09-26-2007
So
(a) you have all the files
(b) the file byte lengths are correct.
I would count that as success.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
first off, i am new to unix so please bear with me. i was reading somewhere that if your i-nodes get critical that it can slow your network down. what are i-nodes and when do they become a critical number? this is what mine states:
/ (/dev/root ): 777058 blocks 569290 i-nodes... (4 Replies)
Discussion started by: djatwork
4 Replies
2. UNIX for Dummies Questions & Answers
how do you list all the nodes in unix
:confused: (3 Replies)
Discussion started by: kamisi
3 Replies
3. UNIX for Advanced & Expert Users
Does anyone know something about this? I have no idea what it means and how to do it. but if anyone can give me and explanation and also point me to a website, i'd really appreciate it (5 Replies)
Discussion started by: TRUEST
5 Replies
4. Shell Programming and Scripting
Hi,
I have created an empty file and a symbolic link to a file. But when I issue the following commands, I am getting the output 2.
stat -c "%s" linkfile
du -hb linkfile
Why this is happening? (4 Replies)
Discussion started by: royalibrahim
4 Replies
5. High Performance Computing
I am new to cluster commands. But I have tried utilizing: -pe, but I do not know my parallel computing environment. We are running SGE, is there a simpler command to request more nodes?
also: qsub -N auto -M name@email.com -m abe auto.sh
does not email me at all.
Help would be appreciated (0 Replies)
Discussion started by: theawknewbie
0 Replies
6. High Performance Computing
Hi,
I am new in system administration. I observe that some nodes in our cluster
are not considered as active by showq:
22 active jobs 217 of 257 processors in use by local jobs (84.44%)
15 of 17 nodes active (88.24%)
but then I try to log into... (1 Reply)
Discussion started by: armando_2011
1 Replies
7. UNIX for Dummies Questions & Answers
Hi
i have folder of 26 GB on server A and want to copy to server B .i used the below commands to check file size and scp copy
du -h /folder : its shows 26G on server A
from server B:
scp -r user@serverA:/folder/* ./copying got initiated and i am checking the file size on server B... (7 Replies)
Discussion started by: rakeshkumar
7 Replies
8. UNIX for Dummies Questions & Answers
Hi all. I have two nodes taken different places. They are connected together on a network. So, i have a service, it works on one of nodes and when the node is unavailable the service should will be launched on other node.
Solution: rhel cluster, keepalive, hearbeat...may be Carp
but what if... (2 Replies)
Discussion started by: Flomaster
2 Replies
9. Shell Programming and Scripting
Hi all,
I have a list of node pairs separated with a comma and also, associated with their respective values. For example:
b0015,b1224 1.1
b0015,b2576 1.4
b0015,b3162 2.5
b0528,b1086 1.7
b0528,b1269 5.4
b0528,b3602 2.1
b0948,b2581 3.2
b1224,b0015 1.1... (8 Replies)
Discussion started by: AshwaniSharma09
8 Replies
10. UNIX for Beginners Questions & Answers
Hi folks.
I've been a developer for far too many years, but know very little of unix. I have setup a very inexpensive cluster of 6 raspberry pi nodes so I can play around with multi node programming. This is only for fun, but I want to learn properly, else what's the point?!
Setup can be a... (4 Replies)
Discussion started by: MuntyScrunt
4 Replies
sum(1) General Commands Manual sum(1)
NAME
sum - print checksum and block or byte count of file(s)
SYNOPSIS
[file ...]
Remarks
is obsolescent and should not be used in new applications that are intended to be portable between systems. Use instead (see cksum(1)).
DESCRIPTION
calculates and prints to standard output a checksum for each named file, and also prints the size of the file in 512 byte blocks, rounded
up.
The default algorithm is a 16-bit sum of the bytes in which overflow is ignored. Alternate algorithms can be selected with the and
options.
Standard input is used if no file names are given.
is typically used to verify data integrity when copying files between systems.
Options
recognizes the following options:
Use an alternate algorithm in which the 16-bit sum is right rotated
with each byte in computing the checksum.
Use the 32-bit cyclical redundancy check (CRC) algorithm used by
RETURN VALUE
returns the following values upon completion:
All files were processed successfully.
One or more files could not be read or some other error occurred.
If an inaccessible file is encountered, continues processing any remaining files, but the final exit status is affected.
DIAGNOSTICS
Read error conditions are indistinguishable from end of file on most devices; check the block or byte count.
WARNINGS
This command is likely to be withdrawn from X/Open standards. Applications using this command might not be portable to other vendors'
platforms. The usage of cksum(1) is recommended.
SEE ALSO
cksum(1), wc(1).
STANDARDS CONFORMANCE
sum(1)