Home
View/Open
Contents
1. JA TIU Boa MIA n 4 gt desa my er My Bonn avy whos Rating A LA th 2 vita b onu yp E WE LL a Ds te kot gon A PES d Lite Ros Mat da an L t E j de P 9 164 lus M 4 e mn TE ELITS bor ty tot Mo y Ll 1 LI 1 fe LTE NT LI if e 1 i UD OMS wg a 25 rt wc O Pa Yin a a By ete ene P nd AS m ae A 4 mamiy A cd SADETE AD a FRACA ata da NS ea SE NCIA Sa ca IE wh I E Pe Sie Shri bau ag WR SCH n Mars ni eru Ve dade Wipe e A Mog o A 9 4 78 7 Map Bots Pr EVI dom ONA me Be Be P Machida a aona S eM rer LOL Serre a dt ida n a ee TAN AMA A io a a eda Aq ASA AO PENSA I nq UU T V Re tr n A mma dm MO A alae me o er m UR an Vare T Ae Wt hr Ar ds i ikea Mu 8d aan Ry Nara each o MO ET DAM dam Mapa a HH Nae AS ge gt f a ve LEER De Do a a WALDE iy hra TTT N es ta RE ey Ay o pn te aes ates rele a a eater perl ARE o im er Da de bAa Lee y Ur u Uu MA a d Arda Daia Men CO adhe en LT A 4 2 8 e 1428 Aria dr tias ra ERP ATO arte PASO A Dead hod HA der TORTE ERLERNTE WAFERS rn ha e Lowe err eL reece My AS Ha Nt RRP Wai A ay caes tie e eh byt TT AD ween des ren AS TP A etna el To CUM chegas ae NOVA ad A MM Rep fu Na ne e m Rt aan a M TDA Oman CO AA A Siga am Meter qui u amp SAL Mc do d ie vane ing NRG ma uw GABI AA E La We tarot tag s an A IDO Y LT PR us jl tence cy han ae re eri t Jefes Ate ERE CAMA edo TA a Rap o ee A ACA Rd Germ e f Bs b
2. followed by a 1 2 or 3 Because brackets can only be used to represent and match a single character the shell will not list a file named chapterl23 A range of characters can be used within the brackets Therefore typing ls chapter 1 3 will produce the same results as typing ls chapter 123 A range of letters can also be used within the For example if you use the range a z the shell will search for lowercase letters while if you use A Z it will search for only uppercase letters Du Once you understand the meaning and use of these three metacharacters you can gain an even greater advantage by uSing them together For example Is A 2 will provide a list of all files which begin with a capital letter While ls 0 9 will list all two character filenames which end with a number 1 7 PES BORA Another shortcut offered to UNIX users by the C shell is the history mechanism This capability is not available with the Bourne shell The history program stores your most recently executed command lines and allows you to reexecute them To see a list of the recent command lines which have been stored type history The shell will return a list of the command lines and their line numbers This is an example of what you might see 52 7 8 history pwd cat myfile cd usr sample ls l more file one cd HOO PWN ps To reexecute one of the stored lin
3. i s CEE PE R id at uh Er AA e agia en 1 d 1 ohne CM 5f wt sE ne y E pelt a Amtes AAA A AA of ES ASA A fap TA E yr apo A v t fas it Pie to e E Le 4 es 9 et ADO Oe aa td pant PAM CMS aur e t A o 46 4 MA E 1 pra Mad n set ort A Lo mend std ADA CA neen en s ms re ege a Madi APS Eco d E Dy 144 wt y us LETTO Dt F le LI r t 2 03 nd PERA TREE Pind S dap o Muf atit p mts oe Pape ir t 4 M RM 1 5 a Pa a ads 4 dt do Gia ar ee n oa N uas d 44 As 4 A P d y ENS AROS massa ok ds bo x D t a 4 s ir curet ol APSE Aat i adus 2o p ir P ds de oih de pe P 45 92 hei a nr PT fad DP a gt Burn amd owt ow uv un EE athe r de 4 EAE EA qdo 1 o gb b e ae E r n eg am a S a 4 o A Salta 4 do ea odes ples pte es pie Pi wn bo 1 k Piaget E fal anal annann ah oa AP Ra A we H PP 3n e n ds a 4 mtf ali V u A rey eins cioe md dal ame got d 2 nn gt 4 1 1 E PE a Sueste Donnie a dera dr eS E A AAA q d 1 gt ES eise ear eiae ug an DR x T wae OPUS aM ah E ds 59 moe pi nm d a we See Sadr inet AD ann a 5 J re Yo wm s a ge Bieter apm MAL te ee tere x LIU y TER PLOT f idi b nt ASA P S AH Patani ied 1T d de A J 4 i gy Ee ee WE i E fi 25 zn hotas Pot e FA Sr bd na d 4 a4 A 1 er Mies Deh Weg p ss E z t M n E 4 ed ma etat de im qi pd dad de E ja e owe f e a oia e
4. 5 6 RENAMING OR MOVING A FILE The move command mv allows you to rename a file in your directory or move a file from one directory to another To rename a file type mv with the old filename followed by the new name For example mv old name new name will rename the file old name to new name The following are guidelines to consider when naming or renaming a file a name can consist of 1 to 14 characters 35 all characters other than are legal However it is best to use only letters numbers the period and the underscore _ do not use a period as the first character ina filename UNIX distinguishes between uppercase and lowercase characters Therefore for typing ease you should not use both cases ina single filename use meaningful names which identify the contents of the file If you create a file under another directory and then want to move it to your own directory you will also use the mv command First you must know the pathname for the directory to which you want to move the file Then you must ensure you are in the directory that has the file you would like to move You can do an ls to check this If you are not in the proper directory use the cd command explained in Section 5 2 to change directories To move the file to another directory without changing the name of the file type mv followed by the pathname of the directory to which you want to move the file To move fil
5. V UNIX and ENDS Step By Step Guide Brady Communications Company Inc 1985 Silberschatz A and Peterson J L Operating System Concepts alternate ed Addison Wesley Publishing Co 1988 AT amp T Bell Laboratories The UNIX System User s Guide Prentice Hall 1986 Shaw M C and Shaw S S UNIX Internals A Systems Operations Handbook Tab Books Inc 1987 O Connor R J The Long awaited Age of Unix is Finally Beginning to Dawn The San Jose Mercury News V 138 p IE March S TII Christian K The UNIX Operating System 2d ed John Wiley amp Sons Inc 1988 Bell Telephone Laboratories Inc UNIX Programmer s Manual 7th ed v 1 1983 72 INITIAL DISTRIBUTION LIST No Copies Defense Technical Information Center 2 Cameron Station Alexandria VA 22304 6145 Library Code 0142 2 Naval Postgraduate School Monterey CA 93943 5002 Dr Norman F Schneidewind Code 54Ss 2 Department of Administrative Sciences Naval Postgraduate School Monterey CA 93943 5000 Dr Magdi Kamel Code 54Ka 2 Department of Administrative Sciences Naval Postgraduate School Monterey CA 93943 5000 Curricular Officer Code 37 1 Computer Technology Programs Naval Postgraduate School Monterey CA 93943 5000 LT Charlotte V Smith 2 NMPC 471 Naval Military Personnel Command Washington D C 20370 73 323 amp 99 Thosio 59755 cc Smith The use of a UNIX b
6. V ae n erg AI Wa rr py VET at PA jm gage Pin Do Tow weg 4 bad Chasen A y aa Lia TE WF VE ME a lt q 939 949 NALE S Une A LE 9 39 Pg iris y vl HARTE Ser eles owe ay y 1703 73 Se gigs v Kar Lh La EP rey ae pano h ir ta iy Nt roit e PA ET 4 qa i oh MRI ea AT p fa E Mure p Apr ren wu A mon ee d e empire Sen FA PA Eri le a y ati O URES mt y Ka Ta ve he wer AM er M AA A WOT shay TNS LA yy ATA c ur cy AS A EVN yog p AA Y ee URAN e e AST As CAN HN SIN aa ye BL g Rx dv hay gay EN y nn wy ret NOR IEE ya prea TE Prisa y IPR A ah a LUTHER TAP hogy H ML o erui re ai LICH ee Yr gran A e M go 4h ee re E re n AR 19 SA eo y Put A Ur I hep MENA nk AA SA a a y Nin PMO gt ot ae 4 Antea Ui LITE gem o AER AI Uy js rim RMS dir fy VAR s 1 ci Evo u Ver er mta Ph 5741 r Sr rw ue DLE Prat ape ne a ET inven Ae wg POUT ope ye hag b a ayi WIRY atl al FORE QUI ag ins E 8 J AI Ae Var ad p pr VAN Mays ng bedi ss eth tt La YO PRO dp grs ete 3 m Y Ie AA AD ee a SY 78 y e pp tay PAST a Sa reg iv Cry ua ws 70 4 QU 17 mo MET EDU bey pi N vig pte g s ER ee N Try PEDIA ys cree Era AA YA et v M ELE Be ay x ira wre HV AIVE rt ah n uL yet wg ig Vu as g a y ya A Da p Hoa ALB qvos o 5 ey ne T venta AA Aged aa M 2 M GEN o PSH tay j 1 M dad AR A CRA a P LEE Y AAA a 1 gi lie 4 ANOS PO NOM TO ase Lir T m TH LA U Jau RR A Ud Y vo iva th bn tos n Prey Md E Mod e T
7. part As RN er BN p r a gt po gt z Wein o A A ts uN Y WEB AA 5 Je P PS veu su JA 1 E i hs Er Mende ST Mim rw ere an ir E teem lieg nn k gt buy nn y De s se y ye sie Je toch ere dee A COGI ded NA ds i g eh yt E JM err eee Su an p bia OP Het x VP y P 1 t mara hes viele patie PA Pm rr A NI adia a VS dos lm ani banca wen V Mee ela DUEN ju MEN E ur as Y Tb k reg Pedi E LL id el ade Rte te Pure APP A Pe sl LAL tb LLUR saiti aii y vi T hen luft iett ahala dg aras Fe en hre CRM Fe RV A res AS Pisca 3 ONE C A CD cena c T PA MORIS tee s S tl ry eye rh dy A TEM eX Ey d la X 3 0v steel ou AUS Ie a IT e Yes ype YO ete a ahs sere e AMO ht re tad 5 A 5 BEE 2 a my j 3 ba OE 7 Fi tah V ety Y Y n LM g d Uu Seu NR Que te NA Eee rent rase RA AVAATA Sii Pre M ve eom n aC VP avus uer SATO fo Me II TITO en dba Lt Feier ee AL Pa helene dls K nwet pwe A denied ra AO E LP d h et ee O PR ID SR Seen LET Pe dec DELL rk nos A etd e ree ne S t T E PO IMP AD Y e mw ty ava i uei DATA nra P dL EE E E e t UA Porch ra FA i e e DL T E PAPA ILE Ip Y a JU ANE j ve AO u ni aien O Nr ANO mr Cw E A 4 PL eu mo POR P wrt DAR A SPINA E 4 E f a 46 Sele fn Pj KENDO nyir Ai 9 erp AN Jp are ar ee 4 M a A iain at EERE iive ERE io MM rhy Oh apy itl AA T yee AE LA 1 CEP e A ET ee SA A un i E VER Cp do B O Cm Dj A
8. r fy oe Been x hg mp dais blab Pw d ges n Puta UY e t A PY Brews Park s ed a DN ms i LA a e dosti meh m pbi Do Area S d MA oleis la bd vegan en A Leere Fe SU mni Lava ta je eid GE a uni nn PA A yet Do cn A a E Pe Ibi Men fi eS TP e x vom Tw a s Pi in AAA Lo e z dan o ging tane me 1 A ey 4 Xu wA a ihh u Yr ty gt y ada i biy a gt P N wii ato af ng od qria ay da nom ag unge Pinan Winged m Ne ice do den 7108 ll E Manier u de DDD ASS a da orev ane a bad N ure Yan bret aa eer Vd mmt ody ME Lm 4 ps Seta pd mae ae Mai em MEA S ni LIT ew de HE M gud fn as Mere ns as N e Joo Deo ae u ema v ei of twits we UT loce ts Prid Ce serre e p HEE PM mS aei c cien IN Asp ies O tte t ar m 4 y ro ts Q ar LANA A oe ELLE An q Ir dado v s ete dt ee aas re ae meet o b A d my Eo EU ei PET bean E E LIO E sa Be alee ade b ty a EE UE ag rot w As MENS Hz ma Thi T en Ku AS EM gt E am 6 Pi ot age L Lt qu m a k et adber meno s SUE v mes An A LLEN 1 Lad LL ty isad Jl 2 4 FEN ho A A mm u 1 Mar ea amp 9 aA s NEN hp te fva LLLI s Si at A b TE pa q e wah m wnd a o a ia LI A wie da a t Q we sy ud md E Par tu DNE PE ul USA EN Lom veg hdd qr p te ARMEN x Madang RE ay O AS he PARE A mm MM Ca Ko po
9. which provide special privileges to the user should be particularly guarded Passwords associated with these userids should be changed frequently and should be protected from unauthorized use The superuser privilege su which permits unrestricted access to system files should also be protected in this manner 4 Management of Disk Space Because the Information Systems laboratory s symmetric 375 workstation does not have any external storage it is vitally important that the file space 13 availability on the hard disk be properly managed Disk usage can be monitored using utilities provided by the operating system Resource control by limiting the number of files or amount of disk space allowed for each user can also be enforced If available disk space is diminishing to a level below what is sufficient for normal operations files must be removed or compressed Using the UNIX mail system directions can be sent to users to remove their files which are no longer needed This can also be managed with the assistance of instructors whose classes have been assigned group userids Another option available would be to compress using the pack utility large system files which are rarely used Files which are packed cannot be accessed by UNIX programs therefore the unpack utility must be executed before using the file SYMMETRIX offers a utility called quota which allows an administrator the ability to ration disk space He or
10. 375 during introductory level Information Systems courses Providing interested students with a copy of the user s manual will allow them the opportunity to experiment with a UNIX based workstation on their own Exploring the system and its uses will not only prepare users to take advantage of its capabilities but it can also provide them with an increased understanding of computers and operating systems as a whole Both a programming course and an operating systems course are required for the Information Systems track students could use the Symmetric 375 system in connection with their programming course for editing and developing files for the various language interpreters and compilers available Additionally by interacting with the SYMMETRIX 11 operating system they can better relate to the concepts and theories presented in the operating systems course B RECOMMENDATIONS A Symmetric 375 UNIX workstation has been successfully installed in the Information Systems laboratory This workstation is equipped with the SYMMETRIX operating system a version of the Berkeley 4 2 BDS operating system Ref l p 15 To ensure proper and continued operation of this computer system an effective systems administration program must be established The following recommendations for the program can be accomplished through the system administrator Appendix B provides a quick reference chart to assist the administrator l Location The Symm
11. CE SL Y RA E viga sig is ba t D 7 r LN yri LN S MEN Me sy p a E A er ze ad ig L P Ries raa oy es NF inwa jo gago pra o E ae dg dva so M a LP P pte aT 3 RER as dele 994 v sve aras He Djs ros a TP Fg rao T amp v dus q PA PIR am MOREVA re gay gh iy or go ge Pri C O ri pg ut rna KELTE TER I yy yag Sud me CDS od uas er ame LIE wu o oro al EU JA SPP s Ya ay HELP ir iia ent sinta en E i p y Far O audeo va 4 ven D nae LE HET Cs A LEM 1 MA O Wa Per bua ofa wu 17 4 TEEN e Ny eg se el yt np O IT IE 19 150145 z as Ti Po hiiva LUE of r J LAOTHEJ 4 a 5 y rs q ma RA ALA TO v Fe CA t Ver Mort hy 1 ve TPP at PORTA WE is gray Et 1 SHE There De pais prio y PAL CPP TT CAS TE PINTA NE EET a EAT SE at j th 5 9 Vers FAC Q6 Ape nt b iu egit n Fr 441 q ya Mod 1 aquai wey TE Ayah pd epa yh ee eMe e a a Nd Spe Mea E m ents LI P 4 LII L i D bag e LI LI D MN ur A sv NIIS y Ss PE as igh ge unes stare d gate am 143 PO MID 4 PY P wet ET DE A u A 19a en 5 D0 yoy DM H a DA LE LO Bis P ig rg Hes dE E d pisa AMIA SETA MR 4 PRA tara ho M euis D EN TBI Ap p wear ety OA COP Fog pte Ota M bs tv RN aes ie ann Mtge a cnt A ae dtr gt 17 4 vr wir LOSS IDITUY da te de HRY Pa H T ut pri a SS AT Dave Y Aa AA
12. a filename and can be placed anywhere in the filename They are used to match a Single character match a string of any length 49 match any of the characters which are enclosed in the brackets Using the 1s command the following are examples utilizing the metacharacters ls chapter The replaces one character in the filename therefore this command will list all files in the current directory which begin with chapter and have one more character For example the shell might respond with chapterl chapter2 chapterz Because the represents only one character it will not list names such as chapterla or chapterl2 These could however be listed by typing ls chapter If you would like to depict multiple characters in a filename the can be used For example ls chapter will prompt the shell to list all files whose names start with chapter regardless of how many more characters may exist in the name The following are examples of names that the shell might list 50 chapterl chapter5 a chapter71 chapterindex As with the symbol the is used to represent just one character in a filename However using these brackets allows you to designate specific characters or a range of Characters which can be represented For example if you want to see if any files exist named chapterl chapter2 or chapter3 type ls chapter 123 The shell will look for chapter
13. is a command that the user enters to display the name of his working directory more on this command is explained in Section 5 2 It is important to note that all commands must be followed by a carriage return lt cr gt This is accomplished by pressing the return Key on the Symmetric keyboard The system will not respond to your command until you have hit the lt cr gt to indicate a request to the system The UNIX system responses are also presented with an indented format but are shown in normal type face An example of this is Yusr is2100 Special keys discussed in the manual include the escape key lt esc gt which is in the upper left hand corner of the keyboard and the space bar located at the bottom of the keyboard One other very important key is the control key Pressed by itself the control key has no function However when used in conjunction with other keys it can perform many operations Some of these operations are discussed in the next section 1 3 TYPING CORRECTIONS If you discover that you have made a typing error before you press the carriage return lt cr gt you can make corrections to the line using control characters For example when the control key and the letter h are pressed at the same time represented control h or H the system ZU will move the cursor back one space and erase any character there The backspace key shown on the keyboard as Bs does the same function Although
14. p 1 2 With the availability of this kind of generic software a new individual operating system no longer needs to be written each time a new computer hardware system is developed UNIX is sometimes referred to as portable because applications developed in UNIX on one computer system can be moved to another system which is running UNIX Differences do exist between some versions of UNIX but if some modifications are required to run the program on a new system these should not be significant changes 2 Processing Environment The UNIX processing environment is interactive with multi tasking and multi user capabilities Multi tasking refers to the fact that many programs can be run concurrently This capability gives UNIX the ability to maximize resource utilization increasing the efficiency of the computer and the productivity of the programmer For example multi tasking permits the user to submit one file for compiling or spell checking while still editing another Multi user is an environment where several users have access to the computer resources at the same time By logging in individually to the system users can be identified uniquely and be permitted to operate without interference from the other users of the system They can also share programs and data if desired 3 Filesystem One of the outstanding features of UNIX is its simple filesystem Using directories the filesystem is organized in a hierarchical structure
15. subjects in any order which you desire However if you are a beginner to UNIX it is recommended that you complete the subjects in the order given You may stop at anytime ina lesson by typing bye Remember the last lesson which you complete so that when you return to the course you can begin where you left off 28 Because the learn course is based on standard Unix you may find some differences between it and this manual The manual was written specifically for the SYMMETRIX software environment rely on it when there are discrepancies between the two To learn more about the on line tutorial learn type man learn and read the manual s reference on the command 29 5 FILE MANAGEMENT 5 1 INTRODUCTION TO THE BEE sows fan One of the best features of UNIX is its simple filesystem It is made up of the following Directories Collections of files and other directories They provide a means to logically group files Ordinary files A collection of characters such as text files programs or data Special files Files which represent input output devices such as a printer or terminal 5 2 lt DIRECTORIES Using directories the filesystem is organized in a hierarchical structure like a tree The highest level directory is the root directory It is represented by a slash There are many second level directories on the system but the one with which you should be most concerned is the usr
16. ty A ui en Y w x GPE 227798 LLorem dip i CAD A ng MERO qu MAKE rure ond Presenta egi tet AW f LA t VAT Se Ila ws SEE rA e UP grabs y qe yop wy l N Ha E io MUT ere eas epe p LOL TI EM MARA e a rue y Cet al pn Y UI sa eisernen Wis dar LL br Ie e 3 9 IS were Ya in ge x 7 44 Do 2 apis were ive Ferrata ELO rada as ATA va va me rr eR A re rie yo d ME LL Ua qun HUE v Pega AA d ea fa Tu mf Pear Alera T T i Dow Irina ya 1y Bases gt ary ries aria rice tether ER ref A DAS Siegen ARI ise mo N J95e LU ive eyng ae Vile Vin tgp x no dy A pa ig 9a a o Mas Fis ev P355 opo OI Mp i a UIl ie yee day y vr 3 d ree aee a ee VPE Dae a LI Hy tai dentina TAG oy 2 at wae Y PP ives o 1 O 2 5 ck nv dra VA VI egre en Lal Ca yy Peter Ser ri 7 E Trug Ya MILLE Dum O TUI ms t ur inu OOo p eL JA Ha dues T une Pr ae 1 1 i pli A LOL Y ode YC ae L C YS 4 labs Lu SR va ged viri pagas VA Gey Longa e UTD p Dr E GRA 0 ig 1s Siri Vs vee Waves i wees won 14 stage rise T Da 4 Hie DT Had de O alee Mi aha tk ade UR fA WIT es AW r4 Q agn pni ap Ay LU 14 gt i ps tha ta i LI a A i tor dae m WEIN E f Medi Pt da bor ae Puy igo May dry ta tp Da rt BW AA the we Q9 E O Sc For Yamyra pc vf rr Basa Simy TIER eta era LJ ab M Fine y vis deo ppl q iw as vo Payne FA Vana at ge Fidri a rt NOS aba T9 P xot uL HAL UAS y oH p PEDO yayo AUR sa he OY EM
17. which has been displayed so far You can also advance the file one line at a time by pressing the return key lt cr gt Another way to display a file is with the cat command cat uses the same format as more command followed by the filename For example cat file one will display the contents of file one if a file with that name exists in the current directory Otherwise you will be given an error such as No such file or directory When cat displays a file it does not display one screen at a time It will print out the contents of the whole file before pausing To suspend the output on the screen so that it does not scroll past too quickly type control s S when you want the scrolling to stop To resume scrolling type control q Q As you can see it is often easier to view a longer file using more rather than cat 34 pee COPYING A FILE To make a duplicate copy of a file use the copy command cp This command copies the contents of one file into another For example to make a copy of a file named memo and name it backup memo type cp memo backup memo You can then use the ls command to verify that the file copy was made Be careful when choosing a name for the new copy If a file with that name already exists in your directory it will be written over when you execute the cp command The system does not provide you with any warning to let you know that a file by that name already exists
18. will give you a list of all the options which you can execute lt cr gt Some options include display the next message the current message will not be deleted and the next message if there is one will be displayed delete the current message and go on to the next display the message again save the message to a file called mbox To save to a different file include the filename following the s option Example s msg will save the message in a file called msg quit the mail program D will also do the same To learn more about the mail program and its other options look at the manual entry by typing man mail 66 lO PROBLEMS AND ASSISTANCE 10 1 PROBLEMS DURING SYSTEM BOOT If after following the system start up procedures in Section 2 1 you are unable to get the login prompt power down the system and begin the procedures again If the system fails to properly boot on the second try the system should be reset The reset button is on your left side on the back of the Symmetric 375 system unit Press this button once Allow the system approximately five to six minutes to finish the reset and boot sequence If the system is still unsuccessful in booting power down the equipment and report the problem to the system administrator 10 2 LOCKED KEYBOARD If while using the Symmetric 375 you experience a problem where nothing occurs when you attempt to type in commands or press keys the keybo
19. A bm gata a Pa A o Om MA 5 0 gsc NaP DAA A pais Ri nad an us s 1 si a LEE o s mta eft sra n ol Ad ee PORRO Re girar pe as Apol e A Pic aaa A aes Ud here M aeos gt 4 t Ve tr ael ol Y prim wep De e AS ol QUA Ione eta es e Art PB un sf A TN 3 ap FOR Ha d f toht oe a bt MAP als e ut a v CER der am an Wap tis y j jm ta Sotho R a A fA EK WM Sige t x f OE a E at a LA AI reda im b o OL Koh oe qu Meta ABA teyat PEN Sogra Cones sah ve a e PENNE permit Bale etd to io EMAM e UU ae eod ot Como MERI da Eye E S Psi ai nne A AA Ae e dn I 454 tam A nd AM MA AME does A nye of TES Hg 1 ta i y E rt APP FAP Tet ALi 4er tn Atta Spit ES o a on M LLLI Y E ts ene FA O e APRA pete yD puebla of hee yet T T PPS ptos A gt P f t Hs 1 zen s Trp q AS MA on on 6 aure Lim go AA CF regras i o LU a B ptk ENa d 7 A F 1 a vds Mor nt Mn 1 natat yae ing eens ne an M Muf a edu NUI PEAREN 4 00 er e m i od el pel mU tr hy a i e y ort ia to due re ae so q Frar theae CS ne ama 1 E m P nae Mant ot TRA A DA Ee Ang ote VS IRMA RR gh a an ef tip aret NS Le f mt i as Ree ab E 4 0S Aros SD ote ag E WON II and eni e ot POLA ot erat i an d t i ef mo Mef ms sgy P ikh Learn er media ME PAS Leak PAS TP IS m Tn Rati Daw Ants id oes e 13 4 f f aff Ae ry SEPA osa a nd Hr e Peed DO CERA O a bU e a Alu ares TEE 3 VOA ml ys e abet m sp les A dona asa Te e vs ot pe ha Fu Y
20. City State and ZIP Code 7b ADDRESS City State and ZIP Code Mterey CA 93943 5000 Monterey CA 93943 5000 80 OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER if applicable JAME OF FUNDING SPONSORING RGANIZATION 10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASA ELEMENT NO NO NO ADDRESS City State and ZIP Code WORK UNIT ACCESSION NO FITLE Include Security Classification E USE OF A UNIX BASED WORKSTATION IN THE INFORMATION SYSTEMS LABORATORY PERSONAL AUTHOR S Eth Charlotte V TYPE OF REPORT 13b TIME COVERED 14 DATE OF REPORT Year Month Day 15 PAGE COUNT p er s Thesis FROM TO Maren 78 SUPPLEMENTARY NOTATION The views expressed in this thesis are those of the author ENO not reflect the official policy or postion of the Department of Defense the U S overnmen COSATI CODES FIELD SUB GROUP UNIX User Manuals Ec ABSTRACT Continue on reverse if necessary and identify by block number EM i e Information Systems laboratory of the Department of Administrative Sciences l5 installed a UNIX based workstation for student use The UNIX operating stem one of the most popular systems available today is an attempt to hovide a powerful operating system that is largely machine independent Mis thesis examines the capabilities and limitations of the UNIX operating EM nas it pertains to the Information Systems student It also provides a allowing them to gain a working k
21. E TT REA Pen wa a Oe 3 2768 SOLED wet A A hoh we ek BP ala OMe Cota ais inh Ios hoe mS 4 LR ARY v c 4 4 a pr aaas T a A ea 8 4 e bct Boyer Dto Pen Lab dd _ d LN Mofa atl die es ae MAR henley a ok go Ri ir A UES eA a we Cht es GRAN a A gt e m m ROO Tr ad od da rid ween ee d e V es TN TA A AAA A AA Dit PP WR AN qu gine ahir m OT ZI P ite ine as a 4 dp t ut sd id a gt tM an rte nus w A AAA AA aan m EE Putin y A pany ee AMIN da oe DD tg tae a tw nho UTER ter PIB mo qo gs e Ad J yd siga Mat M enit AA 4 06 f PW LED 4 f vt mh utr COL Peete me iz t MEO Msi us mr A dt hal a 44 e M Sem r 4 3 3 te bat 1145 VA Ma econ spanned dt bul don ci qto A d Met NG Stl di A En Lts qe i ib ace y E We AF ELEM MI td p tuf ul imei oh Ar Os E arm tad s pagal A e 0d m Ale ma a 414 Rod 3 1 e Ih dere e a ara LI I LIT DONA 4 Spe I ira CADENA A nergy Stara E A dl gt Ber EN eni e n ma PA MM Bond PISO ote ORE a wap nad oi due A oo 88 of A egg mle 955 a
22. ERSA MIT IA mpo ya LE ITA jo m n tre 14 RECO an ers 4 na Eee Pay f visio 3230 AI GT ley p Ed Aa A PT Pins SP a pe q A LEI Ga get AT qva Tira uaa eng m dnb gr Wie MEN ep nly Pe D UL PP eras 4 T i VU en ova ig HH IE LS 1 et DEP Gas He DE he ee AUR v9 gr AJA IE KH a T4 UR memi yy m Ivo des Y ee nie eraty yi d H P 4 DI WC pa 4 x Pur vo y m E y gt AA ger SL LY te eth 49149 Cites tear 2173 dari a PN bigis a ATA ae RAN yr cda met Prati ims 4 NAVAL POSTGRADUATE SCHOOL Monterey California THESIS J DAMA THE USE OF A UNIX BASED WORKSTATION IN THE INFORMATION SYSTEMS LABORATORY by Charlotte V Smith March 1989 Thesis Advisor Norman F Schneidewind Co Advisor Magdi Kamel Approved for public release distribution is unlimited p Tahi NOL AMD ye MBASSTILD ITY CLASSIFICATION OF THiS PAGE REPORT DOCUMENTATION PAGE EPORT SECURITY CLASSIFICATION 1b RESTRICTIVE MARKINGS MUNCLASSFILD La ECURITY CLASSIFICATION AUTHORITY 3 DISTRIBUTION AVAILABILITY OF REPORT Approved for public release ECLASSIFICATION DOWNGRADING SCHEDULE distribution TS polim ced P REFORMING ORGANIZATION REPORT NUMBER S 5 MONITORING ORGANIZATION REPORT NUMBER S 6b OFFICE SYMBOL 7a NAME OF MONITORING ORGANIZATION if applicable Code 545s IAME OF PERFORMING ORGANIZATION jal Postgraduate School Naval Postgraduate School DDRESS
23. N ato ss Qd ee e A E am x en dnm Md 4 P n Em ana tai O gt AA PAD prado aoe i nh IIA iod bolita Peper a RT atado iet BARA A m gie aue A 4 e A gt EOI pdas q 4198 Ap oh pa ns JE Y RAI y ARI a ts Ser t 4 EPSON asar inina TR EST RT SD e DER AC me ann ae ifii ogre hake mas deas qaa yt oe RA AG om Qi ANAL qa 425 M MA F anana ca d ou En Dee a er a a i Se heehee AE uate A M eise mer A o ESL Apa Lal PTE n ESTA A GEM Berek ta PIRE n Asp nM meri ati at tes TS div 99 MI 1T ra Gattis arent a ee ae BA bent ph i MAE i CE ERE T bet Ap Om dre y 7 aus bzh gt un en A 2 56b 5 OIA EA As pins ER o DOM tae eh a e Uso Wit v Unit Tad re d dir T 1 ELIDA MAS paras WP POY A pal umn q Mes E a y ii O uo ot ot ABNER M m A ut par IEA BE Bnd nra Fal ate al ra ae Lei made P EE VE PT VEGAS WP dar AE vr E MW ut ode zu ps A gt E Ls 4 3 E i wu AAA os oa ieee ket oe Uh A dosed v a rAd 1 toe Aos t Tar pao Veh papo Ar bs aa ah qu bv Cee y Pis n q TB Rey A pra a E TL J i ae e e 14 0 6 mer ae e Ant ar o Sein UA HM ie d we Am io je t d 1 emanate AND N nw V oos ni y w nM SAT ASIA Bef iar ab dise eoi IIR Pet Mp LE per z 4 e e III A Ra o ee a dr TAS DO PP E e et feet A y ido LS ara L i nr 9 Si ed ilt aD PALO ee UM olata a lard ra nd ite ae gt LH oup aa Oye aim gt t v5 t a E tl A A Pl o AI FET RES DR S 4 44 Laat T d n HA Aral A te dp j Pirga RDA and
24. ND MALE e uere RR RR RR RR RI 64 9 2 HOW TO READ THE MAIL YOU RECEIVE 65 HIESCEEMSSAND ASSISTANCE 0 o AR Rhen 67 TONI PROBLEMS DURING SYSTEM BOOT na unse 67 OMe El KEYBOARD nassen een 67 MOSS STEM CRASH RS RII 68 Die MANWAIES AND REFERENCES e PR n n n n 69 19 1 INTRODUCTION 1 1 BACKGROUND This user s manual has been prepared for use with the Naval Postgraduate School s Symmetric 375 UNIX Workstation in the Information Systems laboratory The workstation is a series 32000 microcomputer running the SYMMETRIX operating system a version of the Berkeley 4 2 BSD UNIX operating system Several versions of the UNIX operating system are available today however the two majos ones are AT amp T s System V and Berkeley s 4 BSD Although the same UNIX philosophy is present in both versions many incompatibilities exist between the two Berkeley s 4 BSD UNIX from the University of California at Berkeley has become very popular due to its technical improvements over the System V Ref 1 p 6 This is the version available in the SYMMETRIX software environment 1 2 USER MANUAL CONVENTIONS NO Prior knowledge of the UNIX operating system is necessary to use this manual It has been developed to provide the user with an introduction to the UNIX file system its commands and its editing routines Bold face type is used to depict actual commands the user can enter at the terminal For example pwd 20
25. PPS v P h uidy aud b 1 y a 7 bhe N emus at f 4 Cds ERO V n wu 5 f i Ep p ob tmo taps E i gt i LI LI A hy om 4 j s 4 1 Bog af 2 i x LP eo Aer JI m h 5 t x A A i P I Y 7 MIA r r HS 4 ns Li 4 CR bd LI t d d Lj 4 1 q e s E 3s gt r x Af E AE LN A a s 1 5 3 ae E f a g er 1 y A j 4 b 4 A 4 t LIE ed 1 L eer q i r P D t 7 p A P 1 3 1 Z TI 2 l 4 A 1 q aji i 7t VT 1 i Mie yee D wins ao a ge T 37 f S S E v i Ee 5 ws a 1 i eva j a i va 4 i i uq qa ta i LH x a gt ug a E i Uu Ei v bers x 1 ie M sf F E un year aan Ue E h m na av d 4 am H ATA 1 Ay Set c y x e he te a te a E Ya gt 1 e id rt Ay H a E AC A Qe Me san o af goes iS gt d ne pur Ky ond MA a t nn D 1 A ee AE M E s a ANTE rm Ars i i t i ss ie VIL T MN X d i i ps eA SR table A pet wf r SRI i Sy nw red pas EPUM MEN dida sone d 4 i YE MB Hrd Re a T t XE Har pupa vr e A A e y m exe ns QUE a ya TEN Y z i reg 4 J LE aci E e SU ELOY x rA t Nery RAT gay Pe es a m m A bad y 4 E ERS ll E t eri h P e dob ess 2 o 1 A ae BEER NE J an T EE A E ad coe We ln IL Id wee J n i taf yt hd SO nti Aja e y gt ats teens
26. TATION USER S MANUAL 17 TABLE OF CONTENTS INTRODUCTION gt eoin 2 22 2 220 See ee eee 20 Rel BACKGROUND 2 o ee ee 20 T2 USER MANUAL CONVENITONS m 20 LS TYPING CORRECTIONS a 21 1 4 UNIX S CASE SENSITIVITY a 22 1 SECURITY TT 28 SYSTEM START UP AND LOG IN PROCEDURES 24 Zu STARTING THE SYMMETRIC 3753 ea 24 22 LOGGING INTO UNIX ODER ce 24 LOG OUT AND SHUT DOWN PROCEDURES aaa 26 ON LINE REFERENCE AND TUTORIAL oa 2 4 1 ON LINE REFERENCE PR 2 4 2 ON LINE TUTORIAL 2 222 240 28 FILE MANAGEMENT e 0 7 22030 1L 2T 30 Sc INTRODUCTION TO THE FILE SYSTEM 30 5 2 DIRECTORIES oa 2 0 9 Re 30 DNS CONTENTS OF A DIREETORT re 32 5 4 DISPLAYING A FILE ee 33 SS COPYING A FILE 2 2 222220 2 2 2215 2 d 55 RENAMING OR MOVING A FILE 2 07 33 E REMOVING A FILE c 37 TEXT EDITING sesa a omanan de o 59 5 222 LULISILIDIMITNT se GAL INTRODUCTION 4 9 Ve TM 38 BZ IHE ed LINE EDITOR 00 0 TT 38 6 53 THE vi SCREEN EDITOR 41 18 TO A EEN ISE o RR RR RR 45 Py eee THE SHELL PROMP To oc en 45 DEM SHELL COMMAND FORMAT 0 00 2200 45 fea INPUT OUTPUT REDIRECTION eeeee0 46 BERND ES ren Uere RR RII 48 IE DERN AME GENERATION a I Rn 49 A ee es a 52 8 SEU OA cs pa 54 O IDAS INC rm RR mr aan en 56 NCIS O o ns ques era 59 INCA EIEE a RR RR IERI 59 O EMI a RR RR 60 8 3 COMPILERS AND INTERPRETERS 61 MONI A A ke ee ee eee 64 ER Ron TO SE
27. The PID is the process identification number TTY is the terminal identification the TIME is the cumulative execution time for the process and COMMAND is the command name being executed You can receive even more information by using the 1 option as follows ps l The kill command can be used to end a process before it has finished The process to be terminated must be identified by its PID For example kill 214 oy If you wish to terminate all processes you have running you can simply type kill O This command will kill all your processes with the exception of your login shell 58 SAUNA TAE 8 1 PRINTING A FILE A line printer is configured to the Symmetric 375 and can be used to print out files from the system Ensure that you have powered up the printer before sending anything to print and ensure you power it down when you log off the system One way to print a file is by redirecting output as explained in Section 7 4 The device filename for the line printer is dev lp Therefore to send something to the printer rather than having it display on the terminal screen redirect it to this special file If you want to print out a list of your current directory s contents type ls gt dev lp Another way to direct output to the printer is with the lpr command This command sends your requested file to the print queue If the printer is available the file will print out proceeded by a banner page If o
28. This structure allows the user to create directories and organize files Providing this ability enables UNIX to support the considerable number of files in a large system while still permitting the user to keep track of his files and the system s organization 4 Input output A very convenient capability available to UNIX users is input and output I O redirection Because similar to the operating system itself UNIX I O is device independent the output of a process can be redirected to any appropriate device such as the terminal a printer or even another file The input of a process can also be specified instead of receiving input from the terminal a process can be directed to accept it from another device or another Process By directing the output from one process to be the input to another UNIX gives the user the ability to pipe several processes together 5 Utilities and Operating Services By design UNIX is an operating system tailored for programmers Ref 5 p 8 It is suited ideally for software development The UNIX system contains several hundred utilities which perform simple specific functions A string of these available utilities can be piped together to create a personalized program which accomplishes a complicated task This procedure reduces the need for large complex projects whenever a new program is required The UNIX system not only allows a user the capability to program using UNIX itself but it also s
29. Y y VE by pe tra UL NE d Peas Nice A ARE T erp D me vARA T ov W Y ke j A PREV Eid Pt rv reni VAN X Uae Sess PNE pre ia SAT PO EV vor 1 d A a 4 2 y gt m We ya pH EAR term M Woe i x L t Ae TiN tet eben WEP Ege Rew ry da COBRE 3v itra AAYY AR LAE PPP 4 ls DUE A TUA Kota NR wis Fer EN T AS e UVP ay AI VT VI anos B LUNES Mon oF 1 One e on j ab j ru c 7 TOU 4 oa L Aaa APPS AUTO GM PA vei mo T fs ON EAR N deis ne ant R IE TURN or HK IVA MovIT Tix a ni 1 MR E 7 UTE sili i tu LER eS Ri 7 gt 9t 14 y A D 2 viv ELI MI Se than id A ag Y A L AA rimo o CNSR PIE Lee toe MV a a treaty Was a wis a Pie AAA Lee M a E 3 IDA pe RA A SSA nin Mla 2 t Dro broin a i At Ie iV VA t e x P Neue E Ro IBA ee UNT Si i r 3 Y IVC WF A MU Dea lua m I ene mE ud i g WAREN NN AAA OVD AEA yon de Xr p wr idera LEN TOMUS Se c Mba Ace ea T i e ry bd PPh ad Urry Hoan ye ALTA Gi Be cat Py VFN E n h Se RS Cl 14 1411 wisi nn nrw LL 4 H
30. aras vun Anaua Apr E A Asas Pe Rd een Ol pone RER CUTE et QR e iudi Qm i A a UNE age A AMAA Agere js CERE Reemi a mene da d Pe ipm ee Rasa do Age roda eri drat pres ur DT Edo db qu us LTR SPO Yta na 27 94h Naiba k y Dj da de Parpi ge DAL LIFE hu gt CP Sade a 4 nm ORI te id Me Pan RS da E mg Marte Weel T Pr ACA Comp nr ga LT X s os MEL Cm a A ela MAR at LN Ando SA Be A te a e A wif Y oy ANGE MEP ash eon gt Ai n bande un YAM ala arse mee RM ERAT Abs eure um AT une 2 AMA d ad 4 l Du EE ITI dach dd d pits As br a d a rn maces ET Nenn COO eia PA WR AVL an y A 94A ds DENT nee a ren eN sh To Roksan Ff las MM 1y MA A fim deo bier LL M AS Luc Rin ERAS N ae Fat mb aenth ng RG beba TT MPR Cos LLEL ete 48 4 Mal Re Oly aad Me to m MAN Sook age age air Yesa te Incas fud Ag Ma A N A ja P ow Yun Pa ago men we Do Ba A fe deme UM q Ly Foose buat Nd Ure as Ceres MIR Mesa e Sd ae clon LS RE eins Pe rn Pt et IE gen 7 Phe ats v oes haere H1 Tn Wa a Ms An dom A s l uit a sen ags CR v 2001 a PAS ha In Mag day E dice Peba orbi eL 2 De ol tit gs ty ue LT img IOS FT he co a ORELL Mudo may dueto nz N n ia eM P wea WM pas i LN T Lab RIA ON al ana ute og ia me ee a e Me ELE om un Em A cs Lj mo tl vr d b 14d t o ae ah dias e ga Pa jah Mei 7 IF Ale NS de hate
31. ard may be locked This might be indicated by the word HOLD in the lower left hand corner of the screen To eradicate this problem type control q Q This is accomplished by holding down the te et control key while pressing the letter q This procedure should free the keyboard and allow you to begin entering commands If however it is unsuccessful follow the reboot procedures presented in Section 10 1 67 10 3 1SYSTEM CRASH If a system crash occurs while you are operating the Symmetric 375 power down the equipment and begin start up procures If the procedures fail to recover the system power down the equipment and report it to the administrator If you are successful in rebooting the system you may receive mail from the root telling you how to recover any files which may have be disrupted during the crash If you were editing a file when the system went down you can usually retrieve most of your file changes with the editor s recover option For instance if you were editing a file named test one in vi at the time of the system failure you can type the following command line to attempt recovery of any changes you made to the file vi r test one 68 11 UNIX MANUALS AND REFERENCES For an overview on UNIX including such topics as its history its philosophy and its practical applications consider the following references An Introduction to Operating Systems by Harvey M Deitel Addison Wesley Publis
32. ased workstation in the In formation Systems labora Tor gt me E r 9089 16 od P I n n A pe rn a wt of nhm DU Pic a a MIA a an PMA ne Per rer Elm A A 756 Pot CF OIA A opo ut on oho it pd Pro sais ee rt o M M oai oa thesS5 Frhr D A a AA apn a 14 re Mv H Re TUER EEE EEE ICT UT prea ee ased workstation in t paste PO N a A WUE 4 4 11528 poi The use of a U ase W COS voa F6 d maf LA ros ot pe E nA f tu P EPP xx 1 v5 od be H iN f A 1 Metis dar OOM LM aiD od ones c His hos aa PLA Pot ar Rat 4 Li qoM ok 1 v O EI 8 8 RAT 8 11 EIU ll Seia td o fh Uy VE Te ee arias Water Sey AD NN M TW EET PA 4 pb Eye 24 04 5 uud t a Wet warm nna At Pr RI ie toist djk inen aisa Ee aA vir al SEER br lo 4 ll Il Ot DINDA AA AA eh Ook ng OIEA sr iva pm d ge UE I ELENCO am AA od o4 be eal iA LAU AT e VP d NBP mL gw WE TI pi O PPM en oo at po a bg REGS OR I E DA GALA E ee oe nt Pra Da Veit stilo nin M Sih Mud e u pelas ET E EAT VET SA Red Il ART ade id taifa a Bep 008 mine As Bound ete arian ty EL za o l indi hl TEE Care y Pinga ee Ar es Dig hear e s A Ape hi m a FR Per AIR la MOL 64d nd 3 x V em al oor TOOL Ort 24 eg gt 2 fun 4 e fet VE os prn tas De e Epi da PAN
33. atatas wim A NUR Ae Bm PALA a arae tres MALUM viet ag RIA NN ta Wh Qu ds ed ache Baa we Yan Ze A o e mW seet LIE 304m Arts a aN Trade ta anA e gol ee an art eid Be loafing a DET ERTL irae A enana DT DAN o a a 14 Set RER AR ata aa en bs at ey Ly 4 L C ert VRR Ava Ase cates oa RE C Ere Mtr aie Qaa d Uer dora Ss wa Dado tn PALLA Me By ts BAS ARP d A ma VAR Ue rer Be me a te A nn 295 halt pd qr EEE ra i wa LITT V ed Meca iio AB para Cad Ae ALN e A Om satay mot Or wou al E LL M A u RL N kam ath WARM rad Mhiti dy 495 8 renato A Wr ane S MP An a ener eran Aco fog o a RM mean 8 OMI a EAS OB Dra ge ade Ceu wi E LTD LT dann TI HUI Da tm Ao EPE Ww VO D thua pe TAP Ble he Nate wis teste hs DO ER y DIA Me As marian toe mw p pere SEE dps TAR ARS A nate v CSN A ana doin Bite ts liter 1400024 ag 35 755 fi 4 e AS MM Io aoi aie eR a gt Bre disto ay LI Yon O As dee asp N da A M e UA o f e tasta 1 4 bias eS ee MRa i68 GIAL A hee pa MAAS a aT Mg Asia q 42 Fite ABAD A D LITT Ware f dis LN r ms RSW da 0 AD tay a b tore ee aa o mo LIS MAA ig lg en don ni Ram RC fe Baier As ann eee ce e ne doa ende TREE RER 2 1 A ag b a UM o adit e fea ad ER hos Anin nam RN as aes soa re da Sa OS A a at NA A TS nu A RD SAA Asma LI L M eset Veo od Aeta pf R tag dip Qr Pt Me ets Che EN siy e n Ll mnt ya AAA ma rs AM 90 0e bra Pre e A eh Ans ro h
34. c d d M lle HN dr PRI ES Lr E ES tm 1 qi ex an gt a gt 4 gt tes Shy gt DE E Nem Ao POP TA x i fl pe N SAL q MEE 4 LO ba q m x is 2727 er e y e h A LEID A ge AT A i Ma vent M 2 nu sd y EPIA Tin EL PU nr bh Cs IE E a an E ram na OTS Ls SA en dus ate yt mbr SI Y Ore toga At ALS tez P 4 Norm a An y L4 a d AM s Pis DELETE pean AX 4 pP D 5 E sits tee hi rot fo v e Pier nv EA S MU EUIS Sie hg he va ali ai o lenda m US thee id my p s A M irc s ra E a v FOL Ta 1 JU hey vk of 7 tty Pe Ma alee LI um a fila Re ty Ce dis ths pas O Mus 9 6 asp LT AM ALLE ar UA S a tao egi LE rop ni iba ua U EE RR y CP a CRs rr rra TE y ay PREPARE ate wy diio A FO i on veep es o Pa wes es meto Two t ria ge va f aur rm a dy Aw ar a RP gne a if dh em ni 1 OEE AN Be pass ot ste IU r At eu o a ON Tu m Pe MICE SEO Sari Ae ER d moe ote a 4 k pe ER UM Ate LI u PT YU a4 ot up Kim REA L4 n ro a Pare ta anis the d pui VA Pa DPI D REL de Tt AA ner wre Weine Soe IL TIER vorn origi ill gt H Via 95 X T o FW 5 4 Lar iu s 1 pres x do Yh ys b tu s Hr Kr ra a i Ie T LAT em i oe A AO e a PE LE A A Ee al gema y me gt 8 xf I m sp tni MH 3 Ba P Gyre a Lan e V3 n 7 Ew
35. det O Tan 2 e tuve s MENTA Pre ng any 4 Bas sm Wa Feit Fpp E t x da A a ia Pu dy eat Wera art lehin s teren id va Vin E Tem e d i bua bd ie ad ryt 4 E z 4 ea SEI ERIN A a DEVE r bg UP ey Ts ITI E T p ww eve A otis bor i x UMBANDA T e fy err SIU ATM Y ity q era te da Wee tr dig IEA Load ERU IR nr mere a i RL O Mr Ed a a m fate Figli gr a op ao ue Us dm ety ep ae O ums LAM I eye 5 d E i wk ily SMG ET TTO Fi Puh an qdo N VIA q ATA da ET Scu irt e a S felts O Otte ME A oe PI y EIN AT We a nte E Ap a Turne j en Mp Vi Ua wur Ad Pt tee tisha as E 1 SA UO Vv Feu Ct A VR Po wet po ndy Anand ar e Sith tees IT NM ak as de RR Ee NAA EIEN REED AR ANETE AS TIE TEAN z we o ye RP ERR e Pa eat ao Syn tee dela SLPS tae TS ei Hh pun V me Pr EU UNE ans Pew S abri tet Ne VAM RA arty oa ca le p 7k 4 S ng AN O o a rd E de ras nern SER STD bh E Dee WIE RP RAR ELLE VII amp ooo ex LI eV AUT V Rar a S CIT TUR E LC pre rk i T i phan O A vane TIN y pay mien eee AR EUR t E o gt rv A n La A SA E wx Fury Oele A A18 GERE yn LA ETE 1 t e y ronda AA NATAS CA a VIVA vera UBE 1 LUD D d E en SATA 1 E TG A Nui ETWAS qne gt Fu Aire AO rd TRE vgn U A wi fog t i Q d Patas years WAE P IES Very aao tt OA A E Y Ne ta hg yee E e AA Y dde CUNA lt u x a D vi na 1 wees ices Deves Toy ay AA A AO T A tee 5 RL L en uit ie P Ney AG AANA a E WS A are ae 4 e Reviver Pih p po THE
36. directory your login directory will be under it A sample hierarchical directory is represented in figure 1 30 ATOE bin dev etc temp usr bin is2100 sample Figure 1 A UNIX Hierarchical Directory When you log in the system will E A put you into your login or home directory This is the directory which will contain the files of everyone who logs in using that userid To find out the pathname of your login directory type pwd The command pwd stands for print working directory You can type this command at anytime to find out which directory you are currently in For example if you logged in with the userid is2100 the system would respond to your pwd command with usr is2100 To move into another directory use the cd change directory command Type cd followed by the pathname of the directory which you desire For example Sak cd usr sample moves you to the sample directory If you type pwd now the system would respond with usr sample To return to your home directory at any time simply type cd with no pathname It is important to ensure that you are in your own login directory when creating files 5 3 CONTENTS OF A DIRECTORY To discover the contents of a directory you can use the ls command Type ls This will list the names of all the files and directories in your current directory in alphabetical order To view the contents of another directory you can change directories u
37. diverse The UNIX operating system one of the most popular systems available today is an attempt to provide a powerful operating system that is largely machine independent The capabilities of UNIX are vast This thesis will research the UNIX operating system and provide a user s manual for Information Systems students at the Naval Postgraduate School B OBJECTIVES The main objective of this thesis is to provide students with a basic understanding of the UNIX operating system its functionality and its limitations Appendix A to this thesis is a user s manual for the Information Systems laboratory s Symmetric 375 UNIX workstation The workstation is a series 32000 microcomputer running the SYMMETRIX operating system a version of the Berkeley 4 2 BSD UNIX operating system Ref 1 p 15 The manual UNIX is a trade mark of Bell Laboratories Incorporated provides the student with documentation to successfully use the workstation By providing this Information Systems students will be able to gain a working knowledge of UNIX and will be prepared to take advantage of its capabilities This thesis also provides recommendations for the administration and management of the UNIX workstation Procedures are suggested to ensure efficient operations while maintaining an appropriate level of security C METHODOLOGY There were four phases to this research The first phase consisted of an indepth study of the UNIX operating system P
38. e one to a directory with the path user is2100 type mv file one user is2100 However if you would like the name of the file changed to file two when you move it Type mv file one user is2100 file two 36 You can verify that the mv command worked by using the 1s command to list the contents of the directory 5 7 REMOVING A FILE The remove command rm allows you to delete a file To remove a file simply type rm and then the name of the file which you wish to delete For example rm old file will delete old file CAUTION ONLY DELETE FILES WHICH YOU HAVE CREATED YOURSELF DO NOT USE THE RM COMMAND ON ANY OTHER FILES The system will not print a message confirming that the file was deleted however you may verify it by using the ls command The rm command is a very valuable command It is easy to use and it allows you to keep the system clear of your excess files But be careful to ensure that you are using the command properly UNIX does not give you a chance to verify your action before it removes the file 37 6 TEXT EDITING 6 1 INTRODUCTION The 375 supports two text editors ed a line editor and vi a screen editor The editors can be used to create new files and to change existing ones Both ed and vi place a copy of your file in a temporary storage area a buffer so that when you are making changes you are actually changing the copy and not the original file Before exiting the editors yo
39. e standard input To count the number of files and directories listed in the current directory you could use the ls list command and the wc word count command as follows ls gt tempfile wc lt tempfile The first line ls gt tempfile will take the contents of the current directory and write it to a file named tempfile The line wc lt tempfile redirects tempfile which now contains a list of files and directories to be used as the input to wc The wc program will count the number of words in tempfile and display the answer on the screen 48 Using a pipe and the same two commands you can achieve identical results by typing ls we This not only saves you from typing two longer command lines but it also does not require the use of a temporary file to store intermediate results If however you have a task for which you desire to keep the intermediate results of a pipe process you can use the tee utility in the following manner ls tee tempfile wc This will save the list of the directory s contents in a file named tempfile which can be used later 7 6 FILENAME GENERATION Using some special characters called metacharacters you can cause the shell to generate filenames which are currently on the system This shortcut can be very helpful when working with a large number of files with similar names The metacharacters and match a character or string of characters in
40. e under its current operating system Using a Digital Equipment Corporation DEC PDP 7 mini computer Thompson proceeded to develop an operating system that would meet his needs Ref 2 p 7 Thompson was soon joined by a fellow AT amp T programmer named Dennis Ritchie and was eventually assisted by a few others from his group at AT amp T As UNIX evolved its use spread greatly within the company and eventually out to universities Ref 3 p 464 The two main attributes which characterized the development of UNIX were the fact that it was developed by an extremely small team of people mostly just two and that it was developed by the users themselves and designed to fit their specific need This method of origin and the systems distribution are responsible for the uniqueness of the system It has lead not only to some great advantages because of existing capabilities but it has also resulted in some definite limitations B CAPABILITIES The UNIX system offers a wide variety of capabilities but the characteristics emphasized here will be those which have set it apart 1 Hardware Environment Although UNIX was initially developed on a DEC minicomputer it is capable of running on a vast selection of computer hardware This capability exist because unlike other operating systems it is largely machine independent this means that the UNIX system can run on mainframe computers as well as microcomputers and minicomputers Ref 4
41. e words in file one type spell file one 60 Words which do not match any listings in the dictionary file will be displayed to the screen If you are using the spell utility on a long file or on one in which you expect many misspelled words you can direct the output of spell to a file rather than have it display on the screen For example spell file one gt misspell Seo COMPILERS AND INTERPRETERS The Symmetric 375 has several resident compilers and interpreters which will be introduced briefly in this section Each compiler translates a program into executable form By typing the name of the executable filename the program can then be run The interpreters on the other hand execute when the commands are types The C compiler is cc To run a C program first create the program using one of the editors available on the system When the file has been created compile it using the cc command For instance if we had a C program named progl c we would type the following line to compile it cc progl c If no options are used as in our example the executable file which is output from the compiler is named a out This is the system default However if you would like to 61 name the executable file progl exec use the o option as follows cc progl c o prog exec You now have a program file named prog exec To execute it simply type its name prog exec The Pascal compiler is pc and is evoked in the
42. ed by the filename For example myfile However if myfile already exists the system will respond with the number of characters currently in the file Since you are now in the command mode ed is ready to except your command As with shell commands in UNIX ed commands are case sensitive Ensure that you use uppercase or lowercase characters as appropriate The following is a list of some basic ed commands and their meanings append text after the current line puts you in the input mode ed Commands a 39 i insert text before the current line puts you in the input mode end input mode and return to command mode This must be typed as the first character on a line by itself p display lines of the text Examples lp will display the first line 3 4p will display lines 3 and 4 2 7p will display lines 2 through 7 1 p will display the entire text is the last line symbol c change lines of text Examples 5c will change line 5 2 9c will change lines 2 through 9 c will Change the current line of text d delete lines of text The line number format is the Same as it is for p and c ie 4d will delete line 4 m move line s after another line Examples 5mlO moves line 5 after line 10 3 6m27 moves lines 3 through 6 to follow line 27 r reads ina file to add to the text The format for the r command is line number of text to follow default is current line r and then the filename Exam
43. ended Ensure that you have properly logged off before powering down the equipment Do not change the password on any group userid you have access to Do not disclose a password to unauthorized users Do not consume food or drink at the terminal Report any suspected computer misuse or abuse to the system administrator 23 2 SYSTEM START UP AND LOCHIN T EROCEDURES 2 1 STARTING THE SYMMETRIC S The first step in starting the 375 is to turn on the power to the system and to the monitor To turn on the system push the power switch located on your right side on the back of the 375 up to the on position After you have completed this press the button on the front of the monitor to turn it on The 375 automatically runs internal diagnostics and begins the boot sequence The autoboot is complete when the following sequence appears 4 2 SYMMETRIX NPS is Login This should take approximately 4 minutes The system is now ready for you to log in 2 2 LOGGING INTO UNIX When the login prompt appears type in the personal or group userid which has been assigned to you and press lt cr gt For example login is2100 If your userid requires a password the system will respond with Password 24 Go ahead and type in your password followed by a lt cr gt Your password will not show on the screen as you type it in As explained in Section 1 4 ensure that you use the proper case when entering info
44. es type an exclamation point followed by a reference to the desired command line number text line 2 You can reference the line by the absolute line a relative line number or by the contents of the The following methods could all be used to reexecute cat myfile To reference the command by the absolute line number type 12 To reference the command by the relative line number type 6 The current line number is 8 and you wish to reference line 2 therefore subtract 6 lines To reference by the text type cat The shell will search for and execute the most recent event which begins with the string cat 53 Another option which exists when using the command is to execute the previous command line by typing This command will always execute the last command line which you previously typed It produces the same results as typing 1 1 1 8 Bent LAS CE Pea So far in this section you have been introduced to many time saving techniques This final segment will present one more shell procedure which can demonstrate the convenience of using UNIX The history mechanism allows you to reexecute previously typed command lines But what if you have a series of command lines which you frequently execute in succession Shell scripts also referred to as executable shell programs can provide you with the means to perform several different tasks by typing only one line Ihe shell script is ac
45. ese procedures are discussed in Section 1 3 If you want to cancel the message you are typing press control c C twice The message will be cancelled and you will be returned to the shell prompt When you have finished typing your message advance to a new line and type a period at the beginning of this line Then press lt cr gt Another way to do this is by pressing D at the beginning of a new line The system will return a shell prompt 64 To mail the same message to more than one user list each userid separated by a space If you want to send the message to user johndoe and user janedoe type mail johndoe janedoe If you have a longer message to mail you may want to prepare it using a text editor After creating and editing the message store it in a file You can then direct this file into the mail system and send the message to another user For example mail janedoe lt memo will mail the contents of the file memo to user janedoe The less than sign lt instructs the mail program to take the contents of memo as its standard input 9 2 HOW TO READ MAIL YOU RECEIVE When you log into the system you may receive the message You have mail You can receive mail from other users or from the system itself To view the mail sent to you type mail with no arguments The system will display a message prompting you to choose an option at the amp prompt If you need help type 5 This
46. etric 375 system should be installed in an area which provides easy access and sufficient workspace If this is not available proper operation will be difficult and the situation may discourage system use It is also important to ensure that proper physical security is maintained and that the system be protected against dust high temperature and high humidity Improper environmental controls may result in damage to the machine 2 Filesystem Backup To prevent loss of files from an event such as a system crash procedures for file backup should be followed Ref 1 p 77 The contents of the system should be saved T2 to tape on a regular basis If files are later disrupted or lost they can be restored from the backup tapes 3 Userid and Password Administration To provide adequate protection for the system and its data certain security procedures should be established Access to the system should be controlled through the use of userid and password assignment Group userids can be assigned according to class enrollment For example userid is2100 can be established for use by students enrolled in the 52100 class Because UNIX is case sensitive as explained in Appendix A it is recommended that a userid not contain capital letters Userids can also be assigned to individuals However all userids whether they are being used by a group or by one person should have an assigned password Userids such as root or owner
47. exists in the industry as to whose version will be the UNIX standard Ref 6 The POSIX system which is currently being developed is an attempt to provide a standard portable operating system based on UNIX Another standardization problem for UNIX is its software format While operating systems for microcomputers generally use standard floppy disk formats UNIX does not have such a standard With different hardware manufacturers developing a variety of hardware for UNIX system operations the format for media storage is also diverse This is a problem not only for the user who wants to move data from one stand alone system to another but it is also a major problem for retail software developers The companies would have to market each of their products in a variety of formats Ref 6 For this reason UNIX itself does not run any of the PC based retail programs which have become so popular These programs include spreadsheet and word processing capabilities 10 III CONCLUSIONS AND RECOMMENDATIONS A CONCLUSIONS The use of UNIX has grown tremendously since its beginnings twenty years ago Its widespread use in the university environment its simplicity and its capabilities have made it extremely popular today Considering the propagation of this powerful operating system it is important that Information Systems students develop an appreciation for and a working knowledge of UNIX students could be introduced to the Symmetric
48. f these commands ag save to file Default is file named in vi command line To save to another file follow w with the appropriate filename read contents of a file to the workspace r must be followed by the filename exit vi and save file exit without saving file vi will issue a warning if you have made changes to the file and have not saved it Type quit to override this warning exit without saving file and getting no warning Additional information on vi and its commands is available in the on line manual type man vi 44 7 UNIX SHELL AND COMMANDS fee THE UNIX SHELL The shell is your user interface to the UNIX system It is a powerful program that interprets and then executes your typed commands The shell can also be used as a programming language refer to Section 11 6 for suggested references to explain its use as such There are several different shell programs available for the UNIX operating system The two most popular and widely used ones are the Bourne shell and the C shell Both programs are very similar although the C shell does contain some features which are not available in the Bourne shell Ref 2 p 10 This user s manual will deal specifically with the C shell and will introduce some of the functions you can perform within the shell fee IHE SHELL PROMPT When you log into SYMMETRIX you are in the C shell and are given the prompt In Section 2 2 the sign is refe
49. fore you will only have to type start up 7 9 MULTITASKING The UNIX operating system allows you to execute more than one job at a time This multitasking can greatly increase your productivity When you initiate the execution of a job in UNIX the shell will run the entire process and then issue the shell prompt when it is complete To run more than one job at a time you can start a job and have it run in background mode To start a process in background mode simply end the command with an ampersand amp This will instruct the shell to begin execution of the job but to return a shell prompt so that you can continue executing other commands When you initiate a job in background mode the shell will return a process identification PID number to provide you with a means for identification of the process This is an example of submitting a process for execution in background mode is 1 usr sample gt mylist amp 214 7 56 After you type your command line and hit the carriage return lt cr gt the shell will respond with the PID in this case 214 and then return a shell prompt You are now free to continue executing other commands To check on the status of any process which you have running you can use the ps command Simply type ps The shell will respond with information about any process which you have active The following type of information will be displayed PID TTY TIME COMMAND 214 il 0 01 ls
50. hase two concentrated on learning to use the Symmetric 375 UNIX workstation Phase three examined the possible uses of this system its functionality to the students and its recommended administration Finally the last phase phase four was the drafting of a user s manual for the UNIX workstation D ORGANIZATION This chapter serves as an introduction to the thesis and presents the objectives of the research Chapter II examines the capabilities and limitations of the UNIX operating system The conclusions of the research and the resulting recommendations are presented in Chapter III These recommendations include how to manage the use of a UNIX workstation in the Information Systems laboratory Appendix A is the user s manual which was developed for the Symmetric 375 workstation This manual is intended to assist the user during the actual operation of the system It can be used as a reference for the first time user providing simple explanations of the log on sequence and initial use It can also be valuable to the more experienced user providing instructions on various commands and utilities Appendix B provides reference information for the system administrator II CAPABILITIES AND LIMITATIONS A INTRODUCTION UNIX was first developed in 1969 by a programmer at AT amp T Ken Thompson Thompson had written a program called Space Travel but was frustrated and disappointed because it was so expensive to run on the mainfram
51. hing Company Inc 1984 The UNIX Environment by A N Walker John Wiley amp Sons Inc 1984 The UNIX Operating System by Kaare Christian John Wiley amp Sons Inc 1988 UNIX Internals A Systems Operations Handbook by Myril Clement Shaw and Susan Soltis Shaw TAB BOOKS Inc 1987 The hardcopy of the online reference manual is published as UNIX Programmer s Manual Volume 1 from Bell Telephone Laboratories Inc 1983 Information on UNIX commands and the file system is included in the these manuals A Practical Guide to the UNIX System second edition by Mark G Sobell The Benjamin Cummings Publishing Company Inc 19839 The UNIX for Beginners Book A Step By Step Introduction by Bryan Strong and Jay Hosler John Wiley amp Sons Inc 1987 The UNIX System User s Guide from AT amp T Bell Laboratories Prentice Hall 1986 Understanding UNIX A Conceptual Guide by James R Groff and Paul N Weinberg Que Corporation 1988 69 To learn more about editing in UNIX see Editing in a UNIX Environment The vi ex Editor by Mohamed el Lozy Prentice Hall neces Quick reference guides to UNIX commands include UNIX RefGuide by McNulty Development Inc Prentice Hall 1986 UNIX System Command Summary for Berkeley 4 2 amp 4 3 BSD by Specialized Systems Consultants The following manuals provide guidance for programming on the UNIX system The UNIX Programming Environment by Brian W Kernighan a
52. ide a powerful operating system that is largely machine independent This thesis examines the capabilities and limitations of the UNIX operating system as it pertains to the Information Systems student It also provides a users manual for the students thus allowing them to gain a working knowledge of the system and prepare them to take advantage of its capabilities The research concludes that with proper administration the use of UNIX workstations can be very valuable to the Information Systems student stabat T 7 TABLE OF CONTENTS I INTRODUCTION 2 202 Se See 1 A BACKGROUND m ea so 2 SRTEBEBMMTV 1 B OBJECTIVES 99999 7050 28 21 2NNMVVT 1 C METHODOLOGY cosa era Z D ORGANIZATION 2 a ee 2 II CAPABILITIES AND LIMITATIONS Camo 4 A INTRODUCTION 2 2 2 eea ee 22322712 1 4 B CAPABILITIES 2a 5 Cx LIMITATIONS sao 22 2 See eee 25000292017 7T 8 III CONCLUSIONS AND RECOMMENDATIONS TU 11 A CONCLUSIONS se se 945 TR 11 B RECOMMENDATIONS 22 22 em 222 2 2 7 52 12 APPENDIX A NAVAL POSTGRADUATE SCHOOL SYMMETRIC 375 UNIX WORKSTATION USER S MANUAL r APPENDIX B SYSTEM ADMINISTRATOR RESOURCES GUIDE 7I LIST OF REFERENCES re TZ INITIAL DISTRIBUTION 2 2 2 2 er 7 T VT 73 iv I INTRODUCTION A BACKGROUND The use of computers continues to grow exponentially in the world today Operating systems the master programs that control the computer s basic functions are numerous and very
53. n the other hand the printer is already busy your file will be put in a queue and typed when the printer is free The lpr command does not format or paginate your files before printing them therefore it is often wise to format them for printing before sending them to the queue The pr command can be used to format and paginate the file If you want to format Mile for printing you can do so by typing 59 pr myfile However it is often difficult to review the formatted copy of the file on the screen as it scrolls past Therefore the following steps are recommended if you wish to print a file more than one page long First format the file with pr but direct the output to a file For example pr myfile gt myfile pr You can now review myfile pr with more to ensure the file is formatted the way wish to print it Then go ahead and send it to the printer with the following command lpr myfile pr Ensure you reference the formatted version of the file the ft tt one we added the extension to SIE Both the pr and lpr commands have options which can be assigned to them To get an explanation of these options and their use consult the on line manual listing man for each command Refer to Section 4 1 for assistance OG ZU SPELL UTILITY The spell utility checks the spelling of words in a file by comparing each word to a dictionary file To use type the command followed by the filename For example to check th
54. nd Rob Pike Prentice Hall Inc 1984 UNIX and XENIX A Step By Step Guide by Douglas W Topham and Hai Van Truong Brady Communications Company Inc 1985 UNIX Programmer s Manual Volume 2 by Bell Telephone Laboratories Inc 1983 70 APPENDIX B SYSTEM ADMINISTRATOR RESOURCES GUIDE 1 To assist the Symmetric 375 Systems administrator references are provided for the following procedures Procedure Access to superuser or root su Accounting cron Adding and deleting users nu Changing the date and time date Creating directories mkdir Error indications and diagnostics Exhaustion of disk space File mode change chmod Filesystem backup Monitoring system performance systat Password assignment passwd Reading and writing a tape tar Remove directory rmdir Resource control quota Restoring a filesystem System and file recovery fsck Tape dump dump Trouble shooting t See see see see See See See see See see see see see See See see see see Reference Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref Ref U d d d U U U U Uu Co U OR Lo U U 72 Shs 71 uo 96 631 85 193 77 93 106 39 WAG 94 83 97 80 cu LIST OF REFERENCES Symmetric Computer Systems Corp The Symmetric 375 Owner s Manual 1985 Topham D W and Troung H
55. nowledge dvantage of its capabilities 18 SUBJECT TERMS Continue on reverse if necessary and identify by block number ser s manual for the students thus the system and prepare them to take a with proper administration the use of UNIX Be research concludes that brkstations can be very valuable to the Information Systems student N DISTRIBUTION AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION a UNCLASSIFIED UNLIMITED O SAME AS RPT orc users Unclassified la NAME OF RESPONSIBLE INDIVIDUAL 22b TELEPHONE Include Area Code 22c OFFICE SYMBOL hofesson Norman F Schneidewino FORM 1473 84 MAR 83 APR edition may be used until exhausted SECURITY CLASSIFICATION OF THIS PAGE Al other editions are obsolete U S Government Printing Office 1986 606 243 gt UNSLASSIFIED Approved for public release distribution is unlimited The Use of a UNIX based Workstation in the Information Systems Laboratory by Charlotte V Smith Lieutenant United States Navy B A Susquehanna University 1981 Submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN INFORMATION SYSTEMS from the NAVAL POSTGRADUATE SCHOOL March 1989 ABSTRACT The Information Systems laboratory of the Department of Administrative Sciences has installed a UNIX based workstation for student use The UNIX operating system one of the most popular systems available today is an attempt to prov
56. o consult the on line manual type man followed by a command name For example man who will give you a full description of the who command ping man man will describe the man command including the format for using it man displays its results using a program called more This allows one screen of information to be displayed at a time In the bottom left hand corner of your screen is the word more followed by a percentage This percentage shows how much of the man entry has been displayed so far By pressing the space bar you can advance to the next screen or by pressing the lt cr gt you can advance just one line When you reach the end of the entry the shell prompt will appear If you desire to exit before you reach the end of the entry type control c C This will return you to the shell prompt immediately 2 4 2 ON LINE TUTORIAL SYMMETRIX offers an on line computer aided instruction course It s a beginner s course on UNIX which covers the following subjects files basic file handling commands editor text editor vi text editor screen oriented morefiles more information on file manipulation macros text formatting commands for nroff equ used when typing mathematical equations C Writing programs using oi To start the course simply type learn and as with any command follow this with a lt cr gt Each subject has several lessons and you will have the choice to cover the
57. o designate your input and output devices The less than sign lt permits you to define the input for your program Using the mail program here is an example mail janedoe lt memo This command will mail the contents of the file memo to user janedoe The lt instructs the mail program to take the contents of memo as its standard input To redirect the output from a program the greater than sign gt can be used For instance if you wish to create a file named mylist which contains the contents of your current directory type ls gt mylist The list of files and directories will not be displayed on the terminal screen but will instead be written to a file named mylist If mylist already exists before you redirect this output to it anything in the file will be overwritten and lost Sometimes a file exists which you would like to add to but not overwrite The double greater than sign gt gt can 47 be used to redirect output and accomplish this For example ls usr sample gt gt mylist will append mylist with the contents of the directory usr sample Therefore the file would now contain the contents of both your current directory and the usr sample directory YE AO DS Another way to control the standard input or output kom a program is by using a pipe which is represented by a vertical bar A pipe is used to pass the output from one program into another program as th
58. ph Se Cio pee pa s ATi wow at me a ren Pad Jun Ey pde 5 ph n 4 E DOE USC HERE A Evi as T Rt o i Es j tad heh ta d X ue D Sit qria TIAE TR RE Akte see pi PIA j AG serene AS AINE i eiie Vieh Le SRT TH og NES sn i XE X AUD AA Sorel a TES MA da Carta RA For TON e YA P ES EIS ANA TATA RSA Aw E s s 4 6 esi e Li Me He A v ed TL Tete ute fette m erence LAT Iveco q suo o Vy ntu V ohh pis a s OV ash tg ME i i n 14 ee VERA QUA mr er re RAT ET c DAN UT VT SRA We lt P 5c AN Dn T A Ho 1 Sabe SE Pain cre AA Petar MN APA TG Aie a repe SL HE LEE B wA RA UELLE MON i dM s a Sy Uta ty WA AT eS 16 ve ari eaten da tA no LATIS tag 220 L Y te a o A Is Ta TA tc Ir el di Fa vw ty gt uh ym WU Ws eur A 4 er E i y ESTACA LEIS a de e tray zo o ee HEN uhr ly ere Mn are gre x E Pg a in R une Awe Dy Paso I Peet sa lata th ee Alera ruta Mcr pter erh An UN em Uu s wg oS st ar een an ns VIVA e g PA da A M a ra Mia id a IL p babies Vans REN E OS AL van teh re A et pede LI betel my RE ir CRA A TE ty ON TA SIR Ad pl di AO ba UA ty LTES BENTA Fa R T we e De qr ote obi sry CAGE a T OT at te We ar NEN ICT RE I aaa CMNT HT ETN gryr t www ett Pre gp em M 1 t asi Sw ona AL M a 4 1 Pere my L qnd Aa Hebe 0 lesse PRA Ta vit y 0 PLI e i Weel it pra Ut erede aerial Pa OA A EOS eR EN sa UR gU S fV YR Eas OES Bau Pos are Di Sue UTE
59. pig m 4 A LAA Lan aw t boe TW u ta LJ 1 J to Mod tum gt E t o 4 adhi ES to boo LETI EI Gras aai Lites mua xe 4 4 feu AA eo P y LS LS ey Alas wh 1 4M eer 1 ovn y Us 4569 2 ENA ma T vil NT E Y i e Mia a Ag Mata dos PET OF Amam ma Ia A mateo AAMAS om ido re pm a a ot IN often L TTAIS Ge gt a Pingos a Fre a Mace mds i fa Mang M vias ae QUIS Mite AU rue re ei OI strap WR a o Sh Tenta Rl ity N Miedo als nte hs EN m kr is Anan oO COL ae UN 5 HE LP wipe Api Qu Amos on ua s ha dw LE OTRO P sa LET 2 Z s a ty Be A Veit a fm ig A nen AQUAM nina er Vert BER D ary Pol by rite Rr Sa 1a A e PALA T Pas TAA ms E AN AR e A tete a oa BL we AL e E ELI Heu N Me Ns II ga gt 409 ba Pg das Bra a RR te PON MA Rom Li Das Y es 4 Li ae LJ bg 1 4 A A H h siaaa aa Le Wet e y Dd Hom 4 in he Msi Beyer a AO rams JA AI PA BE corda men eta een ae A im D ft Visa ree Naya Wr h 1 854 A d P n ty 1 ys Part ha 3 1 SUP 9 Astra amp it dU sa Eh LI HU ELLE 2 f ig un P riti v n 14 rae gi v E 9 5 305 4 n LT I e Ae Lov e A RRs i Mera a haa K UA Ax fefe a t Ne PAIR MOLLIT M da as MS Vp hoe ud 4 P dn up Eo I ARAS L gt DE ge Assar VIA IA 249502 ae h ELI LS RET PLE US
60. ples lOr prices adds the data from file prices to the text file following line 10 r info inserts the data from file info following the current line w write to file Default is the current file the one named in the ed command line but another file can be specified For example w myfile will save what is in the buffer to a file named myfile q quit ed If you have made changes to the buffer without saving them ed will print a to remind you to save the text before quitting Q quit ed This does the same as q but does not warn you if you have not saved changes Additional information on ed and its commands is available in the on line manual type man ed 40 Ag E Te e A ome THE vi SCREEN EDITOR The vi editor like the ed editor allows you to create change and save text however vi can display an entire screen of the file at one time and let you edit anywhere on the screen by allowing you to scroll the text up and down You also have control over the cursor and can move it anywhere on a line or anywhere in the file to add or change text This can be very convenient The editor operates in two modes the input mode and the command mode When you initiate the editor you will be placed in the command mode but you will notice because you can move the cursor around the screen there are no line numbers for addresses Starting a vi session is very similar to starting ed just type vi and the name of the file then
61. press lt cr gt For example vi myfile If myfile already exists vi will print a line on the bottom of the screen showing the name and size in number lines and number of characters of the file It will also use the remainder of the screen to display the file If a file is more than one screen long only the beginning of the file will be displayed If myfile is a new file the bottom line on the screen will show the filename and then New file The 4 other lines below the cursor will have tildes This is how vi indicates that there is no text Since you are now in the command mode vi is ready to except your command As with shell commands in UNIX vi commands are case sensitive Ensure that you use uppercase or lowercase characters as appropriate To start building a new file you will want to issue the command to insert text 1 Just type 1 with no lt cr gt You will notice that nothing appears to have happened This is alright vi does not display most commands when you type them and does not indicate when you change modes You also do not press carriage return lt cr gt after issuing a vi command You are now in the input mode and can begin entering text If you make errors while typing in the text you can correct some now or wait until you are editing It is recommended that you follow the same procedures used when correcting a line of type in the UNIX shell discussed in Section 1 3 only when the er
62. rmation UNIX is case tr e sensitive and does not treat an A as equal to an a If you do not enter a valid userid password combination the 375 will begin the login sequence again by responding with Login incorrect login If your login procedure is successful the system will give you the date and time when someone last logged in using that userid and will then return TERM vt220 This is to determine the type of terminal which you are using Since your Esprit Opus 220 is a vt220 style terminal simply hit the carriage return cr The system will respond with ho The is the UNIX shell prompt and lets you know that you are in the shell command mode the 375 is now ready for your commands If desired refer to Section 4 2 to gain assistance using the on line tutorial 25 3 LOG OUT AND SHUT DOWN PROCEDURES NEVER POWER OFF THE SYMMETRIC 375 WITHOUT FIRST LOGGING OUT You may log out of UNIX anytime you have the prompt Simply type logout followed by a lt cr gt When you have successfully logged out the system will respond with 4 2 SYMMETRIX NPS is San At this point the log in sequence can be executed or the system can be shut down Turn off both the monitor and the system using the button and switch which you used to turn them on 26 4 ON LINE REFERENCE AND TUTORIAL 4 1 ON LINE REFERENCE Like most UNIX systems the 375 has an on line reference manual T
63. ror is a few spaces from the cursor All other errors you should correct while editing the file When you have completed adding text press the escape key lt esc gt to return to the command mode At this level you 42 can decide to go back and edit the file save the file or exit vi The following is a list of some basic vi commands and their meanings Vi Commands Moving The Cursor These commands are not followed by a lt cr gt X q z gt gt gt W maw c Entering text move move move move move move move move move move to che left down up to the right forward one word back one word down half a screen up half a screen forward a full screen back a full screen These commands are not followed by a lt cr gt i a O O insert text append text after the current cursor position zero enter text at beginning of current line enter text after current line lt esc gt exit from input mode and return to command mode 43 Deleting text These commands are not followed by a lt cr gt dw db dd delete the character at the cursor delete the character and replace with the next letter typed delete and replace more than one character typeover delete the word at the cursor delete the preceding word one word back delete the line Saving the file and Exiting vi Press lt cr gt after issuing one o
64. rred to as the UNIX shell prompt This is because it indicates that you are in the shell program and can enter shell commands 7 3 SHELL COMMAND FORMAT There are three parts to a shell command the command name the option s and the argument s This is often depicted as follows 45 command options arguments Options and arguments are shown in brackets because depending on the command and its use they may not be required The command name is simply the name of the task you want to execute For example ls is the command which will list the contents the names of the files and directories in the current directory Options modify how a command works while arguments name where it is to work To demonstrate the use of options and arguments we could type ls l usr sample The option 1 will display more specific information about the files and directories and the argument usr sample names the directory whose contents we wish to list The proper format of a specific command dt MODE NON and arguments can be found in the command s manual man entry Refer to Section 4 1 7 4 INPUT OUTPUT REDIRECTION The standard input and output device for the 375 is the terminal Unless otherwise specified when you execute a program the system will take information from the terminal 46 as input and will display any output back to the terminal One very convenient feature of UNIX input output redirection allows you t
65. same manner as the C compiler To execute a Pascal program follow the same procedures explained above for the C program but substitute pc the Pascal compiler for cc the C compiler Also follow the same procedures to execute a Fortran program but substitute f77 the Fortran compiler A LISP interpreter and BASIC interpreter are also available on the 375 To implement an interpreter simply type the interpreter command lisp for LISP and basic for BASIC and then type any commands you wish to execute For example here is a sample BASIC program basic 10 print This is a BASIC program run The system will respond with This is a BASIC program 62 If you have any questions on the interpreters or compilers consult the man entries for more information 63 9 MAIL 9 1 HOW TO SEND MAIL You can send mail to any user as long as you know their userid You can also send mail to yourself or others who log on uSing the same userid as you To send mail type mail userid For example to send mail to someone with userid johndoe Simply type mail johndoe After you press the return lt cr gt you are in the mail program Anything which you type from now until you exit the program is part of your message If you make any errors while typing you can make corrections only on your current line Make these corrections by following the same procedures used when correcting a line of type in the UNIX shell Th
66. she can set limits on the number of files belonging to a user or the amount of disk space used Because this facility requires considerable administration it is recommended that quota not be used unless exhaustion of disk space becomes a severe and frequent problem Ref l p 94 14 5 References Users should be provided with a copy of Appendix A The Symmetrix 375 User s Manual Additionally it would be beneficial if other general references on UNIX be maintained in the Information Systems laboratory for student use Appendix A lists some references which could be considered Refer to Appendix B for references which can assist the system administrator 6 User Assistance A point of contact preferably the system administrator should be provided to the users of the Symmetric 375 system This is necessary so that the administrator can be notified and can take the proper actions in the event of a system crash or other hardware or software error 7 Maintenance Because there is no maintenance contract for the Symmetric 375 hardware it is recommended that the system administrator become familiar with the troubleshooting section and the error indications and diagnostics section of The Symmetric 375 Owner s Manual Some maintenance and recovery procedures are covered in the manual and may make it possible to avoid outside assistance for minor system repair 15 APPENDIX A NAVAL POSTGRADUATE SCHOOL SYMMETRIC 375 UNIX WORKS
67. sing the cd command and then use ls with no arguments or you can stay in you current directory and type ls followed by the desired pathname For example ls usr sample will list all the directories and files under the usr sample directory 32 The ls command has several options available For example Is l will display more information about the files in a directory such as its size and the date and time it was last modified To learn more about the options available for ls type man ls to review the manual entry If you are unfamiliar with the on line manual refer to Section 4 1 5 4 DISPLAYING A FILE Once you know the name of a file and its pathname you can examine its contents First ensure that you are in the same directory as the file you wish to display Do this by using the pwd ls and cd commands as necessary Then use either more or cat as explained below to view the file The more command is often convenient for displaying a EN CEwniIch is more than one screen long Type more and the name of a file which is in the current directory To demonstrate this go to the sample directory by typing cd usr sample then type more file one 33 The first screen of the file is displayed As explained in Section 4 1 you can advance to the next screen by pressing the space bar The percentage which follows the word more in the lower left hand corner of the screen is the percentage of the file
68. the h is depicted as a capital letter it is not necessary to hold down the shift key when typing H The system automatically displays the letter in the uppercase when the control key is pressed While the H is used to erase back one character W allows you to erase back one full word However neither of these commands will permit you to correct any further back than the line your cursor is currently on If you realize that you have made a mistake and wish to erase your entire current line you can use either Cor U But this must be done before you press the carriage return lt cr gt Once a lt cr gt has been issued the line has been presented to the system and can no longer be changed 1 4 UNIX S CASE SENSITIVITY The UNIX operating system is what you might refer to as case sensitive when dealing with alphabetic characters It distinguishes between uppercase and lowercase letters 11 UNIX does not consider A equal to a Thus it is very important to ensure that all command words are typed in lowercase as appropriate You will most likely find it easier to maintain a file naming convention of using only lowercase letters 22 imo SECURITY As with any information processing system security of the resources is vital It is very important that you take any steps necessary to ensure security of the hardware software and the data Essential procedures to follow include Do not leave an active terminal unatt
69. time and thought A lack of system responses or a lack of thoroughly explained error messages may make the interface with UNIX very difficult However to one who is experienced with the UNIX environment its simplicity and flexibility can be very desirable 2 Processing Environment Just as the system s processing environment presents many attractive capabilities so does it also present some limitations Technology has advanced greatly since the time when UNIX was initially developed Because of this UNIX is based on old concepts Although new versions of UNIX include some current technological advances some weaknesses still exist One of the largest handicaps is that it was not developed for real time applications and despite some attempts to modify it UNIX remains poorly suited for such processing Also because of its large size UNIX is not a good choice for small single user microcomputers Ref 5 pp 7 8 3 Standardization Again what can be considered advantages of UNIX can also be regarded as liabilities UNIX was initially written by a small group of people but due to its widespread use especially in the educational environment many changes and modifications have been made to the system Because programmers can modi f y UNIX to their own environment a lack of standardization has been an ongoing problem with UNIX The problem has been identified and work is underway to develop a single standard however a struggle
70. tually a series of commands which is stored in a file to be executed whenever desired For instance if you execute the following commands every time you log on you can build them into a shell script 54 cd usr sample ls gt samplelist cd ls 1 gt mylist cat stufftodo Simply build a file containing these commands If you need a review on creating and editing files refer to Section 6 To ensure that the file is executed by the C shell rather than the Bourne shell the first line of the file must begin with the pound sign character Any text on the line which follows the will be viewed as a comment and is not executable Therefore any commands you wish to execute should be typed on subsequent lines The can also be used elsewhere in the file to add comments This is a sample script shell This is my start up shell script cd usr sample ls gt samplelist cd ls 1 gt mylist cat stufftodo To execute this file type sh and then the filename For example if you named the file start up type sh start up The shell will execute each of the lines in the script as if you had just typed them You can even make the start up procedure simpler so that you do not have to type the sh To do so simply type the following command once 59 chmod x start up The chmod x command followed by your filename makes the file directly executable so that you only have to type the filename to execute it There
71. u can save the text in the buffer to your file or if you decide that you do Hoc Wane any of the changes you made you have not corrupted your original file For security purposes do not use either editor to change any file which you did not create yourself 6 2 THE ed LINE EDITOR ed is a text editor that allows you to create text files and to edit them one line at a time Since full screen editing is not possible with ed the editing of a even a few lines using the line by line method can be very time consuming and confusing It is highly recommended that you use a full screen editor such as vi for any Significant editing However if you undertake an editing process for which a line editor is sufficient here are some basics on ed The editor operates in two modes the command mode and the text input mode When you initiate the editor you will 38 be placed in the command mode In this mode you can do things such as add change and delete text save your file and exit the editor The ed editor assigns line numbers to each line in the buffer to allow you to address and identify specific lines You can make corrections to each line by following the same procedures used when correcting a line of type in the UNIX shell These procedures are discussed in Section 1 3 To begin an ed editing session type ed and the name of the file For example ed myfile If myfile is a new file the system will return a follow
72. upports several other programming languages As an example SYMMETRIX includes interpreters and compilers to develop and run programs in such languages as Pascal C Fortran BASIC LISP ICON and APL In addition because UNIX is written in C a high level language system programmers can change the operating system to adapt to their particular needs UNIX also supports electronic communications It contains an electronic mail system which can be used between users on the same system or to communicate with other users on a remote system It also supports electronic file transfer remote file sharing and remote processing C LIMITATIONS As in any operating system environment the use of UNIX presents limitations Although UNIX was originally developed twenty years ago many revisions and additions have occurred and continue to occur along the way This updating process has allowed UNIX to correct some past problems and to avoid others With the many versions of UNIX available limitations may exist in one version yet not in another The limitations presented here are general ones which characterize the system as a whole 1 User Interaction UNIX is often referred to as unfriendly However as the experience and knowledge of users vary so does the perception of the UNIX system s friendliness A new user of UNIX especially one completely new to the world of computers will find that learning the system requires a good deal of
Download Pdf Manuals
Related Search
View/Open view open windows view open apps view open ports windows view open tabs view open files view open ports view open ports linux view open vemis live version view open and touch info view open tabs mobile on desktop edge view open files on server view open positions view open programs view open electoral register view open windows as tiles the file couldn\u0027t open in protected view open my inbox gmail view task view icon open excel file couldn\u0027t open in protected view open view decoder prices open folder to view files openedge view login
Related Contents
AMS 700™ avec MS Pump™ (Pompe MS) 2 Descrição geral STF - Constituição - paulorodrigues.pro.br Philips 7P5441C199 Projection Television User Manual Betriebsanleitung PC70_700.sdw Conceptronic 8 port Gigabit switch SEER-SEM FAQ Remote Access via IPSec E-MANUAL - Appliances Connection Leccion por ASSURE Copyright © All rights reserved.
Failed to retrieve file