1 / 42

Week Nine Agenda

Week Nine Agenda. Announcements Link of the week Review week eighth lab assignment Week nine expected outcomes Next lab assignment Break-out problems Upcoming deadlines Lab assistance, questions, and answers. Link of the week. http://en.wikipedia.org/wiki/Firmware

Download Presentation

Week Nine Agenda

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Week Nine Agenda • Announcements • Link of the week • Review week eighth lab assignment • Week nine expected outcomes • Next lab assignment • Break-out problems • Upcoming deadlines • Lab assistance, questions, and answers

  2. Link of the week http://en.wikipedia.org/wiki/Firmware This Web site contains information on: - Evolved firmware uses - Firmware and device drivers - Firmware support challenges in PCs - Firmware hacking http://www.driver-fix.com/driverdetective.php?t=Firmware DiverDetective Download driver updates automatically and safely. This software utility will keep your system up to date by automatically retrieving the latest drivers from your hardware’s manufacturer.

  3. Link of the week Define Firmware: A computer program that is embedded in the hardware device. Firmware can be stored in flash memory or as a binary image file that can be uploaded onto existing hardware by a user. In summary, firmware is a combination of hardware and software. Firmware applications include the following: - BIOS found in IBM-compatible PCs. - Open Firmware, used in computers marketed by Sun Microsystems and Apple Computers. - EPROM chips used in the Eventide H-3000 series of digital music processors. - The iPod’s control menus. - The Common Firmware Environment (CFE). - Cisco IOS

  4. Review eighth week lab assignment • ANSI The Institute oversees the creation, promulgation and use of thousands of norms and guidelines that directly impact businesses in nearly every sector: from acoustical devices to construction equipment, from dairy and livestock production to energy distribution, and many more. ANSI is also actively engaged in accreditingprograms that assess conformance to standards – including globally-recognized cross-sector programs such as the ISO 9000 and ISO 9001. • Membership: Comprised of Government agencies, Organizations, Companies, Academic and International bodies, and individuals, the American National Standards Institute (ANSI) represents the interests of more than 125,000 companies and 3.5 million professionals.

  5. Review eighth week lab assignment • ANSI is the official U.S. representative to the International Organization for Standardization (ISO). • The American National Standards Institute (ANSI) has served in its capacity as administrator and coordinator of the United States private sector voluntary standardization system for more than 90 years.

  6. Review eighth week lab assignment Linux /etc/sysconfig The /etc/sysconfig directory contains files that control the system configuration. /etc/sysconfig/clock Used to configure the system clock to Universal Time and other clock parameters. /etc/sysconfig/init This file controls how the system will appear and function during the boot process..

  7. Review eighth week lab assignment /etc/sysconfig/keyboard Used to configure the keyboard. /etc/sysconfig/mouse This file is used to specify information about the available mouse. /etc/sysconfig/network Used to configure networking options. /etc/rc.d/rc.local This file is executed after the other init scripts. Put commands that performs some system customization.

  8. Review eighth week lab assignment /etc/fstab - The fstab file is read by software applications. It is the duty of the system administrator to create and accurately maintain this file. - Each file system is described on a separate line. - Fields on each line are separated by tabs and spaces. - # comments - The order in which these records are listed is important.

  9. Review eighth week lab assignment etc/fstab /dev/vg00/root / ext3 defaults 1 1 LABEL=/boot /boot ext3 defaults 1 2 none /dev/pts devpts gid=5,mode=620 0 0 /dev/vg00/home /home ext3 defaults 1 2 /dev/vg00/opt /opt ext3 defaults 1 2 none /proc proc defaults 0 0 none /dev/shm tmpfs defaults 0 0 /dev/vg00/tmp /tmp ext3 defaults 1 2 /dev/vg00/usr /usr ext3 defaults 1 2 /dev/vg00/var /var ext3 defaults 1 2 /dev/vg00/swap swap swap defaults 0 0 /dev/cdrom /mnt/cdrom udf,iso9660 noauto,owner,kudzu,ro 0 0 /dev/fd0 /mnt/floppy auto noauto,owner,kudzu 0 0 /dev/vg02/shome /export/home ext3 defaults 1 2 #/dev/vg01/oracle /mnt/pkg1/oracle ext3 noauto 1 2 #NOTICE: oracle and shome are shared storage. Make sure they are not mounted # on the other side before mounting.

  10. Review eighth week lab assignment Field description of /etc/fstab 1st field describes the block special device or remote file system to be mounted. 2nd field describes the mount point for the file system. 3rd field describes the type of file system. 4th field describes the mount options associated with the file system. 5th field describes which file systems will need to be dumped by the dump() command. 6thfield is used by fsck to determine the order in which the file systems are checked at boot time.

  11. Review eighth week lab assignment File Systems File systems are usually mounted read-only. This makes it possible to check the file system while it is mounted; it is not a good idea to check a file system that is mounted read-write.

  12. Review eighth week lab assignment Fsck Command • Fsck utility checks the file system’s consistency, reports any problems it finds, and optionally repairs them. • On many legacy systems such as BSD style systems, the fsck command is invoked automatically on boots and reboots. • Format: fsck [options] device • The kernel supports the following file systems: Demonstrate: /proc cat filesystems

  13. Review eighth week lab assignment Fsck Utility The exit code returned by fsck is the sum of the following conditions: 0 - No errors 1 - File system errors corrected 2 - System should be rebooted 4 - File system errors left uncorrected 8 - Operational error 16 - Usage or syntax error 32 - fsck canceled by user request 128 - Shared library error

  14. Review week eight lab assignment Rpm Package Manager Red Hat Package Manager (rpm) is a package management system. Free software tool which installs, updates, uninstalls, verifies and queries other software packages in this format.

  15. Review week eight lab assignment Package Advantages 1. Used in a uniform way for the user to install programs 2. Uninstalling programs is simple 3. Non-interactive installation makes it easy to automate 4. Original source archive (e.g. .tar.gz,.tar.bz2) 5. Packages can be cryptographically verified with AES, and MD5.

  16. Review week eight lab assignment File Representation A file format is a particular way to encode information for storage in a computer file. Disk drives or computer storage are represented in bits. A computer must convert information to 0s and 1s and vice-versa. A computer file format can be represented as either a binary image or ASCII file. ASCII is used on most PCs and Macintoshes. EBCDIC (Extended Binary-Coded Decimal Interchange Code is an IBM code for representing characters as numbers. IBM uses EBCDIC widely on large computers.

  17. Review week eight lab assignment File Representation Binary image files represent 256 different binary codes.

  18. Review week eight lab assignment Binary image files use to be able to represent more character codes than ASCII because eight bit bytes were used, whereas ASCII files used seven bits. Now Extended ASCII uses eight bit bytes and can represent 256 character Executable software, mostly word processing files and databases, spread sheets and multimedia files are binary. However, text and source program files as well as HTML and XML files are ASCII.

  19. Review week eight lab assignment The Internets SMTP mail protocol supports only ASCII. When a binary file is attached to an email message, the 8-bit format is converted to a temporary 7-bit format to pass through the mail servers. Encoding formats such as MIME, at the receiving end converts the 7-bit format back into 8-bit binary format. The 8-bit to 7-bit conversion makes files larger as they traverse the Internet.

  20. Review week eight lab assignment Different file formats for different kinds of information. JPEG format – designed to store static photographic images. GIF format – designed to store still images and simple animation. QuickTime format – designed as a container for many different types of multimedia.

  21. Week nine expected outcomes Upon successful completion of this module, the student will be able to: • Analyze processes of startup and shutdown. • Apply startup scripts and controls to tune system. • Describe basic "autonomous" processes in UNIX.

  22. Next Lab Assignment Initializing or Booting a System • CPU is pre-set to RESET mode • CPU pre-programmed to seek 0xfffffff0 address location • BIOS reads MBR (Track 0, Sector 1) • First part of MBR contains the boot partition table and executable code • Second part of the MBR is used to locate the boot loader. It resides on the “active” partition known as the Boot Sector. • Device drivers are loaded (initrd-2.4.20-8.img) • Kernel is invoked • Init process invoked

  23. Next Lab Assignment Linux Boot Procedure 1. The system startup stage depends on the hardware device that Linux is being booted on. Floppy disk, CD-ROM, a partition on a hard disk, a device on the network, or a USB flash memory stick. Linux is usually booted from a hard disk. 2. After the system locates the boot device, the first part of the boot loader is loaded into RAM and executed. Normally, the first part of the boot loader is less than 512 bytes and is responsible for loading the second part of the boot loader.

  24. Next Lab Assignment Linux Boot Procedure 3. The first 446 bytes are considered the primary boot loader, which contains both executable code and error message text. 4. The second sixty four bytes are the partition tables, which contains a record for each of the four partitions. 5. The last two bytes are the magic number which serves as a validation check of the Master Boot Record (MBR).

  25. Next Lab Assignment Linux Boot Procedure 6. When the second part of the boot loader is loaded into RAM and executed, a pop up screen displays Linux and the optional initial RAM being loaded into memory. 7. The second part of the boot loader is called the kernel loader. After the boot images are loaded, the second part of the boot loader passes control to the kernel image. At this point, the kernel is decompressed and initialized.

  26. Next Lab Assignment Linux Boot Procedure 8. The second part of the boot loader checks the system hardware, lists attached hardware devices, mounts the root device, and loads the kernel modules.

  27. Next Lab Assignment Master Boot Record (MBR) The MBR is not located in a partition, it is located at a Main Boot Record area in front of the first partition. When a data storage device has been partitioned with the MBR Partition Table scheme the master boot record contains the primary partition entries in its partition table. By convention, there are exactly four primary partition table entries in the MBR Partition Table scheme.

  28. Next Lab Assignment Boot Loaders The following directory contains the different Linux boot loader and alternate loaders: Demonstrate: /boot/grub The Linux Loader (LILO) is the combination of parts one and two boot loaders. Because of some disadvantages in the LILO loader, the GRand Unified Bootloader (GRUB) has become more widely used.

  29. Next Lab Assignment Kernels Display a list of available kernels with soft links from /etc/grub.conf and /etc/grub/menu.1st. Can’t access the list from /boot/grub directory. Demonstrate: /etc/grub.conf This is a symbolic link to /boot/grub/grub.conf

  30. Next Lab Assignment Init Process Location: /sbin/init First process to execute in user space Executes: background Process ID: 1 (one) Parent Process ID: 0 (zero) Owner: root Demonstrate: pid_ppid.sh (use two putty windows) Highlight the relationship of the init process to all other executing processes.

  31. Next Lab Assignment Linux Performance Tools sar command is performance monitoring tool. It can find out what Linux is doing all the time. It can generate report and email them to sys admin. vmstat command that reports information about processes, memory, paging, block IO, traps, and cpu activity. free command displays the total amount of free and used physical and swap memory in the system, as well as the buffers used by the kernel.

  32. Next Lab Assignment Linux Performance Tools iostat command is used for monitoring system input/output device loading by observing the time the devices are active in relation to their average transfer rates i.e. it is useful to monitor disk throughput.

  33. Next Lab Assignment Linux system run level modes 0 - Halt system 1 – Single user 2 – Multi-user mode 3 – Full multi-user 4 – unused 5 – X11 6 - Reboot Shutdown command shutdown Review the Startup/Shutdown lab assignment

  34. Next Lab Assignment /etc/rc.d init.d rc0.d rc2.d rc4.d rc6.d rc.sysinit rc rc1.d rc3.d rc5.d rc.local /etc rc rc4.d init.d rc0.d rc5.d rc.sysinit rc1.d rc6.d rc2.d rc.d rc3.d rc.local

  35. Next Lab Assignment Activities managed by the kernel Responsive - users Autonomous - daemons The kernel consists of a collection of low level procedures. These procedures are called system calls and they are the primary means for a program to interact with other parts of the system. Explain the difference between the K and S as a script prefix. Demonstrate Execution of the newuid.pl and process.sh scripts Provide examples of pids and ppids (pid_ppid.sh)

  36. Next Lab Assignment Shell Commands df (disk space usage) df –i (file system inode utilization) history (list commands previously input) tail (read records at end of file) head (read records at start of file)

  37. Break-out problems • What functionality does the mingetty or getty perform? • Define the kernel responsive and autonomous functions? • What system functionality does the /etc/fstab file provide? • What is the functionality does the /etc/sysconfig directory provide? • What functionality does the /etc/inittab file provide? • Commands ls -li who -r kill kill –l uptime w telinit sleep

  38. Upcoming deadlines Lab Assignment 13-1 Public Domain/Open Software Evaluation Bulletin Board: Open Source Presentation Sign Up No two presentations shall be the same. Lab assignment grade components. Paper: 0 – 75 points Presentation 0 – 25 points Presentation dates: July 27 (week 14) August 3 ( week 15)

  39. Upcoming deadlines • Lab Assignment 8-1, Installation Exercise is due June 27, 2010. • Lab Assignment 9-1, Startup/Shutdown is due July 4, 2010. • Lab Assignment 10-1, Account/LDAP Script is due July 11, 2010. • Lab Assignment 10-2, Process Exercise is due July 11, 2010. • Lab Assignment 11-1, Knoppix File System Exercise is due July 18, 2010. • Final exam outline will be available on July 25, 2010. • Module 5, System Startup and Shutdown is for week 9.

  40. Lab assistance, questions and answers • Questions • Comments • Concerns • I am available after this Franklin Live session to discuss any problems and/or concerns regarding the lab assignments

More Related