_pcap.cfg.out? What is the size difference? Now since you have not given the rules script to execute, what is the size of the output files? Can you explain? 120

29 Run the script now pipeline> run config/upstream.sh Now ls al in the other screen and see the output files Pipeline>? Pipeline> quit 121

30 Exercise 4: Abundant cores assignment This is your home work. Study the config files you used with a goal of adding exactly 4 more simple simple pipelines Update edge_router_your_exercise_to_add_morestages_pcap.cfg to instantiate additionally exactly 4 simple pipelines Build and run the updated configuration../build/ip_pipeline f config/edge_router_your_exercise_to_add_morestages_pcap.cfg What do you see? Can you explain why? 122

31 Exercise 5 Extreme compaction only 1 core for all tasks./build/ip_pipeline f config/edge_router_onlyonecore_forall_pcap.cfg Screen will have rolling messages. Why abort with core dump? 123

32 Backup 124

33 Back up 125

34 Rerefences Gdb Debugger DPDK Programmer s Guide: Testpmd Application User Guide: Sample Application User Guide: ONP 2.1 Performance Test Report ( How to get best performance with NICs on Intel platforms with DPDK: 2.2/linux_gsg/nic_perf_intel_platform.html Open vswitch documentation and installation guide: Ø Ø

35 127

36 128

37 129

38 130

39 131

40 132

41 133

42 Run To Completion IP_PIPELINE cd /home/user/dec8thhandson/dpdk-16.11/examples/ip_pipeline chmod R 777 config/ cp p /home/user/dec8thhandson/runtocompletionconfigfiles/*.* config/. echo $RTE_SDK [STOP if you don t see /home/user/dec8thhandson/dpdk Go Back & export again correctly] echo $RTE_TARGET [STOP if you don t see x86_64-native-linuxapp-gcc. Go Back & export again correctly] cat /proc/meminfo sudo modprobe uio cd.. cd.. make C./examples/ip_pipeline RTE_TARGET=build 134

43 Run To Completion IP-Pipeline cd examples/ip_pipeline./build/ip_pipeline f config/pcap.cfg You should get the 1 st screen shown here When you press RETURN, the prompt pipeline> will appear Type? to get help for pipeline commands shown in 2 nd screen 135

44 Save the Output files of Run To Completion Run Go to the other open ssh terminal You will see two output files, eth1.pcap & eth2.pcap Are they size 6344 and 814? YES NO Rename the two output files to say eth0_runtocompletion.pcap and eth1_runtocompletion.pcp and save them 136

45 pipeline> quit Firewall blocking all cd /home/user/dec8thhandson/dpdk-16.11/examples/ip_pipeline Chmod R 777 config/ cp p /home/user/dec8thhandson/edgerouterconfigfiles/*.* config/. cp p config/packets_upstream_65536.pcap config/packets.pcap echo $RTE_SDK [STOP if you don t see /home/user/dec8thhandson/dpdk Go Back & export again correctly] echo $RTE_TARGET [STOP if you don t see x86_64-native-linuxapp-gcc. Go Back & export again correctly] Cat /proc/meminfo Sudo modprobe uio Cd.. Cd.. Make C./examples/ip_pipeline RTE_TARGET=build 137

46 138

47 Cd examples/ip_pipeline./build/ip_pipeline f config/edge_router_upstream_pcap.cfg Screen will have rolling messages. Even after it stops. do not touch the keyboard, mouse or screen Go to the other screen and do ls al. What do you find in the other screen? Firewall blocking all 139

48 Firewall blocking all Do you see 4 output files named eth0.pcap, eth1.pcap, eth2.pcap and eth3.pcap? 4 output files. What size you see? Note down their sizes What else you see? Do you see the edge_router_upstream_pcap.cfg.out file? compare with pcap.cfg.out file of the previous run? Now go back to the screen with pipeline> prompt press enter pipeline> Pipeline > run config/upstream_firewall_blockall.sh Now note down the size of 4 output files. Note down their sizes What size you see? Have they increased in size? If so, why? If not, why not? 140

49 Router pipeline> run config/upstream.sh Now ls al in the other screen and see the output files 141

50 Type in? To find cli commands list Pipeline>? Pipeline> quit 142

51 See memory status while you were running the program 143

52 Exercise 2 Let us see the output of.cfg.out file and find out the difference between.cfg and.cfg.out file What do you see? You have started with cfg file. Where from.cfg.out came about? Is it purely an output file or is it also an input file? 144

53 Exercise 3: Cost Optimized Setup 1 core for control plane 1 core for data plane./build/ip_pipeline f config/edge_router_costoptimized_upstream_pcap.cfg Screen will have rolling messages. Even after it stops. do not touch the keyboard, mouse or screen Go to the other screen and do ls al. What do you find in the other screen? Do you see edge_router_costoptimized_upstream_pcap.cfg.out? What is the size difference? Now since you have not given the rules script to execute, what is the size of the output files? Can you explain? 145

54 Run the script now pipeline> run config/upstream.sh Now ls al in the other screen and see the output files Pipeline>? Pipeline> quit 146

55 Exercise 4: Abundant cores assignment This is your home work. Study the config files you used with a goal of adding exactly 4 more simple simple pipelines Update edge_router_your_exercise_to_add_morestages_pcap.cfg to instantiate additionally exactly 4 simple pipelines Build and run the updated configuration../build/ip_pipeline f config/edge_router_your_exercise_to_add_morestages_pcap.cfg What do you see? Can you explain why? 147

56 Exercise 5 Extreme compaction only 1 core for all tasks./build/ip_pipeline f config/edge_router_onlyonecore_forall_pcap.cfg Screen will have rolling messages. Why abort with core dump? 148

57 Backup 149

58 Back up 150

59 Rerefences Gdb Debugger DPDK Programmer s Guide: Testpmd Application User Guide: Sample Application User Guide: ONP 2.1 Performance Test Report ( How to get best performance with NICs on Intel platforms with DPDK: 2.2/linux_gsg/nic_perf_intel_platform.html Open vswitch documentation and installation guide: Ø Ø

60 Install Filezilla 152

61 See memory status while you were running the program 153

62 Touching Pkt Header 154

63 If You are in Intel Network 155

64 Screen 2 / 2 1) Proxy Type: SOCKS 5 2)Proxy host name: proxy-jf.intel.com 3) Port: ) Do DNS name lookup at proxy end: Auto This is dash not dot Next Step is To Save The Configuration 1st select this

65 1) Name The Configuration. 2) Save It Click Session on the top left corner. It will take you to the 1 st screen - shown here. In Saved Sessons Box, Enter a name, e.g., dpdk training cluster Press Save Button. From now onwards, you can load the saved session when starting PuTTY

66 158

67 159

68 160

69 161

70 rte_eal_init( ) 162

71 163

72 164

Afternoon Session 20

Afternoon Session 20 Afternoon Session 20 DPDK Sample Apps L2fwd Crypto Ethtool L2fwd IVSHME M Exception Path KNI Perf Thread VMDq Timer RxTx Callbacks PTP Client L3fwd VF L2fwd CAT TEP Term Quota & W mark Multi Process L2fwd

More information

Implementing DPDK based Application Container Framework with SPP YASUFUMI OGAWA, NTT

Implementing DPDK based Application Container Framework with SPP YASUFUMI OGAWA, NTT x Implementing DPDK based Application Container Framework with SPP YASUFUMI OGAWA, NTT Agenda Introduction of SPP SPP Container Containerize DPDK Apps SPP Container Tools Usecases Limitations and Restrictions

More information

Programming Studio #9 ECE 190

Programming Studio #9 ECE 190 Programming Studio #9 ECE 190 Programming Studio #9 Concepts: Functions review 2D Arrays GDB Announcements EXAM 3 CONFLICT REQUESTS, ON COMPASS, DUE THIS MONDAY 5PM. NO EXTENSIONS, NO EXCEPTIONS. Functions

More information

Jackson State University Department of Computer Science CSC / Advanced Information Security Spring 2013 Lab Project # 5

Jackson State University Department of Computer Science CSC / Advanced Information Security Spring 2013 Lab Project # 5 Jackson State University Department of Computer Science CSC 439-01/539-02 Advanced Information Security Spring 2013 Lab Project # 5 Use of GNU Debugger (GDB) for Reverse Engineering of C Programs in a

More information

Linux Survival Guide

Linux Survival Guide Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to

More information

Intro to Linux. this will open up a new terminal window for you is super convenient on the computers in the lab

Intro to Linux. this will open up a new terminal window for you is super convenient on the computers in the lab Basic Terminal Intro to Linux ssh short for s ecure sh ell usage: ssh [host]@[computer].[otheripstuff] for lab computers: ssh [CSID]@[comp].cs.utexas.edu can get a list of active computers from the UTCS

More information

CENG393 Computer Networks Labwork 1

CENG393 Computer Networks Labwork 1 CENG393 Computer Networks Labwork 1 Linux is the common name given to a large family of operating systems. All Linux-based operating systems are essentially a large set of computer software that are bound

More information

Carnegie Mellon. Linux Boot Camp. Jack, Matthew, Nishad, Stanley 6 Sep 2016

Carnegie Mellon. Linux Boot Camp. Jack, Matthew, Nishad, Stanley 6 Sep 2016 Linux Boot Camp Jack, Matthew, Nishad, Stanley 6 Sep 2016 1 Connecting SSH Windows users: MobaXterm, PuTTY, SSH Tectia Mac & Linux users: Terminal (Just type ssh) andrewid@shark.ics.cs.cmu.edu 2 Let s

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

Introduction: What is Unix?

Introduction: What is Unix? Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix

More information

Getting Started With UNIX Lab Exercises

Getting Started With UNIX Lab Exercises Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.

More information

Development Environment Embedded Linux Primer Ch 1&2

Development Environment Embedded Linux Primer Ch 1&2 Development Environment Embedded Linux Primer Ch 1&2 Topics 1) Systems: Host and Target 2) Host setup 3) Host-Target communication CMPT 433 Slides #3 Dr. B. Fraser 18-05-05 2 18-05-05 1 Host & Target Host

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

LINUX VPS GUIDE. Pre-requisites: (this guide assumes you are using windows)

LINUX VPS GUIDE. Pre-requisites: (this guide assumes you are using windows) LINUX VPS GUIDE Pre-requisites: (this guide assumes you are using windows) Philscurrency Wallet Download PHILS wallet if you don t have already from the link below https://github.com/philscurrency/philscurrency/releases/download/v1.2/phils

More information

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time.

This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. This tutorial will guide you how to setup and run your own minecraft server on a Linux CentOS 6 in no time. Running your own server lets you play together with your friends and family with your own set

More information

Lab6 GDB debugging. Conventions. Department of Computer Science and Information Engineering National Taiwan University

Lab6 GDB debugging. Conventions. Department of Computer Science and Information Engineering National Taiwan University Lab6 GDB debugging 1 / 15 Learn how to perform source-level debugging with GDB. 2 / 15 Host Machine OS: Windows Target Machine Raspberry Pi (2 or 3) Build Machine A computer with a SD card slot OS: Ubuntu

More information

NAV Coin NavTech Server Installation and setup instructions

NAV Coin NavTech Server Installation and setup instructions NAV Coin NavTech Server Installation and setup instructions NavTech disconnects sender and receiver Unique double-blockchain Technology V4.0.5 October 2017 2 Index General information... 5 NavTech... 5

More information

Using the Debugger. Michael Jantz Dr. Prasad Kulkarni

Using the Debugger. Michael Jantz Dr. Prasad Kulkarni Using the Debugger Michael Jantz Dr. Prasad Kulkarni 1 Debugger What is it a powerful tool that supports examination of your program during execution. Idea behind debugging programs. Creates additional

More information

Exercise Session 6 Computer Architecture and Systems Programming

Exercise Session 6 Computer Architecture and Systems Programming Systems Group Department of Computer Science ETH Zürich Exercise Session 6 Computer Architecture and Systems Programming Herbstsemester 2016 Agenda GDB Outlook on assignment 6 GDB The GNU Debugger 3 Debugging..

More information

Linux/Cygwin Practice Computer Architecture

Linux/Cygwin Practice Computer Architecture Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe

More information

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used:

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: Linux Tutorial How to read the examples When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: $ application file.txt

More information

Introduction to the Command line. Introduction to the command line. Introduction to the Command line. GNU/Linux at South Wales

Introduction to the Command line. Introduction to the command line. Introduction to the Command line. GNU/Linux at South Wales Introduction to the command line slide 1 Introduction to the Command line slide 2 in this module we will examine: tools necessary to develop game engines:gdb, emacs and friends examine how one can integrate

More information

CSE 351. GDB Introduction

CSE 351. GDB Introduction CSE 351 GDB Introduction Lab 2 Out either tonight or tomorrow Due April 27 th (you have ~12 days) Reading and understanding x86_64 assembly Debugging and disassembling programs Today: General debugging

More information

A Tutorial for ECE 175

A Tutorial for ECE 175 Debugging in Microsoft Visual Studio 2010 A Tutorial for ECE 175 1. Introduction Debugging refers to the process of discovering defects (bugs) in software and correcting them. This process is invoked when

More information

CMPT 300. Operating Systems. Brief Intro to UNIX and C

CMPT 300. Operating Systems. Brief Intro to UNIX and C CMPT 300 Operating Systems Brief Intro to UNIX and C Outline Welcome Review Questions UNIX basics and Vi editor Using SSH to remote access Lab2(4214) Compiling a C Program Makefile Basic C/C++ programming

More information

How to Configure an SSH Tunnel on PuTTY

How to Configure an SSH Tunnel on PuTTY How to Configure an SSH Tunnel on PuTTY YOU CAN USE A DYNAMIC TUNNEL TO ACCESS ALL REMOTE INFRASTRUCTURE. Most of you have probably used a tunnel with an SSH connection. What you probably weren t aware

More information

MIS Week 10. Operating System Security. Unix/Linux basics

MIS Week 10. Operating System Security. Unix/Linux basics MIS 5170 Operating System Security Week 10 Unix/Linux basics Tonight s Plan 2 Download Kali Install Kali Questions from Last Week Review on-line posts In The News Unix/Linux Basics Scripting Appropriate

More information

Precursor Steps & Storage Node

Precursor Steps & Storage Node Precursor Steps & Storage Node In a basic HPC cluster, the head node is the orchestration unit and possibly the login portal for your end users. It s one of the most essential pieces to get working appropriately.

More information

Introduction to Linux for BlueBEAR. January

Introduction to Linux for BlueBEAR. January Introduction to Linux for BlueBEAR January 2019 http://intranet.birmingham.ac.uk/bear Overview Understanding of the BlueBEAR workflow Logging in to BlueBEAR Introduction to basic Linux commands Basic file

More information

Benchmarking Test Suite

Benchmarking Test Suite Benchmarking Test Suite 1. Introduction The following document goes through a list of benchmark tests for Open vswitch accelerated by the Netronome Agilio-CX-4000 Intelligent Server Adapter, to compare

More information

VSPERF Installation Guide

VSPERF Installation Guide VSPERF Installation Guide Release brahmaputra.1.0 (a481bc5) OPNFV February 24, 2016 CONTENTS 1 Installing vswitchperf 1 1.1 Supported Operating Systems...................................... 1 1.2 Supported

More information

Open vswitch - architecture

Open vswitch - architecture Ashok Emani Open vswitch - architecture Netlink User Space vswitchd Kernel Space OVS Kernel Space Forwarding Plane Available at www.openvswitch.org Main forwarding plane runs in kernel space Exception

More information

If you had a freshly generated image from an LCI instructor, make sure to set the hostnames again:

If you had a freshly generated image from an LCI instructor, make sure to set the hostnames again: Storage Node Setup A storage node (or system as your scale) is a very important unit for an HPC cluster. The computation is often about the data it produces and keeping that data safe is important. Safe

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

Masternode Setup Guide Local Wallet with VPS Server

Masternode Setup Guide Local Wallet with VPS Server Masternode Setup Guide Local Wallet with VPS Server What you will need: 1) Local computer windows 7-10 2) Remote server VPS [vultr.com] 3) PuTTY to configure and setup VPS 4) 10,000 PHR If you would like

More information

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )

More information

Adafruit's Raspberry Pi Lesson 6. Using SSH

Adafruit's Raspberry Pi Lesson 6. Using SSH Adafruit's Raspberry Pi Lesson 6. Using SSH Created by Simon Monk Last updated on 2017-08-16 01:12:07 AM UTC Guide Contents Guide Contents Overview Enabling SSH Using a blank boot file Using Raspi-Config

More information

Crypto Device Drivers. Release

Crypto Device Drivers. Release Crypto Device Drivers Release 16.11.3 August 30, 2017 CONTENTS 1 Crypto Device Supported Functionality Matrices 1 2 AESN-NI Multi Buffer Crytpo Poll Mode Driver 3 2.1 Features........................................

More information

CDS 32 Version 2.xx File Utilities

CDS 32 Version 2.xx File Utilities CDS 32 Version 2.xx File Utilities c2004 Pristine Systems, Inc. CONTENTS Addendum, 7 Addendum, Marking Multiple Selections, 7 Audio File Manager, 3 A Move, 3 M N E Network Audio Manager, 4 Exit, 4 R F

More information

Basic functions of a debugger

Basic functions of a debugger UNIVERSITY OF CALIFORNIA Department of Electrical Engineering and Computer Sciences Computer Science Division CS61B Spring 1998 P. N. Hilfinger Simple Use of GDB A debugger is a program that runs other

More information

Lab 1 Introduction to UNIX and C

Lab 1 Introduction to UNIX and C Name: Lab 1 Introduction to UNIX and C This first lab is meant to be an introduction to computer environments we will be using this term. You must have a Pitt username to complete this lab. The doc is

More information

Linux environment. Graphical interface X-window + window manager. Text interface terminal + shell

Linux environment. Graphical interface X-window + window manager. Text interface terminal + shell Linux environment Graphical interface X-window + window manager Text interface terminal + shell ctrl-z put running command to background (come back via command fg) Terminal basics Two basic shells - slightly

More information

Introduction to the Linux Command Line

Introduction to the Linux Command Line Introduction to the Linux Command Line May, 2015 How to Connect (securely) ssh sftp scp Basic Unix or Linux Commands Files & directories Environment variables Not necessarily in this order.? Getting Connected

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Introduction to Supercomputing

Introduction to Supercomputing Introduction to Supercomputing TMA4280 Introduction to UNIX environment and tools 0.1 Getting started with the environment and the bash shell interpreter Desktop computers are usually operated from a graphical

More information

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility

Introduction to Linux Workshop 2. The George Washington University SEAS Computing Facility Introduction to Linux Workshop 2 The George Washington University SEAS Computing Facility Course Goals SSH and communicating with other machines Public/Private key generation,.ssh directory, and the config

More information

CHE3935. Lecture 1. Introduction to Linux

CHE3935. Lecture 1. Introduction to Linux CHE3935 Lecture 1 Introduction to Linux 1 Logging In PuTTY is a free telnet/ssh client that can be run without installing it within Windows. It will only give you a terminal interface, but used with a

More information

COMS 6100 Class Notes 3

COMS 6100 Class Notes 3 COMS 6100 Class Notes 3 Daniel Solus September 1, 2016 1 General Remarks The class was split into two main sections. We finished our introduction to Linux commands by reviewing Linux commands I and II

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

Xilinx Answer QDMA DPDK User Guide

Xilinx Answer QDMA DPDK User Guide Xilinx Answer 70928 QDMA DPDK User Guide Important Note: This downloadable PDF of an Answer Record is provided to enhance its usability and readability. It is important to note that Answer Records are

More information

CS/COE 0449 term 2174 Lab 5: gdb

CS/COE 0449 term 2174 Lab 5: gdb CS/COE 0449 term 2174 Lab 5: gdb What is a debugger? A debugger is a program that helps you find logical mistakes in your programs by running them in a controlled way. Undoubtedly by this point in your

More information

Exercise 1: Basic Tools

Exercise 1: Basic Tools Exercise 1: Basic Tools This exercise is created so everybody can learn the basic tools we will use during this course. It is really more like a tutorial than an exercise and, you are not required to submit

More information

PetaLinux SDK Guide to QEMU System Simulation

PetaLinux SDK Guide to QEMU System Simulation PetaLinux SDK Guide to QEMU System Simulation v1.1 November 27, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 PetaLinux Software Simulation with QEMU...3

More information

Linux Bootcamp Fall 2015

Linux Bootcamp Fall 2015 Linux Bootcamp Fall 2015 UWB CSS Based on: http://swcarpentry.github.io/shell-novice "Software Carpentry" and the Software Carpentry logo are registered trademarks of NumFOCUS. What this bootcamp is: A

More information

Migration of Existing NSM Server from standalone to an Extended HA environment

Migration of Existing NSM Server from standalone to an Extended HA environment Migration of Existing NSM Server from standalone to an Extended HA environment The below procedure is to migrate the existing Standalone NSM server setup to a 4 Server HA environment where the GUI Server

More information

Problem Set 1: Unix Commands 1

Problem Set 1: Unix Commands 1 Problem Set 1: Unix Commands 1 WARNING: IF YOU DO NOT FIND THIS PROBLEM SET TRIVIAL, I WOULD NOT RECOMMEND YOU TAKE THIS OFFERING OF 300 AS YOU DO NOT POSSESS THE REQUISITE BACKGROUND TO PASS THE COURSE.

More information

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words More Linux Commands 1 wc The Linux command for acquiring size statistics on a file is wc. This command provides the line count, word count and number of bytes in a file. Open up a terminal, make sure you

More information

ASL Fall Gitlab, SW setup + Bash

ASL Fall Gitlab, SW setup + Bash ASL Fall 2016 Gitlab, SW setup + Bash 1 Gitlab account and permissions 2 Create a repository https://gitlab.inf.ethz.ch 3 Create a repository 4 Create a repository Project name must be asl-fall16-project

More information

CS 246 Winter Tutorial 1

CS 246 Winter Tutorial 1 CS 246 Winter 2015 - Tutorial 1 January 11, 2016 1 Summary General Administration Stuff CS Undergraduate Environment Useful Software Basic Commands.profile Text Editors 2 General Administration Stuff Course

More information

Oregon State University School of Electrical Engineering and Computer Science. CS 261 Recitation 1. Spring 2011

Oregon State University School of Electrical Engineering and Computer Science. CS 261 Recitation 1. Spring 2011 Oregon State University School of Electrical Engineering and Computer Science CS 261 Recitation 1 Spring 2011 Outline Using Secure Shell Clients GCC Some Examples Intro to C * * Windows File transfer client:

More information

Assignment 1: Build Environment

Assignment 1: Build Environment Read the entire assignment before beginning! Submit deliverables to CourSys: https://courses.cs.sfu.ca/ Late penalty is 10% per calendar day (each 0 to 24 hour period past due, max 2 days). This assignment

More information

Installation and Maintenance Instructions for Intel(R) R-WPA VNF Package

Installation and Maintenance Instructions for Intel(R) R-WPA VNF Package Installation and Maintenance Instructions for Intel(R) R-WPA VNF Package Contents Contents 1 Table of Figures 2 Overview 3 Installation Steps 4 1 Host Setup 4 11 System BIOS settings 4 111 Virtualization

More information

COSC 6374 Parallel Computation. Debugging MPI applications. Edgar Gabriel. Spring 2008

COSC 6374 Parallel Computation. Debugging MPI applications. Edgar Gabriel. Spring 2008 COSC 6374 Parallel Computation Debugging MPI applications Spring 2008 How to use a cluster A cluster usually consists of a front-end node and compute nodes Name of the front-end node: shark.cs.uh.edu You

More information

Labs instructions for Enabling BeagleBone with TI SDK 5.x

Labs instructions for Enabling BeagleBone with TI SDK 5.x Labs instructions for Enabling BeagleBone with TI SDK 5.x 5V power supply µsd ethernet cable ethernet cable USB cable Throughout this document there will be commands spelled out to execute. Some are to

More information

Bitnami Apache Solr for Huawei Enterprise Cloud

Bitnami Apache Solr for Huawei Enterprise Cloud Bitnami Apache Solr for Huawei Enterprise Cloud Description Apache Solr is an open source enterprise search platform from the Apache Lucene project. It includes powerful full-text search, highlighting,

More information

FX SERIES. Programmer s Guide. Embedded SDK. MN000540A01 Rev. A

FX SERIES. Programmer s Guide. Embedded SDK. MN000540A01 Rev. A FX SERIES Embedded SDK Programmer s Guide MN000540A01 Rev. A Table of Contents About This Guide Introduction...4 Chapter Descriptions... 4 Notational Conventions...5 Related Documents and Software...5

More information

1. Allowed you to see the value of one or more variables, or 2. Indicated where you were in the execution of a program

1. Allowed you to see the value of one or more variables, or 2. Indicated where you were in the execution of a program CS0449 GDB Lab What is a debugger? A debugger is a program that helps you find logical mistakes in your programs by running them in a controlled way. Undoubtedly by this point in your programming life,

More information

Intro to Linux & Command Line

Intro to Linux & Command Line Intro to Linux & Command Line Based on slides from CSE 391 Edited by Andrew Hu slides created by Marty Stepp, modified by Jessica Miller & Ruth Anderson http://www.cs.washington.edu/391/ 1 Lecture summary

More information

bwunicluster Tutorial Access, Data Transfer, Compiling, Modulefiles, Batch Jobs

bwunicluster Tutorial Access, Data Transfer, Compiling, Modulefiles, Batch Jobs bwunicluster Tutorial Access, Data Transfer, Compiling, Modulefiles, Batch Jobs Frauke Bösert, SCC, KIT 1 Material: Slides & Scripts https://indico.scc.kit.edu/indico/event/263/ @bwunicluster/forhlr I/ForHLR

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI

More information

Debugging with GDB and DDT

Debugging with GDB and DDT Debugging with GDB and DDT Ramses van Zon SciNet HPC Consortium University of Toronto June 13, 2014 1/41 Ontario HPC Summerschool 2014 Central Edition: Toronto Outline Debugging Basics Debugging with the

More information

Introduction to Unix - Lab Exercise 0

Introduction to Unix - Lab Exercise 0 Introduction to Unix - Lab Exercise 0 Along with this document you should also receive a printout entitled First Year Survival Guide which is a (very) basic introduction to Unix and your life in the CSE

More information

5inch HDMI LCD (B) User Manual

5inch HDMI LCD (B) User Manual 5inch HDMI LCD (B) User Manual Description 5 inch Resistive Touch Screen LCD, HDMI interface, supports various systems Features 800 480 high resolution, touch control Supports Raspberry Pi, and driver

More information

Introduction to Linux Part 1. Anita Orendt and Wim Cardoen Center for High Performance Computing 24 May 2017

Introduction to Linux Part 1. Anita Orendt and Wim Cardoen Center for High Performance Computing 24 May 2017 Introduction to Linux Part 1 Anita Orendt and Wim Cardoen Center for High Performance Computing 24 May 2017 ssh Login or Interactive Node kingspeak.chpc.utah.edu Batch queue system kp001 kp002. kpxxx FastX

More information

CS 143A. Principles of Operating Systems. Instructor : Prof. Anton Burtsev

CS 143A. Principles of Operating Systems. Instructor : Prof. Anton Burtsev CS 143A Principles of Operating Systems Instructor : Prof. Anton Burtsev (aburtsev@uci.edu) Assistants : Junjie Shen junjies1@uci.edu Vikram Narayanan narayav1@uci.edu Biswadip Maity (Deep) Email : maityb@uci.edu

More information

Unix - Basics Course on Unix and Genomic Data Prague, January 2017

Unix - Basics Course on Unix and Genomic Data Prague, January 2017 Unix - Basics Course on Unix and Genomic Data Prague, January 2017 Libor Mořkovský, Václav Janoušek, Anastassiya Zidkova, Anna Přistoupilová, Filip Sedlák http://ngs-course.readthedocs.org/en/praha-january-2017/

More information

Basic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala

Basic UNIX commands. HORT Lab 2 Instructor: Kranthi Varala Basic UNIX commands HORT 59000 Lab 2 Instructor: Kranthi Varala Client/Server architecture User1 User2 User3 Server (UNIX/ Web/ Database etc..) User4 High Performance Compute (HPC) cluster User1 Compute

More information

CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 1

CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 1 CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 1 Prof. Michael J. Reale Fall 2014 COMMAND KATA 0 Command Kata 0: Preparation First, go to ~/cs307 cd ~/cs307 Make directory dkata0 and go to it mkdir

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Kodaro s Niagara 4 Port Installation Guide

Kodaro s Niagara 4 Port Installation Guide Kodaro s Niagara 4 Port Installation Guide August 16, 2018 Documents the process of installing Kodaro s Niagara 4 Port on the Dell Edge Gateway hardware OVERVIEW... 2 SYSTEM COMPATIBILITY... 2 WORKFLOW

More information

Introduction. SSH Secure Shell Client 1

Introduction. SSH Secure Shell Client 1 SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

Program Design: Using the Debugger

Program Design: Using the Debugger rogram Design, February 2, 2004 1 Program Design: Using the Debugger A debugger is an alternative to putting print (printf in C) statements in your program, recompiling and trying to find out what values

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

Linux Tutorial #1. Introduction. Login to a remote Linux machine. Using vim to create and edit C++ programs

Linux Tutorial #1. Introduction. Login to a remote Linux machine. Using vim to create and edit C++ programs Linux Tutorial #1 Introduction The Linux operating system is now over 20 years old, and is widely used in industry and universities because it is fast, flexible and free. Because Linux is open source,

More information

Complete Guide to Setting Up Linda on Ubuntu 16 For Staking

Complete Guide to Setting Up Linda on Ubuntu 16 For Staking Complete Guide to Setting Up Linda on Ubuntu 16 For Staking By Chris T. aka lagwag0n Join Us on Discord: https://discord.gg/8evurqx Table of Contents: 1. Introduction 2. Purchasing a VPS from Vultr 3.

More information

Using a debugger. Segmentation fault? GDB to the rescue!

Using a debugger. Segmentation fault? GDB to the rescue! Using a debugger Segmentation fault? GDB to the rescue! But first... Let's talk about the quiz Let's talk about the previous homework assignment Let's talk about the current homework assignment K findkey(v

More information

INd_rasN SOME SHELL SCRIPTING PROGRAMS. 1. Write a shell script to check whether the name passed as first argument is the name of a file or directory.

INd_rasN SOME SHELL SCRIPTING PROGRAMS. 1. Write a shell script to check whether the name passed as first argument is the name of a file or directory. 1. Write a shell script to check whether the name passed as rst argument is the name of a le or directory. Ans: #!/bin/bash if [ -f $1 ] echo "$1 is a le" echo "$1 is not a le" 2. Write a shell script

More information

Upgrade Guide. Platform Compatibility. SonicWALL Aventail E-Class SRA EX-Series v Secure Remote Access

Upgrade Guide. Platform Compatibility. SonicWALL Aventail E-Class SRA EX-Series v Secure Remote Access Secure Remote Access This document describes the process of obtaining your SonicWALL Aventail E-Class SRA EX-Series update file, verifying it, and installing it on an existing appliance. Updating a clustered

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Refresher workshop in programming for polytechnic graduates General Java Program Compilation Guide

Refresher workshop in programming for polytechnic graduates General Java Program Compilation Guide Refresher workshop in programming for polytechnic graduates General Java Program Compilation Guide Overview Welcome to this refresher workshop! This document will serve as a self-guided explanation to

More information

a. puppet should point to master (i.e., append puppet to line with master in it. Use a text editor like Vim.

a. puppet should point to master (i.e., append puppet to line with master in it. Use a text editor like Vim. Head Node Make sure that you have completed the section on Precursor Steps and Storage. Key parts of that are necessary for you to continue on this. If you have issues, please let an instructor know to

More information

Compression Device Drivers. Release rc3

Compression Device Drivers. Release rc3 Compression Device Drivers Release 19.02.0-rc3 January 20, 2019 CONTENTS 1 Compression Device Supported Functionality Matrices 1 1.1 Supported Feature Flags............................... 1 2 ISA-L Compression

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Dong-Yun Lee (dylee@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating

More information

Linux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory.

Linux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory. Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux

More information

Helsinki 19 Jan Practical course in genome bioinformatics DAY 0

Helsinki 19 Jan Practical course in genome bioinformatics DAY 0 Helsinki 19 Jan 2017 529028 Practical course in genome bioinformatics DAY 0 This document can be downloaded at: http://ekhidna.biocenter.helsinki.fi/downloads/teaching/spring2017/exercises_day0.pdf The

More information

High Performance Computing Cluster Basic course

High Performance Computing Cluster Basic course High Performance Computing Cluster Basic course Jeremie Vandenplas, Gwen Dawes 30 October 2017 Outline Introduction to the Agrogenomics HPC Connecting with Secure Shell to the HPC Introduction to the Unix/Linux

More information

Contrail Sandbox Tutorial Script

Contrail Sandbox Tutorial Script Contrail Sandbox Tutorial Script Tutorial Flow Login to lab setup Add security rules Add IP address manager Add two networks Add network policy Add two VMs (can t ping) Add network policy to networks (VMs

More information

Key Point. What are Cache lines

Key Point. What are Cache lines Caching 1 Key Point What are Cache lines Tags Index offset How do we find data in the cache? How do we tell if it s the right data? What decisions do we need to make in designing a cache? What are possible

More information

GDB Linux GNU Linux Distribution. gdb gcc g++ -g gdb EB_01.cpp

GDB Linux GNU Linux Distribution. gdb gcc g++ -g gdb EB_01.cpp B Linux GDB GDB Linux GNU GPL Linux Distribution Linux E-B.1 gcc g++ -g EB_01.cpp EB_01.cpp E/EB/EB_01.cpp 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 /**** :EB_01.cpp : *****/ #include

More information