Professional Documents
Culture Documents
Overview
This module introduces you to the hardware and
software terminology necessary to install a Linux
operating system. The procedure for installing
Linux and the necessary configuration settings are
described.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
Linux can be installed in a system through various
methods. On a standalone system, the most convenient
method is to install through a CD-ROM drive. Before
installing Linux, it has to be ensured that the system
meets all the requirements for installation.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
The first thing in installing Linux is booting off from the CD-
ROM.
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
Linux can be installed in a system that has other operating
systems like Windows
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
Root user also called super user, who has
access to all resources to which the other user
will not have. Root user can modify the ownership
and permissions of the files it does not own.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
The root user has the rights to add or create a new user
account into the system.
The root user has the rights to edit or modify and delete user
accounts.
The root user sets the password aging policy to protect a user
account.
continued…
The root users can modify, delete group accounts.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Continue
d..
© 2006 IIHT
Installing Linux
Using Commands
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continue
d..
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Red Hat Linux has a unique method called user private groups to
ease the management of user and groups.
The name of the user private group is same as the username and
has the user as its only member.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
For example: userdel –r sam will delete the user account sam
along with its home directory.
© 2006 IIHT
Installing Linux
Lab Exercises
© 2006 IIHT
Installing Linux
Continued..
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
One way is to use the command chage and the other using the
graphical application User Manager.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
· Click on the Users tab, select the user from the user list,
and click Properties from the button menu
© 2006 IIHT
Installing Linux
Introduction
sudo (superuser do) permits a system
administrator to grant certain users (or groups of
users) the permission to run some (or all) commands
as root while logging all commands and arguments..
1. Using sudo
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Continued…
© 2006 IIHT
Installing Linux
For example
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Types of permissions
● r – read
● w –write
●
x –execute
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Example:
-rwxr--r--
© 2006 IIHT
Installing Linux
Respective access rights for owner, group and others are the last
three digits of the numeric file permissions representation.
Here,
‘1’ stands for execute only,
‘2’ stands for write only,
‘4’ stands for read only.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
The owner and the root have the main access rights
over a file.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Copying ACL
The acl’s can be copied to any files, for which the
files get the same acl permissions from its source file.
Syntax
getfacl <acl filename> | setfacl --set-file= -
<filename>
© 2006 IIHT
Installing Linux
Lab Exercise
Exercise : In this lab you have to use
useradd, usermod, chmod and chgrp
commands to restrict the user to their
department directory.
Perform the following steps.
1. Create users, john, sam, tom, peter, joe,
Mathew, and steve
Lab Exercise
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
File permissions protect user files from accessing by other
users
The file system can be accessed by the owner and has the
control over the attributes and access to a file
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
Partitioning is done using several utilities. One
such utility is fdisk used for performing disk
partitions. It is a tool that permits modifying the
partitions already made on a hard drive. fdisk is
the conventional tool for managing partitions.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Creating Partition
Creating partition can be started by running the
command n.
© 2006 IIHT
Installing Linux
Creating Partition
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Hardware Browser
The details of the partitions are done using the
hardware browser. Hardware browser can be seen
by typing hwbrowser at a shell prompt.
Otherwise click on Main Menu =>System Tools
=> Hardware Browser
© 2006 IIHT
Installing Linux
Introduction
RAID, an acronym for Redundant Array of Independent
Disks or Redundant Array of Inexpensive Disks is a
method of combining several physical disks to make a
virtual disk. It is implemented in the system to increase
performance, speed and increase the size and to
provide data redundancy.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Introduction
Linux has support for Logical Volumes that makes
the file system management easy. The Linux Logical
Volume Management will introduce an abstraction
layer between the physical disk and the file system.
© 2006 IIHT
Installing Linux
There are two version of LVM for Linux and they are,
LVM1 and LVM2
© 2006 IIHT
Installing Linux
LVM Snapshots
∙ The built-in support for mirroring also offers the
concept of snapshots.
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
A file system is a data structure which interprets the
physical sector of a disc into logical directory structure.
The logical structure will help computers and users to
trace files. The file system registers the location of the
files and directories on the disc
© 2006 IIHT
Installing Linux
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continued…
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
ext2 Directories
© 2006 IIHT
Installing Linux
There are several advantages of ext3 File system over ext2 file
system
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
File systems are created on the partitions. The partitions
have to be created before creating a file system. By
default ext2 file system is generated when the ‘make file
system’ command is used. But now ext3 is the file system
by default
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
For example,
tune2fs –j /dev/hda7
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Introduction
File systems needs to be maintained and periodic
checks have to be performed on the file systems.
This is one of the tasks of the system
administrator. Linux has a utility that checks and
repairs the file system at every reboot and
performs the process quickly
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
After setting labels, the mount command can be used with labels
and it will mechanically trace the proper underlying device.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Linux will allow only the file systems that are not in
use to be unmounted.
© 2006 IIHT
Installing Linux
Introduction
In a multi-user system environment, it is very common to
have problems like some users utilizing disk space more
than they require. This problem can be completely
rectified by using Disk Quotas feature of Linux.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
For example:
[root@localhost ~]# edquota user1
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT
Installing Linux
Overview
This module deals with the causes for data loss and
data corruption, performing backups using backup
tools and restoring them. The setting up of
automation processes are discussed in this module,
by using automation tools such as at and cron.
Topics covered in this Lesson
1. Causes for Loss or Corruption of Data
2. Using Backup Tools
3. Task Automation
© 2006 IIHT
InstallingFile
Linux
system
Backup
© 2006
© 2006IIHT
IIHT
Limited
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Topic 1 - Tar
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Topic 2 - Cpio
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
restore
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
Task automation commands are required to run
during non working hours as it will not interrupt
usual business hours. The at daemon (atd) and
cron daemon (crond) can be used for scheduling
commands
© 2006 IIHT
Installing Linux
Topic 1 - At
There are two access control files created to identify the users,
to use the at command and they are:
● /etc/at.allow
● /etc/at.deny
© 2006 IIHT
Installing Linux
Topic 2 - Cron
There are two access control files that restrict users to use cron
command and they are:
● /etc/cron.allow
● /etc/cron.deny
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
Overview
A boot loader is a small program that exists in the
system and loads the operating system into the
system’s memory at system boot. This module
deals with two most popular boot loaders of
Linux, LILO and GRUB.
© 2006 IIHT
Installing Linux
Introduction
LILO or Linux Loader is a boot loader for Linux. A
boot loader is a small program that exists in the
system and loads the operating system into the
system’s memory when the system boots. Boot
loader also starts the operating system.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
GRUB Configuration
When Grub is installed two configuration files are created and they are
Continued..
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
© 2006 IIHT
Installing Linux
1. The Stage 1 or primary boot loader is read into memory by the BIOS
from the master boot recorder (MBR).
1. The Stage 1.5 boot loader is read into memory by the Stage 1 boot
loader if required.
1. The secondary boot loader will read the operating system or kernel
and the contents of /boot/sysroot/ into memory
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
LILO, the Linux loader is the boot loader for Linux which boots the
operating system whenever the system boots
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
Once the software is installed, enquiry can be
made on the software package and check
whether the RPMs are installed. This process is
querying.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Introduction
Software can be removed or uninstalled using
RPM. The software, which is not in use currently,
has to be removed so that the space occupied by
it is saved for other programs. Software can be
uninstalled using RPM on a command line
interface and on a graphical interface as well.
© 2006 IIHT
Installing Linux
[root@localhost ~] #
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
Overview
The innermost layer of Linux operating system is
the kernel, which is a thin layer of software
between hardware and software applications. This
module deals with the kernel source structure,
loading and unloading of kernel modules.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Linux kernel will have a version number that has three parts as
given below
● major number- The major number will increase when the
kernel has major changes.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006
1. Verification has to be made on the custom kernel
IIHT
Installing Linux
Conclusion
Ø Summary
Overview
A network connection is required to communicate
with other computers when they are in a network.
Network interface cards have to be configured in a
Linux system in order to communicate with other
computers of the network. A network client is a
system that obtains service from the server.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Network Configuration
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Configuring an Ethernet
connection
To configure an ethernet connection, the steps
given below have to be followed.
To start a network administration tool, go to Main
Menu Button =>Systems and Settings
=>Network
Network Administration Tool
© 2006 IIHT
Installing Linux
Configuring an Ethernet
connection
Click the Devices tab on Network Administration
Tool as shown in the above figure
Double-click on the highlighted line as shown in the
above figure. Now the following screen appears.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Topic 1 Click
– Configuring
to edit Master titleDNS
style Client
Services
/etc/hosts lists IP addresses and related hosts names
and aliases.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
● Fourth level
● Fifth level
Continue
© 2006 IIHT
d..
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT
Installing Linux
Introduction
In Linux, there are network services that can be
used to be connected to a network. The services
include NFS, Samba and DHCP.
© 2006 IIHT
Installing Linux
a p p le
e / u 1
/ e x p o r t s / h o m e s
/ h o m e / u 5
/ w o r k / p r o j
lim e
/ h o m e / u 2
m a n g o
/ h o m e / u 6
/ p r o je c t s
/ h o m e / u 3
/ p r o j
g u a v a p e a c h
/ h o m e / u 4 / h o m e / u 7
/ h o m e / w o r k
© 2006 IIHT
Installing Linux
NFS Server
To run an NFS server with Red Hat Linux the following services are
required. portmap, rpc.nfsd and rpc.mountd.
The NFS server software with Red Hat has three facilities, the
portmap, nfs-utils and rpc.mountd rpms:
nfs: This translates NFS requests into requests on the local file
system
© 2006 IIHT
Installing Linux
NFS Client
Screen
To mount
Picture
a shared
Illustrating
directory the
in your
Steps
local file system,
use mount.
© 2006 IIHT
Installing Linux
Lab Exercise
Exercise
We have to configure host IIHT1 and IIHT2 as NFS server and client
so that user on IIHT2 can access host IIHT1 home directory.
Configure by performing the following steps:
1. Host IIHT1 and IIHT2 IP address are 192.168.1.1 and
192.168.1.2 respectively
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Topic 3 - Samba
© 2006 IIHT
Installing Linux
Lab Exercise
Exercise
Configure this lab by performing following instructions
1. HOSTA and HOSTB machines with IP address are 192.168.1.1
and 192.168.1.2 respectively
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
Red Hat supports all these and there are easy and
specific ways to configure these for efficient network
services
© 2006 IIHT management.
Installing Linux
Overview
In Linux, system administrators use an automated
method of installation called kickstart installation
that helps them to save time when installing
Linux on several machines in a network. This
module deals with the kickstart installation along
with configuration of kickstart.
© 2006 IIHT
Installing Linux
Introduction
Red Hat Linux has one installation method that is
an automation method of installation called
Kickstart installation. This type of installation
helps system administrator when they have to
install Linux in several machines on a network.
© 2006 IIHT
Installing Linux
Using a single Kickstart file for installing Red Hat Linux on multiple
machines is supported by Kickstart installation method
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Lab Exercises
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT
Installing Linux
Overview
Linux is more prone today to security loopholes
and attacks, both inside and outside the network.
In this module we learn about the various services
and their role in Linux booting process. This
module deals with iptables and TCP Wrappers.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
System RunLevels
© 2006 IIHT
Installing Linux
Predefined Runlevels
Red Hat comes with many predefined runlevels as
listed in this table
© 2006 IIHT
Installing Linux
The system startup files control and manage the tasks after the
system gets booted up by the boot loader.
There are several system startup files and scripts as listed below:
© 2006 IIHT
Installing Linux
Topic 2 - Chkconfig
© 2006 IIHT
Installing Linux
Introduction
In Linux, to make a network environment safe,
security has to be provided. TCP Wrapper is a tool
usually used on Linux systems to regulate and
filter connections to network services. iptables, a
firewall product also restricts unauthorized access
from accessing a network.
© 2006 IIHT
Installing Linux
Topic 1 - iptables
© 2006 IIHT
Installing Linux
Starting iptables
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Targets
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Lab Exercise
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT
Installing Linux
Overview
Linux servers can be used in many different roles
on a LAN. File and print servers are the most
common roles played by the servers. In this
module we learn about the print process and how
to administer and set up the printers.
© 2006 IIHT
Installing Linux
Introduction
In Linux, printers are set up on a local computer and on a
network as well. Linux has advanced printing system
known as Common Unix Printing System. Printer can be
configured to share on a network.
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
© 2006 IIHT
Installing Linux
Lab Exercise
Setting Printer
In this lab you have to set up a printer by using
graphical tool. You have to create a print queues
name IIHT and try to print a test page.
© 2006 IIHT
Installing Linux
Conclusion
Ø Summary
© 2006 IIHT