Professional Documents
Culture Documents
Linux Characteristics
NFS
DFS
Find Command
DHCP
Container
Docker
OPENIL
Shell Script
Partitioning disk
A1)Explain all the steps and commands to configure the DHCP server.
A2) Explain all the steps and commands to configure the DNS server.
In Linux, most professional Domain Name System (DNS) servers are implemented using
the Berkeley Internet Name Domain (BIND) service. This is implemented in Fedora and
RHEL by installing the bind, bind-utils, and bind-libs packages. For added security,
some people install the bind-chroot package.
By default, bind is confi gured by editing the /etc/named.conf fi le. Hostname-to-IP
address mapping is done in zone fi les located in the /var/named directory. If you install
the bind-chroot package, bind confi guration fi les are moved under the /var/named
/chroot directory, which attempts to replicate the fi les from /etc and /var that are
needed to confi gure bind, so that the named daemon (which provides the service) is
confi ned to the /etc/named/chroot directory structure.
BIND is a nameserver service responsible for performing domain-name-to-IP conversion on Linux-based DNS
servers.
First, add or edit the two values in the options field. One is the DNS server address, and the other is the allow-
query to any.
An NFS fi le server provides an easy way to share large amounts of data among the users and
computers in an organization. An administrator of a Linux system that is confi gured to share its
fi lesystems using NFS has to perform the following tasks to set up NFS:
1. Set up the network. NFS is typically used on private LANs as opposed to public
networks, such as the Internet.
2. Start the NFS service. Several service daemons need to start up and run to have a fully
operational NFS service. In Fedora, you can start up the nfs-server service; in Red Hat
Enterprise Linux, you start the nfs service.
3. Choose what to share from the server. Decide which fi lesystems on your Linux NFS
server to make available to other computers. You can choose any point in the fi lesystem
and make all fi les and directories below that point accessible to other computers.
4. Set up security on the server. You can use several different security features to apply
the level of security with which you are comfortable. Mount-level security enables you
to restrict the computers that can mount a resource and, for those allowed to mount it,
enables you to specify whether it can be mounted read/write or read-only. In NFS, userlevel
security is implemented by mapping users from the client systems to users on the
NFS server (based on UID and not username) so that they can rely on standard
Linux read/write/execute permissions, fi le ownership, and group permissions to
access and protect fi les.
5. Mount the filesystem on the client. Each client computer that is allowed access
to the server’s NFS shared fi lesystem can mount it anywhere the client chooses.
For example, you may mount a fi lesystem from a computer called maple on the
/mnt/maple directory in your local fi lesystem. After it is mounted, you can view
the contents of that directory by typing ls /mnt/maple. Then you can use the
cd command below the /mnt/maple mount point to see the fi les and directories
it contains.
A4) Explain all the steps and commands to configure the Distributed Network filesystem.
___________________----------------------------______________________
A5) Explain different commands to administrate the TCP/IP Networks.
___________________----------------------------______________________
A7)Design and develop a "Birthday Reminder" that can automatically send birthday wishes with a personalized
message via email.
___________________----------------------------______________________
Install Docker
1. Log into your system as a user with sudo privileges.
2. Update your system: sudo yum update -y .
3. Install Docker: sudo yum install docker-engine -y.
4. Start Docker: sudo service docker start.
5. Verify Docker: sudo docker run hello-world.
A10) When we power on a system the login screen appears. How the Linux system reached to that level so that X-
based login screen appears?
___________________----------------------------______________________