Free Essay

Data Set Compression

In:

Submitted By srinivb
Words 1322
Pages 6
Paper 258-2013
Data Set Compression using COMPRESS=

ABSTRACT
DUE TO AN INCREASED AWARENESS ABOUT DATA MINING, TEXT MINING AND BIG DATA APPLICATIONS ACROSS ALL DOMAINS THE VALUE OF DATA HAS BEEN REALIZED AND IS RESULTING IN DATA SETS WITH A LARGE NUMBER OF VARIABLES AND INCREASED OBSERVATION SIZE. OFTEN IT TAKES A LOT OF TIME TO PROCESS THESE DATASETS WHICH CAN HAVE AN IMPACT ON DELIVERY TIMELINES. WHEN THERE IS LIMITED PERMANENT STORAGE SPACE, STORING SUCH LARGE DATASETS MAY CAUSE SERIOUS PROBLEMS. BEST WAY TO HANDLE SOME OF THESE CONSTRAINTS IS BY MAKING A LARGE DATASET SMALLER, BY REDUCING THE NUMBER OF OBSERVATIONS AND/OR VARIABLES OR BY REDUCING THE SIZE OF THE VARIABLES, WITHOUT LOSING VALUABLE INFORMATION. IN THIS PAPER WE WILL SEE HOW A SAS DATA SET CAN BE COMPRESSED USING THE COMPRESS= SYSTEM OPTION AND ALSO SOME TECHNIQUES TO MAKE THIS OPTION MORE EFFECTIVE.

Introduction
THE PROCESS OF REDUCING THE NUMBER OF BYTES REQUIRED TO REPRESENT EACH OBSERVATION IS KNOWN AS COMPRESSION. SOME OF THE ADVANTAGES OF COMPRESSING A DATASET INCLUDE BUT ARE NOT LIMITED TO, A COMPRESSED FILE REDUCES THE STORAGE REQUIREMENTS AND ALSO REDUCES THE NUMBER OF I/O OPERATIONS NECESSARY TO READ OR WRITE THE DATA DURING PROCESSING. IN A COMPRESSED FILE, THE DELETED OBSERVATION SPACE CAN BE REUSED USING REUSE= OPTION, WHEREAS IN AN UNCOMPRESSED DATA SET THE DELETED OBSERVATION SPACE IS NEVER REUSED.

To create a compressed data set we use the COMPRESS= output data set option or system option.

Syntax: SAS-data-set(Compress=NO| YES| CHAR| BINARY)

OPTIONS COMPRESS=NO|YES|CHAR|BINARY

Two data sets are being used here, one contains character data and the other binary data.

Compressing text data
THE OPTION COMPRESS=YES|CHAR IS EFFECTIVE WITH CHARACTER DATA THAT CONTAINS REPEATED CHARACTERS SUCH AS BLANKS. IT USES THE RUN-LENGTH ENCODING (RLE) COMPRESSION ALGORITHM, WHICH COMPRESSES REPEATING CONSECUTIVE BYTES SUCH AS TRAILING BLANKS OR REPEATED ZEROES.

options fullstimer;

PROC IMPORT OUT= WORK.charcompress(compress=yes)

DATAFILE= "H:\compress.csv"

DBMS=CSV REPLACE;

GETNAMES=YES;

DATAROW=2;

RUN;

Measuring Efficiency
THE FOLLOWING ARE THE STATISTICS FOR COMPRESSED DATA SET

[pic]

The size of the data set decreased by 36.11 percent and the number of pages decreased are 130, which significantly decreases the number of I/O operations. There will be increase in CPU time but the savings in I/O operations greatly outweigh the increase in CPU time.

Before Compressing:

[pic]

After Compressing:

[pic]

From the above performance statistics we can see that the processing time for compressed data set is 1.1 seconds which is 0.19 seconds less compared to the uncompressed version of the file. There is also significant decrease in memory due to data set compression.

Compressing Numeric Data
THE OPTION COMPRESS=BINARY USES THE ROSS DATA COMPRESSION (RDC) ALGORITHM, WHICH COMBINES RUN-LENGTH ENCODING AND SLIDING WINDOW COMPRESSION. THIS OPTION IS MORE EFFICIENT WITH OBSERVATIONS GREATER THAN A THOUSAND BYTES IN LENGTH AND CAN BE VERY EFFECTIVE WITH NUMERIC DATA AND CHARACTER DATA THAT CONTAIN PATTERNS RATHER THAN SIMPLE REPETITIONS. IT TAKES SIGNIFICANTLY MORE CPU TIME TO UNCOMPRESS THAN COMPRESS=YES|CHAR.

options fullstimer;

PROC IMPORT OUT= WORK.bindata(compress=binary)

DATAFILE= "H:\binary.csv"

DBMS=CSV REPLACE;

GETNAMES=YES;

DATAROW=2;

RUN;

Measuring Efficiency
THE FOLLOWING ARE THE STATISTICS FOR DATA COMPRESSED USING COMPRESS=BINARY OPTION

[pic]

The size of the data set decreased by 81.82 percent after compressing and also the number of pages required by compressed data set decreased to 10 from 55.

Before Compression:

[pic]

After Compression

[pic]

The processing time for compressed data set is 1 second where as for uncompressed is 1.2, our sample data set contains only 425 observations but in many practical applications the data set contains millions of observations so the difference in processing time will be very significant.

Making Compress= Option more effective
SOME OF YOU MIGHT BE WONDERING WHY SAS DOES NOT, FOR THE SAKE OF MAKING ALL DATA SETS AS SMALL AS POSSIBLE, AUTOMATICALLY COMPRESS THEM DURING DATA STEP PROCESSING. THERE ARE SEVERAL REASONS WHY WE DON’T FAVOR THE “BLIND” USE OF THIS SAS SYSTEM OPTION IN ALL SITUATIONS. ONE OF THE MAIN REASONS IS INCREASE IN CPU-TIME. ADDITIONAL CPU RESOURCES ARE REQUIRED TO BOTH CREATE A COMPRESSED DATA SET AND TO APPLY SAS TASKS TO THE COMPRESSED DATA SET. THE SAS SYSTEM MUST UNCOMPRESS THE DATA SET EVERY TIME IT APPLIES A DATA STEP OR PROCEDURE STEP TO IT.

Following are few techniques which can be used along with the compress= option to make the process of decreasing the size of a large data set more effective.

1. LENGTH STATEMENT: The default length of numeric variables is 8 bytes. The Length statement can be used to declare the byte lengths of variables in the Program Data Vector

More observations can be placed in each page of a dataset memory by appropriately adjusting the byte lengths of variables, resulting in a smaller data set and also reducing the number of input-output operations required to move the data set in and out of the CPU.

2. REUSE= OPTION: When you create a compressed file, you can also specify REUSE=YES (as a data set option or a system option) in order to track and reuse space. With REUSE=YES, new observations are inserted in space which becomes freed when other observations are updated or deleted, which results in optimal usage of the space. Note that when using Compress=yes and reuse=yes system options, the observations cannot be addressed using observation numbers. This is because the REUSE= option has higher precedence over POINTOBS= option and they are mutually exclusive.

3. OPTIMIZING CPU PERFORMANCE: The major drawback of compressing data set is increase in CPU time, by setting the CGOPTIMIZE= option to 0 CPU time can be saved when processing large data sets. So Optimizing CPU performance while compressing, using techniques like these can improve the overall performance.

CONCLUSION
DATA SET COMPRESSION REDUCES THE SIZE OF THE DATA SETS ONLY IF THE MAXIMUM SIZE OF THE OBSERVATION IS MORE THAN THE 12-BYTE (32-BIT SYSTEMS) OR 24-BYTE (64-BIT SYSTEM) OVERHEAD INTRODUCED BY COMPRESSION. A COMPRESSED DATA SET REQUIRES LESS NUMBER OF PAGES WHICH RESULTS IN LESS NUMBER OF I/O OPERATIONS AND INCREASED PERFORMANCE. NEVERTHELESS, IT SHOULD BE NOTED THAT THERE IS AN INCREASE IN CPU TIME FOR PROCESSING THE COMPRESSED FILE, SO IF YOU HAVE LIMITED CPU RESOURCES THEN COMPRESSING A DATA SET MIGHT NOT BE A GOOD OPTION.

References

“HTTP://SUPPORT.SAS.COM/DOCUMENTATION/CDL/EN/LRDICT/64316/HTML/DEFAULT/VIEWER.HTM#A000202890.HTM”

“HTTP://SUPPORT.SAS.COM/DOCUMENTATION/CDL/EN/LRDICT/64316/HTML/DEFAULT/VIEWER.HTM#A000202894.HTM”

ANDREW H. KARP “INDEXING AND COMPRESSING SAS®DATA SETS: HOW, WHY AND WHY NOT” SUGI28 PAPER 3-28

“HTTP://SUPPORT.SAS.COM/DOCUMENTATION/CDL/EN/LRCON/62955/HTML/DEFAULT/VIEWER.HTM#A001091115.HTM”

CONTACT INFORMATION
YOUR COMMENTS AND QUESTIONS ARE VALUED AND ENCOURAGED. CONTACT THE AUTHOR AT:
Srinivas Busi Reddy, Email: srinivas.busi_reddy@okstate.edu
Srinivas Busi Reddy is Master’s student in Management Information Systems at Oklahoma State University. He is an ADVANCED SAS® 9 certified Programmer.

Srikar Rayabaram, Email: rayabar@okstate.edu
Srikar Rayabaram is Master’s student in Management Information Systems at Oklahoma State University. He is a BASE SAS® 9 and a certified SAS® predictive modeler using Enterprise Miner 6. He will be receiving his SAS® and OSU Data Mining Certificate in December 2012.

Musthan Meeran Mohideen, Email: musthan@okstate.edu
Musthan Meeran Mohideen is Master’s student in Management Information Systems at Oklahoma State University. He is a BASE SAS® 9 and a certified SAS® predictive modeler using Enterprise Miner 6.

SAS and all other SAS Institute Inc. product or service names are registered trademarks or trademarks of SAS Institute Inc. in the USA and other countries. ® indicates USA registration.

Other brand and product names are trademarks of their respective companies.

Similar Documents

Free Essay

Survey on Coding Algorithm

.../ (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 05, 2010, 1429-1434 A Survey On Coding Algorithms In Medical Image Compression S.Bhavani Department of ECE Sri Shakthi Institute of Engineering & Technology Coimbatore, India Abstract— In medical imaging, lossy compression schemes are not used due to possible loss of useful clinical information and as operations like enhancement may lead to further degradations in the lossy compression. Hence there is a need for efficient lossless schemes for medical image data. Several lossless schemes based on linear prediction and interpolations have been proposed. Currently, context based approach has gained popularity since it can enhance the performance of above schemes due to the exploitation of correlation within the frame. Since the conception of Mesh based Compression from early 1990’s many algorithms has been proposed and the research literature on this topic has experienced a rapid growth which is hard to keep track of. This paper gives a brief description about the various coding algorithms and advancements in this field. Keywords- Image compression, prediction, medical image, context based modeling, object based coding, wavelet transform. Dr.K.Thanushkodi Director Akshaya College of Engineering & Technology Coimbatore, India image compression schemes, the probability assignment is generally divided as i) A prediction step, in which a deterministic value is guessed for the next pixel based on...

Words: 4955 - Pages: 20

Free Essay

Blockbuster Technology Plan

...required to switch between the two in a way that your brain perceives as three-dimensional. Because of this, twice as much data is needed for a 3D movie compared to a 2D one, which presents certain issues when trying to send this data over a medium such as the Internet. Thankfully, several technologies are emerging that will make this possible in the near future and that we believe Blockbuster is well positioned to take advantage of in order to offer 3D content streaming to their customers. The biggest factor of sending a movie over the Internet is the amount and type of compression that is used. It would be impossible to send a fully uncompressed high definition movie directly to your home, whether or not it is 3D, because the amount of data is staggering. In order to make the files smaller and able to be sent in small pieces, companies like Netflix use compression formats such as MPEG or AVI which use special technologies that result in smaller files. This involves limiting the bit depth for colors in a way that humans don’t really perceive, as well as comparing individual frames to the ones ahead of and before it so that only the differences have to be shown. In an MPEG-4 video, the type used by Netflix and Apple, scenes with very little action such as in a dark room use much less data compared to an action scene because of the way this compression scheme works (IEEE, 2004). On a Blu-Ray disc,...

Words: 969 - Pages: 4

Free Essay

Hostel Management

...------------------------------------------------- Data compression From Wikipedia, the free encyclopedia   (Redirected from Video compression) "Source coding" redirects here. For the term in computer programming, see Source code. In digital signal processing, data compression, source coding,[1] or bit-rate reduction involves encoding information using fewer bits than the original representation.[2]Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying unnecessary information and removing it.[3] The process of reducing the size of a data file is referred to as data compression. In the context of data transmission, it is called source coding (encoding done at the source of the data before it is stored or transmitted) in opposition to channel coding.[4] Compression is useful because it helps reduce resource usage, such as data storage space or transmission capacity. Because compressed data must be decompressed to use, this extra processing imposes computational or other costs through decompression; this situation is far from being a free lunch. Data compression is subject to a space–time complexity trade-off. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed, and the option to decompress the video...

Words: 12347 - Pages: 50

Free Essay

Multimedia Compression(Not Mine)

...Video compression design, analysis, consulting and research White Paper: An Overview of H.264 Advanced Video Coding Iain Richardson 2007 Vcodex White Paper: An overview of H.264 http://www.vcodex.com - H.264 and video coding expertise and consulting. 1 What is H.264 ? H.264 is an industry standard for video compression, the process of converting digital video into a format that takes up less capacity when it is stored or transmitted. Video compression (or video coding) is an essential technology for applications such as digital television, DVD-Video, mobile TV, videoconferencing and internet video streaming. Standardising video compression makes it possible for products from different manufacturers (e.g. encoders, decoders and storage media) to inter-operate. An encoder converts video into a compressed format and a decoder converts compressed video back into an uncompressed format. Recommendation H.264: Advanced Video Coding is a document published by the international standards bodies ITU-T (International Telecommunication Union) and ISO/IEC (International Organisation for Standardisation / International Electrotechnical Commission). It defines a format (syntax) for compressed video and a method for decoding this syntax to produce a displayable video sequence. The standard document does not actually specify how to encode (compress) digital video – this is left to the manufacturer of a video encoder – but in practice the encoder is likely to mirror the steps...

Words: 1593 - Pages: 7

Free Essay

Xendesktop

...Statement Contents Customize Delegating Administration Tasks Printing with XenDesktop Configuring USB Support Support for USB Mass Storage Devices Optimizing the User Experience Enhancing the User Experience With HDX Configuring HDX MediaStream Flash Redirection Configuring HDX MediaStream Flash Redirection on the Server Configuring HDX MediaStream Flash Redirection on the User Device Configuring Audio Avoiding Echo During Multimedia Conferences With HDX RealTime HDX RealTime Webcam Video Compression for Video Conferencing Improving Responsiveness in Low Bandwidth Conditions by Compressing Colors Configuring Time Zone Settings Configuring Connection Timers Workspace Control in XenDesktop Removing the Shut Down Command 3 4 6 7 10 11 12 13 14 17 20 22 23 25 27 28 29 30 2 Customizing Your XenDesktop Environment After completing the initial setup tasks, you can customize and optimize your XenDesktop deployment: q Create additional administrators for the site, if necessary. Set up any general Citrix policies that you require, including policies for printing. See Working with XenDesktop Policies for details of configuring policies. Configure USB support. Optimize the user experience by ensuring that settings for desktops and users are appropriate. q q q 3 Delegating Administration Tasks This topic explains how to display information about administrative rights and how to create additional XenDesktop administrators. Displaying Administration Rights ...

Words: 5942 - Pages: 24

Free Essay

Rar - What's New in the Latest Version

...containing both quick open information and service records, such as NTFS file security. Also default parameters of quick open information are optimized to achieve faster open time for such archives. 2. Bugs fixed: a) "Test" command could erroneously report damaged data in valid recovery record if only a part of files in RAR 5.0 archive was tested. It did not happen if entire archive contents was tested; b) "Test" command erroneously reported errors when verifying RAR 4.x Unix symbolic links. Version 5.00 1. New RAR 5.0 archiving format. You can use -ma command line switch to create RAR 5.0 archives. By default RAR creates archives in 4.x format. 2. Changes in RAR 5.0 compression algorithm: a) maximum compression dictionary size is increased up to 1 GB in 64 bit RAR. 32 bit RAR version can use up to 256 MB dictionary when creating an archive. Both 32 bit and 64 bit versions can unpack archives with any dictionary size, including 1 GB; b) default dictionary size for RAR 5.0 is 32 MB, typically resulting in higher compression ratio and lower speed than RAR 4.x 4 MB. You can use -md switch to change this value; c) -md switch syntax is modified to support larger dictionary sizes. Append 'k', 'm' and 'g' modifiers to specify the size in kilo-, mega- and gigabytes, like -md64m for...

Words: 2468 - Pages: 10

Free Essay

Text Compression Using Ambigrams

...Text Compression Using Ambigrams Arun Prasad R., Gowtham S., Iyshwarya G. ,Kaushik Veluru, Tamarai Selvi A., Vasudha J. Amrita School of Engineering, Coimbatore. {arun837, gowtham035, iysh16, kaushikveluru, tamarai1990, vasudha.1990}@gmail.com Abstract Networking field is looking forward for improved and efficient methods in channel utilization. For some text, data recovery becomes indispensable because of importance of data it holds. Therefore, a lossless decomposition algorithm which is independent of the nature and pattern of text is today’s top concern. Efficiency of algorithms used today varies greatly depending on the nature of text. Such algorithms need some characters to be frequently appearing in the text and randomness in the characters present distorts the consistency to a large extent. This paper brings in the idea of using an art form called ambigram to compress text with consistency in the efficiency of the compression. Keywords Ambigrams, lossless compression, steganography, stego key, embedded algorithms, encryption. 1. Introduction When so many algorithms are available for compressing text, they hamper the readability of the text once compressed. Compressing the text using ambigrams also reduces the text to nearly 50% of its size. When most of the other compressing techniques depend on the nature of the text to be compressed, this technique is independent of the type of the text and requires only...

Words: 1801 - Pages: 8

Free Essay

Mpeg

...third standard, MPEG-4, in the process of being finalized . The MPEG-1 & -2 standards are similar in basic concepts. They both are based on motion compensated block-based transform coding techniques, while MPEG-4 deviates from these more traditional approaches in its usage of software image construct descriptors, for target bit-rates in the very low range, < 64Kb/sec. Because MPEG-1 & -2 are finalized standards and are both presently being utilized in a large number of applications, this case study concentrates on compression techniques relating only to these two standards. MPEG 3- it was originally anticipated that this standard would refer to HDTV applications, but it was found that minor extensions to the MPEG-2 standard would suffice for this higher bit-rate, higher resolution application, so work on a separate MPEG-3 standard was abandoned. CONTENTS *Introduction *History *Video Compression *Video Quality *MPEG *MPEG Standards *MPEG Video Compression Technology *MPEG Specification *System -Elementary Stream -System Clock Referance -Program Streams -Presentation Time Stamps -Decoding Time Stamps -Multiplexing *Video -Resolution -Bitrate -I frame -P frame -B frame -D frame -Macroblock -Motion Vectors *Audio *Illustration 1 : 32 sub band filter bank *Illustration 2 : FFT analysis *Discrete...

Words: 5683 - Pages: 23

Free Essay

Pdf of Telecom

...GSM BSS Network KPI (MOS) Optimization Manual INTERNAL Product Name GSM BSS Product Version V00R01 Confidentiality Level INTERNAL Total 36 pages GSM BSS Network KPI (MOS) Optimization Manual For internal use only Prepared by Reviewed by Reviewed by Granted by GSM&UMTS Network Performance Research Department Dong Xuan Date Date Date Date 2008-2-21 yyyy-mm-dd yyyy-mm-dd yyyy-mm-dd Huawei Technologies Co., Ltd. All rights reserved 2011-08-04 Huawei Technologies Proprietary Page 1 of 36 GSM BSS Network KPI (MOS) Optimization Manual INTERNAL Revision Record Date 2008-1-21 2008-3-20 Revision Version 0.9 1.0 Change Description Draft completed. The document is modified according to review comments. Author Dong Xuan Wang Fei 2011-08-04 Huawei Technologies Proprietary Page 2 of 36 GSM BSS Network KPI (MOS) Optimization Manual INTERNAL GSM BSS Network KPI (MOS) Optimization Manual Key words: MOS, interference, BER, C/I, power control, DTX, frequency hopping, PESQ, PSQM /PSQM+, PAMS Abstract: With the development of the radio network, mobile operators become more focused on end users’ experience instead of key performance indicators (KPIs). The improvement of the end users’ experience and the improvement of the network capacity are regarded as KPIs. Therefore, Huawei must pay close attention to the improvement of the soft capability of the network quality as well as the fulfillment of KPIs. At present, there are three...

Words: 9686 - Pages: 39

Free Essay

Counter Image Forensics

...Chapter 3 IMPLEMETATION 3.1. JPEG COMPRESSION USING MATLAB 7.10.0 3.1.1 Workflow We successfully compressed a black & white photograph (source: Dresden Image Database) implementing JPEG algorithm in Matlab and compressed the images to 1/4th of the original image size. This was achieved by dividing the image in blocks of 8×8 pixels and applying a discrete cosine transform (DCT) on each partition of the images. The resulting coefficients were quantized and less significant coefficients are set to zero. In order to omit redundancy in our algorithm, we skipped the entropy encoding step, since it provides lossless compression and thus not useful for forensic of the image. This is shown in figure 3.1. 3.1.2 Block splitting Normally, the width and height of the image are a multiple of 8 and that the image is either gray scale or RGB (red, green, blue). Each pixel is assigned a value between 0 and 255, or a triplet of RGB values. Figure 3.1 Step of JPEG Compression Thus, we split the image into 8×8 blocks. This is needed since the DCT has no locality information whatsoever. There is only frequency information available. We continued by shifting every block by −128, this made the values symmetric around zero with average close to zero. 3.1.3 Quantization So far there had been no compression. We then proceeded by introducing zeros in the arrays by means of Quantization. Every DCT coefficient Xjk was divided by an integer Qjk and rounded to the nearest integer...

Words: 3272 - Pages: 14

Premium Essay

Personal Computer

...Personal computer Name Institution's name Introduction A computer can be defined as an electronic device with the capability of accepting raw data, process it and give out feedback, that is, it gives out information which is more useful. In the 19th century, Charles Babbage invented the first computers. They were very big and they occupied a big space. The computers were not that efficient but technological advancement led to more and more researches be conducted in order to increase the efficiency and reliability of these computers. The evolution of the personal computers took place in three major stages where each stage is said to have had a positive improvement in terms of the performance and physical size of the computers. The stages were; First stage (1937-1946) - Clifford berry and John Atanasoff were the pioneers of first electronic digital computers. The computers had no any operating system and they used vacuum tubes for processing. They were so heavy and are believed to have produced a lot of heat. They almost weighed 30 tons and consumed a lot of power. Second stage (1947-1962) – at this stage, everything was perfectly improved. Vacuum tubes were replaced with transistors and this made the computers more reliable. Programming languages were also invented in this stage as well as memory storage media. The computers were used commercially. Third stage (1963- present) – it’s at this stage that the integrated circuits were invented which brought much impact on the...

Words: 1110 - Pages: 5

Premium Essay

Even Asnwers Sobell Ch 11

...11 Answers to Even-numbered Exercises 2. How would you communicate each of the following messages? 1. Ho r mode? a. The system is coming down tomorrow at 6:00 in the evening for periodic maintenance. Use the /etc/motd file and/or email. Alternatively, you can include the message in a shutdown command. b. The system is coming down in five minutes. Use wall or include the message in a shutdown command. c. Zach’s jobs are slowing the system down drastically, and he should postpone them. Use write or talk. d. Zach’s wife just had a baby girl. Use the motd file and/or email. 4. How would you allow a user to execute a specific, privileged command without giving the user the root password? 3. Whgs in? You can create a setuid program that belongs to a group that only the user who is to execute it belongs to and that has no permissions for other users. 6. How can you disable SELinux? 5. How dileges? Either use the SELinux tab of the Security Level Configuration window displayed by system-config-securitylevel to change the SELinux setting to Disabled or put the following line in /etc/sysconfig/selinux: SELINUX=disabled 1 2 Then reboot the system. 8. Give the command 7. to remember. $ /bin/fuser -uv / What does the output list? Why is it so long? Give the same command while working with root privileges (or ask the system administrator to do so and email you the results). How does this list differ from the first? Why is it different...

Words: 564 - Pages: 3

Free Essay

Lab 2

...| Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos...

Words: 1139 - Pages: 5

Free Essay

It302 Final Project

...grep nfs 5. It contains information about major file systems in the system. And it is located in the /etc directory. 6. /opt *.example.com(ro,sync) 7. NFS attribute caching can cause inconsistencies when large numbers of client nodes are asked to access files that have been updated recently and the attribute caching data on the client has not expired. Disabling attribute caching eliminates the problem but may degrade performance for frequent file operations requiring file attribute data. 8. The root_squash option maps root to nfsnobody; all_squash maps all users to nfsnobody. 9. The option requires that the requests originate on an internet port less than 1024. 10. Because it has no disk space, a diskless workstation has no swap space. The only choice is to use NFS. If it did not use NFS for swap space, the workstation would be limited by the amount of its physical memory. 11. Because it resides on the lan and file data and user id values appear unencrypted. 12. The nosuid option forces setuid executable in the mounted directory hierarchy to run with regular permissions on the local system. CH 23 1. smdb, nmbd 2. Set the username map parameter in smb.conf to point to the map file, frequently /etc/samba/smbusers, and assign a samba password to the user. 3. Only_from = 192.168.1.0/8 4. The [homes] share implicitly shares the home directory of each user without having to define specific shares. 5. NFS directory hierarchies are mounted...

Words: 806 - Pages: 4

Free Essay

Assignment 8

...Waubonsee Community College Assignment 8 - Page 583, Exercise #4 CIS116 - Structured Program Design Table of Contents Introduction ...................................................................................................................................................................1 Submit Instructions........................................................................................................................................................1 Sample Solution - Exercise #3, Page 583 .......................................................................................................................1 Problem Description ..................................................................................................................................................1 Wireframe diagram ...................................................................................................................................................2 Pseudocode for button's click event .........................................................................................................................2 Flowchart for the button's click event .......................................................................................................................3 Introduction The purpose of this Assignment is to provide you with experience in working with loops in a flowchart. The problem specifications are as follows: For your reference, a sample problem solution...

Words: 326 - Pages: 2