The UNIX batch Utility
13.4 Batch Processing
Batch processing is a special way to run nonurgent but long−lasting and CPU−intensive programs. Such programs can run at off−peak times, when a system is not busy with the execution of other higher priority programs. Off−peak time is usually during the night, when it is not too convenient for users to start their programs. The batch utility provides a way to execute the programs submitted with a lower priority at any off−peak time, giving the system a chance to balance its CPU loading. A job scheduled by the batch utility is known as a batch−job; it is equivalent to an at−job that is submitted into the b queue for an immediate run with lower priority. Therefore, the at utility can be also used to schedule a batch−job: at −q b −m now However, it is more convenient to use the given batch utility for batch processing, and this is the usual method on the UNIX platform. From a system standpoint, batch processing is a very useful and economical method of program execution. System administrators should encourage users to utilize it. Even though the batch utility is easy to use, users often do not know very much about this possibility. Sometimes they create an additional burden on the CPU at the most critical times, provoking an unnecessary substantial degradation in system performance. Batch processing can also be an economical way to perform a number of administrative tasks.13.4.1 The UNIX batch Utility
The generic form of the batch utility is: batch command 1 command 2 ..... [Ctrl−D] The batch utility reads the standard input until the terminating EOF character [Ctrl−D] from the keyboard. It then submits the entered command sequence into the batch queue for immediate execution with a low priority. The command entered could be any UNIX command, a script, any executable program, or a combination thereof. The Here Document is also the most convenient way to implement the batch utility in shell script programming, as in the following example: 317 To schedule the batch−job batch EOF The sequence of commands ..... EOF The batch−job was scheduled 318 Section II: Network Administration Chapter List Chapter 14: Network Fundamentals Chapter 15: TCPIP Network Chapter 16: Domain Name System Chapter 17: Network Information Service NIS Chapter 18: Network File System NFS Chapter 19: UNIX Remote Commands Chapter 20: Electronic Mail Chapter 21: UNIX Network Support 319Chapter 14: Network Fundamentals
14.1 UNIX and Networking
One of the greatest advantages of the UNIX system is its inherent network−related structure. From its very beginnings, UNIX included a number of network−based characteristics that made it quite different from other existing operating systems. At a time when network technologies were in the very early stages, UNIX already provided certain network services and powerful tools to cope with network issues between remote hosts. From a network standpoint, the concept of UNIX was so well done that it allowed an easy integration of UNIX into network technologies. It is even more appropriate to say that UNIX and networking merged, making UNIX the core operating system in the new emerging network environment. Today, even after so many years of intensive commercial use, UNIX is still far from being considered an obsolete operating system. UNIX was the first commercially successful and available network−oriented OS, and UNIXs use in networked environments was perhaps the biggest factor leading to the end of the supremacy of mainframe computers and gigantic OSs. Despite its advancing age, UNIX is still the leading OS, offering more than any other OS alone, and permanently keeping pace with newcomers. The primary advantages of UNIX are its openness and flexibility, which make it suitable for almost any kind of upgrade. Most of these upgrades were made in the network arena, which makes sense, given the incredible advances in the field of networking. However, this flexibility and UNIXs ability to integrate so many changes only prove the sound conceptual approach that UNIX designers had while creating UNIX. Regardless of where the credit should go, UNIXs main contribution to the overall development of computer technologies was, and still is, in networking; it is fair to say that the network−oriented UNIX concept practically enabled the tremendous growth of networking technologies. Networks have grown so prolifically because they provide an important service: to share information among users. Computers generate and process information that is often useless unless it is shared among a group of people; the network is the vehicle that enables data to be easily shared. Once a computer has been networked, users will likely not want to return to an isolated system. Such a trend does not stop at the local level; forming a local network and cooperating with neighboring computers lead to global, worldwide networking. Today, this global network is known under the generic name Internet, which is named after what was once the worlds largest experimental network. Computer networking has brought new challenges and duties to system administrators. It is not enough to simply maintain the systems; the network requires a great deal of ongoing work. This issue is very important, because it affects not only a single system, but also other systems on the network. A familiarity with basic theoretical issues will make this job easier, and that is the purpose of this chapter and those following.14.2 Computer Networks
A computer network is a communication system that connects end computers, usually referred to as hosts. The hosts can range in size from small microcomputers to the largest supercomputers. From a network point of view, a host is any machine participating in network communication, independent of its basic function and configuration single−user or multi−user, general purpose systems, dedicated servers, terminals, any kind of client, etc.. 320Parts
» Unix Administration. 7485KB Mar 29 2010 05:04:17 AM
» UNIX Operating System UNIX — Introductory Notes
» Berkeley Standard Distribution — BSD UNIX System V or ATT UNIX
» System Administrators Job UNIX System and Network Administration
» Computing Policies UNIX System and Network Administration
» Legal Acts Administration Guidelines
» Code of Ethics Administration Guidelines
» USENIX System Administrators Guild — SAGE
» In This Book UNIX System and Network Administration
» Introduction The Unix Model — Selected Topics
» Access Classes File ProtectionFile Access
» Default File Mode File ProtectionFile Access
» Plain Regular File Socket Named Pipe
» Special File Names Special File Creation
» Process Types Process Attributes
» Process Life Cycles Processes
» System V ATT Flavored ps Command
» Destroying Processes The UNIX kill command will eliminate a process entirely:
» Becoming a Superuser Communicating with Other Users
» The man Command UNIX Online Documentation
» The uptime Command The uptime command displays:
» Personal Documentation UNIX Administration Starters
» Shell Script Execution UNIX Shell Scripts
» Shell Variables UNIX Shell Scripts
» Double Command−Line Scanning
» Introductory Notes System Startup and Shutdown
» The Bootstrap Program System Startup
» The Kernel Execution System Startup
» System States System Startup
» The Outlook of a Startup Procedure
» Initialization Scripts System Startup
» The BSD rc Scripts BSD Initialization Sequence
» BSD−Like Initialization System V Initialization
» An Example Shutdown Procedures
» Introduction to the UNIX Filesystem
» System V Filesystem Directory Organization
» Mounting a Filesystem home, users
» Dismounting a Filesystem home, users
» Automatic Filesystem Mounting Removable Media Management
» BSD Filesystem Configuration File
» Filesystem Types A Few Other Filesystem Issues
» Swap Space — Paging and Swapping
» Loopback Virtual Filesystem A Few Other Filesystem Issues
» Display Filesystem Statistics: The df Command
» Checking Filesystems: The fsck Command
» Introduction UNIX Filesystem Layout
» Disk Partitions Physical Filesystem Layout
» Filesystem Structures Physical Filesystem Layout
» The mkfs Command Filesystem Creation
» File Identification and Allocation
» File Storage vs. File Transfer
» Reserved Free Space Filesystem Performance Issues
» Logical Volume Manager — AIX Flavor
» Logical Volume Manager — Solaris Flavor
» Redundant Array of Inexpensive Disks RAID
» The Volume Snapshot Snapshot
» The Filesystem Snapshot Snapshot
» Virtual UNIX Filesystem Logical Filesystem Layout
» Disk Space Upgrade UNIX Filesystem Layout
» User Database — File etcpasswd
» Initialization Template Files UNIX Login Initialization
» User Login Initialization Files
» Systemwide Login Initialization Files
» Restricted User Accounts Users and Secondary Groups
» Assigning User Passwords Standard UNIX Users and Groups
» Managing Disk Usage by Users
» System V Accounting Accounting
» AIX−Flavored Accounting Accounting
» Physical Security Passwords UNIX Lines of Defense
» File Permissions UNIX Lines of Defense
» Backups Password Encryption UNIX Lines of Defense
» Setting Password Restrictions UNIX Lines of Defense
» The Wheel Group Secure Terminals — Other Approaches
» History of the Root Account Tracking User Activities
» The syslogd Daemon The Concept of System Logging
» The Configuration File etcsyslog.conf
» Linux Logging Enhancements The logger Command
» Testing System Logging System Logging Configuration
» The last Command Limiting the Growth of Log Files
» BSD Printing Subsystem UNIX Printing Subsystem
» The lp, lpstat, and cancel Commands
» The etcprintcap File BSD Printer Configuration and the Printer Capability Database
» Filters BSD Printer Configuration and the Printer Capability Database
» The Printer Database Directory Hierarchy on System V
» Setting a Remote Printer on HP−UX
» BSD and AIX Cross−Printing Solaris and BSD Cross−Printing
» Third−Party Printer Spooling Systems
» The tput Command The tset, tput, and stty Commands
» The stty Command The tset, tput, and stty Commands
» The tar Command Tape−Related Commands
» The cpio Command Tape−Related Commands
» The dd Command Tape−Related Commands
» The mt Command Magnetic Tape Devices and Special Device Files
» The SVR3 and SVR4 backup Commands
» The fbackup Command Backup and Dump Commands
» The dumpufsdump Command Backup and Dump Commands
» Interactive Restore The restore Commands
» The frecover Command Restoring Files from a Backup
» Tape Control UNIX Backup and Restore
» The NTP Daemon Network Time Distribution
» The crontab Files Network Time Distribution
» The crontab Command Network Time Distribution
» Linux Approach Network Time Distribution
» Programs Scheduled for a Specific Time
» UNIX and Networking Network Fundamentals
» TCPIP and the Internet ISO OSI Reference Model
» TCPIP Protocol Architecture Computer Networks
» Internet Protocol IP Internet Layer and IP Protocol
» Network Access Layer Transport Layer and TCP and UDP Protocols
» Application Layer TCPIP Layers and Protocols
» IP Address Classes Data Delivery
» Dynamic Routing Internet Routing
» Protocols, Ports, and Sockets
» UNIX Database Files Multiplexing
» The arp Command Address Resolution ARP
» The portmapper Daemon The etcrpc File
» The ifconfig Command Configuring the Network Interface
» The netstat Command Configuring the Network Interface
» The inetd Daemon Super Internet Server
» Further Improvements and Development
» Host Names and Addresses Domain Name Service DNS
» The Local Host Table — etchosts
» Handling the NIC Host Table — A Journey into the Past
» Other Resolver Parameters BIND Configuration
» Name Servers UNIX Name Service — BIND
» The Configuration File etcnamed.boot
» The named.local File The named.cache file
» Subdomains and Parenting BIND Version 8.X.X
» The nslookup Interactive Mode
» A Few Examples of nslookup Usage
» Purpose and Concepts Network Information Service NIS
» To Create an NIS Client NIS Domain Name
» The etcnetgroup File DatabasesNIS Maps
» Security Issues NIS Management
» The showmount Command Mounting Remote Filesystems
» An Example The Automount Maps
» The rlogin Command The rcp Command
» The HOME.rhosts File Using UNIX r−Commands — An Example
» SSH Configuration Secure Shell SSH
» Root Access SSH Installation and User Access Setup
» SSH — Version 2 Secure Shell SSH
» Simple Mail Transport Protocol SMTP
» Rewriting an E−mail Address Pattern Matching
» Address Transformation The Parsing of E−mail Addresses
» Testing Rewrite Rules The sendmail −bt Command
» The Debugging Level Checking the Mail Queue
» Mail Subcommands The Mail Program and .mailrc File
» POP Transactions Post Office Protocol POP
» Internet Message Access Protocol IMAP
» Finger Common UNIX Network Applications
» The ping Command Host Connectivity
» The traceroute Command Host Connectivity
» The X Administration Philosophy
» Window Managers An Introduction to the X Window System
» xdm Configuration Files The X Display Managers
» Vendor−Specific X Flavors — a Configuration Example
» XDMCP Queries The Xaccess File
» Other Access Control Mechanisms
» Components of the xdm−Based User X Environment
» Other Startup Methods The User X Environment
» A Permanent X11 Installation
» Introduction to Kernel Reconfiguration
» Kernel Configuration Database Kernel Reconfiguration
» The config Command BSD−Like Kernel Configuration Approach
» HP−UX 10.x Kernel Configuration
» UNIX and Modems Introduction to Modems
» Terminal Lines and Modem Control
» C−Kermit Third−Party Communication Software
» UUCP Versions UUCP Chat−Transfer Session
» The UUCP Daemons UUCP Commands, Daemons, and Related Issues
» The UUCP Spool Directories and Files
» Additional Security in BNU UUCP
» Additional Security in Version 2 UUCP
» Intranet vs. Internet Introduction to Intranet
» Intranet Design Approach Introduction to Intranet
» Life Cycle of a Virus Virus Types
» The Viruswall Implementation Viruswalls
» Application Proxies SOCKS Proxies
» Web Services Intranet Front−End Services
» Other External Services Intranet Front−End Services
» Network Infrastructure and Desktops
» Dynamic Host Configuration Protocol DHCP
» UNIX and Not−UNIX Platform Integration
» HP−UX Installation UNIX Installation Procedures
» Linux Installation UNIX Installation Procedures
» Solaris Patch Installation HP−UX Patch Installation
» Solaris and Lost Root Password HP−UX and Lost Root Password
» Solaris Procedure to Create an Alternate Boot Partition
» Solaris Recovery of the Failed Mirrored Boot Disk
Show more