Cisco Billing and Measurements Server User's Guide, Release 3.30

Total Page:16

File Type:pdf, Size:1020Kb

Cisco Billing and Measurements Server User's Guide, Release 3.30 Cisco Billing and Measurements Server User Guide Release 3.30 March 10, 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-11618-18 CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) Cisco Billing and Measurements Server User Guide © 2011 Cisco Systems, Inc. All rights reserved. CONTENTS Preface xiii Who Should Use This Guide -xiii How This Guide Is Organized -xiii Understanding Document Conventions -xiv Related Documentation -xvi Obtaining Documentation -xvi World Wide Web -xvi Documentation CD-ROM -xvi Ordering Documentation -xvii Documentation Feedback -xvii Obtaining Technical Assistance -xvii Cisco.com -xvii Technical Assistance Center -xviii Cisco TAC Web Site -xviii Cisco TAC Escalation Center -xix Documentation Feedback -xix CHAPTER 1 Introduction to Cisco BAMS 1-1 Collecting Data 1-1 Data Collection 1-2 Cisco BAMS Terminology 1-2 Formatting Data 1-2 Storing Data 1-3 Trapping Errors 1-3 System Backup and Recovery 1-3 Installing the Sun Solaris 10 Operating System 1-4 BAMS 3.30 Modifications Overview 1-4 BAMS 3.30 Features and Formats 1-5 Solaris 10 Support 1-5 Continued Support for BAMS 3.20 Features and Formats 1-6 CDE Tag Length Changes 1-6 New CDE fields 1-6 New CDE Fields for Extended ASCII Output 1-7 Cisco Billing and Measurements Server User Guide OL-11618-18 iii Contents New CDE Fields for Binary 1110 Output 1-7 New Measurements 1-7 Support for BAMS Software Licensing 1-7 Support for New QoS Feed 1-8 Support for the Mode PGW Dynamic Update = True 1-8 SFTP File Transfer Support 1-8 Generic Error Handling 1-9 Background 1-9 Implementation 1-9 Alarm 1-9 Cisco BAMS Software License 1-10 Host ID Mechanism 1-10 BAMS License Validation 1-10 Periodic License Validation 1-10 Base License Management During Switchover 1-10 Exception Management 1-10 BAMS Software License Operations 1-11 License-Related Alarms 1-11 BAMS License File Types 1-11 Installing BAMS with the Licensing Mechanism 1-12 License Upgrade Procedure 1-13 Upgrading from a Temporary to a Base License 1-13 Migration 1-14 Creating Directory Structures 1-14 CHAPTER 2 Setup and Installation 2-1 Overview 2-1 Upgrading to BAMS Release 3.30 2-1 Configuring the Cisco MGC for Using BAMS 2-1 Uninstalling BAMS 2-3 Installing Cisco BAMS 2-4 Installing a Cisco BAMS Software Patch 2-6 Enabling SFTP on Cisco BAMS and the Cisco PGW 2200 2-7 Generate Public and Private Keys on the Cisco PGW 2200 2-7 Generate Public and Private Keys on the Cisco BAMS 2-8 Enabling Automatic SFTP Login 2-8 Configuring BAMS to Forward SNMP Traps 2-9 Configuring BAMS 2-10 Cisco Billing and Measurements Server User Guide iv OL-11618-18 Contents Configuring Node Parameters 2-17 Host Configuration Setup for Downstream Polling 2-17 Setting Up Disk Monitoring Thresholds 2-18 Calculating Disk Space Usage 2-18 Defining Conditions for MSC Alarms 2-19 Setting a File-Age Condition 2-19 Setting a File-Type Condition 2-19 Setting Disk Usage Thresholds 2-20 Setting the Initial PGW CDR Sequence Number 2-20 Setting the PGW Dynamic Update Mode 2-20 Processing Pre-9.4.1 Data 2-21 Processing 9.4.1 (and Newer) Data 2-21 Suppressed Measurements 2-21 CHAPTER 3 Provisioning BAMS 3-1 Overview 3-1 Provisioning Commands 3-1 System-level Provisioning 3-2 Node-level Provisioning 3-2 QoS Output Provisioning 3-3 Billing Output Provisioning 3-3 BAF Output 3-3 1110 Binary Output 3-3 NICS Output 3-4 P01 Output 3-4 Threshold Crossing Alarms (TCA) Provisioning 3-4 Deploying Node-level Provisioning 3-4 Provisioning Commands and Examples 3-5 Starting a Provisioning Session 3-6 Provisioning Multiple Records with a Single Command 3-6 Deploying Changes 3-7 Making Changes Using Batch Files 3-7 System-Level Example 3-8 One-Node Example 3-9 Multiple-Node Example 3-9 Executing the Batch File 3-10 CHAPTER 4 Using MML Commands 4-1 Introduction 4-1 Cisco Billing and Measurements Server User Guide OL-11618-18 v Contents Command Notation 4-1 Command Syntax 4-1 Starting and Stopping BAMS 4-1 Starting the System 4-1 Stopping the System or OOS 4-2 Starting an MML Session 4-2 Help—Help Command 4-2 command name:?:—Help on Tag IDs 4-5 command name:tagID:?—Help on Field Names 4-6 MML Session Logs 4-6 MML Commands 4-7 chgno—Change Number 4-7 clr-alm—Clear Alarm 4-7 dialog—Dialog 4-8 get-nodenames—Get Node Names 4-8 h—History 4-9 prov-add—Provision Add 4-9 prov-cpy—Provision Copy 4-10 prov-diff—Provision Compare 4-11 prov-dlt—Provision Delete 4-13 prov-dply—Provision Deploy 4-13 prov-ed—Provision Edit 4-14 prov-exp—Provision Export 4-15 prov-rtrv—Provision Retrieve 4-16 prov-sta—Provision Start 4-16 prov-stp—Provision Stop 4-19 prov-sync—Provision Synchronize 4-19 quit—Quit 4-19 r—Repeat 4-20 rtrv-alms—Retrieve Alarms 4-20 rtrv-circuit—Retrieve Circuits 4-21 rtrv-configs—Retrieve Configuration 4-21 rtrv-file—Retrieve File 4-22 rtrv-ne—Retrieve Network 4-22 rtrv-session—Retrieve Session 4-23 rtrv-softw—Retrieve Software 4-24 rtrv-syslog—Retrieve Syslog 4-26 set-alm—Set Alarm 4-26 set-node—Set Node 4-27 set-nodename—Set Node Name 4-27 Cisco Billing and Measurements Server User Guide vi OL-11618-18 Contents sta-softw—Start Software 4-28 stp-softw—Stop Software 4-28 sw-ovr—Switch Over 4-29 CHAPTER 5 Using BAMS Tag IDs 5-1 Introduction 5-1 Command Notation 5-1 Command Syntax 5-1 Tag IDs and Field Names 5-1 Updating the Alarm Parameters Table 5-2 ALM-PARMS Tag ID 5-2 Updating the BIN1110 Table 5-4 BIN1110 Tag ID 5-4 Updating the Country Table 5-5 COUNTRY Tag ID 5-5 Updating the Map Type Table 5-5 MAPTYPE Tag ID 5-5 Updating the Mass Storage Control Parameters Table 5-6 MSC-PARMS Tag ID 5-7 Updating the Mass Storage Control Thresholds Table 5-8 MSC-THRES Tag ID 5-9 Updating the Node Parameters Table 5-11 NODEPARMS Tag ID 5-11 Updating the NPANXX Table 5-16 NPANXX Tag ID 5-16 Updating the P01 Filter Table 5-17 PO1FILTER Tag ID 5-17 Updating the Poll Table 5-18 POLL Tag ID 5-18 Updating the Rating Exception Table 5-19 RATE-EXC Tag ID 5-20 Updating the Rating Type Table 5-20 RATING-TYPE Tag ID 5-20 Updating the Nailed Connection Table 5-21 SIGPATH Tag ID 5-21 Updating the Skip CDB Table 5-22 SKIPCDB Tag ID 5-22 Updating the Skip CDE Table 5-22 SKIPCDE Tag ID 5-23 Cisco Billing and Measurements Server User Guide OL-11618-18 vii Contents Updating the Switch Information Table 5-23 SWITCHINFO Tag ID 5-23 Updating the Threshold Crossing Alarms Table 5-24 TCA-TBL Tag ID 5-25 Updating the Tollfree Table 5-30 TOLLFREE Tag ID 5-30 Updating the Trunk Group Table 5-31 PGW Dynamic Update Mode = True 5-31 TRUNKGRP—Trunk Group Table 5-31 Updating the Trunk Group Prefix Table 5-32 TKGPREFIX—Trunk Group Prefix Table 5-33 Updating the Zone Information Table 5-33 ZONE-INFO Tag ID 5-34 CHAPTER 6 Configuring BAMS for BAF Output 6-1 Overview 6-1 Generating BAF Records 6-2 Interworking of BAMS Configuration Tables 6-2 Prerequisites for BAF Records 6-2 Identifying Call Types 6-3 Default BAF Structure Codes and Call Types 6-4 Example of BAF Structure Codes and Call Types Created from BAF Provisioning 6-4 Exception and Special Processing 6-5 Overriding Call Types 6-5 Processing 7-Digit Numbers 6-5 Processing Toll-Free Calls 6-5 Processing International Calls 6-5 Processing LNP Calls 6-6 Processing Transit/Tandem Calls 6-6 BAF Output Provisioning Example 6-6 Call Area Provisioning Example 6-7 Designing a Billing Plan 6-7 Assumptions Used in This Example 6-7 Zone Membership 6-10 Free Calling Between Zones 6-10 Banded Message Rates 6-11 Configuring Trunk Groups for InterLATA Calls 6-11 Configuring Adjacent Area Codes 6-11 Configuring IntraLATA Calls 6-11 Cisco Billing and Measurements Server User Guide viii OL-11618-18 Contents Configuring Toll-Free Calls 6-12 Configuring a Metropolitan Calling Plan 6-12 Configuring for a Rating Exception 6-12 BAMS Provisioning Worksheets 6-13 BAF Configuration Parameters 6-13 Updating BAF Structure Codes 6-13 Adding a New Zone ID 6-14 Adding a New NPANXX (Zone Membership) 6-14 CHAPTER 7 Configuring BAMS for ASCII Output and Measurements 7-1 Overview 7-1 ASCII Output 7-1 Correlation of Billing Information 7-3 Files and Records 7-4 Extendable ASCII Output 7-4 Extendable ASCII Output Format 7-4 Redirecting Number and Display Name Enhancement 7-7 Operational Measurements 7-7 Defining Bucket Size 7-7 Setting Up the TCA Table 7-8 CHAPTER 8 Configuring BAMS for P01 Output 8-1 Overview 8-1 P01
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • LATEX for Beginners
    LATEX for Beginners Workbook Edition 5, March 2014 Document Reference: 3722-2014 Preface This is an absolute beginners guide to writing documents in LATEX using TeXworks. It assumes no prior knowledge of LATEX, or any other computing language. This workbook is designed to be used at the `LATEX for Beginners' student iSkills seminar, and also for self-paced study. Its aim is to introduce an absolute beginner to LATEX and teach the basic commands, so that they can create a simple document and find out whether LATEX will be useful to them. If you require this document in an alternative format, such as large print, please email [email protected]. Copyright c IS 2014 Permission is granted to any individual or institution to use, copy or redis- tribute this document whole or in part, so long as it is not sold for profit and provided that the above copyright notice and this permission notice appear in all copies. Where any part of this document is included in another document, due ac- knowledgement is required. i ii Contents 1 Introduction 1 1.1 What is LATEX?..........................1 1.2 Before You Start . .2 2 Document Structure 3 2.1 Essentials . .3 2.2 Troubleshooting . .5 2.3 Creating a Title . .5 2.4 Sections . .6 2.5 Labelling . .7 2.6 Table of Contents . .8 3 Typesetting Text 11 3.1 Font Effects . 11 3.2 Coloured Text . 11 3.3 Font Sizes . 12 3.4 Lists . 13 3.5 Comments & Spacing . 14 3.6 Special Characters . 15 4 Tables 17 4.1 Practical .
    [Show full text]
  • Factor — Factor Analysis
    Title stata.com factor — Factor analysis Description Quick start Menu Syntax Options for factor and factormat Options unique to factormat Remarks and examples Stored results Methods and formulas References Also see Description factor and factormat perform a factor analysis of a correlation matrix. The commands produce principal factor, iterated principal factor, principal-component factor, and maximum-likelihood factor analyses. factor and factormat display the eigenvalues of the correlation matrix, the factor loadings, and the uniqueness of the variables. factor expects data in the form of variables, allows weights, and can be run for subgroups. factormat is for use with a correlation or covariance matrix. Quick start Principal-factor analysis using variables v1 to v5 factor v1 v2 v3 v4 v5 As above, but retain at most 3 factors factor v1-v5, factors(3) Principal-component factor analysis using variables v1 to v5 factor v1-v5, pcf Maximum-likelihood factor analysis factor v1-v5, ml As above, but perform 50 maximizations with different starting values factor v1-v5, ml protect(50) As above, but set the seed for reproducibility factor v1-v5, ml protect(50) seed(349285) Principal-factor analysis based on a correlation matrix cmat with a sample size of 800 factormat cmat, n(800) As above, retain only factors with eigenvalues greater than or equal to 1 factormat cmat, n(800) mineigen(1) Menu factor Statistics > Multivariate analysis > Factor and principal component analysis > Factor analysis factormat Statistics > Multivariate analysis > Factor and principal component analysis > Factor analysis of a correlation matrix 1 2 factor — Factor analysis Syntax Factor analysis of data factor varlist if in weight , method options Factor analysis of a correlation matrix factormat matname, n(#) method options factormat options matname is a square Stata matrix or a vector containing the rowwise upper or lower triangle of the correlation or covariance matrix.
    [Show full text]
  • Text Processing Tools
    Tools for processing text David Morgan Tools of interest here sort paste uniq join xxd comm tr fmt sed fold head file tail dd cut strings 1 sort sorts lines by default can delimit fields in lines ( -t ) can sort by field(s) as key(s) (-k ) can sort fields of numerals numerically ( -n ) Sort by fields as keys default sort sort on shell (7 th :-delimited) field UID as secondary (tie-breaker) field 2 Do it numerically versus How sort defines text ’s “fields ” by default ( a space character, ascii 32h = ٠ ) ٠bar an 8-character string ٠foo “By default, fields are separated by the empty string between a non-blank character and a blank character.” ٠bar separator is the empty string between non-blank “o” and the space ٠foo 1 2 ٠bar and the string has these 2 fields, by default ٠foo 3 How sort defines text ’s “fields ” by –t specification (not default) ( a space character, ascii 32h = ٠ ) ٠bar an 8-character string ٠foo “ `-t SEPARATOR' Use character SEPARATOR as the field separator... The field separator is not considered to be part of either the field preceding or the field following ” separators are the blanks themselves, and fields are ' "٠ " ٠bar with `sort -t ٠foo whatever they separate 12 3 ٠bar and the string has these 3 fields ٠foo data sort fields delimited by vertical bars field versus sort field ("1941:japan") ("1941") 4 sort efficiency bubble sort of n items, processing grows as n 2 shell sort as n 3/2 heapsort/mergesort/quicksort as n log n technique matters sort command highly evolved and optimized – better than you could do it yourself Big -O: " bogdown propensity" how much growth requires how much time 5 sort stability stable if input order of key-equal records preserved in output unstable if not sort is not stable GNU sort has –stable option sort stability 2 outputs, from same input (all keys identical) not stable stable 6 uniq operates on sorted input omits repeated lines counts them uniq 7 xxd make hexdump of file or input your friend testing intermediate pipeline data cf.
    [Show full text]
  • QLOAD Queue Load / Unload Utility for IBM MQ
    Queue Load / Unload Utility for IBM MQ User Guide Version 9.1.1 27th August 2020 Paul Clarke MQGem Software Limited [email protected] Queue Load / Unload Utility for IBM MQ Take Note! Before using this User's Guide and the product it supports, be sure to read the general information under "Notices” Twenty-fourth Edition, August 2020 This edition applies to Version 9.1.1 of Queue Load / Unload Utility for IBM MQ and to all subsequent releases and modifications until otherwise indicated in new editions. (c) Copyright MQGem Software Limited 2015, 2020. All rights reserved. ii Queue Load / Unload Utility for IBM MQ Notices The following paragraph does not apply in any country where such provisions are inconsistent with local law. MQGEM SOFTWARE LIMITED PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore this statement may not apply to you. The information contained in this document has not be submitted to any formal test and is distributed AS IS. The use of the information or the implementation of any of these techniques is a customer responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. While each item has been reviewed by MQGem Software for accuracy in a specific situation, there is no guarantee that the same or similar results will be obtained elsewhere.
    [Show full text]
  • (LS-Factor) for Modeling Soil Erosion by Water
    Geosciences 2015, 5, 117-126; doi:10.3390/geosciences5020117 OPEN ACCESS geosciences ISSN 2076-3263 www.mdpi.com/journal/geosciences Short Communication A New European Slope Length and Steepness Factor (LS-Factor) for Modeling Soil Erosion by Water Panos Panagos 1,*, Pasquale Borrelli 1,† and Katrin Meusburger 2,† 1 European Commission, Joint Research Centre, Institute for Environment and Sustainability, Via Enrico Fermi 2749, I-21027 Ispra (VA), Italy; E-Mail: [email protected] 2 Environmental Geosciences, University of Basel, Bernoullistrasse 30, 4056 Basel, Switzerland; E-Mail: [email protected] † These authors contributed equally to this work. * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +39-0332-785574; Fax: +39-0332-786394. Academic Editor: Jesus Martinez-Frias Received: 24 December 2014 / Accepted: 23 March 2015 / Published: 3 April 2015 Abstract: The Universal Soil Loss Equation (USLE) model is the most frequently used model for soil erosion risk estimation. Among the six input layers, the combined slope length and slope angle (LS-factor) has the greatest influence on soil loss at the European scale. The S-factor measures the effect of slope steepness, and the L-factor defines the impact of slope length. The combined LS-factor describes the effect of topography on soil erosion. The European Soil Data Centre (ESDAC) developed a new pan-European high-resolution soil erosion assessment to achieve a better understanding of the spatial and temporal patterns of soil erosion in Europe. The LS-calculation was performed using the original equation proposed by Desmet and Govers (1996) and implemented using the System for Automated Geoscientific Analyses (SAGA), which incorporates a multiple flow algorithm and contributes to a precise estimation of flow accumulation.
    [Show full text]
  • 5 Command Line Functions by Barbara C
    ADAPS: Chapter 5. Command Line Functions 5 Command Line Functions by Barbara C. Hoopes and James F. Cornwall This chapter describes ADAPS command line functions. These are functions that are executed from the UNIX command line instead of from ADAPS menus, and that may be run manually or by automated means such as “cron” jobs. Most of these functions are NOT accessible from the ADAPS menus. These command line functions are described in detail below. 5.1 Hydra Although Hydra is available from ADAPS at the PR sub-menu, Edit Time Series Data using Hydra (TS_EDIT), it can also be started from the command line. However, to start Hydra outside of ADAPS, a DV or UV RDB file needs to be available to edit. The command is “hydra rdb_file_name.” For a complete description of using Hydra, refer to Section 4.5.2 Edit Time-Series Data using Hydra (TS_EDIT). 5.2 nwrt2rdb This command is used to output rating information in RDB format. It writes RDB files with a table containing the rating equation parameters or the rating point pairs, with all other information contained in the RDB comments. The following arguments can be used with this command: nwrt2rdb -ooutfile -zdbnum -aagency -nstation -dddid -trating_type -irating_id -e (indicates to output ratings in expanded form; it is ignored for equation ratings.) -l loctzcd (time zone code or local time code "LOC") -m (indicates multiple output files.) -r (rounding suppression) Rules • If -o is omitted, nwrt2rdb writes to stdout; AND arguments -n, -d, -t, and -i must be present. • If -o is present, no other arguments are required, and the program will use ADAPS routines to prompt for them.
    [Show full text]
  • Computing in the ACI Cluster
    Computing in the ACI Cluster Ben Seiyon Lee Pennsylvania State University Department of Statistics October 5, 2017 Graduate Workshop 10/5/2017 1 Outline 1 High Performance Computing 2 Accessing ACI 3 Basic Unix Commands 4 Navigation and File Creation 5 SCP clients 6 PBS scripts 7 Running PBS scripts 8 Parallelization 9 Best Practices Graduate Workshop 10/5/2017 2 High Performance Computing High Performance Computing Large number of processors Large memory requirements Large storage requirements Long runtimes ACI-B: Batch Log in to a head node and submit jobs to compute nodes Groups can purchase allocations or use open queue Intel Xeon E5-2680 v2 2.8 GHz, 256 Gb RAM, 20 cores per node Statistics Department has 5 nodes (20 processors per node) Graduate Workshop 10/5/2017 3 Accessing ACI Sign up for an account: ICS-ACI Account Sign-up 2-Factor Authentication Mac Open Terminal ssh into ACI: ssh <username>@aci-b.aci.ics.psu.edu Complete 2 Factor Authentication Windows Open Putty Enter aci-b.aci.ics.psu.edu in the Host Name field Select SSH then X11 and Enable X11 forwarding Select Connection then Data and enter your username in the Auto-login username field Graduate Workshop 10/5/2017 4 Unix Commands Change directories: cd Home Directory: cd Here: cd . Up one directory: cd .. All files in the directory: ls * Wildcards: Test* . *.png Send output to another command: | Write command output to a file: ls > log.txt Create Directory: mkdir cd ~/ work mkdir Workshop mkdir WorkshopB l s Remove Directory: rmdir rmdir WorkshopB l s mkdir WorkshopB Graduate Workshop 10/5/2017 5 Unix Commands Move Files: mv mv file1 .txt ./WorkshopB/ mv ../WorkshopB/file1 .txt ./WorkshopB/file2 .txt Copy Files: cp cp ../WorkshopB/file1 .txt ../WorkshopB/file2 .txt Remove Files: rm rm file1.txt rm −r WorkshopB Access Manual for commands: man man rm q List files: ls l s ls ~/work/Workshop Graduate Workshop 10/5/2017 6 Unix Commands Print the current directoy: pwd pwd Past commands: history h i s t o r y Manage permissions for a file: chmod chmod u=rwx,g=rwx,o=rwx file1 .
    [Show full text]
  • From Donor to Patient: Collection, Preparation and Cryopreservation of Fecal Samples for Fecal Microbiota Transplantation
    diseases Review From Donor to Patient: Collection, Preparation and Cryopreservation of Fecal Samples for Fecal Microbiota Transplantation Carole Nicco 1 , Armelle Paule 2, Peter Konturek 3 and Marvin Edeas 1,* 1 Cochin Institute, INSERM U1016, University Paris Descartes, Development, Reproduction and Cancer, Cochin Hospital, 75014 Paris, France; [email protected] 2 International Society of Microbiota, 75002 Paris, France; [email protected] 3 Teaching Hospital of the University of Jena, Thuringia-Clinic Saalfeld, 07318 Saalfeld, Germany; [email protected] * Correspondence: [email protected] Received: 6 March 2020; Accepted: 10 April 2020; Published: 15 April 2020 Abstract: Fecal Microbiota Transplantation (FMT) is suggested as an efficacious therapeutic strategy for restoring intestinal microbial balance, and thus for treating disease associated with alteration of gut microbiota. FMT consists of the administration of fresh or frozen fecal microorganisms from a healthy donor into the intestinal tract of diseased patients. At this time, in according to healthcare authorities, FMT is mainly used to treat recurrent Clostridium difficile. Despite the existence of a few existing stool banks worldwide and many studies of the FMT, there is no standard method for producing material for FMT, and there are a multitude of factors that can vary between the institutions. The main constraints for the therapeutic uses of FMT are safety concerns and acceptability. Technical and logistical issues arise when establishing such a non-standardized treatment into clinical practice with safety and proper governance. In this context, our manuscript describes a process of donor safety screening for FMT compiling clinical and biological examinations, questionnaires and interviews of donors.
    [Show full text]
  • A Type System for Format Strings E
    ifact t * r * Comple t te A A n * te W E is s * e C n l l o D C A o * * c T u e m S s E u e S e n I R t v A Type System for Format Strings e o d t y * s E a * a l d u e a t Konstantin Weitz Gene Kim Siwakorn Srisakaokul Michael D. Ernst University of Washington, USA {weitzkon,genelkim,ping128,mernst}@cs.uw.edu ABSTRACT // Untested code (Hadoop) Most programming languages support format strings, but their use Resource r = ... format("Insufficient memory %d", r); is error-prone. Using the wrong format string syntax, or passing the wrong number or type of arguments, leads to unintelligible text // Unchecked input (FindBugs) output, program crashes, or security vulnerabilities. String urlRewriteFormat = read(); This paper presents a type system that guarantees that calls to format(urlRewriteFormat, url); format string APIs will never fail. In Java, this means that the API will not throw exceptions. In C, this means that the API will not // User unaware log is a format routine (Daikon) log("Exception " + e); return negative values, corrupt memory, etc. We instantiated this type system for Java’s Formatter API, and // Invalid syntax for Formatter API (ping-gcal) evaluated it on 6 large and well-maintained open-source projects. format("Unable to reach {0}", server); Format string bugs are common in practice (our type system found Listing 1: Real-world code examples of common programmer 104 bugs), and the annotation burden on the user of our type system mistakes that lead to format routine call failures.
    [Show full text]
  • Advanced Topics in Sorting
    Advanced Topics in Sorting complexity system sorts duplicate keys comparators 1 complexity system sorts duplicate keys comparators 2 Complexity of sorting Computational complexity. Framework to study efficiency of algorithms for solving a particular problem X. Machine model. Focus on fundamental operations. Upper bound. Cost guarantee provided by some algorithm for X. Lower bound. Proven limit on cost guarantee of any algorithm for X. Optimal algorithm. Algorithm with best cost guarantee for X. lower bound ~ upper bound Example: sorting. • Machine model = # comparisons access information only through compares • Upper bound = N lg N from mergesort. • Lower bound ? 3 Decision Tree a < b yes no code between comparisons (e.g., sequence of exchanges) b < c a < c yes no yes no a b c b a c a < c b < c yes no yes no a c b c a b b c a c b a 4 Comparison-based lower bound for sorting Theorem. Any comparison based sorting algorithm must use more than N lg N - 1.44 N comparisons in the worst-case. Pf. Assume input consists of N distinct values a through a . • 1 N • Worst case dictated by tree height h. N ! different orderings. • • (At least) one leaf corresponds to each ordering. Binary tree with N ! leaves cannot have height less than lg (N!) • h lg N! lg (N / e) N Stirling's formula = N lg N - N lg e N lg N - 1.44 N 5 Complexity of sorting Upper bound. Cost guarantee provided by some algorithm for X. Lower bound. Proven limit on cost guarantee of any algorithm for X.
    [Show full text]
  • Some UNIX Commands At
    CTEC1863/2007F Operating Systems – UNIX Commands Some UNIX Commands at Syntax: at time [day] [file] Description: Provides ability to perform UNIX commands at some time in the future. At time time on day day, the commands in filefile will be executed. Comment: Often used to do time-consuming work during off-peak hours, or to remind yourself to do something during the day. Other at-related commands: atq - Dump the contents of the at event queue. atrm - Remove at jobs from the queue. Examples: # at 0300 calendar | mail john ^D # # cat > DOTHIS nroff -ms doc1 >> doc.fmt nroff -ms file2 >> doc.fmt spell doc.fmt > SPELLerrs ^D # at 0000 DOTHIS cal Syntax: cal [month] year Description: Prints a calendar for the specified year or month. The year starts from year 0 [the calendar switched to Julian in 1752], so you typically must include the century Comment: Typical syntax: cal 11 1997 cal 1998 /Users/mboldin/2007F/ctec1863/unixnotes/UNIX-07_Commands.odt Page 1 of 5 CTEC1863/2007F Operating Systems – UNIX Commands calendar Syntax: calendar [-] Description: You must set-up a file, typically in your home directory, called calendar. This is a database of events. Comment: Each event must have a date mentioned in it: Sept 10, 12/5, Aug 21 1998, ... Each event scheduled for the day or the next day will be listed on the screen. lpr Syntax: lpr [OPTIONS] [FILE] [FILE] ... Description: The files are queued to be output to the printer. Comment: On some UNIX systems, this command is called lp, with slightly different options. Both lpr and lp first make a copy of the file(s) to be printed in the spool directory.
    [Show full text]