Monthly Archives: October 2009

AWK Tutorial – Day 3

In this session, we will see few examples to understand the features discussed in the session 2. # ExIf.awk BEGIN { proto = 0 } { if ( $1 !~ /^#/ && $ !~ /^$/ ) { proto++ } } END { print “Total Number Protocols: ” proto } RUN: $ awk -f ExIf.awk /e…

Tagged with:
Posted in Uncategorized

GNU/Linux Command – WC

wc – Count and Print the No. of Bytes, Words and Lines Summary: Print byte, word, and newline counts for each FILE, and a total line if more than one FILE is specified. With no FILE, or when FILE is -, read stdin. Examples: [code] $ wc -- Accept t...

Tagged with: ,
Posted in Uncategorized

GNU/Linux Command – TPUT

tput — Initialize a terminal or query terminfo database Summary : The tput utility uses the terminfo database to make the values of terminal dependent capabilities and information available to the shell to initialize / reset / query the terminal….

Tagged with: ,
Posted in Uncategorized

GNU/Linux Command – SPLIT

split — Split the files into pieces Summary: Split will read the input file and write into number of files as per the option given to it. By default, output file names will start with a prefix ‘x’ and followed by 2 suffix characters (aa, ab,..,zz…

Tagged with: ,
Posted in Uncategorized

Relationship between Ethernet Frame/Packet Size and Cable Length

In one of the previous blog entry, shared my understanding about the minimum Ethernet Frame Size. In this entry, sharing my understanding about the relationship between the Minimum Ethernet Frame/Packet Size and the Maximum Ethernet Cable Length. …

Tagged with:
Posted in Uncategorized

GNU/Linux Command – NETCAT

nc — TCP/IP Tool to read and write data across network connection Summary: netcat(nc) is a simple utility which reads and writes data across network connections, using IP, TCP or UDP protocol. It is designed to be a reliable “back-end” tool that …

Tagged with: ,
Posted in Uncategorized

GNU/Linux Command – NMAP

nmap — Network security / port scanner. Summary: Nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap does …

Tagged with: ,
Posted in Uncategorized

PowerTOP Screenshot

PowerTOP Screen shot with explanations. In the top section, two CPU states, C state on left and P state on right are displayed. C state is idle state. Expect C0 state, in all other C states, CPU will not performance any operation. While changing t…

Tagged with: ,
Posted in Uncategorized

AWK Tutorial – Day 2

In previous session, we saw few AWK one-line examples, which can help us to do some simple tasks. In this session, we will try to understand the structure of an AWK Program and the features available in language.Structure of the simple AWK Program…

Tagged with:
Posted in Uncategorized

GNU/Linux Command – SLEEP

sleep/usleep — Sleep for a specified amount of time Summary : Sleep will introduce a delay for a specified seconds (Seconds may be an arbitrary floating point number). usleep sleeps for specified no of micro- seconds (default is 1). Examples : [c…

Tagged with: ,
Posted in Uncategorized