16
SEMINAR ON “LINUX SYSTEM ADMINISTRATION (RHCSA/RHCE)” Presented By G RAVEENA NAIR Bachelor of Technology (Computer Science Engineering) Final year (2012-2016) Govt. Engineering College Jhalawar Under Guidance of MR. SACHIN PAL YADAV Head of Department & Asst. Professor Computer Science Engineering Govt.Engineering College Jhalawar 1

Presentation on rhce

Embed Size (px)

Citation preview

Page 1: Presentation on rhce

1

SEMINARON

“LINUX SYSTEM ADMINISTRATION (RHCSA/RHCE)”

Presented ByG RAVEENA NAIRBachelor of Technology (Computer Science Engineering) Final year (2012-2016)Govt. Engineering CollegeJhalawar

Under Guidance ofMR. SACHIN PAL YADAVHead of Department & Asst. ProfessorComputer Science EngineeringGovt.Engineering CollegeJhalawar

Page 2: Presentation on rhce

2

CONTENTS

• INTRODUCTION• WHAT IS LINUX• FEATURES OF RHEL 6.4• USER MANAGEMENT• FILE SYSTEM SECURITY• LVM• CONFIGURATION OF SERVERS

• SHELL SCRIPTING• TUI• CONCLUSION

Page 3: Presentation on rhce

3

INTRODUCTION

• RHCSA/RHCE focuses on actual competencies at system administration, including installation and configuration of a Red Hat Enterprise Linux system and attaching it to a live network running network services.

• The certification demonstrates the knowledge, skill and ability required for senior system administrator responsible for Red Hat Enterprise Linux systems.

Page 4: Presentation on rhce

4

WHAT IS LINUX

LINUX(KERNEL)

.RPM .DEBIAN• RHEL all versions• FEDORA• CentOS• SUSE Linux• MANDRIVA

• UBUNTU• DEBIAN• BACKTRACK• KALI

LINUX IS NOTHING ELSE BUT A KERNEL WHICH IS OPEN SOURCEOR FREE SOFTWARE AS IT BELONGS TO ENTIRE COMMUNITY OF DEVELOPERS NOT ONE CORPORATE ENTITY

Page 5: Presentation on rhce

5

LINUX’S PRINCIPLE

• Everything is a file or directory(Including hardware).• Small , single purpose programs.• Ability to chain together programs to

perform complex tasks.• Configuration data stored in text.

Page 6: Presentation on rhce

6

FEATURES OF RHEL 6.4

• A New level of virtualization.• Ext4 is made the default filesystem.• Level of Security.• SELinux(Security Enhanced Linux).• New Networking Features .• Use of Drivers.• Support period provided by Red Hat.

Page 7: Presentation on rhce

7

USER MANAGEMENT

There are three types of accounts in RHEL :• Root• Users• Group Users

Operations performed are:• Adding/Deleting users• Adding/Deleting groups• Assigning passwords to above• Adding Members to group.• Login into accounts.

Page 8: Presentation on rhce

8

FILE SYSTEM SECURITY

• ALLOTING/REMOVING PERMISSIONS ON FILE OR DIRECTORY FOR OWNER,GROUP & OTHERS.

• THREE TYPES OF PERMISSIONS:• READ(r--)• WRITE(-w-)• EXECUTE(--x)

• CHANGING OWNER,GROUP OF FILE/DIRECTORY.

• ACCESS CONTROL LIST.

Page 9: Presentation on rhce

9

LVM

LVM is a tool for logical volume management which includes allocating disks, striping, mirroring and resizing logical volumes. With LVM, a hard drive or set of hard drives is allocated to one or more physical volumes. LVM physical volumes can be placed on other block devices which might span two or more disks.

Page 10: Presentation on rhce

10

LOGICAL VOLUME MANAGEMENT

Page 11: Presentation on rhce

11

CONFIGURATION OF SERVERS• In computer networks, a

configuration often refers to the specific hardware and software details in terms of devices attached, capacity or capability, and exactly what the system is made up of.

• In networks, a configuration often means the network topology.

• The major servers on RHEL 6 :

• SSH• FTP• NFS• SAMBA• NIS

Page 12: Presentation on rhce

12

SHELL SCRIPTING• Puts LINUX commands in a file.• Almost always special-purpose code.• Often one-time code.• Seldom used where speed is important.• Often used to manipulate files.

• Shell program text is wriitenin a file using an editor starting with:

#! /bin/sh

• A Sample program:#!/bin/sh# himikename=Mikeecho "Hello, $name!"exit 0

Page 13: Presentation on rhce

13

TEXT USER INTERFACE(TUI)

• A Text-user Interface processes events from command-line interfaces that operate sequentially.

• An advanced TUI may, like GUIs, use the entire screen area and accept mouse input. A TUI does not necessarily provide line-by-line output.

• Although TUIs only use text, symbols and colors available on a given text environment.

Page 14: Presentation on rhce

14A TEXT USER INTERFACE WINDOW

Page 15: Presentation on rhce

15

CONCLUSIONS

• A Growing technology.• No threat of virus attacks.• It comes with most of the soft wares pre-

installed.• Linux never gets slow.• With this, we get a highest possible degree of

customizability.• It is portable.• Highly stable.• Minimal hardware configuration.

Page 16: Presentation on rhce

THANK YOU..!!!!

ANY QUERIES…???16