In this chapter, we will discuss in feature about network communication utilities in UNIX. When you work in a concentrated environment, you want to communicate with isolated users and you also need to access remote UNIX equipment.
There is a number of UNIX utilities that help users compute in a networked, distributed environment. This part lists a few of them.
The ping command sends an echo request to a host available on the network. Using this command, you can check if your secluded host is respond well or not.
The ping command is useful for the following −
Following is the simple syntax to use the ping command –
The above command starts printing a reply after every second. To come out of the command, you can terminate it by pressing CNTRL + C keys.
Following is an instance to check the accessibility of a host available on the network –
If a host does not exist, you will receive the following output –
Here, ftp stand for File Transfer Protocol. This utility helps you upload and download your file from one computer to another computer.
The ftp utility has its own set of Unix-like commands. These commands help you execute responsibilities such as −
Following is the easy syntax to use the ping command –
The above command would prompt you for the login ID and the password. Once you are authenticated, you can access the home directory of the login explanation and you would be able to execute different commands.
The following tables lists out a few main commands −
|S.No.||Command & Description|
It should be noted that all the files would be downloaded or uploaded to or from the present directories. If you want to upload your files in a particular directory, you want to first modify to that directory and then upload the necessary files.
Following is the instance to show the working of a few instructions –
There are times when we are essential to connect to a remote UNIX device and work on that machine remotely. Telnet is a utility that allows a computer user at one site to make an association, login and then manner work on a computer at another site.
Once you login using Telnet, you can achieve all the performance on your remotely linked machine. The following is an instance of Telnet session –
The finger command show information about users on a given host. The host can be either local or secluded.
Finger may be disabling on other systems for security reasons.
Following is the simple syntax to use the finger command −
Check all the logged-in users on the local machine –
Get information about a particular user presented on the local machine –
Check all the logged-in users on the remote machine –
Get the information about a particular user accessible on the secluded device –
Unix/Linux Related Interview Questions
|Perl Scripting Interview Questions||Shell Scripting Interview Questions|
|Python Interview Questions||Core Java Interview Questions|
|Linux Interview Questions||Linux Embedded systems Interview Questions|
|Red Hat Linux System Administration Interview Questions||IBM AIX Interview Questions|
|Sybase Interview Questions||IBM AIX 7 Administration Interview Questions|
|Unix Shell Scripting Interview Questions||Linux Shell Scripting Interview Questions|
Unix/Linux Related Practice Tests
|Perl Scripting Practice Tests||Shell Scripting Practice Tests|
|Python Practice Tests||Core Java Practice Tests|
|Linux Practice Tests||Linux Embedded systems Practice Tests|
|Red Hat Linux System Administration Practice Tests||IBM AIX Practice Tests|
|Sybase Practice Tests||IBM AIX 7 Administration Practice Tests|
|Autosys Practice Tests|
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.