Dwarf's Guide to Debian GNU/Linux

Total Page:16

File Type:pdf, Size:1020Kb

Dwarf's Guide to Debian GNU/Linux Dwarf’s Guide to Debian GNU/Linux 2001 Dale Scheetz Dwarf’s Guide to Debian GNU/Linux Copyright c 2001 Dale Scheetz Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being Chapter 1 Introduction, with no Front-Cover Texts, and with the Back-Cover Texts being “The early development of the material in this work was produced with the financial support of Planet Linux. This support was intrumental in bringing this project to completion.” A copy of the license is included in the section entitled “Appendix 9: GNU Free Documentation License” which can be found on page 271. Trademark Acknowledgements All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. The publisher cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Apple and Macintosh are registered trademarks of Apple Computer, Inc. CP/M is a registered trademark of Caldera, Inc. IBM is a registered trademark of International Business Machines, Inc. MS is a trademark of Microsoft Corporation. Windows is a trademark of Microsoft Corporation. X Window System is a registered trademark of X Consortium, Inc. ii dedicated to Linux users everywhere iii CREDITS First I want to thank Ian Murdock for writing the History section. His per- spectives on those early years have helped latecomers like Dwarf understand the founding principles upon which Debian is based. While Dwarf wrote much of the remainder of the book from his own experience, his fellow developers have always been willing to help resolve his ignorance. Without the fabulous mind-share of the development community, this book could never have been written. This release includes graphic snapshots of the actual screens presented by the current installation. These shots could not have been taken without the use of VMwareTM Workstation software. VMware’s support of this free software effort has included the donation of license to use it’s MultipleWorldsTM tech- nology without fee. Dwarf is grateful for the quality of the presentation these screen shots bring to this book, and wishes to thank VMware for all their help in making this possible. Dwarf also wishes to thank Peter S Galbraith for making this book available as the Debian package dwarfs-debian-guide, and Anthony Fok for his patches to the layout, and for catching several typos. iv Typography Bold Bold type face is used to identify words that are name or titles, such as the names of headings on a display, the names of file formats or protocols, and even program names when the usage is pointedly the name and not the use or function of the program. Italic Italic type face is used to identify files, directories, and programs that reside on a file system, as well as their use in commands. The note Style Note: This style is used to deliver auxiliary information about the subject under discussion. Most often this is information that the reader may or may not understand, and is considers op- tional reading. The screen Style This style presents text that might be displayed on the screen of your computer. v vi Contents 1 Introduction 15 About the Author . 15 A Short History of Debian . 17 The Debian Development Team . 19 What Makes Debian Different? . 21 What is in this book? . 24 2 Package Management Tools 27 Introduction . 27 dpkg . 30 Introduction . 30 Running dpkg . 32 Options Recognized by dpkg . 33 Installation and Removal Options . 33 Available Packages File Management Options . 37 Package System Information Options . 39 vii Force Options . 45 Miscellaneous Options . 46 dselect . 47 Introduction . 47 Using dselect . 48 0. [A]ccess . 48 1. [U]pdate . 54 2. [S]elect . 55 3. [I]nstall . 58 4. [C]onfig . 58 5. [R]emove . 59 6. [Q]uit . 59 Upgrading with dselect . 60 apt-get.................................. 62 Introduction . 62 Selecting Archives . 62 Updating Packages Files . 64 Installing Packages . 65 Upgrading Packages . 66 Removing packages . 66 3 Installation 67 Introduction . 67 viii Quick Start . 69 Before You Begin . 72 Boot Media . 72 Partitioning the Hard Drive . 73 The Swap Partition . 74 The root partitions . 75 Example #1: Simple partitioning . 77 Example #2: Complex partitioning . 77 Networking Information Sources . 78 Preliminary Networking Information . 80 PPP Configuration Information . 84 What You Need to Know: . 84 Stage One: The Base Installation . 86 Task 1: Configure the Keyboard . 88 Task 2: Partition the Hard Disk . 90 Task 3: Swap Partition . 95 Task 4: Initializing Linux Partitions . 97 Task 5: Install Kernel and Modules . 100 Task 6: Configuring Driver Modules . 104 Task 7: Configure the Network . 108 Task 8: Installing the Base System . 117 Task 9: Configuring the Base System . 119 ix Task 10: Creating a Bootable System . 122 Task 11: Finish Stage One . 126 Stage Two: Package Installation . 127 General Configuration . 128 PPP Configuration . 139 Configuring Apt . 156 System Configuration . 160 The Debian Task Installer . 161 X Configuration using anXious . 163 Apt Package Installation . 185 4 Basic System Administration 189 Introduction . 189 Managing many accounts . 190 Adding a user . 190 Removing a user . 191 Managing passwords . 192 Managing Root Access . 194 su ................................. 194 sudo . 195 File Protection by Owner . 196 File Protection by Group . 197 Mounting and Unmounting File Systems . 199 x Monitoring System Activity . 200 Process Status . 200 top CPU Processes . 200 fuser: Who has it? . 201 Who is logged on? . 202 Where is the printer? . 202 Finding knowledge . 204 Additional info . 205 Finding packages . 206 Searching the file system . 207 Building a Custom Kernel . 208 Hardware . 208 Building the Kernel . 209 Non-Debian Kernel Construction . 209 Debian Kernel Construction . 215 Modules . 217 Advantages . 217 Disadvantage . 219 5 Appendix 223 Appendix 1: Common UNIX Commands . 224 Introduction . 224 chgrp . 225 xi chmod . 226 chown ............................... 228 cp ................................. 229 df.................................. 230 du ................................. 231 ls.................................. 232 mkdir . 234 mv................................. 235 rm ................................. 236 rmdir . 237 Appendix 2: Text Editors . 238 Introduction . 238 ae ................................. 239 joe................................. 240 vi.................................. 241 emacs . 242 Appendix 3: The Loop Device . 243 Appendix 4: Multiple OS Installation . 246 Appendix 5: Building Packages Files . 248 Appendix 6: Linux as a Server . 250 Appendix 7: Arguments . 252 SCSI device arguments . 254 xii SCSI argument list . 255 Hard Disk Arguments . 258 Other CD-ROMS . 260 Floppy Drive Arguments . ..
Recommended publications
  • Administració De Sistemes GNU Linux Mòdul4 Administració
    Administració local Josep Jorba Esteve PID_00238577 GNUFDL • PID_00238577 Administració local Es garanteix el permís per a copiar, distribuir i modificar aquest document segons els termes de la GNU Free Documentation License, Version 1.3 o qualsevol altra de posterior publicada per la Free Software Foundation, sense seccions invariants ni textos de la oberta anterior o posterior. Podeu consultar els termes de la llicència a http://www.gnu.org/licenses/fdl-1.3.html. GNUFDL • PID_00238577 Administració local Índex Introducció.................................................................................................. 5 1. Eines bàsiques per a l'administrador........................................... 7 1.1. Eines gràfiques i línies de comandes .......................................... 8 1.2. Documents d'estàndards ............................................................. 10 1.3. Documentació del sistema en línia ............................................ 13 1.4. Eines de gestió de paquets .......................................................... 15 1.4.1. Paquets TGZ ................................................................... 16 1.4.2. Fedora/Red Hat: paquets RPM ....................................... 19 1.4.3. Debian: paquets DEB ..................................................... 24 1.4.4. Nous formats d'empaquetat: Snap i Flatpak .................. 28 1.5. Eines genèriques d'administració ................................................ 36 1.6. Altres eines .................................................................................
    [Show full text]
  • Ajuba Solutions Version 1.4 COPYRIGHT Copyright © 1998-2000 Ajuba Solutions Inc
    • • • • • • Ajuba Solutions Version 1.4 COPYRIGHT Copyright © 1998-2000 Ajuba Solutions Inc. All rights reserved. Information in this document is subject to change without notice. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means electronic or mechanical, including but not limited to photocopying or recording, for any purpose other than the purchaser’s personal use, without the express written permission of Ajuba Solutions Inc. Ajuba Solutions Inc. 2593 Coast Avenue Mountain View, CA 94043 U.S.A http://www.ajubasolutions.com TRADEMARKS TclPro and Ajuba Solutions are trademarks of Ajuba Solutions Inc. Other products and company names not owned by Ajuba Solutions Inc. that appear in this manual may be trademarks of their respective owners. ACKNOWLEDGEMENTS Michael McLennan is the primary developer of [incr Tcl] and [incr Tk]. Jim Ingham and Lee Bernhard handled the Macintosh and Windows ports of [incr Tcl] and [incr Tk]. Mark Ulferts is the primary developer of [incr Widgets], with other contributions from Sue Yockey, John Sigler, Bill Scott, Alfredo Jahn, Bret Schuhmacher, Tako Schotanus, and Kris Raney. Mark Diekhans and Karl Lehenbauer are the primary developers of Extended Tcl (TclX). Don Libes is the primary developer of Expect. TclPro Wrapper incorporates compression code from the Info-ZIP group. There are no extra charges or costs in TclPro due to the use of this code, and the original compression sources are freely available from http://www.cdrom.com/pub/infozip or ftp://ftp.cdrom.com/pub/infozip. NOTE: TclPro is packaged on this CD using Info-ZIP’s compression utility.
    [Show full text]
  • The Debian GNU/Linux
    The Debian GNU/Linux FAQ translator: etony C.F.AN <[email protected]> Debian FAQ Authors version 5.0.1, 17 March 2012 XXX要要要 ,文cãT一些s于 Debian GNU/Linux 的8Á问题. HHHCCC声声声明明明 Copyright © 1996-2003 by Software in the Public Interest (u守v包+,文cHC声明的MÐ下, A¸6\和发布,文c的完t拷贝. (u守上述完t拷贝H,有sHC声明的MÐ下, A¸拷贝和发布ú于,文c完t拷贝的修9H,, v且, 发布@有通Ç修9 ,文c而得0的工\成果, {使(与,文c的¸可声明一致的¸可声明. (u守上述修9H,HC声明的MÐ下, A¸拷贝和发布,文cv它语言的û译H,, 如果,¸可声明有Ïê1o件ú金 会(Free Software Foundation)8Æ的S0化译,, 则uªS0化译,. i Contents 1 定定定II义与与与概概概述述述 1 1.1 什么/ Debian GNU/Linux?...............................................1 1.2 OK, 现(我知SDebian /. Linux/什么?!.......................................1 1.3 什么/ “Hurd”?.......................................................2 1.4 Debian GNU/Linux 与v他 Linux 发LH有什么不同? 为什么要选éDebian GNU/Linux?............2 1.5 Debian ¡划与ê1o件ú金会的GNU¡划 .......................................2 1.6 Debian 的发音Ê+I?...................................................2 2 Debian GNU/Linux 的的的···取取取与与与安安安ÅÅÅ 3 2.1 Debian 的最新H,/?...................................................3 2.2 如U得0 Debian 的安Å盘?................................................3 2.3 如UÎIq安Å Debian?..................................................3 2.4 我有;U:, 可以·取 Debian qÏ吗?..........................................3 2.5 可以o盘安Å吗?.......................................................3 2.6 可以Q络安Å吗?.......................................................4 3 |||¹¹¹'''问问问题题题 5 3.1 可以(什么7的l件û统上ÐL?.............................................5 3.2 与v他的linux发LH|¹L如U?.............................................5 3.3 Debian 源码与v他
    [Show full text]
  • Lightweight Distros on Test
    GROUP TEST LIGHTWEIGHT DISTROS LIGHTWEIGHT DISTROS GROUP TEST Mayank Sharma is on the lookout for distros tailor made to infuse life into his ageing computers. On Test Lightweight distros here has always been a some text editing, and watch some Linux Lite demand for lightweight videos. These users don’t need URL www.linuxliteos.com Talternatives both for the latest multi-core machines VERSION 2.0 individual apps and for complete loaded with several gigabytes of DESKTOP Xfce distributions. But the recent advent RAM or even a dedicated graphics Does the second version of the distro of feature-rich resource-hungry card. However, chances are their does enough to justify its title? software has reinvigorated efforts hardware isn’t supported by the to put those old, otherwise obsolete latest kernel, which keeps dropping WattOS machines to good use. support for older hardware that is URL www.planetwatt.com For a long time the primary no longer in vogue, such as dial-up VERSION R8 migrators to Linux were people modems. Back in 2012, support DESKTOP LXDE, Mate, Openbox who had fallen prey to the easily for the i386 chip was dropped from Has switching the base distro from exploitable nature of proprietary the kernel and some distros, like Ubuntu to Debian made any difference? operating systems. Of late though CentOS, have gone one step ahead we’re getting a whole new set of and dropped support for the 32-bit SparkyLinux users who come along with their architecture entirely. healthy and functional computers URL www.sparkylinux.org that just can’t power the newer VERSION 3.5 New life DESKTOP LXDE, Mate, Xfce and others release of Windows.
    [Show full text]
  • Building a Beowulf Cluster
    Building a Beowulf cluster Åsmund Ødegård April 4, 2001 1 Introduction The main part of the introduction is only contained in the slides for this session. Some of the acronyms and names in this paper may be unknown. In Appendix B we includ short descriptions for some of them. Most of this is taken from “whatis” [6] 2 Outline of the installation ² Install linux on a PC ² Configure the PC to act as a install–server for the cluster ² Wire up the network if that isn’t done already ² Install linux on the rest of the nodes ² Configure one PC, e.g the install–server, to be a server for your cluster. These are the main steps required to build a linux cluster, but each step can be done in many different ways. How you prefer to do it, depends mainly on personal taste, though. Therefor, I will translate the given outline into this list: ² Install Debian GNU/Linux on a PC ² Install and configure “FAI” on the PC ² Build the “FAI” boot–floppy ² Assemble hardware information, and finalize the “FAI” configuration ² Boot each node with the boot–floppy ² Install and configure a queue system and software for running parallel jobs on your cluster 3 Debian The choice of Linux distribution is most of all a matter of personal taste. I prefer the Debian distri- bution for various reasons. So, the first step in the cluster–building process is to pick one of the PCs as a install–server, and install Debian onto it, as follows: ² Make sure that the computer can boot from cdrom.
    [Show full text]
  • Radioecological Studies on Terrestrial Food Chain Analysis for Accidental Release
    KAERI/RR-2035/99 KR0000196 M Development of Environmental Radiation Protection Technology Radioecological Studies on Terrestrial Food Chain Analysis for Accidental Release 7) 7| 31/ 40 KAER1/RR-2035/99 2=| Development of Environmental Radiation Protection Technology Radioecological Studies on Terrestrial Food Chain Analysis for Accidental Release 71 Please be aware that all of the Missing Pages in this document were originally blank pages n\ 2000^ o| o| 0| o| a o| 0| I. n. 16 tfltb ^ 71^ III. ifl-g- ~-S- Co-57, Sr-85, Ru-103, Cs-134) ^ H-3 D/B H Sr-90 ^ Rl Ill tp#te [opt 001 ^ '((« 005 ^ fr IbU-te a ^ >9-«IAI -R T *AI 2. H-3 HT0 H-3 HTO -f 101000% TFWT > #71 > > TFWT HTO H-3) ^ TFWT ^ TFWT 0.04-0.05% 6]^-ifl OBT ^ TFWT ^3Efi| 0.6-0.8% ^elA] OBT OBT TFWT 0.01~0.4% 0.13-0.35%, 0.02-0.66%^! 3. 5.1 IV 10"2~ 2.1 xiO'1, fe- 2.4X10''1 1-8.5x10"" ^ 6)^4 1 7}^ fe. 7.6-22.0%, 7.6xl0""4~9.7xl0""34 fe 1^ 99% I 7> >i 1.6 /g 0.03-0.04 -Al z]- «- ^ < 6.5 4. ^ D/B D/B 5 , Co, Sr, Cs, Ru f-) s.^ visual Basic^- A °g^^- Visual Basic4 ^ o]s.^x]^ ACCESS ^^l-^4. D/B 5 RTRACK(Radionuclide TRAnsfer data for Crop plants of Korean 5. Rr 5~6 ^iE^jL -fi-7]!- ^£- 2~3% Cs-1373f Sr-90 ^£^ 44 4.5-13.4 Bq/kg-dry 0.7-2.5 # ^ ^ Cs-1374 Sr- (m2/kg-dry)^ AA £°oHl 4^- 3.8xi0"5-2.0xl0"4 ^ 9.5XlO~5~6.5x 10"4^] ^^^ Sr-90 ^*]^l^r7l- Cs-137 ^A 20-30 aflM- ^7>§l-^3l Sr-90^1 ^ 2-3 Cs-137 Q°]A^A Sr-90 ^^^^^4 0^^^ 2 ^ Cs-1375] ^4- j/ej A4 Sr-90^] ^-f 2-3 afl ^S.
    [Show full text]
  • Linux System Administration
    Linux System Administration Jonathan Quick Hartebeesthoek Radio Astronomy Observatory Goals • Help you to understand how Linux starts up, keeps running, and shuts down • Give confidence in dealing with hardware and software failures • Give an overview of what you can configure and how • Show you where to find more information when you need it • For the field system and Mark5’s 2 Basic Linux Concepts • Linux Kernel – Base monolithic kernel + loadable modules – Gives standardized access to underlying hardware • Linux System / "Distribution" – Kernel + lots of software – Adds both system and application level software to the system • Background processes ("daemons") 3 System Modifications • In order to do any system-wide changes you usually have to be logged in as 'root‘ – Or have root privileges • There are a number of approaches for this – Log in as user “root” – Execute “su –” from the present user account – Execute the command directly with “sudo” • E.g. “sudo tail /var/log/kern.log” 4 Logging in as 'root' • You can change to a virtual console (Ctrl-Alt- F1) and login normally or use 'su -' • 'root' can override all permissions, start and stop anything, erase hard drives,... – So please be careful with disk names and similar! – You can browse and check many (if not most of the) things as a normal user (like 'oper'). 5 Sudo • Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. • The basic philosophy is to give as few privileges as possible but still allow people to get their work
    [Show full text]
  • Dselect Documentation for Beginners
    dselect Documentation for Beginners Stéphane Bortzmeyer <[email protected]> 1 Chapter 1 Introduction This file documents dselect for first-time users, and is intended to help in getting Debian installed suc- cessfully. It makes no attempt to explain everything, so when you first meet dselect, work through the help screens. dselect is used to select which packages you wish to install (there are currently around 2000 packages in Debian 2.1). It will be run for you during the install and as it is a very powerful and somewhat complex thing which can be used for good or for evil; some knowledge of it beforehand is highly recommended. Careless use of dselect can severly mess up your system. dselect will step you through the package installation process as follows: Choose the access method to use. • Update list of available packages, if possible. • Request which packages you want on your system. • Install and upgrade wanted packages. • Configure any packages that are unconfigured. • Remove unwanted software. • As each step is completed successfully it will lead you on to the next. Go through them in order without skipping any steps. Here and there in this document we talk of starting another shell. Linux has 6 console sessions or shells available at any one time. You switch betwen them by hitting Left Alt-F1 through Left Alt-F6, after which you log in on your new shell and go ahead. The console used by the install process is the first one, a.k.a., tty1, so hit Left Alt-F1 when you want to return to that process.
    [Show full text]
  • Tiny Pdf Free Download 32 Bit
    Tiny pdf free download 32 bit Continue The main project, as proposed by our name, is not a turnkey desktop distribution. Instead, we only deliver a Linux kernel from which it's pretty easy to add what you want. We offer 3 different x86 cores to get you started: Core, TinyCore, and our image installation, CorePlus. Core (11 MB)Core is a basic system that provides only a command line interface and is therefore only recommended for experienced users. Command line tools are provided so that you can add extensions to create a system with a desktop graphic environment. Perfect for servers, appliances and custom desktops. TinyCore (16 MB)TinyCore is a recommended option for new users who have a wired connection to the network. It includes a basic Core system plus X/GUI extensions for the dynamic FLTK/FLWM desktop graphics environment. CorePlus (106 MB)CorePlus is the installation of the image, not the distribution. Recommended for new users who only have access to a wireless network or who use a non-American keyboard layout. It includes a basic basic system and installation tools to provide installation with the following options: a choice of 7 window managers, wireless support through many firmware files and ndiswrapper, non-American keyboard support, and a remastering tool. Want more? Advanced embedding details, examples and help! Windows 7 Tiny Activated Mini Version of Windows 7 OS Tiny7 Unattended Activated CD (X86) Windows 7 Experience is a great user experience from Microsoft there are many people who want to use Windows 7 because of the simplicity of this operating system.
    [Show full text]
  • PIC Licensing Information User Manual
    Oracle® Communications Performance Intelligence Center Licensing Information User Manual Release 10.1 E56971 Revision 3 April 2015 Oracle Communications Performance Intelligence Center Licensing Information User Manual, Release 10.1 Copyright © 2003, 2015 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notices are applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Advanced Tcl E D
    PART II I I . A d v a n c Advanced Tcl e d T c l Part II describes advanced programming techniques that support sophisticated applications. The Tcl interfaces remain simple, so you can quickly construct pow- erful applications. Chapter 10 describes eval, which lets you create Tcl programs on the fly. There are tricks with using eval correctly, and a few rules of thumb to make your life easier. Chapter 11 describes regular expressions. This is the most powerful string processing facility in Tcl. This chapter includes a cookbook of useful regular expressions. Chapter 12 describes the library and package facility used to organize your code into reusable modules. Chapter 13 describes introspection and debugging. Introspection provides information about the state of the Tcl interpreter. Chapter 14 describes namespaces that partition the global scope for vari- ables and procedures. Namespaces help you structure large Tcl applications. Chapter 15 describes the features that support Internationalization, includ- ing Unicode, other character set encodings, and message catalogs. Chapter 16 describes event-driven I/O programming. This lets you run pro- cess pipelines in the background. It is also very useful with network socket pro- gramming, which is the topic of Chapter 17. Chapter 18 describes TclHttpd, a Web server built entirely in Tcl. You can build applications on top of TclHttpd, or integrate the server into existing appli- cations to give them a web interface. TclHttpd also supports regular Web sites. Chapter 19 describes Safe-Tcl and using multiple Tcl interpreters. You can create multiple Tcl interpreters for your application. If an interpreter is safe, then you can grant it restricted functionality.
    [Show full text]
  • |I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer Et Al
    |I||||||III US005619682A United States Patent (19) 11) Patent Number: 5,619,682 Mayer et al. (45) Date of Patent: Apr. 8, 1997 54 EXECUTING NETWORK LAYERED Hartig et al., "Operating System(s) on Top of Persistent COMMUNICATIONS OF A FIRST SYSTEM Object Systems-The Birlix Approach”, Jan. 1992, pp. ON A SECOND SYSTEM USINGA COMMUNICATION BRIDGE TRANSPARENT 790-799, IEEE. TO THE DIFFERENT COMMUNICATION LAYERS Primary Examiner-Thomas C. Lee 75 Inventors: Bruce D. Mayer, Arlington; Martin Assistant Examiner-Sang Hui Kim Berkowitz, Newton; Sudershan K. Attorney, Agent, or Firm-Gary D. Clapp, Faith F. Driscoll; Sharma, Brookline, all of Mass. John S. Solakian 73) Assignee: Bull HN Information Systems Inc., Billerica, Mass. (57) ABSTRACT 21 Appl. No.: 127,925 A layered communications bridge mechanism connected 22 Filed: Sep. 28, 1993 between an upper communications layer of a first commu (51) int. Cl. ..................... G06F 3/00 nications layer mechanism executing in a user level process 52 U.S. Cl. ................... 395/500; 364/264.3; 364/2809; and a layered communication kernel process of a second - 364/280; 364/DIG. 1 system corresponding to the next lower layers of the first 58) Field of Search .................................... 395/500, 2.86, communications layer mechanism. The bridge includes an 395/700, 650, 882, 892 upper bridge mechanism operating to appear to the lowest (56 References Cited layer or the layers of the first communications layer mecha U.S. PATENT DOCUMENTS nism to be the next lower layer of the first layered commu nications mechanism and a lower bridge mechanism oper 4,727,480 2/1988 Albright et al.
    [Show full text]