48
..\..\Local Settings\Tem porary Internet Files\Co ntent.IE5\WL2C8E1D\j0411 667[1].jpg

\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

  • Upload
    elaine

  • View
    19

  • Download
    0

Embed Size (px)

DESCRIPTION

..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg. Week Ten Agenda. Announcements Link of the week Review supplemental information Review week nine lab assignment Week ten expected outcomes Next lab assignment Break-out problems Upcoming deadlines - PowerPoint PPT Presentation

Citation preview

Page 1: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

..\..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Page 2: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Week Ten Agenda• Announcements• Link of the week• Review supplemental information• Review week nine lab assignment• Week ten expected outcomes• Next lab assignment• Break-out problems• Upcoming deadlines• Lab assistance, questions, and concerns

Page 3: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Link of the weekProtocol Directories  This web site is a protocol directory. It provides a break down of

TCP/IP, VoIP, Cellular, and general protocols.http://www.protocols.com/pbook/

This web site Network Protocol Suite Directory and IndexSites contains software, books, tools, and services.

http://www.javvin.com/protocolsuite.html

Network communication is defined by network protocols.

Page 4: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Link of the weekDefine: Network Protocol serves as a communication

language among computing devices. A network protocol facilitates device identification and data transfer. What type of things are determined by a network protocol?

1. Type of error checking to be used.2. Data compression method to be used.3. How the sending device will indicate that it has

finished sending a message.4. How the receiving device will indicate that it has

received a message.

Page 5: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentPhysical LinkCommand: ln small_passwd small_passwd_hard-rwx---r-x 2 dandrear faculty 402 Mar 1 10:43

small_passwd-rwx---r-x 2 dandrear faculty 402 Mar 1 10:43

small_passwd_hard

A physical link provides an additional path to the data.Most all file name entries in a directory are hard links.

Page 6: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentSymbolic LinkCommand: ln –s small_passwd small_passwd_softlrwxrwxrwx 1 dandrear faculty 12 Mar 7 12:22

small_passwd_soft -> small_passwd

Symbolic links allow data to be referenced across different file systems (no restrictions) and serve as another path to access the data.

lrwxr-xr-x 1 root root 22 May 12 2004 grub.conf -> /boot/grub/grub.conf

lrwxrwxrwx 1 root root 10 Jun 28 2005 rc3.d -> rc.d/rc3.d

Page 7: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignment“Initializing” or “booting” the machine

The startup process of a computing system is the installation of software. Many pieces of the software are configured into subsystems and are interdependent upon each other.

Both Red Hat Linux and Solaris are based on the UNIX System V boot up procedure.

Steps involved in the boot procedureCPU mode is set to RESETCPU is pre-programmed to begin execution at hex address 0Xfffffff0. Address 0Xfffffff0 is mapped to ROM (Read Only Memory). This ROM (BIOS ) address contains a set of routines that are burnt on the chip.

Page 8: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignment“Initializing” or “booting” the machine

The I/O routines on the BIOS continue the boot process by reading Track 0, Sector 1 of the hard disk. This is the location of the Master Boot Record (MBR). The size of the MBR is 512 bytes. The MBR contains the disk partition tables, and executable code which is the first part of the boot loader. The MBR is independent of the kernel.In Linux operating systems, most modern boot loaders (such as LILO or GRUB), users can change which process the kernel spawns at the end of its initialization from the normal default of /sbin/init file. The boot loader is responsible for loading the kernel into memory. Boot loaders are independent of the operating system and are executable code found inside the MBR. The boot loader must share the 512 bytes with the partition table.

Page 9: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentFiles

When Unix was written over 40 years ago, one unusual design feature was that every physical device connected to the computer was represented as a file.There are differences between devices that is apparent. Disk devices are random-access, and others like terminals are sequential-access. A practical difference is that filesystems can only be mounted on block devices, not on character ones. For example, tapes are character devices. It is possible to copy the contents of a raw, quiescent (unmounted and not being modified) filesystem to a tape, but you will not be able to mount the tape, even though it contains the same information as the disk.

Page 10: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentWhat is the Linux initrd (Initial RAM disk)?The /dev/initrd file is a read-only block device.

Device /dev/initrd is a RAM disk that is loaded by the boot loader into memory before the kernel is started. The kernel utilizes this block device for a two phased system boot-up.

During the first phase, the kernel starts up and mounts an initial root file system from the contents of the /dev/initrd (RAM disk initialized by the boot loader).

The second phase, additional drivers or other module information are loaded from the initial root device as contents. After loading all modules, a new root file system (/etc/fstab) is mounted from a different device.

Page 11: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentMore on initrd The Linux® initial RAM disk (initrd) is a temporary root file system that is mounted during system boot to support the two-state boot process. The initrd contains various executables and drivers that permit the real root file system to be mounted, after which the initrd RAM disk is unmounted and its memory freed. In many embedded Linux systems, the initrd is the final root file system. We are addressing the initial RAM disk for Linux 2.6, including its creation and use in the Linux kernel.

Page 12: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentBlock DeviceDefine: Block device is a device you can read blocks of

information. Some block devices are CDROM, hard disk, and floppy disks.

The following dd statement reads one 512 byte record.

dd if=/dev/sda1 of=/dev/null count=1 Command: ls –l /dev/initrdbrw-rw---- 1 root disk 1, 250 Jun 24 2004 initrd

Page 13: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentRole of the kernel Once the drivers have been loaded, execution is turned

over to the kernel.The kernel then executes a series of steps.

- Determines memory size- Initializes Data Structure- Mount root partition - Hardware Configuration Kernel configures information based on probing the system bus, and

querying drivers for information. Devices that are missing drivers are considered disabled.

- Hand crafted/Spontaneous processes.

Page 14: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentLinux Kernel Data Structure (task_struct)

The task_struct data structure contains the following fields:

- Process staterunningreturning from system callprocessing an interrupt routineprocessing a system callready

waiting- Processes priority - Clock ticks (10ms intervals) which the

process can continue executing without forced rescheduling.

- Error number of the last faulting system call

Page 15: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentLinux Kernel Data Structure (task_struct)

- Describe a processes: original parent, parent, youngest child,

younger sibling, and finally older sibling.- Process ID - Timing information; for example, the

amount of time the process has spent in user mode.

Page 16: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentLinux Kernel

The Linux kernel process table is a data structure that describes all processes that currently exist.

The process table is implemented as an array of pointers to task structures.

The kernel process table is limited in size to 512 entries and has its own block size. All Linux blocks are currently 1024 bytes.

Page 17: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentStructures

struct date { int day;

int month; int year;

int yearday; char mon_name[9];

};

struct key {char *keyword;int keycount;

};

struct key keytab[NKEYS];

Examples of structures:

Page 18: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignment

N

S

EW

task_struct fs_struct

inode

inode

files_struct file inode

fsfiles

count

*toot*pwd

count

fd[1]f_mode

A Process’s Files

Page 19: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentProcess’s Virtual

Memorytask_struct

mm

mm_struct vm_area_struct

Data

Codevm_area_struct

vm_end

vm_next

vm_start

vm_end

vm_start

count

mmap_avl

0x0000000

0x8048000

0x8059BB8

Page 20: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentRole of the init process

The kernel starts a few spontaneous/handcrafted processes in user space. The origin of the init process is from the kernel and not the fork and execute procedure. The init process has Process ID (PID) of one (1) and a Parent Process ID of zero (0).

The init process is the ultimate parent in the running system and plays an important role in the startup process. All future processes on the system are descendents of the init process.

Once the system processes are created, then the kernels work is basically completed.

Page 21: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentRole of the init process

The init process performs the following tasks:Executions the /etc/rc.d/rc.sysinit scriptSets the system clockActivates the paging processStarts the RAID devicesCheck and mounts other file systemsExecutes the /etc/inittab scriptExecution of run commandsSwitch to multi user mode

After the run commands (rc) have executed, the system is fully operational.

Page 22: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignment/etc/init process

It looks for the file /etc/inittab to see if there is an entry of the type initdefault. The initdefault entry determines the initial run level of the system.

init login process1. Init process spawns the getty or minigetty

process.2. The getty process invokes the login process. After

the user name has been entered, it is passed to the login process.

3. The login process prompts the user for a user password, and verifies it. If authentication is successful, the user’s shell is created.

Otherwise, a failure causes an error message, ends and then init process will respawn getty or

minigetty.4. The user’s preferred shell will be invoked creating a

session. 5. Eventually, the user will logout.

Page 23: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignment

System startup

Stage 1 bootloader

Stage 2 bootloader

Kernel

Init

BIOS

Master Boot Record

LILO, GRUB, etc.

Linux

User-Space

Linux Boot Process Summary

Power-up / CPU RESET

Operational

Page 24: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentIn UNIX, a process is a name given to a program being

executed by the operating system.

In Linux, that same program is referred to as a task or process. Linux considers both names as the same.

A process consist of:- Program code, data, and stack- Open files (stdin, stdout, stderr)- System data structures- Environment (terminal type, user login directory, $HOME)

A Linux system will share code and system libraries among processes so that memory can be conserved and only keep one copy of the code is in memory at a time.

Each Linux process is allocated a unique process identifier (PID). The range of PIDs is usually between 2 and 32,768.

Page 25: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentProcess

A process can be terminated several ways:- Foreground process by typing Ctl-C- Background process with PID=n and typing

kill [option] -n Zombie Process

A child process that terminates before its parent but still has an entry in the process table. This entry still needs to allow the process that started the zombie process to read its exit status.

Orphan ProcessIs a process that is still executing, but whose parent has died.An orphan process is eventually adopted by the init process.

Page 26: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentProcessProcesses go through various process states during their

existence. These transitory states are managed by the operating system (OS). The specifics of these process states vary from one OS to another, as well as the state names.

Process states:1. Created (fork and exec)2. Waiting (process scheduler - load from secondary

storage to main memory)3. Running (after a process is assigned a processor by a short –

term scheduler, context switch is performed)4. Blocked (waiting for resources - user input or secondary

storage input. Then process is moved back to “waiting” state)

5. Terminated (finished execution, waits to be removed from main memory)

Page 27: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentProcess Summary

In Unix-like operating systems, the kernel is invoked when a process issues a system call.

All processes have owners.

Processes transition through various states.

When an original process (parent) creates or spawns another processes (child), it inherits the file access and execution privileges belonging to the parent (basic frame work of the parent).

Page 28: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentDefine Thread The amount of work performed by a process or

task.- A single threaded process is a process only performs one task.- A multi-threaded process is a process that performs multiple tasks concurrently without incurring additional overhead needed to create a new process.

Page 29: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentSystem run levels

0 - Halt system1 - System maintenance2 – Multi-user mode (NFS inoperative)3 – Full Multi-user mode (remote file sharing

state)4 – unused5 - X11 (X Window System for graphical

desktop environment)6 - Shutdown

Page 30: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentShutdown commandOne commonly issued form of this command is shutdown -h now, which will

shut down a system immediately. Another one is shutdown -r now to reboot. Another command format allows the user to specify an exact time or a delay before shutdown: shutdown -h 20:00 will turn the computer off at 8:00 PM, and shutdown -r -t 60 will automatically reboot the machine within 60 seconds (one minute) of issuing the command.

The complete syntax of the Linux version of the command is:usage: shutdown [-akrhfnc] [-t secs] time [message]

-a use /etc/shutdown.allow -k don't really shutdown, only warn -r reboot after shutdown -h halt after shutdown -f do a 'fast' reboot (skip fsck) -F force fsck on reboot -n do not go through "init" but go down real fast -c cancel a running shutdown -t secs delay between warning and kill signal

Page 31: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Review week nine lab assignmentKill Command

Caveat:The command kill sends the specified signal to the specified process or process group. As a precaution, avoid indiscriminate use of the kill command on jobs involving text editors, databases programs, mail programs, or any other program that has a large amount of user interaction. The kill command terminates a job without saving any of the user input or program results.

Page 32: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Week ten, eleven, twelve expected outcomes

Upon successful completion of this module, the student will be able to:

Manipulate user accounts. • Describe how cron is used to invoke repetitive processes. • Manipulate process structure including: A. fork/execute, B.

Initialization process, C. Background/foreground, D. PS tool.

• Explain basic UNIX and Linux security issues. • Describe disk and file system structure. • Use backup and restore archival operations on a system. • Establish network services. • Investigate the structure of the LDAP directory using LDAP

commands.

Page 33: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next Lab AssignmentDefine fork()

Create a new process that is a clone of its parent. The clone reflects only the basic components of the parent, not the parents resource usage, semaphores, and pending signals.

Define exec Overlay the calling process virtual memory with a new program, and transfer control to it.

exit(status)Exit with a status, destroying the process.

Parent process waits for exit (or other status change) of a child.

Page 34: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next Lab Assignment

Password FileLocation: /etc/passwdField separators: Colon (:) File format:Username:Password:UID:GID:UserID:Home

directory:Command/shellExample:dandrear:x:1020:1021:dandrear

user:/export/home/dandrear:/bin/bashPermissions on Einstein:-rw-r--r-- 1 root root 1636 Aug 16 10:37 /etc/passwd

Page 35: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next Lab AssignmentPassword File• Username: It is used when user logs in. It should be between 1

and 32 characters in length. • Password: An x character indicates that encrypted password is

stored in /etc/shadow file. • User ID (UID): Each user must be assigned a user ID (UID). UID

0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.

• Group ID (GID): The primary group ID (stored in /etc/group file) • User ID Info: The comment field. It allow you to add extra

information about the users such as user’s full name, phone number etc. This field use by finger command.

• Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /

• Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please not it does not have to be a shell.

Page 36: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignmentShadow FileLocation: /etc/shadowField separators: Colon (:) File format:username:passwd:lastpasswdch:min:max:warn:inactive:expire:unused

Example:dandrear:$1$dhBysgdhfteM9gd00:13064:0:99999:7:::Permissions on Einstein:-r-------- 1 root root 1107 Sep 5 15:24 /etc/shadow

(Permission denied)

Page 37: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignmentShadow File • User name : It is your login name • Password: It your encrypted password. The password should be

minimum 6-8 characters long including special characters/digits • Last password change (last changed): Days since Jan 1, 1970 that

password was last changed • Minimum: The minimum number of days required between password

changes i.e. the number of days left before the user is allowed to change his/her password

• Maximum: The maximum number of days the password is valid (after that user is forced to change his/her password)

• Warn : The number of days before password is to expire that user is warned that his/her password must be changed

• Inactive : The number of days after password expires that account is disabled

• Expire : days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used

• Unused field:

Page 38: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignmentGroup FileLocation: /etc/groupField separators: Colon (:) File format:Group name:Password:GID:User_listExample:faculty:x:410:staff:x:430:Permissions on Einstein:-rw-r--r-- 1 root root 833 Aug 16 10:37 group

Page 39: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignment

Group FileGroup name: Name of the group. Password: The group password would be encrypted. If this field is empty, no password is needed. GID: The numerical group ID and/or unique group identifier. User_list: All the group member's user names, separated by commas.

Page 40: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignment

14

The Group File• Group Name: on many systems, restricted to 8 char.• Password:

– Obsolete, still used in Linux. – Often contains an ‘x’ or nothing.– If field has ‘*’, means group is disabled.

• GID– A unique group identifier– unsigned 32 bit Integer– 0 for group root, 1 for bin, 2 for daemon– Most systems: UID < 100: system groups, UID >= 100: user

groups– Redhat: UID < 500: system groups, UID >= 500: user groups

• User List: comma separated, no spaces

Page 41: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignment

15

The Group File

• If a user is defined as a member of a group in /etc/passwd but not in /etc/group, the file /etc/passwd takes precedence.

• On Linux, the file /etc/group can be edited with vigr

• Linux supports a shadow group file. – Its location is /etc/gshadow– It is used to store group passwords.

Page 42: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignment

19

Adding Users

• 3 different ways to add users:– Manually– Using the ‘useradd’ command– Using a GUI based system administration

tool.

Page 43: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next Lab AssignmentSecurity FeaturesNetwork daemon – Linux uses xinetd to monitor all configured

ports and starts system resources usage only on-demand, since the daemons aren’t running all the time. Security and resource usage is the main objective..

Chroot jail – Utilized by Linux and UNIX OS to create an artificial root directory. Creating a temporary root directory prevents a program from accessing or modifying files outside the directory hierarchy starting at its root. Chroot affects only the current process and its child processes.The files need to be placed in the jail directory (such as /users) in directories that mimic their placement in the root (/) file system. So you need to copy all required files. For example, /usr/bin/rssh is located on / file system. If your jail is located at /users, then copy /usr/bin/rssh to /users/usr/bin/rssh.

Page 44: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignmentSELinux developed by the U.S. National Security Agency

(NSA), implements Mandatory Access Control (MAC) in the Linux kernel. MAC enforces security policies that limit what a user or program can do. It defines a security policy that controls some or all objects, such as files, devices, sockets, and ports, and some subjects like processes. Utilizing SELinux, you can grant a process only those permissions it needs to be functional.

TCP Wrapper is part of the client/server model, and can be used with any daemon that is linked against libwrap.a, and relies on the /etc/hosts.allow and /etc/hosts.deny files as the basis of a simple access control language. This access control language defines rules that selectively allow clients to access server daemons on a local system based on the client’s address and the daemon the client tries to access.

Page 45: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Next lab assignmentSecurity Features

iptables utility builds and manipulates network packet filtering rules in the Linux kernel. You can use iptables to create a firewall that protects a system from outside intruders.

Page 46: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Break-out problems

1. simple_script &2. What is a zombie process?3. What files are updated on a Linux system when a new user is

added?4. fork()5. What information is stored in the /etc/passwd file?6. What information is stored in the /etc/shadow file?7. What information is stored in the /etc/group file?8. What is a background process?9. What is a foreground process?10. What is an orphan process?11. kernel12. nice command13. init process

Page 47: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Upcoming Deadlines• Lab Assignment 9-1, Startup/Shutdown due March

13, 2011• Lab Assignment 10-1 and 10-2, Account/LDAP and

Process Exercise Scripts due March 20, 2011.• Lab Assignment 11-1, Knoppix File System Exercise

is due March 27, 2011• Final exam outline will be available on March 13,

2011.• Module 6, System System Administration is for week

10.

Page 48: \..\Local Settings\Temporary Internet Files\Content.IE5\WL2C8E1D\j0411667[1].jpg

Lab assistance, questions and answersQuestionsCommentsConcerns

I will be available after this Franklin Live session to discuss any problems and/or concerns regarding lab assignments.