QTLNetworkUserManual
- 格式:pdf
- 大小:1.72 MB
- 文档页数:30
Ixia操作指导⼿册⽬录⽬ 录IxExplorer⼊门什么是IxExplorer (2)搭建测试环境 (2)发送你的第⼀个报⽂ (4)时延统计 (8)配置端⼝IP地址 (10)⾃定义报⽂统计 (12)使⽤ IxExplorer Ping DUT 接⼝地址 (13)抓包分析 (14)更改IxExplorer默认抓包⼤⼩ (15)报⽂回放 (15)统计表格计算 (16)强⼤的⾃定义域UDF (17)如何使⽤IxExplorer发送固定的突发报⽂(Burst) (20)IxNetwork什么是IxNetwork (22)IxNetwork的基础步骤 (23)使⽤ IxNetwork 进⾏⼆层测试 (25)使⽤ IxNetwork 进⾏三层以及 QoS 测试 (30)使⽤ IxNetwork 做延迟抖动完整性测试 (34)使⽤ IxNetwork 做 PRBS 测试 (35)使⽤ IxNetwork 做 Sequence Checking 测试 (36)IxNetwork深⼊测试使⽤ IxNetwork 做 OSPF 测试 (37)使⽤ IxNetwork 做 RFC2544 吞吐量测试 (42)使⽤ IxNetwork 做 RFC 2889 MAC地址表容量测试 (48)使⽤ IxNetwork Quick Flow 快速流 (52)如何在IxNetwork中显⽰L1层流量统计 (54)1. IxExp lorer⼊门Ixia仪表的管理⼝,参见上图蓝⾊的线。
被测设备和Ixia测试板卡端⼝连接,参见上图1.2.2. 仪表加电启动记下Ixia仪表的IP地址,请参见访问仪表。
21.2.4. 启动IxExplorer客户端并接⼊仪表1. 启动IxExplorer程序可以通过Start -> Programs -> Ixia -> IxOS -> Ixia IxExplorer来启动也可以通过桌⾯快捷⽅式启动2. 输⼊机框的IP地址,请参见访问仪表。
Qcheck是NetIQ公司开发的一款免费网络测试软件,被NetIQ称为“ping命令的扩展版本”,主要功能是向TCP,UDP,IPX,SPX网络发送数据流来测试网络的吞吐率、回应时间等,从而测试网络的响应时间和数据传输率。
测试时需要使用两台计算机,并且均需运行Qcheck软件,在测试中,从一个客户端向另一个客户端发送文件,然后测试所消耗的时间,并计算出传输速率(以Mb/s为单位)。
例如TCP/UDP传输率测试,测试结果越高越好,100Mb/s端口的理论值最高为94Mb/s(传输率)。
Qcheck是一款免费软件,没有任何限制,任何用户都可以下载并使用该软件。
该软件适用于Windows 9x/Me/NT/2000/XP/2003等操作系统,用户可以从其官方网站(/)下载。
TCP响应时间(TCP Response Time)这项测试可以测得完成TCP通讯的最短、平均与最长时间。
这个测试和「ping」很像,目的在于让你知道收到另一台机器所需的时间。
这个测量一般称为「延缓」或「延迟」(latency)。
TCP传输率(TCP Throughput)这项测试可以测量出两个节点间使用TCP协议时,每秒钟成功送出的数据量。
通过这项测试可以得出网络的带宽。
UDP串流传输率(UDP Streaming Throughput)和多媒体应用一样,串流测试会在不知会的状况下传送数据。
在Qcheck中,使用无连结协议的IPX(Internetwork Packet Exchange,网络交换协议)或UDP。
Qcheck的串流测试是评估应用程序使用串流格式时的表现,例如IP线上语音以及视频广播。
此测试显示多媒体流通需要多少的频宽,以方便网络硬件速度和网络所能达到真正数据传输率间的比较。
另外也可以测得封包遗失(packet loss)情况以及处理中的CPU占用率(CPU utilization)。
/products/performance_applications/pa_display.php?skey=qcheck在要测试的网络两端分别运行一台计算机,这两台计算机均安装Qcheck软件,然后分别运行Qcheck程序。
威联通®—网络磁盘驱动器TS-411U Turbo Server使用手册TS-411U Turbo Server 使用手册 (版本: 1.0.0)版权所有2005© 威联通科技股份有限公司2005年12月8日有限保证责任威联通®保证所有出厂的网络服务器皆通过严格而完整的测试,在一般的使用情况下,都可以正常地运作。
在保固期限内及正常使用的状况下,如果发生系统故障,威联通®将负责修护。
除此之外,威联通®不保证负责所有因为本产品而造成的数据遗失、毁损、或营业上及执行业务的损失。
在任何情况下,威联通®所负担的赔偿责任,不超过本产品的售价。
注意事项1.请务必定期备份硬盘中的数据,以避免任何意外、人为操作疏失或硬盘故障所造成的数据毁损。
威联通®不负责任何资料遗失或复原。
2.如要把TS-411U Turbo Server或任何包装内零件退回或维修,请确定货品妥善包装以确保运送无误。
若货品运送期间因不妥善包装造成任何损坏,威联通®一概不予负责。
目录产品介绍 (7)1.1产品简介 (7)1.2包装内容 (8)1.3产品概观 (9)安装TS-411U (10)2.1安装硬盘 (10)2.2兼容硬盘型号列表 (14)2.3连接TS-411U至办公室网络 (15)使用LCD面板 (17)快速安装精灵 (21)使用TS-411U的服务 (30)5.1档案服务器 (30)5.2FTP服务器 (30)5.3备份服务器 (31)六 管理TS-411U (32)6.1进入系统管理网页 (33)6.2系统管理概观 (35)6.3快速设定 (36)6.4系统设定 (42)6.4.1系统名称 (42)6.4.2日期&时间 (43)6.4.3语系设定 (45)6.5网络设定 (46)6.5.1TCP/IP设定 (46)6.5.2微软网络 (52)6.5.3苹果网络 (55)6.5.4Linux NFS服务 (55)6.5.5网页式档案总管 (56)6.5.6档案传输服务器 (FTP) (56)6.5.7检视网络设定 (57)6.6硬盘设定 (59)6.6.1新增硬盘/硬盘群组组态 (59)6.6.2移除硬盘群组组态 (62)6.6.3检查硬盘/硬盘群组 (62)6.6.4格式化硬盘/硬盘群组 (64)6.6.5检视硬盘/硬盘群组的状态 (64)6.7用户管理 (65)6.7.1用户 (65)6.7.2用户群组 (67)6.7.3容量限制 (72)6.8网络磁盘管理 (74)6.8.1新增 (75)6.8.2内容 (76)6.8.3存取限制 (76)6.8.4移除 (77)6.9系统工具 (78)6.9.1SNMP设定 (78)6.9.2警讯通知 (79)6.9.3关机/重新启动 (79)6.9.4硬件设定 (80)6.9.5不断电系统 (81)6.9.6系统更新 (82)6.9.7更换首页图片 (84)6.9.8备份工具 (85)6.9.9异地备份 (88)6.9.10防毒设定 (91)6.9.11备份/还原/回复设定 (97)6.9.12USB CD/ DVD 备份/ 回存 (98)6.10统计&记录 (102)6.10.1在线用户 (102)6.10.2事件记录 (102)6.10.3DHCP动态地址分配记录 (102)存取TS-411U (103)7.1使用微软窗口操作系统 (Microsoft Windows) (103)7.2使用苹果麦金塔操作系统 (Apple MAC OS) (105)7.3使用Linux操作系统 (111)7.4使用浏览器 (111)7.5使用FTP传输程序 (112)NetBak Replicator (115)TS-411U维护 (129)9.1重新启动/关闭系统 (129)9.2重设系统管理员密码及网络组态 (130)9.3硬盘毁损或异常处理 (131)9.4停电或不正常关机 (131)录 A网页式档案总管 (132)录 B设定Active Directory认证 (137)录 C实体硬盘及已设定硬盘/硬盘群组状态说明 (147)技术支持 (148)产品介绍1.1产品简介欢迎使用TS-411U Turbo Server,本产品包含以下特色:•快速简易的安装设定,五分钟即可上线使用,所有管理功能皆可透过人性化的网页式接口于IE浏览器中完成•新一代高速SATA硬盘接口,可热抽换硬盘设计,超大储存容量最高可达2TB•双Gigabit超宽频以太网络端口支持网络负载平衡、网络容错备份及多址设定•超便利LCD面板实时显示IP地址及重要系统信息,免用计算机即可进行简单的设定•支持RAID 0、1、5及JBOD磁盘组态设定,数据安全有保障•内建防毒机制,可选购在线实时扫毒,输入授权码即启动防毒功能,毋须额外安装,分享数据更安心(选购)•支持备份电源供应器,大幅提升系统的可靠度•提供多种方便好用的备份机制:9远程异地备份:内建专业级高效异地备份功能,可将TS-411U中数据以立即/排程自动备份至远程另一台NAS服务器9CD/DVD烧录备份:可透过高速USB 2.0接口将TS-411U中数据透过外接式CD/DVD烧录机备份或回存9客户端数据备份:Windows用户可透过强大备份软件NetBak Replicator,不需专业IT人员协助便可设定将PC资料立即/排程备份至TS-411U1.2包装内容您的TS-411U包装内容含以下项目:1.TS-411U Turbo Server2.电源线3.CD-ROM (含使用手册、快速安装精灵软件等)4.快速安装指引5.网络线 x 26.金属固定片 x 67.平头螺丝 x 168.圆头螺丝 x 359.硬盘锁1. TS-411U2. 电源线3. CD-ROM4. 快速安装指引5. 网络线6. 金属固定片7. 平头螺丝8. 圆头螺丝9. 硬盘锁1.3 产品概观正面图背面图电源供应器背面安装TS-411U2.1安装硬盘请准备下列项目并按照以下步骤安装TS-411U的硬盘。
Package‘TidyMultiqc’October12,2022Type PackageTitle Converts'MultiQC'Reports into Tidy Data FramesVersion1.0.3Author Michael MiltonMaintainer Michael Milton<**************************>Description Provides the means to convert'multiqc_data.json'files,produced by the wonderful'MultiQC'tool,into tidy data frames for downstreamanalysis in R.This analysis might involve cohort analysis,quality control visualisation, change-point detection,statistical process control,clustering,or any othertype of quality analysis.License GPL(>=3)Encoding UTF-8Imports assertthat,dplyr,jsonlite,magrittr,purrr,rlang,stringr,tibbleSuggests tidyr,testthat(>=3.0.0),knitr,rmarkdown,ggplot2,HistDatConfig/testthat/edition3RoxygenNote7.1.2VignetteBuilder knitrURL https://multimeric.github.io/TidyMultiqc/,https:///multimeric/TidyMultiqc,https:///package=TidyMultiqcBugReports https:///multimeric/TidyMultiqc/issues NeedsCompilation noRepository CRANDate/Publication2022-09-2502:10:02UTC12list_plots R topics documented:TidyMultiqc-package (2)list_plots (2)load_multiqc (3)Index5 TidyMultiqc-package TidyMultiqc:Converting MultiQC reports into tidy data framesDescriptionThis package provides the means to convert multiqc_data.jsonfiles,produced by the wonderful MultiQC tool,into tidy data.frames for downstream analysis in R.If you are reading this manual, you should immediately stop reading this and instead refer to the documentation website at https: //multimeric.github.io/TidyMultiqc/,which provides more accessible documentation.list_plots List the plot identifiers of all the plots in a given multiqc reportDescriptionList the plot identifiers of all the plots in a given multiqc reportUsagelist_plots(path)Argumentspath Thefile path to the multiqc report.This should be a length1character vector DetailsThe main use for this function isfinding the plot identifiers that you will then pass into the plots argument of the load_multiqc()function.Refer to the section on"Extracting Plot Data"in the main vignette for more information.ValueA data frame containing n rows,where n is the number of plots in the report you have provided,and two columns:id The identifier for the plot.This is the one you should use as a name in plot_opts.name The plot title.This is likely what you see in the multiqc report when you open it with your browser.Examples#Ignore this,choose your own filepath as the filepath variablefilepath<-system.file("extdata","HG00096/multiqc_data.json",package="TidyMultiqc") #This is the actual invocationlist_plots(filepath)load_multiqc Loads one or more MultiQC reports into a data frameDescriptionLoads one or more MultiQC reports into a data frameUsageload_multiqc(paths,plots=NULL,find_metadata=function(...){list()},plot_parsers=list(),sections="general")Argumentspaths A string vector offilepaths to multiqc_data.jsonfilesplots A string vector,each of which contains the ID of a plot you want to include in the output.You can use list_plots()to help here.find_metadata A single function that will be called with a sample name and the parsed JSON for the entire report and returns a named list of metadatafields for the sample.Refer to the vignette for an example.plot_parsers Advanced.A named list of custom parser functions.The names of the list should correspond to plotly plot types,such as"xy_line",and the values shouldbe functions that return a named list of named lists.For the return value,theouter list is named by the sample ID,and the inner list is named by the name ofthe column.Refer to the source code for some examples.sections A string vector of zero or more sections to include in the output.Each section can be:"plot"Parse plot data.Note that you should also provide a list of plots via theplots argument"general"parse the general stat section"raw"Parse the raw data sectionThis defaults to’general’,which tends to contain the most useful statisticsValueA tibble(data.frame subclass)with QC data and metadata as columns,and samples as rows.Columnsare named according to the respective section they belong to,and will always be listed in the fol-lowing order:metadata.X This column contains metadata for this sample.By default this is only the sam-ple ID,but if you have provided the find_metadata argument,there may bemore columns.general.X This column contains a generally useful summary statistic for each sample plot.X This column contains a data frame of plot data for each sample.Refer to the plot parsers documentation(ie the parse_X functions)for more information onthe output format.raw.X This column contains a raw summary statistic or value relating to each sample See Alsoparse_xyline_plot()parse_bar_graph()Examplesload_multiqc(system.file("extdata","wgs/multiqc_data.json",package="TidyMultiqc"))Indexlist_plots,2list_plots(),3load_multiqc,3load_multiqc(),2parse_bar_graph(),4parse_xyline_plot(),4TidyMultiqc-package,25。
SoftPerfect Network Scanner Online User ManualGetting startedThe main window you see when you run the SoftPerfect Network Scanner. Under the menu there is a toolbar with buttons used to access the main features.The program controls are as follows:Clear the displayLoad the scan results from a XML fileSave the scan results to a fileCollapse the results treeExpand the results treeSearch the results treePaste IP address from the clipboardApply the shares filter. Only computers with available shared folders are shownOpen the advanced filter panelProgram optionsDiscover DHCP serversOpen the Wake-on-LAN managerAutomatically detect the network configurationOpen the Windows Management Instrumentation managerOpen the remote registry query managerOpen the remote service query managerOpen the remote file query managerOpen the SNMP query managerOpens the remote groups query managerOnline Help (this web page)Add one or more IP address range to scanToggle noncontiguous scan modeApplication optionsPress Ctrl+O or the button to access the Network Scanner options:General tabOn the General tab:•Max. threads: the maximum number of scanning threads.•Max. thread run-time gracefully stops a thread and moves on to a next IP address if it has not finished within the specified time. If the thread cannot be stopped, it will be forcibly terminated when 2 x the specified time elapses. A zero run-time sets no limit on thread execution time. •Method: the ping method. Can be chosen from ICMP (ping), ARP (arping), or both.•Ping timeout: the period to wait for a reply from the remote computer. •Attempts: the maximum number of ping requests.•Always analyse host forces the scanner to analyse a non-responding host.•Ping broadcast addresses: when enabled, the scanner tries to ping IP addresses ending with .255.•Explore shared folders in background: if this option is set, whenever you choose to explore a folder, the Network Scanner launches a separate process of Windows Explorer to avoid temporaryunresponsiveness.•Case insensitive sorting ignores case type when results are sorted.•Display dead hosts adds non-responding hosts to the results. •Determine packet loss and jitter sends a series of echo requests and shows the number of lost packets as well as a packet delay variation.The higher are the numbers, the less reliable the connection is.•Detect duplicate MAC addresses informs you if there are any duplicate MAC addresses discovered.•Show last scan time shows the time when the host was last scanned. •Scan in random order scans IP addresses and ports in a random order, not sequentially.•Minimise to the notification area: the application will be minimised to the system tray.Additional tab:On the Additional tab:•Resolve host names: when enabled, the IP addresses are converted to the host names.•Resolve MAC addresses: when enabled, you will see hardware (MAC) addresses. There are three discovery methods available: ARP query,NetBios query and Router SNMP MIB query. The ARP query methodsends an ARP packet to the target device to resolve its MAC addressdirectly. Similarly, the NetBios query method sends a NetBios packet to the target device. If the target device responds to the request, theNetwork Scanner will obtain the MAC address of that device. The Router SNMP MIB query method works differently. Before starting scanning, the application will send a few SNMP requests to the default gatewayconfigured in your network card’s properties in order to find out w hat MAC address corresponds to what IP address. If the gateway is SNMP capable and responds to the request, the application will cache this information and use it for MAC address resolution. Generally, the ARP query method is sufficient to resolve all MAC addresses in a local subnet. However, if you also require to discover those behind the router, enable the NetBiosquery and Router SNMP MIB query methods and place them first and second in the list. Double-click a method to access its additionalconfiguration parameters.•Resolve IPv6 addresses enables the Network Scanner to obtain the IPv6 address of a remote host. This feature requires Windows Vista or above and discovers addresses of hosts with a dual IPv4/IPv6 stack. •Lookup network card vendor: as per the IEEE standard, the first three octets of a MAC address represent the NIC’s vendor. In order to use this feature you will need to download this file from the IEEE and save it to the Network Scanner folder.•Lookup monitor information displays monitor vendor, model and serial number if available. This feature requires the remote registry service, as the information is read from the registry.•Grab HTTP server banner displays web-server software name and version if a web-server is running on a remote host.Workstation tabOn the Workstation tab:•Lookup LAN group displays the workgroup/domain name that a Windows workstation belongs to.•Lookup Windows version displays the Windows version on a workstation.•Enumerate user accounts lists all user accounts registered on a remote computer.•Lookup logged-on users displays a list of users currently logged-on to a Windows workstation.•Lookup remote Time and Date retrieves and shows the time of the day on a remote system.•Retrieve list of disk drives lists all disk drives available on a remote computer.•Retrieve computer uptime shows how long a remote computer was up and running.•Retrieve assigned comment displays a comment assigned to a Windows workstation.•Lookup server type/roles displays all roles (e.g. PDC, SQL server, Master Browser) assigned to a server.On the Ports tab:•Check for open TCP ports attempts connection to the specified TCP ports and reports those open (you can specify several ports separated by a comma or dash, e.g. 21, 80, 110-115).•Check for open UDP ports discovers some UDP-based services such as DNS, TFTP, NTP, NBNS.See the rightmost columns on the main screen once you have enabled one or more options.Shares tabOn the Shares tab:•Scan for shared resources enables scanning of shared resources. All the possible types of shared resources are listed below.•Check for write access determines whether the shared folder is writable or read-only.•Enable security & user permission scan: with this option enabled, the Network Scanner will discover what reading and writing privileges are assigned to shared folders. You may have to be an administrator toretrieve this information.•Determine disk space determines shared folders’ total and free space.•All: all resources.•Folders: shared folders or drives.•Printers: shared printers.•Comm. device: communication devices.•Administrative shares: special share reserved for remote administration of the server, e.g. ADMIN$, C$, D$, E$, etc.•IPC: interprocess communication (IPC).Applications tabThe Applications tab extends support for third-party applications. For example, if you use remote administration or specific network client software, you can setup the Network Scanner to connect to a remote host using the additional software directly from the Network Scanner:Menu extensions for third-party applications supportShould you require to pass extra arguments upon launching an application, you can use user-prompted parameters specified in braces. It is also possible to specify a default value after a colon. If the parameter name contains the “file” or “path” string, there will be a button allowing you to choose a file or a directory respectively. As an example, the following line lets you quickly execute commands on the remote system with PsExec:psexec.exe \\%0 -u {User name:Admin} -p {Password} {Command} Launching this command will bring up a window where you can specify the arguments to pass to PsExec as shown below. Then the Network Scanner will launch PsExec with your input.Running PsExecSince the Network Scanner interprets braces as user-prompted parameters, you may have problems with passing a value containing braces, for example a GUID. In this case double the braces, e.g. myapp.exe{{12345678-ABCD-EFGH-1234-567890ABCDEF}}, so that this value is not treated as a user-prompted parameter.If you have got many applications to launch and some require common parameters such as a user name and password, you can define these as global variables. Click Advanced at the Applications tab to open the variables editor.A value can be either plain text or an environment variable, whose contents you can pass to applications.Vari ables editor in the Applications tab’s Advanced optionsFinally, the Browsing tab enables the Network Scanner to check whether a host is still on-line when you attempt to explore its folders, or establish a connection to that host. This greatly speeds up some operations, because an attempt to connect an off-line computer might temporarily freeze the Network Scanner until the connection fails. You can enable one or more methods to check the availability and set a timeout. Additionally, you can choose a live display mode, whether the Network Scanner must only find previously undiscovered nodes in background, or it must keep rescanning those already discovered, or it must do both. Don’t forget to turn the live display on in the main menu: View - Enable Live Display.Browsing tabIP range and automatic detection of network configurationThe SoftPerfect Network Scanner is able to detect your IP range automatically. Select the Options - IP Address - Detect Local IP Range menu item. In the following dialog, select an interface and the program will calculate the IP range of the network. If you are connected to the Internet and are behind a router or proxy server, use the Detect External IP Address command to determine your external IP address (requires Internet connection).Address detectionIn this example SoftPerfect Network Scanner has determined the range of IP addresses on the network. You are good to go!You can add more IP address ranges to scan with the button.The interpretation of your IP address range depends on the state ofthe button. If the button is up, the range is interpreted as a regular one. In this case, the program will sequentially scan all IP addresses within the range. If the button is down, the range is interpreted as a noncontiguous one. In this case, the program will only scan IP addresses whose octets fall in the range. For example, if you specify a range of 10.1.254.1 to 10.9.254.5, the following octets will be scanned:Octet 1: 10Octet 2: 1 – 9Octet 3: 254Octet 4: 1 – 5Namely, the program will scan:10.1.254.1, 10.1.254.2, 10.1.254.3, 10.1.254.4, 10.1.254.510.2.254.1, 10.2.254.2, 10.2.254.3, 10.2.254.4, 10.2.254.510.3.254.1, 10.3.254.2, 10.3.254.3, 10.3.254.4, 10.3.254.5...10.9.254.1, 10.9.254.2, 10.9.254.3, 10.9.254.4, 10.9.254.5This can be useful if you have got a large network and want to scan specific devices in each subnet.ScanningTo begin scanning click the Start Scanning button.Main window, scanning in progressScan resultsWhen scanning has finished, you will be able to browse the results, save them to a file, map a network drive, explore folders, etc.Main window, scan resultsLive displayIf you enable the Live Display option (choose View - Live Display from the main menu), the Network Scanner will constantly update scan results to reveal the latest changes in the network. If a host joins or leaves the network, it will be reflected in the main window. The live display log keeps track of computers joining and leaving the network. When the live display is active, choose View - Show Live Display Log from the main menu to access it.Live Display LogYou can specify what happens when a computer joins or leaves the network. If the Notify me... option is ticked, a balloon will popup in the notification area. In addition, you can choose one or more actions in the settings: play a sound, launch another application or save the event to a file. It is possible to pass the contents of any column to the application by specifying it in the square brackets as shown below. There is also a pseudo column [event] that you can refer to. It contains the event type, i.e. join or leave.Notifications PreferencesRogue DHCP server detectionThere is a built-in tool searching for active DHCP servers in a LAN segment. It does not require a scan as such. Instead it broadcasts a DHCP discovery message and collects replies from all available DHCP servers. These may be either normal DHCP servers, or rogue servers that are not under administrative control of the network staff. The latter may disrupt connectivity or may be used for network attacks.In order to see all active DHCP servers, choose Actions - DHCP Server Discovery from the main menu. In a few moments, you will see a list of all the servers along with offered DNS and gateway addresses.DHCP Server DiscoveryUPnP device detectionFurthermore, the application can discover Universal Plug and Play (UPnP) devices in your network such as media servers, routers and printers. Similarly to the DHCP discovery, it broadcasts a UPnP discovery message and collects replies from compatible devices. In order to see your UPnP devices,choose Actions - UPnP Device Discovery from the main menu. Clicka Device User Interface URL to access the device.UPnP Device DiscoveryWake-on-LAN and remote shutdownTo send a “magic” wake up packet to a remote computer (its MAC address must be known), choose Actions – Wake-On-LAN from the main menu. To shutdown or reboot a remote PC, choose Actions – Remote Shutdown. You can also suspend or hibernate a remote computer by choosing Actions –Remote Suspend/Hibernate.Remote shutdown options Remote suspend optionsIn order to shutdown or suspend a remote computer, several criteria must be met:•Administrative shares are enabled.•Administrator has got a non-empty password.•Simple file sharing is turned off.•Administrative shares IPC$ and ADMIN$ are accessible.Otherwise you may encounter either the Access is denied or the Network path not found error.WMI Query builder and scanningThe Network Scanner is capable of running WMI (Windows Management Instrumentation) queries against the hosts being scanned. In order to create a WMI query, choose Options - WMI from the main menu. Queries are written in a special language called WQL, similar to SQL.WMI QueriesThe New button allows you to easily construct simple WQL queries. It merely connects to your computer’s WMI subsystem and lets you pick a WMI class andparameter to be used in the query. When you have one or more WMI queries enabled, there will be additional columns shown in the scan results.WMI Query ResultsRemote file, registry and servicesFirstly, the application can connect to the remote registry of remote PCs running Windows, provided the remote registry service is started. Secondly, it can also connect to the their file system via administrative shares (C$, D$, E$, etc) and retrieve information about a specific file. Thirdly, it can connect to the remote service manager and query the status of one or more service. These features are useful mainly for network administrators maintaining large networks and can be accessed by choosing Options - RemoteRegistry, Options - Remote File or Options - Remote Services from the main menu.There are several predefined entries in the list, and you can easily add new items to retrieve data about hardware and software specific to your environment. The columns are as follows: Item Name is a name of theentry, Root represents one of the root registry hives, Registry key contains the path to a value of interest,Parameter Name is the value name to be retrieved, and Local Value merely shows the value in the local registry on your computer.On this screenshot three items are chosen to be retrieved from remote computers.Likewise, provided the administrative shares are enabled and accessible, you can pull out information about a specific file or folder on remote computers. For example, you want to find out the version of Internet Explorer, or when a log file changed, or how large a particular file is. To do so, enter the full name of a file and choose what property you would like to retrieve.On the following screenshot, the application is configured to access the Internet Explorer executable and display its version. Drive letters get substituted to the relevant administrative shared folders. For example, if you scan a range of 10.0.0.1 to 10.0.0.10 with these settings, the application will attempt to display the version information embedded in the files\\10.0.0.1\C$\Program Files\Internet Explorer\iexplore.exe,\\10.0.0.2\C$\Program Files\Internet Explorer\iexplore.exe, etc.It also possible to use wildcards, for example C:\Program Files\Internet Explorer\*.exe will process all executable files in C:\Program Files\Internet Explorer.Furthermore, you can have variable parts in path names, which is especially useful in a multilingual environment. If you have a few possible locations foryour file, list them in the brackets and separated by a vertical bar, as in the following example: C:\[Program Files|Program Files(x86)|Programme]\Internet Explorer\iexplore.exe. In this case, the Network Scanner will try three different paths C:\Program Files\InternetExplorer\iexplore.exe, C:\Program Files (x86)\InternetExplorer\iexplore.exe, C:\Programme\Internet Explorer\iexplore.exe and proceed with the first valid one.Remote fileLastly, you can retrieve information about the status and configuration of a service on remote computers. For example, if you want to make sure thatthe messenger service is up and running, turn the pre-defined item on, as shown below. The Network Scanner will then connect to each computer’s service manager and query the information requested.Remote servicesThere will be additional columns showing the information retrieved:Remote SNMP queryNetwork Scanner can look for machines that have an SNMP service running. You can specify a community (e.g. public or private) and a MIB OID number. The application automatically determines the type of data received and displays it in a readable form.All three versions of SNMP are supported. A default Windows SNMP implementation is used if you choose Windows built-in or you can use a specific SNMP version.Remote groups queryIf you need to find out what users participate in a particular group, or what groups a user belongs to, you can use this feature. The Network Scanner connects to each computer and retrieves local or global group membership:Remote XMLThere is an advanced feature to obtain device configuration and status. It allows you to send a HTTP request and parse a XML response. It works virtually for any device that has got a built-in web-server producing XML output. For example, there is a couple of default entries to retrieve HP IntegratedLights-Out properties:Tips and tricks•When clicking a bookmark in the Net work Scanner’s main menu, the current IP addresses will be replaced with those assigned to the selected bookmark. Hold the Ctrl key to append them instead. The same applies to choosing one or more IP addresses in the automatic IP address detection dialog.•It is possible to group bookmarks or custom applications that you define within the Network Scanner. Specify a vertical bar to create groups ofitems. For example, try naming your bookmarks as Network A | Subnet 1, Network A | Subnet 2 or naming your applications as FTP clients | FileZilla, FTP clients | Total Commander.•If it appears that all IP addresses are detected as active, set the Ping Method to ICMP only. This is happening because when you are scanning a different subnet, the default gateway may respond to every ARP request with its own MAC address rather than the target device’s address, thus misleading the Network Scanner.•You can change any column’s background colour and text colour for easy identification. In order to do so, right click a column’s header and choose Change Column View.•If you want to send Wake-On-LAN packets to a subnet specific broadcast address, change the default broadcast address to 0.0.0.255. Inthis case, when you are adding a computer to wake up from the main view, the actua l computer’s IP addresses will be merged with the default address.For example, when adding 192.168.1.10 and the default broadcastaddress being 0.0.0.255, a new WOL entry will have 192.168.1.255. Command line switchesYou can use the following switches as netscan.exe /switch1 /switch2 ... switchN./auto:filename.[txt|htm|xml|csv] runs scan with global settings and exports the results to a file, i.e. /auto:"c:\desktop\result.txt". Specify a corresponding extension to produce a file of that type. For example: netscan.exe /hide /auto:"c:\desktop\result.txt"netscan.exe /hide /auto:"c:\desktop\result.htm"netscan.exe /hide /auto:"c:\desktop\result.csv"In order to run a scan automatically without exporting to a file,specify /auto: with a colon, but without a file name. It is also possible to have the current date and time in the file name. Use any combination of the following tokens, each enclosed between two percent signs: y, yy, yyyy, m, mm, mmm, mmmm, d, dd, ddd, dddd, h, hh, n, nn, s, ss. For example,date_%yyyy%%mm%%dd%_time_%hh%%nn%.csv./live:filename.[txt|htm|xml|csv] is similar to the above switch. Unlike the /auto switch, the /live switch leaves the Network Scanner on and enables the live display. The specified file is updated after every complete round of the live scan, so the file always reflects latest changes./config:filename.xml loads the specified XML configuration file in the application./hide hides the main window (silent mode). If the network scanner was launched from a command prompt, it would output its progress in the command prompt window. Note that because the network scanner isn’t a true console application, the command processor and the application’s output may sometimes overlap. For better readability, use the following command to launch the application:start /wait netscan.exe /hide .../load:filename.xml loads the specified XML result set in the application. It is possible to rescan it with the /auto switch./cols:col1;col2;col3 applies to the /auto command and exports only the specified columns to a file. Otherwise all visible columns are exported. Example: /cols:"Host Name;MAC Address"./range:From-To Sets an IP address range for scanning, forexample: /range:192.168.0.1-192.168.10.254. In order to pass a noncontiguous IP address range, specify the circumflex sign, forexample /range:^10.64.1.1-10.64.5.10./append applies to the /auto command for text and CSV files. Appends the results to a file rather than overwrites it./wol:MAC sends a Wake-On-LAN magic packet to the specified MAC address and immediately exits. Example: /wol:AABBCCDDEEFF./wolfile:filename.txt allows you to specify a text file with MAC addresses to wake-up, e.g. /wolfile:c:\myfile.txt where the file is a plain text file containing one MAC address per line./wakeall sends a WOL packet to all computers configured in the WOL manager and immediately quits.The two switches below are mutually exclusive and have no effect if the application is launched from a USB stick or other removable device./ini forces the scanner to load and save its settings to an INI file instead of the registry by default (see a note below). This switch is obsolete./xml forces the scanner to load and save its settings to a XML file instead of the registry by default. However, when the Network Scanner is launched from a removable drive, such as a USB stick, it does not use the registry. Instead, it stores settings in a XML file, so you need not specify this switch to make it portable. Also, if you used the /ini or /xml switch once, you don’t need to specify it every time. After the first use, the application will create a configuration file on the disk and will use that file rather than the registry in the future./maxcols:N allows to display more columns for certain multi-column queries. The default value is 10, however you may want to increase it to see more than 10 columns of the same type at once./file:filename.txt loads the specified text file and feeds in IP addresses to be scanned. Another way to do this is to choose File - Import IP/Host Name List from the main menu. There must be one address or range per line in one of the following notations. Any mismatching lines in the file will be discarded.Product Page & Download。
UTC Q+程序工具包2007年6月修订版5.1目录I. UTC Q+ 程序工具包概览 (2)目的 (2)范围 (2)Q+ 步骤 (2)Q+ 等级 (2)“过关”问题 (3)信息部分 (3)Q+ 程序 (3)供应商评估 (5)失去认证供应商资格 (5)“ACE” (6)术语和条款 (6)问题/建议 (6)II. 自我评估 (6)自我评估指引 (6)调查表 (7)检查清单 (8)问卷 (9)自我评估表首页 (11)改进项目 (12)改进计划 (13)III.特殊合同的供应商认证 (14)Ⅳ. UTC Q+审核条款 (16)1.0 质量体系和管理责任 (17)2.0 资源管理 (25)3.0 客户需求及客户满意度 (33)4.0 产品实现 (35)5.0 检验与监控 (49)6.0 持续改进与消除浪费 (61)7.0 环境、健康与安全 (67)Ⅴ. 审查报告 (69)审查指引 (69)审查报告首页 (71)行政总结 (72)评级总结 (73)现场审查评估 (74)Ⅵ. 术语 (75)I. UTC Q+ 程序工具包概览目的联合技术公司(UTC)Q+程序旨在帮助供应商通过永无止境的持续改进过程,使其达到世界级质量目标。
本程序可识别出供应商质量体系的优势及劣势,从而找出需要改进的领域。
通过对其质量体系的了解并实施改进计划,供应商能够改进整体质量、可靠性以及供货产品全部部件的成本、对UTC提供和其他关键客户一样的服务本UTC Q+程序工具包包括供应商自我评估及详尽的UTC现场审核流程。
这些工具能够使UTC评估供应商的质量体系、过程控制能力的发展状态,从而建议并帮助供应商实施改进工作。
范围UTC要求Q+程序用于支持供应链管理活动。
Q+ 步骤UTC Q+程序根据质量体系和过程控制类别划分为7大模块。
这些类别共包括26项条款。
各条款通常遵循ISO9001:2001要求,并增加了特定要求以确保取得有效的过程控制及质量效果。
Command Reference (Help differences)TopologyCmd LISTTopologyCmd IMPORTTopologyCmd EXPORTCopyright(C) NEC Corporation 2017. All rights reserved.Contents1.Preface (3)2.Restrictions (3)2.1 About remote hosts (3)2.2 Setting reporting to multiple functions (3)mand Reference (Help differences) (5)3.1 TopologyCmd LIST (6)3.2 TopologyCmd IMPORT (7)3.3 TopologyCmd EXPORT (9)1. PrefaceThis document is a reference for the following commands which are not described in the standard Help.⏹TopologyCmd LIST⏹TopologyCmd IMPORT⏹TopologyCmd EXPORT2. Restrictions2.1 About remote hosts⏹TopologyCmd IMPORT and TopologyCmd EXPORT do not support the management information andauthentication information about remote hosts, which are setting items for remote monitoring agents.⏹Only the following monitoring functions support TopologyCmd IMPORT and TopologyCmd EXPORT inapplication monitoring.When a file that includes the settings for non-supported monitoring functions is imported using the TopologyCmd command, the existing settings for instances and servers are deleted.To retain the existing settings and import other monitoring settings, the settings for Application Navigator must be excluded from the import target. Delete the following line from the exported Topology.txt file to exclude them from the target.SERVICE005=41,"ApplicationMonitor",ApplicationMonitor.txt2.2 Setting reporting to multiple functionsIf the monitoring definition file for which reporting is set in two or more functions of message monitoring, service port monitoring, and performance monitoring among definitions for one host is collectively imported with the TopologyCmd command, an incorrect action report definition could apply. Import may fail depending on the definition.The following tool can be used to check whether two or more reports are set to the monitoring definition file.[Tool]\tool\SysMgrG\TopologyCmd\CheckImportFileCheckImportFileTool.batbom.txt[How to use]1. Store the tool (two files) in the same folder as the import file.(Move the import file to Windows if your OS is not Windows.)2. Double-click and execute CheckImportFileTool.bat.3. Check the result at the prompt.4. Press some key to exit the tool.5. Divide the import file in the topology view seeing the "TopologyCmd - Batch Registration and Setting DetailConfirmation of Monitoring Definitions - File Specifications" (TopologyCmdSgImpExp_File.pdf) file.Divide the monitoring function in the [RELATED_SERVICE] section.For details, see "3.2.2 Definition part" in "TopologyCmd - Batch Registration and Setting Detail Confirmation of Monitoring Definitions - File Specifications" (TopologyCmdSgImpExp_File.pdf).[Notes]∙This tool only operates on Windows.∙This tool cannot be executed on a remote disk such as network drive.∙Copy the import file and the tool to the local disk before use.∙This tool cannot be used if the import file is renamed.∙In such a case, edit the file name in CheckImportFileTool.bat as well.The target file name is as follows:・Performance.txt・MessageView.txt・PortMonitor.txt∙Even if the import file contains lines commented out with # or other sign, it is indicated that division is required.Delete commented out definitions before executing the tool.3. Command Reference (Help differences)⏹TopologyCmd commandThis command displays a list of hosts in the topology view, applies the monitoring definitions from a file, and outputs the monitoring definitions to a file.[Related items]TopologyCmd LISTTopologyCmd IMPORTTopologyCmd EXPORT[Note]To execute these commands on the UNIX (HP-UX, Linux) manager, the following preparations are required.⏹Library path settingAdd the following to the environment variable LD_LIBRARY_PATH (HP-UX, Linux).<Installation Directory>/Manager/bin⏹Locale settingSpecify UTF-8 for the locale of the execution environment.3.1 TopologyCmd LISTThis command outputs a list of the host names and OS types of the currently monitored agents.⏹This command exists on the machine where the manager is installed.⏹For the UNIX manager (HP-UX, Linux), execute it using an account that has superuser authority.[Path]⏹Windows manager:<Installation Directory>\Manager\bin\TopologyCmd.exe⏹UNIX manager (HP-UX, Linux):<Installation Directory>/Manager/bin/TopologyCmd.exe[Specification method]TopologyCmd.exe LIST[Description]This command outputs a list of the host names and OS types of the currently monitored agents.If the argument is omitted or invalid, Help is displayed.[Argument]Not specified[Return values]0 is returned on success.[Note]⏹The host names of all agents are displayed regardless of the operation status (running/stopped) of theagents.⏹The agents in the [Unregistered Host] group are not displayed.3.2 TopologyCmd IMPORTThis command applies the monitoring definitions described in a file to an agent.⏹This command exists on the machine where the manager is installed.⏹For the UNIX manager (HP-UX, Linux), execute it using an account that has superuser authority.[Path]⏹Windows manager:<Installation Directory>\Manager\bin\TopologyCmd.exe⏹UNIX manager (HP-UX, Linux):<Installation Directory>/Manager/bin/TopologyCmd.exe[Specification method]TopologyCmd.exe IMPORT <HostName> <Import Directory>[Description]Apply the monitoring definitions described in a file in the directory specified by the argument <Import Directory> to the agent specified by the argument <HostName>.If the argument is omitted or is invalid, Help is displayed. The commands are not displayed in the Help.[Return values]0 is returned on success.[Note]⏹For notes on the monitoring definition file, see "2.2 Setting reporting to multiple functions".⏹It is recommended to perform a backup before importing.For the backup command, see “Backup and Restore Functions” in “Command Reference” of the Help.⏹Import cannot be performed when a console that is running in definition mode exists.⏹ A remote monitoring agent cannot be specified.⏹The command fails when the specified host name does not exist.The host names that can be specified are the host names displayed by TopologyCmd LIST.⏹If a host name in the [Unregistered Host] group is specified, the command succeeds but its operation is notguaranteed.Do not specify a host name in the [Unregistered Host] group.⏹The command fails when the specified directory does not exist.⏹The application monitoring function with the host setting disabled is not imported.⏹For details abo ut monitoring definitions described in a file, see separate volume of “TopologyCmd BatchRegistration and Setting Detail Confirmation of Monitoring Definitions File Specifications”.⏹Added definitions for the syslog monitoring and event log monitoring become valid after the agent isrestarted.⏹If the import is performed when the agent is not connected to the manager, the settings become valid afterthe agent is connected.⏹Do not edit the import file and change definitions during import processing.[Related item]TopologyCmd EXPORT3.3 TopologyCmd EXPORTThis command outputs the monitoring definitions of the agent to a file.⏹This command exists on the machine where the manager is installed.⏹For the UNIX manager (HP-UX, Linux), execute it using an account that has superuser authority.[Path]⏹Windows manager:<Installation Directory>\Manager\bin\TopologyCmd.exe⏹UNIX manager (HP-UX, Linux):<Installation Directory>/Manager/bin/TopologyCmd.exe[Specification method]TopologyCmd.exe EXPORT <HostName> <Export Directory>[Description]Output the monitoring definitions of the agent specified by the argument <HostName> to a file in the directory specified by the argument <Export Directory>.If the argument is omitted or is invalid, Help is displayed. This command is not displayed in the Help.[Return values]0 is returned on success.[Note]⏹Export cannot be performed when a console that is running in definition mode exists.⏹ A remote monitoring agent cannot be specified.⏹The command fails when the specified host name does not exist.The host names that can be specified are the host names displayed by TopologyCmd LIST.⏹The command fails when the specified directory does not exist. The root directory cannot be specified.⏹The application monitoring function with the host setting disabled is not exported.⏹For details about monitoring definitions output to a file, see separate volume of “TopologyCmd BatchRegistration and Setting Detail Confirmation of Monitoring Definitions File Specifications”.⏹The following message may be output during command execution. However, this does not incur a problemprovided the command execution is successful.Unsupported service.(ServiceID [function number])[Function name] : Host is not found.[Function name] : Host not found.[Related item]TopologyCmd IMPORT10。
QTLNetwork-2.0 User Manual ―1―
QTLNetwork-2.0 User Manual Software for Mapping QTL with Epistatic and QE Interaction Effects Jian Yang, Chengcheng Hu, Xiuzi Ye and Jun Zhu
Copyright 2005-2006 © Zhejiang University, China
This software can be freely redistributed with non-commercial purpose and under the condition of no changes to the software and its related documents. No warranty of any sort is provided for use of the software. QTLNetwork-2.0 User Manual ―2―
Contents QTLNetwork-2.0 User Guide............................................................1 1. Introduction to QTLNetwork...................................................3 2. Installing QTLNetwork............................................................3 3. Running QTLNetwork.............................................................6 4. Starting with QTLNetwork......................................................7 4.1. Data Format.....................................................................7 4.2. Create new project with map and data files.............13
4.3. Open the project with map, data and result files...........21 5. Interactive Visualization operations.......................................22 6. Config setting in the mapping computation...........................23 6.1. General page..................................................................24 6.2. Genome scan configuration page..................................25 6.3. Significance level configuration page...........................25 6.4. Output configuration page.............................................26 7. Graph setting..........................................................................26 8. Save pictures and reports.......................................................27 8.1. Save pictures.................................................................27 8.2. Save and understand the text reports.............................27 QTLNetwork-2.0 User Manual
―3―
1. Introduction to QTLNetwork QTLNetwork-2.0 is user-friendly computer software for mapping quantitative trait loci (QTL) with epistatic effects and QTL by environment (QE) interaction effects in DH, RI, BC1, BC2, F2, IF2 and BxFy populations, and for graphical presentation of QTL mapping results. The software is developed based on the MCIM (mixed-model based composite interval mapping) method, and programmed by C++ programming language under Microsoft Visual C++ 6.0 environment. The GUI (Graphic User Interface) of QTLNetwork is developed by MFC (Microsoft Foundation Class) and the graphic visualization is done by VTK (Visualization Tookit). This software works with Microsoft Windows operating systems, including Windows 95/98, NT, 2000, XP, 2003server. A new version of QTLNetwork is under developing, and its functions will be extended to include marker-assisted virtual breeding. Considering that most users are using Microsoft Windows system, we will only describe the application of GUI version of QTLNetwork in the following section. 2 Installing QTLNetwork The software is freely available from the URL http://ibi.zju.edu.cn/software/qtlnetwork/. Download the QTLNetwork setup package QTLNetwork-2.0-Setup.exe , and double click it. The setup welcome screen displays as following.
Click the button of next, and enter to the screen of License agreement. QTLNetwork-2.0 User Manual
―4―
Read the license, and click the radio button of agreement to enter to User Info Screen.
Type names of you and your company, then click the next button to enter to Software Info Screen.
Read the information, and then click the next button to choose the installation folder. QTLNetwork-2.0 User Manual
―5―
Click the button of “Change…” to browse file directories to install to your purpose folder. Click the next button to the Shortcut Folder Screen.
Choose your purpose Shortcut Folder here, and then click the next button to the screen of final check.
Please check the setup information, and then click the next button to start the installation.