The Network Driver Interface Specification (NDIS) is an application programming interface (API) for network interface controllers (NICs).
- StarTech.com 1 Port USB Wireless N Network Print Server with 10/100 Mbps Ethernet Port - 802.11 b/g/n - Wireless USB 2.0 Print Server. Network Connection: USB 2.0 RJ45 (10/100 Ethernet) Wireless Ethernet; Network Speed: 10/100Mbps; Printer Connection: 1 - USB A (4 pin) Female 1 - RJ-45 Female 1 - Wireless N (IEEE 802.11n).
- Your enterprise font management solution! Whether it's teams that need to have shared access to fonts globally or a company that needs to rein in font compliance and decrease inefficient font spending, Universal Type Server is a comprehensive enterprise font management solution, chosen by respected organizations like UNESCO, The Chronicle, and mcgarrybowen.
Specification[edit]
It was jointly developed by Microsoft and 3Com Corporation and is mostly used in Microsoft Windows. However, the open-sourceNDISwrapper and Project Evildriver wrapper projects allow many NDIS-compliant NICs to be used with Linux, FreeBSD and NetBSD. magnussoft ZETA, a derivative of BeOS, supports a number of NDIS drivers.
Supports JDK11, JDK10, JDK9, JDK8 and compliant to JDBC 4.3 and JDBC 4.2 by JDBC driver (ojdbc10.jar (19c only) and ojdbc8.jar) and Universal Connection Pool (ucp.jar) Connection. Universal Type Server can easily integrate via auto-activation plug-ins for professional creative software. Users can find the right font for every task seamlessly with Universal Type Server's Font Sense feature. Web-based, Universal Type Server is easy to setup and maintain by IT professionals. The Enterprise Font Management Solution For Everybody Whether it's teams that need to have shared access to fonts globally or a company that needs to improve font compliance and spending, Universal Type Server (UTS) is a comprehensive enterprise font management solution, chosen by respected organizations like SANDOW, The Chronicle of Higher Education, and mcgarrybowen.
The NDIS forms the logical link control (LLC) sublayer, which is the upper sublayer of the OSIdata link layer (layer 2). Therefore, the NDIS acts as the interface between the media access control (MAC) sublayer, which is the lower sublayer of the data link layer, and the network layer (layer 3).
The NDIS is a library of functions often referred to as a 'wrapper' that hides the underlying complexity of the NIC hardware and serves as a standard interface for level 3 network protocol drivers and hardware level MAC drivers.
The NDIS versions supported by various Windows versions are as follows[1]:
- NDIS 2.0: MS-DOS, Windows for Workgroups 3.1, OS/2
- NDIS 3.0: Windows for Workgroups 3.11
- NDIS 3.1: Windows 95
- NDIS 4.0: Windows 95 OSR2, NT 4.0, Windows CE 3.0
- NDIS 4.1: Windows 98
- NDIS 5.0: Windows 98 SE, Me, 2000
- NDIS 5.1: Windows XP, Server 2003, Windows CE 4.x, 5.0, 6.0[2]
- NDIS 5.2: Windows Server 2003 SP2
- NDIS 6.0: Windows Vista
- NDIS 6.1: Windows Vista SP1, Server 2008, Windows Embedded Compact 7,[3] Windows Embedded Compact 2013
- NDIS 6.20: Windows 7, Server 2008 R2
- NDIS 6.30: Windows 8, Windows Server 2012
- NDIS 6.40: Windows 8.1, Windows Server 2012 R2
- NDIS 6.50: Windows 10, version 1507[4]
- NDIS 6.60: Windows Server 2016 and Windows 10, version 1607[4]
- NDIS 6.70: Windows 10, version 1703[4]
- NDIS 6.80: Windows 10, version 1709[4]
- NDIS 6.81: Windows 10, version 1803[4]
- NDIS 6.82: Windows 10, version 1809[4]
- NDIS 6.83: Windows 10, version 1903[4]
The traffic accepted by the NIC is controlled by an NDIS miniport Driver while various protocols, such as TCP/IP, are implemented by NDIS Protocol Drivers. A single miniport may be associated with one or more protocols. This means that traffic coming into the miniport may be received in parallel by several protocol drivers. For example, Winpcap adds a second protocol driver on the selected miniport in order to capture incoming packets. Furthermore, it is possible to simulate several virtual NICs by implementing virtual miniport drivers that send and receive traffic from a single physical NIC. One example of virtual miniport driver usage is to add virtual NICs, each with a different Virtual LAN. Because implementations cannot assume that other drivers received the same buffers, one must treat the incoming buffers as read only and a driver that changes the packet content must allocate its own buffers.
A miniport is a type of hardware driver, part of the Windows Driver Model. These are USB, Audio, SCSI and network card adapters. They should usually be source and binary compatible between Windows 98 and Windows 2000 and are hardware specific but control access to the hardware through a specific bus class driver.[5]
Another driver type is NDIS Intermediate Driver. Intermediate drivers sit in-between the MAC and IP layers and can control all traffic being accepted by the NIC. In practice, intermediate drivers implement both miniport and protocol interfaces. The miniport driver and protocol driver actually communicate with the corresponding miniport and protocol interfaces that reside in the intermediate driver. This design enables adding several chained intermediate drivers between the miniport and protocol drivers. Therefore, driver vendors cannot assume that the interface that they send traffic to is implemented by the last driver in the chain. In order to write applications using NDIS, one can use samples that accompany Microsoft's Windows Driver Kit (WDK). The 'PassThru' sample is a good starting point for intermediate drivers as it implements all the necessary details required in this driver type, but just passes the traffic through to the next driver in the chain.
See also[edit]
- Open. docs.microsoft.com. Retrieved 2020-03-24.
- ^Network Drivers (Windows Embedded CE 6.0)
- ^What's New (Windows Embedded Compact 7)
- ^ abcdefg'Overview of NDIS versions'. Microsoft. Retrieved 2019-06-28.
- ^'Introduction to the Windows Driver Foundation'. Microsoft Developer Network. 2006-10-13. Retrieved 2010-12-06.
The device class-specific driver models are typically structured as a port driver written by Microsoft paired with a miniport driver written by an independent hardware vendor. The port driver does much of the work required for the device class, and the miniport driver supports device-specific characteristics.
External links[edit]
This chapter describes how to use the Oracle Universal Installer from the command line.
This chapter includes the following sections:
2.1 Understanding Silent Installation
Silent installation eliminates the need to monitor your product installation because no graphical output is displayed and no input by the user is required.
Silent installation of your Oracle Fusion Middleware product is accomplished by using the -silent
flag on the command line when you start the installer. In most cases, you will need to supply the location and name of a file containing certain variable and parameter values (for example, installation location). These are the values that would be asked for during a typical installation using the graphical user interface.
For Oracle Fusion Middleware products, this file is typically called a response file. For more information, see Section 2.2.
Note:
For UNIX users, if this is a first time installation of any Oracle product, you must create the oraInst.loc
file before starting. Refer to Section 2.3.1 for more information.
Following installation of your product, you need to run the root.sh
script as the root
user. The root.sh
script detects settings of environment variables and enables you to enter the full path of the local bin
directory.
Note:
For Windows users, if this is a first time installation of any Oracle product, you must create the registry keys before starting. Registry key creation is described in Section 2.3.2.
2.2 Understanding Response Files
Before doing a silent installation, you must provide information specific to your installation in a response file (for example, the installation directory). The installer will fail if you attempt an installation using a response file that is not configured correctly. Response files are text files that you can create or edit in a text editor.
2.2.1 Creating a Response File
Oracle recommends creating a response file in the following manner:
Run your product's graphical installer or deinstaller, as described in your product installation guide.
For product installation, on the Installation Summary screen, click Save Response File to save your installation parameters to a response file.
For product deinstallation, on the Deinstallation Summary screen, click Save Response File to save your deinstallation parameters to a response file.
You will be prompted for a name and location where you want to create this response file. After it is created, you can use it exactly as-is to replicate the installation or deinstallation on other systems, or modify it as needed.
2.2.2 Sample Response Files
To see some sample response files that can be used for silent installation, see Appendix C.
The parameters that can be included in the response files are described in Section 2.2.3.
2.2.3 Editing Response File Parameters
This section describes the various parameters that can be included in a valid response file for the Oracle Universal Installer.
See Appendix C for some sample response files.
Table 2-1 Response File Parameters
Corresponding Screen | Parameter | Description |
---|---|---|
| Location of the Oracle home directory. | |
| Provide your My Oracle Support user name and password if you want to receive the latest product information and security updates. | |
| Set this parameter to | |
| If you specify values for | |
| Provide the proxy server information if you use a proxy server in your environment. | |
| The URL of the Oracle Configuration Manager Repeater. The format is: or | |
| Specify the type of install you want to perform. This value will differ depending on your product distribution. For the WebLogic Server and Coherence distribution, the following install types are valid:
For the Fusion Middleware Infrastructure distribution, the following install types are valid:
For the Oracle HTTP Server distribution, the following install types are valid:
| |
Smartbackup 4 1 1 – daily backups with spotlight integration. | Specify the distribution you want to remove from the Oracle home. This parameter is required if more than one distribution exists in the Oracle home from which the deinstaller program is started:
|
2.2.4 Securing Your Response Files for Silent Installation
Your response files contain certain passwords required by the installer. To minimize security issues regarding these passwords in the response file, follow these guidelines:
Set the permissions on the response files so that they are readable only by the operating system user who will be performing the silent installation.
If possible, remove the response files from the system after the silent installation is completed.
2.3 Performing Pre-Silent Installation Tasks
This section covers the pre-installation tasks that may be required before you are able to perform a silent installation.
The following topics are covered:
2.3.1 UNIX Users: Creating the oraInst.loc
File
The Oracle inventory directory is used by the installer to keep track of all Oracle products installed on the computer. The inventory directory is stored in a file called oraInst.loc
. If this file does not already exist on your system, you must create it before starting a silent installation. This file is used by the installer.
Log in as the
root
user.Using a text editor such as vi or emacs, create the
oraInst.loc
file in the directory of your choice. The contents of the file consist of the following two lines:Replace
oui_inventory_directory
with the full path to the directory where you want the installer to create the inventory directory. Then, replaceoui_install_group
with the name of the group whose members have write permissions to this directory.Exit from the
root
user.
2.3.2 Windows Users: Creating the Registry Key
If you have not installed any Oracle products on your computer, then you need to create the following Registry key and value:
Replace Inventory_Directory
with the full path to your installer files. For example:
2.4 Running the Oracle Universal Installer in Silent Mode
The full syntax for running the product installer from the command line is shown below:
To run the product installer in silent mode, use -silent
mode and specify a response file:
Table 2-2 lists the valid command line parameters for silent installation.
Table 2-2 Installer Command Line Parameters
Parameter | Description | Version |
---|---|---|
Installation Modes - Only One Mode Can be Specified | ||
| Launches the installer in GUI mode. This is the default mode and is used if no mode is specified on the command line. | 11g and 12c |
| Install in silent mode. The installer must be passed either a response file or command line variable value pairs. | 11g and 12c |
Installation Options | ||
| Displays the usage parameters for the NOTE: the | 11g and 12c |
| Pointer to the inventory location file. Replace file with the full path and name of the | 11g and 12c |
| Pointer to the response file. Replace file with the full path and name of the response file. See Section 2.2 for information about creating the response files. | 11g and 12c |
| Specify the level of logging performed by the installer; all messages with a lower priority than the specified level will be recorded. Valid levels are:
| 11g and 12c |
| Specify the name of the log file. | 12c only |
| Obtain debug information from the installer. | 11g and 12c |
| Allow the silent installation to proceed in a non-empty directory. | 11g and 12c |
| Log debugging information pertaining to disk usage. | 11g and 12c |
| Log debugging information pertaining to memory usage. | 11g and 12c |
| Log debugging information pertaining to time usage. This command causes the | 11g and 12c |
| Windows only - the installer will wait for completion instead of spawning the Java engine and exiting. NOTE: this option only works if the command is invoked from a script; for example, if a | 11g and 12c |
| Messages will not be displayed to the console window. | 11g and 12c |
| Ignore the results of the system prerequisite checks and continue with the installation. | 11g and 12c |
| Execute the system prerequisite checks only, then exit. | 11g and 12c |
| The The | 11g and 12c |
| Disables all validation checking performed by the installer. | 11g and 12c |
| For the GUI install, several screens have information or default values pre-populated. Specifying this option disables this behavior so that no information or values are pre-populated. | 11g and 12c |
| Disables all checking for updates. | 12c only |
| Specify the directory where the latest updates should be downloaded. This parameter can be used in disconnected mode. | 12c only |
Command Line Variables | ||
Installer Variables | Installer variables are specified using On a Windows operating system: | 11g and 12c |
Session Variables | Session variables are specified using | 11g and 12c |
Component Variables | Component variables are specified using | 11g and 12c |
2.4.1 Sample Silent Install Commands
If this is the first time you are installing on your system (meaning there is no pre-existing Oracle Inventory location), use the following command to perform a silent installation:
Below is a full example of this command, where the response file was created in the /home/exampleuser/response
directory:
If you have already installed an Oracle product on your system and do not need to specify an inventory location, then you can use a command similar to the following:
Below is a full example of this command, where the response file was created in the /home/exampleuser/response
directory:
2.4.2 Sample Silent Install Output
Below is a sample output from a silent Oracle WebLogic Server and Coherence installation.
2.5 Running the Oracle Universal Installer for Silent Deinstallation
To deinstall your Oracle Fusion Middleware product in silent mode, use the -silent
mode from the command line. The full syntax for running the deinstaller from the command line is shown below:
Table 2-3 lists the valid command line parameters for silent installation.
Table 2-3 Deinstaller Command Line Parameters
Parameter | Description | Version |
---|---|---|
Deinstallation Options | ||
| Displays the usage parameters for the NOTE: the | 11g and 12c |
| Pointer to the inventory location file. Replace file with the full path and name of the | 11g and 12c |
| Pointer to the response file. Replace file with the full path and name of the response file. See Section 2.2 for information about creating the response files. | 11g and 12c |
| Specify the level of logging performed by the installer; all messages with a lower priority than the specified level will be recorded. Valid levels are:
| 11g and 12c |
| Specify the name of the log file. | 12c only |
| Obtain debug information from the installer. | 11g and 12c |
| Allow the silent installation to proceed in a non-empty directory. | 11g and 12c |
| Log debugging information pertaining to disk usage. | 11g and 12c |
| Log debugging information pertaining to memory usage. | 11g and 12c |
| Log debugging information pertaining to time usage. This command causes the | 11g and 12c |
| Windows only - the installer will wait for completion instead of spawning the Java engine and exiting. NOTE: this option only works if the command is invoked from a script; for example, if a | 11g and 12c |
| Messages will not be displayed to the console window. | 11g and 12c |
| Ignore the results of the system prerequisite checks and continue with the installation. | 11g and 12c |
| Execute the system prerequisite checks only, then exit. | 11g and 12c |
| The The | 11g and 12c |
| Disables all validation checking performed by the installer. | 11g and 12c |
| For the GUI install, several screens have information or default values pre-populated. Specifying this option disables this behavior so that no information or values are pre-populated. | 11g and 12c |
| Disables all checking for updates. | 12c only |
| Specify the directory where the latest updates should be downloaded. This parameter can be used in disconnected mode. | 12c only |
Command Line Variables | ||
Installer Variables | Installer variables are specified using On a Windows operating system: | 11g and 12c |
Session Variables | Session variables are specified using | 11g and 12c |
Component Variables | Component variables are specified using | 11g and 12c |
Universal Type Server
Universal Type Server 4 2 0t
2.5.1 Sample Silent Deinstall Commands
Below is an example silent deinstall command:
Note that when you run the deinstallation program in silent mode, no messages are displayed indicating that the deinstallation is in progress or has completed successfully, even if errors are encountered.
You can include the -logFile
and -logLevel
parameters to create a verbose installation log. See Table 2-3 for more details about these parameters.
Below is an example silent deinstall command specifying FINE
as the logging level. Singe -logFile is not specified, the deinstaller will use the default log file location (see Appendix E).
2.5.2 Sample Silent Deinstall Output
Below is sample output from a silent Oracle WebLogic Server and Coherence deinstallation.