1 / 15

UNIX AN INTRODUCTION

File is a container for storing information. It can be treated as a sequence of characters. Unlike the old DOS files, a UNIX file doesn‟t contain eof (end- of –file) mark. A file‟s size is not stored in the file, nor even its name. All files attributes are kept in separate area of hard disk, not accessible to humans, but only to the kernel.<br>UNIX treats directories and devices as files. All physical devices like the hard disk, memory, cd-rom, printer, modem etc. all are treated as file in UNIX.ThesisScientist.com

Download Presentation

UNIX AN INTRODUCTION

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UNIX AN INTRODUCTION 1.1 File: File is a container for storing information. It can be treated as a sequence of characters. Unlike the old DOS files, a UNIX file doesn‟t contain eof (end- of –file) mark. A file‟s size is not stored in the file, nor even its name. All files attributes are kept in separate area of hard disk, not accessible to humans, but only to the kernel. UNIX treats directories and devices as files. All physical devices like the hard disk, memory, cd-rom, printer, modem etc. all are treated as file in UNIX. So files are divided into three categories: 1.Ordinary files: - Also known as regular file, it contains only data as a stream of characters. It is further subdivided into two categories: Text file:- contains only printable characters, and you often view the content and make sense out of them. Binary file:- contains both printable and unprintable characters that cover the entire ASCII range (0-255). Most UNIX commands are binary files, and the object code and exe files produced by C programs are also binary file. 2.Directory files: - directory contains no data, but keeps some detail of the files and subdirectories that it contains. It contains an entry for every file and subdirectory that it houses. Each entry has two components The Filename. A unique identification number for the file or directory (called the inode number). 3.Device file:- you will be installing s/w from Cd –ROM or backing up files to tape. All of these activities are performed by reading or 4 4.writing files representing the device. Device filename are generally found inside a single directory structure, /dev. https://ThesisScientist.com

  2. 1.2 File Name 1.In UNIX, a filename can consist of up to (0 – 255) characters. 2.Files may or may not have extension and can consist of any ASCII characters except / and NULL. 3.it is recommended that only the following characters be used in the filenames: Alphabetic characters and numerals. The period (.), hyphen (-) and underscore ( _ ). UNIX is sensitive to case. 1.4 Various commands 1. $pwd: It is used to see the path of directory. Format: $ pwd Output: It shows the path of the directory. 2. $cd: This is used to change the current directory to the specified directory. Format: $ cd/prog1 Output: user15@administrator-desktop:~ /prog1$ 3. $mkdir: This is used to make directory. Format: $ mkdir dir1 4. $rmdir: This is used to remove directory. Format: $ rmdir dir1 Output: (Directory will be removed) 5. $ls: This is used to list any file or directory. Format: $ ls Output: pos1 pos3 https://ThesisScientist.com

  3. 5.1 $ls filename: This is used to see any particular file. Format: $ file pos3 Output: pos3: ASCII text 5.2 $ls –x: It is used to display the list column wise. Format:$ ls –x 5.3 $ls –r: It is used to sort files in reverse order. 5.4 $ls –F: It tells which file is executable & which is not. Format: $ ls –r Format: $ ls –F 5.5 $ls –t: It is used to sort the files according to their last modification. 6. $cat: It is used to display the contents of file. Format: $ catfile1 Output: echo"this is file inside directory" (contents of file1 are shown) echo"this is user made file" 7. $wc: It is used to count words, lines etc. Format: $ wc Robin1 Output: 3 12 81 Robin1 It has following options: 7.1 $wc –c: It is used to count characters. Format: $ ls –t https://ThesisScientist.com

  4. Format: $ wc -l pos2 Output: 2 pos2 7.2 $wc –l: it is used to count lines. Format: $ wc -c pos2 Output: 35 pos2 7.3 $wc –w: It is used to count words. Format: $ wc -w pos2 Output: 5 pos2 8. $mv: It is used to rename or move the file. Format: $ mv oldfilename newfilename 9. $file: It is used to see whether the file is executable or not. Format: $ file 10. $rm: It is used to remove a file. 10.1$rm filename: It removes the specified filename. First of all, lets see the directory named „pos‟ $ ls pos1 pos3 Here we can see there are 2 files pos1 & pos3 in the directory „pos‟. Now we remove file pos3 as: $ rm pos3 https://ThesisScientist.com

  5. Now when we again list the directory, we get the output as: $ ls pos1 We see that the file pos3 has been removed. 10.2 $rm *: It delete all the files. Format: $ rm * Output: rm: remove write-protected regular file `pos1'? y Now if we press y, then it will remove all the files of directory „pos‟ because, right now we have given the command to remove all files in the directory „pos‟. After we press y, & we list the directory the output is: $ ls os$ We can see that there is no file in the directory „pos‟. 11. $cmp: It is used to compare 2 files byte by byte. First lets see the files inside the directory. $ ls pos1 pos3 Now lets compare them: Format: $ cmp pos1 pos3 Output: pos1 pos3 differ: byte 14, line 1 12. $comm: It is used to see common in two files. Format: $ comm pos1 pos3 Output: echo"this is 2nd file in this directory" echo"this is file inside directory" echo"this is under linux" echo"this is user made file" https://ThesisScientist.com

  6. 13. $diff: It is used to see the difference between 2 files. Format: $ diff Sonam1 Sonam3 Output: 1,2c1,2 < echo"this is file inside directory" < echo"this is user made file" --- > echo"this is 2nd file in this directory" > echo"this is under linux" 1.4 The Process A process is an instance of running a program. If, for example, three people are running the same program simultaneously, there are three processes there, not just one. In fact, we might have more than one process running even with only person executing the program, because the program can “splitinto two,” making two processes out of one. Whenever you issue a command in UNIX, it creates, or starts, a new process. When you tried out the ls command to list directory contents, you started a process. A process, in simple terms, is an instance of a running program. The operating system tracks processes through a five digit ID number known as the pid or process ID . Each process in the system has a unique pid. Pids eventually repeat because all the possible numbers are used up and the next pid rolls or starts over. At any one time, no two processes with the same pid exist in the system because it is the pid that UNIX uses to track each process. Starting a Process: When you start a process (run a command), there are two ways you can run it: Foreground Processes Background Processes Foreground Processes: https://ThesisScientist.com

  7. By default, every process that you start runs in the foreground. It gets its input from the keyboard and sends its output to the screen. You can see this happen with the ls command. If I want to list all the files in my current directory, I can use the following command: [amrood]$ls ch*.doc This would display all the files whose name start with ch and ends with .doc: ch01-1.doc ch010.doc ch02.doc ch03-2.doc ch04-1.doc ch040.doc ch05.doc ch06-2.doc ch01-2.doc ch02-1.doc The process runs in the foreground, the output is directed to my screen, and if the ls command wants any input (which it does not), it waits for it from the keyboard. While a program is running in foreground and taking much time, we cannot run any other commands (start any other processes) because prompt would not be available until program finishes its processing and comes out. Background Processes: A background process runs without being connected to your keyboard. If the background process requires any keyboard input, it waits. The advantage of running a process in the background is that you can run other commands; you do not have to wait until it completes to start another! The simplest way to start a background process is to add an ampersand ( &) at the end of the command. [amrood]$ls ch*.doc & Listing Running Processes: It is easy to see your own processes by running the ps (process status) command as follows: [amrood]$ps PID TTY TIME CMD 18358 ttyp3 00:00:00 sh https://ThesisScientist.com

  8. 18361 ttyp3 00:01:31 abiword 18789 ttyp3 00:00:00 ps One of the most commonly used flags for ps is the -f ( f for full) option, which provides more information as shown in the following example: [amrood]$ps -f UID PID PPID C STIME TTY TIME CMD amrood 6738 3662 0 10:23:03 pts/6 0:00 first_one amrood 6739 3662 0 10:22:54 pts/6 0:00 second_one amrood 3662 3657 0 08:10:53 pts/6 0:00 -ksh amrood 6892 3662 4 10:51:50 pts/6 0:00 ps -f Here is the description of all the fileds displayed by ps -f command: Column Description UID User ID that this process belongs to (the person running it). PID Process ID. PPID Parent process ID (the ID of the process that started it). C CPU utilization of process. STIME Process start time. TTY Terminal type associated with the process TIME CPU time taken by the process. CMD The command that started this process. There are other options which can be used along with ps command: Option Description -a Shows information about all users -x Shows information about processes without terminals. -u Shows additional information like -f option. -e Display extended information. Stopping Processes: https://ThesisScientist.com

  9. Ending a process can be done in several different ways. Often, from a console-based command, sending a CTRL + C keystroke (the default interrupt character) will exit the command. This works when process is running in foreground mode. If a process is running in background mode then first you would need to get its Job ID using ps command and after that you can use kill command to kill the process as follows: [amrood]$ps -f UID PID PPID C STIME TTY TIME CMD amrood 6738 3662 0 10:23:03 pts/6 0:00 first_one amrood 6739 3662 0 10:22:54 pts/6 0:00 second_one amrood 3662 3657 0 08:10:53 pts/6 0:00 -ksh amrood 6892 3662 4 10:51:50 pts/6 0:00 ps -f [amrood]$kill 6738 Terminated Here kill command would terminate first_one process. If a process ignores a regular kill command, you can use kill -9 followed by the process ID as follows: [amrood]$kill -9 6738 Terminated Parent and Child Processes: Each unix process has two ID numbers assigned to it: Process ID (pid) and Parent process ID (ppid). Each user process in the system has a parent process. Implementing file security and sharing, redirection and UNIX 2.1 File Security and sharing File ownership is an important component of UNIX that provides a secure method for storing files. Every file in UNIX has the following attributes: Owner permissions: The owner's permissions determine what actions the owner of the file can perform on the file. Group permissions: The group's permissions determine what actions a user, who is a member of the group that a file belongs to, can perform on the file. https://ThesisScientist.com

  10. Other (world) permissions: The permissions for others indicate what action all other users can perform on the file. 2.2 File Access Modes: The permissions of a file are the first line of defense in the security of a Unix system. The basic building blocks of Unix permissions are the read, write, and execute permissions, which are described below: Read: Grants the capability to read ie. view the contents of the file. Write: Grants the capability to modify, or remove the content of the file. Execute: User with execute permissions can run a file as a program. 2.3 Directory Access Modes: Directory access modes are listed and organized in the same manner as any other file. There are a few differences that need to be mentioned: Read: Access to a directory means that the user can read the contents. The user can look at the filenames inside the directory. Write: Access means that the user can add or delete files to the contents of the directory. Execute: Executing a directory doesn't really make a lot of sense so think of this as a traverse permission. A user must have execute access to the bin directory in order to execute ls or cd command. 2.4Changing Permissions: https://ThesisScientist.com

  11. To change file or directory permissions, you use the chmod (change mode) command. There are two ways to use chmod: symbolic mode and absolute mode. Using chmod in Symbolic Mode: The easiest way for a beginner to modify file or directory permissions is to use the symbolic mode. With symbolic permissions you can add, delete, or specify the permission set you want by using the operators in the following table. Chmod operator Description + Adds the designated permission(s) to a file or directory. Removes the designated permission(s) from a file or directory. - = Sets the designated permission(s). 6.6 Using chmod with Absolute Permissions: The second way to modify permissions with the chmod command is to use a number to specify each set of permissions for the file. Each permission is assigned a value, as the following table shows, and the total of each set of permissions provides a number for that set. Number Octal Permission Representation Ref 0 No permission --- 1 Execute permission --x 2 Write permission -w- 3 Execute and write permission: 1 (execute) + 2 (write) = 3 -wx 4 Read permission r-- 5 Read and execute permission: 4 (read) + 1 (execute) = 5 r-x 6 Read and write permission: 4 (read) + 2 (write) = 6 rw- 7 All permissions: 4 (read) + 2 (write) + 1 (execute) = 7 rwx 2.5 Changing Owners and Groups: While creating an account on Unix, it assigns a owner ID and a group ID to each user. All the permissions mentioned above are also assigned based on Owner and Groups. https://ThesisScientist.com

  12. Two commands are available to change the owner and the group of files: 1.chown: The chown command stands for "change owner" and is used to change the owner of a file. 2.chgrp: The chgrp command stands for "change group" and is used to change the group of a file. 2.6 Changing Ownership: The chown command changes the ownership of a file. The basic syntax is as follows: $ chown user filelist The value of user can be either the name of a user on the system or the user id (uid) of a user on the system. Following example: $ chown amrood testfile $ Changes the owner of the given file to the user amrood. 2.7 Changing Group Ownership: The chrgp command changes the group ownership of a file. The basic syntax is as follows: $ chgrp group filelist The value of group can be the name of a group on the system or the group ID (GID) of a group on the system. Following example: $ chgrp special testfile Changes the group of the given file to special group. 2.8 Pipes and Filters https://ThesisScientist.com

  13. You can connect two commands together so that the output from one program becomes the input of the next program. Two or more commands connected in this way form a pipe. To make a pipe, put a vertical bar (|) on the command line between two commands. When a program takes its input from another program, performs some operation on that input, and writes the result to the standard output, it is referred to as a filter. The grep Command: The grep program searches a file or files for lines that have a certain pattern. The syntax is: $grep pattern file(s) The name "grep" derives from the ed (a UNIX line editor) command g/re/p which means "globally search for a regular expression and print all lines containing it." A regular expression is either some plain text (a word, for example) and/or special characters used for pattern matching. The simplest use of grep is to look for a pattern consisting of a single word. It can be used in a pipe so that only those lines of the input files containing a given string are sent to the standard output. If you don't give grep a filename to read, it reads its standard input; that's the way all filter programs work: $ls -l | grep "Aug" -rw-rw-rw- 1 john doc 11008 Aug 6 14:10 ch02 -rw-rw-rw- 1 john doc 8515 Aug 6 15:30 ch07 -rw-rw-r-- 1 john doc 2488 Aug 15 10:51 intro -rw-rw-r-- 1 carol doc 1605 Aug 23 07:35 macros [amrood]$ There are various options which you can use along with grep command: Option Description -v Print all lines that do not match pattern. -n Print the matched line and its line number. -l Print only the names of files with matching lines (letter "l") -c Print only the count of matching lines. https://ThesisScientist.com

  14. -i Match either upper- or lowercase. Next, let's use a regular expression that tells grep to find lines with "carol", followed by zero or more other characters abbreviated in a regular expression as ".*"), then followed by "Aug". Here we are using -i option to have case insensitive search: $ls -l | grep -i "carol.*aug" -rw-rw-r-- 1 carol doc 1605 Aug 23 07:35 macros $ The sort Command: The sort command arranges lines of text alphabetically or numerically. The example below sorts the lines in the food file: $sort food Afghani Cuisine Bangkok Wok Big Apple Deli Isle of Java Mandalay Sushi and Sashimi Sweet Tooth Tio Pepe's Peppers $ The sort command arranges lines of text alphabetically by default. There are many options that control the sorting: Option Description Sort numerically (example: 10 will sort after 2), ignore blanks and tabs. -n -r Reverse the order of sort. -f Sort upper- and lowercase together. +x Ignore first x fields when sorting. More than two commands may be linked up into a pipe. Taking a previous pipe example using grep, we can further sort the files modified in August by order of size. The following pipe consists of the commands ls, grep, and sort: https://ThesisScientist.com

  15. $ls -l | grep "Aug" | sort +4n -rw-rw-r-- 1 carol doc 1605 Aug 23 07:35 macros -rw-rw-r-- 1 john doc 2488 Aug 15 10:51 intro -rw-rw-rw- 1 john doc 8515 Aug 6 15:30 ch07 -rw-rw-rw- 1 john doc 11008 Aug 6 14:10 ch02 [amrood]$ This pipe sorts all files in your directory modified in August by order of size, and prints them to the terminal screen. The sort option +4n skips four fields (fields are separated by blanks) then sorts the lines in numeric order. The pg and more Commands: A long output would normally zip by you on the screen, but if you run text through more or pg as a filter, the display stops after each screenful of text. Let's assume that you have a long directory listing. To make it easier to read the sorted listing, pipe the output through more as follows: $ls -l | grep "Aug" | sort +4n | more -rw-rw-r-- 1 carol doc 1605 Aug 23 07:35 macros -rw-rw-r-- 1 john doc 2488 Aug 15 10:51 intro -rw-rw-rw- 1 john doc 8515 Aug 6 15:30 ch07 -rw-rw-r-- 1 john doc 14827 Aug 9 12:40 ch03 . . . -rw-rw-rw- 1 john doc 16867 Aug 6 15:56 ch05 --More--(74%) https://ThesisScientist.com

More Related