NC2000 system operation manual vol4

288 1.6K 8
NC2000 system operation manual vol4

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Maintenance Manual of NC2000 computer monitoring system (V2.0) Maintenance Manual IV State Network Research Institute, Nanjing Automation Research Institute of Automatic Control NARI, Nanjing Automation Co., Ltd June 2006 Copyright Notices The copyright of "NC2000 computer monitoring system user manual" is belonded to NARI,Nanjing Automation Co., Ltd Without the written permission of NARI, Nanjing Automation Co., Ltd., everyone shall not copy or spread any part of this manual in any form, using any means (electronic or mechanical, including photocopying or recording), or for any purpose , is the registered trademark of Nanjing NARI Group Corporation (c) Copyright 2004 is belonded to NARI, Nanjing Automation Co., Ltd All rights are reserved, and all reproductions are rejected Preface System software NC2000 is the power system computer control system software of a new generation, which is completed and has accumulated the monitoring software experience of many years, after NARI Access has been used in a number of power plants in our country by NARI Nanjing Automation Co., Ltd The System introduces CLINET / SERVER architecture and supports for different hardware, operating system and relational database systems Because the development approach is object-oriented and covers both the design and development process, users can use it more conveniently and intuitively The main objective of this manual is to enable users to fully grasp the installation 、usage、maintenance methods and procedures of NC2000 system The user manual is divided into four parts: the first volume introduces the installation process of NC2000 and the operating system, including, and the installation and configuration process of NC2000; the second volume is the user operation manual of NC2000 system and introduces operation methods of NC2000 in details; the third Volume introduces the usage of the configuration tool of NC2000 and the usage of the configuration software which is united by NC2000 system; the fourth volume is the maintenance manual of the system and introduces all aspects which need to be maintained and the methods and procedures of maintance We hope that through this user manual, the readers can grasp the NC2000 system and ensure the system to operate more securely, reliablely and stablely, and make greater contribution to the automation construction of power systems Read Guide Manual target This volume is the fourth book of the use manual of NC2000 computer monitoring system, and it is the maintenance manual of NC2000 system Reading object This manual is writen by internal engineering and technology-based personnel in our company and the computer monitoring system maintenance personnel of hydropower plant The manual uses Microsoft Word to typeset Manual constitute This manual is composed by six chapter A brief description of the software architecture of NC2000 system Introduce the basic Linux/Unix command and Linux utility Introduce the Solaris system commands and tools when manage and maintain Introduce the command in Windows platform in common use The tutorial of MySql relational database management and maintenance The technical of import and exportp of oracle relational database and the introduction of the maintenance tool of Sqlplus Handbook agreement This manual keeps to the following agreement: All the headings is in bold type If the title followed by a "conditions", it means that the content behind the heading required by the body is necessary under certain conditions 【Note】 That means readers should pay attention to those which need to pay attention 【Warning】 That means readers should pay attention to certain matters, otherwise they will cause serious error Contents Chapter Chapter Chapter Chapter I NC2000 Monitoring System Software II Functional Specification of Linux Operating System 42 III Utility of Solaris Operation System .128 IV Practical Help of Windows Operating System .243 Chapter I NC2000 Monitoring System Software 1.1 The Architecture of NC2000 Monitoring System Software 1.1.1 Constitution of NC2000 monitoring system software NC2000 system monitoring software is mainly omposed of two parts, the Front Human-Computer Interaction program and Backgrounds background program.The Human-Computer Interaction program mainly provides the screen display, reports, briefings, and other interactive query curve graphic display and operating functions;the Background program provides the communication between the computer monitoring system and the external device, the management of NC2000 database,the management of historical database and other kinds of background processes.The two programs exchang of data through the way of multicast Figure 1-1 Because each node has different function,the required deployment of NC2000 system software are also different.The chart below shows the NC2000 system software architecture: Figure 1-2 The Human-Computer Interaction of program of NC2000 system procedures are developed by Java.The class of inport is nc2000 ncconsole StartMenu,and after starting, relating various functions of human-computer interaction by implementating nc2000.ncconsole Human-computer interaction of NC2000 system mainly include: information of briefing, the screen showed ,list and Report inquiries, optical character display, AGCAVC parameter query, editing of sequence control program, database edit and so on At the node not need to run the human-computer interaction should not run the human-computer interaction process of NC2000 system.The communication among the various nodes of NC2000 monitoring system, as well as external communications are realized by the background context,and different roles of the computer nodes, the deployment of background processes will be slightly different The role of the background process playing will be described in a special chapter 1.1.2 Directory of NC2000 monitoring system Directory of NC2000 monitoring system software is as follows: Above all is a simple role of the directory and description.The follows is a function indication specific documents of directory under certain commonly used directory ~ / data / resource directory.For example,when configurate communication drivers in DB-databese of NC2000,and the driver name does not appear in the drop-down menu list,you can manually edit the file in this directory, "drvlist.properties", in order to adding new drivers at the end of the file.The format of the file can be defined as other content of the ARP cache in the local computer or another computer In addition, using arp command, you can manually enter a static physical network card/IP address, which way we may use for the default gateway and the local server, and this will help to reduce the the amount of information on the net In accordance with the default setting, the items in ARP cache is dynamic, when sending a designated location and the data does not exist in the current items of the cache, ARP will automatically add the item Once the the items of the cache has been input, they have begun to move toward a state of failure For example, in Windows NT/2000 networks, if not use the items further after input, physical/IP address will be ineffective in within 2-10 minutes Therefore, please not surprised when there is little or no items in the ARP cache, we can add by ping command from another computer or router Therefore, if you need to view the contents of the cache through the arp command, please ping the computer first(not the ping command from this machine) the commonly options of ARP command: ● arp-a or arp Cg View all the items of the high-speed cache The result is the same by using -a or -g parameters Over years the option -g has been used to display all the items in the ARP cache on a UNIX platform, and arp -a in Windows(-a can be regarded as all, that is the meaning of all), but it can also accept more traditional option -g ● arp-a IP If we have more than one card, then use arp-a added by the IP address of the interface, you can display nothing but the items in the ARP cache associated with the interface ● arp-s IP Physical Address We can manually enter a static item to the ARP cache This item will maintain an effective state during the gudie process of the computer Or in errors, the manual 267 configuration will automatically update the physical address of the item ● arp-d IP Using this command, we could manually delete a static item For example, in the command prompt, type Arp Ca; if we have used the Ping command to test and verify the connectivit from the computer to the host with the IP address 10.0.0.99, then the ARP cache would display the following items: Interface: 10.0.0.1 on interface 0x1 Internet Address Physical Address Type 10.0.0.99 00-e0-98-00-7c-dc dynamic In this example, the cache points out the MAC address which is resolved into 00-e0-9800-7c-dc by the remote host locates at 10.0.0.99 It is assigned on the remote computer's network adapter hardware MAC address is physical communication address for the computer wiht the remote TCP/IP on the net Thus we can use the command ipconfig and ping to see our own network configuration and determine whether it is correct, use netstat to view the connections established between other people and us, and to find the ICQ users' hidden IP information, use arp to view the MAC address of the network card 4.2.1.5 the using skills of Tracert, Route and NBTStat The using skills of Tracert If there are network connectivity issues, you can use the tracert command to check the path to the destination IP address and record the results Command tracert displays a group of IP routers which is used to transmit the packets from the computer to the target location, and each hop time If packets could not get to the target, tracert command will 268 display the last router which transmits successfully When the data is sent to the destination from our computer through multiple gateway, Tracert command can be used to track the used routing(path) The path the utility tracks is one path from the source computer to the destination, and the data can not be guaranteed to always follow the path If we use the configuration of DNS, then we will often get the name of cities 、 address and common communications company Tracert is very slow(if the designated destination address is very far), each router we need to give it about 15 seconds The usage of Tracert is very simple, we only need to add a IP address or URL to go after tracert, Tracert will convert the corresponding domain name The most common use of tracert: tracert IP address [-d] This command return the list of router which is gone through to reach the IP address By using the-d option, it will display the router path faster, because tracert will not attempt to resolve the name of the router path Tracert is used to detect the location of the failure generally, we can use tracert IP to detect which part a problem occurs Although we can not confirm what the problem is, but it has told us where the problem lies, we could be able to tell others where the problem is the using skills of Route Most of the host generally stay on the network segment which only connects to one router Since there is only one router, so there is no doubt to use which router to send the data to the remote computer, the router's IP address can be used as the the default gateway of all the computers on the network segment However, when the network has two or more routers, we may not want to rely solely on the default gateway In fact we may want some of our remote IP address transmit through a specific router, while the other remote IP transmit through another router In this case, we need the corresponding routing information, which is stored in the 269 routing table, and each host and each router are equipped with its own unique routing table Most routers use routing dedicated protocols to the exchange and dynamically update routing tables between routers However, in some cases, items must be manually added to the routing table of the routers and hosts Route is used to show 、 manually add and modify the items of routing table The general options: ● route print This command is used to show the the current items in the routing table and the output on the network segment which has a single router; as a result of using IP address to configure the network card, all of these items are added automatically ● route add Using this command, we can add routing items to the routing table For example, if we want to set a routing to the network 209.98.32.33, which has to go through router network segment First it will go through a router on the local network, whose IP is 202.96.123.5, subnet mask is 255.255.255.224, then we should enter the following command: route add 209.98.32.33 mask 255.255.255.224 202.96.123.5 metric ● route change We can use this command to modify the data transmission route, but we can not use this command to change the data destination The following example of the data routing can be changed to another router, it uses a more direct path which contains three network segment: route add 209.98.32.33 mask 255.255.255.224 202.96.123.250 metric 270 ● route delete We could use this command to delete the routing from the routing table For example: route delete 209.98.32.33 The using skills of NBTStat Use nbtstat command to release and refresh NetBIOS names The utility NBTStat (the NetBIOS statistical data of TCP/IP) provides statistical data on the NetBIOS Using NetBIOS, we can view the NetBIOS name table of the local computer or remote computer Commonly options: ● nbtstat Cn Show the names and service procddures which are stored in the local ● nbtstat Cc This command is used to show the contents of the NetBIOS name cache NetBIOS name cache is used to store the NetBIOS computer names and IP addresses which communicate with this computer recently ● nbtstat Cr This command is used to clear and reload the NetBIOS name cache ● nbtstat-a IP display another computer's physical address and the list of names through IP, the contents that we show are the same as the contents that their own run the command nbtstat-n 271 ● nbtstat-s IP Show the NetBIOS connection table of another computer who uses the IP address For example, under the command prompt, we type nbtstat CRR to release and refresh the progress of the process and output it in the command line form This information indicates that whether all the local NetBIOS names, which have registered in this computer's WINS recently, have used WINS server to release and renew the registration 4.2.2 Windows command Guinness accwiz.exe > Accessibility Wizard for walking you through setting up your machine for your mobility needs acsetups.exe > ACS setup DCOM server executable actmovie.exe > Direct Show setup tool append.exe > Allows programs to open data in specified directories as if they were in the current directory arp.exe > NETWORK Display and modify IP - Hardware addresses at.exe > AT is a scheduling utility also included with UNIX atmadm.exe > Displays statistics for ATM call manager attrib.exe > Display and modify attributes for files and folders autochk.exe > Used to check and repair Windows File Systems autoconv.exe > Automates the file system conversion during reboots autofmt.exe > Automates the file format process during reboots autolfn.exe > Used for formatting long file names bootok.exe > Boot acceptance application for registry bootvrfy.exe > Bootvrfy.exe, a program included in Windows 2000 that notifies the system that startup was successful Bootvrfy.exe can be run on a local or remote computer cacls.exe > Displays or modifies access control lists (ACLs) of files calc.exe > Windows Calculators 272 cdplayer.exe > Windows CD Player change.exe > Change { User | Port | Logon } charmap.exe > Character Map chglogon.exe > Same as using "Change Logon" chgport.exe > Same as using "Change Port" chgusr.exe > Same as using "Change User" chkdsk.exe > Check the hard disk for errors similar to Scandisk Stages must specify a Drive Letter chkntfs.exe > Same as using chkdsk but for NTFS NTFS cidaemon.exe > Component of Ci Filer Service cipher.exe > Displays or alters the encryption of directories [files] on NTFS partitions cisvc.exe > Content Index It's the content indexing service for I ckcnv.exe > Cookie Convertor cleanmgr.exe > Disk Cleanup, popular with Windows 98 cliconfg.exe > SQL Server Client Network Utility clipbrd.exe > Clipboard viewer for Local will allow you to connect to other clipboards clipsrv.exe > Start the clipboard Server clspack.exe > CLSPACK used to create a file listing of system packages cluster.exe > Display a cluster in a domain _cmd_.exe > Famous command prompt cmdl32.exe > Connection Manager Auto-Download cmmgr32.exe > Connection Manager cmmon32.exe > Connection Manager Monitor cmstp.exe > Connection Manager Profile Manager comclust.exe > about cluster server comp.exe > ComClust Add, Remove, or Join a cluster compact.exe > Displays or alters the compression of files on NTFS partitions conime.exe > Console IME control.exe > Starts the control panel convert.exe > Convert File System to NTFS 273 convlog.exe > Converts MS IIS log files cprofile.exe > Copy profiles cscript.exe > MS Windows Scripts Host Version 5.1 csrss.exe > Client Server Runtime Process csvde.exe > Comma Separated Variable Import/Export Utility dbgtrace.exe > Terminal Server dcomcnfg.exe > Display the current DCOM configuration dcphelp.exe > ? dcpromo.exe > Promote a domain controller to ADSI ddeshare.exe > Display DDE shares on local or remote computer ddmprxy.exe > debug.exe > Runs Debug, a program testing and editing tool dfrgfat.exe > Defrag FAT file system dfrgntfs.exe > Defrag NTFS file system dfs_cmd_.exe > configures a Dfs tree dfsinit.exe > Distributed File System Initialization dfssvc.exe > Distributed File System Server diantz.exe > MS Cabinet Maker diskperf.exe > Starts physical Disk Performance counters dllhost.exe > dllhost is used on all versions of Windows 2000 dllhost is the hedost process for all COM+ applications dllhst3g.exe > dmadmin.exe > Disk Manager Service dmremote.exe > Part of disk management dns.exe > DNS Applications DNS doskey.exe > recalls Windows command lines and creates macros dosx.exe > DOS Extender dplaysvr.exe > Direct Play Helper drwatson.exe > Dr Watson for 2000 Fault Detector drwtsn32.exe > Dr Watson for 2000 viewer and configuration manager 274 dtcsetup.exe > Installs MDTC dvdplay.exe > Windows 2000 DVD player dxdiag.exe > Direct-X Diagnostics edlin.exe > line-oriented text editor edlin.exe > line-oriented text editor esentutl.exe > MS Database Utility eudcedit.exe > Private character editor Ture eventvwr.exe > Windows 2000 Event Viewer evnt_cmd_.exe > Event to trap translator; Configuration tool evntwin.exe > Event to trap translator setup exe2bin.exe > Converts EXE to binary format expand.exe > Expand Files that have been compressed extrac32.exe > CAB File extraction utility fastopen.exe > Fastopen tracks the location of files on a hard disk and stores the information in memory for fast access faxcover.exe > Fax Cover page editor faxqueue.exe > Display Fax Queue faxsend.exe > Fax Wizard for sending faxes faxsvc.exe > Starts fax server fc.exe > Compares two files or sets of files and their differences find.exe > Searches for a text string in file or files findstr.exe > Searches for strings in files finger.exe > Fingers a user and displays statistics on that user Finger fixmapi.exe > Fix mapi files flattemp.exe > Enable or disable temporally directories fontview.exe > Display fonts in a font file forcedos.exe > Forces a file to start in dos mode freecell.exe > Popular Windows Game ftp.exe > File Transfer Protocol used to transfer files over a network connection gdi.exe > Graphic Device Interface 275 grovel.exe > grpconv.exe > Program Manager Group Convertor help.exe > displays help for Windows 2000 commands hostname.exe > Display hostname for machine Hostname ie4uinit.exe > IE5 User Install tool ieshwiz.exe > Customize folder wizard iexpress.exe > Create and setup packages for install iisreset.exe > Restart IIS Admin Service internat.exe > Keyboard Language Indicator Applet ipconfig.exe > Windows 2000 IP configuration ipsecmon.exe > IP Security Monitor ipxroute.exe > IPX Routing and Source Routing Control Program irftp.exe > Setup FTP for wireless communication ismserv.exe > Intersite messaging Service jdbgmgr.exe > Microsoft debugger for java jetconv.exe > Convert a Jet Engine Database jetpack.exe > Compact Jet Database jview.exe > Command-line loader for Java J krnl386.exe > Core Component for Windows 2000 label.exe > Change label for drives lcwiz.exe > License Compliance Wizard for local or remote systems ldifde.exe > LDIF cmd line manager licmgr.exe > Terminal Server License Manager lights.exe > display connection status lights llsmgr.exe > Windows 2000 License Manager llssrv.exe > Start the license Server lnkstub.exe > locator.exe > RPC Locator lodctr.exe > Load perfmon counters logoff.exe > Log current user off 276 lpq.exe > Displays status of a remote LPD queue lpr.exe > Send a print job to a network printer lsass.exe > LSA Executable and Server DLL lserver.exe > Specifies the new DNS domain for the default server macfile.exe > Used for managing MACFILES magnify.exe > Used to magnify the current screen makecab.exe > MS Cabinet Maker mdm.exe > Machine Debug Manager mem.exe > Display current Memory stats migpwd.exe > Migrate passwords mmc.exe > Microsoft Management Console mnmsrvc.exe > Netmeeting Remote Desktop Sharing mobsync.exe > Manage Synchronization mountvol.exe > Creates, deletes, or lists a volume mount point mplay32.exe > MS Media Player mpnotify.exe > Multiple Provider Notification application mq1sync.exe > mqbkup.exe > MS Message Queue Backup and Restore Utility mqexchng.exe > MSMQ Exchange Connector Setup mqmig.exe > MSMQ Migration Utility mqsvc.exe > ? mrinfo.exe > Multicast routing using SNMP mscdexnt.exe > Installs MSCD (MS CD Extensions) msdtc.exe > Dynamic Transaction Controller Console msg.exe > Send a message to a user local or remote mshta.exe > HTML Application HOST HTML msiexec.exe > Starts Windows Installer Program mspaint.exe > Microsoft Paint msswchx.exe > mstask.exe > Task Schedule Program 277 mstinit.exe > Task scheduler setup narrator.exe > Program will allow you to have a narrator for reading nbtstat.exe > Displays protocol stats and current TCP/IP connections using NBT nddeapir.exe > NDDE API Server side NDDE net.exe > Net Utility net1.exe > Net Utility updated version from MS netdde.exe > Network DDE will install itself into the background netsh.exe > Creates a shell for network information netstat.exe > Displays current connections nlsfunc.exe > Loads country-specific information notepad.exe > Opens Windows 2000 Notepad nslookup.exe > Displays information for DNS ntbackup.exe > Opens the NT Backup Utility ntbooks.exe > Starts Windows Help Utility ntdsutil.exe > Performs DB maintenance of the ADSI ntfrs.exe > NT File Replication Service ntfrsupg.exe > ntkrnlpa.exe > Kernel patch ntoskrnl.exe > Core NT Kernel ntsd.exe > ntvdm.exe > Simulates a 16-bit Windows environment nw16.exe > Netware Redirector nwscript.exe > runs netware scripts odbcad32.exe > ODBC 32-bit Administrator odbcconf.exe > Configure ODBC driver's and data source's from command line os2.exe > An OS/2 Warp Server (os2 /o) OS/2 os2srv.exe > An OS/2 Warp Server OS/2 os2ss.exe > An OS/2 Warp Server OS/2 osk.exe > On Screen Keyboard packager.exe > Windows 2000 Packager Manager 278 pathping.exe > Combination of Ping and Tracert pax.exe > is a POSIX program and path names used as arguments must be specified in POSIX format Use "//C/Users/Default" instead of "C:\USERS\DEFAULT." pentnt.exe > Used to check the Pentium for the floating point division error perfmon.exe > Starts Windows Performance Monitor ping.exe > Packet Internet Groper posix.exe > Used for backward compatibility with Unix print.exe > Cmd line used to print files progman.exe > Program manager proquota.exe > Profile quota program psxss.exe > POSIX Subsystem Application qappsrv.exe > Displays the available application terminal servers on the network qprocess.exe > Display information about processes local or remote query.exe > Query TERMSERVER user process and sessions quser.exe > Display information about a user logged on qwinsta.exe > Display information about Terminal Sessions rasadmin.exe > Start the remote access admin service rasautou.exe > Creates a RAS connection rasdial.exe > Dial a connection ras.exe > Starts a RAS connection rcp.exe > Copies a file from and to a RCP service rdpclip.exe > RdpClip allows you to copy and paste files between a terminal session and client console session recover.exe > Recovers readable information from a bad or defective disk redir.exe > Starts the redirector service regedt32.exe > 32-bit register service regini.exe > modify registry permissions from within a script register.exe > Register a program so it can have special execution characteristics 279 regsvc.exe > regsvr32.exe > Registers and unregister's dll's As to how and where it register's them I dont know regtrace.exe > Options to tune debug options for applications failing to dump trace statements Trace setting regwiz.exe > Registration Wizard remrras.exe > replace.exe > Replace files reset.exe > Reset an active section rexec.exe > Runs commands on remote hosts running the REXEC service risetup.exe > Starts the Remote Installation Service Wizard route.exe > display or edit the current routing tables routemon.exe > no longer supported router.exe > Router software that runs either on a dedicated DOS or on an OS/2 system rsh.exe > Runs commands on remote hosts running the RSH service rsm.exe > Mounts and configures remote system media rsnotify.exe > Remote storage notification recall rsvp.exe > Resource reservation protocol runas.exe > RUN a program as another user 允 rundll32.exe > Launches a 32-bit dll program runonce.exe > Causes a program to run during startup rwinsta.exe > Reset the session subsystem hardware and software to known initial values savedump.exe > Does not write to e:\winnt\user.dmp scardsvr.exe > Smart Card resource management server schupgr.exe > It will read the schema update files (.ldf files) and upgrade the schema (part of ADSI) 280 secedit.exe > Starts Security Editor help services.exe > Controls all the services sethc.exe > Set High Contrast - changes colours and display mode Logoff to set it back to normal setreg.exe > Shows the Software Publishing State Key values setup.exe > GUI box prompts you to goto control panel to configure system components setver.exe > Set Version for Files sfc.exe > System File Checker test and check system files for integrity sfmprint.exe > Print Services for Macintosh sfmpsexe.exe > sfmsvc.exe > shadow.exe > Monitor another Terminal Services session share.exe > shmgrate.exe > shrpubw.exe > Create and Share folders sigverif.exe > File Signature Verification skeys.exe > Serial Keys utility smlogsvc.exe > Performance Logs and Alerts smss.exe > sndrec32.exe > starts the Windows Sound Recorder sndvol32.exe > Display the current volume information snmp.exe > Simple Network Management Protocol used for Network Mangement snmptrap.exe > Utility used with SNMP sol.exe > Windows Solitaire Game sort.exe > Compares files and Folders SPOOLSV.EXE > Part of the spooler service for printing sprestrt.exe > srvmgr.exe > Starts the Windows Server Manager stimon.exe > WDM StillImage- > Monitor stisvc.exe > WDM StillImage- > Service 281 ... process of NC2000 and the operating system, including, and the installation and configuration process of NC2000; the second volume is the user operation manual of NC2000 system and introduces operation. .. System .243 Chapter I NC2000 Monitoring System Software 1.1 The Architecture of NC2000 Monitoring System Software 1.1.1 Constitution of NC2000 monitoring system software NC2000 system monitoring... This volume is the fourth book of the use manual of NC2000 computer monitoring system, and it is the maintenance manual of NC2000 system Reading object This manual is writen by internal engineering

Ngày đăng: 21/05/2015, 08:26

Từ khóa liên quan

Mục lục

  • Chapter I NC2000 Monitoring System Software

    • 1.1 The Architecture of NC2000 Monitoring System Software

      • 1.1.1 Constitution of NC2000 monitoring system software

      • 1.1.2 Directory of NC2000 monitoring system

      • 1.2 The background process of NC2000 monitoring and control system

        • 1.2.1 The running environment of background process

        • 1.2.2 Background Process of Monitoring System

        • 1.2.3 The Data Stream of NC2000 System.

        • 1.3 The Communication Drivers of NC2000 System

          • 1.3.1 The Header File of NC2000 system Driver

          • 1.3.2 The common NC2000 system communication driven library function

          • Chapter II Functional Specification of Linux Operating System

            • 2.1 Linux System Commands

              • 2.1.1 Commonly Used Command Explain of Linux System

              • 2.2 utility Linux system tools

                • 2.2.1 RedHat Linux 9 package management tools

                • 2.2.2 users and configuration groups of RedHat Linux 9

                • 2.2.3 RedHat Linux 9 Network Configuration Computers need a network connection to communicate with other computers. It is achieved by recognizing the operating system interface card (such as: Ethernet card, ISDN modems, token ring), and configuring the interface to connect to the network.

                • 2.2.4 Network File System (NFS)

                • 2.2.5 RedHat Linux 9 basic firewall configuration

                • 2.2.6 The RedHat Linux 9 controlling of accessing to services

                • Chapter III Utility of Solaris 9 Operation System

                  • 3.1 Solaris 9 System Commands

                    • 3.1.1 boot command and parameters under the case of Solaris Unix OK

                    • 3.2 The Utility in Solaris 9

                      • 3.2.1 Admintool tools

                      • 3.2.2 program package command

                      • 3.2.3 Installation and Management of system patch

                      • 3.3 Shell programming instructions

                        • 3.3.1 programme shell scripts

                        • 3.3.2 Reference table and script examples

Tài liệu cùng người dùng

Tài liệu liên quan