Enterprise Services August 1999, Revision D The Solaris Distributed Computing Solution Shell... Enterprise Services August 1999, Revision D The Solaris Distributed Computing Solution The
Trang 1The Solaris Distributed Computing Solution
Shell
A shell is an interface between the user and the kernel It acts as an
interpreter or translator In other words, the shell accepts commandsissued by you, interprets these commands, and executes the
appropriate programs Three shells are available in the Solarisenvironment:
● Bourne shell ($) – The default shell for the Solaris computing
environment The Bourne shell was developed for the AT&TSystem V.2 UNIX environment This shell does not have aliasing
Trang 2Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
The Solaris Distributed Computing Solution
Shell
Trang 3The Solaris Distributed Computing Solution
The File System
The Solaris computing environment file structure is a hierarchy ofdirectories, subdirectories, and files that are grouped together for aspecific purpose
● Directory – A location for other files and directories The Solaris file
system, or directory structure, enables you to create files and
directories accessed through a hierarchy of directories
● Subdirectory – Any directory below another directory For example,
Trang 4Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
The Solaris Distributed Computing Solution
The File System
Figure 1-4 Common Solaris Subdirectories
The file system is integrated with the kernel to provide anorganizational structure to store your data
The topmost directory is called the rootdirectory It is the startingpoint of the file-system hierarchy The rootdirectory (/) is requiredfor the operating system to function and contains critical systems files(such as the kernel, called /kernel/genunix)
The /usrdirectory contains executable commands, systemadministration utilities, and library routines
The /optdirectory contains Sun’s unbundled software applications
The /etcdirectory contains system administration files
The /export/homedirectory contains the user’s home directory.Depending on how the system has been set up by the administrator,the home directories may instead be found in /home
The /devdirectory contains files which are pointers to device names
root (/)
usr opt dev etc
bin sbin lib
export kernelhome
user1 user2 user3
genunix
var
Trang 5The Solaris Distributed Computing Solution
The File System
The file system organizes data in a hierarchical structure of directories,similar to the way a filing cabinet stores information
Figure 1-5 File System Organization Example
Directories are like file drawers Subdirectories are similar to folders.Files are like the individual pages of information contained in thefolder
The Solaris operating system contains many different kinds of files:
Trang 6Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Main Capabilities of the Operating System
The Solaris computing environment was designed for:
● Multitasking – Enables the kernel to keep track of severalprocesses simultaneously, which allows more than one tool orapplication to be used at a time
✓ A user can run a program (like a spreadsheet) and edit a document using a word
processor at the same time.
● Multiuser capability – Enables more than one user to access thesame system resources
● Distributed processing – Enables the use of resources across thenetwork
Figure 1-6 Solaris Computing Environment
Trang 7Main Capabilities of the Common Desktop Environment (CDE)
Sun Microsystems was the first company to use a windowingenvironment in conjunction with the UNIX operating system In 1993,
a consortium of UNIX platform vendors was formed to develop anintegrated, standard, and consistent graphical user interface desktopenvironment The contributors included Hewlett-Packard, IBM,Novell, and Sun Microsystems, along with many other companies andmembers of the OSF (Open Software Foundation), X/Open, and the
X Consortium CDE is Motif-based and users of other UNIX andpersonal computer (PC) desktops should be comfortable using CDE;many of the features are common to other desktop environments
Trang 8Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Main Capabilities of the Common Desktop Environment (CDE)
The Common Desktop Environment (CDE)
● Is a graphical user interface (GUI) between the user and theoperating system
● Provides built-in menus for users to select and run utilities andprograms without using Solaris 7 environment commands
✓ The Solaris computing environment provides over 300 utility programs and tools.
● Enables users to control multiple documents or applications on thescreen at the same time
● Controls activities in windows using both the mouse and thekeyboard
✓ The icons pictured above represent some of the major programs and tools available with CDE CDE is discussed in greater detail in subsequent modules.
Trang 9Exercise: Using the Solaris Computing Environment
Exercise objective – This exercise helps you review the basics of the
computing environment
Tasks
Answer the following questions:
1 Identify the four main components of a computer
2 Describe the three main functions of the kernel
▼ The _ manages and allocates resources among users
▼ The _ provides command interpretation
Trang 10Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Exercise: Using the Solaris Computing Environment
Tasks
4 In the blank spaces, write one of these three capabilities:
multitasking, multiuser, or distributed processing.
▼ The _ capability enables users to share systemresources
▼ The _ capability is the ability to perform severalprocesses simultaneously
▼ The _ capability is the ability to use resources across anetwork
2 A user is working at a Sun workstation that has no hard disk.What options might this user have for saving work that is doneduring the day?
Trang 11Exercise: Using the Solaris Computing Environment
Exercise Summary
Discussion – Take a few minutes to discuss what experiences, issues,
or discoveries you had during the lab exercises
✓ Manage the discussion here based on the time allowed for this module, which was given
in the “About This Course” module If you find you do not have time to spend on
discussion, then just highlight the key concepts students should have learned from the lab exercise.
● Experiences
✓ Ask students what their overall experiences with this exercise have been You might want
to go over any trouble spots or especially confusing areas at this time.
✓ Explore with students how they might apply what they learned in this exercise to
situations at their workplace.
Trang 12Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Exercise: Using the Solaris Computing Environment
Exercise Solutions
1 Identify the four main components of a computer
Memory, CPU, I/O, and hard disk
2 Describe the three main functions of the kernel
It manages all computer operations, controls the hardware, and converts requests coming from the mouse and keyboard into computer operations.
3 In the blank spaces, write one of these three terms: kernel, shell, or
file system.
▼ The shell represents the user interface, which translates
requests into actions
▼ The kernel manages and allocates resources among users.
▼ The shell provides command interpretation.
▼ The file system organizes and stores data in a hierarchical
structure
▼ The kernel performs memory management.
▼ The file system components are files and directories.
▼ The kernel controls disks, tapes, printers, terminals,
communication lines, and other devices
Trang 13Exercise: Using the Solaris Computing Environment
Exercise Solutions
4 In the blank spaces, write one of these three capabilities:
multitasking, multiuser, or distributed processing.
▼ The multiuser capability enables users to share system
resources
▼ The multitasking capability is the ability to perform several
processes simultaneously
▼ The distributed processing capability is the ability to use
resources across a network
Trang 14Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Check Your Progress
Before continuing on to the next module, check that you are able toaccomplish or answer the following:
❑ List the four main components of a computer
❑ Describe the three main components of the Solaris operatingsystem
❑ Identify the three most common shells in the Solaris system
❑ Distinguish between the multitasking, multiuser, and distributedprocessing capabilities of the Solaris system
Trang 16Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Objectives
Upon completion of this module, you should be able to
● List the characteristics of an effective password
● Change your password
● Describe the function of a mouse button
● Log in and log out of a system from the command line
● Log in and out of a CDE session
● Manipulate windows within the CDE
● Invoke and use menus and menu bars
Trang 17✓ Present the following question to stimulate the students and get them thinking about the issues and topics presented in this module While they are not expected to know the answer to the question, the answer should be of interest to them and inspire them to learn the content presented in this module.
Discussion – Passwords are a major key to a secure system What
characteristics would a good password have?
Additional Resources
Additional resources – The following reference can provide additional
details on the topics discussed in this module:
● Solaris Common Desktop Environment: User’s Guide,
“Starting a Desktop Session,” Part Number 802-6485
Trang 18Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
User Accounts
You must have a user account on the system to log in The user account
is defined in the /etc/passwdfile and contains the elements whichidentify each unique user to the system
System administrators are responsible for creating and maintaininguser accounts
The Root Account
The root account is the system administration account and is set up bythe installation process The root login account owns all system filesand has access to all files
Trang 19User Accounts
The /etc/passwd Entry
Each entry in the/etc/passwdfile is made up of seven fieldsseparated by a colon
Figure 2-1 Example /etc/passwdEntry
● Login ID – Is the identification required by the operating system
for a successful login It is the user’s “public name.” Depending onthe system administrator, login IDs are usually some combination
of a user’s first and last names For example, user Bob Wood’slogin ID might bebobw,bwood,woodb, orbw2
The login ID must:
▼ Be limited to eight alphanumeric characters
▼ Use lowercase characters only
▼ Be unique
● Placeholder – Maintains the field for the password, which is kept in
the/etc/shadowfile The/etc/shadowfile contains encryptedpasswords and password aging information (for example, how
Trang 20Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
User Accounts
The /etc/passwd Entry
● Comment – Is usually the full name of the user.
● Login directory – Is commonly referred to as the “home” directory,
where users store their files
● Default shell – Defines which shell the user will have upon login.
Trang 21Password Requirements
Your password protects your account from unauthorized access
In the Solaris 7 computing environment, a password
● Must be six to eight characters in length
● Should contain at least two alphabetic characters and one numeric
or special character
● Must differ from the login ID
● Must differ from the previous password by at least threecharacters
Trang 22Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
The Mouse Buttons
The mouse settings can be modified to suit a user’s preferences Once
a setting has been modified, that setting can be stored into a specific file This means that any personalized settings will be thedefault whenever a CDE session is initiated
user-The Left Mouse Button
Most actions use the left mouse button, alternatively known asbutton 1 or the SELECT button This button is used to make selections
in any of the following ways:
● Make a window active by clicking the left mouse button while themouse pointer is in that window area
● Invoke a window menu by clicking on the left mouse button whilethe mouse pointer is on the window’s menu box area
● Select an option from the Front Panel
● Select a File or Folder icon while working with the File Manager
Trang 23The Mouse Buttons
The Left Mouse Button
● Open an icon by double-clicking the left mouse button while thepointer is over the icon
● Highlight text to be selected by dragging over the text area, whilethe left mouse button is being pressed
The Middle Mouse Button
Button 2, also known as the ADJUST button, is used to paste selectedtext The text must have been selected using the left mouse button asdescribed previously
The Right Mouse Button
When the right mouse button, or MENU button, is clicked or helddown, a menu of choices will appear The options available on themenu will be determined by the position of the mouse pointer whenbutton 3 was pressed
Note – For the purposes of this course, you will be instructed to left or
right click to perform a specific action This assumes the standardright-hand configuration of the buttons These notes will instruct youwhen a double-click is required
Trang 24Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Logging In
Logging in identifies you to the system Before logging in to youraccount, CDE displays the Login Manager
You can log in using the login screen shown, or at the command line
The host name of your workstation
Menu of login options
Trang 25Logging in
The Options Button
The Options button on the CDE login screen provides a set of choices
These are
➤ Language ➤ Main Language-set ➤ Language Sub-set
Trang 26Copyright 1999 Sun Microsystems, Inc All Rights Reserved Enterprise Services August 1999, Revision D
Logging in
The Options Button
If a user chooses to work with a different windowing environment, thegraphics display to the right of the login, and password entry boxeswill display a graphic appropriate to the chosen windowing
environment The Failsafe session, where only the minimum servicesare available, is used for troubleshooting
As an alternative to the CDE login display, the user can choose to log
in from a conventional login prompt
Note – If the Command Line Login option is chosen, you must press
the Return key within 10 seconds of making this choice, otherwise theCDE login screen will restart
When the user successfully logs out from a command-line prompt, theCDE login screen will be restarted