Download presentation
Presentation is loading. Please wait.
Published byTyrone Potter Modified over 8 years ago
1
INCS - 775 Virtual Data Center Security using Linux
2
What is a data center? A data center is a facility used to house mission critical computer systems and associated components. It generally includes environmental controls (air conditioning, fire suppression, etc.), redundant/backup power supplies, redundant data communications connections and high security. (Wikipedia)
3
Data Center Physical Layout A data center can occupy one room of a building, one or more floors, or an entire building. Servers are stacked in rack cabinets Cabinets are arranged in rows with aisles in between them to allow access to both front and back of the servers
4
Data Center Physical Layout (cont.) Air conditioning Backup power systems Raised floors – air circulation and power wiring Overhead cable trays – data wiring Fire prevention and extinguishing systems Physical security
5
Why Virtual Data Center? Several servers (virtual) implemented on one physical server Reduces operation costs AC requirements Power requirements Less IT personnel Easier to maintain More expensive equipment
6
Virtualization Environments Windows virtual environmnets: Microsoft Virtual PC Virtual Server VMware Linux virtual environments: Xen VMware
7
Why Linux? Linux is an Open Source operating system It is a fully 32/64 bit true multi user, multitasking, multiprocessor OS It is free There are a lot of resources available It is more secure than Windows It is supported by virtualization environments
8
Why Linux? (cont.) Has the X Windows GUI Coexists with other Operating Systems Runs on multiple platforms Includes the Source Code
9
Where to get it? There are different Linux Distributions Fedora Core – this is the one we will use in this course Debian Gentoo Slackware Ubuntu
10
History 1991 - Linux is created as a hobby by a student at University of Helsinki (Finland) 1992 - First public version 1993 - First prefabricated Linux distributions 1996 - Support for non-Intel processors 1999 - Linux 2.2 released Current linux version is 2.6
11
Linux environment Different runlevels Runlevel 0 – halt Runlevel 1 – single user mode Runlevel 2 – multiuser without NFS (same as runlevel 3 when networking is not present Runlevel 3 – full multiuser mode Runlevel 4 – unused Runlevel 5 – X11 Runlevel 6 - reboot
12
Login Usually done at: Runlevel 3 Runlevel 5 Uses hashed passwords stored in a shadow password file WORD OF CAUTION: DO NOT LOGIN AS ROOT!!!
13
Work Environment Runlevel 3: console Runlevel 5: X11 environment Window managers: GNOME KDE There are other window managers which require less space
14
XWindows After login is successful work can be done in consoles using linux commands
15
Useful Commands ls more (followed by the file name) cat (followed by the file name) cd mv mkdir rm man (followed by the command name) – see next slide
16
Useful Commands (cont.) Man command
17
Useful commands (cont.) ls -l
18
Useful commands (cont.) more
19
Editors vi emacs vim xemacs gedit
20
Editors vi
21
Linux structure
22
Shells Several ‘shells’ available: ksh,csh, bsh... Linux ==> bash Shell Scripts
23
Standard input, standard output and standard error
24
Important! Everything in Linux is either a file or a process
25
File System
26
Permissions Files have different permisions
27
Permissions (cont.) Directories are special files Links are special files ugw - rwx
28
Processes ps –ef shows the running processes kill – command to kill a process
29
Pipes and Filters Pipes and filters: Pipes makes the output of the command to become the input for the next command Filters read from input and write to standard output command | filter
30
Print lpr –P lpq –P
31
More Help with Linux man – for commands http://www.linux.org
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.