Spirent Testcenter Automation Validating the Environment and Configuring the System Variables – an Overview

Total Page:16

File Type:pdf, Size:1020Kb

Spirent Testcenter Automation Validating the Environment and Configuring the System Variables – an Overview Spirent TestCenter Automation Validating the environment and configuring the system variables – an overview August 10 2016 SRE Chicago Vijay Muthucumarasamy Principle Field Service Engineer Spirent Communications PROPRIETARY AND CONFIDENTIAL 1 Agenda Spirent Automation and Supported Platforms Operating System and Validation Environment Set up and Verification • TCL • Python • Perl Lab Server HLTAPI Command Sequencer Q & A Spirent Communications PROPRIETARY AND CONFIDENTIAL 2 Supported OS and API 1. Multi-threaded 2. If you are using Avalanche on Spirent TestCenter, Windows 2008 server is not officially supported at this time. 3. Running as a 32-bit application 4. Requires LabServer 5. Requires openssh-client package **** PLEASE Check the release notes for updated information Spirent Communications PROPRIETARY AND CONFIDENTIAL 3 Spirent API Packages for Linux Environment Spirent Communications PROPRIETARY AND CONFIDENTIAL 4 Verify and Validate the OS & API Before install the STC installation packages • Verify the Operating System - Kernel - CPU - Memory - Validate the requirement : Check the Spirent TestCenter releases and verify Spirent requirements • Verify the API (TCL/Python/Perl) - Release version - Whether 32/64 bit platform - Whether need a Spirent Lab Server - Validate the requirement : Check the Spirent TestCenter releases and verify Spirent requirements Spirent Communications PROPRIETARY AND CONFIDENTIAL 5 Operating System and Validation Verify Kernel version • CentOS/RedHat/Ubuntu - cat /etc/issue - cat /etc/redhat-release (CentOs/RedHat) - uname –r -> Kernel Release - uname –i / uname –m / uname –p -> OS platform whether 32bit or 64bit - uname –a (display all the information) Memory and CPU - free -h -> Provides memory information - cat /proc/cpuinfo - cat /proc/meminfo Find File/Dir - Find / -name “filename” - Find /dir/path/look/up -name "pattern" Spirent Communications PROPRIETARY AND CONFIDENTIAL 6 TCL (Tool Command Language) Supported Versions • 8.4.13 • 8.5.9 • 8.5.14 • Both 32 bit and 64 bit (Lab Server is not mandatory from STC release v4.64) Verify TCL version • Info patchlevel - % info patchlevel 8.4.19 Verify whether the TCL platform (32 bit or 64 bit) • parray tcl_platform - % parray tcl_platform tcl_platform(byteOrder) = littleEndian tcl_platform(machine) = x86_64 tcl_platform(os) = Linux tcl_platform(osVersion) = 2.6.32-642.3.1.el6.x86_64 tcl_platform(platform) = unix tcl_platform(tip,268) = 1 tcl_platform(tip,280) = 1 tcl_platform(user) = spirent tcl_platform(wordSize) = 8 Spirent Communications PROPRIETARY AND CONFIDENTIAL 7 TCL and Environment Variables Windows • Spirent TCL installation - Make sure environment “path” variable has the TCL installation path as shown below « C:\Program Files (x86)\Spirent Communications\Spirent TestCenter 4.xx\TCL\bin; » Spirent Communications PROPRIETARY AND CONFIDENTIAL 8 TCL and Environment Variables cont.… Windows • Active State TCL /Other - Make sure environment “path” variable has the TCL installation path « C:\Tcl\bin; » - Set up environment and pkgIndex.tcl * Create a System Variable STC_INSTALL_DIR and assign STC dir * Under C:\Tcl\lib create a new folder named "stc" * Under the stc folder, create a new file named "pkgIndex.tcl" and edit/add the file as shown below: package ifneeded SpirentTestCenter 2.0 [list source [file join $env(STC_INSTALL_DIR) SpirentTestCenter.tcl]] package ifneeded stc 2.0 [list source [file join $env(STC_INSTALL_DIR) SpirentTestCenter.tcl]] package ifneeded stclib 4.xx [list source [file join $env(STC_INSTALL_DIR) stclib.tcl]] Spirent Communications PROPRIETARY AND CONFIDENTIAL 9 TCL and Environment Variable Linux • Active State TCL /Other - Set up .bash_profile (works for RedHat,CentOs and Ubuntu) for STC env. Variable # .bash_profile # Get the aliases and functions if [ -f ~/.bashrc ]; then . ~/.bashrc fi # User specific environment and startup programs # TCL installtion for STC export PATH=/opt/ActiveTcl-8.4.19-32/bin:$PATH #Set up LD_LIBRARY_PATH with Spirent Installation dir export LD_LIBRARY_PATH=/opt/Spirent_TestCenter_4.xx/Spirent_TestCenter_Application_Linux export STC_INSTALL_DIR=/opt/Spirent_TestCenter_4.xx/Spirent_TestCenter_Application_Linux - Set up environment with pkgIndex.tcl * Under /opt/ActiveTcl-8.4.19-32/lib, create a new folder named "stc" * Under the stc folder, create a new file named "pkgIndex.tcl" and edit it as shown: package ifneeded SpirentTestCenter 2.0 [list source [file join $env(STC_INSTALL_DIR) SpirentTestCenter.tcl]] package ifneeded stc 2.0 [list source [file join $env(STC_INSTALL_DIR) SpirentTestCenter.tcl]] package ifneeded stclib 4.xx [list source [file join $env(STC_INSTALL_DIR) stclib.tcl]] Spirent Communications PROPRIETARY AND CONFIDENTIAL 10 TCL : Load STC package and verify Load the Spirent TestCenter Package C:\Users\vmuthucuma>tclsh % package require SpirentTestCenter 4.64 % Spirent Communications PROPRIETARY AND CONFIDENTIAL 11 TCL : Change Spirent Environment Variable in Runtime How to run multiple STC versions at the same time? • The environment variable can be changed in the script this allows to change the environment variable for that specific run. • This is also applicable to any API including Python, Perl and also HLTAPI as well • Windows - set auto_path [linsert $auto_path 0 "C:/Program Files (x86)/Spirent Communications/Spirent TestCenter x.xx/Spirent TestCenter Application"] • Linux - set auto_path [linsert $auto_path 0 "/opt/Spirent_TestCenter_4.64/Spirent_TestCenter_Application_Linux/"] Spirent Communications PROPRIETARY AND CONFIDENTIAL 12 Python Supported Versions • 2.6.6 • 2.7.5 • Both 32 bit and 64 bit (Lab Server is not mandatory from STC release v4.64) • 64 bit Only supported in Linux environment and not in Windows Verify Python version • python –V - C:\Users\vmuthucuma>python -V > Python 2.7.6 Verify Python version whether 32bit or 64bit • import struct;print struct.calcsize("P") * 8 >>> import struct;print struct.calcsize("P") * 8 32 >>> Spirent Communications PROPRIETARY AND CONFIDENTIAL 13 Python and Environment Variables Windows • Create a system environment variable “STC_PRIVATE_INSTALL_DIR” and set with Spirent Installation directory • Copy “StcPython.py” from C:\Program Files (x86)\Spirent Communications\Spirent TestCenter 4.xx\Spirent TestCenter Application\API\Python to Python installation directory - C:\Python27 Spirent Communications PROPRIETARY AND CONFIDENTIAL 14 Python and Environment Variables Linux • Create a system environment variable “STC_PRIVATE_INSTALL_DIR” in .bash_profile and set with Spirent Installation directory export STC_PRIVATE_INSTALL_DIR=/opt/Spirent_TestCenter_4.xx/Spirent_TestCenter_Application_Linux • Copy “StcPython.py” From /InstallationDir/Spirent_TestCenter_4.xx/Spirent_TestCenter_Application_Linux/API/Pyt hon To Python script directory example: /home/spirent/SpirentAPI Spirent Communications PROPRIETARY AND CONFIDENTIAL 15 Python : Load STC package and verify Load the Spirent TestCenter Package [spirent@localhost Python]$ python Python 2.6.6 (r266:84292, Jul 23 2015, 15:22:56) [GCC 4.4.7 20120313 (Red Hat 4.4.7-11)] on linux2 Type "help", "copyright", "credits" or "license" for more information. >>> from StcPython import StcPython >>> stc = StcPython() >>> print "SpirentTestCenter system version:\t", stc.get("system1", "version") SpirentTestCenter system version: 4.64.8676.0000 >>> Spirent Communications PROPRIETARY AND CONFIDENTIAL 16 Perl Supported Versions • 5.8.8 • 5.8.9 • 5.14.x • Supported : Only running as 32-bit application Verify Perl version • perl –v - This provides version, subversion and architecture Verify Perl version whether 32bit or 64bit • perl -V:ivsize - If the returned value is 4, your Perl uses 32-bit integers - If the returned value is 8, your Perl uses 64-bit integers • perl -V:archname - If the returned value includes x86_64, it's a 64-bit process - If the returned value includes x86 (but not x86_64), it's a 32-bit process. Spirent Communications PROPRIETARY AND CONFIDENTIAL 17 Perl and Environment Variables Windows • Create a system environment variable “STC_PRIVATE_INSTALL_DIR” and set with Spirent Installation directory • Copy “SpirentTestCenter.pm” from C:\Program Files (x86)\Spirent Communications\Spirent TestCenter 4.xx\Spirent TestCenter Application\API\Perl to C:\Perl\site\lib • Edit “SpirentTestCenter.pm” and CHANGE use lib "/home/user/Spirent_TestCenter_2.3x/"; To use lib $ENV{'STC_PRIVATE_INSTALL_DIR'}; Spirent Communications PROPRIETARY AND CONFIDENTIAL 18 Perl and Environment Variables Linux • Create a system environment variable “STC_PRIVATE_INSTALL_DIR” in .bash_profile and set with Spirent Installation directory export STC_PRIVATE_INSTALL_DIR=/opt/Spirent_TestCenter_4.xx/Spirent_TestCenter_Application_Linux • Set the path variable for perl execution file in .bash_profile export PATH=/opt/ActivePerl-5.14/bin:$PATH • Copy “SpirentTestCenter.pm” From opt/Spirent_TestCenter_4.xx/Spirent_TestCenter_Application_Linux\API\Perl To /opt/ActivePerl-5.14/site/lib or /perl_Installation/site/lib • Edit “SpirentTestCenter.pm” and Change use lib "/home/user/Spirent_TestCenter_2.3x/"; To use lib $ENV{'STC_PRIVATE_INSTALL_DIR'}; Spirent Communications PROPRIETARY AND CONFIDENTIAL 19 Perl : Load STC package and verify Load the Spirent TestCenter Package • Create a Load_show_version.pl • Add the following #!/usr/bin/perl -w # load the STC package print "Loading the STC package...\n"; use strict; use SpirentTestCenter; my($stc); $stc = new StcPerl; # Retrieve and display
Recommended publications
  • ECOGEO Workshop 2: Introduction to Env 'Omics
    ECOGEO Workshop 2: Introduction to Env ‘Omics Unix and Bioinformatics Ben Tully (USC); Ken Youens-Clark (UA) Unix Commands pwd rm grep tail install ls ‘>’ sed cut cd cat nano top mkdir ‘<’ history screen touch ‘|’ $PATH ssh cp sort less df mv uniq head rsync/scp Unix Command Line 1. Open Terminal window Unix Command Line 2. Open Chrome and navigate to Unix tutorial at Protocols.io 3. Group: ECOGEO 4. Protocol: ECOGEO Workshop 2: Unix Module ! This will allow you to copy, paste Unix scripts into terminal window ! ECOGEO Protocols.io for making copy, paste easier Unix Command Line $ ls ls - lists items in the current directory Many commands have additional options that can be set by a ‘-’ $ ls -a Unix Command Line $ ls -a lists all files/directories, including hidden files ‘.’ $ ls -l lists the long format File Permissions | # Link | User | Group | Size | Last modified $ ls -lt lists the long format, but ordered by date last modified Unix Command Line Unix Command Line $ cd ecogeo/ cd - change directory List the contents of the current directory Move into the directory called unix List contents $ pwd pwd - present working directory Unix Command Line /home/c-debi/ecogeo/unix When were we in the directory home? Or c-debi? Or ecogeo? $ cd / Navigates to root directory List contents of root directory This where everything is stored in the computer All the commands we are running live in /bin Unix Command Line / root bin sys home mnt usr c-debi BioinfPrograms cdebi Desktop Downloads ecogeo unix assembly annotation etc Typical Unix Layout Unix Command Line Change directory to home Change directory to c-debi Change directory to ecogeo Change directory to unix List contents Change directory to data Change directory to root Unix Command Line Change directory to unix/data in one step $ cd /home/c-debi/ecogeo/unix/data Tab can be used to auto complete names $ cd .
    [Show full text]
  • Pingdirectory Administration Guide Version
    Release 7.3.0.3 Server Administration Guide PingDirectory | Contents | ii Contents PingDirectory™ Product Documentation................................................ 20 Overview of the Server............................................................................. 20 Server Features.................................................................................................................................20 Administration Framework.................................................................................................................21 Server Tools Location....................................................................................................................... 22 Preparing Your Environment....................................................................22 Before You Begin.............................................................................................................................. 22 System requirements..............................................................................................................22 Installing Java......................................................................................................................... 23 Preparing the Operating System (Linux).......................................................................................... 24 Configuring the File Descriptor Limits.................................................................................... 24 File System Tuning.................................................................................................................25
    [Show full text]
  • Environment Variable and Set-UID Program Lab 1
    SEED Labs – Environment Variable and Set-UID Program Lab 1 Environment Variable and Set-UID Program Lab Copyright © 2006 - 2016 Wenliang Du, All rights reserved. Free to use for non-commercial educational purposes. Commercial uses of the materials are prohibited. The SEED project was funded by multiple grants from the US National Science Foundation. 1 Overview The learning objective of this lab is for students to understand how environment variables affect program and system behaviors. Environment variables are a set of dynamic named values that can affect the way running processes will behave on a computer. They are used by most operating systems, since they were introduced to Unix in 1979. Although environment variables affect program behaviors, how they achieve that is not well understood by many programmers. As a result, if a program uses environment variables, but the programmer does not know that they are used, the program may have vulnerabilities. In this lab, students will understand how environment variables work, how they are propagated from parent process to child, and how they affect system/program behaviors. We are particularly interested in how environment variables affect the behavior of Set-UID programs, which are usually privileged programs. This lab covers the following topics: • Environment variables • Set-UID programs • Securely invoke external programs • Capability leaking • Dynamic loader/linker Readings and videos. Detailed coverage of the Set-UID mechanism, environment variables, and their related security problems can be found in the following: • Chapters 1 and 2 of the SEED Book, Computer & Internet Security: A Hands-on Approach, 2nd Edition, by Wenliang Du.
    [Show full text]
  • Ubuntu Server Guide Basic Installation Preparing to Install
    Ubuntu Server Guide Welcome to the Ubuntu Server Guide! This site includes information on using Ubuntu Server for the latest LTS release, Ubuntu 20.04 LTS (Focal Fossa). For an offline version as well as versions for previous releases see below. Improving the Documentation If you find any errors or have suggestions for improvements to pages, please use the link at thebottomof each topic titled: “Help improve this document in the forum.” This link will take you to the Server Discourse forum for the specific page you are viewing. There you can share your comments or let us know aboutbugs with any page. PDFs and Previous Releases Below are links to the previous Ubuntu Server release server guides as well as an offline copy of the current version of this site: Ubuntu 20.04 LTS (Focal Fossa): PDF Ubuntu 18.04 LTS (Bionic Beaver): Web and PDF Ubuntu 16.04 LTS (Xenial Xerus): Web and PDF Support There are a couple of different ways that the Ubuntu Server edition is supported: commercial support and community support. The main commercial support (and development funding) is available from Canonical, Ltd. They supply reasonably- priced support contracts on a per desktop or per-server basis. For more information see the Ubuntu Advantage page. Community support is also provided by dedicated individuals and companies that wish to make Ubuntu the best distribution possible. Support is provided through multiple mailing lists, IRC channels, forums, blogs, wikis, etc. The large amount of information available can be overwhelming, but a good search engine query can usually provide an answer to your questions.
    [Show full text]
  • Virtualfish Documentation
    virtualfish Documentation Release 1.0.7.dev0+g64f7675.d20200320 Adam Brenecki and contributors Mar 20, 2020 Contents 1 Contents 3 1.1 Installation and Setup..........................................3 1.2 Usage...................................................4 1.3 Plugins..................................................5 1.4 Extending Virtualfish...........................................8 1.5 Frequently Asked Questions.......................................9 1.6 See Also.................................................9 2 Contributors 11 i ii virtualfish Documentation, Release 1.0.7.dev0+g64f7675.d20200320 A Fish Shell wrapper for Ian Bicking’s virtualenv, somewhat loosely based on Doug Hellman’s virtualenvwrapper for Bourne-compatible shells. Contents 1 virtualfish Documentation, Release 1.0.7.dev0+g64f7675.d20200320 2 Contents CHAPTER 1 Contents 1.1 Installation and Setup 1.1.1 Installing 1. Make sure you’re running Fish 2.x. If you’re running an Ubuntu LTS release that has an older Fish version, install Fish 2.x via the fish-shell/release-2 PPA. 2. Install virtualfish by running pip install virtualfish. 3. Add the following to your ~/.config/fish/config.fish: eval (python-m virtualfish) If you want to use virtualfish with plugins, list the names of the plugins as arguments to the virtualfish loader: eval (python-m virtualfish compat_aliases) Note: If your config.fish modifies your $PATH, you should ensure that you load virtualfish after those modifications. 4. Customize your fish_prompt 1.1.2 Customizing Your fish_prompt virtualfish doesn’t
    [Show full text]
  • A Simple Implementation of Name Spaces for R
    A Simple Implementation of Name Spaces for R Luke Tierney Department of Statistics and Actuarial Science University of Iowa May 29, 2003 1 Introduction This document presents the implementation of name space support provided in R 1.7. Some minor changes in the current development verison have also been incorporated. A pdf version1 of this document is also available. Name spaces provide a means for packages to control the way global variables in their function defini- tions are resolved and to control which local definitions are to be available outside the package. Packages with name spaces export variables with certain values. A package with a name space can import variables exported by other packages with name spaces. Functions defined within a name space are defined in an en- vironment consisting of the internal name space frame, which is enclosed in a (set of) imported frames.2 All name spaces import the base name space. The base name space is a special name space that is enclosed by the global environment. For example, a function defined in a name space bar that imports foo will be defined in an environment that looks like this: --------------- | bar internals | --------------- | foo exports | --------------- | base exports | --------------- | .GlobalEnv | --------------- | package:pkg1 | --------------- ... --------------- | package:base | --------------- The variables in base appear twice: once as a statically determined import (static in the sense that its position in the environment is fixed) and once at the end of the dynamic global environment (where the search index of base varies as packages are attached and detached).3 1See URL morenames.pdf. 2The implementation fuses all explicit imports into a single frame.
    [Show full text]
  • CPSA+Maude+PDA + PVS
    CPSA+Maude+PDA + PVS Carolyn Talcott & Sam Owre SRI International with help from Shaddin, Dusko, and Matthias and others Protocol exchange, June 2005 Plan • Viewing CPSA skeletons • PVS formalization Maude Display skeletons • Execution of PDA Ground execution of scenarios and attacks Protocols Symbolic execution processes Skeletons Protocols using homomorphisms Processes and inference rules .... CPSA Define protocol PDA Create role Derive protocol Verification and properties Discover conditions ... Compose/Refine ... PVS Formal model Verify theorems Certify claims ... CSPA-Maude Viewing CPSA Skeletons • CPSA -> Maude -> JLambda • String -> Sexp -> Strand exp -> JLambda exp • Two tricks to printing: • ordering columns • spacing rows Sexpression external form (skeleton (identifiers (id original (sid resp 1))) (strands (strand (sid resp 1) (messages (sm - (conc (name A) (nonce Na))) ... ) )) (non (ltk (name B) (name S)) (ltk (name A) (name S))) (uniq (nonce Nb)) (order) (safe)) Converting to Strand Exp <Skeleton> := (skeleton <IdentifierSet> <StrandSet> <Non><Uniq> <EdgeSet> <Safe>) op sexp2skeleton : Sexp -> Skeleton . ceq sexp2skeleton( [a("skeleton") [a("identifiers") idsexpl] [a("strands") ssexpl] .... [a("safe") sasexpl]]) = cpsa-skel(ids,ss,non,uniq,es,safe) if ids := sexpl2ids(idsexpl) /\ ss := sexpl2strands(ssexpl) ... Ordering Columns • For each permutation of strands sum crossings of strands between source and target of each edge • Pick a permutation with the fewest crossings Spacing Rows: Setting up Constraints Assume a skeleton
    [Show full text]
  • BCP – SRTP Configuration and Troubleshooting Guidelines for Oracle Enterprise SBC
    BCP – SRTP Configuration and Troubleshooting Guidelines for Oracle Enterprise SBC Revision History Version Author Description of Changes Date Revision Completed 520-0043-00 Antonio Merenciano Initial Release Oct 21st,2010 520-0043-01 Anima Khindari Added ETC NIU support July 27th, 2011 information 520-0043-02 Bhaskar Reddy Gaddam Rebranded with latest release July 12th , 2018 information 520-0043-02 Priyesh Mehrotra Rebranded with latest release July 16th 2020 information.IPSec configuraton removed. Copyright © 2013, 2020, Oracle and/or its affiliates. All rights reserved.. Status of this memo Oracle SBC Best Current Practices are working documents of the Professional Services department of Oracle Corporation. Note that other groups may also distribute working documents as Best Current Practices. Best Current Practices are working documents valid until explicitly obsoleted, and may be updated, replaced or obsoleted by other documents at any time. It is recommended to use Best Current Practices as reference material as well as to cite them in other works in progress. Abstract The use of the RFC 2119 keywords is an attempt to assign the correct requirement levels ("MUST", "SHOULD", "MAY", etc.). This document defines a series of recommendations for Secure Real-time Transport Protocol (SRTP) configuration and troubleshooting on the Oracle SBC in a customer’s production network. They should be used when either (a) deploying a new SBC, or (b) updating an existing configuration made before Best Current Practices were in place. When in conflict with Customer requirements or desires, the Customer’s preference SHOULD take precedence. Applicability This document is applicable to Oracle Enterprise Session Border Controller Release S-Cz8.4.0 Best Current Practice SRTP Configuration and Troubleshooting Guidelines July 2020 Table of Contents 1 Introduction .....................................................................................................................................................
    [Show full text]
  • Gnu Coreutils Core GNU Utilities for Version 6.9, 22 March 2007
    gnu Coreutils Core GNU utilities for version 6.9, 22 March 2007 David MacKenzie et al. This manual documents version 6.9 of the gnu core utilities, including the standard pro- grams for text and file manipulation. Copyright c 1994, 1995, 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". Chapter 1: Introduction 1 1 Introduction This manual is a work in progress: many sections make no attempt to explain basic concepts in a way suitable for novices. Thus, if you are interested, please get involved in improving this manual. The entire gnu community will benefit. The gnu utilities documented here are mostly compatible with the POSIX standard. Please report bugs to [email protected]. Remember to include the version number, machine architecture, input files, and any other information needed to reproduce the bug: your input, what you expected, what you got, and why it is wrong. Diffs are welcome, but please include a description of the problem as well, since this is sometimes difficult to infer. See section \Bugs" in Using and Porting GNU CC. This manual was originally derived from the Unix man pages in the distributions, which were written by David MacKenzie and updated by Jim Meyering.
    [Show full text]
  • UNIX Reference Card Create a Directory Called Options: -I Interactive Mode
    File System Manipulation Move (Rename) Files and Directories mv present-filename new-filename to rename a file Create (or Make) a Directory mv source-filename destination-directory to move a file into another directory mkdir directory-name directory-name UNIX Reference Card create a directory called options: -i interactive mode. Must confirm file overwrites. Anatomy of a Unix Command Look at a File Copy Files more filename man display file contents, same navigation as cp source-filename destination-filename to copy a file into command-name -option(s) filename(s) or arguments head filename display first ten lines of a file another file tail filename display last ten lines of a file Example: wc -l sample cp source-filename destination-directory to copy a file into another directory : options options: The first word of the command line is usually the command name. This -# replace # with a number to specify how many lines to show is followed by the options, if any, then the filenames, directory name, or -i interactive mode. Must confirm overwrites. Note: this other arguments, if any, and then a RETURN. Options are usually pre- option is automatically used on all IT’s systems. -R recursive delete ceded by a dash and you may use more than one option per command. List Files and Directories The examples on this reference card use bold case for command names Remove (Delete) Files and Directories and options and italics for arguments and filenames. ls lists contents of current directory ls directory-name list contents of directory rm filename to remove a file rmdir directory-name to remove an Important Note about UNIX Commands empty directory : options options: -a list all files including files that start with “.” UNIX commands are case sensitive.
    [Show full text]
  • UNIX System Commands for Nuclear Magnetic Resonance(NMR)
    8/25/00 11:41 AM UNIX System Commands For Nuclear Magnetic Resonance(NMR) EMORY Dr. Shaoxiong Wu NMR Research Center at Emory 1996 /xiong/UNIX.doc September 25, 1996 Dr. Shaoxiong Wu The information in this document is based on my own experiences. It has been carefully checked. However, no responsibility is assumed if any one copied this document as their reference. UNIX Commands 10/05/96 12:50 PM Updated Commands for tape operation: Tape Utility %mt -f /dev/rst0 retention (rewind)* Tape Copy %tcopy /dev/rst0 /dev/rst1 rst0-source rst1 --target Tape Dump #/usr/etc/dump 0cdstfu 1000 700 18 /dev/rst0 /dev/sd3c (/dev/sd0a;/dev/sd0g) 150Mb tape This dump can be recovered by mini root!!!! #dump 0cdstfu 1000 425 9 /dev/rst0 /dev/rsd0a On Omega600 (60Mb tape) Recover some files from the dump tape #restore -i restore>ls List files on the tape restore>add file name restore>extract you may extract file into a temp.dir first Tape Backup #../tar cvf /dev/rst0 dir-to-be-backup #../tar tvf /dev/rst0 ---list file on the tape #../tar xvfp /dev/rst0 ./restoredir (current dir) DATA Compression and Tape Backup #tar cf directoryname.tar directoryname ------compress all files in the directoryname #rm -r directoryname #compress directoryname.tar -------a new file name will be -------.tar.Z #tar cvf /dev/rst0 -----tar.Z ------save the file on a tape *******Retrieve the files #tar xvf /dev/rst0 ------tar.Z #uncompress ------tar.Z -----a new file will appear -----.tar 1 /xiong/UNIX.doc September 25, 1996 Dr.
    [Show full text]
  • Environmental Science (ENV) 1
    Environmental Science (ENV) 1 ENV-414 ENV Professional Portfolio (0 credits) ENVIRONMENTAL SCIENCE This assessment offers students with a major or a support area in environmental science the opportunity to show that they can effectively (ENV) use and communicate information. The student assembles a portfolio of her communications, including laboratory notebooks, written reports ENV-297 Independent Study (2-4 credits) and papers, videotapes of speeches, and abstracts. She describes the Under the approval and direction of a faculty member, independent study research strategies she employed in her portfolio work. She assesses her is available to students. portfolio, describing her own strengths and areas for improvement. ENV-341 Geographical Information Systems (3 credits) ENV-483 Advanced Internship Seminar (1-3 credits) This hands-on course in which students are given beginning-level The student applies her analytical and problem-solving abilities as well as opportunities to process, analyze and visualize spatial data and the frameworks of environmental science in researching a specific issue information using commercially-available GIS (Geographic Information in an industrial, government, or health-related facility. She participates Systems) software. In the process, they are introduced to the principles in an on-campus seminar directed by a member of the environmental of GIS and its usefulness as an analytical tool and as an effective science faculty to reflect on her learning in a work environment. communication technique in addressing global, environmental and social Prerequisite(s): Must have completed INTERN 383. Departmental consent; science questions. The course also explores ethical issues pertaining to confer with advisor; preplacement workshop required. See Internship confidentiality and privacy when gathering and using GIS data.
    [Show full text]