Here are the steps to complete the assignment:
1. Login as guest user (password is guest)
2. To find the present working directory: pwd
3. The root directory structure includes: /bin, /dev, /etc, /home, /lib, /root, /sbin, /tmp, /usr etc.
4. A few commands in /bin are: ls, cp, mv, rm, chmod. Commands in /sbin are: ifconfig, route, iptables etc.
5. The guest home directory is /home/guest
6. The permissions of the guest home directory are: drwxr-xr-x
7. To create a new
Here are the steps to complete the assignment:
1. Logged in as guest user
2. Present working directory is /home/guest
3. Wrote the structure of root directory /
4. A few commands in /bin are ls, cp, mv. A few in /sbin are ifconfig, route
5. Guest directory is /home/guest
6. Permissions of /home/guest are drwxr-xr-x
7. Created directory test in /home/guest
8. Copied /etc/resolv.conf to /home/guest/test
9. Renamed /home/guest/test to /home/guest/testing
10. Deleted
This document outlines the content of a Linux system and network administration course taught over 15 lectures and labs. The course covers topics such as Linux installation, desktop environments, file systems, user administration, networking configuration including DHCP, NIS, NFS, DNS, mail servers and firewalls. It also covers troubleshooting, system monitoring and installing additional software packages. The course is graded based on two exams and a lab component, and requires a minimum of 80% attendance and 60% marks to pass.
This document discusses user administration concepts and mechanisms in UNIX/Linux operating systems. It covers topics like users, groups, permissions, and how to manage users and groups. Specific commands to manage files, directories and permissions are also described, such as chown, chgrp, and chmod. The structure of standard UNIX/Linux directories like /bin, /dev, /etc, and others are outlined as well.
This document provides an introduction to the Linux operating system, including:
- A brief history of Unix from its creation in 1969 to the development of Linux in 1991.
- An overview of what Linux is and some popular Linux distributions.
- A description of the Unix/Linux file system structure and standard directory layout.
- An explanation of users, groups, and permissions and how the operating system manages access to files and programs.
- Examples of common Linux commands for navigating directories, manipulating files, and changing permissions.
- Linux originated as a clone of the UNIX operating system. Key developers included Linus Torvalds and developers from the GNU project.
- Linux is open source, multi-user, and can run on a variety of hardware. It includes components like the Linux kernel, shell, terminal emulator, and desktop environments.
- The document provides information on common Linux commands, files, users/groups, permissions, and startup scripts. It describes the Linux file system and compression/archiving utilities.
In February, 2016 I had the privilege of working with employees of STARR Computers on a course to orient them to Linux. The course was delivered over a series of 90-120 minute sessions. It was designed so that
This is a compilation of the slides which were used. There were some other resources which were shared. There were practice exercises which were designed to reinforce some concepts.
Check http://churchroadman.blogspot.com/2016/04/basic-orientation-to-linux-course.html for some other details.
NanoCdac Providing linux administration training in Hyderabad. Training includes Linux Internals and Device Drivers,Real -Time Operating System (RTLinux) Programming,Linux System programming,Linux Device Drivers Programming.Our aim is to quality training to the students and professionals Call Us-040 -23754144,+91- 9640648777
This presentation is completely designed for Industrial Training Presentation only that is needed by the Student in order to submit in the colleges. It contain Linux Introduction, Servers and Services, File System and many more about Linux
Here are the steps to complete the assignment:
1. Logged in as guest user
2. Present working directory is /home/guest
3. Wrote the structure of root directory /
4. A few commands in /bin are ls, cp, mv. A few in /sbin are ifconfig, route
5. Guest directory is /home/guest
6. Permissions of /home/guest are drwxr-xr-x
7. Created directory test in /home/guest
8. Copied /etc/resolv.conf to /home/guest/test
9. Renamed /home/guest/test to /home/guest/testing
10. Deleted
This document outlines the content of a Linux system and network administration course taught over 15 lectures and labs. The course covers topics such as Linux installation, desktop environments, file systems, user administration, networking configuration including DHCP, NIS, NFS, DNS, mail servers and firewalls. It also covers troubleshooting, system monitoring and installing additional software packages. The course is graded based on two exams and a lab component, and requires a minimum of 80% attendance and 60% marks to pass.
This document discusses user administration concepts and mechanisms in UNIX/Linux operating systems. It covers topics like users, groups, permissions, and how to manage users and groups. Specific commands to manage files, directories and permissions are also described, such as chown, chgrp, and chmod. The structure of standard UNIX/Linux directories like /bin, /dev, /etc, and others are outlined as well.
This document provides an introduction to the Linux operating system, including:
- A brief history of Unix from its creation in 1969 to the development of Linux in 1991.
- An overview of what Linux is and some popular Linux distributions.
- A description of the Unix/Linux file system structure and standard directory layout.
- An explanation of users, groups, and permissions and how the operating system manages access to files and programs.
- Examples of common Linux commands for navigating directories, manipulating files, and changing permissions.
- Linux originated as a clone of the UNIX operating system. Key developers included Linus Torvalds and developers from the GNU project.
- Linux is open source, multi-user, and can run on a variety of hardware. It includes components like the Linux kernel, shell, terminal emulator, and desktop environments.
- The document provides information on common Linux commands, files, users/groups, permissions, and startup scripts. It describes the Linux file system and compression/archiving utilities.
In February, 2016 I had the privilege of working with employees of STARR Computers on a course to orient them to Linux. The course was delivered over a series of 90-120 minute sessions. It was designed so that
This is a compilation of the slides which were used. There were some other resources which were shared. There were practice exercises which were designed to reinforce some concepts.
Check http://churchroadman.blogspot.com/2016/04/basic-orientation-to-linux-course.html for some other details.
NanoCdac Providing linux administration training in Hyderabad. Training includes Linux Internals and Device Drivers,Real -Time Operating System (RTLinux) Programming,Linux System programming,Linux Device Drivers Programming.Our aim is to quality training to the students and professionals Call Us-040 -23754144,+91- 9640648777
This presentation is completely designed for Industrial Training Presentation only that is needed by the Student in order to submit in the colleges. It contain Linux Introduction, Servers and Services, File System and many more about Linux
This document discusses embedded Linux programming. It covers topics such as what Linux is, the layers in a Linux system including the kernel and user programs, how Linux differs from legacy real-time operating systems, and an agenda for a course on embedded Linux driver development that covers the Linux kernel, memory management, interrupts, and networking. It also provides information on basic Linux command line tools and file permissions.
This document discusses the Linux file system structure. It begins with the root directory designated by a forward slash. Under the root are key directories like /bin, /boot, /dev, /etc, /home, /lib, /mnt, /media, /opt, /proc, /root, /sbin, /tmp, /usr, and /var that store important system files, configuration files, user files, libraries, and more. The document explains the purpose and contents of each directory to illustrate how the overall file system structure supports the functioning of the operating system.
The document provides information about Linux OS and shell programming. It discusses the history and evolution of Linux from being a student project to a robust OS. Key people involved in its development like Richard Stallman, Linus Torvalds, and Andy Tanenbaum are mentioned. The architecture of Linux including kernel, system libraries, system utilities etc. is explained. Important commands, file system structure, file permissions and text editors in Linux are also summarized.
Unix was created in 1969 by Ken Thompson at Bell Labs to allow multiple users to access a computer simultaneously. It features a multi-user design, hierarchical file system, and shell interface. The kernel handles memory management, process scheduling, and device interactions to enable these features. Common Unix commands like cat, ls, cp and rm allow users to work with files and directories from the shell. File permissions and ownership are managed through inodes to control access across users.
Get Started with Linux Management Command line Basic KnowledgeDavid Clark
This document provides an introduction to Linux and outlines an agenda for getting started. It covers topics such as the Linux environment, file system operations and structure, utilities, permissions, processes, basic administration, and shortcuts. The document also lists common Linux distributions and gives overviews of what Linux is and its kernel development history.
This document provides an overview of shell scripting. It begins with an agenda that covers introducing UNIX/Linux and shell, basic shell scripting structure, shell programming with variables, operators, and logic structures. It then gives examples of shell scripting applications in research computing and concludes with hands-on exercises. The document discusses the history and architecture of UNIX/Linux, commonly used shells like bash and csh, and why shell scripting is useful for tasks like preparing input files, job monitoring, and output processing. It also covers basic UNIX commands, commenting in scripts, and debugging strategies.
The document summarizes the contents of a training presentation on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure including common directories, file handling commands like ls, cd, cp, and an introduction to pipes and I/O redirection. Special files and directories like symlinks, devices, and ~ (home directory) are explained. File permissions and ownership are also mentioned.
The document summarizes the contents of a training on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure, file handling commands like ls, cd, cp, and file permissions. It also discusses standard input/output redirection, pipes, process control and environment variables. The training contents are organized into 5 sections covering these topics at an introductory level.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
The document provides an overview of common Linux commands organized into categories, with brief explanations of each command. It covers commands for working with files and directories (ls, cd, cp, rm), processes (ps, top, kill), networking (ping, ifconfig), file archiving and compression (tar, gzip), and more. It also lists important directories in the Linux file system such as /bin, /usr/bin, /etc, and directories under /usr.
Lesson 2 Understanding Linux File SystemSadia Bashir
The document provides an overview of Linux file systems and file types. It discusses:
1) The main types of files in Linux including directories, special files, links, sockets and pipes.
2) The standard Linux directory structure and the purpose of directories like /bin, /sbin, /etc, and /usr.
3) Common Linux file extensions and hidden files that begin with a dot.
4) Environment variables and how they can be used to customize a system.
5) Symbolic links and how they create references to files without copying the actual file.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user, multi-tasking system used for servers, desktops and laptops. It also discusses the different components that make up the UNIX system, including the kernel, shell, and programs. It explains the directory structure and file hierarchy with the root directory at the top. It provides examples of different types of files and concludes by describing some basic date and time commands in UNIX.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user operating system developed in the 1960s for servers, desktops, and laptops. The UNIX operating system consists of three main parts: the kernel, the shell, and programs. The kernel allocates resources and handles processes and communications, while the shell acts as an interface between the user and kernel. There are various versions of UNIX that share common features.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Proper configuration of these permissions and use of setuid programs is important for security. The Unix password system has evolved from storing passwords in plaintext to using shadow files and stronger encryption.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Sensitive system directories must have proper permissions to balance security and usability. Remote access utilities like rlogin pose risks if not properly configured, so disabling them in favor of SSH is recommended. The Unix password system has evolved from insecure early implementations to more secure modern schemes that hash passwords and store them separately from account details.
Linux is an open-source operating system that provides free and secure software. It allows applications and users to access computer devices and functions through the kernel, which manages communication between hardware, software, and processes. Files, directories, programs, and devices are all treated as files in the Linux file system hierarchy, accessed through commands like ls, mkdir, and rmdir.
This document provides an overview of getting started with Linux. It covers topics such as what Linux is, the basic file system structure and operations, utilities for file management, process management, system administration, and common keyboard shortcuts. The document also lists some of the top Linux distributions and recommends next steps for learning more advanced topics like Vim, shell scripting, sed, awk, and pursuing Linux certification.
The document provides an overview of the Linux file system structure and common Linux commands. It describes that in Linux, everything is treated as a file, including devices, pipes and directories. It explains the different types of files and partitions in Linux, and provides examples of common file manipulation and system monitoring commands.
The document provides an overview of the contents of a training on the Unix and GNU/Linux command line. It covers topics such as shells and filesystem structure, file handling commands, standard input/output redirection, task control, text editing and system administration basics. The training aims to teach users full control of tasks and how to get help and find resources on the command line.
This document discusses embedded Linux programming. It covers topics such as what Linux is, the layers in a Linux system including the kernel and user programs, how Linux differs from legacy real-time operating systems, and an agenda for a course on embedded Linux driver development that covers the Linux kernel, memory management, interrupts, and networking. It also provides information on basic Linux command line tools and file permissions.
This document discusses the Linux file system structure. It begins with the root directory designated by a forward slash. Under the root are key directories like /bin, /boot, /dev, /etc, /home, /lib, /mnt, /media, /opt, /proc, /root, /sbin, /tmp, /usr, and /var that store important system files, configuration files, user files, libraries, and more. The document explains the purpose and contents of each directory to illustrate how the overall file system structure supports the functioning of the operating system.
The document provides information about Linux OS and shell programming. It discusses the history and evolution of Linux from being a student project to a robust OS. Key people involved in its development like Richard Stallman, Linus Torvalds, and Andy Tanenbaum are mentioned. The architecture of Linux including kernel, system libraries, system utilities etc. is explained. Important commands, file system structure, file permissions and text editors in Linux are also summarized.
Unix was created in 1969 by Ken Thompson at Bell Labs to allow multiple users to access a computer simultaneously. It features a multi-user design, hierarchical file system, and shell interface. The kernel handles memory management, process scheduling, and device interactions to enable these features. Common Unix commands like cat, ls, cp and rm allow users to work with files and directories from the shell. File permissions and ownership are managed through inodes to control access across users.
Get Started with Linux Management Command line Basic KnowledgeDavid Clark
This document provides an introduction to Linux and outlines an agenda for getting started. It covers topics such as the Linux environment, file system operations and structure, utilities, permissions, processes, basic administration, and shortcuts. The document also lists common Linux distributions and gives overviews of what Linux is and its kernel development history.
This document provides an overview of shell scripting. It begins with an agenda that covers introducing UNIX/Linux and shell, basic shell scripting structure, shell programming with variables, operators, and logic structures. It then gives examples of shell scripting applications in research computing and concludes with hands-on exercises. The document discusses the history and architecture of UNIX/Linux, commonly used shells like bash and csh, and why shell scripting is useful for tasks like preparing input files, job monitoring, and output processing. It also covers basic UNIX commands, commenting in scripts, and debugging strategies.
The document summarizes the contents of a training presentation on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure including common directories, file handling commands like ls, cd, cp, and an introduction to pipes and I/O redirection. Special files and directories like symlinks, devices, and ~ (home directory) are explained. File permissions and ownership are also mentioned.
The document summarizes the contents of a training on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure, file handling commands like ls, cd, cp, and file permissions. It also discusses standard input/output redirection, pipes, process control and environment variables. The training contents are organized into 5 sections covering these topics at an introductory level.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
The document provides an overview of common Linux commands organized into categories, with brief explanations of each command. It covers commands for working with files and directories (ls, cd, cp, rm), processes (ps, top, kill), networking (ping, ifconfig), file archiving and compression (tar, gzip), and more. It also lists important directories in the Linux file system such as /bin, /usr/bin, /etc, and directories under /usr.
Lesson 2 Understanding Linux File SystemSadia Bashir
The document provides an overview of Linux file systems and file types. It discusses:
1) The main types of files in Linux including directories, special files, links, sockets and pipes.
2) The standard Linux directory structure and the purpose of directories like /bin, /sbin, /etc, and /usr.
3) Common Linux file extensions and hidden files that begin with a dot.
4) Environment variables and how they can be used to customize a system.
5) Symbolic links and how they create references to files without copying the actual file.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user, multi-tasking system used for servers, desktops and laptops. It also discusses the different components that make up the UNIX system, including the kernel, shell, and programs. It explains the directory structure and file hierarchy with the root directory at the top. It provides examples of different types of files and concludes by describing some basic date and time commands in UNIX.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user operating system developed in the 1960s for servers, desktops, and laptops. The UNIX operating system consists of three main parts: the kernel, the shell, and programs. The kernel allocates resources and handles processes and communications, while the shell acts as an interface between the user and kernel. There are various versions of UNIX that share common features.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Proper configuration of these permissions and use of setuid programs is important for security. The Unix password system has evolved from storing passwords in plaintext to using shadow files and stronger encryption.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Sensitive system directories must have proper permissions to balance security and usability. Remote access utilities like rlogin pose risks if not properly configured, so disabling them in favor of SSH is recommended. The Unix password system has evolved from insecure early implementations to more secure modern schemes that hash passwords and store them separately from account details.
Linux is an open-source operating system that provides free and secure software. It allows applications and users to access computer devices and functions through the kernel, which manages communication between hardware, software, and processes. Files, directories, programs, and devices are all treated as files in the Linux file system hierarchy, accessed through commands like ls, mkdir, and rmdir.
This document provides an overview of getting started with Linux. It covers topics such as what Linux is, the basic file system structure and operations, utilities for file management, process management, system administration, and common keyboard shortcuts. The document also lists some of the top Linux distributions and recommends next steps for learning more advanced topics like Vim, shell scripting, sed, awk, and pursuing Linux certification.
The document provides an overview of the Linux file system structure and common Linux commands. It describes that in Linux, everything is treated as a file, including devices, pipes and directories. It explains the different types of files and partitions in Linux, and provides examples of common file manipulation and system monitoring commands.
The document provides an overview of the contents of a training on the Unix and GNU/Linux command line. It covers topics such as shells and filesystem structure, file handling commands, standard input/output redirection, task control, text editing and system administration basics. The training aims to teach users full control of tasks and how to get help and find resources on the command line.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
linux-lecture1.ppt
1. LINUX SYSTEM AND
NETWORK ADMINISTRATION
NIKHIL RAUT
Shri Ramdeobaba College of Engineering
https://linktr.ee/nikhil_raut
2. Module I
Lecture/Lab 1
Introduction to UNIX
- UNIX Operating System Architecture
Linux Operating System
Users, Groups and Permissions
- Examining Permissions
Lecture/Lab 2
Linux Installation
Hard Disk Partition Details
Linux File System
- ext2 / ext3
Dual Boot Installation
Lecture/Lab 3
Desktop Familiarization
- Text and GUI Mode
- Virtual Terminals
- GNOME and KDE Desktop
Course Content
3. Module I
Lecture/Lab 4 & 5
UNIX Shell
UNIX Commands
Shell Commands
- File System Management
- File Management and Viewing
- Help, Job and Process Management
- Network Management
- System Management
- User Management
- Printing and Programming
- Document Preparation
- Miscellaneous
Lecture/Lab 6
System Initialization and Services
- Boot Sequence, Runlevels & Daemon Processes
User Administration
- User Creation/ Suspension & Deletion
- Group Administration
Course Content
4. Module I
Lecture/Lab 7
Network Configuration
- Configuration Utilities
- Multiple NICs
Task Schedulers
- cron daemons
Disk quota management
Backup and Restore
Lecture/Lab 8
Adding and Removing Software Packages
RPM Package Management
Setting Printer
System Monitoring
- File System Analysis
- System Log Files & Analysis
System Troubleshooting
- Filesystem Corruption and Recovery
- Things to check: The X Window System
- Service, Networking & Booting
- The Rescue Environment
- Recovery Runlevels, Boot Floppies
Course Content
5. Module II
Lecture/Lab 9
DHCP
- Server setup
- Client setup
NIS
- NIS Server setup
- NIS Clinet setup
Lecture/Lab 10
NFS
- NFS Serever & Client configuration
- autofs implementation
Samba Server
- File & Print Service
Lecture/Lab 11
Basic Concept of DNS
- Implementation of BIND
- forward & reverse lookup
- DNS Directives
Course Content
6. Module II
Lecture/Lab 12
Apache Web Server
- Basic Configuration
- Name based Virtual Hosting
- Restriction through htaccess
Lecture/Lab 13
Sendmail - Mail Server
- Configuring mail service
- SMTP Server
POP3 / IMAP Server
Lecture/Lab 14
Proxy Server - Squid
- ACL for restricting access
Lecture/Lab 15
Linux System as a Router
- Setup and configuration
- Static Routing
SELinux Configuration
Firewall Using IPTables
- Filter and NAT rules
Course Content
7. Course Schedule
The complete course, including Lectures and Labs, will
be covered in 60 Hours.
The total duration of the course will be 3.5 - 4 months.
Lectures : Every Tuesday, 6:30 – 8:30 P.M
Labs : Thursday or Friday or Monday
(One batch per day), 6:30 – 8:30 P.M
Schedule
8. Grading Guidelines
Two Exams: 40% + 40%
Lab: 20%
Minimum 80% attendance and minimum 60% marks are
necessary to clear the course.
Grading
9. References
Online on the Web
The Linux Documentation Project (LDP),
http://www.tldp.org/
Mirror: http://www.iitk.ac.in/LDP
Red Hat Linux, O'Reilly
The course slides swill be available at
http://home.iitk.ac.in/~navi/sidbilinuxcourse
Course References
10. UNIX/LINUX OPERATING SYSTEM
Introduction to Unix
History of UNIX
What is LINUX
LINUX Distributions
Unix OS Structure
Unix File System
Unix Directories, Files and Inodes
Users, Groups and Permissions
Introduction to Linux
11. UNIX
Unix is a multi-user, multi-tasking operating system.
You can have many users logged into a system
simultaneously, each running many programs.
It's the kernel's job to keep each process and user
separate and to regulate access to system hardware,
including cpu, memory, disk and other I/O devices.
Introduction to Linux
12. History of UNIX
First Version was created in Bell Labs in 1969.
Some of the Bell Labs programmers who had worked
on this project, Ken Thompson, Dennis Ritchie, Rudd
Canaday, and Doug McIlroy designed and
implemented the first version of the Unix File System
on a PDP-7 along with a few utilities. It was given the
name UNIX by Brian Kernighan.
00:00:00 Hours, Jan 1, 1970 is time zero for UNIX. It is
also called as epoch.
Introduction to Linux
13. History of UNIX
1973 Unix is re-written mostly in C, a new language
developed by Dennis Ritchie.
Being written in this high-level language greatly
decreased the effort needed to port it to new
machines.
Introduction to Linux
14. History of UNIX
1977 There were about 500 Unix sites world-wide.
1980 BSD 4.1 (Berkeley Software Development)
1983 SunOS, BSD 4.2, System V
1988 AT&T and Sun Microsystems jointly develop
System V Release 4 (SVR4). This later developed into
UnixWare and Solaris 2.
1991 Linux was originated.
Introduction to Linux
15. What is LINUX
Linux is a free Unix-type operating system originally
created by Linus Torvalds with the assistance of
developers around the world.
It originated in 1991 as a personal project of Linus
Torvalds, a Finnish graduate student.
The Kernel version 1.0 was released in 1994 and today
the most recent stable version is 2.6.9
Developed under the GNU General Public License , the
source code for Linux is freely available to everyone.
Introduction to Linux
16. LINUX Distributions
Mandrake: http://www.mandrakesoft.com/
RedHat: http://www.redhat.com/
Fedora: http://fedora.redhat.com/
SuSE/Novell: http://www.suse.com/
Debian: http://www.debian.org/
Red Hat Enterprise Linux is a Enterprise targeted Operating
System. It based on mature Open Source technology and
available at a cost with one year Red Hat Network
subscription for upgrade and support contract.
Introduction to Linux
19. File System
The Unix file system looks like an inverted tree
structure.
You start with the root directory, denoted by /, at the
top and work down through sub-directories
underneath it.
Introduction to Linux
20. File System
Each node is either a file or a directory of files, where
the latter can contain other files and directories.
You specify a file or directory by its path name, either
the full, or absolute, path name or the one relative to a
location.
The full path name starts with the root, /, and follows
the branches of the file system, each separated by /,
until you reach the desired file, e.g.:
/home/condron/source/xntp
Introduction to Linux
21. File System
A relative path name specifies the path relative to
another, usually the current working directory that you
are at. Two special directories :
. the current directory
.. the parent of the current directory
So if I'm at /home/frank and wish to specify the path
above in a relative fashion I could use:
../condron/source/xntp
This indicates that I should first go up one directory
level, then come down through the condron directory,
followed by the source directory and then to xntp.
Introduction to Linux
22. Structure of Standard Directories in
Unix/Linux
/ The ancestor of all directories on the system; all other
directories are subdirectories of this directory, either
directly or through other subdirectories.
/bin Essential tools and other programs (or binaries).
/dev Files representing the system's various hardware
devices. For example, you use the file `/dev/cdrom' to
access the CD−ROM drive.
/etc Miscellaneous system configuration files, startup
files, etc.
Introduction to Linux
23. Structure of Standard Directories in
Unix/Linux
/home The home directories for all of the system's
users.
/lib Essential system library files used by tools in `/bin'.
/proc Files that give information about current system
processes.
/root The superuser's home directory, whose username
is root. (In the past, the home directory for the
superuser was simply `/'; later, `/root' was adopted for
this purpose to reduce clutter in `/'.)
Introduction to Linux
24. Structure of Standard Directories in
Unix/Linux
/sbin Essential system administrator tools, or system
binaries.
/tmp Temporary files.
/usr Subdirectories with files related to user tools and
applications.
Introduction to Linux
25. Directories, Files and Inodes
Introduction to Linux
Every directory and file is listed in its parent
directory.
In the case of the root directory, that parent is itself.
A directory is a file that contains a table listing the
files contained within it, giving file names to the
inode numbers in the list.
The information about all the files and directories is
maintained in INODE TABLE
An Inode (Index Nodes) is an entry in the table
containing information about a file (metadata)
including file permissions, UID, GID, size, time
stamp, pointers to files data blocks on the disk etc.
26. Users, Groups and Access Permissions
Introduction to Linux
In UNIX/LINUX, there is a concept of user and an
associated group
The system determines whether or not a user or
group can access a file or program based on the
permissions assigned to them.
Apart from all the users, there is a special user
called Super User or the root which has permission
to access any file and directory
27. Access Permissions
Introduction to Linux
There are three permissions for any file, directory
or application program.
The following lists the symbols used to denote
each, along with a brief description:
r — Indicates that a given category of user can
read a file.
w — Indicates that a given category of user can
write to a file.
x — Indicates that a given category of user can
execute the file.
28. Access Permissions
Introduction to Linux
Each of the three permissions are assigned to
three defined categories of users.
The categories are:
owner — The owner of the file or
application.
group — The group that owns the file or
application.
others — All users with access to the
system.
29. Access Permissions
Introduction to Linux
One can easily view the permissions for a file by
invoking a long format listing using the command
ls -l.
For instance, if the user juan creates an executable
file named test, the output of the command ls -l test
would look like this:
-rwxrwxr-x 1 juan student 0 Sep 26 12:25 test
30. Access Permissions
Introduction to Linux
The permissions for this file are listed are listed at
the start of the line, starting with rwx.
This first set of symbols define owner access.
The next set of rwx symbols define group access
The last set of symbols defining access permitted
for all other users.
31. Access Permissions
Introduction to Linux
This listing indicates that the file is readable,
writable, and executable by the user who owns the
file (user juan) as well as the group owning the file
(which is a group named student).
The file is also world-readable and world-
executable, but not world-writable.
32. Listing the Content of a Directory
Introduction to Linux
ls is used to list the contents of a directory.
If the command ls is written with parameter –l then
the command lists contents of the working
directory with details. Example:
$ ls –l
33. Moving in Directories
Introduction to Linux
cd try_it
Changes the directory to try_it
pwd
Prints present working directory (e.g.
/home/smith/try_it)
cd .. Move to superior directory
pwd : Prints /home/smith
cd /home The absolute path
pwd : Prints /home
cd The system is returned to the user home
directory
pwd : Print /home/smith
34. Make Directory
Introduction to Linux
The command mkdir my_dir
makes new directory my_dir (the path is given
relative) as a subdirectory of the current directory.
36. Copy File
Introduction to Linux
The command cp file_1 file_2
copies file_1 to file_2. The both files must be in the
same working directory. If they are in various
directories, the path must be given.
37. Rename and/or Move the File
Introduction to Linux
The command mv file_1 file_2
moves file_1 to file_2
The both files must be in the same working
directory.
If they are in different directories, the path must be
given.
The file_1 is removed from the disk.
38. Remove File
Introduction to Linux
The command rm file_a
removes the file_a from the system
If you use wildcard. For example
rm h*c
you will remove all files beginning with h and
ending with c which are in working directory.
If you write
rm *
you will erase all files from your working directory.
39. Access Permission of File/Directory
Introduction to Linux
The ownership of the file or directory can be
changed using the command
chown <owner> <file/directory name>
The group of the file or directory can be changed
using the command
chgrp <group> <file/directory name>
The permissions of the file can be changed using
chmod command
chmod -R ### <filename or directory>
-R is optional and when used with directories will
traverse all the sub-directories of the target
directory changing ALL the permissions to ###.
41. Assignment
Introduction to Linux
Login as guest (password is guest)
Find the present Directory
Write the root directory structure
Write a few commands available in /bin and /sbin directory
Find the guest directory
Write the permissions of guest directory
Create a new Directory test in guest directory
Copy the file /etc/resolv.conf in test directory
Rename the test directory to testing
Delete the testing directory
Change the permissions of guest directory to 700
Change the permissions of /tmp directory to 700