1. What is the function of the /etc/hosts file? Which services can you use in place of or to supplement the hosts file? This file holds the hostname and IP address of the local system. It also holds a special entry for localhost. This entry supports the loopback service, which allows the local system to talk to itself. The IP address of the loopback serviceis always 127.0.0.1, while 127.0.1.1 names the local system. 2. What does the /etc/resolv.conf file do? What do the nameserver lines in this file do? The /etc/resolv.conf file is the resolver configuration file. It provides access to DNS for Internet address resolution. The nameserver line indicates which systems the local system should query to resolve hostnames into IP …show more content…
Sockets allow unrelated processes on the same or different systems to exchange information. One type of socket, the UNIX domain socket, is a special file. Symbolic links are another type of special file. 6. What is a FIFO? What does FIFO stand for? What is another name for a FIFO? How does a FIFO work? A FIFO is a special file, also called a named pipe. You read from and write to the file to read from and write to the pipe. The term FIFO stands for first in, first out. The first information that you put in one end is the first information that comes out the other end. 7. Write a line for the /etc/fstab file that mounts the /dev/sdb1 ext4 filesystem on /extra with the following characteristics: The filesystem will not be mounted automatically when the system boots, and anyone can mount and unmount the filesystem. /dev/sda7 /backup ext4 user,noauto,rw 0 0 8. Without using rm, how can you delete a file? (Hint: How do you rename a file?) $ mv file /dev/null 9. After burning an ISO image file named image.iso to a CD on /dev/hdc, how can you can verify the copy from the command line? 10. Why should /var reside on a separate partition from /usr? Files on /var change often. Files on /usr rarely change. When a system crashes, it is more likely that a filesystem with recently modified files will become corrupt than a stable filesystem. To lessen the chance of the data in /usr from being
Good file names can provide useful cues to the content and status of a file, can uniquely identify a file and can help in classifying files.
2. Use the ls -l command to view the contents of the root file system directory (/).
2. How would you instruct an Apache server to listen on Port 81 instead of Port 80?
} close(server_socketfdis); exit(0); } else if (strcmp(kb_msg, "connect\n")==0) { sprintf(msg, "GETLIST"); write(socket_fd, msg, strlen(msg)) ; result = read(socket_fd, msg, MSG_SIZE); msg[result] = '\0'; string y(msg); if( (y[0]-'0') ! = 1) { getclientlist(y); } int Online
Although the file subject was tree structure directory it has a wealth of usage and techniques which will help make the file of filing concept much easier when it comes to maintaining the information which will be stored and/or maintained for retrieval purposes in reference to today and the near future.The single level directory function in the supporting of the command entry may help keep the file inline if you may be able to have a creative way of inputting the file for a more logical return on the result and/or results.
Sockets is the form of communication (UDP and TCP) use the socket abstraction, which provides an endpoint for communication between processes to processes. Interprocess communication consists of transmitting a message between a socket in one process and a socket in another process. As the IP packets underlying UDP and TCP are sent to Internet addresses.
12. Which Web page appears when you key a URL containing the server’s IP address instead of a name? Why?
the server binds the socket S to a local address, which is optional for a client. The server then
Computer Network: A LAN (local area network) that connects computers in a house, at school or at work.
In general, on the internet, every packet follows 5 layers of structures (Application, Transport, Network, Data Link, and Physical). Since I have to talk about Connection-Oriented and Connectionless as a service, I will focus on the Transport layer because they are part of this layer. It allows multiple applications to use one network connection simultaneously, the layer will create ports on your computer allowing them to be reserved and used by the Application layer. Let's say that port 3600 will be used to send a message to port 80 of some other computer, whenever the port is ready to send a message, it passed on to Transport layer. In this layer, it wraps the message inside the Segment which contains some additional
1. The process of obtaining an IP address for a computer name (for example, “Computer A”) is called __________. Name Resolution
P1: The first method in network addressing is, Fully Qualified Domain Name which is known as FQDN for short. FQDN is used as the domain name for a specific host or computer name on the internet. FQDN consists of two main parts, the domain name and the hostname. For example, Belfast Met is the hostname, but the domain name is belfastmet.ac.uk.
Ipconfig is a program on Windows systems that show network settings for the network adaptors on the computer system. Microsoft describes ipconfig as “Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings” (“Ipconfig,” n.d.). Running ipconfig without any options will show the adaptor’s IP address, subnet mask and default gateway settings. To gain more information about the adaptor the “/all” option should be used (Figure 1). Two items that is important is DCHP Enabled and the DHCP server. If DHCP Enabled is set to yes, then the IP address is supplied by the DHCP server. The next program could be used to determine if the host could communicate with the DHCP server and other hosts or network devices.
The Domain Name System or DNS is an international address system developed to ensure that every computer connected to the Internet has its own address. DNS assigns addresses to Internet web servers [10]. However, in the DNS system, that address is actually a set of numbers like 173.194.39.78. This set of numbers is called the computer's Internet Protocol (IP) address.
BIND in Linux-- BIND (Berkeley Internet name domain) is the most commonly used DNS (domain name system) server on the Internet, and it is the defacto standard on Linux and other Unix-like operating systems. DNS is the name resolution (i.e., translation) system that permits users to locate computers on a network by using their domain name rather than their IP addresses. IP addresses, which form the basis of addressing on the Internet and most other networks, each can contain as many as 12 digits under the currently mainstream IPv4 addressing scheme (or as many as 32 hexadecimal digits under the next-generation IPv6 addressing scheme). It can be difficult for humans to remember such addresses, but it is relatively easy for them to remember domain names, which typically use alphabetic characters and consist of words, abbreviations or acronyms. BIND provides an openly redistributable reference implementation of the major components of the DNS, including a DNS server (called named), a DNS resolver library and tools for verifying the proper operation of the DNS server. The resolver library is a collection of functions written in the C programming language that provides hostname-to-IP address and IP address-to-hostname lookup services.BIND was originally written at University of California at Berkeley (UCB) as a graduate student project under a grant from the U.S. Defense Advanced Research Projects Administration (DARPA). The acronym BIND originally stood for Berkeley Internet