Assignment #0 NES 411, Fall 2014, Dr. Ahmad T. Al-Hammouri

Total Page:16

File Type:pdf, Size:1020Kb

Assignment #0 NES 411, Fall 2014, Dr. Ahmad T. Al-Hammouri Assignment #0 NES 411, Fall 2014, Dr. Ahmad T. Al-Hammouri Due date: Not Applicable. Objectives: • To set up the environment that we will be using throughout the course for testing networked programs. Introduction: In this assignment, we will guide you through the steps to prepare the appropriate setup for testing the several programs that will reinforce the concepts we will be studying in this course. The ideal environment would comprise two or more physically separate machines that are con- nected via any topology of an IP-based network. However, due to the limitations imposed on us by NAT middle-boxes, and to provide you with a versatile environment accessible virtually at any given time, we will utilize operating systems’ virtualization. With this, we will set up a min- imal topology comprising two Operating Systems (OSs) running concurrently on two separate machines (one is physical; the other is virtual) connected via a virtual network. Requirements: You are required to have a machine with at least 2GB of RAM, and at least 25GB of free space on hard drive. Environment Setup: You are one of the following two categories: 1. Your machine runs only one OS, which is a variant of the Windows OS. 2. You are already having a Linux OS installed as a dual boot in addition to the primary Windows OS. Note: If you are of category #1, you need to deploy both Cygwin and the Linux VM, but if you are of category #2, you should skip the following section and proceed to the next one titled ‘Installing Linux As A Virtual Machine’. Installing Cygwin on Windows: Cygwin (https://www.cygwin.com/) provides a POSIX API functionality on Windows. The use of Cygwin allows us to use UNIX-based socket API and other UNIX utilities on Windows. For your convenience, the Cygwin installation files are cached on the following local machine http://10.242.130.111/Public/NES411. 1. Depending on your machine (being 64- or 32-bit), download and uncompressed the appropriate Cygwin archive file. 2. Start the installation program, i.e., the setup executable file. 3. Follow the on-screen wizard steps to complete the installation noting the following: • On the page ‘Choose A Download Source’, select the third option ‘Install from Local Directory’. NES411,Fall2014 Assignment#0 Page2of3 • On the page ‘Select Root Install Directory’, choose whatever directory you want Cygwin to be installed into. • On the page ‘Select Local Package Directory’, choose the folder where you decom- pressed the archive file in. • On the page ‘Select Packages’, change the behavior to Install instead of Default for the following 13 packages: Base, Devel, Editors, GNOME, Libs, Net, Security, Shells, System, Tcl, Utils, Web, and X11. Keep Others to Default. • The installation will take quite a while so plan your time and resources, e.g., laptop’s battery power reserve, accordingly. • After installation completes, run the Cygwin shell by double clicking on ‘Cygwin Terminal’. • On the shell, issue the command startx to bring up the primitive X window system of Cygwin. Installing Linux As A Virtual Machine: We next set up the CentOS Linux’s virtual machine per the following steps. 1. Download the pre-built CentOS image from http://10.242.130.111/Public/NES411/ CentOS-7.0.vdi. 2. Download and Install Oracle’s VM VirtualBox from https://www.virtualbox.org/. 3. On VirtualBox’s main window menu bar, choose ‘File’ −→ ‘Preferences’ −→ ‘Network’ −→ ‘Host-only Networks’. If there are no adapters present, click on ‘Add host-only network’ −→ ‘OK’; otherwise, do nothing. 4. On VirtualBox’s main window, click on ‘New’, then type whatever name you want to give to your Linux machine, e.g., CentOS-7. For ‘Type’, choose ‘Linux’ and for ‘Version’, choose ‘Red Hat (64 bit)’. Then, click ‘Next’. 5. For ‘Memory size’, enter 1024MB. 6. For ‘Hard drive’, choose ‘Use an existing virtual hard drive file’, browse to where you saved the image in step 1, select it, and click ‘Create’. 7. On VirtualBox’s main window menu bar, select/highlight the newly created virtual machine, and click on ‘Settings’ −→ ‘Network’: • For ‘Adapter 1’, make sure that ‘Enable Network Adapter’ is selected, and that ‘Attached to:’ is set to ‘NAT’. • Select ‘Adapter 2’, select ‘Enable Network Adapter’, and for ‘Attached to:’, choose ‘Host-only Adapter’. For ‘Name’, choose the adapter you created in step 3 (usually it will be the only one). Click ‘OK’. 8. On VirtualBox’s main window menu bar, select/highlight the newly created virtual machine, and click ‘Start’. 9. Log in onto the virtual machine using user name ‘nesstudent’ (Account Name is ‘NES Student’), and password ‘nesstudent’. Moreover, for your future uses, the root password is ‘root’. 10. In the Terminal, run the command ifconfig. There must be three Ethernet interfaces: lo, enp0s3, and enp0s8 (the last number might be different from 3 or 8, though). 11. Make sure that the three interfaces are having IPv4 addresses (inet) and network masks. NES411,Fall2014 Assignment#0 Page3of3 • If one or more interface(s) have no IP addresses, go to ‘Applications’ −→ ‘System Tools’ −→ ‘Settings’ −→ ‘Network’. Click ‘ON’ for both interfaces enp0s3 and enp0s8. • Bring the interfaces up with the command sudo ifconfig InterfaceName up where InterfaceName should be substituted with enp0s3 or enp0s8. 12. Run the command ifconfig. Now, one interface must have an IP address in the network 10.0.2.0/24 (usually it will be 10.0.2.15), and the other must have the IP address in the network 192.168.56.0/24 (usually it will be 192.168.56.101). Verifying The Connectivity Between The Two Machines: In this assignment and in the sequel ones, the OS that is running on the bare metal (Windows on Linux) is referred to by the Host OS, and the Linux OS that is running as a virtual machine is referred to by the Guest OS. 1. From the Host OS, make sure you can ping successfully the Guest OS on IP address 192.168.56.101. 2. From the Guest OS, make sure you can ping successfully the Host OS on IP address 192.168.56.1. 3. From the Guest OS, make sure you can access the Internet by directing the Web browser to, say, http://www.google.com. 4. Download the source code file daytimetcpcli.c from elearning, change the IP ad- dress in line 26 to 192.168.56.101, compile it on the Host OS, and run it. Since the Guest OS is already configured to run the daytime service, the client running on the Host OS must be able to correctly receive the answer back. Deliverables: There are NO deliverables for this assignment, but you have to make sure that you have set up the complete environment correctly..
Recommended publications
  • By Sebastiano Vigna and Todd M. Lewis Copyright C 1993-1998 Sebastiano Vigna Copyright C 1999-2021 Todd M
    ne A nice editor Version 3.3.1 by Sebastiano Vigna and Todd M. Lewis Copyright c 1993-1998 Sebastiano Vigna Copyright c 1999-2021 Todd M. Lewis and Sebastiano Vigna Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Chapter 1: Introduction 1 1 Introduction ne is a full screen text editor for UN*X (or, more precisely, for POSIX: see Chapter 7 [Motivations and Design], page 65). I came to the decision to write such an editor after getting completely sick of vi, both from a feature and user interface point of view. I needed an editor that I could use through a telnet connection or a phone line and that wouldn’t fire off a full-blown LITHP1 operating system just to do some editing. A concise overview of the main features follows: • three user interfaces: control keystrokes, command line, and menus; keystrokes and menus are completely configurable; • syntax highlighting; • full support for UTF-8 files, including multiple-column characters; • 64-bit
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Practical C Programming, 3Rd Edition
    Practical C Programming, 3rd Edition By Steve Oualline 3rd Edition August 1997 ISBN: 1-56592-306-5 This new edition of "Practical C Programming" teaches users not only the mechanics or programming, but also how to create programs that are easy to read, maintain, and debug. It features more extensive examples and an introduction to graphical development environments. Programs conform to ANSI C. 0 TEAM FLY PRESENTS Table of Contents Preface How This Book is Organized Chapter by Chapter Notes on the Third Edition Font Conventions Obtaining Source Code Comments and Questions Acknowledgments Acknowledgments to the Third Edition I. Basics 1. What Is C? How Programming Works Brief History of C How C Works How to Learn C 2. Basics of Program Writing Programs from Conception to Execution Creating a Real Program Creating a Program Using a Command-Line Compiler Creating a Program Using an Integrated Development Environment Getting Help on UNIX Getting Help in an Integrated Development Environment IDE Cookbooks Programming Exercises 3. Style Common Coding Practices Coding Religion Indentation and Code Format Clarity Simplicity Summary 4. Basic Declarations and Expressions Elements of a Program Basic Program Structure Simple Expressions Variables and Storage 1 TEAM FLY PRESENTS Variable Declarations Integers Assignment Statements printf Function Floating Point Floating Point Versus Integer Divide Characters Answers Programming Exercises 5. Arrays, Qualifiers, and Reading Numbers Arrays Strings Reading Strings Multidimensional Arrays Reading Numbers Initializing Variables Types of Integers Types of Floats Constant Declarations Hexadecimal and Octal Constants Operators for Performing Shortcuts Side Effects ++x or x++ More Side-Effect Problems Answers Programming Exercises 6.
    [Show full text]
  • Standard TECO (Text Editor and Corrector)
    Standard TECO TextEditor and Corrector for the VAX, PDP-11, PDP-10, and PDP-8 May 1990 This manual was updated for the online version only in May 1990. User’s Guide and Language Reference Manual TECO-32 Version 40 TECO-11 Version 40 TECO-10 Version 3 TECO-8 Version 7 This manual describes the TECO Text Editor and COrrector. It includes a description for the novice user and an in-depth discussion of all available commands for more advanced users. General permission to copy or modify, but not for profit, is hereby granted, provided that the copyright notice is included and reference made to the fact that reproduction privileges were granted by the TECO SIG. © Digital Equipment Corporation 1979, 1985, 1990 TECO SIG. All Rights Reserved. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xvii Introduction ........................................................ xix Preface to the May 1985 edition ...................................... xxiii Preface to the May 1990 edition ...................................... xxv 1 Basics of TECO 1.1 Using TECO ................................................ 1–1 1.2 Data Structure Fundamentals . ................................ 1–2 1.3 File Selection Commands ...................................... 1–3 1.3.1 Simplified File Selection .................................... 1–3 1.3.2 Input File Specification (ER command) . ....................... 1–4 1.3.3 Output File Specification (EW command) ...................... 1–4 1.3.4 Closing Files (EX command) ................................ 1–5 1.4 Input and Output Commands . ................................ 1–5 1.5 Pointer Positioning Commands . ................................ 1–5 1.6 Type-Out Commands . ........................................ 1–6 1.6.1 Immediate Inspection Commands [not in TECO-10] .............. 1–7 1.7 Text Modification Commands . ................................ 1–7 1.8 Search Commands .
    [Show full text]
  • Mac Os Versions in Order
    Mac Os Versions In Order Is Kirby separable or unconscious when unpins some kans sectionalise rightwards? Galeate and represented Meyer videotapes her altissimo booby-trapped or hunts electrometrically. Sander remains single-tax: she miscalculated her throe window-shopped too epexegetically? Fixed with security update it from the update the meeting with an infected with machine, keep your mac close pages with? Checking in macs being selected text messages, version of all sizes trust us, now became an easy unsubscribe links. Super user in os version number, smartphones that it is there were locked. Safe Recover-only Functionality for Lost Deleted Inaccessible Mac Files Download Now Lost grate on Mac Don't Panic Recover Your Mac FilesPhotosVideoMusic in 3 Steps. Flex your mac versions; it will factory reset will now allow users and usb drive not lower the macs. Why we continue work in mac version of the factory. More secure your mac os are subject is in os x does not apply video off by providing much more transparent and the fields below. Receive a deep dive into the plain screen with the technology tally your search. MacOS Big Sur A nutrition sheet TechRepublic. Safari was in order to. Where can be quit it straight from the order to everyone, which can we recommend it so we come with? MacOS Release Dates Features Updates AppleInsider. It in order of a version of what to safari when using an ssd and cookies to alter the mac versions. List of macOS version names OS X 10 beta Kodiak 13 September 2000 OS X 100 Cheetah 24 March 2001 OS X 101 Puma 25.
    [Show full text]
  • On Extended Regular Expressions
    On Extended Regular Expressions Benjamin Carle and Paliath Narendran Dept. of Computer Science University at Albany–SUNY Albany, NY 12222 Abstract. In this paper we extend the work of Campeanu, Salomaa and Yu [1] on extended regular expressions featured in the Unix utility egrep and the popular scripting language Perl. We settle the open issue of closure under intersection and provide an improved pumping lemma that will show that a larger class of languages is not recognizable by ex- tended regular expressions. We also investigate some questions regarding extended multi-pattern languages introduced by Nagy in [2]. 1 Introduction Grep, a well-known command line search utility, is used regularly on Unix and other operating systems to find matching lines in files or standard input. Grep uses regular expressions to match patterns, thereby allowing a user to quickly find important data in very large files or command output. Egrep, a variant of grep, uses extended regular expressions1 to increase the set of languages recognizable by the utility. Because the set of languages recognized by egrep is larger than that of theoretical regular expressions, it is important to understand the expressive power of this utility. In this paper we extend the pioneering work of [1]; we show that the family of languages recognizable by extended regular expressions is not closed under intersection, thereby settling an open problem. Furthermore, we introduce a different pumping lemma and use that lemma to show a class of languages that satisfy the pumping property of [1] but are not expressible by extended regular expressions. We also investigate some decidability and complexity issues.
    [Show full text]
  • Inet Intelligent Network Management (EN)
    Smart solutions for smart networks Version V48 INET INTELLIGENT NETWORK MANAGEMENT Features Description Web based application following design of thin client iNET, based on the scalable and modularized computing architecture, is a set of intelligent network management Windows style user desktop environment software programs which can be taken as both Element Management Layer (EML) and Network Management Supported browsers: Firefox; Internet Explorer (IE) Layer (NML) based the Telecommunications Supported server platform: MS Windows, Linux Management Network (TMN) model. This program is (CentOS) flexibly designed to manage your network regardless of Database server: MySQL RDBMS size or complexity. You can add or remove any component as you want without affecting operations of Multi-language support (upon request) the system. It provides a GUI (graphical user interface) Automatic load balancing for the major components to for the management of a communications network increase performance of iNET server containing CXR Telecom products. Hot standby server redundancy with automatic failover to The workforce management is facilitated by the multiple provide high availability(HA) for the major system levels of login security, which provides the network components manager great flexibility of work assignment. The System access security with role-based user access hierarchical grouping feature, cities, buildings, and control. The access privilege can be customized through rooms, allow rapid access to the desired network any combination of operation functions and managed element. NEs. User inherits privileges automatically from group All SNMP provided functions are available in iNET. This privilege includes the execution of all commands, the gathering of all statistics, and the display of all alarm conditions in real System operation and user access log time.
    [Show full text]
  • Introducing UNIX
    CHAPTER 2 – BECOMING FAMILIAR WITH UNIX COMMANDS Updated by: Eng. Rana AlQurem Command Basics Commands are mostly implemented as disk files which contains executable code Mainly written in C language Loaded to memory when invoked, then executed Commands are case sensitive Usually 4 characters or less UNIX Doesn’t require command names to have extension Some applications (not UNIX) require files to have extensions such as C and JAVA compilers The shell is a special command: runs continuously as long as you are logged UNIX provides a full-duplex terminal Separate channels for input/output Users do not have to wait for a command to complete before typing the next one; just continue typing even if the output of the previous command clutters the display The PATH: Locating Commands One of the most important environment variables is the path. It defines where the shell looks for commands. Set to a colon-delimited list of directories Shell looks at PATH only when command is not used with a pathname and is also not a shell built-in. To see the path value, type “echo $PATH” Ex: echo $PATH /usr/local/bin:/usr/bin:/usr/ccs/bin:/usr/ucb:/usr/dt/bin:/bi:. Common Directories /bin This is the directory where you typically find essential user commands such as ls and man. /usr/bin Holds most of the common user commands and basic applications /usr/local/bin Holds commands that are local to the current machine and are not common amongst machines. May not be used. $HOME/bin Where you should store any executable programs that you create.
    [Show full text]
  • Editor War - Wikipedia, the Free Encyclopedia Editor War from Wikipedia, the Free Encyclopedia
    11/20/13 Editor war - Wikipedia, the free encyclopedia Editor war From Wikipedia, the free encyclopedia Editor war is the common name for the rivalry between users of the vi and Emacs text editors. The rivalry has become a lasting part of hacker culture and the free software community. Many flame wars have been fought between groups insisting that their editor of choice is the paragon of editing perfection, and insulting the others. Unlike the related battles over operating systems, programming languages, and even source code indent style, choice of editor usually only affects oneself. Contents 1 Differences between vi and Emacs 1.1 Benefits of vi-like editors 1.2 Benefits of Emacs 2 Humor 3 Current state of the editor war 4 See also 5 Notes 6 References 7 External links Differences between vi and Emacs The most important differences between vi and Emacs are presented in the following table: en.wikipedia.org/wiki/Editor_war 1/6 11/20/13 Editor war - Wikipedia, the free encyclopedia vi Emacs Emacs commands are key combinations for which modifier keys vi editing retains each permutation of typed keys. are held down while other keys are Keystroke This creates a path in the decision tree which pressed; a command gets executed execution unambiguously identifies any command. once completely typed. This still forms a decision tree of commands, but not one of individual keystrokes. Historically, vi is a smaller and faster program, but Emacs takes longer to start up (even with less capacity for customization. The vim compared to vim) and requires more version of vi has evolved to provide significantly memory.
    [Show full text]
  • Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1
    Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1. December 2020 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This text is a brief description of the features that are present in the Bash shell (version 5.1, 21 December 2020). This is Edition 5.1, last updated 21 December 2020, of The GNU Bash Reference Manual, for Bash, Version 5.1. Copyright c 1988{2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 What is Bash?:::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 What is a shell? :::::::::::::::::::::::::::::::::::::::::::::::: 1 2 Definitions ::::::::::::::::::::::::::::::::::::::: 3 3 Basic Shell Features ::::::::::::::::::::::::::::: 5 3.1 Shell Syntax :::::::::::::::::::::::::::::::::::::::::::::::::::: 5 3.1.1 Shell Operation :::::::::::::::::::::::::::::::::::::::::::: 5 3.1.2 Quoting ::::::::::::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.1 Escape Character ::::::::::::::::::::::::::::::::::::: 6 3.1.2.2 Single Quotes ::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.3 Double Quotes ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • RIDGE ROS Text Editing Guide
    ROS Text Editing Guide RIDGE 9051 'A ROS Text Editing Guide RIdge Computers Santa Clara, CA first edition: 9051 (SEP 84) © Copyright 1984, Ridge Computers. All rights reserved. Printed in the U.S.A. PUBLICATION HISTORY Manual TItle: ROS Text Editing Guide first editon: 9051 (SEP 84) NonCE No part of this document may be translated, reproduced, or copied in any form or by any means without the written permission of Ridge Computers. The information contained in this document is subject to change without notice. Ridge Computers shall not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. ACKNOWLEDGEMENT This software and documentation is based in part on the fourth Berkeley Software Distribution, under license from the regents of the University of California. We acknowledge the following individuals for their part in its development: Ken Arnold, Rick Blau, Earl Cohen, Robert Corbett, John Foderaro, Mark Horton, Bill Joy, Randy King, Jim Kleckner, Steve Levine, Colin McMaster, Geoffrey Peck, Rob Pike, Eric Scott, and Eric Shienbrood. These tutorial guides are based on documents created at Bell Laboratories to describe UNIX System software, and at the University of California, Berkeley, to describe bsd 4.2. Credits are given on the first page of each document contained in this volume. Some text has been changed to more accurately describe Ridge Computers' implementation of the software. Inappropriate material may have been deleted. UNIX is a trademark of Bell Laboratories. -ii- 9051 PREFACE The ROS Text Editing Guide (manual 9051) is a collection of tutorial documents on text,.
    [Show full text]
  • Linux Shell Scripting Tutorial
    Linux Shell Scripting Tutorial Linux Shell Scripting Tutorial Ver. 1.0 Written by Vivek G Gite I N D E X ● Introduction ❍ Kernel ❍ Shell ❍ How to use Shell ❍ Common Linux Command Introduction ● Process ❍ Why Process required ❍ Linux commands related with process ● Redirection of Standard output/input ❍ Redirectors ❍ Pipes ❍ Filters ● Shell Programming ❍ Variables in Linux ❍ How to define User defined variables ❍ Rules for Naming variable name ❍ How to print or access value of UDV (User defined variables) ❍ How to write shell script ❍ How to Run Shell Scripts ❍ Quotes in Shell Scripts http://www.freeos.com/guides/lsst/index.htm (1 of 2) [17/08/2001 17.41.52] Linux Shell Scripting Tutorial ❍ Shell Arithmetic ❍ Command Line Processing (Command Line Arguments) ❍ Why Command Line arguments required ❍ Exit Status ❍ Filename Shorthand or meta Characters (i.e. wild cards) ● Programming Commands ❍ echo command ❍ Decision making in shell script ( i.e. if command) ❍ test command or [ expr ] ❍ Loop in shell scripts ❍ The case Statement ❍ The read Statement ● More Advanced Shell Script Commands ❍ /dev/null - Use to send unwanted output of program ❍ Local and Global Shell variable (export command) ❍ Conditional execution i.e. && and || ❍ I/O Redirection and file descriptors ❍ Functions ❍ User Interface and dialog utility ❍ trap command ❍ getopts command ❍ More examples of Shell Script (Exercise for You :-) © 1998-2000 FreeOS.com (I) Pvt. Ltd. All rights reserved. http://www.freeos.com/guides/lsst/index.htm (2 of 2) [17/08/2001 17.41.52] Linux Shell Script Tutorial Introduction This tutorial is designed for beginners only and This tutorial explains the basics of shell programming by showing some examples of shell programs.
    [Show full text]