Linux Basic Commands
$ -- Normal User Prompt
# -- System Admin Prompt
Commands
$ logname (or) whoami --------- To Check Present Working User
$ who ---------------------------- To Know Present Working Users
$ hostname --------To Know HostName(Machine Name) Of A Server
$ ifconfig ---------- To Find an IP
$ lscpu ------------- To check CPU architecture
$ su [super user name] ---- Switch to Super User
$ clear---------- To Clear Screen
$ exit ------------To exit From user Session
$ man [cmd]----------- Help Facility
$ date ----------- To Display date
$ cal [month] [year] ----- To Display Calender
$ pwd ---------- To Know Present Working Directory
$ ls [flags]--------------To Display Directory Content
$ mkdir [dir name]---------- To Create New Directory
$ cd [dir name] -------------- To Change Directory
$ mv [oldname] [newname) -------- To Rename Directory
$ rmdir [Directory Name] ---------- To delete directory
$ mv [source path] [target path] ---- To Move directory with sub directories
$ cp [source path] [target path] ---- To Copy directory with sub directories
$ cat > [file name] ----------------- To Create File
$ cp [source file] [target file] ------- To Copy A File
$ mv [Old File] [New File] --------- To Rename A File
$ rm [file name] --------------------- To Remove A File
$ locate [file name] ------------------- To Search A file In Whole File System
$ find [file name] [path] ---------------- To Search A file in Specified Path
$ gzip [file name] ---------------------- To Compress A File
$ gunzip [file name] ------------------- To Uncompressed A File
$ chmod [777] [file name] ------------- To Change File Permissions
$ chown [new owner name] [file name] --- To Change Owner
$ chgrp [new group name] [file name] ----- Change Group To A File
$ useradd -u [uid] -g [group name] -d [user home dir] -s [shell]- Creating New User
$ groupadd -g [group id] [group name] ------ To Create New Group
$ userdel [user name] ------ To Delete User
$ shutdown [time] -------- To Shutdown System At Particular Time
$ shutdown -r now ------------- Shutdown and reboot immediately
$ shutdown -h halt -------------- Shutdown immediately and halt
$ df/df-k/df -g/df -h ---------- To Check Free Disk Space
$ du / du -s [dir name] ------- To Check Used Space
$ vi [file name] -------------- To Open a File with VI Editor
$ head -n [no of lines] [file name] ---- To Display First N line in A File
$ tail -n [no of line] [file name] -------- To Display Last N lines In A File
# -- System Admin Prompt
Commands
$ logname (or) whoami --------- To Check Present Working User
$ who ---------------------------- To Know Present Working Users
$ hostname --------To Know HostName(Machine Name) Of A Server
$ ifconfig ---------- To Find an IP
$ lscpu ------------- To check CPU architecture
$ su [super user name] ---- Switch to Super User
$ clear---------- To Clear Screen
$ exit ------------To exit From user Session
$ man [cmd]----------- Help Facility
$ date ----------- To Display date
$ cal [month] [year] ----- To Display Calender
$ pwd ---------- To Know Present Working Directory
$ ls [flags]--------------To Display Directory Content
$ mkdir [dir name]---------- To Create New Directory
$ cd [dir name] -------------- To Change Directory
$ mv [oldname] [newname) -------- To Rename Directory
$ rmdir [Directory Name] ---------- To delete directory
$ mv [source path] [target path] ---- To Move directory with sub directories
$ cp [source path] [target path] ---- To Copy directory with sub directories
$ cat > [file name] ----------------- To Create File
$ cp [source file] [target file] ------- To Copy A File
$ mv [Old File] [New File] --------- To Rename A File
$ rm [file name] --------------------- To Remove A File
$ locate [file name] ------------------- To Search A file In Whole File System
$ find [file name] [path] ---------------- To Search A file in Specified Path
$ gzip [file name] ---------------------- To Compress A File
$ gunzip [file name] ------------------- To Uncompressed A File
$ chmod [777] [file name] ------------- To Change File Permissions
$ chown [new owner name] [file name] --- To Change Owner
$ chgrp [new group name] [file name] ----- Change Group To A File
$ useradd -u [uid] -g [group name] -d [user home dir] -s [shell]- Creating New User
$ groupadd -g [group id] [group name] ------ To Create New Group
$ userdel [user name] ------ To Delete User
$ shutdown [time] -------- To Shutdown System At Particular Time
$ shutdown -r now ------------- Shutdown and reboot immediately
$ shutdown -h halt -------------- Shutdown immediately and halt
$ df/df-k/df -g/df -h ---------- To Check Free Disk Space
$ du / du -s [dir name] ------- To Check Used Space
$ vi [file name] -------------- To Open a File with VI Editor
$ head -n [no of lines] [file name] ---- To Display First N line in A File
$ tail -n [no of line] [file name] -------- To Display Last N lines In A File
Channel Triggering
Channel Triggering intended for to start channel by a channel initiator in response to a trigger event. To implement channel triggering we enable trigger service on transmission queue and apply trigger conditions on transmission queue.
Application Triggering
Application Triggering intended for to run/start an application by a trigger monitor in response to a trigger event. To implement application triggering we enable trigger service on application queue (local queue) and apply trigger conditions.
Channel Triggering intended for to start channel by a channel initiator in response to a trigger event. To implement channel triggering we enable trigger service on transmission queue and apply trigger conditions on transmission queue.
Application Triggering
Application Triggering intended for to run/start an application by a trigger monitor in response to a trigger event. To implement application triggering we enable trigger service on application queue (local queue) and apply trigger conditions.
http://ibmmqadmin-madhu.blogspot.in/2012/09/linux-basic-commands.html
1) Centralization : Unlike P2P, where there is no central administration,
here in this architecture there is a centralized control. Servers help in
administering the whole set-up. Access rights and resource allocation is done
by Servers.
2) Proper Management : All the files are stored at the same place. In this way, management of files becomes easy. Also it becomes easier to find files.
3) Back-up and Recovery possible : As all the data is stored on server its easy to make a back-up of it. Also, in case of some break-down if data is lost, it can be recovered easily and efficiently. While in peer computing we have to take back-up at every workstation.
4) Upgradation and Scalability in Client-server set-up : Changes can be made easily by just upgrading the server. Also new resources and systems can be added by making necessary changes in server.
5) Accessibility : From various platforms in the network, server can be accessed remotely.
6) As new information is uploaded in database , each workstation need not have its own storage capacities increased (as may be the case in peer-to-peer systems). All the changes are made only in central computer on which server database exists.
7) Security : Rules defining security and access rights can be defined at the time of set-up of server.
8) Servers can play different roles for different clients.
2) Proper Management : All the files are stored at the same place. In this way, management of files becomes easy. Also it becomes easier to find files.
3) Back-up and Recovery possible : As all the data is stored on server its easy to make a back-up of it. Also, in case of some break-down if data is lost, it can be recovered easily and efficiently. While in peer computing we have to take back-up at every workstation.
4) Upgradation and Scalability in Client-server set-up : Changes can be made easily by just upgrading the server. Also new resources and systems can be added by making necessary changes in server.
5) Accessibility : From various platforms in the network, server can be accessed remotely.
6) As new information is uploaded in database , each workstation need not have its own storage capacities increased (as may be the case in peer-to-peer systems). All the changes are made only in central computer on which server database exists.
7) Security : Rules defining security and access rights can be defined at the time of set-up of server.
8) Servers can play different roles for different clients.