Data Manager for Evolvable Real-Time Command and Control Systems

Total Page:16

File Type:pdf, Size:1020Kb

Data Manager for Evolvable Real-Time Command and Control Systems Data Manager for Evolvable Real-Time Command and Control Systems Eric Hughes, Roman Ginis, Bhavani Thuraisingham, Peter Krupp, John Maurer The MITRE Corporation, 202 Burlington Rd., Bedford MA, 01730-1420 {hughes,ginis,thura,pck,johnm}@mitre.org from research to implementation. We also discuss cur- rent implementation efforts for the USAF’s AWACS Abstract (Airborne Warning and Control System). Moderniza- tion of the AWACS mission computing system involves We describe the design and implementation roughly a 40 staff-year effort over the next three years. of real-time data management services. These As with many such efforts, there is not enough money services combine technologies developed in available to replace the system (AWACS) in one block the context of real-time distributed object upgrade, so the approach is to use partial upgrades as management, object DBMSs, and scheduling. an opportunity to migrate the system gradually. This combination simplifies many of the ser- vices, and produces a result which is greater We use the following terminology to properly char- than the sum of its parts, because it can be acterize and give attribution for this work. Our RTDM used to improve the portability and flexibility design is a product of MITRE research in coopera- of real-time applications. tion with Victor Fay-Wolfe at the University of Rhode Island (URI). A descriptive vlhite paper on a real- 1 Introduction time Common Object Request Broker Architecture (CORBA) [COR96] is being developed by the real- Many real-time command and control systems have time PSIG of the Object Management Group (OMG); been deployed which use custom-written real-time a standards effort. We have prototyped some of the key data management (RTDM) software that is highly elements of our design. MITRE AWACS personnel, tuned to particular requirements. This custom soft- USAF, Lockheed-Martin, and Boeing have provided ware is not only expensive to develop, but because valuable feedback on the design and prototypes. Fi- it is entwined with the applications, must be rewrit- nally, we relate our work to the implementation being ten when requirements change. We have developed done by Lockheed-Martin and Boeing. an approach that makes real-time command and con- We began by examining the problem of building trol software more evolvable by using shared, flexible distributed, fault-tolerant, hard real-time command RTDM services. and control systems, in collaboration with the Soft- This paper surveys past and ongoing RTDM and ware Engineering Institute (SEI) at Carnegie Mellon distributed object systems work by the authors and University (CMU) [SLB+92]. We then identified and several related groups. At MITRE, this work involves evaluated the flexibility of several architectures, with mission-oriented research as well as a prototyping lab, feedback from the AWACS program, and chose a de- both funded by the US Air Force (USAF). These two sign based on distributed objects [BFG+95]. We also groups participate in the transfer of RTDM technology worked with the URI group to extend CORBA to sup- Permission to copy without fee all OT part of this material is port real-time systems [TKH+96]. One of the results granted provided that the copies are not made OT distributed for of this work was the identification of requirements for direct commercial advantage, the VLDB copyright notice and the use of real-time CORBA in command and con- the title of the publication and its date appear, and notice is trol systems. We prototyped real-time CORBA by given that copying is by permission of the Very Large Data Base Endowment. To copy otherwise, OT to republish, requires a fee porting Xerox’s Inter-Language Unification (ILU) Ob- and/or special permission from the Endowment. ject Request Broker (ORB) [PAR971 to the Lynx real- Proceedings of the 23rd VLDB Conference time operating system [Lyn97] and by providing a Athens, Greece, 1997 distributed scheduler supporting rate-monotonic and 558 deadline-monotonic techniques. maining AWACS applications in the legacy environ- ment. The ported surveillance and tracking applica- 2 Approach tion uses our prototype data manager to store, update, and retrieve information on tracks, which represent Here we outline our approach for RTDM services for sensor information about aircraft. command and control applications. Our design con- ORBS are not optimized for efficient object transfer sists of services that form a framework for real-time and caching, which are better handled by an ODBMS systems, as shown in Figure 1. Our infrastructure in- [CB97] that provides additional RTDM services. In sulates applications from the underlying real-time op- our design, the ODBMS uses the ORB for communi- erating system. The ODBMS, Event Manager, and cation that does not involve transfer of objects, such scheduler also use this infrastructure. It is relatively as messages describing triggered events. In the Lock- easy to migrate a legacy system to use our infrastruc- heed implementation, the ODBMS uses the ORB to ture [HR97]. As with ordinary ODBMS and CORBA allow a local thread to connect to a remote database. systems, migrated applications can then evolve with In addition, in our design, the ORB uses the ODBMS minimal changes to RTDM services. Many technolo- for transactions and persistence of objects. For ex- gies are important to this work but here we discuss ample, the Naming Service of the ORB could use the only the critical subset. ODBMS to store its mapping from object references to implementations. Other approaches have been taken to integrate ORB and ODBMS. The OMG Persistent Object Ser- vice (POS) allows CORBA objects to be stored and retrieved using many possible means (files, databases, etc.) [OMG94]. H owever, this is limited as a means Real-Time Infrastructure for integration of real-time ORBS and ODBMSs. For I (ultimately a real-time ORB1 I example, the POS ignores the role of the ODBMS in efficient transfer and caching of fine-grained objects. Real-Time Operating SyStem I I Reverbel has investigated ORB and ODBMS integra- tion in the context of medical information systems, Figure 1: Evolvable Real-Time System. but his efforts are geared to commercial ORB/ODBMS adapters [Rev96]. It remains to be seen whether these We have chosen an object-oriented model for many adapters could be modified for use in real-time sys- of the same reasons given for non-real-time applica- tems. tions . We also have found objects to be convenient In our design, both ORB and ODBMS are further for the specification of real-time constraints (e.g., how simplified by the use of a scheduler, which completes often an object should be updated) and of seman- the set of RTDM services. This approach is detailed in tic concurrency-control metadata (e.g., which meth- the real-time CORBA white paper and is being imple- ods of an object can be executed concurrently). This mented by Lockheed. The scheduler allows threads to approach in effect extends the object model to sup- request resources for computation based on deadlines port real-time constraints, as is done in RTSORAC and priorities assigned. Many of these computations [FWCPP94]. In most cases, this involves the creation may involve ODBMS transactions. The concurrency of (new) object definitions for data in legacy systems, control service of the ODBMS may need to change and these object definitions are then annotated with the priority of a computation (as described below), real-time metadata. For an existing object-oriented which in our design can be achieved by requests to the system, we believe that annotation with real-time in- scheduler. Our design also isolates applications from formation and enforcement of real-time constraints im- the operating system by providing scheduling, com- proves the system. munication, and memory management services, which At the heart of our RTDM services is a real-time improves the portability of applications (even beyond ORB. The use of an ORB greatly simplifies communi- the portability afforded by POSIX-compliant operat- cation between distributed objects, resulting in a more ing systems). This approach is being carried out in natural and flexible integration of systems. We have the current implementation. used the Lynx operating system environment and ILU In our design, the ODBMS provides constraint en- to prototype a real-time ORB (as described in the real- forcement, concurrency control, querying, and persis- time CORBA white paper). We have also ported an tence services. We prototyped an event manager for experimental surveillance and tracking application of constraint enforcement, and found that this approach AWACS to the prototype ORB while leaving the re- is viable for command and control applications. How- 559 ever, we used a real-time relational DBMS (RDBMS) ory as the primary store and our design includes persis- [THK+96] with this prototype, and found that the tence to store database objects. The Lockheed imple- poor performance of the RDBMS and the impedance mentation uses in-memory databases but will provide mismatch between the event manager and underlying persistence for logging, checkpointing, and application databases makes the RDBMS a poor choice. Our cur- needs. rent design adapts the event manager to an ODBMS We believe that a temporal object model is ex- [THK+96]. Lockh eed ‘s implementation supports the tremely important for real-time applications, and this CORBA Event Service, which in turn supports the model should be supported by RTDM services. In specification and delivery of events. Our constraint our design, objects can be defined to have temporal enforcement design uses this Event Service to create constraints (as described above), timestamps, tempo- events caused by updates to ODBMS objects and to ral checkpoint requirements, etc. As with concurrency deliver these events to the appropriate handlers, which control, our design leaves the choice of temporal object can enforce constraints.
Recommended publications
  • Disk Clone Industrial
    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
    [Show full text]
  • Your Performance Task Summary Explanation
    Lab Report: 11.2.5 Manage Files Your Performance Your Score: 0 of 3 (0%) Pass Status: Not Passed Elapsed Time: 6 seconds Required Score: 100% Task Summary Actions you were required to perform: In Compress the D:\Graphics folderHide Details Set the Compressed attribute Apply the changes to all folders and files In Hide the D:\Finances folder In Set Read-only on filesHide Details Set read-only on 2017report.xlsx Set read-only on 2018report.xlsx Do not set read-only for the 2019report.xlsx file Explanation In this lab, your task is to complete the following: Compress the D:\Graphics folder and all of its contents. Hide the D:\Finances folder. Make the following files Read-only: D:\Finances\2017report.xlsx D:\Finances\2018report.xlsx Complete this lab as follows: 1. Compress a folder as follows: a. From the taskbar, open File Explorer. b. Maximize the window for easier viewing. c. In the left pane, expand This PC. d. Select Data (D:). e. Right-click Graphics and select Properties. f. On the General tab, select Advanced. g. Select Compress contents to save disk space. h. Click OK. i. Click OK. j. Make sure Apply changes to this folder, subfolders and files is selected. k. Click OK. 2. Hide a folder as follows: a. Right-click Finances and select Properties. b. Select Hidden. c. Click OK. 3. Set files to Read-only as follows: a. Double-click Finances to view its contents. b. Right-click 2017report.xlsx and select Properties. c. Select Read-only. d. Click OK. e.
    [Show full text]
  • Introduction to Computer Networking
    www.PDHcenter.com PDH Course E175 www.PDHonline.org Introduction to Computer Networking Dale Callahan, Ph.D., P.E. MODULE 7: Fun Experiments 7.1 Introduction This chapter will introduce you to some networking experiments that will help you improve your understanding and concepts of networks. (The experiments assume you are using Windows, but Apple, Unix, and Linux systems will have similar commands.) These experiments can be performed on any computer that has Internet connectivity. The commands can be used from the command line using the command prompt window. The commands that can be used are ping, tracert, netstat, nslookup, ipconfig, route, ARP etc. 7.2 PING PING is a network tool that is used on TCP/IP based networks. It stands for Packet INternet Groper. The idea is to verify if a network host is reachable from the site where the PING command issued. The ping command uses the ICMP to verify if the network connections are intact. When a PING command is issued, a packet of 64 bytes is sent to the destination computer. The packet is composed of 8 bytes of ICMP header and 56 bytes of data. The computer then waits for a reply from the destination computer. The source computer receives a reply if the connection between the two computers is good. Apart from testing the connection, it also gives the round trip time for a packet to return to the source computer and the amount of packet loss [19]. In order to run the PING command, go to Start ! Run and in the box type “cmd”.
    [Show full text]
  • TB-1052 Digital Video Systems
    IRIS TECHNICAL BULLETIN TB-1052 Digital Video Systems Subject: Installing and Running Check Disk on XP Embedded Systems Hardware: TotalVision-TS Software: IRIS DVS XPe Ver. 11.04 and Earlier (Including FX and non-FX Units) Release Date: 12/22/08 SUMMARY IRIS DVS units initially produced prior to January 1, 2009 may not have complete support for running chkdsk.exe even though the chkdsk.exe file exist in the Windows/System32 directory. This Technical Bulletin describes how to install and run the Check Disk (ChkDsk) utility to minimize file corruption problems and potential RAW Disk failures. INSTALLING SOFTWARE Several additional files are needed to be installed on the DVS hard drive. You can get a copy of these files at the IRIS Web Service Site www.SecurityTexas.com/service. Download the “Check Disk Upgrade” package and follow the instructions in the ReadMe file of that zip file on how to upgrade the files on the DVS. Once the files are copied to the hard drive, highlight the file “EVENTVWR.MSC” and then select “File- >Pin to Start Menu” to provide an easy way to access the Event Viewer. After the required software has been installed run Windows File Explorer and select the C:\BankIRIS_NT directory. Double-click on the AUTOCHECK.REG file. Answer YES in response to the two prompts to update the registry. Expert Mode: To verify that the registry changes were done you can select “Start->Run” and type in “RegEdit.exe” to run the Registry Editor. Select the key “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Sesion Manager”. Select the key "BootExecute".
    [Show full text]
  • Service Information
    Service Information VAS Tester Number: AVT-14-20 Subject: VAS Diagnostic Device Hard Disc Maintenance Date: Sept. 24, 2014 Supersedes AVT-12-12 due to updated information. 1.0 – Introduction If persistent diagnostic software or Windows® 7 operating system error messages are displayed while installing or using the diagnostic software, use the Windows CHKDSK utility to check hard disk integrity and fix logical file system errors. CHKDSK can also handle some physical errors and may be able to recover lost data that is readable. We recommend the CHKDSK utility be run on a regular basis on all VAS diagnostic devices in service. Consult with your dealership Systems Administrator or IT Professional about checking the integrity of the hard disk as described below on a regular basis, as well as regular performance of the Windows DEFRAG utility. 2.0 – Procedure Prerequisites: Device plugged into power adapter and booted to Windows desktop 1. Go to Windows Start > Computer 2. Right click/select Local Disk (C:) and select Properties from the dropdown menu: Continued… 2/ Page 1 of 3 © 2014 Audi of America, Inc. All rights reserved. Information contained in this document is based on the latest information available at the time of printing and is subject to the copyright and other intellectual property rights of Audi of America, Inc., its affiliated companies and its licensors. All rights are reserved to make changes at any time without notice. No part of this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, nor may these materials be modified or reposted to other sites, without the prior expressed written permission of the publisher.
    [Show full text]
  • 1 Welcome to the Superduper!
    Welcome to the SuperDuper! User’s Guide! This guide is designed to get you up and running as fast as possible. We’ve taken the most common tasks people perform with SuperDuper!, each placed in its own chapter, and have provided step-by-step guidance (including lots of pictures). In here you’ll find out how to: • Back up your Macintosh for the first time • Update an existing backup • Schedule one or multiple backups • Store a backup alongside other files on a destination drive • Back up your Macintosh over a network • Exclude a folder from a backup • Restore files from a backup • Restore an entire drive in an emergency situation • Troubleshooting We’ve also included a complete program reference, and some more advanced topics, such as: • Creating a Sandbox • Maintaining a Sandbox • Applying (and recovering from) System Updates while running from a Sandbox Note that SuperDuper operates in two different “modes” – registered and unregistered. The unregistered version allows easy, complete and user- specific backup clones to partitions, FireWire drives, and image files. 1 Once registered, SuperDuper allows you to schedule backups, quickly update backups with Smart Update (saving a lot of time), select “copy modes” other than Erase, then copy, create Sandboxes, fully customize the copying process using its unique Copy Scripts, save and restore settings, and avoid authenticating every time you copy. And, on top of that, it allows us to eat. Disclaimer Although SuperDuper! has been carefully tested, and should perform its functions without data loss, you use this software at your own risk and without any warranty.
    [Show full text]
  • The UNIX Time- Sharing System
    1. Introduction There have been three versions of UNIX. The earliest version (circa 1969–70) ran on the Digital Equipment Cor- poration PDP-7 and -9 computers. The second version ran on the unprotected PDP-11/20 computer. This paper describes only the PDP-11/40 and /45 [l] system since it is The UNIX Time- more modern and many of the differences between it and older UNIX systems result from redesign of features found Sharing System to be deficient or lacking. Since PDP-11 UNIX became operational in February Dennis M. Ritchie and Ken Thompson 1971, about 40 installations have been put into service; they Bell Laboratories are generally smaller than the system described here. Most of them are engaged in applications such as the preparation and formatting of patent applications and other textual material, the collection and processing of trouble data from various switching machines within the Bell System, and recording and checking telephone service orders. Our own installation is used mainly for research in operating sys- tems, languages, computer networks, and other topics in computer science, and also for document preparation. UNIX is a general-purpose, multi-user, interactive Perhaps the most important achievement of UNIX is to operating system for the Digital Equipment Corpora- demonstrate that a powerful operating system for interac- tion PDP-11/40 and 11/45 computers. It offers a number tive use need not be expensive either in equipment or in of features seldom found even in larger operating sys- human effort: UNIX can run on hardware costing as little as tems, including: (1) a hierarchical file system incorpo- $40,000, and less than two man years were spent on the rating demountable volumes; (2) compatible file, device, main system software.
    [Show full text]
  • Analysis of Substitution Times in Soccer
    Analysis of Substitution Times in Soccer Rajitha M. Silva and Tim B. Swartz ∗ Abstract This paper considers the problem of determining optimal substitution times in soccer. We review the substitution rule proposed by Myers (2012) and provide a discussion of the results. An alternative analysis is then presented that is based on Bayesian logistic regression. We find that with evenly matched teams, there is a goal scoring advantage to the trailing team during the second half of a match. In addition, we provide a different perspective with respect to the substitution guidelines advocated by Myers (2012). Specifically, we observe that there is no discernible time during the second half when there is a benefit due to substitution. Keywords: Bayesian logistic regression, statistics in sport, subjective priors, temporal smoothing, WinBUGS software. ∗Rajitha Silva is a PhD candidate and Tim Swartz is Professor, Department of Statistics and Actuarial Science, Simon Fraser University, 8888 University Drive, Burnaby BC, Canada V5A1S6. Swartz has been supported by funding from the Natural Sciences and Engineering Research Council of Canada. The authors thank Bret Myers for his assistance in characterizing the Myers (2012) substitution rule. The authors also appreciate several rounds of detailed comments provided by the Editor, the Associate Editor and three anonymous reviewers. These comments have helped improve the manuscript considerably. 1 1 INTRODUCTION In the game of soccer (known as football outside of North America), teams are allowed three player substitutions in a match. The timing of the substitutions is strategic. For example, if a team is losing, the manager (coach) may want to replace a player with a more attacking player.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Partition.Pdf
    Linux Partition HOWTO Anthony Lissot Revision History Revision 3.5 26 Dec 2005 reorganized document page ordering. added page on setting up swap space. added page of partition labels. updated max swap size values in section 4. added instructions on making ext2/3 file systems. broken links identified by Richard Calmbach are fixed. created an XML version. Revision 3.4.4 08 March 2004 synchronized SGML version with HTML version. Updated lilo placement and swap size discussion. Revision 3.3 04 April 2003 synchronized SGML and HTML versions Revision 3.3 10 July 2001 Corrected Section 6, calculation of cylinder numbers Revision 3.2 1 September 2000 Dan Scott provides sgml conversion 2 Oct. 2000. Rewrote Introduction. Rewrote discussion on device names in Logical Devices. Reorganized Partition Types. Edited Partition Requirements. Added Recovering a deleted partition table. Revision 3.1 12 June 2000 Corrected swap size limitation in Partition Requirements, updated various links in Introduction, added submitted example in How to Partition with fdisk, added file system discussion in Partition Requirements. Revision 3.0 1 May 2000 First revision by Anthony Lissot based on Linux Partition HOWTO by Kristian Koehntopp. Revision 2.4 3 November 1997 Last revision by Kristian Koehntopp. This Linux Mini−HOWTO teaches you how to plan and create partitions on IDE and SCSI hard drives. It discusses partitioning terminology and considers size and location issues. Use of the fdisk partitioning utility for creating and recovering of partition tables is covered. The most recent version of this document is here. The Turkish translation is here. Linux Partition HOWTO Table of Contents 1.
    [Show full text]
  • Forcepoint Appliances Command Line Interface (CLI) Guide
    Forcepoint Appliances Command Line Interface (CLI) Guide V Series, X Series, & Virtual Appliances v8.4.x ©2018, Forcepoint All rights reserved. 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759 Published 2018 Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine- readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Contents Topic 1 Forcepoint Appliances Command Line Interface . .1 Conventions . .1 Logon and authentication . .2 CLI modes and account privileges . .2 Basic account management . .3 Command syntax. .9 Help for CLI commands . .9 System configuration . .10 Time and date . .11 Host name and description . .14 User certificates. .15 Filestore definition and file save commands. .16 Appliance interface configuration. .18 Appliance vswitch configuration . .29 Content Gateway Decryption Port Mirroring (DPM) . .29 Static routes. .31 Appliance status . .35 SNMP monitoring (polling) . .35 SNMP traps and queries . .38 Module-specific commands .
    [Show full text]
  • ISCLI–Industry Standard CLI Command Reference for the IBM Flex System Fabric EN4093 10Gb Scalable Switch
    IBM Networking OS ISCLI–Industry Standard CLI Command Reference for the IBM Flex System Fabric EN4093 10Gb Scalable Switch IBM Networking OS ISCLI–Industry Standard CLI Command Reference for the IBM Flex System Fabric EN4093 10Gb Scalable Switch Note: Before using this information and the product it supports, read the general information in the Safety information and Environmental Notices and User Guide documents on the IBM Documentation CD and the Warranty Information document that comes with the product. First Edition (April 2012) © Copyright IBM Corporation 2012 US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Preface . .1 Who Should Use This Book . .1 How This Book Is Organized . .1 Typographic Conventions . .2 How to Get Help . .4 Chapter 1. ISCLI Basics . .5 Accessing the ISCLI . .5 ISCLI Command Modes . .5 Global Commands . .9 Command Line Interface Shortcuts . 11 CLI List and Range Inputs . 11 Command Abbreviation . 11 Tab Completion . 11 User Access Levels . 12 Idle Timeout . 13 Chapter 2. Information Commands . 15 System Information. 16 Error Disable and Recovery Information . 16 SNMPv3 System Information . 17 SNMPv3 USM User Table Information . 19 SNMPv3 View Table Information . 20 SNMPv3 Access Table Information . 21 SNMPv3 Group Table Information. 22 SNMPv3 Community Table Information. 22 SNMPv3 Target Address Table Information . 23 SNMPv3 Target Parameters Table Information. 23 SNMPv3 Notify Table Information . 24 SNMPv3 Dump Information . 25 General System Information. 26 Show Recent Syslog Messages . 27 User Status . 27 © Copyright IBM Corp. 2012 v Layer 2 Information . 28 FDB Information . 30 Show All FDB Information.
    [Show full text]