SlideShare a Scribd company logo
Chapter 9:  Networking with Unix and Linux Network+ Guide to Networks
Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
Objectives: (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
A Brief History of UNIX AT&T Source code System V. BSD (Berkeley Software Distribution) The SCO Group The Open Group
Varieties of UNIX UNIX features: Multiple, simultaneously logged on users Multiple, simultaneously running tasks Mount disk partitions upon demand Permissions for file and directory access Uniform method of issuing or receiving data from hardware devices, files, and running programs
Varieties of UNIX (continued) UNIX features: The ability to start a program without interfering with a currently running program Hundreds of subsystems, including dozens of programming languages Source code portability Window interfaces that the user can configure, the most popular of which is the X Window system
Varieties of UNIX (continued) Proprietary UNIX Licensed copy from The SCO Group Popular Vendors Sun Microsystems--Solaris IBM--AIX HP--HP-UX,
Varieties of UNIX (continued) Proprietary UNIX Proprietary UNIX system advantages: Accountability and support Optimization of hardware and software Predictability and compatibility One drawback No access to the system’s source code
Open Source UNIX  Open Source UNIX Open source software or Freely distributable software GNU BSD Linux
Open Source UNIX (continued) Open Source UNIX Primary advantage Cost Users can modify its code Freely distributable Run not only on Intel-based processors, but also on other processor brands
Why Choose Linux? What considerations: Is it compatible with my existing infrastructure? Will it provide the security required by my resources? Can my technical staff manage it effectively? Will my applications run smoothly on it? Will it accommodate future growth (is it scalable)?
Why Choose Linux? (continued) What considerations: (cont.) Does it support the additional services required by my users? Does it fit my budget? What additional training will it require? Can I count on competent and consistent support from its manufacturer?
Linux Server Hardware Requirements Table 9-1 shows the minimum hardware requirements for the various components of a Linux server.  Hardware compatibility list (HCL) at www.tldp.org/HOWTO/Hardware-HOWTO/.
Linux Server Hardware Requirements (continued)
Linux Server Hardware Requirements (continued) What additional hardware your server may require: Which applications and services will run How many users  How much random access memory (RAM)  How much secondary storage (hard disk)
A Closer Look at Linux Linux Multiprocessing In addition to processes, Linux also supports threads Allocates separate resources (such as memory space) to each process as it is created Symmetric multiprocessing (SMP)
A Closer Look at Linux (continued) The Linux Memory Model Use both physical and virtual memory efficiently Allocates a memory area for each application Attempts to decrease the inefficiency of this practice, however, by sharing memory between programs wherever it can
A Closer Look at Linux (continued) The Linux Kernel Kernel Core of the Linux system Kernel module Instructions for performing a specific task
A Closer Look at Linux (continued) Linux File and Directory Structure Hierarchical file system UNIX system was one of the first to implement Method of organizing files and directories on a disk in which directories may contain files and other directories Most operating systems use hierarchical file systems
A Closer Look at Linux (continued)
A Closer Look at Linux (continued) Linux File Services Native file system type, called ext3 Allows you to access DOS FAT as well as NTFS Can both attach shared file systems and share local partitions with other users Windows or NetWare Network File System (NFS)
A Closer Look at Linux (continued) Linux Internet Services UNIX-based systems have deep roots in Internet services Leading Internet Web server is an open source software application called Apache Original Web tools—including the first browsers and servers—were developed on UNIX-based systems Full range of Internet services as standard components
A Linux Command Sampler The command line is the primary method of interacting with a Linux system Command interpreter Shell
A Linux Command Sampler (continued) Manual pages (Online documentation) Section 1 covers the commands that you most typically enter while typing in a command window. Sections 2 through 5 document the programmer’s interface to the Linux system. Section 6 documents some of the amusements and games that are included in the Linux system.
A Linux Command Sampler (continued) Manual pages (Online documentation) Section 7 describes the device drivers for the system. Section 8 covers the commands used by administrators to manage the system. Section 9 documents the Linux kernel functions programmers use when writing device drivers.
A Linux Command Sampler (continued)
A Linux Command Sampler (continued)
A Linux Command Sampler (continued) Command ls (with -l) Learn everything about a file except its contents: The filename The file size (in bytes) The date and time that the file was created The date and time that the file was last accessed (viewed or printed)
A Linux Command Sampler (continued) Command ls (with -l) (cont.) The date and time that the file contents were last modified  The number of “aliases” or links to the file The numeric identifier of the user who owns the file The numeric identifier of the group to which the file belongs The access rights for the owner, the group, and all others
A Linux Command Sampler (continued)
A Linux Command Sampler (continued) Command ls (with -l) (cont.) Files with a type of “d” are directories “ -” are regular files such as word-processing files or spreadsheet files “ l” for symbolic link files “ b” for block device files “ c” for character device files
A Linux Command Sampler (continued)
Planning for Installation Answer the following questions: What is the new server’s name? What is the server’s IP address? What kind of video card is installed in the server? What do you want the administrative user’s password to be? How can I remember all of this information?
Installing and Configuring a Red Hat Linux Server Step by step Select the language the system will use Confirm the keyboard layout Confirm your mouse type Select disk drive partitioning options Choose booting options
Installing and Configuring a Red Hat Linux Server (continued) Step by step (cont.) Configure the network interface (or interfaces) Configure the network firewall options Add support for additional languages Set the time and time zone Enter (and confirm) the root (administrator) password
Configuring Linux for Network Administration The basics of adding users and groups The basics of modifying file access permissions Two commands:  groupadd useradd.
Configuring Linux for Network Administration (continued)
Configuring Linux for Network Administration  (continued) To add group IDs to your Linux system: Type  groupadd   instructors  and then press  Enter  at the command prompt. The group instructors is added. Type  groupadd   students  and then press  Enter . The group students is added. Type  groupadd   administrators  and then press  Enter . The group administrators is added.
Configuring Linux for Network Administration (continued) To add a new user and assign the user a password: Type  useradd –g users –G instructors   thomas  and then press  Enter  to add a new user account named thomas. Type  passwd   thomas  and then press Enter.
Configuring Linux for Network Administration (continued) Linux prompts you to type the new password.  Linux prompts you to retype your password. Enter the same password again; this confirmation helps ensure that you type your new password accurately.
Configuring Linux for Network Administration (continued) Changing File Access Permissions To create a directory and assign it to a group If you are still logged on to your Linux system, log off by typing  exit  and then pressing  Enter. To log back on to your system as user thomas, type  thomas  at the login prompt and then press  Enter .
Configuring Linux for Network Administration (continued) Type the password you assigned for thomas and then press  Enter . You see a command window and a command prompt. To create the new directory, type  mkdir   PROGRAMS  and then press  Enter .
Configuring Linux for Network Administration (continued) Type  ls -l  and then press  Enter . Notice that the directory belongs to the group users. That’s because the primary group to which the user thomas belongs is users. Type  chgrp   instructors   PROGRAMS  and then press  Enter  to assign ownership of the PROGRAMS directory to the group instructors.
Configuring Linux for Network Administration (continued) Type  ls -l  and then press  Enter . Notice that the directory is now assigned to the group instructors.
Configuring Linux for Network Administration (continued) To change the access permissions for the PROGRAMS directory: Log on as the user  thomas  (whose primary directory is  instructors ). Type  chmod   g+w   PROGRAMS  and then press  Enter . This command adds write access for the instructors group to the directory PROGRAMS. Next, you will remove read and write access to the PROGRAMS directory for all others. To do so, type  chmod   o-rw PROGRAMS  and then press  Enter .
Configuring Linux for Network Administration (continued) Type  ls   -l  and then press  Enter  to view the access permissions assigned to PROGRAMS.You should see a line for PROGRAMS that includes permissions of drwxrwx--x.
Internetworking with Other Network Operating Systems Samba Communicates with Windows servers WINE Enables Windows programs to run on Linux VMware Emulates a complete Intel-based computer Telnet
Internetworking with Other Network Operating Systems (continued)
Internetworking with Other Network Operating Systems (continued)
Chapter summary Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
Chapter summary (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems

More Related Content

PPTX
Linux fundamentals
PPT
Linux administration classes in mumbai
DOC
Introduction to linux
PDF
Gnu study guide linux admin 1 (lab work lpi 101) v 0.2
PPS
01 t1 s2_linux_lesson1
PDF
Linux practicals T.Y.B.ScIT
PPTX
Red hat linux essentials
Linux fundamentals
Linux administration classes in mumbai
Introduction to linux
Gnu study guide linux admin 1 (lab work lpi 101) v 0.2
01 t1 s2_linux_lesson1
Linux practicals T.Y.B.ScIT
Red hat linux essentials

What's hot (20)

PDF
basic linux command (questions)
PPT
Linux fundamentals Training
PPTX
Introduction to linux at Introductory Bioinformatics Workshop
DOCX
Introduction to unix
PPTX
Linux Administrator - The Linux Course on Eduonix
PPT
Linux: Basics OF Linux
PPTX
Introduction to Linux
PPT
Presentation on nfs,afs,vfs
PPTX
A beginners introduction to unix
PPTX
Introduction about linux
PDF
Linux course details
PPTX
PPTX
Unix features, posix and single unix specification
PPTX
PPTX
Linux administration
DOC
Linux administration training from hyderabad
PPT
Unix fundamentals
PPT
Chapter 21 - The Linux System
PPT
Presentation1 linux os
basic linux command (questions)
Linux fundamentals Training
Introduction to linux at Introductory Bioinformatics Workshop
Introduction to unix
Linux Administrator - The Linux Course on Eduonix
Linux: Basics OF Linux
Introduction to Linux
Presentation on nfs,afs,vfs
A beginners introduction to unix
Introduction about linux
Linux course details
Unix features, posix and single unix specification
Linux administration
Linux administration training from hyderabad
Unix fundamentals
Chapter 21 - The Linux System
Presentation1 linux os
Ad

Viewers also liked (20)

PPS
The prophet's wives
PPT
Chapter07 -- wa ns and remote connectivity
PPT
Chapter04 -- network protocols
PDF
Sol linux cmg-t_1_1.pptx
PDF
Hands-on ethernet driver
DOCX
Linux or unix interview questions
PPTX
Linux Ethernet device driver
PPTX
Networking in linux
PPT
Chapter11 -- networking with tcpip and the internet
PPT
Ch20 system administration
PPT
Ch05 system administration
PPT
Ch04 system administration
PPT
Ch08 system administration
PPT
Chapter10 -- netware-based networking
PPT
Ch24 system administration
PPT
Ch23 system administration
PPT
Chapter12 Managing And Implementing Backups And Disaster Recovery
The prophet's wives
Chapter07 -- wa ns and remote connectivity
Chapter04 -- network protocols
Sol linux cmg-t_1_1.pptx
Hands-on ethernet driver
Linux or unix interview questions
Linux Ethernet device driver
Networking in linux
Chapter11 -- networking with tcpip and the internet
Ch20 system administration
Ch05 system administration
Ch04 system administration
Ch08 system administration
Chapter10 -- netware-based networking
Ch24 system administration
Ch23 system administration
Chapter12 Managing And Implementing Backups And Disaster Recovery
Ad

Similar to Chapter09 -- networking with unix and linux (20)

PPTX
Linuxtraining 130710022121-phpapp01
PPTX
Presentation for RHCE in linux
PPTX
PDF
linux.pdf
PDF
Linux Tutorial with commands to use while learning
PPT
User administration concepts and mechanisms
PPT
Chapter 1 Overview of system administration.ppt
PPT
redhat_by_Cbitss.ppt
PPT
linux-lecture1.ppt
PPTX
Network and System Administration Power Point
PPT
Unix/Linux Basic Commands and Shell Script
PPT
linux-lecture1.ppt
PDF
Linux basic
PPT
chapter 3 linux-lecture.ppt
DOCX
commands that's are commonly used in linux
PPTX
UNIX/Linux training
PDF
PPTX
Linux Systems Programming: Ubuntu Installation and Configuration
PPTX
ITCP PRACTICAL-1.pptx
PPTX
Introduction, Features, Basic Commands and Distribution of LINUX
Linuxtraining 130710022121-phpapp01
Presentation for RHCE in linux
linux.pdf
Linux Tutorial with commands to use while learning
User administration concepts and mechanisms
Chapter 1 Overview of system administration.ppt
redhat_by_Cbitss.ppt
linux-lecture1.ppt
Network and System Administration Power Point
Unix/Linux Basic Commands and Shell Script
linux-lecture1.ppt
Linux basic
chapter 3 linux-lecture.ppt
commands that's are commonly used in linux
UNIX/Linux training
Linux Systems Programming: Ubuntu Installation and Configuration
ITCP PRACTICAL-1.pptx
Introduction, Features, Basic Commands and Distribution of LINUX

More from Raja Waseem Akhtar (20)

PPS
God is Great
PPS
Namaz ka tareeqa
PPS
Aayat ul qursi
PPT
Indiansoldiers
PPS
2ªwwii how did it fought
PPT
Fun with EMC2
PPS
Jerusalm at night.pps
PPS
From the sky
PPS
Discover the discovery
PPT
Solaris servers sec
PPT
The OSI - seven layers
PPT
Chapter16 - the internet and its tools
PPT
Chapter15 -- implementing and managing networks
PPT
Chapter14 -- networking security
PPT
Chapter13 -- ensuring integrity and availability
PPT
Chapter12 -- troubleshooting networking problems
PPT
Chapter08 -- network operating systems and windows server 2003-based networking
PPT
Chapter06 -- topologies and access methods
PPT
Chapter05 -- networking hardware
PPT
Chapter03 a - network media
God is Great
Namaz ka tareeqa
Aayat ul qursi
Indiansoldiers
2ªwwii how did it fought
Fun with EMC2
Jerusalm at night.pps
From the sky
Discover the discovery
Solaris servers sec
The OSI - seven layers
Chapter16 - the internet and its tools
Chapter15 -- implementing and managing networks
Chapter14 -- networking security
Chapter13 -- ensuring integrity and availability
Chapter12 -- troubleshooting networking problems
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter06 -- topologies and access methods
Chapter05 -- networking hardware
Chapter03 a - network media

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
A Presentation on Artificial Intelligence
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
A Presentation on Artificial Intelligence
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto

Chapter09 -- networking with unix and linux

  • 1. Chapter 9: Networking with Unix and Linux Network+ Guide to Networks
  • 2. Objectives: Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
  • 3. Objectives: (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems
  • 4. A Brief History of UNIX AT&T Source code System V. BSD (Berkeley Software Distribution) The SCO Group The Open Group
  • 5. Varieties of UNIX UNIX features: Multiple, simultaneously logged on users Multiple, simultaneously running tasks Mount disk partitions upon demand Permissions for file and directory access Uniform method of issuing or receiving data from hardware devices, files, and running programs
  • 6. Varieties of UNIX (continued) UNIX features: The ability to start a program without interfering with a currently running program Hundreds of subsystems, including dozens of programming languages Source code portability Window interfaces that the user can configure, the most popular of which is the X Window system
  • 7. Varieties of UNIX (continued) Proprietary UNIX Licensed copy from The SCO Group Popular Vendors Sun Microsystems--Solaris IBM--AIX HP--HP-UX,
  • 8. Varieties of UNIX (continued) Proprietary UNIX Proprietary UNIX system advantages: Accountability and support Optimization of hardware and software Predictability and compatibility One drawback No access to the system’s source code
  • 9. Open Source UNIX Open Source UNIX Open source software or Freely distributable software GNU BSD Linux
  • 10. Open Source UNIX (continued) Open Source UNIX Primary advantage Cost Users can modify its code Freely distributable Run not only on Intel-based processors, but also on other processor brands
  • 11. Why Choose Linux? What considerations: Is it compatible with my existing infrastructure? Will it provide the security required by my resources? Can my technical staff manage it effectively? Will my applications run smoothly on it? Will it accommodate future growth (is it scalable)?
  • 12. Why Choose Linux? (continued) What considerations: (cont.) Does it support the additional services required by my users? Does it fit my budget? What additional training will it require? Can I count on competent and consistent support from its manufacturer?
  • 13. Linux Server Hardware Requirements Table 9-1 shows the minimum hardware requirements for the various components of a Linux server. Hardware compatibility list (HCL) at www.tldp.org/HOWTO/Hardware-HOWTO/.
  • 14. Linux Server Hardware Requirements (continued)
  • 15. Linux Server Hardware Requirements (continued) What additional hardware your server may require: Which applications and services will run How many users How much random access memory (RAM) How much secondary storage (hard disk)
  • 16. A Closer Look at Linux Linux Multiprocessing In addition to processes, Linux also supports threads Allocates separate resources (such as memory space) to each process as it is created Symmetric multiprocessing (SMP)
  • 17. A Closer Look at Linux (continued) The Linux Memory Model Use both physical and virtual memory efficiently Allocates a memory area for each application Attempts to decrease the inefficiency of this practice, however, by sharing memory between programs wherever it can
  • 18. A Closer Look at Linux (continued) The Linux Kernel Kernel Core of the Linux system Kernel module Instructions for performing a specific task
  • 19. A Closer Look at Linux (continued) Linux File and Directory Structure Hierarchical file system UNIX system was one of the first to implement Method of organizing files and directories on a disk in which directories may contain files and other directories Most operating systems use hierarchical file systems
  • 20. A Closer Look at Linux (continued)
  • 21. A Closer Look at Linux (continued) Linux File Services Native file system type, called ext3 Allows you to access DOS FAT as well as NTFS Can both attach shared file systems and share local partitions with other users Windows or NetWare Network File System (NFS)
  • 22. A Closer Look at Linux (continued) Linux Internet Services UNIX-based systems have deep roots in Internet services Leading Internet Web server is an open source software application called Apache Original Web tools—including the first browsers and servers—were developed on UNIX-based systems Full range of Internet services as standard components
  • 23. A Linux Command Sampler The command line is the primary method of interacting with a Linux system Command interpreter Shell
  • 24. A Linux Command Sampler (continued) Manual pages (Online documentation) Section 1 covers the commands that you most typically enter while typing in a command window. Sections 2 through 5 document the programmer’s interface to the Linux system. Section 6 documents some of the amusements and games that are included in the Linux system.
  • 25. A Linux Command Sampler (continued) Manual pages (Online documentation) Section 7 describes the device drivers for the system. Section 8 covers the commands used by administrators to manage the system. Section 9 documents the Linux kernel functions programmers use when writing device drivers.
  • 26. A Linux Command Sampler (continued)
  • 27. A Linux Command Sampler (continued)
  • 28. A Linux Command Sampler (continued) Command ls (with -l) Learn everything about a file except its contents: The filename The file size (in bytes) The date and time that the file was created The date and time that the file was last accessed (viewed or printed)
  • 29. A Linux Command Sampler (continued) Command ls (with -l) (cont.) The date and time that the file contents were last modified The number of “aliases” or links to the file The numeric identifier of the user who owns the file The numeric identifier of the group to which the file belongs The access rights for the owner, the group, and all others
  • 30. A Linux Command Sampler (continued)
  • 31. A Linux Command Sampler (continued) Command ls (with -l) (cont.) Files with a type of “d” are directories “ -” are regular files such as word-processing files or spreadsheet files “ l” for symbolic link files “ b” for block device files “ c” for character device files
  • 32. A Linux Command Sampler (continued)
  • 33. Planning for Installation Answer the following questions: What is the new server’s name? What is the server’s IP address? What kind of video card is installed in the server? What do you want the administrative user’s password to be? How can I remember all of this information?
  • 34. Installing and Configuring a Red Hat Linux Server Step by step Select the language the system will use Confirm the keyboard layout Confirm your mouse type Select disk drive partitioning options Choose booting options
  • 35. Installing and Configuring a Red Hat Linux Server (continued) Step by step (cont.) Configure the network interface (or interfaces) Configure the network firewall options Add support for additional languages Set the time and time zone Enter (and confirm) the root (administrator) password
  • 36. Configuring Linux for Network Administration The basics of adding users and groups The basics of modifying file access permissions Two commands: groupadd useradd.
  • 37. Configuring Linux for Network Administration (continued)
  • 38. Configuring Linux for Network Administration (continued) To add group IDs to your Linux system: Type groupadd instructors and then press Enter at the command prompt. The group instructors is added. Type groupadd students and then press Enter . The group students is added. Type groupadd administrators and then press Enter . The group administrators is added.
  • 39. Configuring Linux for Network Administration (continued) To add a new user and assign the user a password: Type useradd –g users –G instructors thomas and then press Enter to add a new user account named thomas. Type passwd thomas and then press Enter.
  • 40. Configuring Linux for Network Administration (continued) Linux prompts you to type the new password. Linux prompts you to retype your password. Enter the same password again; this confirmation helps ensure that you type your new password accurately.
  • 41. Configuring Linux for Network Administration (continued) Changing File Access Permissions To create a directory and assign it to a group If you are still logged on to your Linux system, log off by typing exit and then pressing Enter. To log back on to your system as user thomas, type thomas at the login prompt and then press Enter .
  • 42. Configuring Linux for Network Administration (continued) Type the password you assigned for thomas and then press Enter . You see a command window and a command prompt. To create the new directory, type mkdir PROGRAMS and then press Enter .
  • 43. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter . Notice that the directory belongs to the group users. That’s because the primary group to which the user thomas belongs is users. Type chgrp instructors PROGRAMS and then press Enter to assign ownership of the PROGRAMS directory to the group instructors.
  • 44. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter . Notice that the directory is now assigned to the group instructors.
  • 45. Configuring Linux for Network Administration (continued) To change the access permissions for the PROGRAMS directory: Log on as the user thomas (whose primary directory is instructors ). Type chmod g+w PROGRAMS and then press Enter . This command adds write access for the instructors group to the directory PROGRAMS. Next, you will remove read and write access to the PROGRAMS directory for all others. To do so, type chmod o-rw PROGRAMS and then press Enter .
  • 46. Configuring Linux for Network Administration (continued) Type ls -l and then press Enter to view the access permissions assigned to PROGRAMS.You should see a line for PROGRAMS that includes permissions of drwxrwx--x.
  • 47. Internetworking with Other Network Operating Systems Samba Communicates with Windows servers WINE Enables Windows programs to run on Linux VMware Emulates a complete Intel-based computer Telnet
  • 48. Internetworking with Other Network Operating Systems (continued)
  • 49. Internetworking with Other Network Operating Systems (continued)
  • 50. Chapter summary Describe the origins and history of the UNIX operating system Identify similarities and differences between popular implementations of UNIX Understand why you might choose a UNIX or Linux server for a corporate network
  • 51. Chapter summary (continued) Explain and execute basic UNIX and Linux commands Install Linux on an Intel-based PC Use Linux to add groups and users and to change file access permissions Explain how UNIX and Linux can be internetworked with other operating systems