© 2002 computerprep, inc. all rights reserved. linux+
TRANSCRIPT
Objectives
• List common Linux functions and services• Identify basic concepts, terms, and function of
system components• Identify common distributions• Describe the functions and features of a Linux
solution• Understand the GNU Public License• Differentiate between the GPL and additional
licensing schemes
LinuxCharacteristics
• The shell, applications, and daemons• Linux is multiuser• Linux is multitasking• Linux is weakly integrated• UNIX/Linux is command-line oriented• Linux and stability• Network support
Common LinuxFeatures and Roles
• Clients• Servers• Additional features and roles• Using "free" software
CommonLinux Distributions
• Distributions versus vendors• Custom kernels and specialized platforms• Strengths and weaknesses of various distributions
Open SourceLicensing
• GNU Public License• Copyright versus "copyleft"• Common open source licensing schemes
Summary
List common Linux functions and services Identify basic concepts, terms, and function of
system components Identify common distributions Describe the functions and features of a Linux
solution Understand the GNU Public License Differentiate between the GPL and additional
licensing schemes
Objectives
• Identify the role of the system and determine software according to customer requirements
• Validate that system hardware is supported by the Linux operating system
• Identify hardware and installation issues with mobile system hardware
• Ensure that system hardware is configured correctly before installation
Planning the Implementation
• Identifying the system role• Common software packaging options• Evaluating support requirements• Determining software requirements
System BIOSand the CMOS
• Basic Input/Output System (BIOS)• Complementary Metal Oxide Semiconductor
(CMOS)
Standard IRQAssignments
• System timer• Keyboard controller• Real-time clock• COM1 / COM2 / COM3• LPT1 / LPT2• PS/2 mouse port (motherboard)
ISAand PCI
• Expansion slots• Industry Standard Architecture (ISA)• Peripheral Component Interconnect (PCI)• Local bus architecture
– Accelerated Graphics Port (AGP)
Plug-and-PlayDevice Configuration
• Requires– System BIOS that supports plug-and-play– Plug-and-play-compliant operating system– Plug-and-play device (such as a modern PCI
card)
PeripheralConnectors and Cables
• PS/2-style connectors• Parallel ports• Serial ports• USB ports• IEEE 1394 (FireWire and i.Link)• Infrared Developers Association (IrDA)
Small ComputerSystems Interface (SCSI)
• SCSI types• Drivers, maximum device numbers, and logical
numbering• SCSI termination
– Active Passive
MobileSystem Hardware
• Personal Computer Memory Card Industry Association (PCMCIA)
• Hot swapping and system BIOS
ObtainingLinux Information
• Software and hardware manuals• HOWTO documents• Web sites• Linux User Group meetings• Info and man pages
Summary
Identify the role of the system and determine software according to customer requirements
Validate that system hardware is supported by the Linux operating system
Identify hardware and installation issues with mobile system hardware
Ensure that system hardware is configured correctly before installation
Objectives
• Determine the appropriate method of installation based on the environment
• Identify the necessary storage space and partition scheme for Linux implementation
• Differentiate between GUI and text-based installation methods
• Install Linux
Objectives (cont'd)
• Explain how to structure a command at the Linux command line
• Log on to a Linux machine and use su• Describe "root etiquette"• Confirm your Linux configuration• Explain the Linux kernel naming convention
Linux andHardware Compatibility
• Finding the right Hardware Compatibility List (HCL)– Red Hat– SUSE– Slackware
Storage Spaceand Partition Schemes
• Disk preparation• Clusters• Active partition• Logical drive• Format• Root directory
Linux, LILO andthe 1024 Cylinder Limit
• Cylinders versus megabytes• Assorted hard drive installation guidelines
Configuring TCP/IP
• IP addressing– Class A– Class B– Class C– Reserved
• Netmasks• Private IP addresses• Domain Name System
LoadableKernel Modules
• Automated formatting• Security measures
– Shadow passwords– Enhanced encryption options
• Installation checklists
LinuxCommands
• Can contain up to three parts– The command itself– A collection of options– An argument
YourLogon Account
• Logging on and off– The root account– Root etiquette– The su –c command
• Changing your password
Summary
Determine the appropriate method of installation based on the environment
Identify the necessary storage space and partition scheme for Linux implementation
Differentiate between GUI and text-based installation methods
Install Linux
Summary (cont'd)
Explain how to structure a command at the Linux command line
Log on to a Linux machine and use su Describe "root etiquette" Confirm your Linux configuration Explain the Linux kernel naming convention
Objectives
• Describe the Linux system hierarchy• Identify file system types• Use system navigation commands• Create and delete files and directories• Assign permissions using chmod• Create hard and symbolic links• Use the find command
The LinuxFile System Hierarchy
• File location names• Understanding the root directory• Hidden files
LinuxFile Name Conventions
• File name completion– File name completion characters– File name matching character keys
Paths
• Absolute paths• Relative paths and the current working directory• Periods, double periods, and tildes
Working withDirectories using ls
• Listing directories• Long form listing• Changing the work directory• Creating and deleting subdirectories
BasicAccess Permissions
• Permission bits• Reading permissions• Changing permissions• The umask command
AdditionalAccess Control Bits
• Save text permission• SUID/SGID permissions• chattr• lsattr• The immutable bit
Usingwhereis and locate
• whereis searches for binaries found in the known search path
• locate can be customized so that only certain files can be found
MultipleCommands and xargs
• xargs modifies the output of a previously executed command so that a new command can read the output as a command-line argument
Summary
Describe the Linux system hierarchy Identify file system types Use system navigation commands Create and delete files and directories Assign permissions using chmod Create hard and symbolic links Use the find command
Objectives
• Use vi• Differentiate between vi's command and editing
modes• Copy and paste text using vi• Open a command prompt in vi• Distinguish vi from other text-editing applications
Vi
• Running vi• Edit mode and command mode• Vi command structure• Quitting vi• Cursor movement• Inserting text into a file• Deleting, posting and yanking• Search and replace commands• Customizing vi and the .exrc file
Pico
• Pico commands– CTRL + W– CTRL + K– CTRL + U– CTRL + R– CTRL + O– CTRL + Y– CTRL + V– CTRL + T– CTRL + G– CTRL + X
Summary
Use vi Differentiate between vi's command and editing
modes Copy and paste text using vi Open a command prompt in vi Distinguish vi from other text-editing applications
Objectives
• Create, copy and delete files and folders• Use text-reading commands• Conduct Telnet, SSH, FTP, Web and e-mail
sessions• Set system time• Use system configuration applications
Copying, Movingand Deleting Files
• Copying cp• Moving (renaming) mv• Deleting rm• Deleting empty directories rmdir
MiscellaneousCommands
• The date command• The timetool command• Setting the time zone• The w command• The cal command• The bc command• Clear and cd• Viewing command history and executing
commands
Linuxconfand Netconf
• Red Hat Package Manager (RPM)• ncurses• gnome-linuxconf• Network Configurator
Summary
Create, copy and delete files and folders Use text-reading commands Conduct Telnet, SSH, FTP, Web and e-mail
sessions Set system time Use system configuration applications
Objectives
• Read and change environment variables• Use virtual terminals• Customize your logon environment by modifying
files such as .bashrc• Identify the files that are responsible for
establishing a logon environment• Create command aliases• Access the online help system
Understanding the Understanding the Logon EnvironmentLogon Environment
• Your logon shell• Your home directory• Your environment variables• Virtual terminals
– CTRL + ALT + F2CTRL + ALT + F2
Modifyingthe Search Path
• Making search path changes persistent– The which command and the search path
TheLinux Manual
• Layout of the manual– Manual sections
• A typical manual page (name, synopsis, description, options, example, files, bugs)
• Xman
Summary
Read and change environment variables Use virtual terminals Customize your logon environment by modifying
files such as .bashrc Identify the files that are responsible for
establishing a logon environment Create command aliases Access the online help system
Objectives
• Create and delete users• Manage groups• Modify user settings• Identify the purpose of the /etc/skel directory• Modify user permissions with chown and chgrp• Describe the gpasswd command• Identify the purpose of the sudo suite of tools
UserAccounts
• Properties of an account• The password file• The shadow password file
– Enabling shadow passwords
AutomatedAccount Creation
• Account creation, modification and deletion• The useradd command• The passwd command• The usermod command• The userdel command• Automated account creation using linuxconf
System Accounts and Special User Accounts
• Accounts with names such as daemon, sys and uucp used by system processes
• Special user accounts are limited logon shells dedicated for a single purpose
Summary
Create and delete users Manage groups Modify user settings Identify the purpose of the /etc/skel directory Modify user permissions with chown and chgrp Describe the gpasswd command Identify the purpose of the sudo suite of tools
Objectives
• Compile code from source packages• Recognize common errors concerning package
dependencies• Determine the cause of package version conflicts• Describe the purpose of shared libraries• Use ldd and ldconfig to manage libraries• Identify shared library errors
Using RPM
• Functions– RPM queries entire packages– RPM installs binaries or source files using only
one command– RPM maintains a database of installed
applications, libraries and daemons
RPMNaming Scheme
Package Name Version Release Architecture Ending . . - -
ext2resize 1.0.5 2 i386 rpm
RPM andthe Root Account
• Listing package contents• Listing all contents• Listing RPM descriptions• Verifying packages to learn about missing files• Querying a file from a package
Installing,Upgrading and Deleting
• Installing remotely• Searching for an installed RPM• Deleting an RPM• Upgrading and rebuilding an RPM• Graphical utilities
Maintaining the RPM Facility and Obtaining RPM Files
• rpm –initdb: Creates RPM database• rpm –rebuilddb: Rebuilds database• RPMs are available at www.rpmfind.net,
www.redhat.com, www.mandrake.com
Summary
Compile code from source packages Recognize common errors concerning package
dependencies Determine the cause of package version conflicts Describe the purpose of shared libraries Use ldd and ldconfig to manage libraries Identify shared library errors
Objectives
• Describe the Linux boot process• Stop the system in an orderly manner• Use single-user mode to handle problems• Specify a run level at boot time• Identify the /etc/inittab file• Use the fsck command• Explain how startup scripts operate• Use ksysv, ntsysv and chkconfig
TheBoot Process
• Run levels• Changing run levels
– Halting and rebooting the system• Single-user mode• Specifying init levels during system boot
Summary
Describe the Linux boot process Stop the system in an orderly manner Use single-user mode to handle problems Specify a runlevel at boot time Identify the /etc/inittab file Use the fsck command Explain how startup scripts operate Use ksysv, ntsysv and chkconfig
© 2002 ComputerPREP, Inc. All rights reserved.
Lesson 11:I/O Redirection,
Variables and Shell Scripts
Objectives
• Differentiate between standard output and standard error
• Explain I/O redirection• Use regular expressions with the shell• Work with shell variables• Search within files for patterns using grep• Program basic shell scripts using common shell
commands
I/ORedirection
• I/O redirection operators• Filters• Pipelines• Redirecting standard error• Discarding standard error with /dev/null
Interactingwith the Shell
• Shell wildcards• Quoting and escapes
– Single and double quotation marks– The backtic character
ShellScripts
• What is a shell script?• Writing a shell script• Running a shell script
– The dot command
Summary
Differentiate between standard output and standard error
Explain I/O redirection Use regular expressions with the shell Work with shell variables Search within files for patterns using grep Program basic shell scripts using common shell
commands
Objectives
• Check system processes• Differentiate between a PID, a PPID and a child
process• Use foregrounded and backgrounded processes• Use kill, killall, ps and top• Prioritize processes using nice and renice• Sample CPU and Memory usage• Use cron to schedule processes
System andNetwork Daemons
• Monitoring and managing daemon processes• Typical log files in the /var/log/ directory
– messages– boot.log– Lastlog– Maillog– Secure– httpd/
Process IDand Parent Process ID
• Process ownership, daemons, and supporting applications– Real and effective PID– Child processes
JobControl
• Foreground processes and background processes– Foregrounding and multiple jobs
• Options for kill and killall• Using nice and renice
Managing Processeswith Top and Uptime
• The top program generates a continually updated list of processes, sorted according to CPU usage
• Top can also be used to kill processes
SchedulingProcesses with Cron
• Cron job types– User-based– Systemwide
• Cron elements• The crontab command
Summary
Check system processes Differentiate between a PID, a PPID and a child
process Use foregrounded and backgrounded processes Use kill, killall, ps and top Prioritize processes using nice and renice Sample CPU and Memory usage Use cron to schedule processes
Objectives
• Identify commonly used file system formats used by Linux
• Use the /etc/fstab file• Use mount and umount to manage the file system• Mount and unmount partitions• Differentiate between /dev/ and /mnt/• Create and format new partitions
Using themount Command
• Determining current file system status• Mounting and unmounting devices• Unmounting drives
Mount and Removable Media
• Unmounting removable media• The /etc/fstab file and mounting disks• Additional options to the mount command
Disk Partitioningand Formatting
• Replacing a faulty disk• Adding a disk due to system usage• Adding a new partition to an existing disk• Destroying information
Summary
Identify commonly used file system formats used by Linux
Use the /etc/fstab file Use mount and umount to manage the file system Mount and unmount partitions Differentiate between /dev/ and /mnt/ Create and format new partitions
© 2002 ComputerPREP, Inc. All rights reserved.
Lesson 14:The Kernel, Modules and
Customizing the Boot Process
Objectives
• Identify when to recompile the kernel• Distinguish between a monolithic and a modular
kernel• Load and manage kernel modules• Describe the purpose of the /etc/modules.conf file• Customize system boot by editing lilo.conf• Pass arguments to the kernel at the LILO prompt• Reconfigure GRUB using the /boot/grub/grub.conf
file
Major Kernel Responsibilities
• Process scheduling• Input/output• Virtual memory• System calls• Device drivers
KernelModules
• Module location• Loading and listing system modules
– The modules.conf file– Linuxconf and the kernel– kernelcfg
Customizing the Boot Process
• Lilo• lilo.conf• Modifying lilo.conf• Additional LILO options• Troubleshooting lilo.conf
Summary
Identify when to recompile the kernel Distinguish between a monolithic and a modular
kernel Load and manage kernel modules Describe the purpose of the /etc/modules.conf file Customize system boot by editing lilo.conf Pass arguments to the kernel at the LILO prompt Reconfigure GRUB using the /boot/grub/grub.conf
file
Objectives
• Identify basic networking topologies and wiring types
• List common network types• Discuss common network protocols• Configure Linux for an IP network• Use network commands• Troubleshoot connectivity• Connect to NFS and Samba servers• Describe inetd, xinetd, and TCPWrappers
Understanding Ports
• The netstat command• Checking your machine's routing status with
netstat• The route command• Traceroute• Using lsof• Troubleshooting DNS
Connectingto Linux Daemons
• The Network File System (NFS)• The Network Information System (NIS)• Samba• The rlogin command
The Internet Daemonand TCPWrappers
• The Internet daemon– inetd.conf syntax– Using xinetd– Restarting inetd and xinetd
• TCPWrappers– Syntax for hosts.allow– Syntax for hosts.deny
Summary
Identify basic networking topologies and wiring types
List common network types Discuss common network protocols Configure Linux for an IP network Use network commands Troubleshoot connectivity Connect to NFS and Samba servers Describe inetd, xinetd, and TCPWrappers
Objectives
• Configure a client workstation for remote access• Select a modem to enable dial-up access• Use setserial to determine serial port speed• Use modem and connection troubleshooting tools• Explain how to configure ISDN connections
Modemsand Interfaces
• ISDN• Additional types of dial-up interfaces
– SLIP– CSLIP– PLIP
• Selecting the correct modem
UsingSetserial
• Allows you to obtain information about serial ports• Allows you to set values for serial ports
PPCConfiguration
• PPC authentication types– PAP– CHAP– MS-CHAP
• Point-to-Point Protocol Over Ethernet• PPP configuration files• PPP daemon files
Summary
Configure a client workstation for remote access Select a modem to enable dial-up access Use setserial to determine serial port speed Use modem and connection troubleshooting tools Explain how to configure ISDN connections
Objectives
• Describe the relationship between X-Window servers and window managers
• Specify background colors and fonts• Redirect X-Window sessions• Troubleshoot X-Window sessions• Reconfigure the X-Window environment using
standard applications
What IsX-Window?
• Components– X-Window server– X-Window client– Font server– Window manager– Virtual desktop software
NumberingX-Window Displays
• Starting X-Window clients in the background• X-Window options
– X-Window and color schemes– Geometry– The xwininfo command– Fonts– Colors– Title
Conducting Remote Logon Sessions with X-Window
• Remote logons and X-Window• The xdm server• The X command
TroubleshootingX-Window
• The .X.err file• Killing problem X-Window applications
– The kill command– The killall command
ReconfiguringX-Window
• xf86config• SuperProbe• Xconfigurator• XF86Setup• Activating the mouse wheel in Linux
Summary
Describe the relationship between X-Window servers and window managers
Specify background colors and fonts Redirect X-Window sessions Troubleshoot X-Window sessions Reconfigure the X-Window environment using
standard applications
Objectives
• Add and configure printers• Manage print spools and queues• Troubleshoot common printing problems• Resolve printing problems based on user feedback
Linux Print Terminology
• Printer name
• Filter
• Print directory
• Print spooler directory• Print device• Printer daemon
UsingPrintTool
• Automatically probes existing parallel ports• Allows you to create entries in /etc/printcap
Connecting toa Remote Printer
• Requires– User name and password– Protocol– Name and IP address– Name of local print spooler directory
Summary
Add and configure printers Manage print spools and queues Troubleshoot common printing problems Resolve printing problems based on user feedback
Objectives
• List common backup methods and strategies• Identify common backup media• Recognize additional backup options• Use tar, compress, gzip and zip to back up files
onto tape archives• Troubleshoot backup and restore errors
Planning aBackup Strategy
• Determining which files to back up• Selecting a backup method• Verifying backup integrity• Planning and practicing restoration procedures
Selecting aBackup Method
• Full backup• Differential backup• Incremental backup• Copy• Comparing strategies
CommonBackup Media
• Floppy disks• Zip disks• Writable and rewritable CD-ROMs• Tapes• Choosing local or network backup• Mass backup devices
– CD jukebox– Stackloader
VerifyingBackup Integrity
• Verifying archive existence• Listing contents of archive• Verifying archive integrity• Offsite storage
Archivingand Compression
• Using tar to create and extract archives• Tar options• Extracting a single file or directory• Using compress/uncompress• Using gzip/gunzip• Using zip and unzip
Troubleshooting Backupand Restore Errors
• Faulty media• Unintentional erasing• Improper storage• Common restoring errors
Summary
List common backup methods and strategies Identify common backup media Recognize additional backup options Use tar, compress, gzip and zip to back up files
onto tape archives Troubleshoot backup and restore errors
Objectives
• Describe software and hardware troubleshooting best practices
• Identify when to increase swap space• Identify boot failure messages• List options for providing fault tolerance• Fix systems with system boot disks• Read and identify core dump messages• Consider physical environment and security
Hardware Updating Best Practices
• Expansion boards• Kudzu and Linux hardware• Memory and peripheral upgrade procedures• Replacing and maintaining a hard disk
ResourceConflicts
• Common symptoms of device conflicts• Troubleshooting tools• Troubleshooting cables• Attenuation
Troubleshooting theLinux Boot Process
• Booting into single mode• Using Linux interactive mode• Using a boot floppy disk or the installation CD as a
rescue disk• Obtaining a copy of the boot sector and restoring
it to the hard drive• Core dumps
The Linux System's Physical Environment
• Ventilation and temperature• Humidity• Water• Dust• Magnetic fields
SystemSecurity Issues
• Locked doors• Password-protected screen savers• Secure removable drives and drive ports• Unused logon accounts• Shadow utilities• Monitor log files
Summary
Describe software and hardware troubleshooting best practices
Identify when to increase swap space Identify boot failure messages List options for providing fault tolerance Fix systems with system boot disks Read and identify core dump messages Consider physical environment and security
Linux+
Linux Characteristics and Features Preparing for Installation Installing Linux Navigating the System Using Vi An Arsenal of Linux Commands Customizing the Linux Logon Environment
Linux+
User Management Managing Packages and Shared Libraries Managing Run Levels I/O Redirection, Variables and Shell Scripts Managing Processes and System Elements Managing the Hard Drive The Kernel, Modules and Customizing the Boot
Process Networking with Linux