You are on page 1of 48

In some older versions of UNIX, the timezone definition was built into the

kernel and could be changed only by rebuilding the kernel. Most modern ver-
sions, including Tru64 UNIX, are more flexible. Tru64 UNIX uses the symbolic link
/etc/zoneinfo/localtime to define the system time zone. The target of this link is a
time zone definition file whose name represents the timezone name, geographic
region, or a major city within the time zone. For example, a Tru64 UNIX version 5
system in the Eastern timezone of the United States has the localtime link defined
as follows:
In some older versions of UNIX, the timezone definition was built into the
kernel and could be changed only by rebuilding the kernel. Most modern ver-
sions, including Tru64 UNIX, are more flexible. Tru64 UNIX uses the symbolic link
/etc/zoneinfo/localtime to define the system time zone. The target of this link is a
time zone definition file whose name represents the timezone name, geographic
region, or a major city within the time zone. For example, a Tru64 UNIX version 5
system in the Eastern timezone of the United States has the localtime link defined
as follows:

To change the timezone,


To change
all that
the has
timezone,
to be done
all that
is tohas
modify
to be the
donesymbolic
is to modify
link tothe symbolic link to
point to the desired
point
zone.toThis
the desired
can be done
zone.onThis
thecanfly be
anddone
doesonnot
therequire
fly anda does
kernelnot require a kernel
rebuild or even a reboot.
rebuildFor
or even
example,
a reboot.
suppose
For example,
the system suppose
in the above
the system
examplein the
is above example is
moved from Atlanta moved
to Houston,
from Atlanta
whichtorequires
Houston, thewhich
timezone
requires
to bethe
changed
timezonefrom to be changed from
U.S. Eastern to Central.
U.S. Eastern
All that to
needs
Central.
to beAll
done
thatisneeds
to replace
to be the
donesymbolic
is to replace
link with
the symbolic link with
the correct value: the correct value:

The timezone definition


The timezone
files residedefinition
in subdirectories
files resideunder
in subdirectories
/etc/zoneinfo,under
so the
/etc/zoneinfo, so the
target of the symbolic
target
linkofcould
the symbolic
be eitherlinka relative
could bepath
either
(“America/Chicago”)
a relative path (“America/Chicago”)
or an or an
absolute path (“/etc/zoneinfo/America/Chicago”)
absolute path (“/etc/zoneinfo/America/Chicago”)
with equal validity.withEachequal
definition
validity. Each definition
file defines its timefile
zone
defines
in terms
its time
of itszone
offset
in from
termsGMT,
of its its
offset
rulesfrom
for starting
GMT, its rules for starting
and ending daylightandsaving
endingtime,
daylight
and the saving
abbreviation(s)
time, and the
used abbreviation(s)
to designate the
used to designate the
timezone. For example,
timezone.
the America/New_York
For example, the America/New_York
file defines the U.S.file Eastern
defines time
the U.S. Eastern time
zone. Standard time
zone.
is five
Standard
hours before
time isGMT,
five hours
daylight
before
saving
GMT,time
daylight
advances
saving
the time advances the
clock by an hour beginning
clock by anthehour
firstbeginning
Sunday in the
April
first
andSunday
endinginthe
April
first
and
Sunday
endingin the first Sunday in
October, and the abbreviations
October, and“EST”
the abbreviations
and “EDT” are
“EST”
usedand
for “EDT”
Eastern
are
Standard
used forTime
Eastern Standard Time
and Eastern Daylight
andTime
Eastern
respectively.
Daylight Time respectively.

Most (but not all) of


Most
the (but
timezone
not all)
names
of thechanged
timezone between
names Tru64
changed UNIX between
versions
Tru64 UNIX versions
4 and 5. For example,
4 andthe5.U.S.
For Eastern
example, timezone
the U.S. isEastern
“US/Eastern”
timezone in version
is “US/Eastern”
4, in version 4,
but “America/New_York”
but “America/New_York”
in version 5. Whenina version
system is 5. upgraded
When a system from version
is upgraded from version
4 to version 5, the 4update
to version
installation
5, the update
procedureinstallation
changesprocedure
the symbolic changes
link ifthe symbolic link if
the timezone namethe changed.
timezone If the
name timezone
changed. name
If the
didtimezone
not change, name nodid
action
not change, no action
is taken—which leadsis taken—which
to one of theleads
possible
to one
timezone
of the possible
configuration
timezoneproblems.
configuration problems.
There is a set of timezones
There is adefined
set of timezones
strictly in terms
defined of strictly
their offset
in terms
fromofGMT,
their with
offset from GMT, with
no daylight saving notimedaylight
changes.saving
Thesetimetimezones
changes.have Thesenames
timezones
such as have
“GMT−5,”
names such as “GMT−5,”
“GMT+2,” etc. In Tru64
“GMT+2,”
UNIXetc.
version
In Tru64
4, theUNIX
timezone
version name
4, therepresents
timezonethe name
offsetrepresents the offset
from GMT—for example,
from GMT—for
“GMT−6”example,
is six hours“GMT−6”
behindisGMT,six hours
or thebehind
equivalent
GMT,ofor the equivalent of
U.S. Central Standard
U.S.Time
Central
(CST).
Standard
However, TimeTru64
(CST).UNIX
However,
version Tru64
5 wasUNIX
changed
version
to 5 was changed to
comply with the POSIX.1 standard (ISO/IEC 9945-1 ANSI/IEEE Std. 1003.1), which
defines GMT-offset timezone names in terms of the number of hours that must be
added to local time in order to match GMT. In this scheme, the time equivalent to
U.S. CST must have six hours added to it in order to match GMT, so this timezone
is now called “GMT+6.” In other words, the definition change effectively swapped
the plus and minus signs in the zone names; the old GMT−6 is now GMT+6, and
vice versa. (In our opinion, the definition called for by the POSIX. 1 standard is
counterintuitive and confusing. However, it is the standard.)
comply with the POSIX.1 standard (ISO/IEC 9945-1 ANSI/IEEE Std. 1003.1), which
defines GMT-offset timezone names in terms of the number of hours that must be
added to local time in order to match GMT. In this scheme, the time equivalent to
U.S. CST must have six hours added to it in order to match GMT, so this timezone
is now called “GMT+6.” In other words, the definition change effectively swapped
the plus and minus signs in the zone names; the old GMT−6 is now GMT+6, and
vice versa. (In our opinion, the definition called for by the POSIX. 1 standard is
counterintuitive and confusing. However, it is the standard.)

When a system using Whenonea of


system
the GMT-offset
using one of timezones
the GMT-offset
is upgraded
timezones
from Tru64
is upgraded from Tru64
UNIX version 4 to UNIX
versionversion
5, the 4timezone
to version symbolic
5, the timezone
link is notsymbolic
changed—but
link is not
the changed—but the
definition of a timezone
definition
suchofasa “GMT−5”
timezonehas such changed
as “GMT−5”in an has
unexpected
changedway.in anIt's
unexpected way. It's
now a timezone that's
nowfivea timezone
hours ahead that'soffive
GMThoursinstead
ahead of of
fiveGMThours
instead
behind,
of five
or ahours behind, or a
total of 10 hours ahead
total of
of 10
thehours
desired ahead
timezone.
of the desired
This problem
timezone.
usually
Thisappears
problemas usually appears as
the system time “jumping”
the system forward
time “jumping”
or backward forward
severalorhours
backward
whenseveral
the system
hoursiswhen the system is
upgraded to version upgraded
5. If youtoencounter
version 5.this If you
behavior,
encountercheck this
to behavior,
see if youcheck
are using
to see if you are using
one of the GMT-offsetone timezones.
of the GMT-offset
If so, change
timezones.
it to the
If so,
zone
change
nameitwith
to the
thezone
opposite
name with the opposite
sign or (preferably)sign
a timezone
or (preferably)
with ana appropriate
timezone with “meaningful”
an appropriatename. “meaningful” name.

Timezone problems Timezone


can also problems
occur if a can
timezone
also occur
definition
if a timezone
file becomes
definition
corrupted.
file becomes corrupted.
This is usually caused
Thisbyis issuing
usually an
caused
“In” command
by issuing to an change
“In” command
the localtime
to change
sym-the localtime sym-
bolic link, but specifying
bolic link,
the but
arguments
specifying
in the
the wrong
arguments
orderin(e.g.,
the wrong
“In -sf order
localtime
(e.g., “In -sf localtime
America/New_York” America/New_York”
instead of “ln -sf America/New_York
instead of “ln -sf America/New_York
localtime”). The latter
localtime”). The latter
command correctlycommand
defines the correctly
symbolicdefines
link “localtime”
the symbolic pointing
link “localtime”
to target file
pointing to target file
“America/New_York.” “America/New_York.”
Specifying the arguments
Specifyingin the
the wrong
arguments
orderindefines
the wrong
“Amer-
order defines “Amer-
ica/New_York” as aica/New_York”
symbolic link, as which
a symbolic
overwrites
link,the
which
actual
overwrites
timezone the
definition
actual timezone definition
file. If there is a problem
file. If there
with the
is aunderlying
problem with timezone
the underlying
file, Tru64timezone
UNIX won't
file, Tru64
be UNIX won't be
able to interpret theable
timezone
to interpret
correctly.
the timezone
In this case,
correctly.
there are
In this
two case,
alternatives.
there are
Either
two alternatives. Either
copy the affected timezone
copy the file
affected
fromtimezone
another Tru64
file from
UNIXanother
systemTru64
or the
UNIX
installation
system or the installation
CD-ROM, or rebuild CD-ROM,
it from the
or rebuild
timezoneit from
source
thefiles.
timezone source files.

The timezone source Thefiles


timezone
are located
sourcein directory
files are located
/etc/zoneinfo/sources.
in directory /etc/zoneinfo/sources.
There is one There is one
file for each continent
file for
containing
each continent
all the time
containing
zones on all that
the time
continent
zones(e.g.,
on that
“europe,”
continent (e.g., “europe,”
“northamerica,” etc.).
“northamerica,”
To rebuild theetc.).
timezone
To rebuild
definition
the timezone
files, usedefinition
the timezonefiles, use the timezone
compiler, zic(8), oncompiler,
the appropriate
zic(8), on
source
the appropriate
file. For example,
sourceiffile.America/New_York
For example, if America/New_York
is is
corrupted, the following
corrupted,
commands
the following
will rebuild
commands
all of thewillNorth
rebuild
American
all of the
timezone
North American timezone
definition files: definition files:

This replaces the corrupted


This replaces
“America/New_York”
the corrupted “America/New_York”
file with a newly built
file version.
with a newly built version.

If you suspect a corrupted


If you suspect
timezone
a corrupted
file, the “zdump(8)”
timezone file,command
the “zdump(8)”
can be used
command can be used
to verify the timezone
to verify
definition.
the timezone
The “zdump
definition.
-v” command
The “zdump
reads-v”a command
timezone reads a timezone
definition file and definition
displays the fileGMT
and offset
displays
andthe
daylight
GMT offset
savingand
timedaylight
transitions
saving
intime transitions in
each year from 1900 to 2038. This generates a lot of output, but it can be pared down
by piping the command to grep for the current year. For example, the following
command checks the definition for America/New_York:
each year from 1900 to 2038. This generates a lot of output, but it can be pared down
by piping the command to grep for the current year. For example, the following
command checks the definition for America/New_York:

Check the output from


Checkzdump
the output
to seefrom
if thezdump
timezone
to see
hasifthe
thecorrect
timezone
definition.
has the correct
If definition. If
the output is incorrect
the output
or missing,
is incorrect
the definition
or missing,
file needs
the definition
to be replaced
file needs
by one
to be replaced by one
of the methods described
of the methods
above. described above.

One final timezoneOne issue


final
thattimezone
can ariseissue
under that
rare
can
circumstances
arise under rare
is the
circumstances
need to is the need to
change a timezonechange
definition.
a timezone
For example,
definition.
the government
For example,oftheMexico
government
changedof Mexico changed
that country's timezone
that country's
rules in 2001.
timezone
As a rules
result,insystems
2001. Asina Mexico
result, systems
that continued
in Mexico that continued
to use the existing to
Mexican
use thetimezone
existing Mexican
definition timezone
files would
definition
not display
files the
would
correct
not display the correct
time for part of thetime
year.for
In part
suchofcases,
the year.
it's necessary
In such cases,
to modify
it's necessary
the timezone
to modify
source
the timezone source
files and build newfilestimezone
and builddefinitions.
new timezone
The details
definitions.
of this process
The details
are of
beyond
this process
the are beyond the
scope of this book,scope
but theof basic
this book,
procedure
but the is basic
as follows:
procedure is as follows:

1. Edit the appropriate


1. source
Edit file
the in
appropriate
/etc/zoneinfo/sources
source file inand
/etc/zoneinfo/sources
modify or create and modify or creat
the appropriate timezone
thedefinitions.
appropriate timezone definitions.
2. Use zic to compile
2. the newUse timezone
zic to compile
definitions.
the new timezone definitions.

3. Change the /etc/zoneinfo/localtime


3. Change the /etc/zoneinfo/localtime
symbolic link (if necessary)
symbolic
to point
linkto(ifthe
necessary) to point to th
newly defined timezone.newly defined timezone.

For information onFor


theinformation
timezone source
on thefiles,
timezone
consult
source
the tzfile(4)
files, consult
reference
thepage.
tzfile(4) reference page.

Before you call support


Before you call support

Before calling technical


Beforesupport
callingon
technical
a timezone
support
issue,
onperform
a timezone
the issue,
following:▪Check
perform the following:▪Check
the current systemthe
date.▪Verify
current system
that the
date.▪Verify
timezone link
that (/etc/zoneinfo/localtime)
the timezone link (/etc/zoneinfo/localtime)
points to the correct
points
timezone.▪Check
to the correct the
timezone.▪Check
timezone definition
the timezone
file withdefinition
zdump.▪Iffile with zdump.▪If
necessary, rebuild necessary,
the timezonerebuild
definition
the timezone
files withdefinition
zic. files with zic.
Allison B. Zhang, Don Gourley, in Creating Digital Collections, 2009
Allison B. Zhang, Don Gourley, in Creating Digital Collections, 2009

Configure theConfigure
system the system
System configuration System
implements
configurationthe user
implements
interface design
the userand
interface
enablesdesign
all theand enables all the
designed functionality.
designed
Almost functionality.
all digital collection
Almost allsystems
digital collection
provide custom
systemsconf-
provide custom conf-
iguration at a certain
iguration
level. Some
at a certain
systemslevel.
are easy
Some tosystems
configure arebut
easy
may
to not
configure
be flexible
but may not be flexible
enough to accommodate
enoughall todesign
accommodate
ideas. Some
all design
systems
ideas.
are Some
very flexible
systemsbutare
may
very flexible but may
not be easy to configure.
not be Iteasy
is very
to configure.
importantIttois understand
very important
the to
capability
understand
of thethe capability of the
system configuration system
before
configuration
designing abefore
user interface
designingforaauser
digital
interface
collection.
for a digital collection.

System configurationSystem
should
configuration
start when ashould
small number
start when
of documents
a small numberand metadata
of documents and metadata
records are available.
records
Usingare theavailable.
small pool
Using
of documents
the small pooland of
metadata
documents records
andas
metadata
a records as a
testing bed makes it
testing
easy tobedadjust
makestheitdesign
easy toand
adjust
experiment
the designwith
andtheexperiment
configuration.
with the configuration.
If the system configuration
If the system
cannotconfiguration
be completed cannot
untilbe
thecompleted
documents until
andthe
metadata
documents and metadata
records are created,
records
then, ifare
thecreated,
systemthen,
allows,
if the
it issystem
wise toallows,
first upload
it is wise
a small
to first upload a small
number of documentsnumberand ofmetadata
documents records
and to
metadata
test the records
configuration
to test settings.
the configuration settings.

> Read full chapter


> Read full chapter

SecuringSecuring
User Access
User Access
In How to Cheat atInMicrosoft
How to Cheat
Vista Administration,
at Microsoft Vista
2007
Administration, 2007

Disabling UACDisabling
via Msconfig.exe
UAC via Msconfig.exe
The System Configuration
The System utility
Configuration
(better known utility
to many
(better
administrators
known to many as mscon-
administrators as mscon-
fig.exe) has been around
fig.exe)since
has been
the days
around
of Windows
since the98. days
In of
Windows
Windows Vista,
98. In
mscon-
Windows Vista, mscon-
fig.exe can be usedfig.exe
to disable
can be
UAC used
whether
to disable
it’s temporarily
UAC whether to test
it’s temporarily
if UAC is causing
to test if UAC is causing
any compatibility issues
any compatibility
or if an administrator
issues or ifisan
looking
administrator
to disableis it
looking
for good.
to disable
The it for good. The
steps in doing thissteps
are asinfollows:
doing this are as follows:

1. Click Start | Run,


1. type msconfig.exe,
Click Start | Run,
andtype
pressmsconfig.exe,
Enter. and press Enter.

2. The system configuration


2. Theutility
system opens,
configuration
go to the Tools
utilitytab.
opens, go to the Tools tab.

3. Click Disable 3.
UAC, andClick
then Disable
click Launch
UAC,(as
andshown
then click
in Figure 9.15).Fig-
Launch (as shown in Figure 9.15).Fig-
ure 9.15. Disable UAC via
ure 9.15.
msconfig.exe
Disable UAC via msconfig.exe
4. A command window
4. will
A appear,
command followed
windowbywill
a notification
appear, followed
bubbleby
informing
a notification bubble informin
you that UAC is disabledyou
andthat
thatUAC
youismust
disabled
restart
and
your
thatcomputer
you musttorestart
apply your
the computer to apply th
change. Go ahead and restart
change.your
Go computer.
ahead and restart your computer.
Best Practices According To Microsoft
Best Practices According To Microsoft
Microsoft highly recommends
Microsoft highly
leaving
recommends
UAC enabledleaving
for PCs
UACinenabled
your organization.
for PCs in your organization.
All users includingAll
IT users
staff should
including
log IT
onstaff
withshould
standard
loguser
on with
privileges,
standardwhile
userad-
privileges, while ad-
ministrators shouldministrators
use two different
shouldaccounts:
use two different
one account
accounts:
that runs
one as
account
a standard
that runs as a standard
user, and a seconduser,
in which,
and awhen
second
prompted
in which,bywhen
UAC,prompted
the administrator
by UAC, can
the enter
administrator can enter
its username and password.
its username and password.

Some Independent
Some Advice
Independent Advice
Make sure all developers
Make sure
on your
all developers
network only
on your
use standard
network user
only accounts
use standard
and user
not accounts and not
administrative ones.administrative
This preventsones.
programs
This prevents
that are being
programswritten
thatfrom
are being
depending
written from depending
on the user havingon administrator
the user havingrights.
administrator
It makes testing
rights.and
It makes
debugging
testing
forand
devel-
debugging for devel-
opers a lot easier and
opers
more
a lot“real
easier
world.”
and more “real world.”
▪ SNMP ▪ SNMP

▪ Monitoring ▪ Monitoring

▪ Licenses ▪ Licenses
 swap name | ip_address
zone name
zone name When configuring NetBIOS, specifies the zone W
for the client. fo
swap name | ip_address
swap name | ip_address Specifies the server that provides a swap space for S
clients. Use a valid IP address or valid hostname. c
NokiaIP130:4> set dns domainname acme.com
NokiaIP130:4> set dns domainname acme.com
NokiaIP130:5> setNokiaIP130:5>
dns primary 172.16.22.55
set dns primary 172.16.22.55
Argument
Just because you have your Nokia appliance in a remote location does not mean
it cannot be part of your enterprise backup and restore plans. Using CLISH, you
can manually back up your files when needed, schedule backups to occur at regular
intervals, and transfer the files off of the appliance.
Just because you have your Nokia appliance in a remote location does not mean
it cannot be part of your enterprise backup and restore plans. Using CLISH, you
can manually back up your files when needed, schedule backups to occur at regular
intervals, and transfer the files off of the appliance.

By default, the backup


By default,
file contains
the backup
all thefile
configuration
contains all (/config),
the configuration
cron (/var/cron),
(/config), cron (/var/cron),
etc (/var/etc), and IPSec
etc (/var/etc),
files (/var/etc/ipsec).
and IPSec files (/var/etc/ipsec).

Versions of IPSO for


Versions
export of
doIPSO
not include
for export
IPSec
do files
not include
in the backup.
IPSec files in the backup.

Manually Backing Manually


Up Backing Up

Sometimes you needSometimes


to make ayou
backup
need of
to your
makeNokia
a backup
appliance
of youratNokia
a timeappliance
outside ofat a time outside of
your regular backup
your
schedule.
regularYou
backup
can initiate
schedule.a manual
You canbackup
initiateofa your
manual
appliance
backupatof your appliance at
any time using theany
following
time using
CLISH
thecommands:
following CLISH commands:

set backup manualset backup manual


on on
filename name filename name
homedirs <on | off>homedirs <on | off>
logfiles <on | off> logfiles <on | off>
 package name <on package
| off> name <on | off>

Table 11.8 describes


Table
the 11.8
arguments
describes
for the
the arguments
set backup manual
for the command.
set backup manual command.

Table 11.8. set backup


Table
manual
11.8. Configuration
set backup manual
Arguments
Configuration Arguments

Argument Argument Description D


On On Specifies to perform a manual backup. S
Filename name Filename name Specifies the name of the file that includes all the S
backed-up files. You must specify this name to b
configure a manual backup. c
homedirs &lt;on | off&gt;
homedirs &lt;on | off&gt; Specifies whether to include all home di- S
rectories in the backup file.Default: off r
logfiles &lt;on | off&gt;logfiles &lt;on | off&gt; Specifies whether to include all log files in S
the backup file.Default: off t
gplcfiles &lt;on | off&gt;
gplcfiles &lt;on | off&gt; Specifies whether to include all GPLC files in the S
backup file. b
package name &lt;on |package
off&gt; name &lt;on | off&gt;
Specifies whether to include a specific package file S
in the backup file. Package files are not automati- in
cally included in a backup file. Enter the filename c
for the package you want to include in the backup. fo

The GNU Perl Compiler


The GNU
(GPLC)
Perlfiles
Compiler
are Perl(GPLC)
files used
filesby
are
the
Perl
Nokia
filesNetwork
used by the
Voyager
Nokia Network Voyager
backend. Unless you
backend.
have changed
Unless youthese
have
files,
changed
there isthese
no reason
files, there
to back
is them
no reason
up. to back them up.
For example, to back up your system to a Nokia appliance to a file named nokia_back-
up you would use the following commands:
For example, to back up your system to a Nokia appliance to a file named nokia_back-
up you would use the following commands:

NokiaIP130:7> setNokiaIP130:7>
backup manualsetfilename
backupnokia_backup
manual filename nokia_backup
NokiaIP130:9> setNokiaIP130:9>
backup manualsetonbackup manual on
backup successful backup successful
NokiaIP130:10> quit
NokiaIP130:10> quit

If the backup completes


If the backup
successfully,
completes
you will
successfully,
see a backupyousuccessful
will see amessage,
backup successful
as message, as
shown in the output.shown
All backups
in the output.
are stored
All backups
in /var/backup/
are stored
by default.
in /var/backup/
You canbyverify
default. You can verify
this by using the lsthis
command:
by using the ls command:

pint[admin]# ls -alpint[admin]#
/var/backup/ ls -al /var/backup/
total 46 total 46
drwxrwxr-x 4 root wheel
drwxrwxr-x
512 Aug
4 root
5 21:48
wheel. 512 Aug 5 21:48 .
drwxr-xr-x 14 root drwxr-xr-x
wheel 512 14Augroot
5 21:48
wheel.. 512 Aug 5 21:48 ..
-rw-r--r-- 1 root wheel
-rw-r--r--
181 Aug
1 root
5 21:48
wheel.htaccess
181 Aug 5 21:48 .htaccess
-rw-rw-r-- 1 root wheel
-rw-rw-r--
414411Aug
root5wheel
21:4841441
nokia_backup_20080805.tgz
Aug 5 21:48 nokia_backup_20080805.tgz
drwxrwxr-x 2 root wheel
drwxrwxr-x
512 Aug
2 root
5 21:48
wheelpkg
512 Aug 5 21:48 pkg
drwxrwxr-x 2 root wheel
drwxrwxr-x
512 Aug
2 root
5 21:48
wheelsched
512 Aug 5 21:48 sched

Note that the archive


Note
name
thatstarts
the archive
with the
name
namestarts
we specified
with the name
earlierweand
specified
ends with
earlier
a and ends with a
timestamp in the format
timestamp
YYYMMDD.tgz.
in the format
This
YYYMMDD.tgz.
lets you differentiate
This letsbetween
you differentiate
backup between backup
archives files. archives files.

If you run two manual


If youbackups
run twousing
manual
the backups
same name
using
value,
the the
samesecond
name backup
value, the
willsecond backup will
overwrite the previously
overwrite
compiled
the previously
backup. compiled backup.

Scheduling Backups
Scheduling Backups

You can also schedule


Youbackups
can also to
schedule
be run on
backups
a regular
to be
schedule
run on ausing
regular
theschedule
add backup
using the add backup
scheduled command. scheduled
The archives
command.produced
The archives
by scheduled
produced
backups
by scheduled
reside in the
backups reside in the
/var/backup/sched/ /var/backup/sched/
directory and are timestamped.
directory and are timestamped.

add backup scheduled


add backup scheduled
filename name filename name
dayofmonth <1-31>
dayofmonth <1-31>
minute <0-59> minute <0-59>
dayofweek <1-7> dayofweek <1-7>
hour <0-23> hour <0-23>
  minute <0-59>   minute <0-59>

Table 11.9 describes


Table
the 11.9
arguments
describes
for the
the arguments
add backup for
scheduled
the addcommand.
backup scheduled command.

Table 11.9. add backup


Tablescheduled
11.9. addConfiguration
backup scheduled
Arguments
Configuration Arguments
Argument
Argument Description D
filename name filename name Specifies the name of the file that includes all the S
backed up files. You must specify this name to b
configure a manual backup. c
dayofmonth &lt;1-31&gt;
dayofmonth &lt;1-31&gt; Specifies which day of the month to schedule S
the backup. This option applies only to monthly th
scheduled backups. s
dayofweek &lt;1-7&gt;dayofweek &lt;1-7&gt; Specifies which day of the week to schedule the S
backup. This option applies only to weekly sched- b
uled backups. u
hour &lt;0-23&gt; hour &lt;0-23&gt; Specifies which hour of the day to schedule the S
backup. b
minute &lt;0-59&gt; minute &lt;0-59&gt; Specifies which minute of the day to schedule the S
backup. b
You must specify an IP address (ip_address) and a transfer protocol (ftp or tftp). If
using FTP, you can specify a remote directory using the ftp-dir argument. Example:-
NokiaIP130:7> set backup auto-transfer ipaddr 192.168.200.10 protocol ftp ftp-dir
/backups
You must specify an IP address (ip_address) and a transfer protocol (ftp or tftp). If
using FTP, you can specify a remote directory using the ftp-dir argument. Example:-
NokiaIP130:7> set backup auto-transfer ipaddr 192.168.200.10 protocol ftp ftp-dir
/backups

If you enable automated


If you enable
transfers,
automated
your backup
transfers,
files are
your
transferred
backup files
to the
are remote
transferred to the remote
server as soon as they
server
areas
complete,
soon as they
assuming
are complete,
the server
assuming
is reachable.
the server
If the is
remote
reachable. If the remote
server is not reachable,
server
the
is system
not reachable,
waits until
the the
system
nextwaits
backup
until
occurs
the next
andbackup
tries again.
occurs and tries again.
After they have beenAfter
successfully
they havetransferred,
been successfully
the backup
transferred,
files arethe
deleted
backupfrom
filesyour
are deleted from your
Nokia appliance. Nokia appliance.
ftp-user user_name
ftp-user user_name
ftp-passwd password
ftp-passwd password

Even though you can


Eventransfer
thoughyour
youbackups
can transfer
to a remote
your backups
server to
using
a remote
the TFTP
server using the TFTP
protocol, you can only
protocol,
retrieve
youitcan
using
only
theretrieve
FTP protocol.
it using the FTP protocol.

Table 11.10 describes


Table
the11.10
arguments
describes
for the
the arguments
set restore remote
for thecommand.
set restore remote command.

Table 11.10. set restore


Tableremote
11.10.Configuration
set restore remote
Arguments
Configuration Arguments

Argument Argument Description D


filename name filename name Specifies to restore your files from the filename S
stored on the remote server. s
ftp-site ip_addr ftp-site ip_addr Specifies the IP address of the remote server on S
which the backup files are stored. w
ftp-dir path_name ftp-dir path_name Specifies the Unix path to the directory on which S
the backup files are stored. th
ftp-user user_name ftp-user user_name Specifies the name of the user account for con- S
necting to the FTP site on which the backup files n
are stored. If a username is not set, enter anony- a
mous. m
ftp-passwd password ftp-passwd password Specifies the password to use when connecting to S
the FTP site. th

The system must beThe


running
systemthe
must
same
be version
runningofthe
thesame
operating
version
system
of theand
operating
the same
system and the same
packages as those packages
of the backup
as those
files of
from
the which
backupyou
files
restore
from files
whichforyou
both
restore
backup
files for both backup
restore methods. restore methods.
Figure 3.3. Performing
Figure
Backkups
3.3. Performing Backkups

Method Method CLI Command Comments CLI Command


TFTP TFTP exec backup [config | full-con- exec backup [config | full-con-
fig] tftp <ip address> <filename. fig] tftp <ip address> <filename.
FTP FTP exec backup [config | full-con- exec backup [config | full-con-
fig] ftp <ip address> <filename> fig] ftp <ip address> <filename>
<username> <password> <username> <password>
USB USB exec backup config usb <fil- The file referred to by <fil-
exec backup config usb <fil-
ename>exec backup full-config ename> must be on theename>exec
first par- backup full-config
usb <filename> tition of the USB memoryusbstick
<filename>
and this partition must be for-
matted as FAT32
11th International Symposium on
Process Systems Engineering
11th International Symposium on
Process Systems Engineering
Yanyue Lu, ... Yangdong
YanyueHu,
Lu,in
... Computer
YangdongAided
Hu, inChemical
ComputerEngineering,
Aided Chemical
2012Engineering, 2012

3 RO network3representation
RO network representation
Several RO systemSeveral
configurations
RO system wereconfigurations
investigated (Marcovecchio
were investigated and(Marcovecchio
Aguirre, and Aguirre,
2005) which are common
2005) which
in seawater
are commonand brackish
in seawaterdesalination
and brackish
applications.
desalination
In applications. In
order to describe the
order
possible
to describe
RO configuration,
the possible RO a simplified
configuration,
superstructure
a simplifiedis superstructure is
presented, which incorporates
presented, whichall theincorporates
feasible processall the
flow
feasible
in theprocess
RO desalination
flow in the RO desalination
system with multiple-product
system withoutput.
multiple-product
As shown in output.
Fig. 1,As
a ROshownnetwork
in Fig.consists
1, a RO network consists
of Nps pressurization
of Nstages
ps pressurization
and NRO reversestagesosmosis
and NRO stages.
reverse In osmosis
this configuration,
stages. In this configuration,
there are three setsthere
of stream
are three
nodessetsemployed:
of streamNnodesps mixing
employed:
junctions,Nps Nmixing
RO reverse
junctions, NRO reverse
osmosis junctions,osmosis
Np outlet junctions,
junctionsNof p outlet
product junctions
streams.ofThe product
junction
streams.
of NpsThe
+ 1 junction of Nps + 1

indicated the brineindicated


stream leaving
the brine
thestream
network.
leaving
It is assumed
the network.that seawater
It is assumed
only that seawater only
enter the RO system enter
from thestage
RO system
1. The mixing
from stage
streams 1. The
pressurized
mixing streams
by highpressurized
pressure by high pressure
(HP) pump or not are(HP)connected
pump or not to the
arecorresponding
connected to the reverse
corresponding
osmosis stages.
reverseThe osmosis stages. The
RO stages consist ofROmultiple
stages consist
parallelofreverse
multiple
osmosis
parallel
pressure
reverse vessels
osmosis operating
pressureatvessels operating at
the same conditions.theThe
same mathematical
conditions. The model
mathematical
that describes model
the superstructure
that describes the is superstructure is
presented as follow.presented as follow.

Fig. 1. The representation


Fig. 1. The
of the
representation
RO networkofviathe
theRO
superstructure
network via the superstructure

(10) (10)

(11) (11)
(12)
(12)

(13) (13)

where Qps,i, Cps,i denote


wheretheQps,i
flow
, Cps,i
ratedenote
and concentration
the flow rate and of the
concentration
ith pressurization
of the ith pressurization
stage, respectively.stage,
QRObj,respectively.
CRObj denoteQthe RObjbrine
, CRObjflow
denote
rate the
andbrine
concentration
flow rate and
of theconcentration of the
jth RO stage, QROpjth,j, CRO
ROpjstage,
denote QROp
the,j,permeate
CROpj denote
flow the
ratepermeate
and concentration
flow rate and
of the
concentration of the
jth RO stage, respectively.
jth RO stage,
xb,i,j, xp,i,j
respectively.
indicatexb,i,j,
the stream
xp,i,j indicate
split ratios
the of
stream
the brine
split and
ratios of the brine and
permeate, respectively.
permeate,
The values
respectively.
determine
Thethevalues
flowdetermine
rates of brine
the flow
and permeate
rates of brine and permeate
leaving the jth RO leaving
stage and thebeing
jth ROlinked
stagetoand
thebeing
ith pressurization
linked to the stage.
ith pressurization stage.

All the streams connected


All the streams
to the ith
connected
pressurization
to the stage
ith pressurization
firstly mix instage
the mixer.
firstly mix in the mixer.
The outlet pressureThe
from
outlet
the pressure
mixer is the
fromsmallest
the mixer
feedispressure.
the smallest
The feed
stream
pressure.
split The stream split
ratios and the logical
ratios
expression
and the of
logical
streamexpression
mixing are
of stream
employedmixing
in this
arepaper,
employed
thesein this paper, these
techniques reducedtechniques
the number reduced
of binary
the variable
numberandof binary
the solving
variable
space,
and therefore
the solving space, therefore
the mathematical model
the mathematical
may be easilymodel
handled.
may be easily handled.

The overall material


The
balances
overall for
material
the RObalances
networkfor
andthea RO
set of
network
productandquantity
a set ofand
product quantity and
quality constraintsquality
concerning
constraints
the minimum
concerning
desirable
the minimum
product flow
desirable
rate, and
product
the flow rate, and the
maximum allowable maximum
product concentration
allowable product
are also
concentration
needed in are
the also
system
needed
model.
in the system model.
More modern versions of Windows are capable of maintaining multiple paging files.
Within the Memory Management key on Windows 7 and 10 systems, you will find
values named “ExistingPageFiles” and “PagingFiles” that can contain a list of page
files.
More modern versions of Windows are capable of maintaining multiple paging files.
Within the Memory Management key on Windows 7 and 10 systems, you will find
values named “ExistingPageFiles” and “PagingFiles” that can contain a list of page
files.
Note that if a solution up of (3.9) exists, it will take the form
Note that if a solution up of (3.9) exists, it will take the form

(3.10) (3.10)

where where
represents the pseudo-inverse
represents theof pseudo-inverse
the matrix Bp. Fromof the
(3.10)
matrix
ku and
Bp. From
kp can(3.10) ku and kp can
be found as be found as
, and , and
. By substituting (3.10)
. By substituting
in (3.6), a sufficient
(3.10) incondition
(3.6), a sufficient
for the existence
conditionoffor the existence of
the solution of (3.9)the
is solution of (3.9) is

(3.11) (3.11)

Note that (3.11) is Note


knownthatas Erzberger's
(3.11) is known
condition
as Erzberger's
[10]. Clearly,
condition
these [10].
are rather
Clearly, these are rather
restrictive conditions,
restrictive
since most
conditions,
systemssince
havemost
moresystems
states than
haveinputs,
more states than inputs,
. Thus (3.11) can only. Thus
be fulfilled
(3.11) canwhen
only be fulfilled when
is in both the left null
is in
spaces
both of
the(Aleft
m -Anull
p) and
spaces
Bm. of
It seems
(Am - Afor
p) and
an arbitrary
Bm. It seems
plant,
for an arbitrary plant,
it is rather difficultittoisfind
rather
an difficult
appropriate
to find
reference
an appropriate
model such reference
that it model
represents
such that it represents
the desired dynamics the and,
desired
at the
dynamics
same time,
and, satisfies
at the same
(3.11).
time, satisfies (3.11).

It should be noted Itthat


should
evenbewhen
notedthethat
conditions
even when
for the conditions
PMF in (3.11)forare
thenot
PMF in (3.11) are not
fulfilled, the solution
fulfilled,
in (3.10)
thestill
solution
minimizes
in (3.10)
thestill
2-norm
minimizes
of the the
last 2-norm
three terms
of the
in last three terms in
the right side of (3.6).
the i.e.
right side of (3.6). i.e.

This particular method


This particular
of choosingmethod
up hasofthe
choosing
advantage
up has
of not
theinvolving
advantagexmofinnot involving xm in
the feedback thus eliminating
the feedbackthe thus
need
eliminating
for running thethe
need model
for running
on-line.theTherefore
model on-line. Therefore
the complexity of the
the control
complexity
system
of the
is relatively
control system
low. Oneis relatively
of the disadvantages
low. One of the
of disadvantages of
this method is thatthis
when
method
the PMFis that
is not
when achievable,
the PMFthe is not
trajectory
achievable,
of e may
the trajectory
not be of e may not be
desirable since we desirable
don't havesince
control
we don't
over the have
location
controlofover
the the
poles
location
in the of
system.
the poles in the system.
Another disadvantage
Another
with disadvantage
this approachwith is that,
thiswhen
approach
conditions
is that,inwhen
(3.11)conditions
are not in (3.11) are not
satisfied, the solution
satisfied,
(3.10) the
maysolution
result in(3.10)
an unstable
may result
system.
in an unstable system.
Synthesis (Decision Maker) stage
Synthesis (Decision Maker) stage
This stage selects theThisbest
stage
system
selects
configuration
the best system
depending
configuration
on the depending
reliability esti-
on the reliability esti-
mation and confidence mationlevels
andassociated
confidencewithlevels
each
associated
of the configurations,
with each of the
plusconfigurations,
any plus any
other criteria (e.g., other
cost or
criteria
other (e.g.,
non-functional
cost or other
requirement)
non-functional
that might
requirement)
influence that might influence
the selection. the selection.

Properties Properties
The input data consists
The input
of a list
dataofconsists
alternative
of asystem
list of alternative
configurations system
withconfigurations
their re- with their re-
spective attributes spective
for the decision
attributes
making,
for theincluding
decision making,
their estimated
including reliability
their estimated
with reliability with
confidence levels, and
confidence
any otherlevels,
data and
related
anytoother
the target
data related
systemtoorthethetarget
environment
system or the environment
that might affect thethat
decision
might affect
making.
theThedecision
control making.
data areThe
thecontrol
criteriadata
for are
selecting
the criteria for selecting
the best system configuration,
the best systemwhich
configuration,
are related to which
the system
are related
non-functional
to the system non-functional
requirements. Therequirements.
mechanisms are Therelated
mechanisms
to the technique(s)
are related tothatthecan
technique(s)
be used forthat can be used for
decision making. Finally,
decision
themaking.
output data
Finally,
willthe
consist
output
of data
a single
willsystem
consistconfiguration
of a single system configuration
that will be deployed.
that will be deployed.

Sources of uncertainty
Sources of uncertainty
External sources ofExternal
uncertainty
sources
are associated
of uncertainty
withare
theassociated
quality of with
the monitoring
the quality of the monitoring
data related to the data
attributes
relatedthat
to the
would
attributes
be usedthat
in the
would
decision
be usedmaking.
in theInternal
decision making. Internal
sources of uncertainty
sources
are associated
of uncertainty
withare
theassociated
differences with
in the
the technique
differencesbeing
in the technique being
used for decision making,
used forand
decision
the inaccuracies
making, andthatthemay
inaccuracies
affect thethat
parameters
may affect
of the parameters of
those techniques. those techniques.
Configuration by a combination
Configuration
of thebyfollowing:–Editing
a combination of the
the configuration
following:–Editing the configuration
file(s)–Using the micctrlfile(s)–Using
utility the micctrl utility
NetMask:  255.255.255.0
NetMask:  255.255.255.0

Console: hvc0 Console: hvc0

VerboseLogging: Enabled
VerboseLogging: Enabled

You might also like