Section 1: Foundations| 2: Basic Unix| 3: Shell Programming| 4: Advanced Unix Use| 5: System Administration Theory| 6: Users and Accounts| 7: File Systems| 8: Backups| 9: Starting Up and Shutting Down| 10: Terminals| 11: Printers| 12: Unix Network Basics| 13: More Networking| 14: Security| 15: The Kernel| 16: cron, Accounting and Quotas| 17: Professional Issues| 18: System Rebuild| 19: Application Packages| Solutions to Exercises| Solutions to Review Questions


Exercises and Review Questions| Format and Fonts| Course Source| Section Descriptions| Acknowledgements| Trademarks

INTRODUCTION


Greetings and welcome to the wonderful world of Systems Administration. After working through this course you will hopefully have some appreciation of the complexities, hassles, intricacies, pitfalls, purpose and fun of being a Systems Administrator.

Systems Administration is not a science! There is no law handed down to Moses by a burning bush that states "You shalt.....". Each situation has to be dealt with on its own merits and according to the environment at the time. This course won't tell you the way to fix a problem. Instead (hopefully) it will help you develop the ability and knowledge required to decide between the plethora of choices and follow the option that is best for your site at any particular time.


Exercises and Review Questions


Throughout each section of this course there are a number of Exercises that have been designed to test your understanding of the concepts introduced. It is suggested that you try these exercises when you meet them. Each section finishes with a set of Review Questions. These questions form the basis of the tutorial work you should complete with each section.

Solutions to both the exercises and review questions are included at the end of the course.


Format and Fonts


The course follows a number of simple formatting styles that should assist you in reading it.


Readings


Any text of the following format

Reading Where the reading is taken from

Purpose Explanation of why the reading is useful.

refers to aditional reading material. When you come across text of this format you should complete the associated reading before progressing.


Exercises


Text in the following format

Exercise 1.1 text of a question

are exercise questions included to test your understanding of a concept. It is important that you complete the exercise when you first come across this text.


Computer Input and Output


Text in the following format

        bash> ls
        Mail            core            masters.tar.z   
        rcos.uu         telnet.doc      Masters        
        dead.letter     mbox            research       

is used to signify text produced or entered into a computer. Text in bold has been entered by a user. Text in the normal font is output by the computer.

Any text that is in italics is meant as a symbol that should be replaced by a real value.

For example:

        ls filename
        filename is a symbol that should be replaced with the name of a file.


Course Source


The primary source of this course is for the subject 85321, Systems Administration offered by the Department of Maths & Computing of the Central Queensland University. Table 0.1 summarises how the course should be covered for that subject.

        Week    Sections        Topic

        1    1 and 2    Introduction to Systems Administration and some basic UNIX
        2       3       UNIX Shell Programming
        3       4       Advanced UNIX Use
        4    5 and 6    Systems Administration Theory and Users
        5    7 and 8    File Systems and Backups
        6       9       Starting Up and Shutting Down
        7   10 and 11   Terminals and Printers
        8       12      Unix Network Basics
        9       13      More Networking
        10      14      Security
        11      15      The Kernel
        12      16      cron, Accounting and Quotas
        13      17      Professional Issues

                Table 0.1. Timetable for the 85321 course.


Resource Materials


The extra reading material referred to is from the Resource Materials book that is provided to students of the subject 85321.

Section Descriptions


The following sections briefly describe the individual sections of this course.

Section 1: Foundations


Section 1 provides an introduction to the role and responsibilities of a Systems Administrator. It also introduces a number of basic concepts regarding operating systems, UNIX and a brief introduction to the vi editor.

Section 2: Basic UNIX


The aim of this section is to provide an introduction to how to use the UNIX operating environment. It examines UNIX command format, the role of the shell, file and directory manipulation, various UNIX commands and the on-line help system.

This section can be skipped if you are already an experienced user of the UNIX operating system.


Section 3: Shell Programming


Much of what a Systems Administrator does includes writing and being able to understand shell programs. This section examines all of the basic shell programming knowledge necessary for a Systems Administrator. The section only discusses the syntax of the Bourne shell.

If you are already an experienced writer of Bourne shell programs you may skip this section.


Section 4: Advanced Unix Use


Section 4 rounds off the UNIX user information. It examines more advanced shell programming, advanced commands including awk and sed and regular expressions.


Section 5: Systems Administration Theory


This section examines some of the generic, hardware independent tasks that a Systems Administrator must complete including management, policies, procedures, communication with the users, and most importantly, documentation.


Section 6: Users and Accounts


Computers were created so people could use them to do work. Section 6 examines the procedures and files involved in letting people use a UNIX machine. It examines how to add and delete users and where and what information is stored about users.


Section 7: File Systems


All operating systems store information for future use onto disk drives. This section examines how the UNIX operating system stores and retrieves information from disk drives.


Section 8: Backups


Section 8 examines what might be the most important task that a Systems Administrator is responsible for and one that is usually neglected, the backing up of important data.


Section 9: Starting Up and Shutting Down


The UNIX operating system is a complex beast. This section examines the process the machine goes through when it boots and when it is shut down. It also examines the responsibilites of the Systems Administrator with regards starting a system and shutting it down.


Section 10: Terminals


A computer must not only store information but it must also provide methods by which users can access the information. Section 10 examines how terminals are added to a UNIX machine.


Section 11: Printers


In addition to showing how to add a printer to a UNIX machine. Section 11 also examines the software systems UNIX uses to implement printer support.


Section 12: Unix Network Basics


Networking is an increasingly important part of computing. Section 12 introduces you to the basics of networking within the UNIX environment.


Section 13: More Networking


Section 13 extends the coverage of networking to including additional features like NFS. It also provides some insight into adding hosts to a network and other more advanced networking topics.


Section 14: Security


Section 14 examines some of the security problems and issues related to the Unix environment and provides solutions and tips on how to solve them.


Section 15: The Kernel


The kernel is the central work horse of the operating system. Section 15 discusses the kernel, its responsibilities, and how the Systems Administrator can control it.


Section 16: cron, Accounting and Quotas


Section 16 brings together and discusses the


Section 17: Professional Issues


Section 17 discusses, to some part, life as a professional Systems Administrator. Topics covered include


Solutions


The solutions for both the review questions and the section exercises are included at the end of the course.


Acknowledgements


This course has developed over a couple of years and has been improved by the efforts and feedback of a number of people. This particular version of the course has benefited from the efforts of Peter Hardy, Shaun Teeney and Peter Van Heck, three CQU distance students who trialed the course (and the subject) during late 1994.

Extra special thanks must go to Mary Cranston and Elizabeth Tansley who provided invaluable assistance, both with proof-reading and as a source of many useful ideas.

I would also like to thank three people who have made material contributions to the course. Janet Jackson for her piece in Section 5 on communicating with users. Kenny Paul for the picture on the front cover and Mary Cranston (again) for the awk documentation included in the resource materials book.


Trademarks


UNIX and various other trademarks are all owned by their various owners. While every attempt has been made to guarantee its correctness there is no warranty about the information in this document.


BEGIN

David Jones (author)
Chris Hanson (html 12/09/96)