Premium Essay

Unix Administration Chapter 2

In:

Submitted By john00mayo
Words 1162
Pages 5
Advanced SUSE Linux Enterprise Server Administration (Course 3038)
Chapter 2 Configure the Network Manually

Objectives
• • • • Understand Linux Network Terms Set Up Network Devices with the ip Tools Save Device Settings to a Configuration File Set Up Routing with the ip Tool

Advanced SUSE Linux Enterprise Server Administration (Course 3038)

2

Objectives (continued)
• Save Routing Settings to a Configuration File • Configure Host Name and Name Resolution • Test the Network Connection with Command-Line Tools

Advanced SUSE Linux Enterprise Server Administration (Course 3038)

3

Understand Linux Network Terms
• Device
– Network adapter built into the system

• Link
– Used by command-line tool ip to refer to the connection of a device to the network

• Address
– IP address assigned to a device

• Broadcast
– Refers to the broadcast address of a network

• Route
– Path IP packet takes from source to destination host
Advanced SUSE Linux Enterprise Server Administration (Course 3038) 4

Set Up Network Devices with the ip Tool
• Command-line ip tool
– Changes the network card configuration

• Used to perform the following tasks
– Display the Current Network Configuration – Change the Current Network Configuration

Advanced SUSE Linux Enterprise Server Administration (Course 3038)

5

Display the Current Network Configuration
• IP address setup
– Syntax
• ip address show

Advanced SUSE Linux Enterprise Server Administration (Course 3038)

6

Display the Current Network Configuration (continued)
• Device attributes
– Syntax
• ip link show

– Possible attributes
• UP, LOOPBACK • BROADCAST, POINTOPOINT • MULTICAST, PROMISC
Advanced SUSE Linux Enterprise Server Administration (Course 3038) 7

Display the Current Network Configuration (continued)
• Device statistics
– Syntax
• ip –s link show eth0

Similar Documents

Free Essay

Stuff

...Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by using the command-line interface (CLI). 5. Use...

Words: 2032 - Pages: 9

Premium Essay

Class Notes - Networking

...PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Essential Linux Administration: A Comprehensive Guide for Beginners Page 1 of 4 PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording...

Words: 34239 - Pages: 137

Premium Essay

Nt1430 Unit 1 Ex 1

...Chapter 1 1. What is free software? Software that a user has the freedom to distribute and change 2. What are 3 characteristics of free software? Freedom to study how the program works, freedom to redistribute copies, and freedom to improve the program 3. What is GNU? Gnu’s not UNIX, is the complete UNIX-compatible software system that was written to be given away free to everyone who can use it. 4. What is Linux? An open-source operating system modelled on UNIX. 5. What did each provide to Linux? UNIX introduced people to the concept, GNU insured total freedom with it, and ran FreeBSD and NetBSD in Linux compatible binary. 6. Who helped build the O.S.? The internet helped mold Linux. Chapter 2 1. What does installing Fedora involve? 1. Set Bios to boot from CD/ DVD 2. Wait 60 seconds, it will install 3. RAM sets up instead of hard disk so it can be cancelled at any time 4. Configure Fedora 5. Write hard disk 6. First boot runs 7. Ready to use Chapter 3 1. What is a live system? An operating system from a removable medium 2. What advantages does it have over an installed system? Customization, cost, free market, stability, and community 3. Where is the /boot partition put? It must reside completely below cylinder 1023 of the hard disk. 4. When does Fedora system start X by default? It depends on distribution and how the user sets it up. Chapter 11 1. How does single-user differ from multi-user mode? Some...

Words: 362 - Pages: 2

Free Essay

Teradata Introduction

...course material listed in this outline, we also offer Teradata classes in Teradata Basics, Implementation, SQL, Database Administration, Design and Utilities. Please contact us so we can customize a course to fit your specific needs. © 2006 Coffing Data Warehousing – All rights reserved. Confidential. 1 Coffing Data Warehousing Education Outline 02/17/05 PURPOSE Coffing Data Warehousing has been providing quality Teradata education for over a decade. We offer customized courses to maximize the effectiveness of each class. The purpose of this proposal is to build a lasting relationship with your company. To this end, we have combined our comprehensive Teradata education services in a unique package that we feel best suits the diverse needs of your company while offering our high quality product at competitive pricing. Coffing Data Warehousing is excited to offer you, our preferred partner, an innovative new way to look at training at the CoffingDW Teradata University (CDW-TU). This approach provides the ability to maximize learning potential. Our goal is to make your employees the most educated data warehouse experts in the industry. CURRICULUM: Coffing Data Warehousing will provide an experienced and highly qualified resource to deliver this customized educational seminar on the following topic(s): Teradata Education • Teradata Database Administration COURSE DESCRIPTION COURSE PREREQUISITES COURSE Duration/Format COURSE AUDIENCE OBJECTIVES There is no...

Words: 1512 - Pages: 7

Free Essay

Abcdefg

...License Administration Guide FlexNet Publisher Licensing Toolkit 11.9 Legal Information Book Name: Part Number: Product Release Date: License Administration Guide FNP-1190-LAG01 July 2010 Copyright Notice Copyright © 2010 Flexera Software, Inc. and/or InstallShield Co. Inc. All Rights Reserved. This product contains proprietary and confidential technology, information and creative works owned by Flexera Software, Inc. and/or InstallShield Co. Inc. and their respective licensors, if any. Any use, copying, publication, distribution, display, modification, or transmission of such technology in whole or in part in any form or by any means without the prior express written permission of Flexera Software, Inc. and/or InstallShield Co. Inc. is strictly prohibited. Except where expressly provided by Flexera Software, Inc. and/or InstallShield Co. Inc. in writing, possession of this technology shall not be construed to confer any license or rights under any Flexera Software, Inc. and/or InstallShield Co. Inc. intellectual property rights, whether by estoppel, implication, or otherwise. All copies of the technology and related information, if allowed by Flexera Software, Inc. and/or InstallShield Co. Inc., must display this notice of copyright and ownership in full. Trademarks Flexera Software, AdminStudio, DemoNow, FlexEnabled, Flexlm, FlexNet, FlexCertified, FlexNet Connect, FlexNet Connector, FlexNet Manager, FlexNet Publisher, Globetrotter, InstallAnywhere, InstallAnywhere...

Words: 52399 - Pages: 210

Free Essay

Unit 1

...software is software that is free to use study, change and redistribute it all at no charge. The characteristics of free software are source code has to be distributed, no can tell you that you can’t use it. Once you made your changes you must be able to redistribute it. 4. GNU stands for GNU not unix. Free software foundation is the movement to bring free software to everyone. Linux is the name of the operating system Kernel. GNU with the Kernel made the Linux we have now. Users help build and refine the system online. Chapter 2 exercise 1 1. Installing Fedora/RHEL the first thing you have to do is copy the operating system files from a portable device. Next come configuration to run it on machine and make sure its ok. Chapter 3 pg 86 exercise 1, 4, 8 1. A live system is Linux that runs on a computer without being installed. The advantages of running a live system is you get a chance to work with the system to see if it works. 4. If it is not use the boot partition should be first partition you make. 8. Fedora/rhel start x by default when the system enter run level 5 Chapter 11 pg498 exercise 1, 3, 7 1. Single user mode is designed primarily for systems administration. Other users will not be able to log in to this mode. Very little functions are available unless they are necessity to the system. 4. su = switch user. SU allows users to use programs with the security privileges of the superuser. This gives the user a huge amount of configurability with windows...

Words: 314 - Pages: 2

Premium Essay

Obia Installation

...Oracle® Business Intelligence Applications Installation Guide for Informatica PowerCenter Users Release 7.9.6.4 E35271-01 November 2012 Provides the steps to install and set up Oracle Business Intelligence Applications Release 7.9.6.4. Oracle Business Intelligence Applications Installation Guide for Informatica PowerCenter Users, Release 7.9.6.4 E35271-01 Copyright © 2009, 2012, Oracle and/or its affiliates. All rights reserved. Primary Author: P Brownbridge This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed...

Words: 60905 - Pages: 244

Free Essay

Re: Target Jbims.. Dream Team 2012.. Do You Have It in You...

...CSE- 401 DISTRIBUTED SYSTEMS [3 1 0 4] 1. Distributed System Models: Introduction , Examples , Architecture models , Fundamental models (1.1,1.2,1.4, 2.1-2.3 of Text1 ) ..2hrs 2. Interprocess Communication, Distributed Objects and Remote Invocation: Introduction , External data representation and marshalling, Communication models, Communication between distributed objects , Remote procedure call Case study: Interprocess communication in UNIX, Java RMI . (4.1-4.6, 5.1-5.5 of Text1) ..6hrs 3. Operating System Introduction , Operating system layer, Processes and threads, Communication and invocation, Architecture (6.1-6.6 of Text1) ..4hrs. 4. Distributed File Systems and Name Services: Introduction , File service architecture, Name services, Domain Name System, Directory and directory services. Case study: Sun network file system, Global name service. (8.1-8.3, 9.1-9.4 of Text1) …6hrs 5. Synchronization: Clock Synchronization, Physical clocks, Logical clocks, Global state (5.1-5.3 of Text2) ..5hrs 6. Transactions&...

Words: 5050 - Pages: 21

Free Essay

Swear as Mechanism to Pain

...Chapter 2 OPERATING SYSTEM CONCEPTS SYS-ED/ Computer Education Techniques, Inc. Solaris System Administration: Introduction Operating System Concepts Objectives You will learn: • Operating system components. • Solaris usage of processes. • File management and file systems. • Use of the Solaris Management Console. SYS-ED/COMPUTER EDUCATION TECHNIQUES, INC. (Solaris – System Admin: Intro - 6.5) Ch 2: Page i Solaris System Administration: Introduction 1 Operating System Concepts Operating System: Definition An operating system is the set of programs that controls a computer. The core of the operating system is the kernel. The kernel is a control program that functions in privileged state that allows all hardware instructions to be executed. It reacts to interrupts from external devices and to service requests and traps from processes. The kernel creates and terminates processes and responds to requests for service. Operating systems are resource managers. The main resource is computer hardware in the form of processors, storage, input/output devices, communication devices, and data. Operating system functions include: • Implementing the user interface. • Sharing hardware among users. • Allowing users to share data among themselves. • Preventing users from interfering with one another. • Scheduling resources among users. • Facilitating input/output. • Recovering from errors...

Words: 2421 - Pages: 10

Free Essay

Is562 – Database Applications and Programming

...IS562 – Database Applications and Programming 4 points for the first 19 - 2 points for the questions 20 through 31 Chapter 1 1. List all employee information in department 30. select * from emp where deptno = 30; EMPNO ENAME JOB MGR HIREDATE SAL COMM DEPTNO ---------- ---------- --------- ---------- --------- ---------- ---------- ---------- 7499 ALLEN SALESMAN 7698 20-FEB-81 1600 300 30 7521 WARD SALESMAN 7698 22-FEB-81 1250 500 30 7654 MARTIN SALESMAN 7698 28-SEP-81 1250 1400 30 7698 BLAKE MANAGER 7839 01-MAY-81 2850 30 7844 TURNER SALESMAN 7698 08-SEP-81 ...

Words: 1973 - Pages: 8

Free Essay

Unix

...rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-31481-9 Library of Congress Catalog Card Number: 98-89272 Printed in the United States of America First Printing: March 1999 01 00 99 4 3 2 1 EXECUTIVE EDITOR Jeff Koch ACQUISITIONS EDITOR Gretchen Ganser DEVELOPMENT EDITOR Hugh Vandivier TECHNICAL EDITOR Aron Hsiao MANAGING EDITOR Brice Gosnell PROJECT EDITOR Gretchen Uphoff COPY EDITORS Michael Dietsch Kelly Talbot Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. INDEXER Bruce Clingaman PROOFREADER Andrew Beaster Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness...

Words: 112126 - Pages: 449

Free Essay

Bash for Beginners

........................................................................................1 2. Who should read this book? .................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need? ...............................................................................................................................4 9. Conventions used in this document.....................................................................................................4 10. Organization of this document...........................................................................................................5 Chapter 1. Bash and Bash scripts...

Words: 29161 - Pages: 117

Premium Essay

Hello Happy

...EE 4215 Security Technology Chapter 1 Introduction Q1. 1999 – 2000 Sem B 5.b) [8 marks] 2004 – 2005 Sem B 3.b) [8 marks] To give access to authorized people are under four categories. What are they? Gives one example for each category. Answer: 1. What You Have • This means of authentication is based on your having a physical thing. • Example: A key, badge, token, or plastic card. 2. What You Know • Many systems verify authorized access based on what you know. • Example: A password, identification number, or the correct combination of numbers on locks. 3. What You Do • This mode of authorized access is based on something you do that is unique. • Example: Your signature. 4. What You Are • This security system uses biometrics—the science of measuring individual body characteristics. • Example: Fingerprints, retinal scans, and hand characteristics. 1 Chapter 2 Threats To Computer System Q2. 1998 – 1999 Sem B B-1.a) [9 marks] 2000 – 2001 Sem B 3.a) [9 marks] 2003 – 2004 Sem A 5.c) [9 marks] 2004 – 2005 Sem B 5.b) [9 marks] There are three different types of threats: namely disclosure threat, integrity threat and denial of service threat. Describe the characteristics of these threats and the importance of them with example in affecting the normal operations of some computer or organization activities. Answer: Disclosure threat • This threat involves the dissemination of information to an individual for whom that information should not be seen • This information may be in computer...

Words: 2843 - Pages: 12

Premium Essay

Sql Database

...dwqwdlqkdmqwkldnqwkldnwkdnwqdldkwd Solutions To Workshop Exercises Chapter 1: SQL and Data 4 Chapter 2: SQL: The Basics 13 Chapter 3: The WHERE and ORDER BY Clauses 20 Chapter 4: Character, Number, and Miscellaneous Functions 27 Chapter 5: Date and Conversion Functions 42 Chapter 6: Aggregate Functions, GROUP BY and HAVING 57 Chapter 7: Equijoins 73 Chapter 8: Subqueries 108 Chapter 9: Set Operators 126 Chapter 10: Complex Joins 137 Chapter 11: Insert, Update, and Delete 164 Chapter 12: Create, Alter, and Drop Tables 178 Chapter 13: Indexes, Sequences, and Views 188 Chapter 14: The Data Dictionary, Scripting, and Reporting 197 Chapter 15: Security 213 Chapter 16: Regular Expressions and Hierarchical Queries 222 Chapter 17: Exploring Data Warehousing Features 235 Chapter 18: SQL Optimization 248 Chapter 1: SQL and Data In this chapter, you learned about data, how data is organized in tables, and how the relationships among the tables are depicted in a schema diagram. Based on your newly acquired knowledge, design a schema diagram based on the fictional ACME Construction Company. Draw on your own work experience to design the following components. 1. Draw boxes for these three tables: EMPLOYEE, POSITION, and DEPARTMENT. Solution: See the solution for Exercise 3. 2. Create at least three columns for each of the tables and designate a primary key for each table. Solution: See the solution for Exercise 3. 3. Create relationships among the...

Words: 6586 - Pages: 27

Premium Essay

Python Network Programming Cookbook

...www.it-ebooks.info Python Network Programming Cookbook Over 70 detailed recipes to develop practical solutions for a wide range of real-world network programming tasks Dr. M. O. Faruque Sarker BIRMINGHAM - MUMBAI www.it-ebooks.info Python Network Programming Cookbook Copyright © 2014 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: March 2014 Production Reference: 1190314 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-84951-346-3 www.packtpub.com Cover Image by Gabrielay La Pintura (linaza100@hotmail...

Words: 36383 - Pages: 146