12d - AP-L1-SL - Directory Structure & UNIX Commands
12d - AP-L1-SL - Directory Structure & UNIX Commands
Commands
For Training Purposes Only
ASML Confidential
/ Slide 1 For training purposes only AP-L1-SL-1v0
1
COPYRIGHT
© 2003, ASML Holding N.V. (or affiliate companies). All rights reserved.
This documentation is subject to change without notice and contains confidential and proprietary
information of ASML Holding N.V. or affiliate companies ("ASML").
This documentation is for the intended purpose only and for the use of the intended recipient only.
Please retain control of this documentation. It is not to be forwarded or distributed. Any
unauthorized review, copying, use, disclosure or distribution is strictly prohibited. The material
herein is provided ”as-is" and ASML makes no warranty of any kind with regard to this material.
ASML shall not be liable for errors and omissions contained herein.
Trademarks
ASML, ASM Lithography, TWINSCAN, MASKRIGGER, MASKWEAVER, LITHOCRUISER,
ATHENA, QUASAR, IRIS, MICRALIGN, PAS 5500, PAS 5000, 3DAlign, 2DStitching, 3DMetrology,
and the ASML logo are trademarks of ASML Holding N.V. or affiliate companies. The trademarks
may be used either alone or in combination with a further product designation.
Nothing in this documentation is intended to make representations with regard to whether any
trademark is registered or to suggest that any sign other than those mentioned should not be
considered to be a trademark of ASML or of any third party.
ASML Confidential
/ Slide 2 For training purposes only
2
Contents
l General UNIX knowledge
l Terminal window
l Command line interface
l User security
l Boot & Shutdown
l File system commands
l Displaying text files
l Shell features
l TWINSCAN directory structure
l File security
l Sending files
l Zipping and unzipping files
l Working remotely on a system
ASML Confidential
/ Slide 3 For training purposes only
3
Goals
ASML Confidential
/ Slide 4 For training purposes only
4
UNIX architecture
Hardware
Kernel: sun4c,sun4m,
sun4u,...
Applications: TWINSCAN
ASML Confidential
/ Slide 5 For training purposes only
An operating system is the program that controls all the other parts of a computer system - both the
hardware and the software. Most importantly, it allows you to make use of the facilities provided by
the system. Every computer has an operating system.
The UNIX operating system is build in layers:
Kernel
The kernel is at the core of each UNIX system and is loaded in whenever the system is started up -
referred to as a ‘boot’ of the system.
It manages the entire resources of the system. You do not need to know anything about the kernel in
order to use a UNIX system. This information is provided for your information only.
There are different kernels for different systems: sun4u is for the Ultra-10, sun4m is for the Sparc5
and sun4c for the IPX.
Shell
Once you've logged in, you're working with a program called a shell. The shell interprets the
commands you enter, runs the program you've asked for, and generally coordinates what happens
between you and the UNIX operating system. Common shells include Bourne, Korn, and C shell.
Applications
This is your TWINSCAN operator user interface where you actually enter your commands where the
shell is passing those commands to the kernel operating system.
5
Using the terminal Window (1)
ASML Confidential
/ Slide 6 For training purposes only
6
Using the terminal Window (2)
ASML Confidential
/ Slide 7 For training purposes only
7
What is a command line interface?
ASML Confidential
/ Slide 8 For training purposes only
Discuss how the line can be edited using the arrow keys and the backspace and
delete keys before the Enter key is pressed.
Use the ‘clear’ command to clear the screen.
8
UNIX commands (1)
ASML Confidential
/ Slide 9 For training purposes only
9
UNIX commands (2)
boot eject
filemgr snapshot
textedit sysshutdown
ASML Confidential
/ Slide 10 For training purposes only
Point out the differences between the valid and invalid names.
10
UNIX users
ASML Confidential
/ Slide 11 For training purposes only
Before you can start using UNIX, your system administrator has to set up a UNIX
account for you. Think of this account as your office - it's your place in the UNIX
environment. So in addition to knowing your account name, you may also need to
know the hostname (name) of the TWINSCAN system that has your account.
Each user communicates with the TWINSCAN system from a terminal. To get into
the UNIX environment, you first connect to the system. (You may have a terminal
that's already connected to your TWINSCAN system.) Next, you start a session by
logging in to your UNIX account. Logging in does two things: it identifies which user
is in a session, and it tells the system that you are ready to start working. When
you've finished working, you log out - and, if necessary, disconnect from the UNIX
computer.
The concept of a user is crucial to protecting the system from non-authorized
persons.
The stability of the system is based in the concept that no user can damage the
critical files or the file structure.
The ‘root’ is all powerful and with certain commands is capable of damaging the
system and even erasing the whole harddrive. The password for the root is usually
kept secret and not made available to everyone. is used to perform administration
actions that are not allowed by the normal users. Such as installing patches,
defining network connection, etc… 11
User security
ASML Confidential
/ Slide 12 For training purposes only
Discuss the difference between a UNIX user and the PAS user.
Discuss the use of the password and what makes a good password. Note, that
ASML makes the ‘atl.####’ user able to logon without a password. This is justified
because the system is in a ‘protected environment’ (the fab) and this user does not
have access or control of critical files. These rights are reserved to the ‘root’ user.
A good password is kept secret, not written down, and consists of random letters
(upper and lower case) and digits.
12
Software Structure on a TWINSCAN tool
ASML Confidential
/ Slide 13 For training purposes only
atl.#### (####=machine number) is the normal user for running the TWINSCAN
application.
13
System startup and shutdown
l system_stop -
see picture
l sysshutdown: Properly stops the TWINSCAN software and brings the system
down to the OK prompt. Use this command after system_stop.
ASML Confidential
/ Slide 14 For training purposes only
Sysshutdown is written by ASML and allows the user atl . xxxx to shutdown the
system without harming the FAST/TOOLS database.
The command ‘boot -s’ starts in single user mode and is sometimes needed to
do system administration actions on a malfunctioning system. In single user mode
the file systems mounting and logins are disabled. A common task to do in single
user mode is the command fsck to check and repair any corrupted file systems.
14
UNIX file system
ASML Confidential
/ Slide 15 For training purposes only
The file structure is like MS-DOS. You can use cd to walk trough the tree structure.
Also cd .. is the same as in DOS.
The filenames are long and don't need the filename extension. Remember,
filenames are case sensitive !
15
Filesystem commands (1)
Use the command ‘ls -a’ to see hidden files that begin with a dot.
Use the command ‘man ls’ for all the other options. The ‘man’ command is a
help function which displays the manual pages of the requested command.
16
Filesystem commands (2)
l pwd : print working directory (display the pathname of the current working
directory)
ASML Confidential
/ Slide 17 For training purposes only
The above slide gives a brief summary of each command. Use the manual pages
(command ‘man’) for a more complete explanation.
17
File handling (1)
l touch: update the date and time a file was last modified to the
current date and time
touch -c newfile The -c option prevents the filename from being
created if it does not already exist.
ASML Confidential
/ Slide 18 For training purposes only
The access permissions for a directory that you create are set to a predetermined
value which ensures that other users cannot get access to your directories and
their contents. This value is defined by the file-creation mode mask.
To display the value of this mask enter the command ‘umask’.
Without the mask the system would set permissions of 666 for files and 777 for
directories when first created. The values in the mask are subtracted from these
values to give a default value for access permissions for the files and directories
created by you. To change your default access permissions use the command
‘umask nnn’
Example:
‘umask 002’ this command give all access permissions to the group and allow
other users read and execute permission
This subtracts 002 from the system defaults to give a default access permission for
your files of 664 (rw-rw-r--) and for your directories of 775 (rwxrwxr-x).
18
File handling (2)
l cp : copy files
cp -p *.const ~/mydir The -p command duplicates not only the
contents of source_file, but also preserves the owner and group id and permissions
modes.
ASML Confidential
/ Slide 19 For training purposes only
Take care what name you give to the file copy. If you choose the name of a file that
already exists it will be overwritten by the new copy! To avoid this use the cp
command together with its -i option. This will prompt you for confirmation whenever
the copy would overwrite an existing file.
If you want to copy a subdirectory and all of his content, use the ‘cp -r’
command. E.g. cp -r olddir/ newdir/
When you move a directory to an existing directory, then the source directory will
become a subdirectory of the existing directory.
19
Displaying Text Files (1)
l The cat command is usually used to join two files one after the
other (concatenate)
l cat: concatenate and display files
cat myfile the file will be displayed on the screen. If the file content is
bigger than the screensize, the beginning of the file will not be visible anymore.
ASML Confidential
/ Slide 20 For training purposes only
Use the manual pages for further exploration and for a the complete explanation.
The manual pages can be opened with the command ‘man <command>’, e.g.
‘man cat’.
The cat command can also be used to redirect the content of the file to a mail
address.
E.g. cat <filename> | mail [email protected]
20
Displaying Text Files (2)
ASML Confidential
/ Slide 21 For training purposes only
Use the manual pages for further exploration and for a the complete explanation.
21
Displaying Text Files (3)
Text editor
l textedit: open a new text edit window. Also used to create a new
file.
ASML Confidential
/ Slide 22 For training purposes only
Use the manual pages for further exploration and for a the complete explanation.
22
Displaying Text Files (4)
VI screen editor
l The vi editor is available on all UNIX systems: other editors are not.
Being able to use vi ensures that you will always have an editor
available to you.
Vi only works fine if you know the commands (use only as a last
resort). Use textedit if possible!
l See below for the most used Vi commands:
l Moving cursor h j k l
l Moving screens ^f ^b ^u ^d
l Delete current line dd
l Delete current character x
l Search: /string/ and // to repeat last search.
l Goto the end with G and to a line number 10 with 10G
<Ctrl>-G displays current line number.
l Entering editing mode use a or i.
End edit mode with <esc>
l Exit vi with : x
l Exit vi with save :wq without save :q!
ASML Confidential
/ Slide 23 For training purposes only
Vi opens in command mode that allow you to move around and enter line
command mode with : or editing mode with a or i.
Leave line command mode and editing mode with <esc>
Search with string between / and /. Backward search with string between ? and ?.
23
Miscellaneous software commands:
C-shell features
l !! - Repeats last command
l !mo - uses last command that starts with mo
l ^ab^df - execute last command and replaces ab with df
l history - shows a list of recent commands
l <esc> - will try to finish the filename that you are typing
l cd use*/jobs - does a cd user_data/jobs
l textedit & - start textedit as a separate process
l alias - asigning your own name for a command
l env - shows environment variables
l I/O redirection - sends command output elsewhere:
ls > list.txt
ASML Confidential
/ Slide 24 For training purposes only
Use the manual pages to view all the C-shell features. The manual pages can be
viewed with the following command ‘man csh’.
Remembering the name of a command and how it is used can be difficult.
Assigning your own name for a command - an alias - is very easy. To view all
assigned alias command use the command ‘alias’.
Assigning an alias is done with the command: alias name definition.
Example: alias del 'rm -i’ this creates the alias del for the command rm -
i which prompts you for confirmation before removing a file.
del memo.txt
rm: remove memo.txt? y
The command ls > list.txt will not list the content of the directory on the
screen, but will send the output to the file list.txt.
24
Miscellaneous software commands:
snapshot
l snapshot:
used to capture some or all of a screen image and save it to a
raster file. Can be saved as a jpeg (.jpg) image if desired.
ASML Confidential
/ Slide 25 For training purposes only
Snapshot can come handy if you want to save graphics produced by the test
software.
E.g. mirror map graphics will be generated after completion of the wafer stage
mirror map calibration test. If you save the test log file (tlg file) the graphics are lost.
Hence the snapshot tool can be used to save the graphical output of the test.
25
UNIX (Solaris) version on your system
ASML Confidential
/ Slide 26 For training purposes only
ASML delivers a UNIX version and the TWINSCAN application together on one
CDROM. This means that when a new release of the TWINSCAN software is
introduced, it can come with changes in UNIX.
At this moment most systems will run Solaris 5.8
26
Recognize ASML software version (1)
ASML Confidential
/ Slide 27 For training purposes only
27
Recognize ASML software version (2)
l In errorlog:
09/18/2002 11:40:09.6507 Machine:0000 (Rel:3.2.0.c, SXEH
[816], SX_EH_rq.c, 1.58, 954)
SYSTEM EVENT: SX-000C DEFAULT
SECS manager event.
Component SX succesfully initialized.
ASML Confidential
/ Slide 28 For training purposes only
28
Recognize ASML machine number
ASML Confidential
/ Slide 29 For training purposes only
29
THE TOP-LEVEL DIRECTORY STRUCTURE
tls@ usr/asm/
All directories on a UNIX system are organized into a hierarchical structure that you
can imagine as a family tree. The parent directory of the tree is known as the root
directory and is written as a forward slash (/).
The two main branches of the UNIX directory structure are atl.<nnnn> and the
data.<nnnn> (where <nnnn> is the system number). The atl.<nnnn> directory is
defined as the home directory. The atl.<nnnn> directory contains the TWINSCAN
application software.
Note, all non necessary directories from the root (/) and from usr/asm/ are left
out!
Some softlinks from within the atl.<nnnn> directory to the data.<nnnn> directories
are defined for transparent usage of the software. The link /tls@ points to the
/usr/asm/data.<nnnn>/.FT/tls/ directory, required by FAST/Tools.
Note:
FAST/Tools is a real-time database used for storage and retrieval of component
data.
FAST/Tools is not meant as a communication interface between all components,
i.e., the flow of control data should not be done via FAST/Tools.
30
THE ATL.<NNNN> DIRECTORY STRUCTURE
Atl.<nnnn>
Bin/ El.<n> Lib/ ER@ FT@ TM@ <cc> share/ user_data@ service_data@
directories
hsms/
secs1/
install/
ASML Confidential
/ Slide 31 For training purposes only
31
THE ATL.<NNNN> DIRECTORY STRUCTURE
l Explanation of abbreviations
bin/vw/ Executables (binaries) for the VxWorks processors (*.o files)
bin/sun/ Executables (binaries) for the Sun processor
bin/sun/hsms/ Executables for one SECS control mode
bin/sun/secs1/ Executables for another SECS control mode
bin/sun/install/ Support scripts for (re)installation
el.<n>/ Boot code for VxWorks processor <n>
lib/sun/ Shared object libraries for the SUN processor
lib/vw/ Shared object libraries for the VxWorks processors
ER@ Symbolic link to the hidden directory data.<nnnn>/.ER
FT@ Symbolic link to the directory data.<nnnn>/.FT
TM@ Symbolic link to the directory data.<nnnn>/.TM
<cc>/ Component <cc> owned directories, containing machine constants files (for
subsystem drivers), or the option file and machine definition file (used for the
configuration manager).
reserved@ Symbolic link to /reserved/<cc>/
share/icon/ Common storage for icon pixmaps.
share/help/ Common storage for ASML help text.
user_data@ Symbolic link to the directory data.<nnnn>/user_data
service_data@ Symbolic link to the directory data.<nnnn>/service_data
ASML Confidential
/ Slide 32 For training purposes only
32
THE DATA.<NNNN> DIRECTORY STRUCTURE
data.<nnnn>
lib@ lst/
src@ sav/
sup/
ASML Confidential
/ Slide 33 For training purposes only
The slide above shows some of the data.xxxx part of the file system.
The test_data@ directory located under the service_data directory is a symbolic
link to the hidden Test Manager directory (.TM/) which contains a list of all tests,
test queues and test reports.
There are numerous other subdirectories under the service_data directory where
the software puts .tlg files (test log files generated by tests defined in the test
manager).
33
THE DATA.<NNNN> DIRECTORY STRUCTURE
data.<nnnn>
user_data/
error_log.old@ extern/
system/ test/
export/
ASML Confidential
/ Slide 34 For training purposes only
The slide shows that reticle data, jobs batch reports etc. are located in
subdirectories of the user_data directory.
34
THE DATA.<NNNN> DIRECTORY STRUCTURE
l Explanation of abbreviations
service_data/ Contains non-user files that have to be exported. Specific diagnostic information,
intended for service engineers, can be accessed through this directory. In contrast to
the “user_data” directory, the format of files that are gathered in this directory may
easily be different between subsequent releases.
service_data/<cc>/ Specific data for component <cc>.
service_data/<cc>/<ccbb> Specific data for the test <ccbb>.
service_data/test_data@ Symbolic link to the .TM directory.
service_data/testqueues/ Testqueues.
.ER/ A hidden directory that contains the current active error log file, and the previous error
log file. When a new log file is created, the previous log file is gzipped. Maximum 10
gzipped will be saved.
user_data/ Directory for storing user data.
user_data/help/ Common storage for customer help text.
user_data/alignment_recipes/ User-defined recipes. The user is free to organise these recipe files by defining
directories and filenames in this directory.
user_data/alignment_recipes/asm/ Contains ASML-defined OA recipes for different marks and different process layers
(application). It also contains a default recipe named "default_job_recipe".
user_data/alignment_recipes/asm/system/ Contains ASML-defined OA recipe for fiducial marker under the name
"ME_default_fiducial_recipe".
user_data/alignment_recipes/asm/test/ Contains ASML-defined OA recipes used for metro and alignment tests. It also
contains default recipes for EM and LA tests under the names
"ME_default_test_recipe" and "AL_default_test_recipe", respectively.
user_data/error_logs/ Directory for error logfiles.
user_data/error_logs/error_log.cur@ Symbolic link to the current active error log files in .ER.
user_data/error_logs/error_log.old@ Symbolic link to the previous error log files in .ER.
user_data/lot_reports/ Lot reports for finished lot files.
user_data/iris_reports/ Reticle inspection reports
ASML Confidential
/ Slide 35 For training purposes only
35
THE DATA.<NNNN> DIRECTORY STRUCTURE
l Explanation of abbreviations
user_data/batch_reports/ Batch reports for finished batch files.
user_data/iris_reports/ Reticle inspection reports
user_data/jobs/ User-defined jobs. The user is free to organise this job files by defining directories and
filenames in this directory.
user_data/jobs/ This directory is controlled by the component JD (Job Definition). It contains job definition files.
One directory (asm) is already available at installation time.
user_data/jobs/asm/ Contains ASML-defined jobs used for the ATP (Acceptance Test Protocol) and the FAT
(Factory Acceptance Test).
user_data/jobs/extern/ Reserved directory. When present, it is a mounted directory on a path that lies outside
/usr/asm/data.xxxx. This may even be a mount on a remote filesystem. The mounting itself is
done by the root user once. On VxWorks processors, there is no need to mount this directory,
as it is used by SUN-based processes only.
user_data/monitoring/ Productivity / reliability monitoring data
user_data/reticle_database/ Contains reticle data and reticle layouts stored in the file “reticle_database”.
user_data/reticle_database/export/ Import/export data that belongs to one specific reticle, to or from the database.
user_data/reticle_data/, Used to store old reticle specific data and old reticle layout files, respectively. With the upgrade
user_data/reticle_layout/ component (UP), these files are converted to the new format in the directory
“reticle_database”.
RDM/ Used to store Self-contained Recipes
.TM/ A hidden directory that contains a list of all tests, the predefined test queues, and the test
reports.
.FT/ FAST/Tools directory.
.FT/tls/ FAST/Tools standard directory.
.FT/tls/com@, exe@, lib@, src@ Symbolic link to FAST/Tools release data and executable directories.
.FT/tls/dat/, log/, lst/, sav/, sup/ Directories for user data storage, i.e. Recipe Manager Database.
ASML Confidential
/ Slide 36 For training purposes only
36
Symbolic links
/
tls@ user/asm/
atl.<nnnn>/ data.<nnnn>/
service_data@
tls/ error_logs/ <current log> test_data@
ER@
<old log>
com@ TM@
exe@
scr@
ASML Confidential
/ Slide 37 For training purposes only
The directories shown that end with an @ symbol are symbolic links to other
directories. Symbolic links can be thought of as short cuts to other directories or
files. For example, the ER@ directory is a symbolic link to the data.<nnnn>
directory.
There are many (symbolic) links between the atl.<nnnn> directory and
data.<nnnn> directory. The slide shows how these two directories are linked (all
non-essential information is left out).
The directories/files shown that start with a ‘dot’ are hidden directories/files.
They are not visible while navigating true the directory structure.Make hidden
directories/files visible with the command ‘ls -a’.
37
UNIX file system
ASML Confidential
/ Slide 38 For training purposes only
38
File Manager
ASML Confidential
/ Slide 39 For training purposes only
A file manager program provides the user with a graphic representation of the
directory structure and can be used to navigate through the directories. Files can be
dragged and dropped between locations. Alternatively the user can navigate through
the directory structure and handle files using UNIX commands.
As with other work station programs, the file manager is opened through a command
tool. The command to open the file manager is ‘filemgr&’
If the ‘&’ symbol were not included in the command, the terminal window would be
unusable while the file manager is open.
39
File security
Group
Owner File name
d|rwx|rwx|rwx
R = read
- File
W = write
d Directory
E = execute
b Block special device entry Owner World
c Character special device entry Group
p Named pipe
l Symbolic link
ASML Confidential
/ Slide 40 For training purposes only
40
Understanding file permissions
• By turning on or off the three binary bits (of the bit-mask
syntaxes) we can change the permissions for a file.
• The first 3 bits change the read permission, the second 3
bits the write permission and the last 3 bits the execute
permission
100 - Read permission - The decimal equivalent of this binary value is 4
010 - Write permission - The decimal value for write is 2
001 - Execute permission - he decimal value for execute is 1
r = 4 w = 2 x = 1
ASML Confidential
/ Slide 41 For training purposes only
Every file and directory in your account can be protected from or made accessible to other users by
changing its access permissions.
You can only change the permissions for files and directories that you own.
Read permission is given the value 4, write permission the value 2 and execute permission 1.
r w x
4 2 1
These values are added together for any one user category:
1 = execute only
2 = write only
3 = write and execute (1+2)
4 = read only
5 = read and execute (4+1)
6 = read and write (4+2)
7 = read and write and execute (4+2+1)
ASML Confidential
/ Slide 42 For training purposes only
These commands are NOT part of the objectives but because the concept of
permissions is discussed on the previous pages they are included in this slide.
They certainly don't need to be emphasized in this course.
42
File conversion
l Text file difference between DOS & UNIX:
l Coding of the End_of_line statement.
l If a UNIX text file is opened under DOS (without conversion),
DOS does not recognise the End_of_line code,
The DOS text editor displays a ‘unknown_character’ code instead
of a line feed.
l Convert text files with unix2dos or dos2unix
Example: unix2dos myfile myfile.txt
ASML Confidential
/ Slide 43 For training purposes only
43
File gathering
ASML Confidential
/ Slide 44 For training purposes only
The “tar” command can be used create a specially formatted copy or archive of
files or directories. The command is an acronym for tape archive, although it is
commonly used with floppy disks. There are several arguments associated with tar.
These are described below
c copy from the hard disk to the floppy. Note the use of c will cause the existing
files on the floppy to be overwritten.
u will, in contrast to c, add files to an existing archive or update files that have
changed since they were last archived.
t will list the contents of the archive on a floppy.
x can be used to extract the contents of an archive from a floppy to the hard disk.
Either individual files or the entire archive can be extracted. Files are written to the
directory where the tar command was issued .
v means verbose and provides information about what the command is doing.
f indicates the device on which the archive is to be created/read/extracted the
default at ASML being the floppy.
GZIP tip: Use MS-Windows file types (.tar, .gz, .tgz, .uue). GZIP will automatically
ad the extension .gz to the zipped file. Use the copy ‘cp’ command to change the
file extension. E.g. ‘cp mcconst.tar.gz mcconst.tar.tgz’.
For the .uue extension use the uuencode command. See next slides for 44
explanation.
Gathering and Sending Files
l Follow these steps to send files to 2nd or 3rd line for analysis:
ASML Confidential
/ Slide 45 For training purposes only
Walk through the steps and describe what happens and then practice in on a Stand
Alone Work Station (SAWS).
45
Sending more data… !
erlog.tar
3 Mb
~/ER/ER_event* erlog.tar.gz erlog.tar.gz.uu
3 * 1 Mb 0.4 Mb
gzip 0.3 Mb
tar cvf uuencode
Mail As text
Attachment in mail
To: [email protected]
via patchmail or laptop
ASML Confidential
/ Slide 46 For training purposes only
With tar you can archive files into one file. This file is not compressed.
With gzip you can pack this large file. Use ‘gzip -h’ for help on this command.
The tar and gzip can be combined with gtar. Gtar allows the z option for zipping. So
gtar czvf ... or gtar xzvf ... or gtar tzvf ...
Use recognizable filetypes :
*.tar = tar
*.gz = gzip
*.uu = uuencode
*.tgz = gzip-ed tar file
Uuencode is used to convert files into ASCII format, allowing it to be used by
programs that do not handle binary files, such as electronic mail.
Used as:
‘uuencode file.gz file.gz > file.gz.uu’ this command converts the
binary file file.gz into an ASCII (text) file file.gz.uu
‘uudecode file.gz.uu’ reverses the latter command.
l snapshot:
used to capture some or all of a screen image and save it to a
raster file. Can be saved as a jpeg (.jpg) image if desired.
ASML Confidential
/ Slide 47 For training purposes only
Snapshot can come handy if you want to save graphics produced by the test
software.
E.g. mirror map graphics will be generated after completion of the wafer stage
mirror map calibration test. If you save the test log file (tlg file) the graphics are lost.
Hence the snapshot tool can be used to save the graphical output of the test.
47
Mounting the diskette on SAWS, TWINSCAN
ASML Confidential
/ Slide 48 For training purposes only
Files from the TWINSCAN application software can be copied to DOS formatted
floppies. Before using a DOS floppy disk on a UNIX system it is necessary to
mount the floppy disk. The floppy is a file system which when mounted becomes an
extension of the UNIX file system. Mounting the disk makes the connection
between the main file system and the extension (the floppy).
Remember to use the eject command before removing the floppy disk from the
drives. On older systems, which have no eject button, this is the only way to
remove a floppy from a drive.
With the eject command the floppy will be unmounted automatically. The
command unmountall can be used as alternative.
48
Copying files on floppy disk
l Unformatted
On a SAWS tar cvf /vol/dev/aliases/floppy0 <filename>
On a machine tar cvf /vol/dev/aliases/rmdisk0 <filename>
Make sure to unmount the floppy first with the eject command before
formatting.
ASML Confidential
/ Slide 49 For training purposes only
49
Working Remotely on the TWINSCAN:
Using telnet
l Telnet allows a person to log on and work on the tool as
if they were standing at the operator control unit.
l You do NOT have the graphical interface of the
TWINSCAN software.
l Instead, you will be running a shell (terminal) with a
command line.
l By connecting from a SAWS, you can use VI to edit files.
This is not possible from a PC telnet connection.
ASML Confidential
/ Slide 50 For training purposes only
The computer you log in to may not be the computer you need to use. For instance,
you might have a workstation (or PC) on your desk but need to do some work on
the TWINSCAN machine in another building..
Your UNIX system can probably connect to another computer to let you work as if
you were sitting at the other computer. To do this, you first log in to your local
computer.
Then you start a program on your local computer that connects to the remote
computer. Some typical programs are telnet and rlogin (for connecting over a
computer network). You use the remote system until you're done; when you log off
the remote computer, the remote-login program quits, and then returns you to your
local computer.
50
Working Remotely on the TWINSCAN:
Using telnet
l From a Stand Alone Work Station (SAWS):
l open terminal window and type telnet
(type help for a list of command options)
l to connect to a machine type: open mXXXX
(XXXX stands for the machine number)
l to login type: atl.XXXX
l …
l perform the desired tasks on the remote system
l …
l type exit or logout to break the connection and exit
telnet
ASML Confidential
/ Slide 51 For training purposes only
The difference between exit and logout command to close a login session:
• If you type exit the telnet session will be closed as well the terminal window.
• If you type logout the telnet session will be closed without closing the terminal
window.
51
Working Remotely on the TWINSCAN:
Using UNIX command rlogin
l From a Stand Alone Work Station (SAWS):
l open terminal window and type:
rlogin -l atl.<nnnn> m<nnnn>
(a password is not needed)
l perform the desired tasks on the remote system
l type logout to break the connection and exit your login
session.
ASML Confidential
/ Slide 52 For training purposes only
Example:
rlogin -l atl.0000 m0000
This logs the user in to the remote system named m0000 (hostname) on which
they have an account for the username atl.0000.
52
Working Remotely on the TWINSCAN:
Using telnet
l From a PC on the network:
l Open a MSDOS Command Prompt window and type
telnet
l open the Connect | Remote system menu and enter a
valid machine name. (see also next page)
l When the tool responds, log in with atl.mXXXX
(XXXX stands for the machine number)
l …
l perform the desired tasks on the remote system
l …
l type exit or logout to break the connection.
ASML Confidential
/ Slide 53 For training purposes only
53
Working Remotely on the TWINSCAN:
Using telnet
l Graphical overview of a telnet session on a PC
ASML Confidential
/ Slide 54 For training purposes only
54
Working Remotely on the TWINSCAN:
Using ftp
l ftp stands for file transfer protocol.
ASML Confidential
/ Slide 55 For training purposes only
55
Working Remotely on the TWINSCAN:
Using ftp
l From a SAWS:
l open terminal window and type ftp
(type help for a list of command options)
l to connect to a machine type: open mXXXX
(XXXX stands for the machine number)
l fill in username: ftp.<nnnn> (where <nnnn> is machine
number)
l fill in password: ftp … now you have your ftp prompt
l copy files using get (from machine to SAWS) and send
(from SAWS to machine)
l type close or disconnect to close the connection or
l type bye to break the connection and exit the ftp session.
ASML Confidential
/ Slide 56 For training purposes only
56
Working Remotely on the TWINSCAN:
Using ftp
l Graphical overview of a ftp session on a SAWS:
l open terminal window and type ftp
l to connect to a machine type: open mXXXX
l fill in username: ftp.<nnnn>
l fill in password: ftp
ASML Confidential
/ Slide 57 For training purposes only
57
Working Remotely on the TWINSCAN:
Using ftp
l From a PC on the network:
l Open a DOS Command Prompt window and type ftp
l to connect to a machine type: open mXXXX
(XXXX stands for the machine number)
l When the tool responds, log in as ftp.<nnnn> (where
<nnnn> is machine number)
l use ftp as password
l copy files using get and send
l use close or disconnect to close the connection or
l use bye to break the connection and exit ftp.
ASML Confidential
/ Slide 58 For training purposes only
58
Connecting a laptop on a TWINSCAN machine :
Using ftp
l The following slides describe the steps to connect a
laptop on a TWINSCAN machine.
l These slides are only intended to give an global
overview.
l The procedure (cscs006a_ins.fm) is available in coach.
Make sure that you always use the latest version.
ASML Confidential
/ Slide 59 For training purposes only
59
Connecting a laptop on a TWINSCAN machine
• Before connecting a laptop on a
TWINSCAN pay attention to the
following points:
• Make sure that no lots are
running on the system.
• The laptop is turned off and not
connected to the power supply.
NOTE:
• Use an UTP Ethernet cable to
connect the laptop to HUB at the
back side of the system
• The lower HUB is for the QFE1
connection.
ASML Confidential
/ Slide 60 For training purposes only
60
Connecting a laptop on a TWINSCAN machine
ASML Confidential
/ Slide 61 For training purposes only
61
Connecting a laptop on a TWINSCAN machine
ASML Confidential
/ Slide 62 For training purposes only
62
Connecting a laptop on a TWINSCAN machine
ASML Confidential
/ Slide 63 For training purposes only
63
Some useful ftp commands
ASML Confidential
/ Slide 64 For training purposes only
64
Practice
l When using the command ‘id’ the abbreviations uid and gid
will be visible on the screen.
ASML Confidential
/ Slide 65 For training purposes only
65
Practice
ASML Confidential
/ Slide 66 For training purposes only
66
Practice
l Create a text file with ls > dir.txt and use vi to show this file and
move around with your cursor. Insert your own text and delete
some lines. Save and quit your new file.
ASML Confidential
/ Slide 67 For training purposes only
67
Practice
l Look in the errorlog file. The errorlog file can be found in the
directory /usr/asm/ER/
The errorlog is big, so better use the ‘tail’or ‘head’
command.
ASML Confidential
/ Slide 68 For training purposes only
68
Practice
l As root, create a file (ls > dir.txt) and play with chmod:
l Use chmod for changing the permission mode of this file so that
the user has read, write and executable rights, but the group an
others have no rights at all.
l ‘chmod xxx dir.txt’ fill in the xxx
ASML Confidential
/ Slide 69 For training purposes only
69
Practice
ASML Confidential
/ Slide 70 For training purposes only
70
Practice
ASML Confidential
/ Slide 71 For training purposes only
71
Practice
l Create a directory and create one file in this directory that holds
a zipped version of both the errorlog file and the old errorlog file.
l Send the zipped file to your own email address.
l Remove the file and directory you just created.
ASML Confidential
/ Slide 72 For training purposes only
72
Appendix
ASML Confidential
/ Slide 73 For training purposes only AP-L1-SL-1v0
73
Machine Constants and Factory Constants
ASML Confidential
/ Slide 74 For training purposes only
74
Machine Constants
ASML Confidential
/ Slide 75 For training purposes only
Each component is responsible for its own set of machine constants. They are
gathered into a constants-file (<file>.const), which is stored in the directory
belonging to that component.
This component is called the owning component, meaning that it (or its test
software) is allowed to write in the constants file directly. Other components that
are interested in importing the value of a machine constant of another component
are called using components.
75
Machine Constants
ASML Confidential
/ Slide 76 For training purposes only
Test software is typical ASML terminology for a set of programs (tests) that are
used for calibrating (part of) a subsystem, to test its behaviour, to track
malfunctioning electronics or mechanics, etc. In general, it is software that is not
related to the production of wafers.
A test is only responsible for a single specific hardware function, which is the
reason why more than 300 tests have been developed within ASML.
76
Modification of Machine Constants
ASML Confidential
/ Slide 77 For training purposes only
77
Factory Constants
ASML Confidential
/ Slide 78 For training purposes only
78
ASML Confidential
/ Slide 79 For training purposes only
79