Professional Documents
Culture Documents
3”
A
Project Training Report
submitted
in partial fulfillment
for the award of the Degree of
Bachelor of Technology
in Department of Computer Science Engineering
SEPTEMBER, 2010
1
ACKNOWLEDGEMENTS
Exchange of ideas generates the new objects to work in a better
way whenever a person is helped co operate by others his heart
is bound to pay gratitude and obligation to them.
VIPIN KUMAR
VII SEM
CSE
2
TABLE OF CONTENTS
[1.1] Introduction
[1.2] Linux Salient Feature
[1.3] Linux Installation
[1.4] Linux Architecture
[1.5] Linux File System
[4] Bibliography
3
Module I
Linux Essentials
4
LINUX INSTALLATION
5
according to the packages selected. After completion the
system reboots and Linux will starts successfully.
CD- ROM
NFS
FTP
KICK START
GRUB
LILO
DISK DRUID
FDISK
GNOME
KDE
o K Desktop Environment
6
THE LINUX ARCHITECTURE
KERNEL
HARDWARE
KERNEL :-
SHELL :-
7
Feature of Shell
Command Execution
Redirection
Background Processing
History
Aliases
Variables
Command completion
ASH-“A Shell”
ZSH-“Z Shell”
8
THE LINUX FILE SYSTEM
/ {root}
Sunny Hemant
C
C C H
A P M
T O
D
9
Just as each drawer contains files, each of which contain
documents of a similer nature, so also the directories on the
disk can be crested to store files contain data of a similer
nature.
All file are stored on the disk under main directory called Root
directory. The root directory have been sub-devided into
directories- bin, boot, home, usr, etc, var and dev. In each
directory file containing related data can be stored. The
administrator of the Linux System mat place home directories
of the users under /home directories. For example, the sunny
directory is the home directory for user sunny.
10
configuration files.
/home User home directories (except the root user)
/lib Program libraries. Do not mount this
directories on a separate partition.
/mnt Mount point for removable media (floppy
disks, CD drives).
/proc Running kernel processes.
/root Home directory for the root user. Do not
mount this directory separately.
/sbin System administration commands. Do not
mount this directory separately.
/tmp Temporary file default directory.
/usr Small programs.
/var Log files, print spools, and other variable-
sizes data.
/etc All configuration files.
11
Module II
Linux System Administration
12
FILE SECURITY
Users
13
Users can not read , write, or execute each others
files without permission.
Group
All users in a group can share files that belong to the group.
14
Linux is often appreciated for its security. Linux has
three distinct classes of users and their access permission for
each file, which are follows:-
Others:- Lists the permissions for all the other users. Other
is any user who is neither the file owner nor a member of the
group but has access to the system.
Permission Types:-
15
USER MANAGEMENT
The super user can create and maintain users and groups
either through console commands or by using utilities like
Linuxconf or Userconf. Whether the administrator uses console
commands or utilities, the entries of any user or group is made
in some default files . The files involved in user management
are :-
16
/etc/passwd:-
This file stores the information about every user. Every user
has an entry in this file. The format is following:
Username:password:userid:groupid:comment:home-
directory:shell.Where:
/etc/shadow:-
Username:password:last:must:warn:expire:disable:reserved
Where:
17
Last: specifies days before which password must be
changed.
/etc/group:-
/etc/skel:-
18
Adding new groups:-
Where:-
Modifying groups:-
Deleting groups:
# groupdel groupname
19
The useradd command creates a new account usng the values
specified on the command line and the default values specified
from the system. The syntax is following:
# Useradd [-u uid] [-g group] [-G group] [-d home] [-s shell] [-
c comment] [-m[-k template]] [-f inactive] [-e mm/dd/yy] [-p
password] name
Where:
Modifying users:-
20
The usermod command modifies the account using the values
specified on the command line. The syntax is following:
Where:
21
LINUX QUOTA SYSTEM
Quota Initialisation
# quotacheck –c /home
22
Editing user policies:
• Format of policy:-
/dev/hda9 10 0 0 5 0 0
Inodes indicates the no. of the inodes i.e. the no. of files.
Hard limit indicates that user can not cross this limit .
Grace period:- after crossing soft limit if user don’t make any
modification with in the grace period then his soft limit
becomes hard limit. It is used to restrict the space for the
inactive users.
23
MODULE III
24
NETWORKING COMMANDS
1. PING-
Measures connectivity and network latency between lacal
& Remote system. It uses ICMP echo packets.
Example:-ping 192.168.0.1
OR ping www.redhat.com
2. TRACEROUTE-
Shows network path between lacal and Remote System.
Useful for pinpointing network congestion.
3. NETSTAT-
List network statistics and parameters, including Network
Connection, Routing table, Interface statistics.
25
OR netstat –a
4. IFCONFIG-
The ifconfig command is used to configure and display
network devices.
5. NETCONFIG-
The netconfig command is used to set the IP address.
26
According to Netcraft web server survey Apache is the
most widely used web server. More then 50% sites are hosted
on apache web server.
VIRTUAL HOSTING
Virtual Hosting allows us to host more than one web site on the
same machine rather than having a separate machine for each
web site.
Listen 80
<VirtualHost 192.168.0.1>
DocumentRoot /home/yahoo/
ServerName yahoo.com
ServerAdmin admin@yahoo.com
</virtualHost>
27
<VirtualHost 192.168.0.2>
DocumentRoot /home/google/
ServerName google.com
ServerAdmin admin@google.com
</VirtualHost>
Packages: httpd
Daemons: httpd
Scripts: httpd
28
Logs -> In this directory all log files are present.
29
1. Master DNS Server – contain the master copy of data for a
zone.
net us jp Com
30
Example.net Omoini.ny.us
www.omoini.ny.us
www.example.net
fox.trot.example.net
The DNS root has a small set of top level domains that rarely
changes. Some of them are as aero, com, net, edu, gov, info,
org, int, and name. In a domain name like www.example.net is
a first-level name within the root, example is a second level
name within net, and www is third level domain called fox.
Trot. The tree can extend to any number of levels, but in
generally it is not more then four levels deep.
Scripts : named
Ports : 53
/var/named/*, /etc/rndc.*
31
Related : caching-nameserver, openssl
ROOT
INTERNAL NETWORK
192.168.1.0/24
32
DHCP SERVER
Manual assignment
Dynamically
I.P.address
Netmask
33
Router(gateway)
DHCP process:
192.168.0.1/192.168.0.20
SWITCH
34
PC 1 PC 2 PC 3
Packages : dhcp
Deamons : dhcpd
Scripts : dhcpd
Ports : 67(bootps),68(bootcp)
Related : dhclient
35
Service Profile : NFS
Packages : nfs-utils
Deamons : nfsd,lockd,rpciod
Scripts : nfs,nfslock
Configuration : /etc/exports
Related : portmap
NFS Server
Bigserver.redhat.com
36
/root/presentation server2.example.com (rw,sync)
/data
192.168.10.0/255.255.255.0(sync)
Client-side NFS
37
Server1: /var/ftp/pub /mnt/pub nfs
defaults 00
NFS SERVER
(LINUX)
SWITCH
38
NFS CLIENT 1 NFS CLIENT 2
(LINUX) (UNIX)
BIBLIOGRAPHY
39
through several books for above information’s. My project
coordinator has suggested me to go through some books whose
list is as follows:-
REFERENCES
Websites:-
1. www.redhat.com
2. www.linux.org
3. www.rpmfind.net
4. www.freshmeat.org
40