Basic of UNIX System and Linux system

UNIX SYSTEM
UNIX is earliest and most widely used network Operation system.
It is available is many versions like Sun Solaris, HP, UNIX, AIX UNIX, and BSD. Though developed for different hardware platforms they all have similar networking features.
LINUX SYSTEM
Linux is an open Source networking Operation System based on UNIX architecture.
Linux provide flexibility to users for altering it according to there individual requirements.


Feature of Linux / UNIX
Security: it supports different levels of access permission for each user file and directory. So unauthorized user can not access a file beyond a certain specified level.
Linux/Unix it treaded all the device treated as files.
It is provide Internet based service like mail, web browsing and transfer
Different protocol has been support FTP, SMTP, HTTP,HTTPS

Cellular Topology Network Topologies | Advantage vs Disadvantage

This is a wireless topology where geographical area is divided into cells or regions.
Advantage
Each cell is the center processes an individual device, which can move from one cell to another cell and receive signal.
So it does not need any reconfiguration,
Hence it is so flexible.
It is easy to install it only requires a central location with strong signals.
Disadvantage
It is very expansive to set up as it requires a central station and require satellite communication links for each cell.
When the central station is fail communication within the cell and other cells is disrupted completely. But other cell not affected.

Mesh Topologies Network Topologies | Advantage vs Disadvantage

These topologies consist of point –to-point connection between all the devices on the network.
Advantage
Mesh topology provides increased Network stability and connectivity.
So it is providing flexibility.
It is highly suitable for large network connections as it allows multiple sites on the network.
These topologies provide high speed data transmission between source and destination device
Disadvantage
This is complex topology that often results in an increased amount of cabling.
This cost to install and is unsuitable for smaller organization.
It involve high maintains and is not easily manages.

Ring Topologies Network Topologies through Point-to-point | Token Ring | Advantage Disadvantage

Ring topology is connected through a point-to-point connection.
Devices are connected as a ring and data passes the ring in one direction like bidirectional and regenerated signal can be accessed by the next device.
Advantage
It prevents collisions and traffic by using what is called as the token-ring method.
Disadvantage
It is high risk failure as the devices are connected point-to-point and even if a single device malfunctions it stops the functioning of the entire network.
There cables are costliest cable network to setup.
Ring topology is easy to maintain and troubleshooting is simple as location of faults is very easy.

Star Topologies Network Topologies using Hub Advantage Disadvantage

Start topology connecting to the device over a network using hub.
Advantages
Star topology has the higher scalability,
Newer device can be added to the start-based network by attaching them to the hub.
Star topology is also easily maintained and the working of the hub is not affected If the device become defective
Disadvantage
However star topologies require a lot of cabling and as the hubs.
They are very expansive these have a high installation cost.

Bus Topologies Network Topologies CSMA/CD Advantage Disadvantage

Here the all the device connected through a shared cable often called the backbone.
The data packet sent to the all the device on the network through bus.
If the designation address on the packet matches it is own address the device read the data else it is ignore it.
The device knows as terminator that is attached to the end of the bus.
If the multiple devices transmit signals at the same time it may lead to a collision.
To avoid collision bus topology uses mechanism called as carrier sense Multiple Access (CSMA/CD)

Advantage
It is easy to install
It is requires minimum cabling
Low cost for setting up
Disadvantage
It is difficult to add more devices to a bus network that is already established.
An administrator difficulty in maintain and trouble-shooting such a topology



Networking Concept Computer Network | Network Topologies | Network Transmission Medium

Computer Network Concept
In computer Terminology a network is defined as a group of integrated that shares services, data, Information and interact with each other by means of communicating link.

Network Transmission Medium Concept
Network thus requires at least two devices connected through a physical medium called as the transmission medium. A transmission medium determines the speed and connectivity of the network


Network Topologies Concept
Different network arrangement known as topologies
In another words schematic representation of the arrangement of the device a network is called network topology. There are five categories in there topologies
Bus
Star
Ring
Mesh
Cellular

Network Components NIC Repeaters Hubs Switches Modem Gateway Router Brouters

Network Interface card
Internal component of the device that helps in connecting each device to the network and operate the Data link layer in OSI model. This is called Network Interface card
Repeater
Every medium has a limited range of reliable data transfer after the signal get it will become weak. Hence repeater is used to amplify and regenerate the signal from one device to another device over network.
Hubs
Hub is the center point of the network.
Hubs allow multiple device to be attached at the same time .
Hubs are of three types
Passive hubs, Active hubs, Intelligent Hubs
Switches
Switches forward the packets only to the intended recipients of the packets preventing the wastage of the network bandwidth and optimizing efficiency
Modem
Modem it can be classified in to two types
Modulator and Demodulator
Modulator
It converts the digital signals of the computer to the analog signal and can be transmitted through telephone line.
Demodulator
It converts the analog signals to the digital signal.
Gateway
Gateway is the device that acts as an interconnection for network device.
Routers
Router maintain routing table of the information about routing of the data packet. There are hardware device that provide connectivity with different topologies or network with different standard.
Router depends on protocol for their functionality.
Brouters
Brouters are hardware devices that can function as router and bridges.
There are also protocol dependants.
Brouter acts as a router when it recognizes the associated network protocol.
If it does not the brouter acts as a bridge and forward the data packet to the adjacent Network segment.




NIS Network Information Service configuration important files and directory in Red Hat Linux

Install NIS
#rpm –q yp*
Set the domain
/etc/sysconfig/network
Line4: NISDOMAIN =linuxclient

Edit variable directory /var/yp/Makefile
Line 109 add # before host
Add the user to NIS
/usr/lib/yp/ypinit –m

-m option means this is for the Master server.

Start the service
Service yppasswdd start
Add the user
Update the user database through make command

Go to the client system
Setup NIS client
Set NISDOMAIN as linuxclient

NFS Network File Sharing Configuration Important Files Directory in Red Hat Linux

Before you install the NFS you must stop the ipatables
#service iptables stop
Or
#chkconfig iptables off

Install the NFS files
#yum install nfs*
ADD the shared files in the NFS configuration file
/etc/exports
Start the portmap
#service portmap start

Client Side
Mount the share file
#mount ipaddress:/sharefolder

Samba Server Configuration Important Files Directory in Red Hat Linux

Samba server installation command
Yum install samba*
Edit the smb.conf configuration file
/etc/samba/smb.conf
Add the user to samba
smbpasswd –a username


And give the full permission for shared directory

using chmod command Linux

Apache Web Server Configuration Important Files Directory in Red Hat Linux

Web server installation command
Yum install httpd*
Create Home file for the web server variable directory
/var/www/html

Create the web server configuration file httpd.conf file in configuration directory
/etc/httpd/conf


And edit the file httpd.conf
Restart the service
Service httpd restart

RNDC Command Syntax Various Option in DNS Configuration /etc/rndc.conf

RNDC command syntax
rndc <option><command><command-option>

Use rndc Domain Name System Prevent Unauthorized Users

Most use rndc it matching configuration of /etc/named.conf and /etc/rndc.conf the use of secret key name and key value prevent unauthorized users from accessing server. Using the key administrator can access the server and use rndc command to make the changes necessary for management even for remote machine.

DNS rndc utility /etc/named.conf in Red Hat Linux OS

RNDC is the bind utility enables secure and remote management of running name server. It is earlier name is Daemon Control utility (ndc).rndc is also called by remote BIND, or DHCP server to dynamically “update” the local server’s configuration. It is not daemon but utility called by named to verify keys. It used 953 port .rndc is used key specified in /etc/named.conf three statement are essential with option statement you can set the default server and key for rndc
Options
{
default-server localhost;
default-key “”;
};


Server localhost

{
Key “”;
};


Key “

{
};

and should exactly match their setting /etc/named.conf

To test this command you can run
rndc reload
rndc:relod command successfully.




DNS Configuration Important Files Directory Red Hat Linux

DNS installation command
Yum install bind* cachi*
Create the named.conf file in the configuration directory
/var/named/chroot/etc
Create Forward.zone and Reverse.zone file in the
/var/named/chroot/var/named directory

Set the IP address
/etc/sysconfig/network
Or use command to set the IP address
system-config-nework


Specify the IP address and host name DNS client system
/etc/hosts

Specify the DNS server name and IP address in the client System
/etc/resolve.conf

YUM Server Configuration Important Directory Files REDHAT Linux

Copy of the Linux OS like RED HAT package
/var/ftp/pub- copy the data from CD or DVD to /var/ftp/pub
Create repo file
rpm –ivh createrepo.
List out the repo file
createrepo /var/ftp/pub/Server/

Edit the yum server configuration file
/etc/yum.repos.d directory

/etc/passwd user account database Linux

How to view User account database /etc/passwd in Linux
Linux maintain the user account database in /etc/passwd directory. It will provide one-line information about every user on the system. /etc/passwd has the permission 644 these permission provide non-root user they will see the information but they don’t have any privilege to add the data to that file.
The file has seven fields
Student:x:500:500:studentwebsite:/home/student:/bin/bash
First filed: student
It is student it is user named id
Second field: X
X refers to the shadow password
Third filed: 500
It is user id (when you add new user the user id it is star with 500)
Fourth Field: 500
Group id
Fifth Field:studentwebsite
It is full name of the specified user
Six Field:/home/student
User home directory
Seventh field:/bin/bash
It is executed by login that is often a shell /bin/bash is the final command executed by login


/etc/passwd user account database Linux

How to Maintain the dual OS between Linux and Windows | Install Linux and windows in the system

If you like to install the windows and Linux in the same system.
Then first you install windows then you can install Linux. In this method only you can install these two OS. Because Linux support both windows boot loader and Linux. But windows support only windows boot loader it does not support Linux boot loader. Which Os you install last these OS occupy the boot laoder. As per my first method if you first you install the window then install Linux in these way Linux support both boot loader so there is no problem. But if you install like that Linux first windows second then window does not support Linux boot partition so windows it boot only windows.How install  DualOS Linux windows system

Basic things about Swap partition | command swap swapon swapoff Ram Size

Swap is the extension of the physical memory of the computer. Swap partition is creating during the initial Linux setup. Swap twice as large as the physical (silicon) memory-RAM but not less than 64 MB. Otherwise e swap space at least 1.5 times the amount of the physical memory on the system. Swanon command is used to enable swap partition for example swapon /dev/hda4. Swap enabled automatically at boot up at the proper entry in /etc/fstab by the following line /dev/hda4 swap swap defaults 0 0. Swapoff used to disable the partition example swapoff /dev/hda2
Swap partition swapon swapoff /etc/fstab Ram

ICMP destination unreachable code with their description

Destination host unreachable messages are sent by ICMP only. There are several reason for destination unreachable error message it contains the function codes.
These function codes are related to IP, TCP, UDP
ICMP destination unreachable code with their description Network Unreachable Host Protocol  Port Fragment Needed but DF set

Network Unreachable
Code value: 0
If there is no match found in the routing table for the packet’s destination the it will sent Network Unreachable message.
Host Unreachable
Code value: 1
The user sent the packet to the server and router R1 has a route to R2.
The packet is delivered to router R2. And Router R2 it is unable to get the MAC address of server it may occur in some problem with server or if it is down then.
It send ICMP Destination Unreachable message with host unreachable message to the user.
Protocol Unreachable
Code value: 2
Protocol Unreachable: User sent the packet to the server. It reaches the server and it is finding TCP or UDP.If TCP/UDP is not available on the server it send the user ICMP Designations Unreachable with code Protocols Unreachable
Port Unreachable: Code value: 3
User sent the packet to the server.
The server is up but web server software is not running. The packet will reach the server but cannot be delivered to the web server software. Hence it will send user the ICMP Designation Unreachable code with code Port Unreachable
Fragment Needed but DF set: Code value: 4
It the packet is too big then router R1 and R2 need the fragment the packet. There is a packet header field call Do Not Fragment in the Ip header. If the bit is set then the router cannot fragment the packet and hence sends ICMP Destination Unreachable message to user with the code Can’t Fragment

Troubleshooting IP Routing IP Routing traffic in Forward table

IP routing is the core of networking
It contains set of protocols that determine path of traffic that flow in order to multiple network across different routers. It gives router data flow from source to destination. This routing protocol will help the router to create forwarding table.
By using these forwarding table it will correlates final destination with forward table. If the router is unable to forward a packet then troubleshooting is required to find the cause.
Trouble shouting is related to network maintenance. Quick resolution of the problem leads to reduction in network downtime.