Preview

NT1430 Linux Networking

Better Essays
Open Document
Open Document
1121 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1430 Linux Networking
NT1430 Linux Networking: Study Guide
Wed 21-November-2012
Linux Commands: Know these commands and what they do:
• Directory and list commands o ls, ls –l o pwd o cd / o cd and cd~ (hint: both take you to your home directory) o cd .. (takes you up one directory
• Know what cp and mv do and how to use them
• File viewing commands: o cat o less and more (one page at atime) o vi and view o tail (shows the last 10 lines of a file) o head (shows the top 10 lines)
• chmod for changing permissions on files and directories
• know the differences in read write and execute for owner group and all
• > to redirect output to a file (overwrites if file exists)
• >> appends to a file
• & puts a process in the background while fg brings it to the foreground.
• ps –ef | grep programname locates a running process for you
• grep is a program that searches for a string within a directory or command output
• The pipe symbol ( | ) sends output from one command to the input of another.
• Know what a Linux shell script is.
Direcories and file systems
• / is the root of the entire file system
• /usr stores program files
• /home stores user home directories
• /etc stores Linux configuration files
• /var stores various miscellaneous files
• /proc is a virtual directory that stores system performance metrics. It does not exist on disk and disappears when the system is turned off.
• /tmp stores temporary files that disappear on system shutdown or reboot
• The file /etc/fstab links physical disk partitions to the filesystem directories
• The mount command links a new disk location to a new directory.
• NFS (Network File System) allows you to share directories and files with other Linux systems.
• The configuration for NFS is stored in /etc/exports
Runlevels
• Know what each run level 0-6 does and how to change levels with the telinit command
• Understand the differences between text based and graphical interfaces
• Understand the difference between single

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The General approach of the process of troubleshooting TCP/IP connectivity issues with the assumption that you will have access to the client and may not have access to the server. If the problem is determined to be a server issue, you contact the server administrator. If you are the server administrator you can apply the troubleshooting process in reverse server to client to further troubleshoot connectivity issues. To efficiently troubleshoot a TCP/IP connectivity problem it is necessary to identify a single pair of source and destination devices that are exhibiting the connectivity problem. When you've selected the two devices test to make sure that the problem is actually occurring between these two devices. Possible problems include these. Physical layer issue somewhere along the path. First hop Layer 3 connectivity issue local LAN segment. Layer 3 IP connectivity issue somewhere along the packet's path. According to the cisco site, below are some starting points they suggest. Try to ping from the source to destination device by IP address. If the ping fails verify that you are using the correct address and try the ping again. If the ping still fails go to the next section Troubleshooting Local Connectivity Problems proceed to Step. Try to ping from the source to the destination device by name. If the ping fails verify that the name is correctly spelled and that it refers to the destination device and then try the ping again. If the ping still fails go to the section Troubleshooting Domain Name Server Problems. If you can ping the destination by both name and address it appears that the problem is an upper layer problem.…

    • 279 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Do you want to permit remote access to your monitor or access your monitor only at the console?…

    • 95 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1430 Unit 2 Discuss

    • 401 Words
    • 2 Pages

    EXT2 was the default file system for Linux until EXT3 came along. EXT2 still is a favored file system for Flash and USB drives due the lack of journaling. Journaling requires more writes to the storage unit and can be slow on these external devices. The Flash and USB drives have a limited number of write cycles.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    PAN, LAN, HAN, MAN or WAN –Given that the Little Country Store is a little secretly run organization, I would choose to setup a Local Area Network (LAN) for their framework designing. The LAN configuration is the best option for a productive Small Office/Home Office (SOHO) where periphery contraptions, for instance, printers and scanners may be bestowed to different PCs on the framework. Making usage of this preferred standpoint makes using a framework more calm than purchasing a printer for each individual PC. This LAN will have three PCs masterminded in a comparative building structure with a most extraordinary detachment of 200 feet between PCs.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Unit 3 network discovery

    • 1031 Words
    • 5 Pages

    PID is a process identification number given to each process created. These PID are helpful to allow the child process to run in the background so the parent process can start a new command. The history utility list all the commands you have ran.…

    • 1031 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    You use the grep command to search for a specified pattern in a file, such as a particular word or phrase.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    En1320 Unit 1 Research Paper 1

    • 27742 Words
    • 111 Pages

    computation are stored in registers R1 and R2, and the result of the computation is stored…

    • 27742 Words
    • 111 Pages
    Powerful Essays
  • Powerful Essays

    Hw3 7

    • 1263 Words
    • 5 Pages

    The shell waits for the command to finish executing. You can send the command to the background by using "&". 2.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    The hardware is also incorporated into the file hierarchy. Device drivers interface to user applications via an entry in the /dev directory. Process information as well is mapped to the file system through the /proc directory.…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Good Essays

    What uses keywords plus special symbols to find the exact information you want by eliminating results that are too general or too broad?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Linux Assignment 3

    • 1307 Words
    • 6 Pages

    PID process identification numbers. Each of these numbers identifies the command running in the background. You can use the PS (process status) utility to display the PID numbers of running commands.…

    • 1307 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. What command would tell the system at which runlevels to start analyzed? Pg 430…

    • 1032 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Beginner

    • 466 Words
    • 2 Pages

    1. Is each of the following an absolute pathname, a relative pathname, or a simple filename?…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    scm Description

    • 301 Words
    • 2 Pages

    : Means the previous process is finished and the beets are transported to another process.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A sequential execution of instruction unless explicitly modifies by an instruction. This is very important suggestion because that made of design of certain resister. Program counter (PC) which describes what type of instruction will be executed. Sequential execution of instruction such a computer operates by performing the following sequence of steps: FETCH->DECODE->EXECUTE.…

    • 462 Words
    • 2 Pages
    Good Essays

Related Topics