Professional Documents
Culture Documents
Linux Soln
Linux Soln
Linux Soln
Linux Administration
Time : 2 Hrs.]
[Marks : 75
Vi
dy
al
an
ka
r
[10]
10]
Q.1 Attempt any TWO:
Q.1 (a) Explain Linux distributions.
[5]
[5
(A) Linux Distributions
Although there is only one standard version of Linux, there are actually
several different distributions. Different companies and groups have packaged
packag
Linux and Linux software in slightly different ways.
Mandrake
ke
popular Linux distribution with many of the same
Mandrake Linux is another p
pop
focuses on providing up-to-date enhancements and an
features
atures as Red Hat. It foc
and
easy-to-use installation
install
a GUI configuration.
SuSE
SuS
language-based distribution, SuSE has become very
Originally a German
Orig
Ge
throughout Europe and is currently one of the fastest growing
popular thro
popula
distributions worldwide.
distributio
Debian
Deb
Debian Linux is an entirely noncommercial project, maintained by hundreds of
volunteer programmers.
1
Its aim is to enhance Linux with new and improved applications and
implementations.
Vi
dy
al
an
ka
r
Caldera
Caldera OpenLinux is designed for corporate commercial use.
ges
Caldera has organized its OpenLinux distribution into several differentt packages,
ckage, which
hich is
each geared to different markets. These include the eDesktop package,
designed for basic workstation operations, and the eServer package,
e, which is
designed for Linux servers.
ary Linux
ux packages
packages.
Caldera also offers a line of commercial and proprietary
Slackware
net sites,
es, and yo
you
u can order the C
Slackware is available from numerous Internet
CD
ware distribution
stribution takes sspecial car
from Walnut Creek Software. The Slackware
care to
remain as closely Unix compliant as possible.
ssible.
TurboLinux
TurboLinux provides English,, Chinese, and
of Linux. It
nd Japanese versions
versio
includes several of its own
for automatically
wn packages, such as TurboPkg,
Tur
updating applications.
LILO
Stands for Linux Loader
ar
Q.1 (c) State any 5 linux supported file systems and explain ext3 and
d ext 2.
[5]
(A)
5 Linux Supported File System
[1 mark]
1. ext3
2. ext2
3. Reiser
4. FAT
5. NTFS
Vi
dy
al
a
x
x
x
Vi
dy
al
an
ka
r
Vi
dy
al
an
ka
r
A1
B1
C1
D1
Disk 0
A2
2
B2
C2
D2
Disk 1
A3
B3
C3
D3
Disk 2
A4
B4
C4
D4
Disk 3
Ap1
Bp1
Cp1
Dp1
Disk 4
Ap2
Bp2
Cp2
Dp2
Disk 5
Ap3
Bp3
Cp3
Dp3
Disk 6
[1 mark]
RAID level 3 Byte-Level Striping with Parity Disk
Requires minimum 3 disks. It does striping, like RAID-0, but at a very
Req
small granularity. It also adds parity disks which helps in error detection
and recovery.
RAID 3
A3
A6
B3
B6
A2
A5
B2
B5
Ap(13)
Ap(46)
Bp(13)
Bp(46)
Vi
dy
al
an
ka
r
A1
A4
B1
B4
Disk 0
Disk 1
Disk 2
Disk 3
A2
B2
C2
D2
D
A3
B3
C3
D3
D
Ap
Disk 0
Disk 1
Disk 2
Disk 3
Bp
Cp
Dp
RAID
ID level 5 Block-Level Striping
Striping with Distributed Parity [1 mark]
S
It requires at least three disks and uses striping to write the data
across
to
ss the two disks similarly
s
t RAID 1. But unlike 1, this level uses the
hird disk to hold parity info
third
information that can be used to reconstruct the
ata from either, but n
data
not both, of the two disks after a single disk
failure.
ilure
RAID 5
A1
B1
C1
Dp
A2
B2
Cp
D1
A3
Bp
C2
D2
Ap
B3
C3
D3
Disk 0
Disk 1
Disk 2
Disk 3
Vi
dy
al
an
ka
r
(g) Reboot the Linux, again log in as root or in superuser mode, drop into
command prompt and activate Grub by just type grubroot (fd0)setup
(fd0) Grub will search the stage1 and stage2 files in the floppy. If they
exist Grub will install them in the boot sector.
[1 mark]
Vi
dy
al
an
ka
r
[10]
[5]
[Any 5 program 5 marks]
DESCRIPTION
DESCR
Sets the system date and time via NTP
Controls the NTP daemon, ntpd
Generates
Generate public and private keys for use with NTP
Querie
Queries the NTP daemon
Provides
Pro
NTP simulation for development and testing
Displays the time variables maintained by the Linux kernel
Traces a chain of NTP servers back to the primary source
Sets certain time variables maintained by the Linux kernel
Q.3 (b) Write the configuration for accessing /data from linux machine.
[5]
(A)
On Linux Machine:
[4 marks]
#mkdir /data
#chmod 777 /data
Edit samba configuration file and set WORKGROUP= samba, also make
/data
ke /da
sharable with some users for e.g. abc.
[1 mark]
ark]
Vi
dy
al
an
ka
r
On windows machine:
Open My Network Places -> samba-> login as abc
This makes /data sharable with windows.
Q.3 (d)
d) Write a short note on squid.
squ
[5]
(A))
Providing Process Caching S
Server:
[Diagram 2 marks and explanation 3 marks]
(SQUID)
SQUID
a process server but can also be used as a caching
QUID is by default
d
souses. For eg.
C1
C2
C3
S
Q
U
I
D
C4
C5
C6
Vi
dy
al
an
ka
r
[3 marks]
installed.
Output : bind verno inst
installe
2. Once DNS is installed,
installed DNS configuration file named.conf will be
having following definition.
created, which
whic SHOULD
SHOU
Zone . I
IN
{
Type Hint;
Hint
named.ca ;
File na
}
[1 mark]
Make sure that, DNS cache has an entry to map local host to loopback.
3. Ma
Make sure that /etc/nsswith.conf contain the following line to redirect
4. M
the client.
hosts: file dns
5. Make sure that / etc/hosts has the word bind
10
[4 marks]
Vi
dy
al
an
ka
r
/etc/resolv.conf
/e
It contains
IP
c
I of DNS servers
/etc/named.conf
/etc/na
It is general DNS Server Configuration File
/var/named/named.local
It is used for mapping Loopback IP to Local Host
11
/var/named/named.ca
It is DNS cache server configuration File
/etc/named.conf/zone
It is used for forward mapping.
Vi
dy
al
an
ka
r
/etc/named.conf/reverse zone
It is used for reverse mapping.
Q.5 Attempt any TWO:
[10]
Q.5 (a) How to configure user level ftp access?
[5]
(A)
Answer not given
[3 marks]
The /etc/vsftpd/ftpusers file is the simplest to
o understand. It contain
contains a
list of user or account names, one per line,, that are
re not allowed to log in
using FTP. This file is used to increase security.
cracker
ty. For example, if a cracke
somehow obtains the root password but (stupidly)
upidly) tries to llog in as root
using FTP, the login attempt will fail.
il. Notice
e that the filename
filenam is annoyingly
an
counterintuitive: user accounts listed
to log in
sted in
n this file are not permitted
permitte
p
to the system via FTP. In general,
used to prevent
neral, /etc/vsftpd/ftpusers
/etc/vsftpd/ftpus
is us
privileged user accounts, such
uch as root,
root from using FTP
F
to obtain access to
the system. The following
file:
ng code
de shows the default /etc/vsftpd/ftpusers
/
/etc/vs
root
bin
daemon
adm
Ip
sync
shutdown
hutdown
own
halt
maill
news
uucp
operator
perato
gamess
nobody
So, to preve
prevent a user named bubba from using FTP to log in, or, rather, to
bubba from logging in to the system via FTP, add bubba to the end of
prevent b
pre
/etc/vsftpd/ftpusers. In most cases, these default entries should be
/etc/vs
suff
sufficient, but if you install a software package, such as a database package,
that requires one are more special user accounts, consider adding such special
accounts to /etc/vsftpd/ftpusers in order to maintain strict limits on how the
FTP server can be accessed.
12
Vi
dy
al
an
ka
r
The
/etc/vsftpd/user_list
file
serves
a
purpose
similar
to
/etc/vsftpd/ftpusers, limiting FTP access, but it is more flexible. If you
compare the two files, though, you see that the users listed in
/etc/vsftpd/user_list are the same ones listed in /etc/vsftpd/ftpusers. So,
ftpuse
what is the difference between the two files? /etc/vsftp/ftpusers
d/user_list
_list
unconditionally denies access to the system via FTP; /etc/vsftpd/user_list
th
can be used to deny or permit access, depending on the value of the
userlist_deny directive in /etv/vsftpd/vsftpd.conf. If userslist_deny
slist_deny
eny is set
TP access
ss only to the
to NO (that is, userlist_deny=NO), then vsftpd allows FTP
o YES (that is,
users listed in /etc/vsftpd.user_list. If userlist_deny is set to
pd/user_list
r_list will not be
userlist_deny=YES), no user listed in /etc/vsftpd/user_list
permitted to login via FTP. Such users will not
ott even be prompted for a
[2 ma
marks]
password.
13
Vi
dy
al
an
ka
r
i)
Introdu
Introducing
SMTP
The SMTP protocol can transfer only ASCCII text. It cant handle fonts,
co
colors, graphics, or attachments. If you want to be able to send these items,
you need to add another protocol to SMTP, MIME. MIME stands for
Multipurpose Internet Mail Extensions. MIME is implemented on top of the
14
SMTP protocol and enables you to add colors, sounds, and graphics to your
messages and still deliver them via SMTP. For MIME to work, you must have
a MIME-compliant MUA (most are).
Vi
dy
al
an
ka
r
Understanding POP3
Two other protocols are part of the email process: Post Office Protocol
ocol version
sion
3, known as POP3, and Internet Message Access Protocol version
on 4, known
own as
a
IMAP4.
Without POP3 (or IMAP), and MUA and MTA can't communicate.
ommunicate.
ate. That is, if
you want to read your mail, need POP3 (or IMAP) to
o retrieve
ieve messages that
arrive at your MTA while you're offline. POP3 uses the MTA's storage to
hold messages until they are requested. When
hen users
sers want to check their
t
email, they connect to the POP3 server and retrieve
were
etrieve messages th
that wer
stored by the server. After retrieval, the messages
ssages are stored
store locally (that
(t
is, locally to the MUA) and use the MUA on your PC to read them at
a your
leisure.
[10]
[5]
[2 marks]
[2 marks]
15
Vi
dy
al
an
ka
r
Csp1
Cs
Csp2
Csp2 SC
Disadvantage:
Heavy weight technique spawning and Rilling requires huge
D
rescores
16
Apache 2.0
[2 marks]
1. Apache 2.0 makes the use of multi processing model (mpm)
2. As the traffic increases, master web server creates child server
process which in two creates child threads.
3. As the traffic is decreased, the child threads and when child server
serv
process will be Rilled.
E.g. Multiprocessing model (mpm)
with
Vi
dy
al
an
ka
r
Master
CSP1
CT
CSP2
CTM
CT
CSP256
CTM
17
Vi
dy
al
an
ka
r
Vi
dy
al
an
ka
r
Q.7 (d) What is dns used for? Explain different types of dns servers
[5]
(A)
DNS is used for mapping URL to IP.
[2 marks]
Types of DNS SERVERS
[every server 1 marks each]
Primary or master: This is a DNS server maintained by ISP to map URL to
IP.
Secondary or Secure : This is a backup securer of primary and hence is a
replica of primary. It replies only if primary fails.
Caching or hint: This is a DNS cache which is maintained on a client machine
chine
that contains ip of frequently visited URL.
19