P-CLS: a Popularity-Driven Caching Location and Searching Scheme in Content Centric Networking

Total Page:16

File Type:pdf, Size:1020Kb

P-CLS: a Popularity-Driven Caching Location and Searching Scheme in Content Centric Networking P-CLS: A Popularity-driven Caching Location and Searching Scheme in Content Centric Networking Yuemei Xu∗, Shuai Ma†, Yang Li‡, Fu Chen∗ and Song Ci§ ∗ Department of Computer Science, Beijing Foreign Studies University, China † Viterbi School of Engineering, University of Southern California, USA ‡ Institute of Information Engineering, Chinese Academy of Science, Beijing, China §Department of Computer and Electronics Engineering, University of Nebraska-Lincoln, USA Abstract—Content Centric Networking (CCN) is an emerging idea that most users only focus on the accessing data, rather next-generation network infrastructure around content dissemi- than the physical locations from which the data are retrieved. nation and retrieval, shifting from physical locations to named In-network caching, as an intrinsic component of CCN, data. The built-in caching capacity of CCN, termed as in-network caching, promises to enable fast and effective content distribution enables each router in CCN to equip a content store (CS) mod- at a global scale. Because of the in-network caching, the caching ule (we call these routers as C-routers for short), attempting to strategy of content location potentially affects how to make maximize the probability of content sharing while satisfying content searching decisions, while content searching in return users’ requests as close to end-users as possible. decides in which routers content are stored. The relationship Due to In-network caching, two important issues between content caching location and content searching has not been fully exploited in CCN or further used for the whole need to be addressed in CCN. First, C-routers become avail- network performance improvement. This paper exploits the able containers to cache content for the purpose of satisfying content caching location and content searching mechanism of the subsequent requests. Thus we need to decide which C- CCN, and proposes a Popularity-driven content Caching Loca- routers in the content delivery path should cache the content, tion and Searching scheme (P-CLS) in CCN. P-CLS leverages in order to maximize the utilization of CS while maintaining content access popularity to realize diverse content distribution and reduce content caching redundancy, which also overcomes the content diversity of network. That is what to cache, what the oscillation and frequent replacement phenomenon in the to replace and where to cache, and is defined as a content existing content caching and searching (CLS) scheme. Extensive caching location problem. Second, content replicas in C- simulations via hierarchical and arbitrary caching topologies routers change with time, which is because when a C-router show that the proposed scheme outperforms the existing caching needs to cache content but its CS is full, it will carry out algorithms. a content replacement strategy (e.g., LRU or LFU) to evict I. INTRODUCTION content for the new coming one. Due to the high volatility of content in CS, C-routers take efforts to find and select an Millions of multimedia data (e.g., user-generated content, appropriate content replica location to forward requests. It is Video-on-demand, HTTP web pages) are generated and shared known as content searching problem. by content producers and consumers. This trend has been The content caching location and content searching prob- posing high stress on network bandwidth and content stor- lems have not been fully exploited in CCN and are usually age, resulting in network congestion and server overload. To studied separately. On one hand, two research lines exist in address these issues, Content Delivery Network (CDN) and content caching location problem, namely on-path and off- application-specific solutions like peer-to-peer (P2P) are pop- path content caching. For example, Leave Copy Everywhere ular. However, CDN may experience sub-optimal performance (LCE), Leave Copy Down (LCD) and Move Copy Down due to the traffic engineering of Internet service provides (MCD) are all the on-path content caching strategies, where (ISPs) [1] and P2P systems incur a lot of inter-ISP traffic content may be cached by any on-path cache or a subset and are unstable in terms of content availability and download of traverse caches in its delivery path. In contrast, off-path performance [2]. content caching often calculates the (near) optimal content To overcome limitations of CDN and P2P, accelerate net- placement off-line. Off-path strategies can achieve better net- work data delivery and reduce server load, Content Centric work performance than on-path ones but at the cost of time Networking (CCN) has been proposed as a predominant next- complexity. On the other hand, content searching in CCN generation Internet architecture [3], which is funded upon the is usually implemented coordinately in a distributed manner, ∗This work is supported by the Fundamental Research Funds for the relying on local cache management policies as well as the Central Universities (No.023600-500110002), the National Natural Science relative position of caches in the network to achieve good Foundation of China (No.61502038, No.61170209) and Program for New performance. As the Internet traffic grows dramatically, it is Century Excellent Talents in University (No.NCET-13-0676). Corresponding email: [email protected]. still very challenging to forward user requests towards a “best” (e.g. closest) available replica in CCN. 978-1-4673-8590-9/15/$31.00 ©2015 IEEE Recently, there is a tend to exploit the content caching popular content to edge network closer to end-users. Recently, location and content searching problems tightly, suggesting a large body of researches focus on how to improve the that content searching potentially decides request forwarding efficiency of in-network caching in CCN, such as exploring op- path and in which C-routers content are stored, while content timal replication strategy [7], [8], explicit cooperative caching caching location in return affects how to make content search- [9], [10], implicit cooperative caching [11]–[13], cache-aware ing decisions for forwarding requests appropriately. Among routing [14] and bandwidth and storage sharing mechanism these researches, Li et al. proposes an implicit coordinate [15], [16]. All of these studies consistently reveal that content content location and searching scheme (CLS) and shows caching location and content searching mechanism are the promising potential in this research direction [4]. However, essential parts of in-network caching, therefore need to be CLS scheme is designed in a hierarchical caching topology, sophisticatedly designed and deliberated. but not the arbitrary caching topology of CCN, which will lead to a oscillation and frequent replacement phenomenon A. Content Caching Location when applying it in CCN. The reason lies in that CLS makes An implicit and transparent approach towards content the content caching down or up decisions only considering caching location called Leave Copy Everywhere (LCE) [17] the current hitting event while ignoring the global content is used in CCN by default. LCE places content copies at all popularity. the intermediate C-routers from the hitting C-router to the re- In this paper, we focus on the content caching location and quested end-user. LCE can realize fast content delivery but will searching problem in an arbitrary caching topology of CCN, lead to unnecessary content caching redundancy. LCD [2] and and novelly propose a Popularity-driven content Caching Lo- MCD [2] are implicit coordinated content caching strategies cation and Searching scheme (P-CLS). Researches [5], [6] re- frequently used in Web caching systems or CDN, and have veal that content popularity is (by far) the most important fac- been introduced to CCN. In LCD, the requested content hit at tor affecting the network performance, compared with content l level will be pulled down to l-1 level. Simultaneously, the request distributions, content catalog size, cache replacement l level node keeps the requested content. MCD is similar to strategies and etc. P-CLS distributes content towards end-users LCD and the only difference is that the l level node will delete considering content popularity as well as the content caching the requested content after it has been moved to l-1 level. location. Studies [18] show that LCD works better than MCD as The main characteristics of P-CLS are summarized as it can cache one more copy on-path to serve clients from follows: other branches. Furthermore, LCD also outperforms LCE and 1) Popularity-based: Through incorporating the content greatly reduces content caching redundancy [18], and thus is popularity factor into the content caching location and used for comparison in our simulations. searching decisions, P-CLS not only realizes to dis- B. Content Searching tribute content to these C-routers which request them most frequently, but also prevents the oscillation and Along the research line of content searching, a best-effort frequent replacement phenomenon of CLS. approach called Breadcrumbs is proposed to use the content 2) Content Diversity: In P-CLS, there is always one and caching location information to improve the efficiency of at most one copy of a content cached on the whole path content searching [19]. In Breadcrumbs, a trail for the purpose between a server and an edge C-router. Thus, P-CLS can of storing content forwarding history is created and maintained make more efficient cache utilization while guaranteeing at each router when the content is downloaded. Thus the content diversity in the whole network. subsequent request for the same content may be routed towards 3) Trail-based Searching: P-CLS creates a trail to store the nearest content copy directed by such a trail. Sourlas et the content caching history during the content cached up al. propose an intra-domain cache-aware content searching and down. The trail and content popularity information scheme that computes the paths with minimum transportation helps to find a “best” (e.g. closest) available replica cost based on the information item demands and the caching arbitrary caching topology of CCN.
Recommended publications
  • Customizing and Extending Powerdesigner SAP Powerdesigner Documentation Collection Content
    User Guide PUBLIC SAP PowerDesigner Document Version: 16.6.2 – 2017-01-05 Customizing and Extending PowerDesigner SAP PowerDesigner Documentation Collection Content 1 PowerDesigner Resource Files.................................................... 9 1.1 Opening Resource Files in the Editor.................................................10 1.2 Navigating and Searching in Resource Files............................................ 11 1.3 Editing Resource Files........................................................... 13 1.4 Saving Changes................................................................13 1.5 Sharing and Embedding Resource Files...............................................13 1.6 Creating and Copying Resource Files.................................................14 1.7 Specifying Directories to Search for Resource Files.......................................15 1.8 Comparing Resource Files........................................................ 15 1.9 Merging Resource Files.......................................................... 16 2 Extension Files................................................................18 2.1 Creating an Extension File.........................................................19 2.2 Attaching Extensions to a Model....................................................20 2.3 Exporting an Embedded Extension File for Sharing.......................................21 2.4 Extension File Properties......................................................... 21 2.5 Example: Adding a New Attribute from a Property
    [Show full text]
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • TRSDOS 6.2 to LS-DOS 6.3.0 Manual Update
    LS-DOSÔ 6.3 UPDATE FOR TRSDOSâ 6.2.X The LS-DOS 6.3 release is an upgrade for the TRSDOS 6.2 operating system. Several important changes have been made to extend and enhance the operating system and its utilities. The date ranging has been expanded to accept dates through the year 1999. Files will now carry a modification time as well as a date. The DATECONV/CMD program is provided to translate version 6.2 or earlier disks to the 6.3 style dating. The user password has been eliminated from the system. The owner password still remains. The library command ID was added to display a customer service number. Several enhancements have been made to BASIC. The new DISKCOPY/CMD program will duplicate 5" double density floppy disks. Because the LS-DOS 6.3 update is a series of enhancements to TRSDOS 6.2, the primary documentation remains the 6.2 manual and Technical Reference manual. If you have a version of TRSDOS earlier than 6.2, you can obtain the manuals from Radio Shack under the catalog numbers 26-0316 (TRSDOS Version 6 [6.2 DOS manual and disk]), 26-2110 (Model 4/4D [6.2] Technical Reference Manual), or 26-1117 (6.2 DOS manual only). This documentation should be treated as an addendum to the TRSDOS 6.2 information. LS-DOS 6.3 installation instructions Before performing the upgrade, it is recommended that you make several backup copies of the 6.3 master disk. The simplest way to do this is to boot your system using the 6.3 diskette, insert a blank diskette to receive the copy in drive 1, and type the command: DISKCOPY :0 :1 When the copy finishes, you can insert another destination diskette and make another copy.
    [Show full text]
  • Objects and Classes in Python Documentation Release 0.1
    Objects and classes in Python Documentation Release 0.1 Jonathan Fine Sep 27, 2017 Contents 1 Decorators 2 1.1 The decorator syntax.........................................2 1.2 Bound methods............................................3 1.3 staticmethod() .........................................3 1.4 classmethod() ..........................................3 1.5 The call() decorator.......................................4 1.6 Nesting decorators..........................................4 1.7 Class decorators before Python 2.6.................................5 2 Constructing classes 6 2.1 The empty class...........................................6 3 dict_from_class() 8 3.1 The __dict__ of the empty class...................................8 3.2 Is the doc-string part of the body?..................................9 3.3 Definition of dict_from_class() ...............................9 4 property_from_class() 10 4.1 About properties........................................... 10 4.2 Definition of property_from_class() ............................ 11 4.3 Using property_from_class() ................................ 11 4.4 Unwanted keys............................................ 11 5 Deconstructing classes 13 6 type(name, bases, dict) 14 6.1 Constructing the empty class..................................... 14 6.2 Constructing any class........................................ 15 6.3 Specifying __doc__, __name__ and __module__.......................... 15 7 Subclassing int 16 7.1 Mutable and immutable types.................................... 16 7.2
    [Show full text]
  • PDF Command Line Suite Version 4.12
    PDF Command Line Suite Version 4.12 User Manual Contact: [email protected] Owner: PDF Tools AG Kasernenstrasse 1 8184 Bachenbülach Switzerland http://www.pdf-tools.com Copyright 2000-2018 PDF Command Line Suite, Version 4.12 Page 2 of 65 November 27, 2018 Table of Contents Table of Contents ............................................................................................ 2 1 Overview ............................................................................................... 6 1.1 The Different Tools.................................................................................. 6 1.2 Installation............................................................................................. 7 1.3 Using the Tools ....................................................................................... 7 2 License Management ............................................................................. 8 2.1 Graphical License Manager Tool ................................................................ 8 List all installed license keys.................................................................. 8 Add and delete license keys .................................................................. 8 Display the properties of a license ......................................................... 9 Select between different license keys for a single product ......................... 9 2.2 Command Line License Manager Tool ........................................................ 9 List all installed license keys.................................................................
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands
    LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 2: Essential Commands Table
    [Show full text]
  • Microsoft® Official Academic Course: Networking Fundamentals, Exam
    Microsoft® Official Academic Course Networking Fundamentals, Exam 98-366 VP & PUBLISHER Barry Pruett SENIOR EXECUTIVE EDITOR Jim Minatel MICROSOFT PRODUCT MANAGER Microsoft Learning SENIOR EDITORIAL ASSISTANT Devon Lewis TECHNICAL EDITOR Ron Handlon CHANNEL MARKETING MANAGER Michele Szczesniak CONTENT MANAGEMENT DIRECTOR Lisa Wojcik CONTENT MANAGER Nichole Urban PRODUCTION COORDINATOR Nicole Repasky PRODUCTION EDITOR Umamaheswari Gnanamani COVER DESIGNER Tom Nery COVER PHOTO: © shutterstock/wavebreakmedia Copyright © 2017 by John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc. 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008. To order books or for customer service, please call 1-800-CALL WILEY (225-5945). Microsoft, Active Directory, AppLocker, Bing, BitLocker, Hyper-V, Internet Explorer, Microsoft Intune, Microsoft Office 365, SQL Server, Visual Studio, Windows Azure, Windows, Windows PowerShell, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious.
    [Show full text]
  • Konsole and Line Commands
    Konsole and Line commands Konsole is a terminal where you pass commands directly to the system instead of working with a graphical [user] interface (“GUI”). 1. The figure shows several examples of line commands: i. “pwd” (= print the workind directory) + ENTER. This is very useful when you want to know where you are! ii. “cd” (= change directory). This example illustrates a very useful feature when working with a terminal, especially when the name is long or when you can not remember the exact name. I type: “cd L” and then TAB. The system suggests two possibilities: LEARN and LATEX. Since I want to go to LEARN, I add the letter “E” to “cd L” and push TAB again. The system now completes the word and produces: “cd LEARN”. Now all I have to do is push the ENTER key and I am in the directory LEARN. If you are in some sub-directory and you want to go to /home/student, which is your main directory, then just type “cd” without specifying any further sub- directory. iii. “ls” (= list). Now that I am in LEARN, I want to see which files are there and so I type ls and then ENTER. If I just want to see which PDF files are in LEARN, I would type “ls *.pdf”. Here the asterisk stands for any number of missing characters and so is called a “wild card”. iv. In (2) and (3) we were look for a directory, but the same thing holds for com- mands. Try typing “o” plus TAB, them add a “c” to form “oc” plus TAB and finally—as in the snapshot—“oct” plus TAB.
    [Show full text]
  • MS-DOS Microsoft Disk Operating System
    emeronbEnßm MS-DOS Microsoft Disk Operating System 1-esckþIepþIm kñúgEpñkenH eyIgelIkykmkEtEpñkRKwHmYycMnUYn énRbB½n§tMeNIrkar edIm,IgayRsYl kñúgkar EsVgyl; MS-DOS nig eRbIR)as;bBa¢a rbs; . EtmunnwgsikSaeTAelIRbB½n§tMeNIrkar Gñk (Commad) DOS MS-DOS RtUvEsVgyl;eGay)anc,as;GMBIGVI ehAfa nig kñúg sin . File, Directory Directory Structure Windows - KWCasMnMuénÉksarEdlpÞúkenAelIépÞ rbs; ehIyvamaneQµaHtMNag nig File Media Disk TItaMgc,as;las;mYy . GacCakmµviFI Éksar b¤ File (Program), (Document) Collection of Data . .doc icon Extension Filename - KWCaTU b¤ CaftsMrab;pÞúkral; eTAtamRbePT gayRsYlcMnaM nig Directory or Folder Files EbgEck ehIyenAkñúg mYyGacmanftsMrab;pÞúkral; CaeRcInteTot ehAfa Directory Files Subdirectory or . Subfolder eTAkan; Path File POD.EXE 2-RbB½n§tMeNIrkarsMrab; IBM-PC kñúgEpñkenHeyIgnwgsikSa Cak;EsþgGMBI EdlCaRbePTkmµviFImYycMa)ac; CaTIbMput sMrab;RbePT DOS IBM-PC bc©úb,nñenH . mann½yfaenAmanRbB½n§tMeNIrkarepSg²CaeRcIneTot dUcCa sMrab;RbePT System Macintosh nigmanRbB½n§tMeNIrkar . UNIX,Windows ... RbB½n§tMeNIrkar KWCaRbB½n§kmµviFImYy eRbIsMrab;RtYtBinitüéntMeNIrkar RKb;RKgkarEbkEck (Operating System) nig eRbIR)as;épñkepSg² énma:sIundUcCa ryHeBlcaM)ac;sMrab; kareRbIR)as;én nwgk¾dUcCa CPU Memory bNþal]bkrN¾xageRkAepSg²eTot . 3- KWCaGVI DOS ? mkBIBaküfa mann½yfaCa RbB½n§tMeNIrkarrukrk nig eFVIkarelI DOS DISK OPERATING SYSTEM Disk (Harddisk or . vaCaRbB½n§RKb;RKg RKb;RKgÉksarenAelI dUcCakarcMlg lubnig karbegáIt Diskette) Disk Space Disk erobcMbegáIt b¤ .l. cUlGñkRsm½yemIlfaebIKµan RbB½n§tMeNIrkar Diectorys, Partition Track
    [Show full text]
  • Agilent Technologies Connectivity Guide
    Agilent Technologies USB/LAN/GPIB Interfaces Connectivity Guide Agilent Technologies Notices © Agilent Technologies, Inc. 2003, 2004 Warranty Restricted Rights Legend No part of this manual may be reproduced in The material contained in this docu- If software is for use in the performance of a any form or by any means (including elec- ment is provided “as is,” and is sub- U.S. Government prime contract or subcon- tronic storage and retrieval or translation ject to being changed, without notice, tract, Software is delivered and licensed as into a foreign language) without prior agree- “Commercial computer software” as ment and written consent from Agilent in future editions. Further, to the max- imum extent permitted by applicable defined in DFAR 252.227-7014 (June 1995), Technologies, Inc. as governed by United or as a “commercial item” as defined in FAR States and international copyright laws. law, Agilent disclaims all warranties, either express or implied, with regard 2.101(a) or as “Restricted computer soft- ware” as defined in FAR 52.227-19 (June Edition to this manual and any information contained herein, including but not 1987) or any equivalent agency regulation or contract clause. Use, duplication or disclo- Second edition, November 2004 limited to the implied warranties of sure of Software is subject to Agilent Tech- Agilent Technologies, Inc. merchantability and fitness for a par- nologies’ standard commercial license 815 14th St. SW ticular purpose. Agilent shall not be terms, and non-DOD Departments and Loveland, CO 80537 USA liable for errors or for incidental or Agencies of the U.S.
    [Show full text]
  • DOS to UNIX Translation
    DOS to UNIX Translation DOS to... UNIX notes attrib change file chmod attributes cd change cd chdir directories chkdsk display free df disk space cls clear screen clear comp compare files diff copy copy files cp cp to copy files, copy to copy directories, and tar to copy copy files or directories onto floppy disks or tapes. tar date display date date displays the date and time, cal displays the date, system date cal time, and a 3 month calendar. and time del delete files rm Use caution with rm and wildcards, rm * removes all (no undelete option)! deltree delete rm -r Recursively removes the specified directory and its files directory and and subdirectories and files. (no undelete option) files dir list contents ls There are several options to ls including ls -l to see long of a directory lists, ls -c to see a list in columns, and ls -f to see a list indicating file types. diskcomp make a track- diskcmp by-track comparison of two floppy disks diskcopy copy a source diskcp disk to a target disk edit to edit text vi vi is a full-screen text editor with powerful search and files replace functions. edlin line editor ed ed and ex are predecessors of vi. ex fc compare two cmp cmp to compare binary files, diff compares two text files, files diff and diff3 compares three text files. diff3 find find text grep The UNIX find command finds files on the system, within a file and grep (global regular expression parser) finds text within a file.
    [Show full text]