SlideShare a Scribd company logo
Chapter 9:  Networking with Unix and Linux Network+ Guide to Networks
Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
Objectives: (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
A Brief History of UNIX AT&T Source code System V. BSD (Berkeley Software Distribution) The SCO Group The Open Group
Varieties of UNIX UNIX features: Multiple, simultaneously logged on users Multiple, simultaneously running tasks Mount disk partitions upon demand Permissions for file and directory access Uniform method of issuing or receiving data from hardware devices, files, and running programs
Varieties of UNIX (continued) UNIX features: The ability to start a program without interfering with a currently running program Hundreds of subsystems, including dozens of programming languages Source code portability Window interfaces that the user can configure, the most popular of which is the X Window system
Varieties of UNIX (continued) Proprietary UNIX Licensed copy from The SCO Group Popular Vendors Sun Microsystems--Solaris IBM--AIX HP--HP-UX,
Varieties of UNIX (continued) Proprietary UNIX Proprietary UNIX system advantages: Accountability and support Optimization of hardware and software Predictability and compatibility One drawback No access to the system’s source code
Open Source UNIX  Open Source UNIX Open source software or Freely distributable software GNU BSD Linux
Open Source UNIX (continued) Open Source UNIX Primary advantage Cost Users can modify its code Freely distributable Run not only on Intel-based processors, but also on other processor brands
Why Choose Linux? What considerations: Is it compatible with my existing infrastructure? Will it provide the security required by my resources? Can my technical staff manage it effectively? Will my applications run smoothly on it? Will it accommodate future growth (is it scalable)?
Why Choose Linux? (continued) What considerations: (cont.) Does it support the additional services required by my users? Does it fit my budget? What additional training will it require? Can I count on competent and consistent support from its manufacturer?
Linux Server Hardware Requirements Table 9-1 shows the minimum hardware requirements for the various components of a Linux server.  Hardware compatibility list (HCL) at www.tldp.org/HOWTO/Hardware-HOWTO/.
Linux Server Hardware Requirements (continued)
Linux Server Hardware Requirements (continued) What additional hardware your server may require: Which applications and services will run How many users  How much random access memory (RAM)  How much secondary storage (hard disk)
A Closer Look at Linux Linux Multiprocessing In addition to processes, Linux also supports threads Allocates separate resources (such as memory space) to each process as it is created Symmetric multiprocessing (SMP)
A Closer Look at Linux (continued) The Linux Memory Model Use both physical and virtual memory efficiently Allocates a memory area for each application Attempts to decrease the inefficiency of this practice, however, by sharing memory between programs wherever it can
A Closer Look at Linux (continued) The Linux Kernel Kernel Core of the Linux system Kernel module Instructions for performing a specific task
A Closer Look at Linux (continued) Linux File and Directory Structure Hierarchical file system UNIX system was one of the first to implement Method of organizing files and directories on a disk in which directories may contain files and other directories Most operating systems use hierarchical file systems
A Closer Look at Linux (continued)
A Closer Look at Linux (continued) Linux File Services Native file system type, called ext3 Allows you to access DOS FAT as well as NTFS Can both attach shared file systems and share local partitions with other users Windows or NetWare Network File System (NFS)
A Closer Look at Linux (continued) Linux Internet Services UNIX-based systems have deep roots in Internet services Leading Internet Web server is an open source software application called Apache Original Web tools—including the first browsers and servers—were developed on UNIX-based systems Full range of Internet services as standard components
A Linux Command Sampler The command line is the primary method of interacting with a Linux system Command interpreter Shell
A Linux Command Sampler (continued) Manual pages (Online documentation) Section 1 covers the commands that you most typically enter while typing in a command window. Sections 2 through 5 document the programmer’s interface to the Linux system. Section 6 documents some of the amusements and games that are included in the Linux system.
A Linux Command Sampler (continued) Manual pages (Online documentation) Section 7 describes the device drivers for the system. Section 8 covers the commands used by administrators to manage the system. Section 9 documents the Linux kernel functions programmers use when writing device drivers.
A Linux Command Sampler (continued)
A Linux Command Sampler (continued)
A Linux Command Sampler (continued) Command ls (with -l) Learn everything about a file except its contents: The filename The file size (in bytes) The date and time that the file was created The date and time that the file was last accessed (viewed or printed)
A Linux Command Sampler (continued) Command ls (with -l) (cont.) The date and time that the file contents were last modified  The number of “aliases” or links to the file The numeric identifier of the user who owns the file The numeric identifier of the group to which the file belongs The access rights for the owner, the group, and all others
A Linux Command Sampler (continued)
A Linux Command Sampler (continued) Command ls (with -l) (cont.) Files with a type of “d” are directories “ -” are regular files such as word-processing files or spreadsheet files “ l” for symbolic link files “ b” for block device files “ c” for character device files
A Linux Command Sampler (continued)
Planning for Installation Answer the following questions: What is the new server’s name? What is the server’s IP address? What kind of video card is installed in the server? What do you want the administrative user’s password to be? How can I remember all of this information?
Installing and Configuring a Red Hat Linux Server Step by step Select the language the system will use Confirm the keyboard layout Confirm your mouse type Select disk drive partitioning options Choose booting options
Installing and Configuring a Red Hat Linux Server (continued) Step by step (cont.) Configure the network interface (or interfaces) Configure the network firewall options Add support for additional languages Set the time and time zone Enter (and confirm) the root (administrator) password
Configuring Linux for Network Administration The basics of adding users and groups The basics of modifying file access permissions Two commands:  groupadd useradd.
Configuring Linux for Network Administration (continued)
Configuring Linux for Network Administration  (continued) To add group IDs to your Linux system: Type  groupadd   instructors  and then press  Enter  at the command prompt. The group instructors is added. Type  groupadd   students  and then press  Enter . The group students is added. Type  groupadd   administrators  and then press  Enter . The group administrators is added.
Configuring Linux for Network Administration (continued) To add a new user and assign the user a password: Type  useradd –g users –G instructors   thomas  and then press  Enter  to add a new user account named thomas. Type  passwd   thomas  and then press Enter.
Configuring Linux for Network Administration (continued) Linux prompts you to type the new password.  Linux prompts you to retype your password. Enter the same password again; this confirmation helps ensure that you type your new password accurately.
Configuring Linux for Network Administration (continued) Changing File Access Permissions To create a directory and assign it to a group If you are still logged on to your Linux system, log off by typing  exit  and then pressing  Enter. To log back on to your system as user thomas, type  thomas  at the login prompt and then press  Enter .
Configuring Linux for Network Administration (continued) Type the password you assigned for thomas and then press  Enter . You see a command window and a command prompt. To create the new directory, type  mkdir   PROGRAMS  and then press  Enter .
Configuring Linux for Network Administration (continued) Type  ls -l  and then press  Enter . Notice that the directory belongs to the group users. That’s because the primary group to which the user thomas belongs is users. Type  chgrp   instructors   PROGRAMS  and then press  Enter  to assign ownership of the PROGRAMS directory to the group instructors.
Configuring Linux for Network Administration (continued) Type  ls -l  and then press  Enter . Notice that the directory is now assigned to the group instructors.
Configuring Linux for Network Administration (continued) To change the access permissions for the PROGRAMS directory: Log on as the user  thomas  (whose primary directory is  instructors ). Type  chmod   g+w   PROGRAMS  and then press  Enter . This command adds write access for the instructors group to the directory PROGRAMS. Next, you will remove read and write access to the PROGRAMS directory for all others. To do so, type  chmod   o-rw PROGRAMS  and then press  Enter .
Configuring Linux for Network Administration (continued) Type  ls   -l  and then press  Enter  to view the access permissions assigned to PROGRAMS.You should see a line for PROGRAMS that includes permissions of drwxrwx--x.
Internetworking with Other Network Operating Systems Samba Communicates with Windows servers WINE Enables Windows programs to run on Linux VMware Emulates a complete Intel-based computer Telnet
Internetworking with Other Network Operating Systems (continued)
Internetworking with Other Network Operating Systems (continued)
Chapter summary Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
Chapter summary (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
Ad

Recommended

Ch01
Ch01
Mike Qaissaunee
 
Linux administration classes in mumbai
Linux administration classes in mumbai
Vibrant Technologies & Computers
 
Introduction to linux
Introduction to linux
nanocdac
 
Gnu study guide linux admin 1 (lab work lpi 101) v 0.2
Gnu study guide linux admin 1 (lab work lpi 101) v 0.2
Acácio Oliveira
 
01 t1 s2_linux_lesson1
01 t1 s2_linux_lesson1
Niit Care
 
Linux practicals T.Y.B.ScIT
Linux practicals T.Y.B.ScIT
vignesh0009
 
Linux fundamentals
Linux fundamentals
Raghu nath
 
Red hat linux essentials
Red hat linux essentials
Haitham Raik
 
basic linux command (questions)
basic linux command (questions)
Sukhraj Singh
 
Linux fundamentals Training
Linux fundamentals Training
Love Steven
 
Ch02
Ch02
Mike Qaissaunee
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics Workshop
Setor Amuzu
 
Introduction to unix
Introduction to unix
sudheer yathagiri
 
Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on Eduonix
Paddy Lock
 
Linux: Basics OF Linux
Linux: Basics OF Linux
Omkar Walavalkar
 
Introduction to Linux
Introduction to Linux
Harish R
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
Prakriti Dubey
 
A beginners introduction to unix
A beginners introduction to unix
zafarali1981
 
Introduction about linux
Introduction about linux
ABHISHEK KUMAR
 
Linux course details
Linux course details
cisco training
 
Unix ppt
Unix ppt
Dr Rajiv Srivastava
 
Unix features, posix and single unix specification
Unix features, posix and single unix specification
sudha rani
 
UNIX Operating System ppt
UNIX Operating System ppt
OECLIB Odisha Electronics Control Library
 
Linux administration
Linux administration
Yogesh Ks
 
Linux administration training from hyderabad
Linux administration training from hyderabad
FuturePoint Technologies
 
Unix fundamentals
Unix fundamentals
Dima Gomaa
 
Chapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Presentation1 linux os
Presentation1 linux os
joycoronado
 
The prophet's wives
The prophet's wives
Raja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
Raja Waseem Akhtar
 

More Related Content

What's hot (20)

basic linux command (questions)
basic linux command (questions)
Sukhraj Singh
 
Linux fundamentals Training
Linux fundamentals Training
Love Steven
 
Ch02
Ch02
Mike Qaissaunee
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics Workshop
Setor Amuzu
 
Introduction to unix
Introduction to unix
sudheer yathagiri
 
Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on Eduonix
Paddy Lock
 
Linux: Basics OF Linux
Linux: Basics OF Linux
Omkar Walavalkar
 
Introduction to Linux
Introduction to Linux
Harish R
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
Prakriti Dubey
 
A beginners introduction to unix
A beginners introduction to unix
zafarali1981
 
Introduction about linux
Introduction about linux
ABHISHEK KUMAR
 
Linux course details
Linux course details
cisco training
 
Unix ppt
Unix ppt
Dr Rajiv Srivastava
 
Unix features, posix and single unix specification
Unix features, posix and single unix specification
sudha rani
 
UNIX Operating System ppt
UNIX Operating System ppt
OECLIB Odisha Electronics Control Library
 
Linux administration
Linux administration
Yogesh Ks
 
Linux administration training from hyderabad
Linux administration training from hyderabad
FuturePoint Technologies
 
Unix fundamentals
Unix fundamentals
Dima Gomaa
 
Chapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Presentation1 linux os
Presentation1 linux os
joycoronado
 
basic linux command (questions)
basic linux command (questions)
Sukhraj Singh
 
Linux fundamentals Training
Linux fundamentals Training
Love Steven
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics Workshop
Setor Amuzu
 
Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on Eduonix
Paddy Lock
 
Introduction to Linux
Introduction to Linux
Harish R
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
Prakriti Dubey
 
A beginners introduction to unix
A beginners introduction to unix
zafarali1981
 
Introduction about linux
Introduction about linux
ABHISHEK KUMAR
 
Unix features, posix and single unix specification
Unix features, posix and single unix specification
sudha rani
 
Linux administration
Linux administration
Yogesh Ks
 
Linux administration training from hyderabad
Linux administration training from hyderabad
FuturePoint Technologies
 
Unix fundamentals
Unix fundamentals
Dima Gomaa
 
Chapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Presentation1 linux os
Presentation1 linux os
joycoronado
 

Viewers also liked (20)

The prophet's wives
The prophet's wives
Raja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
Raja Waseem Akhtar
 
Chapter04 -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
Sol linux cmg-t_1_1.pptx
Sol linux cmg-t_1_1.pptx
Bob Sneed
 
Hands-on ethernet driver
Hands-on ethernet driver
SUSE Labs Taipei
 
Linux or unix interview questions
Linux or unix interview questions
Teja Bheemanapally
 
Linux Ethernet device driver
Linux Ethernet device driver
艾鍗科技
 
Networking in linux
Networking in linux
Varnnit Jain
 
Chapter11 -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
Raja Waseem Akhtar
 
Ch20 system administration
Ch20 system administration
Raja Waseem Akhtar
 
Ch05 system administration
Ch05 system administration
Raja Waseem Akhtar
 
Ch04 system administration
Ch04 system administration
Raja Waseem Akhtar
 
Ch08 system administration
Ch08 system administration
Raja Waseem Akhtar
 
Ch10
Ch10
Raja Waseem Akhtar
 
Ch12
Ch12
Raja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10 -- netware-based networking
Raja Waseem Akhtar
 
Ch24 system administration
Ch24 system administration
Raja Waseem Akhtar
 
Ch23 system administration
Ch23 system administration
Raja Waseem Akhtar
 
Ch11
Ch11
Raja Waseem Akhtar
 
Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
Raja Waseem Akhtar
 
Ad

Similar to Chapter09 -- networking with unix and linux (20)

Linux.ppt
Linux.ppt
onu9
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
RashidFaridChishti
 
PPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptx
saurabhthege
 
Unix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basi
Priyadarshini648418
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
 
prateekporwal
prateekporwal
prateekporwal
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
Linux introductory-course-day-1
Linux introductory-course-day-1
Julio Pulido
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
Devang Garach
 
cisco
cisco
edomaldo
 
3. intro
3. intro
Harsh Shrimal
 
Introduction 2 linux
Introduction 2 linux
Papu Kumar
 
linux-lecture1.ppt
linux-lecture1.ppt
Nikhil Raut
 
Linux: An Unbeaten Empire
Linux: An Unbeaten Empire
Yogesh Sharma
 
LINUX
LINUX
ARJUN
 
Test Bank for Linux+ and LPIC-1 Guide to Linux Certification, 5th Edition Jas...
Test Bank for Linux+ and LPIC-1 Guide to Linux Certification, 5th Edition Jas...
kuervoingvar25
 
Introduction to Unix
Introduction to Unix
Sudharsan S
 
Redhat Linux server administration industrial training report.
Redhat Linux server administration industrial training report.
AlokGupta336
 
Linux Administration
Linux Administration
Harish1983
 
Linux Administration
Linux Administration
harirxg
 
Linux.ppt
Linux.ppt
onu9
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
RashidFaridChishti
 
PPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptx
saurabhthege
 
Unix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basi
Priyadarshini648418
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
Linux introductory-course-day-1
Linux introductory-course-day-1
Julio Pulido
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
Devang Garach
 
Introduction 2 linux
Introduction 2 linux
Papu Kumar
 
linux-lecture1.ppt
linux-lecture1.ppt
Nikhil Raut
 
Linux: An Unbeaten Empire
Linux: An Unbeaten Empire
Yogesh Sharma
 
LINUX
LINUX
ARJUN
 
Test Bank for Linux+ and LPIC-1 Guide to Linux Certification, 5th Edition Jas...
Test Bank for Linux+ and LPIC-1 Guide to Linux Certification, 5th Edition Jas...
kuervoingvar25
 
Introduction to Unix
Introduction to Unix
Sudharsan S
 
Redhat Linux server administration industrial training report.
Redhat Linux server administration industrial training report.
AlokGupta336
 
Linux Administration
Linux Administration
Harish1983
 
Linux Administration
Linux Administration
harirxg
 
Ad

More from Raja Waseem Akhtar (20)

God is Great
God is Great
Raja Waseem Akhtar
 
Namaz ka tareeqa
Namaz ka tareeqa
Raja Waseem Akhtar
 
Aayat ul qursi
Aayat ul qursi
Raja Waseem Akhtar
 
Indiansoldiers
Indiansoldiers
Raja Waseem Akhtar
 
2ªwwii how did it fought
2ªwwii how did it fought
Raja Waseem Akhtar
 
Fun with EMC2
Fun with EMC2
Raja Waseem Akhtar
 
Discover the discovery
Discover the discovery
Raja Waseem Akhtar
 
Solaris servers sec
Solaris servers sec
Raja Waseem Akhtar
 
The OSI - seven layers
The OSI - seven layers
Raja Waseem Akhtar
 
Chapter16 - the internet and its tools
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05 -- networking hardware
Raja Waseem Akhtar
 
Chapter03 a - network media
Chapter03 a - network media
Raja Waseem Akhtar
 
Chapter16 - the internet and its tools
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05 -- networking hardware
Raja Waseem Akhtar
 

Recently uploaded (20)

Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
Edge AI and Vision Alliance
 
Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025
Safe Software
 
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
Edge AI and Vision Alliance
 
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Safe Software
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
High Availability On-Premises FME Flow.pdf
High Availability On-Premises FME Flow.pdf
Safe Software
 
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
Safe Software
 
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
 
Artificial Intelligence in the Nonprofit Boardroom.pdf
Artificial Intelligence in the Nonprofit Boardroom.pdf
OnBoard
 
Kubernetes Security Act Now Before It’s Too Late
Kubernetes Security Act Now Before It’s Too Late
Michael Furman
 
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
Safe Software
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
Safe Software
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Viral>Wondershare Filmora 14.5.18.12900 Crack Free Download
Puppy jhon
 
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
“Why It’s Critical to Have an Integrated Development Methodology for Edge AI,...
Edge AI and Vision Alliance
 
Mastering AI Workflows with FME - Peak of Data & AI 2025
Mastering AI Workflows with FME - Peak of Data & AI 2025
Safe Software
 
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
“Addressing Evolving AI Model Challenges Through Memory and Storage,” a Prese...
Edge AI and Vision Alliance
 
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Reducing Conflicts and Increasing Safety Along the Cycling Networks of East-F...
Safe Software
 
OWASP Barcelona 2025 Threat Model Library
OWASP Barcelona 2025 Threat Model Library
PetraVukmirovic
 
Data Validation and System Interoperability
Data Validation and System Interoperability
Safe Software
 
Bridging the divide: A conversation on tariffs today in the book industry - T...
Bridging the divide: A conversation on tariffs today in the book industry - T...
BookNet Canada
 
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance Seminar State of Passkeys.pptx
FIDO Alliance
 
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
“Key Requirements to Successfully Implement Generative AI in Edge Devices—Opt...
Edge AI and Vision Alliance
 
High Availability On-Premises FME Flow.pdf
High Availability On-Premises FME Flow.pdf
Safe Software
 
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
No-Code Workflows for CAD & 3D Data: Scaling AI-Driven Infrastructure
Safe Software
 
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
FME for Distribution & Transmission Integrity Management Program (DIMP & TIMP)
Safe Software
 
Artificial Intelligence in the Nonprofit Boardroom.pdf
Artificial Intelligence in the Nonprofit Boardroom.pdf
OnBoard
 
Kubernetes Security Act Now Before It’s Too Late
Kubernetes Security Act Now Before It’s Too Late
Michael Furman
 
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
FME for Good: Integrating Multiple Data Sources with APIs to Support Local Ch...
Safe Software
 
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Creating Inclusive Digital Learning with AI: A Smarter, Fairer Future
Impelsys Inc.
 
AI vs Human Writing: Can You Tell the Difference?
AI vs Human Writing: Can You Tell the Difference?
Shashi Sathyanarayana, Ph.D
 
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...
Safe Software
 
MuleSoft for AgentForce : Topic Center and API Catalog
MuleSoft for AgentForce : Topic Center and API Catalog
shyamraj55
 

Chapter09 -- networking with unix and linux

  • 1. Chapter 9: Networking with Unix and Linux Network+ Guide to Networks
  • 2. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
  • 3. Objectives: (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
  • 4. A Brief History of UNIX AT&T Source code System V. BSD (Berkeley Software Distribution) The SCO Group The Open Group
  • 5. Varieties of UNIX UNIX features: Multiple, simultaneously logged on users Multiple, simultaneously running tasks Mount disk partitions upon demand Permissions for file and directory access Uniform method of issuing or receiving data from hardware devices, files, and running programs
  • 6. Varieties of UNIX (continued) UNIX features: The ability to start a program without interfering with a currently running program Hundreds of subsystems, including dozens of programming languages Source code portability Window interfaces that the user can configure, the most popular of which is the X Window system
  • 7. Varieties of UNIX (continued) Proprietary UNIX Licensed copy from The SCO Group Popular Vendors Sun Microsystems--Solaris IBM--AIX HP--HP-UX,
  • 8. Varieties of UNIX (continued) Proprietary UNIX Proprietary UNIX system advantages: Accountability and support Optimization of hardware and software Predictability and compatibility One drawback No access to the system’s source code
  • 9. Open Source UNIX Open Source UNIX Open source software or Freely distributable software GNU BSD Linux
  • 10. Open Source UNIX (continued) Open Source UNIX Primary advantage Cost Users can modify its code Freely distributable Run not only on Intel-based processors, but also on other processor brands
  • 11. Why Choose Linux? What considerations: Is it compatible with my existing infrastructure? Will it provide the security required by my resources? Can my technical staff manage it effectively? Will my applications run smoothly on it? Will it accommodate future growth (is it scalable)?
  • 12. Why Choose Linux? (continued) What considerations: (cont.) Does it support the additional services required by my users? Does it fit my budget? What additional training will it require? Can I count on competent and consistent support from its manufacturer?
  • 13. Linux Server Hardware Requirements Table 9-1 shows the minimum hardware requirements for the various components of a Linux server. Hardware compatibility list (HCL) at www.tldp.org/HOWTO/Hardware-HOWTO/.
  • 14. Linux Server Hardware Requirements (continued)
  • 15. Linux Server Hardware Requirements (continued) What additional hardware your server may require: Which applications and services will run How many users How much random access memory (RAM) How much secondary storage (hard disk)
  • 16. A Closer Look at Linux Linux Multiprocessing In addition to processes, Linux also supports threads Allocates separate resources (such as memory space) to each process as it is created Symmetric multiprocessing (SMP)
  • 17. A Closer Look at Linux (continued) The Linux Memory Model Use both physical and virtual memory efficiently Allocates a memory area for each application Attempts to decrease the inefficiency of this practice, however, by sharing memory between programs wherever it can
  • 18. A Closer Look at Linux (continued) The Linux Kernel Kernel Core of the Linux system Kernel module Instructions for performing a specific task
  • 19. A Closer Look at Linux (continued) Linux File and Directory Structure Hierarchical file system UNIX system was one of the first to implement Method of organizing files and directories on a disk in which directories may contain files and other directories Most operating systems use hierarchical file systems
  • 20. A Closer Look at Linux (continued)
  • 21. A Closer Look at Linux (continued) Linux File Services Native file system type, called ext3 Allows you to access DOS FAT as well as NTFS Can both attach shared file systems and share local partitions with other users Windows or NetWare Network File System (NFS)
  • 22. A Closer Look at Linux (continued) Linux Internet Services UNIX-based systems have deep roots in Internet services Leading Internet Web server is an open source software application called Apache Original Web tools—including the first browsers and servers—were developed on UNIX-based systems Full range of Internet services as standard components
  • 23. A Linux Command Sampler The command line is the primary method of interacting with a Linux system Command interpreter Shell
  • 24. A Linux Command Sampler (continued) Manual pages (Online documentation) Section 1 covers the commands that you most typically enter while typing in a command window. Sections 2 through 5 document the programmer’s interface to the Linux system. Section 6 documents some of the amusements and games that are included in the Linux system.
  • 25. A Linux Command Sampler (continued) Manual pages (Online documentation) Section 7 describes the device drivers for the system. Section 8 covers the commands used by administrators to manage the system. Section 9 documents the Linux kernel functions programmers use when writing device drivers.
  • 26. A Linux Command Sampler (continued)
  • 27. A Linux Command Sampler (continued)
  • 28. A Linux Command Sampler (continued) Command ls (with -l) Learn everything about a file except its contents: The filename The file size (in bytes) The date and time that the file was created The date and time that the file was last accessed (viewed or printed)
  • 29. A Linux Command Sampler (continued) Command ls (with -l) (cont.) The date and time that the file contents were last modified The number of “aliases” or links to the file The numeric identifier of the user who owns the file The numeric identifier of the group to which the file belongs The access rights for the owner, the group, and all others
  • 30. A Linux Command Sampler (continued)
  • 31. A Linux Command Sampler (continued) Command ls (with -l) (cont.) Files with a type of “d” are directories “ -” are regular files such as word-processing files or spreadsheet files “ l” for symbolic link files “ b” for block device files “ c” for character device files
  • 32. A Linux Command Sampler (continued)
  • 33. Planning for Installation Answer the following questions: What is the new server’s name? What is the server’s IP address? What kind of video card is installed in the server? What do you want the administrative user’s password to be? How can I remember all of this information?
  • 34. Installing and Configuring a Red Hat Linux Server Step by step Select the language the system will use Confirm the keyboard layout Confirm your mouse type Select disk drive partitioning options Choose booting options
  • 35. Installing and Configuring a Red Hat Linux Server (continued) Step by step (cont.) Configure the network interface (or interfaces) Configure the network firewall options Add support for additional languages Set the time and time zone Enter (and confirm) the root (administrator) password
  • 36. Configuring Linux for Network Administration The basics of adding users and groups The basics of modifying file access permissions Two commands: groupadd useradd.
  • 37. Configuring Linux for Network Administration (continued)
  • 38. Configuring Linux for Network Administration (continued) To add group IDs to your Linux system: Type groupadd instructors and then press Enter at the command prompt. The group instructors is added. Type groupadd students and then press Enter . The group students is added. Type groupadd administrators and then press Enter . The group administrators is added.
  • 39. Configuring Linux for Network Administration (continued) To add a new user and assign the user a password: Type useradd –g users –G instructors thomas and then press Enter to add a new user account named thomas. Type passwd thomas and then press Enter.
  • 40. Configuring Linux for Network Administration (continued) Linux prompts you to type the new password. Linux prompts you to retype your password. Enter the same password again; this confirmation helps ensure that you type your new password accurately.
  • 41. Configuring Linux for Network Administration (continued) Changing File Access Permissions To create a directory and assign it to a group If you are still logged on to your Linux system, log off by typing exit and then pressing Enter. To log back on to your system as user thomas, type thomas at the login prompt and then press Enter .
  • 42. Configuring Linux for Network Administration (continued) Type the password you assigned for thomas and then press Enter . You see a command window and a command prompt. To create the new directory, type mkdir PROGRAMS and then press Enter .
  • 43. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter . Notice that the directory belongs to the group users. That’s because the primary group to which the user thomas belongs is users. Type chgrp instructors PROGRAMS and then press Enter to assign ownership of the PROGRAMS directory to the group instructors.
  • 44. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter . Notice that the directory is now assigned to the group instructors.
  • 45. Configuring Linux for Network Administration (continued) To change the access permissions for the PROGRAMS directory: Log on as the user thomas (whose primary directory is instructors ). Type chmod g+w PROGRAMS and then press Enter . This command adds write access for the instructors group to the directory PROGRAMS. Next, you will remove read and write access to the PROGRAMS directory for all others. To do so, type chmod o-rw PROGRAMS and then press Enter .
  • 46. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter to view the access permissions assigned to PROGRAMS.You should see a line for PROGRAMS that includes permissions of drwxrwx--x.
  • 47. Internetworking with Other Network Operating Systems Samba Communicates with Windows servers WINE Enables Windows programs to run on Linux VMware Emulates a complete Intel-based computer Telnet
  • 48. Internetworking with Other Network Operating Systems (continued)
  • 49. Internetworking with Other Network Operating Systems (continued)
  • 50. Chapter summary Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
  • 51. Chapter summary (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems