Top Banner
PROYECTO INTEGRADOR Y COMPRENSIVO II SOLARIS 10 Universidad Politécnica de San Luis Potosí MTI. Guadalupe Ledesma Ramos [email protected]
36

MODULE 1 AND 2.pdf

Jun 02, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 1/36

PROYECTO INTEGRADOR Y

COMPRENSIVO II SOLARIS 10

Universidad Politécnica de San Luis PotosíMTI. Guadalupe Ledesma Ramos

[email protected]

Page 2: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 2/36

MODULE 1

MTI. Guadalupe Ledesma [email protected]

2

Page 3: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 3/36

Introduction• The UNIX operating system was developed originally at AT&T

Bell Laboratories in 1969. It was created as a tool set byprogrammers for programmers.

• Programmers at the University of California at Berkeley madesignificant modifications to the original source code and calledthe resulting operating system the Berkeley Software

Distribution (BSD) UNIX .

• This version of the UNIX environment was sent to otherprogrammers, who then added tools and code to furtherenhance BSD UNIX.

• Possibly the most important advance made to the operatingsystem by the programmers at Berkeley was the addition ofnetworking software. This enabled the operating system tofunction in a local area network (LAN).

MTI. Guadalupe Ledesma [email protected]

3

Page 4: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 4/36

Introduction

• Sun's original version of the UNIX operating system was knownas the SunOS software, based on BSD UNIX version 4.2. Atthat time, AT&T's version of the UNIX environment was knownas System V.

• In 1988, BSD, AT&T UNIX, and other operating systems werefolded into what became System V release 4 (SVR4) UNIX.This new generation of the operating system was an effort tocombine the best features of both BSD and AT&T UNIX,creating an industry standard for the operating system.

MTI. Guadalupe Ledesma [email protected]

4

Page 5: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 5/36

Solaris 10

• Solaris 10 Es la versión oficial de Sun Microsystems disponible paraarquitectura Sparc y x86. Es estable y robusta estando diseñada paraentornos de producción donde se necesita estabilidad.

• x86 es una arquitectura de computadores referente a los chips Intel y

 AMD para maquinas que por lo general son de escritorio, en estaarquitectura al arrancar la placa base accede a la BIOS y hace unpost (que es la verificación de arranque del sistema).

• En Sparc no hay Bios, es un sistema en el que cuando conectamos

la maquina a la energía inmediatamente pasaría a estar encendidasin pasar por BIOS, a diferencia de x86 Sparc cuenta con un sistemallamado “ Alom” que tiene un modo de configuración tipo consola deSwitches similar a los de Cisco con protección de cuentas porcontraseña.

MTI. Guadalupe Ledesma [email protected]

5

Page 6: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 6/36

Computer Hardware Components 

• A computer consists of hardware and software that worktogether to perform tasks.

• Computer software refers to a set of programs orapplications that run the computer.

• The operating system is a set of programs and files that

directs and controls both the hardware and the software.

MTI. Guadalupe Ledesma [email protected]

6

Page 7: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 7/36

Computer Hardware Components 

• These components are the RAM, the CPU, theinput/output (I/O) devices, and the hard disk or someother storage device.

MTI. Guadalupe Ledesma [email protected]

7

MTI G d l L d R

Page 8: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 8/36

Computer Hardware Components 

• RAM is the main computer memory.

• Programs reside on the hard disk. When you execute a program, a

copy of the program loads into virtual memory.• Portions of the program are copied into RAM during the actual

execution process.

• The program remains in virtual memory until it finishes. Upon

program termination, the operating system can overwrite the virtualmemory space with other programs that it needs to execute.

• If you reboot the system or if there is a power loss, all data in virtualmemory is cleared.

MTI. Guadalupe Ledesma [email protected]

8

MTI G d l L d R

Page 9: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 9/36

Computer Hardware Components 

• CPU• Is the computer logic chip that executes instructions that it receives

from RAM. These instructions are stored in binary form on the harddisk.

• I/O Devises• Communicate with external pieces of equipment.

•  An I/O device reads information from an input device, such as akeyboard or a mouse, into RAM.

•  An I/O device writes this information to output devices, such as

monitors, printers, or tape drives.

• Hard disk• Is a magnetic storage device that stores files, directories, and software

programs

MTI. Guadalupe Ledesma [email protected]

9

MTI G d l L d R

Page 10: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 10/36

Solaris Operating System Components

• The Solaris 10 OS consists of:• The SunOS 5. x  operating system

• Manages system resources and schedules system operations.

• Interprets instructions from the user or from an application and instructsthe computer what to do.

• Open Network Computing (ONC+) software,• Provides network services, such as Network File System (NFS), which

allows file sharing between computers.

• Network Information Service (NIS), which provides network information

name services to clients• Network Information Service Plus (NIS+).

• The Solaris OS desktop environment GUI• Is the windowing environment or GUI that displays the Login screen.

MTI. Guadalupe Ledesma [email protected]

10

MTI Guadalupe Ledesma Ramos

Page 11: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 11/36

Solaris Operating System Components

• The three main components of the SunOS operatingsystem are:• The kernel

• The shell

• The directory hierarchy

MTI. Guadalupe Ledesma [email protected]

11

MTI Guadalupe Ledesma Ramos

Page 12: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 12/36

Solaris Operating System Components

• The kernel• Is the core of the SunOS operating

system.

• Manages all the physical

resources of the computer,including:

• File systems and structures

• Device management, such asstoring data to the hard disk

• Process management or CPUfunctions

• Memory management

MTI. Guadalupe Ledesma [email protected]

12

MTI Guadalupe Ledesma Ramos

Page 13: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 13/36

Solaris Operating System Components

• Shell• Interface between the user and the

kernel.

• Command interpreter.

• The shell accepts the commands thata user enters, interprets thesecommands, and passes them to thekernel.

• The kernel executes the commands.

MTI. Guadalupe Ledesma [email protected]

13

Page 14: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 14/36

MTI Guadalupe Ledesma Ramos

Page 15: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 15/36

Solaris Operating System Components

• Alternative Shells

• The Solaris 10 OS contains three additional (alternative) shells:

• Bash  – The GNU project’s Bourne-Again shell is a Bourne-compatible

shell that incorporates useful features from the Korn and C shells likecommand history, command line editing, aliasing, and so on.

• Z shell  –  The Z shell most closely resembles the Korn shell, but itincludes many other enhancements.

• C shell  – The TC shell is a completely compatible version of the C shellwith additional enhancements.

MTI. Guadalupe Ledesma [email protected]

15

MTI Guadalupe Ledesma Ramos

Page 16: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 16/36

Directory Hierarchy

• The directory hierarchy contains an organized group ofdirectories and files.

MTI. Guadalupe Ledesma [email protected]

16

MTI Guadalupe Ledesma Ramos17

Page 17: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 17/36

Selecting Login Options

• If you do not choose to log in to a system directly, clickOptions on the Login screen. The menu shown listing ahierarchy of login choices. Select the option that you wantto use.

MTI. Guadalupe Ledesma [email protected]

17

MTI Guadalupe Ledesma Ramos18

Page 18: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 18/36

• Users should change their passwords frequently to prevent unauthorizedaccess to their systems.

• In the Solaris OS, a user's password must have the followingcharacteristics:

• Be six to eight characters in length• Contain at least two alphabetic characters and must contain at least one numeric or

special character, such as a semicolon (;), an asterisk (*), or a dollar sign ($)• Differ from the user's login name• Differ from the previous password by at least three characters• Contain spaces (optional)

These password requirements do not apply to the system administrator's root accountpassword or to any password that is created for a regular user by the root user.

$ passwd 

Logging In To the System 

MTI. Guadalupe Ledesma [email protected]

18

MTI. Guadalupe Ledesma Ramos19

Page 19: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 19/36

• Language• You can use the Language Option drop-down menu to set a language

of your choice for your session.

• Session• You can use the Sessions Option to select any of the followingsessions:• Common Desktop Environment

• User's Last Desktop

• Failsafe Session

• Remote Login• You can either enter the specific host name of a remote system or

select from a list of available remote systems.

Logging In To the System 

MTI. Guadalupe Ledesma [email protected]

19

MTI. Guadalupe Ledesma Ramos20

Page 20: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 20/36

• Command-Line Login

• You can use the Command-Line Login option to work in a UNIXcommand environment.

• When you log out from a command-line session, the desktop

environment Login screen reappears within 30 seconds.

• Reset Login Screen

• You can use the Reset Login Screen option to restart the desktopenvironment Login screen.

Logging In To the System 

MTI. Guadalupe Ledesma [email protected]

20

MTI. Guadalupe Ledesma Ramos21

Page 21: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 21/36

Securing Your Desktop Environment

Session

• Securing your desktop environment session preventsunauthorized users from gaining access to the system.There are two ways to secure the system:• Locking the screen

• Exiting the session

Guada upe edes a a [email protected]

21

MTI. Guadalupe Ledesma Ramos22

Page 22: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 22/36

• Locking the Screen

• Locking the screen prevents unauthorized users from gainingaccess to your desktop environment session, while keeping yoursession intact.

• Exiting the Session

• Exiting your session ends that session completely. Any datacontained in the current set of open applications is lost when youexit.

Securing Your Desktop Environment

Session

[email protected]

22

MTI. Guadalupe Ledesma Ramos23

Page 23: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 23/36

Module 2

[email protected]

23

MTI. Guadalupe Ledesma Ramos24

Page 24: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 24/36

Constructing and Executing

Commands From a Command Line 

• Command-Line Syntax

command options arguments 

[email protected]

24

MTI. Guadalupe Ledesma Ramos 25

Page 25: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 25/36

• Displays the operating system information• $ uname 

SunOS

• Displays the current time and date• $ date 

Tue Dec 15 14:31:55 GMT 2004• To display the calendar, perform the command

Displays the current month's calendar$cal

• $ cal 12 2004 

• To clear the terminal window, perform the command:• $ clear  

Constructing and Executing

Commands From a Command Line 

command arguments

[email protected]

25

MTI. Guadalupe Ledesma Ramos 26

Page 26: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 26/36

Using Commands With Options 

uname -i  Shows the name of the hardware platform.

uname -n Prints the host name of the local system.

uname -s Shows the name of the operating system.uname -a Displays information about the operating system and the

workstation architecture.

uname  –r   Shows the operating system release level.

Constructing and Executing

Commands From a Command Line 

[email protected]

MTI. Guadalupe Ledesma Ramos 27

Page 27: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 27/36

 

• The following example shows the uname command withtwo separate options:

• $ uname -s -r

SunOS 5.10

• The following example shows the uname command withtwo combined options:

• $ uname -rs

SunOS 5.10

Constructing and Executing

Commands From a Command Line 

[email protected]

MTI. Guadalupe Ledesma Ramos 28

Page 28: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 28/36

 

• Using Commands With Options and Arguments

• ls command $ ls

• ls command with an option $ ls  –l

• ls command with an argument $ ls dante 

• ls command with an option and an argumen $ ls -l dante

Constructing and Executing

Commands From a Command Line 

[email protected]

MTI. Guadalupe Ledesma Ramosd l l d @ l d

29

Page 29: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 29/36

Entering Multiple Commands on a

Single Command Line• You can enter multiple commands on a single command

line by using a semicolon (;) to separate each command.

• The command format for multiple commands is:command option argument;command option argument  

• $ date;uname • Wed Dec 15 14:57:13 GMT 2004 SunOS

[email protected]

MTI. Guadalupe Ledesma Ramosd l l d @ l d

30

Page 30: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 30/36

 

• The following example shows three commands separatedby a semicolon.

Entering Multiple Commands on a

Single Command Line

[email protected]

MTI. Guadalupe Ledesma Ramosd l l d @ l d

31

Page 31: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 31/36

Using Online Documentation 

• Use the man command to display the man page entry thatexplains a given command.• The syntax of the man command is:

man command  

man option command  man option filename 

For example, to display the man pages for the uname command,perform the command:

$ man uname 

[email protected]

MTI. Guadalupe Ledesma Ramosguadalupe ledesma@upslp edu mx

32

Page 32: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 32/36

Searching Man Pages by Keyword 

• When you are not sure of the name of a command, youcan search for man page entries that are related by usingthe man command with the -k option and a keyword.

man -k keyword

[email protected]

Utilidad catman se utiliza para crear paginas de manual de referencia# /usr/bin/catman  –w

MTI. Guadalupe Ledesma Ramosguadalupe ledesma@upslp edu mx

33

Page 33: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 33/36

Keys to Control Scrolling in Man Pages

[email protected]

MTI. Guadalupe Ledesma Ramosguadalupe ledesma@upslp edu mx

34

Page 34: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 34/36

Searching the Man Pages

• Searching Man Pages by Section

• You can search within a specific section of the man pages by usingthe man command with the -s option.

• The online man-page entries are organized into sections based onthe type or use of the command or file. For example, Section 1contains user commands, while Section 4 contains informationabout various file formats.

• You can use the man intro command to view descriptiveinformation about sections contained in the man pages.

[email protected]

MTI. Guadalupe Ledesma Ramosguadalupe ledesma@upslp edu mx

35

Page 35: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 35/36

• The syntax for looking up a specific  section of the manpages is the man command with the -s option, followed bythe section number, and the command or file name.

For example:

man  –s number command

or

man  –s number filename

Searching the Man Pages

[email protected]

MTI. Guadalupe Ledesma Ramosguadalupe ledesma@upslp edu mx

36

Page 36: MODULE 1 AND 2.pdf

8/11/2019 MODULE 1 AND 2.pdf

http://slidepdf.com/reader/full/module-1-and-2pdf 36/36

 

• The last section of a man page, titled SEE ALSO, listsother commands or files related to the man page.

• The number in parentheses reflects the section where theman page is located. You can use the man command withthe -l option to list the man pages that relate to the samecommand or file name.

Searching the Man Pages

[email protected]