SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Mohammad Reza Gerami gerami@ipm.ir 1
LinuxAdvanced
Mohammad Reza Gerami
2
Middleware Group
gerami@ipm.ir
Disk Management
LinuxAdvanced
Limiting Users
File System Health Check
Installing Software in GNU/Linux
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 3
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 4
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 5
A Linux distribution has software worth thousands of
dollars, for virtually no cost
Linux operating system is reliable, stable, and very
powerful
Linux comes with a complete development environment,
including compilers, toolkits, and scripting languages
Linux comes with networking facilities, allowing you to
share hardware
Linux utilizes your memory, CPU, and other hardware to
the fullest
A wide variety of commercial software is also available
Linux is very easily upgradeable
Supports multiple processors as standard
True multitasking. So many apps, all at once
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 6
Freely Downloadable from websites
Available as sets of CDs
Installation is very simple
After installation you can create logins
for different users
Each user may login by his/her own login
and passwd – own login area
Upon login, default directory is home
directory of the user
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 7
ls, Give a listing of the current directory. Try
also ls -l
cp, Copy file from source to destination
mv, Move file from source to destination. If both
are the same directory, the file is renamed
vi, Edit a file. vi is one of the most powerful
text editors
chmod, Change file permissions
mkdir, rmdir Make/Remove a directory
cd, Change directory
rm, Remove a file. Can also remove directory tree
man ls, Get help for ls. All commands have help
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 8
/
bin boot dev
sdahda
etc home
reza
masood
ali
lib sbin
Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 9
/
bin
boot
dev
etc
home
lib
lost+found
misc
mnt
opt
proc
root
sbin
tmp
usr
var
/bin System binaries, including the command shell
/boot Boot-up routines
/dev Device files for all your peripherals
/etc System configuration files
/home User directories
/lib Shared libraries and modules
/lost+found Lost-cluster files, recovered from a disk-check
/mnt Mounted file-systems
/opt Optional software
/proc Kernel-processes pseudo file-system
/root Administrator’s home directory
/sbin System administration binaries
/usr User-oriented software
/var Various other files: mail, spooling and logging
Login
Sudoers
Process
File Size
Limiting Users
Mohammad Reza Gerami gerami@ipm.ir 10
Limiting Users
Directory
/etc/security
Login edit limits.conf
@test - maxlogin 1
Process
@test hard nproc 6 (count of Process)
File Size
@test hard fsize 500 (kilobyte)
Mohammad Reza Gerami gerami@ipm.ir 11
Limiting Users
core -- Limits the core file size (KB); usually set to 0 for most users
to prevent core dumps.
data -- Maximum data size (KB).
fsize -- Maximum file size (KB).
memlock -- Maximum locked-in-memory address space (KB).
nofile -- Maximum number of open files.
rss -- Maximum resident set size (KB).
stack -- Maximum stack size (KB).
cpu -- Maximum CPU time (MIN).
nproc -- Maximum number of processes.
as --Address space limit.
maxlogins -- Maximum number of logins for this user or group.
priority --The priority to run user process with.
Mohammad Reza Gerami gerami@ipm.ir 12
Limiting Users
Sudoers
The super user with unrestricted access to all system resources and
files in Linux is the user named root.
If a server needs to be administered by a number of people it is
normally not a good idea for them all to use the root account. This is
because it becomes difficult to determine exactly who did what, when
and where if everyone logs in with the same credentials. The sudo
utility was designed to overcome this difficulty.
Mohammad Reza Gerami gerami@ipm.ir 13
Sudoers Example
/etc/sudoers
User_Alias OPERATORS = reza,masood
Runas_Alias OP = root, operator
Host_Alias DataCenter = 10.10.10.0/255.255.255.0
Host_Alias Servers = 20.20.20.0/24
Cmd Server_cmd = ls,vi,cat,top
OPERATORS ALL=ALL
reza ALL=(ALL) ALL
masood DataCenter = (ALL) ALL
reza Servers = (reza) Server_cmd
Mohammad Reza Gerami gerami@ipm.ir 14
Journaling Filesystems
Foreign Filesystems
DISK Management
Mohammad Reza Gerami gerami@ipm.ir 15
Disk Management
Journaling
A journaling file system is a file system that keeps track
of the changes that will be made in a journal (usually a
circular log in a dedicated area of the file system) before
committing them to the main file system.
In the event of a system crash or power failure, such file
systems are quicker to bring back online and less likely to
become corrupted
Mohammad Reza Gerami gerami@ipm.ir 16
Disk Management
Journaling
Third Extended TheThird Extended Filesystem (ext3 or
ext3fs)
ReiserFSThis filesystem is a completely new design,
which was added to the 2.4.1 Linux kernel
XFS XFS is Silicon Graphics's (SGI's) journaling
filesystem
JFS IBM's Journaled Filesystem (JFS)
Mohammad Reza Gerami gerami@ipm.ir 17
Disk Management
Journaling
Mohammad Reza Gerami gerami@ipm.ir 18
Disk Management
Foreign Filesystems
Microsoft Filesystems
FATThe File AllocationTable (FAT)
HPFS Microsoft developed the High−Performance Filesystem
(HPFS)
NTFSThe NewTechnology Filesystem (NTFS)
Network Filesystems
NFS Sun's Network Filesystem (NFS)
CodaThis is an advanced network filesystem that supports
features omitted from NFS
SMB/CIFSThe Server Message Block (SMB) protocol, which
has been renamed the Core Internet Filesystem (CIFS)
Mohammad Reza Gerami gerami@ipm.ir 19
File System Health Check
File System Health Check
Mohammad Reza Gerami gerami@ipm.ir 20
File System Health Check
On a Linux or Unix server, you can run the fsck command to check
your file system’s integrity and also make repairs when necessary.
Under normal circumstances, you probably have no reason to run this
command, and Linux will detect problems at boot and run fsck in the
event of a power failure or other abnormal shutdown. If you do need to
run it, you will have to unmount the file system you want to check.
Follow these steps:
As Root, go to single user mode:
# init 1
Unmount the partition you want to check:
# umount /dev/sda1
Run fsck:
# fsck /dev/sda1
Remount the filesystem:
# mount -a
Return to multiuser mode (Init 2 or 3)
# init 3
Mohammad Reza Gerami gerami@ipm.ir 21
Command-line process
Installing Software in GNU/Linux
Graphical (GUI) process
Mohammad Reza Gerami gerami@ipm.ir 22
Command-line process
Compiling and Installing software from source
Installing RPM's using the Red hat Package
Manager
Installing using Debian's apt-get
Installing with fedora / yum
Mohammad Reza Gerami gerami@ipm.ir 23
Compiling and Installing software
from source
Installing from source code is the most difficult
method for obtaining software on Linux and in
most cases is not necessary.
Most popular software can be found and installed
quite easily using your distribution's package
manager (see sections on "apt-get" and "yum").
Installing from source is recommended only for
experienced Linux users and/or those who aren't
afraid to break something for the purpose of
learning
Mohammad Reza Gerami gerami@ipm.ir 24
Compiling and Installing software
from source
Typically applications you must compile from
source will come as a ".tar.gz", ".tar.bz2", or ".zip"
file.
tar -zxvf <filename>
Configure
Make
Make install
Mohammad Reza Gerami gerami@ipm.ir 25
Installing RPM's using the
Redhat Package Manager
Redhat RPM's offer a flexible and easy method to
install new software. Software installed from an
RPM package differs from compiling from source
in a few ways, but the most important one of all is
the software is already compiled for you.
rpm -i <filename.rpm>
rpm -qa <package>
rpm -e <package>
Mohammad Reza Gerami gerami@ipm.ir 26
Installing RPM's using the
Redhat Package Manager
Installing using Debian's apt-get
apt-get install <package_name>
apt-get remove <package_name>
Installing with fedora|CentOS / yum
yum install
yum remove
yum update
Mohammad Reza Gerami gerami@ipm.ir 27
Graphical Based process
Using Synaptic (Fedora, Ubuntu)
UsingYaST2 (SuSE, openSuSE)
Mohammad Reza Gerami gerami@ipm.ir 28
IP Assignment
IPTables
Configuration File
NetworkingTools
Linux Network Configuration
Firewall
Mohammad Reza Gerami gerami@ipm.ir 29
Linux Network Configuration
IPAsignment
ifconfig (device name) IP [netmask subnetmask]
ifconfig eth1 1.1.1.1 [netmask 255.255.255.0]
ifconfig eth1:0 1.1.1.2 netmask 255.255.255.0
/etc/init.d/network restart
Mohammad Reza Gerami gerami@ipm.ir 30
IPAssignment
DNS
/etc/resolv.conf
nameserver 4.2.2.4
Default Gateway
route add default gw <gw-ip>
route add default gw 192.168.10.1
route del default gw <gw-ip>
route del default gw 192.168.10.1
route -n
Mohammad Reza Gerami gerami@ipm.ir 31
Configuration File
Files Path
etc/sysconfig/network-scripts/ifcfg-eth1
DEVICE=eth1
ONBOOT=yes
BOOTPROTO=static
HWADDR=00:0c:29:24:8d:c6
TYPE=Ethernet
HOSTNAME=Nightingale
IPADDR=192.168.10.2
NETMASK=255.255.255.0
NETWORK=192.168.10.0
BROADCAST=192.168.10.255
GATEWAY=192.168.10.1
Mohammad Reza Gerami gerami@ipm.ir 32
Networking Tools
ping
Check a status of a host Alive or Not
ping 192.168.10.1
ethtool
Check Network Card
ethtool eth1
traceroute
see your hops between hosts
traceroute google.com
Mohammad Reza Gerami gerami@ipm.ir 33
Networking Tools
telnet
Diagnostics
telnet 192.168.10.1 80
nmap
nmap seeing what ports are open on a host
nmap 192.168.10.1
Mohammad Reza Gerami gerami@ipm.ir 34
Firewall
Mohammad Reza Gerami gerami@ipm.ir 35
Firewall
Network firewall
Protect your network
Personal Firewall
Protect your personal system (pc/laptop,…)
Mohammad Reza Gerami gerami@ipm.ir 36
Firewall
Hardware
Appliance Device
Software
Combine software and hardware
Mohammad Reza Gerami gerami@ipm.ir 37
Firewall
State Less
Transmit traffic without check
State Full
Check all of data transmission
Mohammad Reza Gerami gerami@ipm.ir 38

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Linux System
Linux SystemLinux System
Linux System
 
Basic Linux kernel
Basic Linux kernelBasic Linux kernel
Basic Linux kernel
 
5. boot process
5. boot process5. boot process
5. boot process
 
Kbk436 Sistem Operasi Lanjut Lecture02
Kbk436 Sistem Operasi Lanjut Lecture02Kbk436 Sistem Operasi Lanjut Lecture02
Kbk436 Sistem Operasi Lanjut Lecture02
 
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
 
RPM (Red Hat Package Manager)
RPM (Red Hat Package Manager)RPM (Red Hat Package Manager)
RPM (Red Hat Package Manager)
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management
 
Linux booting process - Linux System Administration
Linux booting process - Linux System AdministrationLinux booting process - Linux System Administration
Linux booting process - Linux System Administration
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questions
 
Ms dos boot process
Ms dos boot process Ms dos boot process
Ms dos boot process
 
RPM (LINUX)
RPM (LINUX)RPM (LINUX)
RPM (LINUX)
 
Tuned
TunedTuned
Tuned
 
BeagleBone Black Booting Process
BeagleBone Black Booting ProcessBeagleBone Black Booting Process
BeagleBone Black Booting Process
 
Rhce ppt
Rhce pptRhce ppt
Rhce ppt
 
Ch04
Ch04Ch04
Ch04
 
U Boot or Universal Bootloader
U Boot or Universal BootloaderU Boot or Universal Bootloader
U Boot or Universal Bootloader
 
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-BaljevicHow to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
How to-mount-3 par-san-virtual-copy-onto-rhel-servers-by-Dusan-Baljevic
 
Ch12
Ch12Ch12
Ch12
 
Software management in linux
Software management in linuxSoftware management in linux
Software management in linux
 

Andere mochten auch

File System Hierarchy
File System HierarchyFile System Hierarchy
File System Hierarchysritolia
 
Hydrocarbon Phase Behaviour
Hydrocarbon Phase BehaviourHydrocarbon Phase Behaviour
Hydrocarbon Phase BehaviourM.T.H Group
 
8 Ways a Digital Media Platform is More Powerful than “Marketing”
8 Ways a Digital Media Platform is More Powerful than “Marketing”8 Ways a Digital Media Platform is More Powerful than “Marketing”
8 Ways a Digital Media Platform is More Powerful than “Marketing”New Rainmaker
 
How Often Should You Post to Facebook and Twitter
How Often Should You Post to Facebook and TwitterHow Often Should You Post to Facebook and Twitter
How Often Should You Post to Facebook and TwitterBuffer
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing FailsRand Fishkin
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great InfographicsSlideShare
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareEmpowered Presentations
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingContent Marketing Institute
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShareKapost
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 

Andere mochten auch (15)

Linux file system
Linux file systemLinux file system
Linux file system
 
File System Hierarchy
File System HierarchyFile System Hierarchy
File System Hierarchy
 
Hydrocarbon Phase Behaviour
Hydrocarbon Phase BehaviourHydrocarbon Phase Behaviour
Hydrocarbon Phase Behaviour
 
Permeability
Permeability Permeability
Permeability
 
8 Ways a Digital Media Platform is More Powerful than “Marketing”
8 Ways a Digital Media Platform is More Powerful than “Marketing”8 Ways a Digital Media Platform is More Powerful than “Marketing”
8 Ways a Digital Media Platform is More Powerful than “Marketing”
 
How Often Should You Post to Facebook and Twitter
How Often Should You Post to Facebook and TwitterHow Often Should You Post to Facebook and Twitter
How Often Should You Post to Facebook and Twitter
 
Slides That Rock
Slides That RockSlides That Rock
Slides That Rock
 
Why Content Marketing Fails
Why Content Marketing FailsWhy Content Marketing Fails
Why Content Marketing Fails
 
What Makes Great Infographics
What Makes Great InfographicsWhat Makes Great Infographics
What Makes Great Infographics
 
You Suck At PowerPoint!
You Suck At PowerPoint!You Suck At PowerPoint!
You Suck At PowerPoint!
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content MarketingHow To Get More From SlideShare - Super-Simple Tips For Content Marketing
How To Get More From SlideShare - Super-Simple Tips For Content Marketing
 
Masters of SlideShare
Masters of SlideShareMasters of SlideShare
Masters of SlideShare
 
10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization10 Ways to Win at SlideShare SEO & Presentation Optimization
10 Ways to Win at SlideShare SEO & Presentation Optimization
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 

Ähnlich wie Hpc4 linux advanced

Project of deamon process
Project of deamon processProject of deamon process
Project of deamon processAbubakr Cheema
 
Cd rom mounting cdro-ms on solaris
Cd rom mounting cdro-ms on solarisCd rom mounting cdro-ms on solaris
Cd rom mounting cdro-ms on solarisBui Van Cuong
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package managementAcácio Oliveira
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package managementAcácio Oliveira
 
2.5 use rpm and yum package management
2.5 use rpm and yum package management2.5 use rpm and yum package management
2.5 use rpm and yum package managementAcácio Oliveira
 
Linux conf-admin
Linux conf-adminLinux conf-admin
Linux conf-adminbadamisri
 
Dru lavigne servers-tutorial
Dru lavigne servers-tutorialDru lavigne servers-tutorial
Dru lavigne servers-tutorialDru Lavigne
 
Red Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security AgencyRed Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security Agencysanchetanparmar
 
Release notes 3_d_v61
Release notes 3_d_v61Release notes 3_d_v61
Release notes 3_d_v61sundar sivam
 
Linux security quick reference guide
Linux security quick reference guideLinux security quick reference guide
Linux security quick reference guideCraig Cannon
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensicsINSIGHT FORENSIC
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensicsINSIGHT FORENSIC
 

Ähnlich wie Hpc4 linux advanced (20)

Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Basic orientation to Linux
Basic orientation to LinuxBasic orientation to Linux
Basic orientation to Linux
 
Project of deamon process
Project of deamon processProject of deamon process
Project of deamon process
 
Unix Administration 2
Unix Administration 2Unix Administration 2
Unix Administration 2
 
Cd rom mounting cdro-ms on solaris
Cd rom mounting cdro-ms on solarisCd rom mounting cdro-ms on solaris
Cd rom mounting cdro-ms on solaris
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management
 
101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management101 2.5 use rpm and yum package management
101 2.5 use rpm and yum package management
 
Solaris basics
Solaris basicsSolaris basics
Solaris basics
 
2.5 use rpm and yum package management
2.5 use rpm and yum package management2.5 use rpm and yum package management
2.5 use rpm and yum package management
 
Linux basics
Linux basics Linux basics
Linux basics
 
Linux conf-admin
Linux conf-adminLinux conf-admin
Linux conf-admin
 
Linux Conf Admin
Linux Conf AdminLinux Conf Admin
Linux Conf Admin
 
Linux basics
Linux basics Linux basics
Linux basics
 
Dru lavigne servers-tutorial
Dru lavigne servers-tutorialDru lavigne servers-tutorial
Dru lavigne servers-tutorial
 
Red Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security AgencyRed Hat Linux 5 Hardening Tips - National Security Agency
Red Hat Linux 5 Hardening Tips - National Security Agency
 
Linux filesystemhierarchy
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchy
 
Release notes 3_d_v61
Release notes 3_d_v61Release notes 3_d_v61
Release notes 3_d_v61
 
Linux security quick reference guide
Linux security quick reference guideLinux security quick reference guide
Linux security quick reference guide
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
 
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
 

Mehr von Mohammad Reza Gerami (7)

Security for distributed systems
Security for distributed systemsSecurity for distributed systems
Security for distributed systems
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Linux installation
Linux installationLinux installation
Linux installation
 
Introducing to linux
Introducing to linuxIntroducing to linux
Introducing to linux
 
Linux History
Linux HistoryLinux History
Linux History
 
Big data
Big dataBig data
Big data
 
Big Data - Gerami
Big Data - GeramiBig Data - Gerami
Big Data - Gerami
 

Kürzlich hochgeladen

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Kürzlich hochgeladen (20)

social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Hpc4 linux advanced

  • 1. Mohammad Reza Gerami gerami@ipm.ir 1
  • 3. Disk Management LinuxAdvanced Limiting Users File System Health Check Installing Software in GNU/Linux Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 3
  • 4. Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 4
  • 5. Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 5 A Linux distribution has software worth thousands of dollars, for virtually no cost Linux operating system is reliable, stable, and very powerful Linux comes with a complete development environment, including compilers, toolkits, and scripting languages Linux comes with networking facilities, allowing you to share hardware Linux utilizes your memory, CPU, and other hardware to the fullest A wide variety of commercial software is also available Linux is very easily upgradeable Supports multiple processors as standard True multitasking. So many apps, all at once
  • 6. Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 6 Freely Downloadable from websites Available as sets of CDs Installation is very simple After installation you can create logins for different users Each user may login by his/her own login and passwd – own login area Upon login, default directory is home directory of the user
  • 7. Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 7 ls, Give a listing of the current directory. Try also ls -l cp, Copy file from source to destination mv, Move file from source to destination. If both are the same directory, the file is renamed vi, Edit a file. vi is one of the most powerful text editors chmod, Change file permissions mkdir, rmdir Make/Remove a directory cd, Change directory rm, Remove a file. Can also remove directory tree man ls, Get help for ls. All commands have help
  • 8. Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 8 / bin boot dev sdahda etc home reza masood ali lib sbin
  • 9. Linux Introduction Mohammad Reza Gerami gerami@ipm.ir 9 / bin boot dev etc home lib lost+found misc mnt opt proc root sbin tmp usr var /bin System binaries, including the command shell /boot Boot-up routines /dev Device files for all your peripherals /etc System configuration files /home User directories /lib Shared libraries and modules /lost+found Lost-cluster files, recovered from a disk-check /mnt Mounted file-systems /opt Optional software /proc Kernel-processes pseudo file-system /root Administrator’s home directory /sbin System administration binaries /usr User-oriented software /var Various other files: mail, spooling and logging
  • 11. Limiting Users Directory /etc/security Login edit limits.conf @test - maxlogin 1 Process @test hard nproc 6 (count of Process) File Size @test hard fsize 500 (kilobyte) Mohammad Reza Gerami gerami@ipm.ir 11
  • 12. Limiting Users core -- Limits the core file size (KB); usually set to 0 for most users to prevent core dumps. data -- Maximum data size (KB). fsize -- Maximum file size (KB). memlock -- Maximum locked-in-memory address space (KB). nofile -- Maximum number of open files. rss -- Maximum resident set size (KB). stack -- Maximum stack size (KB). cpu -- Maximum CPU time (MIN). nproc -- Maximum number of processes. as --Address space limit. maxlogins -- Maximum number of logins for this user or group. priority --The priority to run user process with. Mohammad Reza Gerami gerami@ipm.ir 12
  • 13. Limiting Users Sudoers The super user with unrestricted access to all system resources and files in Linux is the user named root. If a server needs to be administered by a number of people it is normally not a good idea for them all to use the root account. This is because it becomes difficult to determine exactly who did what, when and where if everyone logs in with the same credentials. The sudo utility was designed to overcome this difficulty. Mohammad Reza Gerami gerami@ipm.ir 13
  • 14. Sudoers Example /etc/sudoers User_Alias OPERATORS = reza,masood Runas_Alias OP = root, operator Host_Alias DataCenter = 10.10.10.0/255.255.255.0 Host_Alias Servers = 20.20.20.0/24 Cmd Server_cmd = ls,vi,cat,top OPERATORS ALL=ALL reza ALL=(ALL) ALL masood DataCenter = (ALL) ALL reza Servers = (reza) Server_cmd Mohammad Reza Gerami gerami@ipm.ir 14
  • 15. Journaling Filesystems Foreign Filesystems DISK Management Mohammad Reza Gerami gerami@ipm.ir 15
  • 16. Disk Management Journaling A journaling file system is a file system that keeps track of the changes that will be made in a journal (usually a circular log in a dedicated area of the file system) before committing them to the main file system. In the event of a system crash or power failure, such file systems are quicker to bring back online and less likely to become corrupted Mohammad Reza Gerami gerami@ipm.ir 16
  • 17. Disk Management Journaling Third Extended TheThird Extended Filesystem (ext3 or ext3fs) ReiserFSThis filesystem is a completely new design, which was added to the 2.4.1 Linux kernel XFS XFS is Silicon Graphics's (SGI's) journaling filesystem JFS IBM's Journaled Filesystem (JFS) Mohammad Reza Gerami gerami@ipm.ir 17
  • 18. Disk Management Journaling Mohammad Reza Gerami gerami@ipm.ir 18
  • 19. Disk Management Foreign Filesystems Microsoft Filesystems FATThe File AllocationTable (FAT) HPFS Microsoft developed the High−Performance Filesystem (HPFS) NTFSThe NewTechnology Filesystem (NTFS) Network Filesystems NFS Sun's Network Filesystem (NFS) CodaThis is an advanced network filesystem that supports features omitted from NFS SMB/CIFSThe Server Message Block (SMB) protocol, which has been renamed the Core Internet Filesystem (CIFS) Mohammad Reza Gerami gerami@ipm.ir 19
  • 20. File System Health Check File System Health Check Mohammad Reza Gerami gerami@ipm.ir 20
  • 21. File System Health Check On a Linux or Unix server, you can run the fsck command to check your file system’s integrity and also make repairs when necessary. Under normal circumstances, you probably have no reason to run this command, and Linux will detect problems at boot and run fsck in the event of a power failure or other abnormal shutdown. If you do need to run it, you will have to unmount the file system you want to check. Follow these steps: As Root, go to single user mode: # init 1 Unmount the partition you want to check: # umount /dev/sda1 Run fsck: # fsck /dev/sda1 Remount the filesystem: # mount -a Return to multiuser mode (Init 2 or 3) # init 3 Mohammad Reza Gerami gerami@ipm.ir 21
  • 22. Command-line process Installing Software in GNU/Linux Graphical (GUI) process Mohammad Reza Gerami gerami@ipm.ir 22
  • 23. Command-line process Compiling and Installing software from source Installing RPM's using the Red hat Package Manager Installing using Debian's apt-get Installing with fedora / yum Mohammad Reza Gerami gerami@ipm.ir 23
  • 24. Compiling and Installing software from source Installing from source code is the most difficult method for obtaining software on Linux and in most cases is not necessary. Most popular software can be found and installed quite easily using your distribution's package manager (see sections on "apt-get" and "yum"). Installing from source is recommended only for experienced Linux users and/or those who aren't afraid to break something for the purpose of learning Mohammad Reza Gerami gerami@ipm.ir 24
  • 25. Compiling and Installing software from source Typically applications you must compile from source will come as a ".tar.gz", ".tar.bz2", or ".zip" file. tar -zxvf <filename> Configure Make Make install Mohammad Reza Gerami gerami@ipm.ir 25
  • 26. Installing RPM's using the Redhat Package Manager Redhat RPM's offer a flexible and easy method to install new software. Software installed from an RPM package differs from compiling from source in a few ways, but the most important one of all is the software is already compiled for you. rpm -i <filename.rpm> rpm -qa <package> rpm -e <package> Mohammad Reza Gerami gerami@ipm.ir 26
  • 27. Installing RPM's using the Redhat Package Manager Installing using Debian's apt-get apt-get install <package_name> apt-get remove <package_name> Installing with fedora|CentOS / yum yum install yum remove yum update Mohammad Reza Gerami gerami@ipm.ir 27
  • 28. Graphical Based process Using Synaptic (Fedora, Ubuntu) UsingYaST2 (SuSE, openSuSE) Mohammad Reza Gerami gerami@ipm.ir 28
  • 29. IP Assignment IPTables Configuration File NetworkingTools Linux Network Configuration Firewall Mohammad Reza Gerami gerami@ipm.ir 29
  • 30. Linux Network Configuration IPAsignment ifconfig (device name) IP [netmask subnetmask] ifconfig eth1 1.1.1.1 [netmask 255.255.255.0] ifconfig eth1:0 1.1.1.2 netmask 255.255.255.0 /etc/init.d/network restart Mohammad Reza Gerami gerami@ipm.ir 30
  • 31. IPAssignment DNS /etc/resolv.conf nameserver 4.2.2.4 Default Gateway route add default gw <gw-ip> route add default gw 192.168.10.1 route del default gw <gw-ip> route del default gw 192.168.10.1 route -n Mohammad Reza Gerami gerami@ipm.ir 31
  • 33. Networking Tools ping Check a status of a host Alive or Not ping 192.168.10.1 ethtool Check Network Card ethtool eth1 traceroute see your hops between hosts traceroute google.com Mohammad Reza Gerami gerami@ipm.ir 33
  • 34. Networking Tools telnet Diagnostics telnet 192.168.10.1 80 nmap nmap seeing what ports are open on a host nmap 192.168.10.1 Mohammad Reza Gerami gerami@ipm.ir 34
  • 35. Firewall Mohammad Reza Gerami gerami@ipm.ir 35
  • 36. Firewall Network firewall Protect your network Personal Firewall Protect your personal system (pc/laptop,…) Mohammad Reza Gerami gerami@ipm.ir 36
  • 37. Firewall Hardware Appliance Device Software Combine software and hardware Mohammad Reza Gerami gerami@ipm.ir 37
  • 38. Firewall State Less Transmit traffic without check State Full Check all of data transmission Mohammad Reza Gerami gerami@ipm.ir 38