Explain how a service is configured

Assignment Help Computer Engineering
Reference no: EM131890031

Instructions

This assignment consists of 3 questions each of equal value. They con- sist of common tasks required of a system administrator-tasks I have had to do at some time in the past.

Be aware that some questions require that you use the Virtual Machine supplied for the course. The question will clearly state that the course Virtual Machine must be used, if it doesn't then you are free to use your favourite flavour of Unix.

Question 1

A research group at your institution wants to incorporate revision control into their project so they can track the user changes made to their research code.

The main software package they use is "rebound"5, a high precision inte- grator for studying the long-term stability of planetary systems, the or- bital evolution of comets, asteroids or meteoroids, and simulating plan- etary accretion.

The revision control system they wish to use is Git6, as it is employed by their collaborators (and is used by the software developer).
They have come to you to write a Git HOWTO using the Linux Git command-line interface and with explicit examples using the Rebound code base. All work on the code will be done on the institution's Linux HPC, so all user repositories will be local to that machine. The "master" repository for the local version of the rebound code will be on the HPC in the directory /home/Planets/rebound7. This directory is read- able and writeable by the Unix group "rebound". All researchers using the code are in that group.

The HOWTO needs to cover the following topics:
- A basic description of Git and how it differs from other revision control systems, such as Mercurial, SVN, rcs, darcs, etc.
- A short description of the user's basic work-flow when using a Git repository.
- How to initialise a Git repository for an existing code base. In this case the master code in the directory /home/Planets/rebound.
- How to clone an existing master Git repository to a local user Git repository.
- How to add new files and modified files to the local user Git repos- itory.
- How to recover a particular version of a file from the local user Git repository.
- How to check the status of the local user Git repository.
- How to view the change history of the local user Git repository.
- How to push local user Git repository changes back to the master Git repository.
- How to pull changes from the master Git repository into the local user Git repository.
- What to do if a pull or a push fail because Git cannot merge your changes with the master Git repository.
- Permissions that must be set on the master Git repository so that it can be cloned by users in the research group.

Question 2

Authentication under modern Unix systems is handled by the Pluggable Authentication Module (PAM) system. In about a page and in your own words explain the PAM system as it is implemented on a Linux distri- bution and why it was introduced.

Using the login service file found in the course virtual machine as an example, explain how a service is configured and discuss the implications of each configuration line. Your explanation should include discussions on the following:
- what is the module-type parameter,
- what is the control flag,
- what does it mean that the service file is a stack,
- what is a PAM module.

a. Be aware that there are subtle differences between different Unix distributions-the question explicitly states discuss the Linux ver- sion only!

b. The topics above are linked to each other and the question, they are not independent of each other. They are provided as a minimal guide only. Do not simply write an unconnected paragraph on each without linking the concepts together. Marks will be lost if your answer appears to be cut and pasted from the Internet.

c. List all resources used in answering this question.

d. Please do not fall into the trap of answering the question by us- ing unexplained technical terms-you must explain all technical terms used especially if they have not been used anywhere else in the course. Assume you a writing for someone who knows nothing about PAM.

Question 3

Your users require standardised syncing software, but due to security constraints and possible intellectual property rights, syncing to off-site private servers is not an option. The software must also be supported under Windows, macOS, Linux, Android and iOS.

The software being mooted is "syncthing". You have been asked to test the latest version of syncthing (ver- sion 0.4.44 or 0.4.45) and write an evaluation report.

The report must contain the following:
- A discussion of the syncthing application: how it is different from other syncing software, how it is configured, what informa- tion is required for configuration, how it actually synchronises data, what data is synchronised.

- Included with your discussion of syncthing you must include examples of syncthing being installed, configured and used.

- The environment used for the examples must be the course virtual machine and its host. This is important, as the guest machine does not have a windowing environment and the host will. So your discussion must include how to install, configure and use syncthing in a non-windowing environment (such as a server).

- Discuss, with examples, the system and user systemd configu- ration required on the virtual machine, so that the user's instance of syncthing will start running when the user logs in (or the system boots) and continue running after the user has logged out.

- The report with examples should be approximately two pages.

a. Do not use any package manager, but download the compiled binaries from the syncthing Web site. You have been asked to test the latest version - different distributions will have older and different versions. For stability you want to run the same version across all systems.

b. For this question syncthing must be installed on the course virtual machine and its host.

c. To "bring-up" the host-only interface (the network that links the guests to the host) see the man-pages ifup(8) and inter- faces(5)

d. It is important to understand how "syncthing" can use port 8384 for both configuration and data transfer. You need to understand which interface handles configuration and which handles data transfer.

Once you understand how "syncthing" communicates for configuration and for data transfer, manually changing the "syncthing" configuration file so that the "virtual" machine syncthing can be configured via a web client on the host, is straight forward.

In the syncthing configuration file only the <gui> tag need be modified by hand.

Reference no: EM131890031

Questions Cloud

What is the own price elasticity of demand : What is the own price elasticity of demand when PX = $140? Use the point elasticity formula. Please show all calculations.
What are the systemic risks to potential buyers of an IPO : Generally asking, What are the systemic risks to potential buyers of an IPO?
Determine and describe the four managerial functions : Identify and describe the four managerial functions that can be applied in Starbucks business in Saudi Arabia.
What is the hhi in decimal form : Imagine there are 4 hospitals in a market and each has an equal market share of 25%. What is the HHI in decimal form?
Explain how a service is configured : csc3412 - differences between different Unix distributions-the question explicitly states discuss the Linux version only - The report with examples
Compute point price elasticity of demand for bearing grease : Calculate the point price elasticity of demand for bearing grease. Calculate the optimal price for bearing grease if marginal cost is $4.60 per unit.
Write a sub procedure that plays the game ro-sham-bo : IE 212 Homework: Programming Structures. Write a sub procedure that plays game Ro-Sham-Bo (a.k.a., Rock, Paper, Scissors) for player and computer opponent
Model of aggregate demand and aggregate supply : Explain Home Depot's economic fluctuations and how shifts in either aggregate demand or aggregate supply can cause booms and recessions
What is your rate of return on this position : What is your rate of return on this position, if you close it out at $32 per share after one year?

Reviews

len1890031

3/7/2018 12:02:33 AM

To be assured of receiving a passing grade a student must obtain at least 50% of the total weighted marks available for the course (i.e. the Primary Hurdle), and have satisfied the Secondary Hurdle (Supervised), i.e. the end of semester examination by achieving at least 40% of the marks available for that assessment item. Supplementary assessment may be offered where a student has under- taken all of the required summative assessment items and has passed the Primary Hurdle but failed to satisfy the Secondary Hurdle (Super- vised), or has satisfied the Secondary Hurdle (Supervised) but failed to achieve a passing Final Grade by 5% or less of the total weighted Marks.

len1890031

3/7/2018 12:02:18 AM

It is vitally important that your assignment is clearly laid out with ques- tions and parts of questions clearly defined. It must be a straight for- ward matter for the examiner to determine that you have completed each exercise satisfactorily. We want quality not quantity. Poorly or- ganised submissions will be rejected or receive a poor mark. A text file or PDF/A document typeset using vanilla LATEX are preferred over a document produced by a word-processor. If you must use Mi- crosoft Word please export your document as PDF/A1 not PDF.

len1890031

3/7/2018 12:02:04 AM

This assignment consists of 3 questions each of equal value. They con- sist of common tasks required of a system administrator—tasks I have had to do at some time in the past. Be aware that some questions require that you use the Virtual Machine supplied for the course. The question will clearly state that the course Virtual Machine must be used, if it doesn’t then you are free to use your favourite flavour of Unix.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd