SlideShare a Scribd company logo
Chapter 9:  Networking with Unix and Linux Network+ Guide to Networks
Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
Objectives: (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
A Brief History of UNIX AT&T Source code System V. BSD (Berkeley Software Distribution) The SCO Group The Open Group
Varieties of UNIX UNIX features: Multiple, simultaneously logged on users Multiple, simultaneously running tasks Mount disk partitions upon demand Permissions for file and directory access Uniform method of issuing or receiving data from hardware devices, files, and running programs
Varieties of UNIX (continued) UNIX features: The ability to start a program without interfering with a currently running program Hundreds of subsystems, including dozens of programming languages Source code portability Window interfaces that the user can configure, the most popular of which is the X Window system
Varieties of UNIX (continued) Proprietary UNIX Licensed copy from The SCO Group Popular Vendors Sun Microsystems--Solaris IBM--AIX HP--HP-UX,
Varieties of UNIX (continued) Proprietary UNIX Proprietary UNIX system advantages: Accountability and support Optimization of hardware and software Predictability and compatibility One drawback No access to the system’s source code
Open Source UNIX  Open Source UNIX Open source software or Freely distributable software GNU BSD Linux
Open Source UNIX (continued) Open Source UNIX Primary advantage Cost Users can modify its code Freely distributable Run not only on Intel-based processors, but also on other processor brands
Why Choose Linux? What considerations: Is it compatible with my existing infrastructure? Will it provide the security required by my resources? Can my technical staff manage it effectively? Will my applications run smoothly on it? Will it accommodate future growth (is it scalable)?
Why Choose Linux? (continued) What considerations: (cont.) Does it support the additional services required by my users? Does it fit my budget? What additional training will it require? Can I count on competent and consistent support from its manufacturer?
Linux Server Hardware Requirements Table 9-1 shows the minimum hardware requirements for the various components of a Linux server.  Hardware compatibility list (HCL) at www.tldp.org/HOWTO/Hardware-HOWTO/.
Linux Server Hardware Requirements (continued)
Linux Server Hardware Requirements (continued) What additional hardware your server may require: Which applications and services will run How many users  How much random access memory (RAM)  How much secondary storage (hard disk)
A Closer Look at Linux Linux Multiprocessing In addition to processes, Linux also supports threads Allocates separate resources (such as memory space) to each process as it is created Symmetric multiprocessing (SMP)
A Closer Look at Linux (continued) The Linux Memory Model Use both physical and virtual memory efficiently Allocates a memory area for each application Attempts to decrease the inefficiency of this practice, however, by sharing memory between programs wherever it can
A Closer Look at Linux (continued) The Linux Kernel Kernel Core of the Linux system Kernel module Instructions for performing a specific task
A Closer Look at Linux (continued) Linux File and Directory Structure Hierarchical file system UNIX system was one of the first to implement Method of organizing files and directories on a disk in which directories may contain files and other directories Most operating systems use hierarchical file systems
A Closer Look at Linux (continued)
A Closer Look at Linux (continued) Linux File Services Native file system type, called ext3 Allows you to access DOS FAT as well as NTFS Can both attach shared file systems and share local partitions with other users Windows or NetWare Network File System (NFS)
A Closer Look at Linux (continued) Linux Internet Services UNIX-based systems have deep roots in Internet services Leading Internet Web server is an open source software application called Apache Original Web tools—including the first browsers and servers—were developed on UNIX-based systems Full range of Internet services as standard components
A Linux Command Sampler The command line is the primary method of interacting with a Linux system Command interpreter Shell
A Linux Command Sampler (continued) Manual pages (Online documentation) Section 1 covers the commands that you most typically enter while typing in a command window. Sections 2 through 5 document the programmer’s interface to the Linux system. Section 6 documents some of the amusements and games that are included in the Linux system.
A Linux Command Sampler (continued) Manual pages (Online documentation) Section 7 describes the device drivers for the system. Section 8 covers the commands used by administrators to manage the system. Section 9 documents the Linux kernel functions programmers use when writing device drivers.
A Linux Command Sampler (continued)
A Linux Command Sampler (continued)
A Linux Command Sampler (continued) Command ls (with -l) Learn everything about a file except its contents: The filename The file size (in bytes) The date and time that the file was created The date and time that the file was last accessed (viewed or printed)
A Linux Command Sampler (continued) Command ls (with -l) (cont.) The date and time that the file contents were last modified  The number of “aliases” or links to the file The numeric identifier of the user who owns the file The numeric identifier of the group to which the file belongs The access rights for the owner, the group, and all others
A Linux Command Sampler (continued)
A Linux Command Sampler (continued) Command ls (with -l) (cont.) Files with a type of “d” are directories “ -” are regular files such as word-processing files or spreadsheet files “ l” for symbolic link files “ b” for block device files “ c” for character device files
A Linux Command Sampler (continued)
Planning for Installation Answer the following questions: What is the new server’s name? What is the server’s IP address? What kind of video card is installed in the server? What do you want the administrative user’s password to be? How can I remember all of this information?
Installing and Configuring a Red Hat Linux Server Step by step Select the language the system will use Confirm the keyboard layout Confirm your mouse type Select disk drive partitioning options Choose booting options
Installing and Configuring a Red Hat Linux Server (continued) Step by step (cont.) Configure the network interface (or interfaces) Configure the network firewall options Add support for additional languages Set the time and time zone Enter (and confirm) the root (administrator) password
Configuring Linux for Network Administration The basics of adding users and groups The basics of modifying file access permissions Two commands:  groupadd useradd.
Configuring Linux for Network Administration (continued)
Configuring Linux for Network Administration  (continued) To add group IDs to your Linux system: Type  groupadd   instructors  and then press  Enter  at the command prompt. The group instructors is added. Type  groupadd   students  and then press  Enter . The group students is added. Type  groupadd   administrators  and then press  Enter . The group administrators is added.
Configuring Linux for Network Administration (continued) To add a new user and assign the user a password: Type  useradd –g users –G instructors   thomas  and then press  Enter  to add a new user account named thomas. Type  passwd   thomas  and then press Enter.
Configuring Linux for Network Administration (continued) Linux prompts you to type the new password.  Linux prompts you to retype your password. Enter the same password again; this confirmation helps ensure that you type your new password accurately.
Configuring Linux for Network Administration (continued) Changing File Access Permissions To create a directory and assign it to a group If you are still logged on to your Linux system, log off by typing  exit  and then pressing  Enter. To log back on to your system as user thomas, type  thomas  at the login prompt and then press  Enter .
Configuring Linux for Network Administration (continued) Type the password you assigned for thomas and then press  Enter . You see a command window and a command prompt. To create the new directory, type  mkdir   PROGRAMS  and then press  Enter .
Configuring Linux for Network Administration (continued) Type  ls -l  and then press  Enter . Notice that the directory belongs to the group users. That’s because the primary group to which the user thomas belongs is users. Type  chgrp   instructors   PROGRAMS  and then press  Enter  to assign ownership of the PROGRAMS directory to the group instructors.
Configuring Linux for Network Administration (continued) Type  ls -l  and then press  Enter . Notice that the directory is now assigned to the group instructors.
Configuring Linux for Network Administration (continued) To change the access permissions for the PROGRAMS directory: Log on as the user  thomas  (whose primary directory is  instructors ). Type  chmod   g+w   PROGRAMS  and then press  Enter . This command adds write access for the instructors group to the directory PROGRAMS. Next, you will remove read and write access to the PROGRAMS directory for all others. To do so, type  chmod   o-rw PROGRAMS  and then press  Enter .
Configuring Linux for Network Administration (continued) Type  ls   -l  and then press  Enter  to view the access permissions assigned to PROGRAMS.You should see a line for PROGRAMS that includes permissions of drwxrwx--x.
Internetworking with Other Network Operating Systems Samba Communicates with Windows servers WINE Enables Windows programs to run on Linux VMware Emulates a complete Intel-based computer Telnet
Internetworking with Other Network Operating Systems (continued)
Internetworking with Other Network Operating Systems (continued)
Chapter summary Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
Chapter summary (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
Ad

More Related Content

What's hot (20)

basic linux command (questions)
basic linux command (questions)basic linux command (questions)
basic linux command (questions)
Sukhraj Singh
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
Love Steven
 
Ch02
Ch02Ch02
Ch02
Mike Qaissaunee
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics WorkshopIntroduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics Workshop
Setor Amuzu
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
sudheer yathagiri
 
Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on EduonixLinux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on Eduonix
Paddy Lock
 
Linux: Basics OF Linux
Linux: Basics OF LinuxLinux: Basics OF Linux
Linux: Basics OF Linux
Omkar Walavalkar
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
Harish R
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
Prakriti Dubey
 
A beginners introduction to unix
A beginners introduction to unixA beginners introduction to unix
A beginners introduction to unix
zafarali1981
 
Introduction about linux
Introduction about linuxIntroduction about linux
Introduction about linux
ABHISHEK KUMAR
 
Linux course details
Linux course detailsLinux course details
Linux course details
cisco training
 
Unix ppt
Unix pptUnix ppt
Unix ppt
Dr Rajiv Srivastava
 
Unix features, posix and single unix specification
Unix features, posix and single unix specificationUnix features, posix and single unix specification
Unix features, posix and single unix specification
sudha rani
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
OECLIB Odisha Electronics Control Library
 
Linux administration
Linux administrationLinux administration
Linux administration
Yogesh Ks
 
Linux administration training from hyderabad
Linux administration training from hyderabadLinux administration training from hyderabad
Linux administration training from hyderabad
FuturePoint Technologies
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
Dima Gomaa
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
joycoronado
 
basic linux command (questions)
basic linux command (questions)basic linux command (questions)
basic linux command (questions)
Sukhraj Singh
 
Linux fundamentals Training
Linux fundamentals TrainingLinux fundamentals Training
Linux fundamentals Training
Love Steven
 
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics WorkshopIntroduction to linux at Introductory Bioinformatics Workshop
Introduction to linux at Introductory Bioinformatics Workshop
Setor Amuzu
 
Linux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on EduonixLinux Administrator - The Linux Course on Eduonix
Linux Administrator - The Linux Course on Eduonix
Paddy Lock
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
Harish R
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
Prakriti Dubey
 
A beginners introduction to unix
A beginners introduction to unixA beginners introduction to unix
A beginners introduction to unix
zafarali1981
 
Introduction about linux
Introduction about linuxIntroduction about linux
Introduction about linux
ABHISHEK KUMAR
 
Unix features, posix and single unix specification
Unix features, posix and single unix specificationUnix features, posix and single unix specification
Unix features, posix and single unix specification
sudha rani
 
Linux administration
Linux administrationLinux administration
Linux administration
Yogesh Ks
 
Linux administration training from hyderabad
Linux administration training from hyderabadLinux administration training from hyderabad
Linux administration training from hyderabad
FuturePoint Technologies
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
Dima Gomaa
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
Wayne Jones Jnr
 
Presentation1 linux os
Presentation1 linux osPresentation1 linux os
Presentation1 linux os
joycoronado
 

Viewers also liked (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
Raja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
Raja Waseem Akhtar
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
Raja Waseem Akhtar
 
Sol linux cmg-t_1_1.pptx
Sol linux cmg-t_1_1.pptxSol linux cmg-t_1_1.pptx
Sol linux cmg-t_1_1.pptx
Bob Sneed
 
Hands-on ethernet driver
Hands-on ethernet driverHands-on ethernet driver
Hands-on ethernet driver
SUSE Labs Taipei
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questions
Teja Bheemanapally
 
Linux Ethernet device driver
Linux Ethernet device driverLinux Ethernet device driver
Linux Ethernet device driver
艾鍗科技
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
Varnnit Jain
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
Raja Waseem Akhtar
 
Ch20 system administration
Ch20 system administration Ch20 system administration
Ch20 system administration
Raja Waseem Akhtar
 
Ch05 system administration
Ch05 system administration Ch05 system administration
Ch05 system administration
Raja Waseem Akhtar
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
Raja Waseem Akhtar
 
Ch08 system administration
Ch08 system administration Ch08 system administration
Ch08 system administration
Raja Waseem Akhtar
 
Ch10
Ch10Ch10
Ch10
Raja Waseem Akhtar
 
Ch12
Ch12Ch12
Ch12
Raja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
Raja Waseem Akhtar
 
Ch24 system administration
Ch24 system administration Ch24 system administration
Ch24 system administration
Raja Waseem Akhtar
 
Ch23 system administration
Ch23 system administration Ch23 system administration
Ch23 system administration
Raja Waseem Akhtar
 
Ch11
Ch11Ch11
Ch11
Raja Waseem Akhtar
 
Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
Raja Waseem Akhtar
 
Ad

Similar to Chapter09 -- networking with unix and linux (20)

Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
onu9
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and ConfigurationLinux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
RashidFaridChishti
 
PPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptxPPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptx
saurabhthege
 
Unix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basiUnix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basi
Priyadarshini648418
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
 
prateekporwal
prateekporwalprateekporwal
prateekporwal
prateekporwal
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
Linux introductory-course-day-1
Linux introductory-course-day-1Linux introductory-course-day-1
Linux introductory-course-day-1
Julio Pulido
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and GithubBasics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
Devang Garach
 
cisco
ciscocisco
cisco
edomaldo
 
3. intro
3. intro3. intro
3. intro
Harsh Shrimal
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
Papu Kumar
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.ppt
Nikhil Raut
 
Linux: An Unbeaten Empire
Linux: An Unbeaten EmpireLinux: An Unbeaten Empire
Linux: An Unbeaten Empire
Yogesh Sharma
 
LINUX
LINUXLINUX
LINUX
ARJUN
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Sudharsan S
 
Redhat Linux server administration industrial training report.
Redhat Linux server administration industrial training report.Redhat Linux server administration industrial training report.
Redhat Linux server administration industrial training report.
AlokGupta336
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
Harish1983
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
harirxg
 
IMD 203 - Ch02
IMD 203 - Ch02IMD 203 - Ch02
IMD 203 - Ch02
ALBAKRI MOHAMMAD
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
onu9
 
Linux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and ConfigurationLinux Systems Programming: Ubuntu Installation and Configuration
Linux Systems Programming: Ubuntu Installation and Configuration
RashidFaridChishti
 
PPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptxPPT of linux commands by Don Johnson.pptx
PPT of linux commands by Don Johnson.pptx
saurabhthege
 
Unix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basiUnix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basi
Priyadarshini648418
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
 
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
HISTORY, TYPES OF EMBEDDED LINUX, COMMANDS,
KesavanT10
 
Linux introductory-course-day-1
Linux introductory-course-day-1Linux introductory-course-day-1
Linux introductory-course-day-1
Julio Pulido
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and GithubBasics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
Devang Garach
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
Papu Kumar
 
linux-lecture1.ppt
linux-lecture1.pptlinux-lecture1.ppt
linux-lecture1.ppt
Nikhil Raut
 
Linux: An Unbeaten Empire
Linux: An Unbeaten EmpireLinux: An Unbeaten Empire
Linux: An Unbeaten Empire
Yogesh Sharma
 
LINUX
LINUXLINUX
LINUX
ARJUN
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
Sudharsan S
 
Redhat Linux server administration industrial training report.
Redhat Linux server administration industrial training report.Redhat Linux server administration industrial training report.
Redhat Linux server administration industrial training report.
AlokGupta336
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
Harish1983
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
harirxg
 
Ad

More from Raja Waseem Akhtar (20)

God is Great
God is GreatGod is Great
God is Great
Raja Waseem Akhtar
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
Raja Waseem Akhtar
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
Raja Waseem Akhtar
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
Raja Waseem Akhtar
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
Raja Waseem Akhtar
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
Raja Waseem Akhtar
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
Raja Waseem Akhtar
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
Raja Waseem Akhtar
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
Raja Waseem Akhtar
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
Raja Waseem Akhtar
 
Chapter03 a - network media
Chapter03 a  - network mediaChapter03 a  - network media
Chapter03 a - network media
Raja Waseem Akhtar
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
Raja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
Raja Waseem Akhtar
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
Raja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
Raja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
Raja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
Raja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
Raja Waseem Akhtar
 

Recently uploaded (20)

Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Sustainable_Development_Goals_INDIANWraa
Sustainable_Development_Goals_INDIANWraaSustainable_Development_Goals_INDIANWraa
Sustainable_Development_Goals_INDIANWraa
03ANMOLCHAURASIYA
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdfGoogle DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
derrickjswork
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural NetworksDistributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Ivan Ruchkin
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
SOFTTECHHUB
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Crazy Incentives and How They Kill Security. How Do You Turn the Wheel?
Christian Folini
 
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Integrating FME with Python: Tips, Demos, and Best Practices for Powerful Aut...
Safe Software
 
Sustainable_Development_Goals_INDIANWraa
Sustainable_Development_Goals_INDIANWraaSustainable_Development_Goals_INDIANWraa
Sustainable_Development_Goals_INDIANWraa
03ANMOLCHAURASIYA
 
Understanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdfUnderstanding SEO in the Age of AI.pdf
Understanding SEO in the Age of AI.pdf
Fulcrum Concepts, LLC
 
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdfGoogle DeepMind’s New AI Coding Agent AlphaEvolve.pdf
Google DeepMind’s New AI Coding Agent AlphaEvolve.pdf
derrickjswork
 
machines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdfmachines-for-woodworking-shops-en-compressed.pdf
machines-for-woodworking-shops-en-compressed.pdf
AmirStern2
 
React Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for SuccessReact Native for Business Solutions: Building Scalable Apps for Success
React Native for Business Solutions: Building Scalable Apps for Success
Amelia Swank
 
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural NetworksDistributionally Robust Statistical Verification with Imprecise Neural Networks
Distributionally Robust Statistical Verification with Imprecise Neural Networks
Ivan Ruchkin
 
May Patch Tuesday
May Patch TuesdayMay Patch Tuesday
May Patch Tuesday
Ivanti
 
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
OpenAI Just Announced Codex: A cloud engineering agent that excels in handlin...
SOFTTECHHUB
 
Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025Top 5 Qualities to Look for in Salesforce Partners in 2025
Top 5 Qualities to Look for in Salesforce Partners in 2025
Damco Salesforce Services
 
How Top Companies Benefit from Outsourcing
How Top Companies Benefit from OutsourcingHow Top Companies Benefit from Outsourcing
How Top Companies Benefit from Outsourcing
Nascenture
 
Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)Design pattern talk by Kaya Weers - 2025 (v2)
Design pattern talk by Kaya Weers - 2025 (v2)
Kaya Weers
 
Cybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft CertificateCybersecurity Tools and Technologies - Microsoft Certificate
Cybersecurity Tools and Technologies - Microsoft Certificate
VICTOR MAESTRE RAMIREZ
 
Master Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application IntegrationMaster Data Management - Enterprise Application Integration
Master Data Management - Enterprise Application Integration
Sherif Rasmy
 
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptxUiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
UiPath AgentHack - Build the AI agents of tomorrow_Enablement 1.pptx
anabulhac
 
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
RTP Over QUIC: An Interesting Opportunity Or Wasted Time?
Lorenzo Miniero
 
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Who's choice? Making decisions with and about Artificial Intelligence, Keele ...
Alan Dix
 
Slack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teamsSlack like a pro: strategies for 10x engineering teams
Slack like a pro: strategies for 10x engineering teams
Nacho Cougil
 
Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?Shoehorning dependency injection into a FP language, what does it take?
Shoehorning dependency injection into a FP language, what does it take?
Eric Torreborre
 

Chapter09 -- networking with unix and linux

  • 1. Chapter 9: Networking with Unix and Linux Network+ Guide to Networks
  • 2. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
  • 3. Objectives: (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
  • 4. A Brief History of UNIX AT&T Source code System V. BSD (Berkeley Software Distribution) The SCO Group The Open Group
  • 5. Varieties of UNIX UNIX features: Multiple, simultaneously logged on users Multiple, simultaneously running tasks Mount disk partitions upon demand Permissions for file and directory access Uniform method of issuing or receiving data from hardware devices, files, and running programs
  • 6. Varieties of UNIX (continued) UNIX features: The ability to start a program without interfering with a currently running program Hundreds of subsystems, including dozens of programming languages Source code portability Window interfaces that the user can configure, the most popular of which is the X Window system
  • 7. Varieties of UNIX (continued) Proprietary UNIX Licensed copy from The SCO Group Popular Vendors Sun Microsystems--Solaris IBM--AIX HP--HP-UX,
  • 8. Varieties of UNIX (continued) Proprietary UNIX Proprietary UNIX system advantages: Accountability and support Optimization of hardware and software Predictability and compatibility One drawback No access to the system’s source code
  • 9. Open Source UNIX Open Source UNIX Open source software or Freely distributable software GNU BSD Linux
  • 10. Open Source UNIX (continued) Open Source UNIX Primary advantage Cost Users can modify its code Freely distributable Run not only on Intel-based processors, but also on other processor brands
  • 11. Why Choose Linux? What considerations: Is it compatible with my existing infrastructure? Will it provide the security required by my resources? Can my technical staff manage it effectively? Will my applications run smoothly on it? Will it accommodate future growth (is it scalable)?
  • 12. Why Choose Linux? (continued) What considerations: (cont.) Does it support the additional services required by my users? Does it fit my budget? What additional training will it require? Can I count on competent and consistent support from its manufacturer?
  • 13. Linux Server Hardware Requirements Table 9-1 shows the minimum hardware requirements for the various components of a Linux server. Hardware compatibility list (HCL) at www.tldp.org/HOWTO/Hardware-HOWTO/.
  • 14. Linux Server Hardware Requirements (continued)
  • 15. Linux Server Hardware Requirements (continued) What additional hardware your server may require: Which applications and services will run How many users How much random access memory (RAM) How much secondary storage (hard disk)
  • 16. A Closer Look at Linux Linux Multiprocessing In addition to processes, Linux also supports threads Allocates separate resources (such as memory space) to each process as it is created Symmetric multiprocessing (SMP)
  • 17. A Closer Look at Linux (continued) The Linux Memory Model Use both physical and virtual memory efficiently Allocates a memory area for each application Attempts to decrease the inefficiency of this practice, however, by sharing memory between programs wherever it can
  • 18. A Closer Look at Linux (continued) The Linux Kernel Kernel Core of the Linux system Kernel module Instructions for performing a specific task
  • 19. A Closer Look at Linux (continued) Linux File and Directory Structure Hierarchical file system UNIX system was one of the first to implement Method of organizing files and directories on a disk in which directories may contain files and other directories Most operating systems use hierarchical file systems
  • 20. A Closer Look at Linux (continued)
  • 21. A Closer Look at Linux (continued) Linux File Services Native file system type, called ext3 Allows you to access DOS FAT as well as NTFS Can both attach shared file systems and share local partitions with other users Windows or NetWare Network File System (NFS)
  • 22. A Closer Look at Linux (continued) Linux Internet Services UNIX-based systems have deep roots in Internet services Leading Internet Web server is an open source software application called Apache Original Web tools—including the first browsers and servers—were developed on UNIX-based systems Full range of Internet services as standard components
  • 23. A Linux Command Sampler The command line is the primary method of interacting with a Linux system Command interpreter Shell
  • 24. A Linux Command Sampler (continued) Manual pages (Online documentation) Section 1 covers the commands that you most typically enter while typing in a command window. Sections 2 through 5 document the programmer’s interface to the Linux system. Section 6 documents some of the amusements and games that are included in the Linux system.
  • 25. A Linux Command Sampler (continued) Manual pages (Online documentation) Section 7 describes the device drivers for the system. Section 8 covers the commands used by administrators to manage the system. Section 9 documents the Linux kernel functions programmers use when writing device drivers.
  • 26. A Linux Command Sampler (continued)
  • 27. A Linux Command Sampler (continued)
  • 28. A Linux Command Sampler (continued) Command ls (with -l) Learn everything about a file except its contents: The filename The file size (in bytes) The date and time that the file was created The date and time that the file was last accessed (viewed or printed)
  • 29. A Linux Command Sampler (continued) Command ls (with -l) (cont.) The date and time that the file contents were last modified The number of “aliases” or links to the file The numeric identifier of the user who owns the file The numeric identifier of the group to which the file belongs The access rights for the owner, the group, and all others
  • 30. A Linux Command Sampler (continued)
  • 31. A Linux Command Sampler (continued) Command ls (with -l) (cont.) Files with a type of “d” are directories “ -” are regular files such as word-processing files or spreadsheet files “ l” for symbolic link files “ b” for block device files “ c” for character device files
  • 32. A Linux Command Sampler (continued)
  • 33. Planning for Installation Answer the following questions: What is the new server’s name? What is the server’s IP address? What kind of video card is installed in the server? What do you want the administrative user’s password to be? How can I remember all of this information?
  • 34. Installing and Configuring a Red Hat Linux Server Step by step Select the language the system will use Confirm the keyboard layout Confirm your mouse type Select disk drive partitioning options Choose booting options
  • 35. Installing and Configuring a Red Hat Linux Server (continued) Step by step (cont.) Configure the network interface (or interfaces) Configure the network firewall options Add support for additional languages Set the time and time zone Enter (and confirm) the root (administrator) password
  • 36. Configuring Linux for Network Administration The basics of adding users and groups The basics of modifying file access permissions Two commands: groupadd useradd.
  • 37. Configuring Linux for Network Administration (continued)
  • 38. Configuring Linux for Network Administration (continued) To add group IDs to your Linux system: Type groupadd instructors and then press Enter at the command prompt. The group instructors is added. Type groupadd students and then press Enter . The group students is added. Type groupadd administrators and then press Enter . The group administrators is added.
  • 39. Configuring Linux for Network Administration (continued) To add a new user and assign the user a password: Type useradd –g users –G instructors thomas and then press Enter to add a new user account named thomas. Type passwd thomas and then press Enter.
  • 40. Configuring Linux for Network Administration (continued) Linux prompts you to type the new password. Linux prompts you to retype your password. Enter the same password again; this confirmation helps ensure that you type your new password accurately.
  • 41. Configuring Linux for Network Administration (continued) Changing File Access Permissions To create a directory and assign it to a group If you are still logged on to your Linux system, log off by typing exit and then pressing Enter. To log back on to your system as user thomas, type thomas at the login prompt and then press Enter .
  • 42. Configuring Linux for Network Administration (continued) Type the password you assigned for thomas and then press Enter . You see a command window and a command prompt. To create the new directory, type mkdir PROGRAMS and then press Enter .
  • 43. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter . Notice that the directory belongs to the group users. That’s because the primary group to which the user thomas belongs is users. Type chgrp instructors PROGRAMS and then press Enter to assign ownership of the PROGRAMS directory to the group instructors.
  • 44. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter . Notice that the directory is now assigned to the group instructors.
  • 45. Configuring Linux for Network Administration (continued) To change the access permissions for the PROGRAMS directory: Log on as the user thomas (whose primary directory is instructors ). Type chmod g+w PROGRAMS and then press Enter . This command adds write access for the instructors group to the directory PROGRAMS. Next, you will remove read and write access to the PROGRAMS directory for all others. To do so, type chmod o-rw PROGRAMS and then press Enter .
  • 46. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter to view the access permissions assigned to PROGRAMS.You should see a line for PROGRAMS that includes permissions of drwxrwx--x.
  • 47. Internetworking with Other Network Operating Systems Samba Communicates with Windows servers WINE Enables Windows programs to run on Linux VMware Emulates a complete Intel-based computer Telnet
  • 48. Internetworking with Other Network Operating Systems (continued)
  • 49. Internetworking with Other Network Operating Systems (continued)
  • 50. Chapter summary Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
  • 51. Chapter summary (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
  翻译: