The Netminder System's Network Trouble Patterning (NTP) Feature

Total Page:16

File Type:pdf, Size:1020Kb

The Netminder System's Network Trouble Patterning (NTP) Feature The NetMinder® System’s Network Trouble Patterning (NTP) Feature Set Release 9.2 System Administration Guide Lucent Technologies — Proprietary This document contains proprietary information of 190-405-553 Lucent Technologies and is not to be disclosed or used except in accordance with applicable agreements Issue 1.0 November 2002 Copyright© 2002 Lucent Technologies Unpublished and Not for Publication All Rights Reserved Copyright Copyright© 2002 Lucent Technologies. All Rights Reserved. This material is protected by the copyright and trade secret laws of the United States and other countries. It may not be reproduced, distributed or altered in any fashion by any entity, including other Lucent Technologies Business Units or Divisions, without expressed permission in the Software Right to Use contract or the expressed written consent of the Lucent Learning Organization (LLO) organization. Notice Every effort was made to ensure that the information in this document was complete and accurate at the time of printing. However, information is subject to change. This product has been produced and distributed by Lucent Technologies. Trademarks 4ESS is a trademark of Lucent Technologies. 5ESS is a registered trademark of Lucent Technologies. 7R/E is a trademark of Lucent Technologies. Adobe is registered trademark of Adobe. Acrobat is a registered trademark of Adobe. AXE is a registered trademark of Telefonaktiebolaget L.M. Ericsson (Sweden). BILLDATS Data Manager is a trademark of Lucent Technologies. CLLI, CLEI, CLCI, and CLFI are trademarks of Bellcore Research. Datakit is a registered trademark of Lucent Technologies. DMS is a registered trademark of NORTEL Northern Telecom. DMS 10, DMS 100, DMS 200, and DMS 250 are trademarks of NORTEL Northern Telecom. Ericsson is a registered trademark of Telefonaktiebolaget L.M. Ericsson (Sweden). ESS is a trademark of Lucent Technologies. EWSD is a registered trademark of Siemens Aktiengesellschaft (Fed. Rep. of Germany Joint Stock Co.). Exceed is a registered trademark of Hummingbird Communications. FrameMaker is a registered trademark of Adobe Systems. Geoprobe is a trademark of Inet Inc. HP and HP-UX are registered trademarks of Hewlett-Packard. Kenan is a registered trademark of Lucent Technologies. LASERJET is a registered trademark of Hewlett-Packard. Netminder is a registered trademark of Lucent Technologies in various countries outside the U.S. NFS is a registered trademark of Sun Microsystems. Nortel Networks is a trademark of Nortel Network Corp. OneVision is a registered trademark of Lucent Technologies. OPEN LOOK is a registered trademark of Novell. Oracle is a registered trademark of Oracle Corp. OSF and OSF/MOTIF are registered trademarks of Open Software Foundation. Pacific Access is a registered trademark of Pacific Access. SQL*DBA, SQL*NET, SQL PLUS, and SQL*Reportwriter are registered trademarks of Oracle Corporation. SQR is a registered trademark of Sybase. Sprint is a registered trademark of U S Sprint Communications Company Limited Partnership. Succession is a trademark of Nortel Networks Corp. Solaris, Sun, and SunOS are trademarks of Sun Microsystems. TANDEM is a registered trademark of Tandem Computers. TimesTen is a trademark of TimesTen. TMOS is a trademark of Ericsson Business Networks, Inc. UNIX is a registered trademark in the US and other countries, licensed exclusively through X/Open Co. Ltd. Lucent Technologies — Proprietary See notice on first page System Administration Guide Contents 1 About This Document ■ Overview 1-3 ■ Documents 1-4 ■ Software Release Notes 1-5 ■ Prerequisites 1-6 ■ Format, Typography, and Conventions 1-7 2 System Description ■ Overview 2-3 Users ■ Logins 2-4 ■ User Interfaces 2-6 Hardware and Software, and Connectivity ■ Overview 2-7 ■ Hardware and Software 2-8 ■ TCP/IP Connectivity 2-11 Data Flow ■ Overview 2-12 ■ CIMs 2-15 ■ Sources 2-16 ■ Thresholds 2-17 ■ Conversions 2-18 ■ System Backbone and Processes 2-23 ■ Entity Roles 2-25 Files and Databases ■ Overview 2-28 ■ Oracle Databases 2-29 ■ Application Directory Structure 2-30 ■ Application Software Files 2-36 Lucent Technologies — Proprietary See notice on first page NetMinder® System’s NTP Feature Set Release 9.2 Issue 1.0 November 2002 i System Administration Guide Contents ■ CIM Data 2-37 Administrative Tools and Routine Tasks ■ Overview 2-38 ■ Administration Tools 2-39 ■ System-Level Tasks 2-40 ■ User-Related Tasks 2-41 ■ Tasks Affecting Output 2-43 3 Start and Stop ■ Overview 3-3 Verify Run Status ■ Verify NTP Run Status 3-4 ■ Verify BB-GUI Run Status 3-5 ■ who and whoall Commands 3-6 Start ■ Start NTP 3-8 ■ Start the Host-Based NTP Software 3-9 ■ Start the Host-Based Oracle Software 3-10 ■ Start the BB-GUI 3-11 ■ How Users Access the NTP Interface 3-12 Stop ■ Stop NTP 3-13 ■ Stop NTP but Not Oracle 3-16 ■ Stop NTP and Oracle 3-17 ■ Stop Oracle 3-18 ■ Stop Oracle if Shutdown Immediate Hangs 3-19 ■ Stop the BB-GUI 3-20 System Time ■ Overview 3-21 Cron Lucent Technologies — Proprietary See notice on first page ii Release 9.2 Issue 1.0 November 2002 NetMinder® System’s NTP Feature Set System Administration Guide Contents ■ Overview 3-22 ■ Modify crontab Files 3-24 ■ root crontab File 3-25 ■ ntp crontab File 3-26 ■ Other crontab Files (adm, oracle, and scp) 3-31 4 Reference Data Tables Introduction ■ Overview 4-3 ■ Tables 4-5 ■ Records 4-6 ■ Fields 4-7 ■ Table and Field Helps 4-9 ■ describe Command 4-10 ■ Edit (vi) ASCII Files 4-12 sui find ■ Overview 4-16 ■ sui find for dbedit 4-17 ■ Search Expressions in sui find 4-20 Dbedit ■ Overview 4-24 ■ ASCII Files for dbedit 4-25 ■ dbedit Command 4-28 ■ During and after dbedit 4-31 ■ Correct dbedit Errors 4-33 ■ dbedit Insert or Update Example 4-37 ■ dbedit Delete Example 4-40 Field Dependencies ■ Field Dependency During Updates 4-42 ■ Field Dependency During Installation 4-48 Lucent Technologies — Proprietary See notice on first page NetMinder® System’s NTP Feature Set Release 9.2 Issue 1.0 November 2002 iii System Administration Guide Contents Verify Reference Database Tables ■ Database Schema 4-53 Other Modifications ■ Updating the TimesTen Database after Certain Modifications 4-54 5 Add Network Elements ■ Introduction 5-3 Re and De ■ Re and De Overview 5-5 ■ Re Conversions 5-7 ■ Add an Re 5-14 ■ Tables to Edit to Add an Re 5-20 Add De-Only Elements ■ Overview 5-25 ■ Add and Map SCPs and STPs 5-26 ■ Add an AUTOPLEX Location Register as De 5-29 ■ Add an AUTOPLEX or DMS MTX Cell Base Station as De 5-32 ■ Add an Adjunct 5-36 ■ Add an ECOS Area 5-38 Rt’s ■ Overview 5-40 ■ Correct Wrong or Missing Rt Values 5-41 ■ Add an Rt 5-44 Shared Procedures ■ Purpose 5-45 ■ Add to Swarch (or other “arch”) Table 5-46 ■ Add to Rearch Table 5-48 ■ Map an Re to its Swarch De’s 5-50 Define Routes to Eliminate “?”s ■ Overview 5-54 Lucent Technologies — Proprietary See notice on first page iv Release 9.2 Issue 1.0 November 2002 NetMinder® System’s NTP Feature Set System Administration Guide Contents ■ Eliminate “?” in Lrne 5-55 ■ Eliminate “?” De 5-57 FDCs ■ Add or Modify FDCs 5-58 ■ 7R/E PLS FDCs 5-63 ■ DMS MTX FDCs 5-64 ■ OTR FDCs 5-65 ■ GeoProbe FDCs 5-67 ■ CDR FDCs 5-70 Delete a Network Element ■ Overview 5-72 6 Add or Delete Users Introduction ■ Task Overview 6-5 Add and Delete NTP Users ■ Overview 6-8 ■ Add a User Login ID on the NTP Host 6-9 ■ Attributes File for add_ntpuser Command 6-12 ■ Add NTP Users 6-20 ■ add_ntpuser Command 6-25 ■ Delete NTP Users 6-28 ■ del_ntpuser Command 6-30 Add and Delete BB-GUI Users ■ Overview 6-31 ■ Password Administration 6-33 ■ Web User Administration Page 6-36 ■ Web User Information Page 6-43 ■ Add BB-GUI Users 6-51 ■ Delete BB-GUI Users 6-52 Lucent Technologies — Proprietary See notice on first page NetMinder® System’s NTP Feature Set Release 9.2 Issue 1.0 November 2002 v System Administration Guide Contents Install and Uninstall Client Software for the BB-GUI ■ Overview 6-53 ■ Install Client Software for the BB-GUI 6-56 ■ Uninstall Client Software for the BB-GUI 6-75 Administer User Access ■ How Users Access NTP 6-80 7 Modify Users ■ Overview 7-3 Modify BB-GUI Users ■ Modify BB-GUI User Information 7-6 ■ Configure Oracle Client Connections for Pattern Painter 7-7 Manage Command Groups ■ Overview 7-8 ■ Define Command Groups 7-10 ■ Assign Users to Command Groups 7-13 Manage FDC Groups ■ Overview 7-15 ■ Define FDC Groups 7-18 ■ Assign Users to FDC Groups 7-21 Manage Network Groups and Segments ■ Overview 7-25 ■ Define Network Groups and Segments 7-28 ■ Assign Users to Network Groups and Segments 7-33 Manage User Environment Variables ■ Overview 7-37 ■ admset command 7-39 Manage User Files and Databases ■ Overview 7-45 ■ Remove User ASCII Files 7-47 Lucent Technologies — Proprietary See notice on first page vi Release 9.2 Issue 1.0 November 2002 NetMinder® System’s NTP Feature Set System Administration Guide Contents ■ Remove User Databases 7-48 ■ ptspace Command 7-50 ■ sui list Command 7-52 ■ sui remove Command 7-54 Set X-GUI Table Name Display ■ Overview 7-56 Restrict User cron Functions ■ Overview 7-59 8 Thresholding and Alerting ■ Overview 8-5 Basic Thresholding and Alerting ■ Types of Basic Thresholding 8-6 ■ Routine Tasks for Basic Thresholding 8-7 ■ System Variables for Basic Thresholding 8-8 ■ 5-Minute and Hourly Basic Thresholds 8-10 ■ sui showthresh Command 8-17 ■ See 5-Minute or Hourly Thresholds 8-21 ■ sui thresh Command 8-24 ■ Set or Unset Manual 5-Minute or Hourly Thresholds 8-27 ■ Stop or Restart Thresholding for Entity or FDC via Ai 8-30 ■ sui modmat Command 8-34 ■ Soak 5-Minute and Hourly Thresholds 8-37 ■ Soak
Recommended publications
  • Tempest™ DCS Toolkit Version 5.0 DECODES
    Tempest™ DCS Toolkit Version 5.0 DECODES (Device Conversion and Delivery System) Reference Manual Document Revision 1.0 September, 2011 Copyright 2011 Sutron Corporation Sutron Corporation, ILEX Division 22400 Davis Drive Sterling, VA 20164 Tel: (703) 406-2800 Email: [email protected] Table of Contents Contents 1. INTRODUCTION TO DCS TOOLKIT / DECODES RELEASE ................................................. 1 1.1 INTRODUCTION TO DECODES ......................................................................................................... 1 1.2 WHAT’S NEW? .................................................................................................................................. 3 1.2.1 DCS Toolkit 5.0 ...................................................................................................................... 3 1.2.2 DCS Toolkit 4.9 ...................................................................................................................... 3 1.2.3 DCS Toolkit 4.6 ...................................................................................................................... 3 1.2.4 DCS Toolkit 4.5 ...................................................................................................................... 3 1.2.5 New for DECODES 7.5 .......................................................................................................... 3 1.2.6 New for DECODES 7.4 .......................................................................................................... 3 1.2.7 New Features
    [Show full text]
  • IBM Informix Guide to SQL: Reference
    IBM Informix Version 11.70 IBM Informix Guide to SQL: Reference SC27-3524-00 IBM Informix Version 11.70 IBM Informix Guide to SQL: Reference SC27-3524-00 Note Before using this information and the product it supports, read the information in “Notices” on page D-1. Edition This publication contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1996, 2010. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Introduction ..................................ix About This Publication................................ix Types of Users .................................ix Software Dependencies ..............................ix Assumptions About Your Locale............................x Demonstration Database ..............................x What's New in SQL Reference for IBM Informix, Version 11.70 ..................x Example code conventions ..............................xi Additional documentation ..............................xii Compliance with industry standards ...........................xii Syntax diagrams .................................xiii
    [Show full text]
  • A Model-Driven Architecture Based Evolution Method and Its Application in an Electronic Learning System
    A Model-Driven Architecture based Evolution Method and Its Application in An Electronic Learning System PhD Thesis Yingchun Tian Software Technology Research Laboratory De Montfort University October, 2012 To my husband, Delin Jing and my mum, Ning Zhang for their love and support Declaration Declaration I declare that the work described in this thesis was originally carried out by me during the period of registration for the degree of Doctor of Philosophy at De Montfort University, U.K., from October 2008 to December 2011. It is submitted for the degree of Doctor of Philosophy at De Montfort University. Apart from the degree that this thesis is currently applying for, no other academic degree or award was applied for by me based on this work. I Acknowledgements Acknowledgements For many years I had been dreaming about receiving a PhD, I would like to thank many people who helped me in achieving this dream in different ways since I undertook the work of this thesis. My deepest gratitude goes to my supervisor, Professor Hongji Yang, for his guidance, support and encouragement throughout my PhD career. He always provided me with many invaluable comments and suggestions for the improvement of the thesis. I am grateful for his leading role fostering my academic, professional and personal growth. Many thanks go to Professor Hussein Zedan and Doctor Wenyan Wu, for examining my PhD thesis and providing many helpful suggestions. My research career will benefit tremendously from the research methodologies to which Professor Zedan and Doctor Wu introduced me. I would like to thank colleagues in Software Technology Research Laboratory at De Montfort University, for their support and feedback, and for providing such a stimulating working atmosphere, Professor Hussein Zedan, Doctor Feng Chen, Doctor Amelia Platt, Doctor Antonio Cau, and many other colleagues.
    [Show full text]
  • OPENDCS 6 (Open Source Data Collection System) LRGS (9.0)
    OPENDCS 6 (Open Source Data Collection System) LRGS (9.0) (Local Readout Ground System) User’s & Administrator’s Guide Document Revision 5 January, 2016 Prepared under contract to the U.S. Government by: Cove Software, LLC 6030 Marshalee Drive, Ste 607 Elkridge, MD 21075-5935, USA (410) 715-1117 [email protected] 1 This document is based upon an open-source document delivered to U.S. Geological Survey as part of the open source LRGS development effort of many years. Cove Software has customized and enhanced the content to conform to the OPENDCS LRGS release. Table of Contents 1. INTRODUCTION ................................................................................................................... 5 2. GOES DATA COLLECTION SYSTEM OVERVIEW ...................................................... 6 2.1 THE NOAA/NESDIS DATA COLLECTION SYSTEM ............................................................ 6 2.2 THE ROLE OF THE LRGS ..................................................................................................... 8 2.3 DCP MESSAGE CONTENT .................................................................................................... 9 2.3.1 Failure Code ................................................................................................................ 9 2.3.2 Signal Strength ........................................................................................................... 10 2.3.3 Frequency Offset .......................................................................................................
    [Show full text]
  • 190-405-573R13.4 Alcatel-Lucent – Proprietary Use Pursuant to Applicable Agreements Issue 1 January 2012 Use Pursuant to Applicable Agreements
    Use pursuant to applicable agreements Title page Network Operating Software 8920 Network Trouble Patterning | Release 13.4 System Administration Guide 190-405-573R13.4 Alcatel-Lucent – Proprietary Use pursuant to applicable agreements Issue 1 January 2012 Use pursuant to applicable agreements Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright © 2012 Alcatel-Lucent. All rights reserved. Contains proprietary/trade secret information which is the property of Alcatel-Lucent and must not be made available to, or copied or used by anyone outside Alcatel-Lucent without its written authorization. Not to be used or disclosed except in accordance with applicable agreements. Limited warranty Alcatel-Lucent provides no warranty to this product. Licenses This product incorporates a number of open-source third-party software packages. See the "Open-Source Software Licenses" appendix at the end of this document for license information about these packages. Alcatel-Lucent – Proprietary Use pursuant to applicable agreements Contents About this document Purpose ....................................................................................................................................................................................... xxviixxvii Audience ...................................................................................................................................................................................
    [Show full text]
  • (MS Access) 95/97/2000/XP/2002/2003/2007/2010/2013/2016 V6.0
    index.html - HXTT Access JDBC Drivers for Microsoft Access (MS Access) 95/97/2000/XP/2002/2003/2007/2010/2013/2016 v6.0 HXTT's HXTT Access Packages Welcome to the HXTT Access pages You should read carefully License, Introduction, and Components first. If you have JDBC programming experience and SQL92 knowledge, you can start easily your project after you know com.hxtt.sql.access.AccessDriver (the suitable JDBC driver class name) and jdbc:access:///[DatabasePath] (the correct embedded JDBC url) from here. You will get up to date information relating to the HXTT Access, and look at current documentation from here. JDBC 4.2 packages are for JDK1.8.X. JDBC 4.1 packages are for JDK 1.7.X, and 1.8.X. JDBC 4.0 packages are for JDK 1.6.X, 1.7.X, and 1.8.X. JDBC 3.0 packages are for JDK 1.3.X, 1.4.X, 1.5.X, 1.6.X, 1.7.X, and 1.8.X. JDBC 2.0 packages are for JDK 1.2.X, and 1.3.X. JDBC 1.2 packages are for JDK1.1.X, and Personal Java. For questions and general support, you should submit your request at HXTT's technical support site. License Introduction Components Development Document Download JDBC4.2 packages, JDBC4.2 demo, JDBC4.1 packages, JDBC4.1 demo, JDBC4.0 packages, JDBC4.0 demo, JDBC3.0 packages, JDBC3.0 demo, JDBC2.0 packages, JDBC2.0 demo, JDBC1.2 packages, JDBC1.2 demo, Development Documentation, and so on Offline Order(Bank Transfer) Online Order FAQ Released Version Log Copyright © 2003-2018 Heng Xing Tian Tai Lab | All Rights Reserved.
    [Show full text]
  • Stored Procedures As an Implementation Tool Business Logic in Applications of Databases*
    57 Stored Procedures as an Implementation Tool Business Logic in Applications of Databases* Tatyana N. Filimonenkova1[0000-0002-7968-9028] 1 V.I. Vernadsky Crimean Federal University, Yalta, Russia [email protected] Abstract. The article discusses a database object such as a stored procedure and the advantages of using such an approach when developing software in a client- server architecture. The definition of stored procedures is given, the features of their creation and compilation are listed. The syntax of creating stored procedures in the client-server database management system MySQL is considered. The ex- amples of stored procedures developed for the database for accounting student performance, which demonstrate the feasibility of their use and advantages com- pared with the usual queries are given. The article provides an example of using the stored procedure on the client side of an application developed in the Embar- cadero RAD Studio integrated environment using BDE (Borland Database En- gine) technology as a tool for accessing the database. Keywords: information systems, client-server architecture, databases, CASE, ER-modeling, SQL-query, stored procedure, MySQL. 1 Introduction In applications that implement the client-server architecture, and now, this is the most common architecture for both web-based and desktop applications, data processing is distributed in such a way that the data presentation program is located on the user's machine (on the client), and the data management program and the data itself are placed on the server. The server software accepts requests from client software and returns to it the results of processing these requests. The popularity of client-server technology is inextricably linked with IBM's inven- tion of the query language to SQL relational databases – Structured Query Language, which is currently the universal standard for working with databases.
    [Show full text]
  • Open Source Projects
    Y L F M A E T Brought to you by Team FLY® Team-Fly® Page i Managing Open Source Projects A Wiley Tech Brief Jan Sandred Wiley Computer Publishing John Wiley & Sons, Inc. NEW YORK • CHICHESTER • WEINHEIM • BRISBANE • SINGAPORE • TORONTO Page ii Publisher: Robert Ipsen Editor: Cary Sullivan Assistant Editor: Christina Berry Managing Editor: Marnie Wielage New Media Editor: Brian Snapp Text Design & Composition: Pronto Design, Inc. Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright © 2001 by Jan Sandred. All rights reserved. Published by John Wiley & Sons, Inc. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered.
    [Show full text]
  • Web Applications P=PHP/Python/Perl M = Mysql/Mariadb/Mongodb a = Apache L = Linux
    Role Name Affiliation Principal Investigator Dr. Savita Gandhi Professor, Dept. of Computer Science, Gujarat University, Ahmedabad Content Writer Mr. Hardik Joshi Asst. Professor, Dept. of Computer Science, Gujarat University, Ahmedabad Content Reviewer Dr. Hiren Joshi Professor, Dept. of Computer Science, Gujarat University, Ahmedabad Item Description Subject Name Information Technology Paper Name Open Source Software Module No 21 Module Name LAMP Stack Pre-requisite Basics of Linux Objectives Get an overview of LAMP Stack, Understand the features of Apache, MySQL and PHP Keywords LAMP, WAMP, Linux, Apache, MySQL, PHP, Mariadb, Perl, Python LAMP STACK Overview and LAMP A "LAMP" stack refers to a group of open source software, originally the LAMP stack was popularized from acronym that represents the Linux OS, Apache web server, data is stored in MySQL database and the dynamic content is processed by PHP. The LAMP stack is usually installed together to enable a server to host dynamic websites and web apps. LAMP stack uses the software that is free and open source software. Today, LAMP stack does not restrict itself to four different software listed above but is a generic term where the combination of different software provides a platform to run web applications. Web Applications P=PHP/Python/Perl M = MySQL/MariaDb/MongoDb A = Apache L = Linux Figure 1: LAMP Stack Software 1 LAMP stacks servers as a platform to host websites and web applications over it. Usually, dynamic websites require databases and scripting at server side. LAMP stack provides both the database and the scripting support. With the help of LAMP model, we can deploy applications like Content Management Systems, Learning Management Systems, Wikis, Helpdesk systems, Open Journal Systems etc.
    [Show full text]
  • Mysql Is a Relational Database Management System (RDBMS)[1] That Runs As a Server Providing Multi-User Access to a Number of Databases
    MySQL is a relational database management system (RDBMS)[1] that runs as a server providing multi-user access to a number of databases. MySQL is officially pronounced /maųŤskju:Ťl/ ("My S-Q-L"),[2] but is often also pronounced /maųsi:kwĽl/ ("My Sequel"). It is named for original developer Michael Widenius' daughter My. The SQL phrase stands for Structured Query Language.[3] The MySQL development project has made its source code available under the terms of the GNU General Public License, as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by Oracle Corporation.[4] Members of the MySQL community have created several forks (variations) such as Drizzle, OurDelta, Percona Server, and MariaDB. All of these forks were in progress before the Oracle acquisition (Drizzle was announced 8 months before the Sun acquisition). Free-software projects that require a full-featured database management system often use MySQL. Uses MySQL is a popular choice of database for use in web applications, and is a central component of the widely-used LAMP web application software stack²LAMP is an acronym for "Linux, Apache, MySQL, PHP". Its popularity is closely tied to the popularity of PHP. MySQL is used in some of the most frequently visited web sites on the internet including Flickr,[7] Facebook,[8][9] Wikipedia,[10] Google²though not for searches,[11] Nokia.com[12] and YouTube.[13] [edit] Platforms and interfaces MySQL is written in C, and C++. Its SQL parser is written in yacc, and a home-brewed lexical analyzer named sql_lex.cc[14] MySQL works on many different system platforms, including AIX, BSDi, FreeBSD, HP-UX, i5/OS, Linux, Mac OS X, NetBSD, Novell NetWare, OpenBSD, OpenSolaris, eComStation, OS/2 Warp, QNX, IRIX, Solaris, Symbian, SunOS, SCO OpenServer, SCO UnixWare, Sanos, Tru64 and Microsoft Windows.
    [Show full text]
  • IBM Informix DB-Access User's Guide
    IBM Informix DB-Access User’s Guide IBM Informix Extended Parallel Server, Version 8.4 IBM Informix Dynamic Server, Version 9.4 March 2003 Part No. CT1SKNA Note: Before using this information and the product it supports, read the information in the appendix entitled “Notices.” This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this manual should not be interpreted as such. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1996, 2003. All rights reserved. US Government User Restricted Rights—Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. ii IBM Informix DB-Access User’s Guide Table of Contents Table of Contents Introduction In This Introduction ................. 3 About This Manual.................. 3 Types of Users .................. 3 Software Dependencies ............... 4 Assumptions About Your Locale............ 4 New Features .................... 5 Documentation Conventions .............. 5 Typographical Conventions ............. 6 Icon Conventions ................. 7 Command-Line Conventions ............. 8 Sample-Code Conventions .............. 10 Additional Documentation ............... 11 Related Reading ................... 13 Compliance with Industry Standards ........... 14 IBM Welcomes Your Comments ............. 14 Chapter 1 Getting Started with DB-Access In This Chapter ................... 1-3 What Is DB-Access? ................. 1-3 Using DB-Access .................. 1-4 Setting Up DB-Access ................. 1-6 Pre-DB-Access Installation .............. 1-6 Environment Variables ............... 1-7 Creating and Working with the Demonstration Databases ...
    [Show full text]
  • Solicitation 8300001112 Appendix D
    J.1. APPENDIX D - INFRASTRUCTURE TECHNICAL SPECIFICATIONS J.1.1. Summary J.1.1.1. This document describes the current infrastructure technical specifications applicable to the OKDHS Information Technology environment. It is intended to provide Contractor a fundamental knowledge base and understanding of the current information technology supporting the OKDHS business organization. J.1.2. Scope J.1.2.1. The technical specifications contained in this document shall be utilized by Contractor as a basis for the minimum requirements that must be met or exceeded when proposing any new technology solution. J.1.2.2. The current technical infrastructure has been architected using industry best practices and has demonstrated satisfactory operational performance criteria supporting a large production environment. J.1.2.3. All information contained in this document is current as and is subject to change based on the needs of OKDHS. J.1.3. Hardware J.1.3.1. Server (Wintel – x86) J.1.3.1.1. USB 2.0 Support J.1.3.1.2. Interface – EIDE (ATAPI) J.1.3.1.3. Processor- 2.66 GHz or greater J.1.3.1.4. Memory- 4GB or greater J.1.3.1.5. Cache Memory - 2MB Integrated Cache J.1.3.1.6. Optical Drive- 48X or greater J.1.3.1.7. Network Interface – 10/100/1000-T Ethernet J.1.3.1.8. Data Transfer Method – PCI Express x 4 J.1.3.1.9. Network Transfer Rate – 10 Mb/s to 2000 Mb/s J.1.3.1.10. Network Connector – RJ 45 J.1.3.2.
    [Show full text]