TCP/IP for OS/2: User's Guide Book Cover COVER Book Cover ------IBM TCP/IP for OS/2

Total Page:16

File Type:pdf, Size:1020Kb

TCP/IP for OS/2: User's Guide Book Cover COVER Book Cover ------IBM TCP/IP for OS/2 TCP/IP for OS/2: User's Guide Book Cover COVER Book Cover -------------------------------------------------------------------------- IBM TCP/IP for OS/2: User's Guide Document Number SC31-6076-05 -------------------------------------------------------------------------- This softcopy edition supersedes the hardcopy book, SC31-6075-04. The hardcopy book has not been updated to include the changes herein. ¦ Copyright IBM Corp. 1990, 1994 COVER - 1 TCP/IP for OS/2: User's Guide Notices NOTICES Notices +--- Note -----------------------------------------------------------+ ¦ ¦ ¦ Before using this information and the product it supports, be sure ¦ ¦ to read the general information under "Notices" in topic FRONT_1 . ¦ ¦ ¦ +--------------------------------------------------------------------+ ¦ Copyright IBM Corp. 1990, 1994 NOTICES - 1 TCP/IP for OS/2: User's Guide Edition Notice EDITION Edition Notice Sixth Edition (August 1994) This edition applies to the IBM Transmission Control Protocol/Internet Protocol Version 2.0 for OS/2 licensed program. Publications are not stocked at the address given below. If you want more IBM publications, ask your IBM representative or write to the IBM branch office serving your locality. A form for your comments is provided at the back of this document. If the form has been removed, you may address comments to: IBM Corporation Department E15 P.O. Box 12195 Research Triangle Park, North Carolina 27709 U.S.A. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. ¦ Copyright International Business Machines Corporation 1990, 1994. All rights reserved. Note to U.S. Government Users -- Documentation related to restricted rights -- Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. ¦ Copyright IBM Corp. 1990, 1994 EDITION - 1 TCP/IP for OS/2: User's Guide Table of Contents CONTENTS Table of Contents COVER Book Cover NOTICES Notices EDITION Edition Notice CONTENTS Table of Contents FIGURES Figures TABLES Tables FRONT_1 Notices FRONT_1.1 Trademarks PREFACE About This Book PREFACE.1 Who Should Use This Book PREFACE.2 How to Use This Book PREFACE.3 Compatibility with IBM AnyNet Product Family PREFACE.4 Conventions Used in This Book PREFACE.5 Where to Find More Information PREFACE.6 Calling IBM Service PREFACE.7 Obtaining Corrective Service Electronically 1.0 Chapter 1. Getting Started 1.1 Overview of TCP/IP for OS/2 1.2 TCP/IP on Your Desktop 2.0 Chapter 2. Transferring Files with the File Transfer Protocol (FTP) 2.1 Deciding When to Use FTP or TFTP 2.2 Setting Up the Environment 2.3 Setting Up the Server 2.4 Entering the FTP Command Shell 2.5 ftp Subcommands 2.6 Requesting Help 2.7 Using OS/2 Commands 2.8 Defining a Macro with the macdef Subcommand 2.9 Establishing a Connection to a Foreign Host 2.10 Obtaining Status Information 2.11 Setting Up Your System Environment 2.12 Working with Files 2.13 Sending Arguments to the Foreign Host 2.14 Opening a Connection between Two Foreign Hosts 2.15 Working with Directories 2.16 Ending the FTP Session 2.17 Ending the Server Task 3.0 Chapter 3. Transferring Files with FTPPM 3.1 Overview of FTPPM 3.2 FTPPM Clients and the OS/2 Workplace Shell 3.3 Starting FTPPM 3.4 Working with Connections Using the Remote Menu 3.5 Marking and Unmarking Files or Directories 3.6 Changing the Current Working Directory 3.7 Setting Options Using the Options Menu 3.8 Working with Files and Directories Using the Actions Menu 3.9 Ending the FTPPM Session 4.0 Chapter 4. Transferring Files with the Trivial File Transfer Protocol 4.1 Deciding Which Command to Use 4.2 Overview of the Trivial File Transfer Command 4.3 Setting Up the Server 4.4 Entering the TFTP Command Shell 4.5 tftp Subcommands 4.6 Requesting Help 4.7 Establishing a Connection 4.8 Obtaining Status Information 4.9 Setting the Environment 4.10 Transferring Files 4.11 Ending the TFTP Session 4.12 Ending the Server Task 5.0 Chapter 5. Using Mail Services 5.1 Overview of the Mail Services 5.2 Setting Up the SendMail Environment 5.3 SendMail Startup and Processing 5.4 Starting the SendMail Server 5.5 Starting the SendMail Client 5.6 Transmitting Messages to Multiple Users 5.7 Overview of LaMail 5.8 Setting Up the LaMail Environment 5.9 Using LaMail 5.10 LaMail Main Menu 5.11 LaMail Edit Menu 5.12 LaMail Windows 6.0 Chapter 6. Using NewsReader/2 6.1 NewsReader/2 Overview 6.2 USENET Overview 6.3 Configuring NewsReader/2 6.4 Starting NewsReader/2 6.5 Subscribing to News Groups 6.6 Reading an Article from a News Group 6.7 Posting to a News Group 6.8 Exiting NewsReader/2 7.0 Chapter 7. Using ASCII-Based Telnet Clients ¦ Copyright IBM Corp. 1990, 1994 CONTENTS - 1 TCP/IP for OS/2: User's Guide Table of Contents 7.1 Setting Up the Environment 7.2 Setting Up the Server 7.3 Setting Up for UNIX Clients 7.4 Telnet Clients and the OS/2 Workplace Shell 7.5 The Presentation Manager Telnet Client--TelnetPM 7.6 The OS/2 Window Telnet Client--Telnet 7.7 The File Function 7.8 The Global Function 7.9 Using the Keymap Function to Remap the Keyboard 7.10 Keys that Cannot Be Remapped with SetTerm 7.11 Using the Telnet Line-mode Client--Telneto 7.12 The TELNET.RC File 7.13 Understanding Keyboard Mappings 8.0 Chapter 8. Using 3270-Based and 5250-Based Telnet Clients 8.1 Default 3270 Emulator Keyboard Mappings 8.2 Translation Table Support for PMANT and TN3270 8.3 3270-Based Telnet Clients and the OS/2 Workplace Shell 8.4 Logging On to a Foreign Host Using PMANT 8.5 Logging On to a Foreign Host Using TN3270 8.6 Logging On to a Foreign Host Using TN5250 8.7 Translation Table Support for TN5250 9.0 Chapter 9. Printing on a Local or Remote Printer 9.1 Overview of the Line Printer Commands 9.2 Setting Up a Print Server 9.3 Setting Up the Client Environment 9.4 Sending Print Jobs 9.5 Querying the Print Queue 9.6 Removing Jobs from the Print Queue 9.7 Redirecting Print Jobs 9.8 Sending Outbound FAXes 10.0 Chapter 10. Using the TALK Protocol 10.1 Setting Up the Environment 10.2 Starting the Server 10.3 Entering the talk Command 10.4 Sending and Receiving Messages with TALK 10.5 Ending the TALK Session 10.6 Ending the Server Task 11.0 Chapter 11. Issuing Commands on a Foreign Host with REXEC 11.1 Setting Up the Environment 11.2 Setting Up the Server 11.3 Ending the Server Task 11.4 Using the rexec Command on a Foreign Host 12.0 Chapter 12. Issuing Commands on a Foreign Host with the RSH Command 12.1 Setting Up the Client 12.2 Setting Up the Server 12.3 Ending the Server Task 12.4 Using the rsh Command on a Foreign Host 13.0 Chapter 13. Managing Your TCP/IP Network 13.1 Verifying the Availability of a Single Host 13.2 Monitoring the Availability of a Group of Hosts 13.3 Displaying Foreign Host User Information 13.4 Obtaining RPC Server Status Information 13.5 Using Packet Tracing Programs 13.6 Displaying Information about Your Local Host 13.7 Obtaining Network Status Information 13.8 Querying Name Servers A.0 Appendix A. Introducing Computer Networks and Protocols A.1 Computer Networks A.2 The Internet Environment A.3 TCP/IP Protocols and Functions A.4 Network Protocols A.5 NDIS A.6 Internetwork Protocols A.7 Transport Protocols A.8 Applications, Functions, and Protocols A.9 Routing A.10 Internet Addressing B.0 Appendix B. Optional Files C.0 Appendix C. Problem Determination Examples D.0 Appendix D. Messages and Codes E.0 Appendix E. Management Information Base (MIB) Objects E.1 System Group E.2 Interfaces Group E.3 Address Translation Group E.4 IP Group E.5 ICMP Group E.6 TCP Group E.7 UDP Group E.8 EGP Group E.9 SNMP Group F.0 Appendix F. Requests for Comments (RFCs) G.0 Appendix G. Well-Known Port Assignments G.1 TCP Well-Known Port Assignments G.2 UDP Well-Known Port Assignments ¦ Copyright IBM Corp. 1990, 1994 CONTENTS - 2 TCP/IP for OS/2: User's Guide Table of Contents BIBLIOGRAPHY Bibliography BIBLIOGRAPHY IBM TCP/IP Products BIBLIOGRAPHY The IBM C Set/2 Library BIBLIOGRAPHY C Related Publications BIBLIOGRAPHY IBM WorkFrame/2 Publication BIBLIOGRAPHY IBM OS/2 Version 2.0 Publications BIBLIOGRAPHY IBM OS/2 Version 2.0 Technical Library BIBLIOGRAPHY IBM Software Products BIBLIOGRAPHY Other TCP/IP Related Publications INDEX Index BACK_1 Communicating Your Comments to IBM COMMENTS Help us help you! ¦ Copyright IBM Corp. 1990, 1994 CONTENTS - 3 TCP/IP for OS/2: User's Guide Figures FIGURES Figures 1. Example of the Remote Logon Window 3.4 2. Example of the Current Hosts Window 3.4.1 3. Example of the Get Prompt Window 3.7.2 4. Example of the Remote Delete Prompt Window 3.7.2 5. Example of the Current Hosts Window 3.8.3 6. Example of the New Local Directory Window 3.8.6 7. Example of the Rename Local File Window 3.8.7 8. Example of the New Remote Directory Window 3.8.8 9. Example of the Rename Remote File Window 3.8.9 10. Example of Configuration Notebook Program to Automatically Start SendMail 5.4.1 11. Example of LaMail Main Menu 5.9 12.
Recommended publications
  • Configuring UNIX-Specific Settings: Creating Symbolic Links : Snap
    Configuring UNIX-specific settings: Creating symbolic links Snap Creator Framework NetApp September 23, 2021 This PDF was generated from https://docs.netapp.com/us-en/snap-creator- framework/installation/task_creating_symbolic_links_for_domino_plug_in_on_linux_and_solaris_hosts.ht ml on September 23, 2021. Always check docs.netapp.com for the latest. Table of Contents Configuring UNIX-specific settings: Creating symbolic links . 1 Creating symbolic links for the Domino plug-in on Linux and Solaris hosts. 1 Creating symbolic links for the Domino plug-in on AIX hosts. 2 Configuring UNIX-specific settings: Creating symbolic links If you are going to install the Snap Creator Agent on a UNIX operating system (AIX, Linux, and Solaris), for the IBM Domino plug-in to work properly, three symbolic links (symlinks) must be created to link to Domino’s shared object files. Installation procedures vary slightly depending on the operating system. Refer to the appropriate procedure for your operating system. Domino does not support the HP-UX operating system. Creating symbolic links for the Domino plug-in on Linux and Solaris hosts You need to perform this procedure if you want to create symbolic links for the Domino plug-in on Linux and Solaris hosts. You should not copy and paste commands directly from this document; errors (such as incorrectly transferred characters caused by line breaks and hard returns) might result. Copy and paste the commands into a text editor, verify the commands, and then enter them in the CLI console. The paths provided in the following steps refer to the 32-bit systems; 64-bit systems must create simlinks to /usr/lib64 instead of /usr/lib.
    [Show full text]
  • The Linux Kernel Module Programming Guide
    The Linux Kernel Module Programming Guide Peter Jay Salzman Michael Burian Ori Pomerantz Copyright © 2001 Peter Jay Salzman 2007−05−18 ver 2.6.4 The Linux Kernel Module Programming Guide is a free book; you may reproduce and/or modify it under the terms of the Open Software License, version 1.1. You can obtain a copy of this license at http://opensource.org/licenses/osl.php. This book is distributed in the hope it will be useful, but without any warranty, without even the implied warranty of merchantability or fitness for a particular purpose. The author encourages wide distribution of this book for personal or commercial use, provided the above copyright notice remains intact and the method adheres to the provisions of the Open Software License. In summary, you may copy and distribute this book free of charge or for a profit. No explicit permission is required from the author for reproduction of this book in any medium, physical or electronic. Derivative works and translations of this document must be placed under the Open Software License, and the original copyright notice must remain intact. If you have contributed new material to this book, you must make the material and source code available for your revisions. Please make revisions and updates available directly to the document maintainer, Peter Jay Salzman <[email protected]>. This will allow for the merging of updates and provide consistent revisions to the Linux community. If you publish or distribute this book commercially, donations, royalties, and/or printed copies are greatly appreciated by the author and the Linux Documentation Project (LDP).
    [Show full text]
  • Configuring DNS
    Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname. The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the connect, telnet, and ping EXEC commands, and related Telnet support operations. This cache speeds the process of converting names to addresses. Note You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource record type AAAA is used to map a domain name to an IPv6 address. The IP6.ARPA domain is defined to look up a record given an IPv6 address. • Finding Feature Information, page 1 • Prerequisites for Configuring DNS, page 2 • Information About DNS, page 2 • How to Configure DNS, page 4 • Configuration Examples for DNS, page 13 • Additional References, page 14 • Feature Information for DNS, page 15 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
    [Show full text]
  • Testing-Prepare.Pdf
    Prepare Update your system so you can connect to the staging server to perform testing – required for all users EXCEPT “new users.” If you are not certain how to complete the steps listed in Prepare, you should abort testing efforts. Breaking your “hosts” file may prevent applications that use the Internet, such as your Web browser, from functioning properly. Also note that this will make non-CMS www.ndsu.edu sites unavailable while you are testing until you perform the clean-up steps on page 11 of this packet. Windows XP 1. Close all browser windows 2. Open My Computer 3. Browse to Local Disk (C:) > WINDOWS > system32 > drivers > etc 4. Double-click hosts 5. In the Open With dialog window, select Notepad and click OK 6. At the end of the file, AFTER 127.0.0.1 localhost, add a new line with the following entry 134.129.111.243 www.ndsu.edu workspaces.ndsu.edu An example of what the file should look like follows these directions Note that if you usually sign in somewhere other than “workspaces.ndsu.edu” you should add that address to the end of this list, for example like 134.129.111.243 www.ndsu.edu workspaces.ndsu.edu english.ndsu.edu 7. Save the file Remember to complete the clean-up steps on page 11 of this packet when you are done testing Windows Vista 1. Close all browser windows 2. Click the Start menu > All Programs > Accessories > and RIGHT-CLICK Notepad 3. Choose Run as administrator 4. In the User Account Control dialog, click Continue or if you are not an administrator, provide a password for an administrator account and click OK 5.
    [Show full text]
  • UKUI: a Lightweight Desktop Environment Based on Pluggable
    2016 International Conference on Artificial Intelligence and Computer Science (AICS 2016) ISBN: 978-1-60595-411-0 UKUI: A Lightweight Desktop Environment Based on Pluggable Framework for Linux Distribution Jie YU1, Lu SI1,*, Jun MA1, Lei LUO1, Xiao-dong LIU1, Ya-ting KUANG2, Huan PENG2, Rui LI1, Jin-zhu KONG2 and Qing-bo WU1 1College of Computer, National University of Defense Technology, Changsha, China 2Tianjin KYLIN Information Technology Co., Ltd, Tianjin, China *[email protected] *Corresponding author Keywords: Desktop environment, Ubuntu, User interface. Abstract. Ubuntu is an operating system with Linux kernel based on Debian and distributed as free and open-source software. It uses Unity as its default desktop environment, which results in more difficulties of usage for Microsoft Windows users. In this paper, we present a lightweight desktop environment named UKUI based on UbuntuKylin, the official Chinese version of Ubuntu, for Linux distribution. It is designed as a pluggable framework and provides better user experience during human-computer interaction. In order to evaluate the performance of UKUI, a set of testing bench suits were performed on a personal computer. Overall, the results showed that UKUI has better performance compared with Unity. Introduction Linux is a freely available operating system (OS) originated by Linux Torvalds and further developed by thousands of others. Typically, Linux is packaged in a form known as a Linux distribution for both desktop and server use. Some of the most popular mainstream Linux distributions are Red Hat [1], Ubuntu [2], Arch [3], openSUSY [4], Gentoo [5], etc. There are several desktop environments available for nowadays modern Linux distributions, such as XFCE [6], GNOME [7], KDE [8] and LXDE [9].
    [Show full text]
  • Why Os/2 Failed: Business Mistakes Compounded by Memory Prices
    Mountain Plains Journal of Business and Economics Volume 10 Issue 1 Article 4 Date Published: 10-1-2009 Why Os/2 Failed: Business Mistakes Compounded By Memory Prices Eric G. Swedin Weber State University Davis Follow this and additional works at: https://openspaces.unk.edu/mpjbt Part of the Business Commons Recommended Citation Swedin, E. G. (2009). Why Os/2 Failed: Business Mistakes Compounded By Memory Prices. Mountain Plains Journal of Business and Economics, 10(1). Retrieved from https://openspaces.unk.edu/mpjbt/ vol10/iss1/4 This Case Study is brought to you for free and open access by OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. It has been accepted for inclusion in Mountain Plains Journal of Business and Economics by an authorized editor of OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. For more information, please contact [email protected]. 36 WHY OS/2 FAILED: BUSINESS MISTAKES COMPOUNDED BY MEMORY PRICES ERIC G. SWEDIN WEBER STATE UNIVERSITY DAVIS ABSTRACT In 2006, IBM ended their support of OS/2, closing the book on an ambitious effort to create a modern operating system for the personal computer. IBM and Microsoft released the OS/2 operating system in December 1987 to replace the primitive DOS with a more sophisticated, preemptive multitasking operating system for personal computers. This article argues that OS/2 failed because of the U.S.-Japan Semiconductor Trade Agreement of 1986, subsequent accusations of DRAM chip dumping by the United States, and the resulting tariffs on Japanese memory chips, led to a memory chip shortage that drove up memory prices.
    [Show full text]
  • With ANSIBLE Sessions
    SANOG32 bdNOG9 02-10 August, 2018 Dhaka, Bangladesh NETWORK Imtiaz Rahman AUTOMATION (NetDevOps) SBAC Bank Limited [email protected] https://imtiazrahman.com with ANSIBLE Sessions • Session 1: o 14:30 PM – 16:00 PM (Theory with example) • Session 2: o 16:30 PM – 18:00 PM (Configuration and hands on LAB) Today’s Talk 1. Devops/NetDevOps ? 6. Ansible Language Basics 2. Why automation ? 7. Ansible encryption decryption 3. Tools for automation 8. How to run 4. Why Ansible ? 9. Demo 5. Ansible introduction 10. Configuration & Hands on LAB DevOps >devops ? DevOps >devops != DevOps DevOps integrates developers and operations teams In order to improve collaboration and productivity by automating infrastructure, automating workflows and continuously measuring application performance Dev + Ops = DevOps NetDevOps NetDevOps = Networking + DevOps infrastructure as code Why automation ? Avoid Avoid repeated Faster Identical typographical task deployment configuration error (Typos) Tools for automation What is ANSIBLE? • Open source IT automation tool • Red hat Enterprise Linux, CentOS, Debian, OS X, Ubuntu etc. • Need python Why ANSIBLE? • Simple • Push model • Agentless Why ANSIBLE? Puppet SSL Puppet Puppet master Client/agent Ansible Agentless Controller SSH node Managed with ansible node’s How it works 1 2 3 4 Run playbook SSH SSH Laptop/Desktop/ Copy python Run Module Delete Module Server module on device from device Return result 5 What can be done?? • Configuration Management • Provisioning VMs or IaaS instances • Software Testing • Continuous
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • Windows BATCH Scripting Loops
    Windows BATCH Scripting_Loops Table of Contents Loops ............................................................................................................................................... 2 Loops Multiple File Example ........................................................................................................... 5 Loops Directory Example ................................................................................................................ 8 Loops Multiple Lines in a File Example ........................................................................................... 9 Loops Running a Command Multiple Times ................................................................................. 10 For Loops ....................................................................................................................................... 11 Tokenizing Loop Example -1 ........................................................................................................ 13 Tokenizing Loop Example -2 ........................................................................................................ 16 Notices .......................................................................................................................................... 17 Page 1 of 17 Loops Loops A core component of scripts – allow one thing many times Windows batch scripts use “FOR – DO” and has 4 different constructs depending on which switches are used with “FOR” • Multiple Files – perform one command on each file FOR %a
    [Show full text]
  • Managing Files with Sterling Connect:Direct File Agent 1.4.0.1
    Managing Files with Sterling Connect:Direct File Agent 1.4.0.1 IBM Contents Managing Files with Sterling Connect:Direct File Agent.......................................... 1 Sterling Connect:Direct File Agent Overview.............................................................................................. 1 How to Run Sterling Connect:Direct File Agent.......................................................................................... 2 Sterling Connect:Direct File Agent Logging.................................................................................................3 Sterling Connect:Direct File Agent Configuration Planning........................................................................ 3 Sterling Connect:Direct File Agent Worksheet ...........................................................................................4 Considerations for a Large Number of Watch Directories.......................................................................... 6 Modifying MaxFileSize............................................................................................................................ 6 Modifying MaxBackupIndex...................................................................................................................6 Considerations for a Large Number of Files in a Watch Directory..............................................................7 Sterling Connect:Direct File Agent Configuration Scenarios...................................................................... 7 Scenario:Detecting
    [Show full text]
  • Shell Script & Advance Features of Shell Programming
    Kirti Kaushik et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, April- 2015, pg. 458-462 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 4, Issue. 4, April 2015, pg.458 – 462 RESEARCH ARTICLE Shell Script & Advance Features of Shell Programming Kirti Kaushik* Roll No.15903, CS, Department of Computer science, Dronacharya College of Engineering, Gurgaon-123506, India Email: [email protected] Jyoti Yadav Roll No. 15040, CS, Department of Applied Computer science, Dronacharya College of Engineering, Gurgaon-123506, India Email: [email protected] Kriti Bhatia Roll No. 15048, CS, Department of Applied Computer science, Dronacharya College of Engineering, Gurgaon-123506, India Email: [email protected] Abstract-- In this research paper, the idea of shell scripting and writing computer programs is examined and different parts of shell programming are likewise contemplated. A shell script is a PC system intended to be controlled by the UNIX shell which is a charge line translator. The different tongues of shell scripts are thought to be scripting dialects. Regular operations performed by shell scripts incorporate document control, program execution, and printing content. A shell script can give an advantageous variety ofa framework order where unique environment settings, charge alternatives, or post-transforming apply naturally, yet in a manner that permits the new script to still go about as a completely typical UNIX summon. The real ideas like Programming in the Borne and C-shell, in which it would be clarified that how shell programming could be possible in Borne and C-shell.
    [Show full text]
  • Introduction to Linux Kernel Driver Programming
    IntroductionIntroduction toto LinuxLinux kernelkernel driverdriver programmingprogramming Introduction to Linux kernel driver programming The Linux kernel device model Authors and license ● Authors – Michael Opdenacker ([email protected]) Founder of Bootlin, kernel and embedded Linux engineering company https://bootlin.com/company/staff/michael-opdenacker ● License – Creative Commons Attribution – Share Alike 4.0 https://creativecommons.org/licenses/by-sa/4.0/ – Document sources: https://github.com/e-ale/Slides Need for a device model ● For the same device, need to use the same device driver on multiple CPU architectures (x86, ARM…), even though the hardware controllers are different. ● Need for a single driver to support multiple devices of the same kind. ● This requires a clean organization of the code, with the device drivers separated from the controller drivers, the hardware description separated from the drivers themselves, etc. Driver: between bus infrastructure and framework In Linux, a driver is always interfacing with: ● a framework that allows the driver to expose the hardware features in a generic way. ● a bus infrastructure, part of the device model, to detect/communicate with the hardware. Let’s focus on the bus infrastructure for now Device model data structures The device model is organized around three main data structures: ● The struct bus_type structure, which represent one type of bus (USB, PCI, I2C, etc.) ● The struct device_driver structure, which represents one driver capable of handling certain devices on a certain bus. ● The struct device structure, which represents one device connected to a bus The kernel uses inheritance to create more specialized versions of struct device_driver and struct device for each bus subsystem.
    [Show full text]