Description of Git and how it differs from other system

Assignment Help Operating System
Reference no: EM131888077

Assignment -

Instructions - This assignment consists of 3 questions each of equal value. They consist of common tasks required of a system administrator-tasks I have had to do at some time in the past. Be aware that some questions require that you use the Virtual Machine supplied for the course. The question will clearly state that the course Virtual Machine must be used, if it doesn't then you are free to use your favourite flavour of UNIX.

Question 1 -

A research group at your institution wants to incorporate revision control into their project so they can track the user changes made to their research code.

The main software package they use is "rebound"5, a high precision integrator for studying the long-term stability of planetary systems, the orbital evolution of comets, asteroids or meteoroids, and simulating planetary accretion.

The revision control system they wish to use is Git6, as it is employed by their collaborators (and is used by the software developer). They have come to you to write a Git HOWTO using the Linux Git command-line interface and with explicit examples using the Rebound code base. All work on the code will be done on the institution's Linux HPC, so all user repositories will be local to that machine. The "master" repository for the local version of the rebound code will be on the HPC in the directory /home/Planets/rebound7. This directory is readable and writeable by the Unix group "rebound". All researchers using the code are in that group.

The HOWTO needs to cover the following topics:

  • A basic description of Git and how it differs from other revision control systems, such as Mercurial, SVN, rcs, darcs, etc.
  • A short description of the user's basic work-flow when using a Git repository.
  • How to initialise a Git repository for an existing code base. In this case the master code in the directory /home/Planets/rebound.
  • How to clone an existing master Git repository to a local user Git repository.
  • How to add new files and modified files to the local user Git repository.
  • How to recover a particular version of a file from the local user Git repository.
  • How to check the status of the local user Git repository.
  • How to view the change history of the local user Git repository.
  • How to push local user Git repository changes back to the master Git repository.
  • How to pull changes from the master Git repository into the local user Git repository.
  • What to do if a pull or a push fail because Git cannot merge your changes with the master Git repository.
  • Permissions that must be set on the master Git repository so that it can be cloned by users in the research group.

Notes:

a. The purpose of every Git command used must be explained.

b. The options used for every Git command must be explained.

c. Every Git command mentioned must show an example of the command using the Rebound code base.

d. Every Git command example must include the command output.

e. The code in the directory /home/Planets/rebound is the Master and all users are pushing their local changes to the master, and pulling other peoples changes from the master to their local copy.

f. The Rebound code is used by the USQ Astronomy group to model the dynamics of exo-planetary systems. A typical modelling sequence requires running the code a million times with each run integrating the system forward in time a million years and log if the system is stable or unstable (a planetary collision or ejection).

g. The "git" packages are not installed on the virtual machine, they will need to be installed if you plan to use it to do this question. To install any packages the guest NAT network which connects the guest OS to the Internet through the host's Internet connection must be brought up. To "bring-up" the NAT interface see the manpages ifup(8) and interfaces(5).

Question 2 -

Authentication under modern Unix systems is handled by the Pluggable Authentication Module (PAM) system. In about a page and in your own words explain the PAM system as it is implemented on a Linux distribution and why it was introduced.

Using the login service file found in the course virtual machine (see /etc/pam.d/login) as an example, explain how a service is configured and discuss the implications of each configuration line. Your explanation should include discussions on the following:

  • what is the module-type parameter,
  • what is the control flag,
  • what does it mean that the service file is a stack,
  • what is a PAM module.

Notes:

a. Be aware that there are subtle differences between different Unix distributions-the question explicitly states discuss the Linux version only!

b. The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together. Marks will be lost if your answer appears to be cut and pasted from the Internet.

c. List all resources used in answering this question.

d. Please do not fall into the trap of answering the question by using unexplained technical terms-you must explain all technical terms used especially if they have not been used anywhere else in the course. Assume you a writing for someone who knows nothing about PAM.

Question 3 -

Your users require standardised syncing software, but due to security constraints and possible intellectual property rights, syncing to off-site private servers is not an option. The software must also be supported under Windows, macOS, Linux, Android and iOS.

The software being mooted is "syncthing". You have been asked to test the latest version of syncthing (version 0.4.44 or 0.4.45) and write an evaluation report.

The report must contain the following:

  • A discussion of the syncthing application: how it is different from other syncing software, how it is configured, what information is required for configuration, how it actually synchronises data, what data is synchronised.
  • Included with your discussion of syncthing you must include examples of syncthing being installed, configured and used.
  • The environment used for the examples must be the course virtual machine and its host. This is important, as the guest machine does not have a windowing environment and the host will. So your discussion must include how to install, configure and use syncthing in a non-windowing environment (such as a server).
  • Discuss, with examples, the system and user systemd configuration required on the virtual machine, so that the user's instance of syncthing will start running when the user logs in (or the system boots) and continue running after the user has logged out.
  • The report with examples should be approximately two pages.

Notes:

a. Do not use any package manager, but download the compiled binaries from the syncthing Web site. You have been asked to test the latest version - different distributions will have older and different versions. For stability you want to run the same version across all systems.

b. For this question syncthing must be installed on the course virtual machine and its host.

c. To "bring-up" the host-only interface (the network that links the guests to the host) see the man-pages ifup(8) and interfaces(5)

d. It is important to understand how "syncthing" can use port 8384 for both configuration and data transfer. You need to understand which interface handles configuration and which handles data transfer.

Once you understand how "syncthing" communicates for configuration and for data transfer, manually changing the "syncthing" configuration file so that the "virtual" machine syncthing can be configured via a web client on the host, is straight forward. In the syncthing configuration file only the <gui> tag need be modified by hand.

Attachment:- Assignment File.rar

Reference no: EM131888077

Questions Cloud

Operational and political perspective : Compare the two wars from an operational and political perspective. Why did the Arab Spring follow these wars?
Explain why organizational structures differ : Explain why organizational structures differ. Define and provide an example of the four reasons why structures differ.
What were the nuremberg laws of 1935 : What were the Nuremberg Laws of 1935? Why did Racism appear to retreat after the end of World War 2?
How does environment impact their competitive strategies : What are some factors in the current environment causing businesses to change and how is it affecting the way they use cost management?
Description of Git and how it differs from other system : csc3412 Assignment - A basic description of Git and how it differs from other revision control systems, such as Mercurial, SVN, rcs, darcs, etc
What was major gen : What was Major Gen. Amos A. Fries's view on chemical warfare, and what persuasive rhetoric did he use to display his views
Discuss the political changes in the us : Discuss the political changes in the U. S. from 1820-1840. Were the changes positive or negative? Explain
Explain the structure of your ecosystem : Explain the structure of your ecosystem including important abiotic features and dominant plant and animal species.
Discuss the signing of a lease prior to having the money : Discuss her fundraising and valuation. If you were an equity investor, what return expectations would you have?

Reviews

len1888077

3/5/2018 6:30:28 AM

The word limit should be decided by the experts based on tasks. This is technical assignment and not English literature or essay. The assignment will be electronically submitted via Study Desk. If you cannot submit electronically please contact the Examiner as soon as possible to make alternative arrangements. If you have trouble submitting your assignment via the Study Desk etc., please contact the Examiner, USQAssist or via phone ASAP.

len1888077

3/5/2018 6:30:22 AM

Students can apply for an extension of time to submit an assignment at any time up to the deadline. Students are advised to make a request for an extension as soon as their need becomes apparent. Delay in making a request involves the risk of losing marks if the request is refused. The Examiner may grant a short extension of the deadline for submission of an assignment. Extensions are usually granted only in cases of Compassionate and Compelling Circumstances in accordance with the assessment of Compassionate and Compelling Circumstances Procedure. Generally, extensions will be limited to a maximum of five University Business Days. A Student requiring an extension for a period of time in excess of this should consider applying for a Deferred Assessment as per Section 4.4 of the assessment procedure. Applications for extensions must be made via email or USQAssist to the Examiner together with accompanying documentation as specified in the Assessment of Compassionate and Compelling Circumstances Procedure.

len1888077

3/5/2018 6:30:15 AM

An Assignment submitted after the deadline without an approved extension of time will be penalised. The penalty for late submission with out a pre-approved extension is a reduction by 5% of the maximum mark applicable for the assignment, for each University business day or part business day that the assignment is late. An assignment submitted more than ten University business days after the deadline will have a mark of zero recorded for that assignment. The Examiner may refuse to accept assignments for assessment purposes after marked assignments and/or feedback have been released.

len1888077

3/5/2018 6:30:08 AM

The Assessment Procedure Section 4.2.2, also outlines the following student responsibilities: If requested, Students must be capable of providing a copy of Assignments submitted. Copies should be despatched to the University within 24 hours of receipt of a request being made. Students are responsible for submitting the correct Assignment. Assignment submissions must contain evidence of student effort to address the requirements of the Assignment. In the absence of evidence of Student effort to address the requirements of the assignment, no Mark will be recorded for that Assessment Item. A Student may re-submit an Assignment at any time up to the deadline. A request to re-submit after the deadline is dealt with in accordance with section 4.4 ‘Deferred, Supplementary and Varied Assessment and Special Consideration’ of these procedures.

Write a Review

Operating System Questions & Answers

  Consider a small take-out food restaurant called burrito

consider a small take-out food restaurant called burrito brothers. this very popular establishment offers a very-tasty

  Discuss the various types of firewalls

Discuss the various types of firewalls. What are the pros and cons of each? Are there situations when certain firewalls should be avoided? Explain.

  Question 1a enumerate the objectives of a procurement

question 1a enumerate the objectives of a procurement development modelb describe one procurement development model you

  Question 1agiven memory partition of 100 kb 500kb 200kb

question 1agiven memory partition of 100 kb 500kb 200kb 300kb and 600 kb in order how would each of the first-fit

  Develop a profile of your personality characteristics

Assignment: Finding the Leader in You: Self-Assessment / Johari Window, The Johari Window emphasizes that we may not be aware of everything that there is to know about ourselves

  How to implement anti spoofing and directed broadcast filter

Research how to implement anti spoofing and directed broadcast filters on some type of router (preferably the type your organization uses).

  Implement a client-server application

It implements a client-server application in which 3 clients each send a single integer to the server through a FIFO - Determines the best fit for one of three fixed size memory partitions

  List significant differences between the windows and linux

List at least 5 significant differences between the following two OS. Windows, Unix and/or Linux, MAC OS (is actually Unix/Linux style in how it looks, but behaves differently), Other open source and Other closed source.

  How many page faults are generated array-initialization loop

Illustrate how many page faults are generated by following array-initialization loops, using LRU replacement, and assuming page frame 1 has process in it, and the other two are initially empty?

  Circuit switch and packet switch environment

Provide two examples of a circuit switch and packet switch environment. Base one example on a circuit switch and the other on a packet switch.

  Determine the rang of usable ip addresses

Determine the rang of usable IP addresses for the following IP subnet also determine the bradcast address for the subnet?

  Computer forensics it is likely a forensics investigator

it is likely a forensics investigator will encounter all of the primary operating systems available. the similarities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd