Research-Study of a Self-Organizing Computer

Total Page:16

File Type:pdf, Size:1020Kb

Research-Study of a Self-Organizing Computer RESEARCH-STUDY OF A SELF-ORGANIZING COMPUTER by Mario R. Schaffner N75-10715 (NASA-CR-14 0 5 9 9) RESEARCH-STUDY OF A 175-0715 SSELF-ORGANIZING COMPUTER Final Report ryof Tech.) 268 p HC (Iassachusetts Inst. $8.50 CSCL 09B Unclas ___G3/60 17145 for the National Astronautic and Space Administration Contract NASW - 2276 Final Report Massachusetts Institute of Technology Cambridge, Mass. 02139 USA "k,. --;_,I p 1974 _July " PREFACE The title of the report deserves some explanation. The sponsoring Agency, the Guidance, Control and Information System Division of NASA, Washington, D.C., was interested in knowing about a hardware system pro- gramed in the form of finite-state machines that was developed at the Smith- sonian Astrophysical Observatory, and gave this contract with this title. The opportunity has been taken to study further and document the approach used. The result of the work can be properly labeled as an "organizable" computer. The capability of this computer to be organized is such that undoubtedly it would significantly facilitate the establishment of "self- organizing" systems, as soon as proper programing systems are added to it. However, no work could be made, in the limits of this contract, on self- organizing programs, although determined programs are amply documented. "Self Organization" is not a clearcut notion. All complex systems have some degree of self-organization. However, the interpretation to be assumed here is that taken in the context of artificial intelligence: the development of means for performing given tasks, in relation to an environ- ment. Essential to this approach is the establishment of criteria for evaluating performance. In this sense, self-organization has attributes of thinking. Turin (1950) in his "Can a machine think?" conjectured that a pos- sible computer (a projection of the Manchester computer of that time), fur- nished with enough memory and programs, could produce results undistinguish- able from.those of human thinking. This shows that a self-organizing system has two main components: an organizable physical part, and a programing part. Different emphasis can be given to either of the two parts. This re- port presents the organizable part in the form of a programable hardware and its programing language. The program part for the self-organization can be considered as a continuation of the present work. - iii - PRECEDING PAGE BLANK NOT FILMED, TABLE OF C 0 NTENTS page PREFACE iii Chapter 1. MOTIVATION FOR A NEW APPROACH I 1.1 Unsatisfactory Aspects in the Use of Computers 1 1.2 The Compiler Approach 5 1.3 The Approach of the Language Directed Computer 8 1.4 A Global Approach 12 Chapter 2. WHY ABSTRACT MACHINES? 15 2.1 Inferences from Psychology 15 2.1.1 Introduction 15 2.1.2 Developmental structures 16 2.1.3 The spatiotemporal frame 18 2.1.4 Words and imagery 20 2.1.5 Concluding remarks 26 2.2 Modeling and Representation 27 2.3 Automata Theory 33 2.3.1 Introduction 33 2.3.2 Functions and structures 34 2.3.3 Formalizations 35 2.3.4 Automata and languages 36 2.3.5 Connections with psychology 36 2.3.6 Interchangeability between program and machine 38 2.4 Cellular Spaces and Computing Structures 41 2.5 Inferences from Neurology 46 2.5.1 Introduction 46 2.5.2 A look at the central nervous system 48 2.5.3 Inferences from the central neural system 55 2.5.4 The McCulloch-Pitts correspondence 59 -v - 2.6 Outline of the Approach Taken 63 2.6.1 Synopsis, part 1 63 2.6.2 Function and structure 67 2.6.3 Synopsis, part 2 70 Chapter 3. THE FORMULATION OF A SYMBOLIC SUBSTRATUM 73 3.1 Preliminaries 73 3.2 Elementary Machines (FSM Automaton) 78 3.2.1 Symbolic formulation 78 3.2.2 Structural formulation 79 3.3 Compounded Machines (CPL Automaton) 82 3.3.1 Symbolic formulation 82 3.3.2 Structural formulation 82 3.3.3 Discussion 86 3.4 Comparison with Other Formal Systems 88 3.4.1 Comparison with commonly formulated finite- state machines 88 3.4.2 Comments in respect to Turing machines 90 3.4.3 Considerations in regard to cellular spaces 92 3.4.4 Considerations in regard to formal languages 94 Chapter 4. THE ISOMORPHIC IMPLEMENTABLE SUBSTRATUM 99 4.1 General Structure 99 4.1.1 Interface with the environment 99 4.1.2 Program allocation 101 4.1.3 The automatic flow of data 102 4.2 Implementation 104 4.2.1 The programable network 105 4.2.2 The programable memory 109 4.3 Discussion 110 4.3.1 Pipelining 110 4.3.2 Addressing 111 - vi - 4.3.3 Parallelism 113 4.3.4 Computer architecture 114 4.4 The CPL 1 Processor 117 4.4.1 Factual information 117 4.4.2 Description 118 Chapter 5. THE PROGRAMING LANGUAGE 121 5.1 Introduction 121 5.1.1 The role of the programing language 121 5.1.2 Preliminaries on the user language 125 5.1.3 An experiment in applying modes of thinking to computer features 127 5.2 The User Language 130 5.2.1 Structure of a program and its representation 130 5.2.2 Input prescription I 134 5.2.3 Data transformation F 135 5.2.4 Transition function T 143 5.2.5 Routing R 149 5.3 An Implentation of Machine Language 153 5.3.1 Outline 153 5.3.2 The format of the card 154 5.3.3 The morphology of the words 156 5.4 Discussion 158 5.4.1 Functional and technical characteristics 158 5.4.2 Similarities with other programing languages 168 Chapter 6. COMPARISON OF PROGRAMS 173 6.1 Introduction 173 6.1.1 Available works on program comparison 173 6.1.2 Criteria of comparison 174 6.1.3 Description of the data used in the tables 177 - vii - 6.2 Real-Time Processing of Weather Radar Signals 178 6.2.1 Structural characterisation of radar-echo 182 patterns 6.2.2 Distribution of precipitation intensity 189 6.2.3 A compounded program 193 6.2.4 Recording of Weather echoes 196 6.2.5 Measurement of statistical characteristics of 198 weather echoes 6.2.6 Measurement of the dispersion of short means 202 6.2.7 Real-time data handling 205 6.2.8 Measurement of the antenna pattern with solar noise 208 6.2.9 R.A.D.A.R. 211 6.2.10 Real-time numerical models 214 6.2.11 Computation of the Fast Fourier transform 218 6.3 Real-Time Processing of Meteor Radar Signals 223 6.3.1 Recognition and recording of faint meteors 223 6.3.2 Experiments of strategies 229 6.3.3 Noise measurements 231 6.4 Exploratory Programs 232 6.4.1 Numerical model of the dynamic of a fluid 232 6.4.2 Analysis of echo-pattern turbulence and movement 236 Chapter 7. CONCLUDING REMARKS 243 7.1 The Essence of the Approach 244 7.2 Results Obtained and Extrapolations 246 7.3 Topics for Further Study 249 REFERENCES 253 - viii - Chapter 1 Motivation for a New Approach 1.1 UNSATISFACTORY ASPECTS IN THE USE OF COMPUTERS Every year we become accustomed to seeing computers increase their speed, their capacity, and their endowment of automatic procedures. Reli- ability is not of concern any longer; on the contrary, we have come to ex- pect infallibility. The cost-performance ratio decreases continuously. In sum, computers do not present technological problems. However, there are some unsatisfactory aspects in their use, as outlined in the following. In modern life, computers are becoming almost as numerous as automo- biles, and the feeling develops that computers are going to be an indispens- able companion for many everyday activities. However, we observe that while the majority of automobile users drive their automobiles themselves, a sig- nificantly smaller portion of computer users do their own programing direct- ly; as a matter of fact, a new profession has developed for the operation of these machines. Note, moreover, that the data we have to process, and the dynamic systems we have to consider in driving an automobile are much more complex than the very elementary mechanization of a currently typical com- puter program. In the course of our analysis we will find an interpretation for the difference in interaction that occurs with automobiles and computers (section 2.1.4, page 24). Others (see for instance Sammet, 1969) use a different analogy. It has been said that if the telephone companies had not gone to dial telephoning, then every woman between the ages of 20 and 50 would have been forced to be- come a telephone operator in order to keep up with demands. Similarly, at the rate computers and their applications are developing, it may be neces- sary for vast numbers of people to become programers. In fact, programers -1- may well have to outnumber significantly the number of people who have prob- lems to solve, inasmuch as the problems themselves become more and more com- plex. Clearly we need to deal with computers directly, just as everybody today dials directly his telephone connections, and almost everybody drives his own car rather than obtaining the service of a professional driver. Naturally each user would like to do this with maximum application to his problem and with minimum attention to the annoying intricacies of the computer itself. In order to obtain a general view of this situation, independent of particular applications and computers, we shall try to identify the essential, common protagonists involved in the use of a computer.
Recommended publications
  • CST8207 – Linux O/S I
    Mounting a Filesystem Directory Structure Fstab Mount command CST8207 - Algonquin College 2 Chapter 12: page 467 - 496 CST8207 - Algonquin College 3 The mount utility connects filesystems to the Linux directory hierarchy. The mount point is a directory in the local filesystem where you can access mounted filesystem. This directory must exist before you can mount a filesystem. All filesystems visible on the system exist as a mounted filesystem someplace below the root (/) directory CST8207 - Algonquin College 4 can be mounted manually ◦ can be listed in /etc/fstab, but not necessary ◦ all mounting information supplied manually at command line by user or administrator can be mounted automatically on startup ◦ must be listed /etc/fstab, with all appropriate information and options required Every filesystem, drive, storage device is listed as a mounted filesystem associated to a directory someplace under the root (/) directory CST8207 - Algonquin College 5 CST8207 - Algonquin College 6 Benefits Scalable ◦ As new drives are added and new partitions are created, further filesystems can be mounted at various mount points as required. ◦ This means a Linux system does not need to worry about running out of disk space. Transparent ◦ No application would stop working if transferred to a different partition, because access to data is done via the mount point. ◦ Also transparent to user CST8207 - Algonquin College 7 All known filesystems volumes are typically listed in the /etc/fstab (static information about filesystem) file to help automate the mounting process If it is not listed in the /etc/fstab file, then all appropriate information about the filesystem needs to be listed manually at the command line.
    [Show full text]
  • Process and Memory Management Commands
    Process and Memory Management Commands This chapter describes the Cisco IOS XR software commands used to manage processes and memory. For more information about using the process and memory management commands to perform troubleshooting tasks, see Cisco ASR 9000 Series Aggregation Services Router Getting Started Guide. • clear context, on page 2 • dumpcore, on page 3 • exception coresize, on page 6 • exception filepath, on page 8 • exception pakmem, on page 12 • exception sparse, on page 14 • exception sprsize, on page 16 • follow, on page 18 • monitor threads, on page 25 • process, on page 29 • process core, on page 32 • process mandatory, on page 34 • show context, on page 36 • show dll, on page 39 • show exception, on page 42 • show memory, on page 44 • show memory compare, on page 47 • show memory heap, on page 50 • show processes, on page 54 Process and Memory Management Commands 1 Process and Memory Management Commands clear context clear context To clear core dump context information, use the clear context command in the appropriate mode. clear context location {node-id | all} Syntax Description location{node-id | all} (Optional) Clears core dump context information for a specified node. The node-id argument is expressed in the rack/slot/module notation. Use the all keyword to indicate all nodes. Command Default No default behavior or values Command Modes Administration EXEC EXEC mode Command History Release Modification Release 3.7.2 This command was introduced. Release 3.9.0 No modification. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs.
    [Show full text]
  • How to Dump and Load
    How To Dump And Load Sometimes it becomes necessary to reorganize the data in your database (for example, to move data from type i data areas to type ii data areas so you can take advantage of the latest features)or to move parts of it from one database to another. The process for doping this can be quite simple or quite complex, depending on your environment, the size of your database, what features you are using, and how much time you have. Will you remember to recreate the accounts for SQL users? To resotre theie privileges? Will your loaded database be using the proper character set and collations? What about JTA? Replication? etc. We will show you how to do all the other things you need to do in addition to just dumping and loading the data in your tables. 1 How To Dump and Load gus bjorklund head groundskeeper, parmington foundation 2 What do we mean by dumping and loading? • Extract all the data from a database (or storage area) • Insert the data into a new database (or storage area) • Could be entire database or part 3 Why do we dump and load? 4 Why do we dump & load? • To migrate between platforms • To upgrade OpenEdge to new version • To repair corruption • To “improve performance” • To change storage area configuration • To defragment or improve “scatter” • To fix a “long rm chain” problem • Because it is October 5 Ways to dump and load • Dictionary • 4GL BUFFER-COPY • Binary • Replication triggers (or CDC) • Table partitioning / 4GL • Incremental by storage area 6 Binary Dump & Load • binary dump files – not "human readable"
    [Show full text]
  • File System, Files, and *Tab /Etc/Fstab
    File system, files, and *tab File system files directories volumes, file systems mounting points local versus networked file systems 1 /etc/fstab Specifies what is to be mounted where and how fs_spec: describes block special device for remote filesystem to be mounted fs_file: describes the mount point fs_vfstype: describes the type of file system fs_mntops: describes the mount options associated with the filesystem 2 /etc/fstab cont. fs_freq: used by the dump command fs_passno: used by fsck to determine the order in which checks are done at boot time. Root file systems should be specified as 1, others should be 2. Value 0 means that file system does not need to be checked 3 /etc/fstab 4 from blocks to mounting points metadata inodes directories superblocks 5 mounting file systems mounting e.g., mount -a unmounting manually or during shutdown umount 6 /etc/mtab see what is mounted 7 Network File System Access file system (FS) over a network looks like a local file system to user e.g. mount user FS rather than duplicating it (which would be a disaster) Developed by Sun Microsystems (mid 80s) history for NFS: NFS, NFSv2, NFSv3, NFSv4 RFC 3530 (from 2003) take a look to see what these RFCs are like!) 8 Network File System How does this actually work? server needs to export the system client needs to mount the system server: /etc/exports file client: /etc/fstab file 9 Network File System Security concerns UID GID What problems could arise? 10 Network File System example from our raid system (what is a RAID again?) Example of exports file from
    [Show full text]
  • Sqlite Dump Without Schema
    Sqlite Dump Without Schema Rodrick unpeopling thermochemically? Autogamous and burst Emanuel check almost hurry-scurry, though Andre inundated his hominidae request. Rident Cobbie electrocuted very huskily while Chandler remains low-key and sickly. The functions are many popular formats, without sqlite schema dump tables in a good chance of sql will generate text file with up your db clear and create table You who check created tables by following commands fist in command line circuit in SQLite command line sqlite3 gamadb sqlite tables Output. To format the world with sqlite tutorial, without sqlite dump schema and are now i thought i increase the. The database schema in an SQLite database is stored ina special table. Using SQLite MoonPoint Support. Application successfully installed devices without going to dump file called. Sqlite3 mysqlitefiledb sqlite output pathtomyoutputfilesql. How To porter The SQLite Dump Command SQLite Tutorial. Impexpc File Reference ch-wernerde. Sqlite commands before it was able to any given json, without sqlite dump file size is how can execute sql? Convert SQLite database to Postgres database like Science. Whenever the without sqlite schema dump command line consists of the table in the support is the last row in list is highly complex peewee. Ram that schema dump command without actually finding and. Trying to know when concatenating character types are dumped db clear, break if start of. Schema Generator MikroORM. Can also crumb the following command which restrict output the file directly. MySQL How you dump a MySQL database and export schema. SQLite Jason L Froebe Tech tips and How Tos for Fellow.
    [Show full text]
  • Epmp Command Line Interface User Guide
    USER GUIDE ePMP Command Line Interface ePMP Command Line Interface User Manual Table of Contents 1 Introduction ...................................................................................................................................... 3 1.1 Purpose ................................................................................................................................ 3 1.2 Command Line Access ........................................................................................................ 3 1.3 Command usage syntax ...................................................................................................... 3 1.4 Basic information ................................................................................................................. 3 1.4.1 Context sensitive help .......................................................................................................... 3 1.4.2 Auto-completion ................................................................................................................... 3 1.4.3 Movement keys .................................................................................................................... 3 1.4.4 Deletion keys ....................................................................................................................... 4 1.4.5 Escape sequences .............................................................................................................. 4 2 Command Line Interface Overview ..............................................................................................
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • Section “Common Predefined Macros” in the C Preprocessor
    The C Preprocessor For gcc version 12.0.0 (pre-release) (GCC) Richard M. Stallman, Zachary Weinberg Copyright c 1987-2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation. A copy of the license is included in the section entitled \GNU Free Documentation License". This manual contains no Invariant Sections. The Front-Cover Texts are (a) (see below), and the Back-Cover Texts are (b) (see below). (a) The FSF's Front-Cover Text is: A GNU Manual (b) The FSF's Back-Cover Text is: You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development. i Table of Contents 1 Overview :::::::::::::::::::::::::::::::::::::::: 1 1.1 Character sets:::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Initial processing ::::::::::::::::::::::::::::::::::::::::::::::: 2 1.3 Tokenization ::::::::::::::::::::::::::::::::::::::::::::::::::: 4 1.4 The preprocessing language :::::::::::::::::::::::::::::::::::: 6 2 Header Files::::::::::::::::::::::::::::::::::::: 7 2.1 Include Syntax ::::::::::::::::::::::::::::::::::::::::::::::::: 7 2.2 Include Operation :::::::::::::::::::::::::::::::::::::::::::::: 8 2.3 Search Path :::::::::::::::::::::::::::::::::::::::::::::::::::: 9 2.4 Once-Only Headers::::::::::::::::::::::::::::::::::::::::::::: 9 2.5 Alternatives to Wrapper #ifndef ::::::::::::::::::::::::::::::
    [Show full text]
  • Filesystem Considerations for Embedded Devices ELC2015 03/25/15
    Filesystem considerations for embedded devices ELC2015 03/25/15 Tristan Lelong Senior embedded software engineer Filesystem considerations ABSTRACT The goal of this presentation is to answer a question asked by several customers: which filesystem should you use within your embedded design’s eMMC/SDCard? These storage devices use a standard block interface, compatible with traditional filesystems, but constraints are not those of desktop PC environments. EXT2/3/4, BTRFS, F2FS are the first of many solutions which come to mind, but how do they all compare? Typical queries include performance, longevity, tools availability, support, and power loss robustness. This presentation will not dive into implementation details but will instead summarize provided answers with the help of various figures and meaningful test results. 2 TABLE OF CONTENTS 1. Introduction 2. Block devices 3. Available filesystems 4. Performances 5. Tools 6. Reliability 7. Conclusion Filesystem considerations ABOUT THE AUTHOR • Tristan Lelong • Embedded software engineer @ Adeneo Embedded • French, living in the Pacific northwest • Embedded software, free software, and Linux kernel enthusiast. 4 Introduction Filesystem considerations Introduction INTRODUCTION More and more embedded designs rely on smart memory chips rather than bare NAND or NOR. This presentation will start by describing: • Some context to help understand the differences between NAND and MMC • Some typical requirements found in embedded devices designs • Potential filesystems to use on MMC devices 6 Filesystem considerations Introduction INTRODUCTION Focus will then move to block filesystems. How they are supported, what feature do they advertise. To help understand how they compare, we will present some benchmarks and comparisons regarding: • Tools • Reliability • Performances 7 Block devices Filesystem considerations Block devices MMC, EMMC, SD CARD Vocabulary: • MMC: MultiMediaCard is a memory card unveiled in 1997 by SanDisk and Siemens based on NAND flash memory.
    [Show full text]
  • Mv-Ch650-90Tm
    MV-CH650-90TM 65 MP CMOS 10 GigE Area Scan Camera Introduction Available Model MV-CH650-90TM camera adopts Gpixel GMAX3265 sensor to M58-mount with fan, mono: MV-CH650- provide high-quality image. It uses 10 GigE interface to transmit 90TM-M58S-NF non-compressed image in real time, and its max. frame rate can F-mount with fan, mono: MV-CH650-90TM- reach 15.5 fps in full resolution. F-NF Key Feature Applicable Industry Resolution of 9344 × 7000, and pixel size of 3.2 μm × 3.2 μm. PCB AOI, FPD, railway related applications, etc. Adopts 10 GigE interface providing max. transmission Sensor Quantum Efficiency distance of 100 meters without relay. Supports auto or manual adjustment for gain, exposure time, and manual adjustment for Look-Up Table (LUT), Gamma correction, etc. Compatible with GigE Vision Protocol V2.0, GenlCam Standard, and third-party software based on protocols. Dimension M58-mount with fan: F-mount with fan: Specification Model MV-CH650-90TM Camera Sensor type CMOS, global shutter Sensor model Gpixel GMAX3265 Pixel size 3.2 µm × 3.2 µm Sensor size 29.9 mm × 22.4 mm Resolution 9344 × 7000 Max. frame rate 15.5 fps @9344 × 7000 Dynamic range 66 dB SNR 40 dB Gain 1.25X to 6X Exposure time 15 μs to 10 sec Exposure mode Off/Once/Continuous exposure mode Mono/color Mono Pixel format Mono 8/10/10p/12/12p Binning Supports 1 × 1, 1 × 2, 1 × 4, 2 × 1, 2 × 2, 2 × 4, 4 × 1, 4 × 2, 4 × 4 Decimation Supports 1 × 1, 1 × 2, 1 × 4, 2 × 1, 2 × 2, 2 × 4, 4 × 1, 4 × 2, 4 × 4 Reverse image Supports horizontal and vertical reverse image output Electrical features Data interface 10 Gigabit Ethernet, compatible with Gigabit Ethernet Digital I/O 12-pin Hirose connector provides power and I/O, including opto-isolated input × 1 (Line 0), opto-isolated output × 1 (Line 1), bi-directional non-isolated I/O × 1 (Line 2), and RS-232 × 1 Power supply 9 VDC to 24 VDC Power consumption Typ.
    [Show full text]
  • How to Setup NFS File System Guide ID: 3 - Release: Initial Revision [Major] 2015-08-14
    How to setup NFS file system Guide ID: 3 - Release: Initial revision [major] 2015-08-14 How to setup NFS file system Configuration of SCO Unix shared drive in order to share printer tasks. Written By: Petr Roupec This document was generated on 2020-11-19 05:38:51 AM (MST). © 2020 omlex.dozuki.com/ Page 1 of 7 How to setup NFS file system Guide ID: 3 - Release: Initial revision [major] 2015-08-14 INTRODUCTION This guide is describing use of SCO scoadmin program to setup mount /volumes/bmprint remote drive on your OT computer. This document was generated on 2020-11-19 05:38:51 AM (MST). © 2020 omlex.dozuki.com/ Page 2 of 7 How to setup NFS file system Guide ID: 3 - Release: Initial revision [major] 2015-08-14 Step 1 — SCO Admin - Starting program Switch user on local console. Please note character "-" on command line - this load right environment for root user From remote computer use telnet connection Start scoadmin program This document was generated on 2020-11-19 05:38:51 AM (MST). © 2020 omlex.dozuki.com/ Page 3 of 7 How to setup NFS file system Guide ID: 3 - Release: Initial revision [major] 2015-08-14 Step 2 — SCO Admin - File System Manager SCO Admin - File Manager Select FileSystems Open Filesystem Manager Use TAB and arrows on your keyboard to move between the fields This document was generated on 2020-11-19 05:38:51 AM (MST). © 2020 omlex.dozuki.com/ Page 4 of 7 How to setup NFS file system Guide ID: 3 - Release: Initial revision [major] 2015-08-14 Step 3 — Start NFS file system mounting wizard Select Mount from menu Scroll down and select "Add Mount Configuration" Choose remote Use TAB and arrows on your keyboard to move between the fields Step 4 — NFS Share - Configuration details Enter IP address of your printer server Enter name of remote directory of your print server Enter name of local directory on computer you are configuring Don't forget Advanced Mount Option - Failure to configure these correctly might stop your server in case of printer server shutdown This document was generated on 2020-11-19 05:38:51 AM (MST).
    [Show full text]
  • UNIX (Solaris/Linux) Quick Reference Card Logging in Directory Commands at the Login: Prompt, Enter Your Username
    UNIX (Solaris/Linux) QUICK REFERENCE CARD Logging In Directory Commands At the Login: prompt, enter your username. At the Password: prompt, enter ls Lists files in current directory your system password. Linux is case-sensitive, so enter upper and lower case ls -l Long listing of files letters as required for your username, password and commands. ls -a List all files, including hidden files ls -lat Long listing of all files sorted by last Exiting or Logging Out modification time. ls wcp List all files matching the wildcard Enter logout and press <Enter> or type <Ctrl>-D. pattern Changing your Password ls dn List files in the directory dn tree List files in tree format Type passwd at the command prompt. Type in your old password, then your new cd dn Change current directory to dn password, then re-enter your new password for verification. If the new password cd pub Changes to subdirectory “pub” is verified, your password will be changed. Many systems age passwords; this cd .. Changes to next higher level directory forces users to change their passwords at predetermined intervals. (previous directory) cd / Changes to the root directory Changing your MS Network Password cd Changes to the users home directory cd /usr/xx Changes to the subdirectory “xx” in the Some servers maintain a second password exclusively for use with Microsoft windows directory “usr” networking, allowing you to mount your home directory as a Network Drive. mkdir dn Makes a new directory named dn Type smbpasswd at the command prompt. Type in your old SMB passwword, rmdir dn Removes the directory dn (the then your new password, then re-enter your new password for verification.
    [Show full text]