Title: ICS124 UNIX Operating System and Seneca Network Environment
1ICS124 - UNIX Operating System and Seneca Network
Environment
2Computer Networks
- Personal computers that are not connected to
other computers (via network cards) are referred
to as stand-alone computers. - Institutions such as colleges find it more
economical and efficient to connect up personal
computers to form a computer network
3Computer Network
File Server(Central Computer)
Terminal(Client)
Terminal(Client)
Terminal(Client)
Terminal(Client)
Terminal(Client)
Terminal(Client)
4File Server
- A file server is a powerful centralized computer
system with an operating system that allows
multiple users to access software applications
and data files. - The file server may also provide other important
services such as network printer management and
connection to other networks (Internet)
5Computer Networks
- Computers connected to form a network over small
geographic locations (such as a building or city)
are referred to as Local Area Networks (LANs) - Local Area Networks can use modems or routers to
connect up to other LANs from far distances to
form Wide Area Networks (WANs)
6Advantages of Computer Networks
- Economical
- Ability to share hardware devices such as
printers and scanners - Efficient
- Ability to communicate among users
- Efficient method to maintain and upgrade software
(I.e. one copy of software on file server -
therefore, only upgrade one location) - Ability for users to share files
7Seneca Computer Network
LEARNMERCURYILEARN
NewnhamCampus
T1
S_at_Y
Modem Pool
T1
Internet
T1
Don Mills Campus
Remote Users
8Seneca Computer Network
PHOBOS (RS6000)VISION PANDORA
CS CS1
POSEIDON COMPSTUD (Novell)
ZEUS (AS400) ODIN (AS400)JUPITER SNOW WHITE
(Linux)
Newnham Campus
T1
Don MillsCampus
9Seneca Computer Network
Columbus (FCE Students)
10Relevant Servers
- PHOBOS
- Computer account used for creating, modifying,
compiling and executing programs - AIX UNIX - (IBM RS6000 - See ICS124 Notes for details)
- ODIN
- Computer account used for access to the AS/400.
- COLUMBUS
- Used to store and maintain WebPages for FCE
students.
11Introduction to UNIX
- UNIX is the most popular operating system. Most
large computers use UNIX as their operating
system - UNIX is a TEXT BASED system.
12What is an Operating System
- Control program for a computer
- OS handles - communications between the
application software and the computer hardware. - Memory protection - system accounting
- smooth operation ? - Response Time
13 14Bit of UNIX History
- MULTICS first interactive multi-user OS developed
by Bell labs. - Ken Thompson 1969 at ATT Bell Laboratories. -
UNIX - UNIX a pun on MULTICS not an acronym
- Given almost for free to Universities and
Colleges to obtain a following into the business
world.
15Bit of UNIX History
- Generic version follows System V Release 4, with
companies as Sun (Solaris), Hewlett Packard(HP)
and IBM altering it to suit their customer base. - Linux - LinusTorvalds
16Overview of UNIX File Structure
17Directories
- The directory of a disk is an area where the
names and locations of files are stored. - Each storage device such as a hard disk has at
least one directory which is called Root. - Directories make it more efficient to store files
under logical categories or locations.
18Directories
- Inverted Tree Diagrams visualize directory
structures
Root ( / )
Students is theparent directory of msaul
tmp
students
msaul
19Making Directories
- Building directories is similar in approach to
building a house - Begins from a foundation (root)
- Need to build in proper order (add on addition to
house in right location) - Need to step-back and look at construction
20Overview UNIX Shell
- Pg. 11 of the Sobell text
- shell is the interface between the operating
system and the user.- interprets instructions - calls the program you want
- can also program the shell - script writing.
21Limitations of UNIX ?
- Called terse, unfriendly difficult to learn.
- No news is good news. Gives more flexibility to
programmer - confirmation of activity being
completed is not given. Result more powerful -
can string a succession of instructions together
and they will be performed.
22Basic Unix Commands
- Case sensitive
- Flags
- A flag is a letter or letters added to a command
to indicate - an option (see next slide for example)
- Flags are what make UNIX so powerful
23MAN
- MAN is the online manual. Once you can log in,
MAN will help you do everything else - man ls (will provide details on how the ls
command works, its options and how to call them. - The -k flag means keyword (allowing you to obtain
on commands that match the keyword). - man password
- man -k password
24List Files
- ls Displays compact list of files (excluding
- hidden files - beginning with period)
- ls -a Displays all files (including hidden
files) - ls -l Displays detailed list of files (excluding
- hidden files)
- ls -al Displays all files in detail form
(including - hidden files)
25Additional Unix Commands
- Interrupt
- Stop output
- Resume output
- logout
- Delete character / word / line
- Ctrl C (c)
- Ctrl S
- Ctrl Q
- Ctrl D
- Ctrl H, W, U
26Additional Unix Commands
- Displays current directory
- Changes to tmp directory
- Changes to home directory
27Additional Unix Commands
- Find commands to
- delete a file
- change the permissions of a file
- Create a folder
- Find out who is logged in
- show processes running
- display a file on the screen
28Changing Directories
- cd directory
- cd directory path
- cd
- cd .. (change to parent directory)
29How to Logon to PHOBOS Server
- Run Telnet Program
- Type in your Login I.D.
- Type in your password
NOTE UNIX is case sensitive. Upper and Lower
case letters are recognized as different by UNIX.
30What is the Telnet Application?
- Unix systems such as PHOBOS were originally
designed to accommodate dumb terminals which
were simply monitors and keyboards directly
connected up to network - Telnet allows the server to think that the
users personal computer is a dumb terminal - A common type of dumb terminal was Digital
Equipment corporations VT100.
31Telnet Application
- To launch or run the Telnet application from
the Seneca computing lab, point and click onto
the application terminal on the Windows 95
desktop - You can obtain a free version of Telnet
application for home use from the internet
(assuming you have computer system with modem).
32(No Transcript)
33(No Transcript)
34(No Transcript)
35Protecting your Computer Accounts
- It is important to assign an appropriate password
to prevent unauthorized access to your computer
accounts. - Concerns regarding unauthorized use
- Illegal Activity
- Suspension of account
- Loss of data / Copying of assignments
36Changing your Password
- After logging onto PHOBOS, you can change your
password by typing at the prompt - passwd ltENTERgt
- Note It is recommended to change password
periodically.
37Password Tips
- Combine upper and lower case letters
- Include a non alpha-numeric characters such as .
- in your password - Acceptable passwords on PHOBOS range from 6 to 8
characters
38Password Tips
- Avoid easily detected passwords such as
- names
- birth dates
- addresses
- patterns
- year and month
39Password tips
- Use phrases and take the first letter of each
word For example - Autumn leaves Turn red, yellow, orange ALTRYO
- Add numbers and characters to words
- R1o2N3!
40For Review - Basic Unix Commands
- Listing Files
- ls Displays compact list of files (excluding
- hidden files - beginning with period)
- ls -a Displays all files (including hidden
files) - ls -l Displays detailed list of files (excluding
- hidden files)
- ls -al Displays all files in detail form
(including - hidden files)
41Additional Unix Commands
- Commands
- pwd Displays current directory
- cd /tmp Changes to tmp directory
- cd Changes to default directory
- man Online manual
42For next week.
- Create an acceptable password using the
above-mentioned techniques. - Read over RS600/nled documentation and vi
information.