We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJahiem Ellerd
Modified about 1 year ago
Computer Organization Tools Computer Organization 1 © WD McQuain Programming Tools Most of the programming assignments will require using the C language. We will use a current version of the GCC C compiler. What’s GCC? -the Gnu Compiler Collection (see gcc.gnu.org) -a collection of freeware software development tools, including support for C, C++, Objective-C, Fortran, Java, and Ada -available as part of all Linux and most UNIX-derived operating systems How do you get it? -run Linux -use a remote Linux environment (rlogin cluster) You will have to use the CS Department’s rlogin cluster for some assignments in any case.
Computer Organization Tools Computer Organization 2 © WD McQuain Linux Read Chapter 1 of the Sobell book for a history of Linux… really… There are many Linux distributions (distros)… superiority is a matter of religion. -the CS Department’s rlogin cluster and other servers (more later) are running CentOS -I use CentOS -CentOS will be the official platform for testing your assignments Linux distributions come in 32-bit and 64-bit versions; I recommend running 64-bit, but that will entail your installing some additional packages. In any case, we require you to run CentOS on your own computer. If you do not do so, expect to have problems.
Computer Organization Tools Computer Organization 3 © WD McQuain Running Linux on a Windows Host Here’s my advice: -Install VirtualBox (virtualbox.org). -I'm using version , but later versions should be fine. -Follow the installation instructions carefully. -Download a CD/DVD image for installing your chosen distro. -I used CentOS-6.5-x86_64-bin-DVD1.iso. -Follow the instructions in the VirtualBox manual: -for installing a guest OS on Windows -for installing the VirtualBox Guest Additions (these are essential) Once you’re done, you can boot and run Linux within a virtual machine. This minimizes your chances of disrupting your existing system setup. This works best if your computer has at least 2GB of RAM.
Computer Organization Tools Computer Organization 4 © WD McQuain Running Linux on an OS X Host Essentially, follow the instructions for a Windows Host, but install the version of VirtualBox for OS X. Note: -OS X is not Linux (or UNIX), and that prior students have experienced issues when trying to use the OS X native version of the GCC C compiler in this course. -Those problems will go away if you run Linux. -If you decline to do that, you may have to use the rlogin cluster (more later) for all of the UNIX-related and C programming assignments.
Computer Organization Tools Computer Organization 5 © WD McQuain Dual-booting Linux with Windows You may also install Linux so that you can choose between Linux and Windows when you boot your computer. The website for your chosen Linux distro will include installation instructions for dual- booting. This generally works as advertised as long as: -Your computer does not have any unusual issues, especially with respect to the partitioning of the hard disk. -You follow the instructions carefully. That said… -YMMV. -I have had dual-boot installations go sour and trash my system. -Using VirtualBox (or some other virtualization software) allows you to switch seamlessly between your native host OS and Linux.
Computer Organization Tools Computer Organization 6 © WD McQuain Safer Dual-booting Linux You may also install Linux so that you can boot it from a CD or a flash drive. The website for your favorite distro will have instructions for creating a bootable CD installation (often called a Live CD). This doesn’t usually give you the ability to update or save changes. See pendrivelinux.com for instructions on creating a bootable Linux flash drive. This generally works as advertised as long as you follow the instructions carefully. This should pose no risk to your existing machine setup. That said… -YMMV. -With some distros it is allegedly possible to perform updates and save changes. YMMV with this as well.
Computer Organization Tools Computer Organization 7 © WD McQuain SLO Accounts The CS Department uses a single-logon system (SLO) for many of its resources. If you are a CS major and have previously taken a CS course at VT, you should already have an account. If not, or if you’ve forgotten your SLO password, go to the following link and rectify the problem: https://admin.cs.vt.edu/ Note that you will need this to access some of the resources necessary for this course.
Computer Organization Tools Computer Organization 8 © WD McQuain SSH: secure shell for remote access Secure shell is a network protocol for secure communication. An SSH client is supplied with UNIX/Linux, and with OS X. Windows users should Google for “SSH Secure Shell Client” or for “PuTTY”, which are freely available for non-commercial use. See software.cs.vt.edu for downloads. You will use an SSH client to access the rlogin cluster for certain assignments.
Computer Organization Tools Computer Organization 9 © WD McQuain rlogin Cluster The rlogin cluster is a collection of computers, each running CentOS, that are available to for students taking CS courses at VT. To access the cluster, open a Linux terminal and enter the following command using your VT PID: ssh -l rlogin.cs.vt.edu Status and other information can be found at:
Computer Organization Tools Computer Organization 10 © WD McQuain SSH: login without a password You can set up keys that allow you to ssh to your rlogin account without using a password. From a Linux or Cygwin terminal on your machine, use the ssh-keygen command to create a key pair; the session will resemble this: #1008 ssh-keygen Generating public/private rsa key pair. Enter file in which to save the key (/home/wdm/.ssh/id_rsa):[Enter key] Enter passphrase (empty for no passphrase): [Press enter key] Enter same passphrase again: [Pess enter key] Your identification has been saved in /home/wdm/.ssh/id_rsa. Your public key has been saved in /home/wdm/.ssh/id_rsa.pub. The key fingerprint is: 33:b3:fe:af:95:95:18:11:31:d5:de:96:2f:f2:35:f9 Then, use the ssh-copy-id command to install the key on the remote system: #1009 ssh-copy-id -i ~/.ssh/id_rsa.pub rlogin.cs.vt.edu password:
Computer Organization Tools Computer Organization 11 © WD McQuain SSH: login without a password You should now ssh to your rlogin account and see if your key file only contains what you would expect: cd.ssh ls -a... authorized_keys id_rsa id_rsa.pub known_hosts cat authorized_keys ssh-rsa The only authorized key entry corresponds to my login from my local machine. Now, I can ssh to the cluster without having to provide a password.
Computer Organization Tools Computer Organization 12 © WD McQuain SSH: opening an X tunnel Many Linux applications have a graphical user interface; you can execute those on the server (rlogin cluster machine) by using the –X switch when you invoke ssh:
Computer Organization Tools Computer Organization 13 © WD McQuain So… Get to work! Create an installation of Linux on your laptop/tablet. -Use VirtualBox or not, your choice. -Use CentOS 6.X Get an SLO account (if you don't already have one) and make sure you know your password. If you like, set up password-free login (via ssh) to your rlogin.cs.vt.edu account.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Setting up Cygwin Computer Organization I 1 May 2010 ©2010 McQuain Cygwin: getting the setup tool Free, almost complete UNIX environment emulation.
A CRASH COURSE IN NJIT’S AFS AFS Quick Tips - Kashif Qazi.
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
Chromium OS is an open-source project that aims to build an operating system that provides a fast, simple, and more secure computing experience for people.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
CSCI 1411 FUNDAMENTALS OF COMPUTING LAB Lab Introduction 1 Shane Transue MSCS.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
1 Running MPI on “Gridfarm” Bryan Carpenter February, 2005.
Red Hat Installation. Installing Red Hat Linux is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on.
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.
Lesson 5-Accessing Networks. Overview Introduction to Windows XP Professional. Introduction to Novell Client. Introduction to Red Hat Linux workstation.
The Secure Shell Copyright © Software Carpentry 2011 This work is licensed under the Creative Commons Attribution License See
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Unix Servers Used in This Class Two Unix servers set up in CS department will be used for some programming projects Machine name: eustis.eecs.ucf.edu.
1 FreeBSD Installation ISOC/AfNOG Michuki Mwangi (Original materials by Hervey Allen – NSRC)
BIF713 Operating Systems & Project Management Instructor: Murray Saul Webpage: murraysaul.wordpress.com.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Go to & click on Install/Download Menu optionhttp://osddlinux.osdd.net/ Go to & click on Install/Download.
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
Installation of Ubuntu on a Virtual machine. VirtualBox allows you to run an entire operating system inside another operating system. Please be aware.
Step (1) Turn your computer on then press Del or F2 (depend on your computer’s main board) to enter The system BIOs.
Introduction to UNIX/Linux Exercises Dan Stanzione.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
CSN08101 Digital Forensics Lecture 1B: Essential Linux and Caine Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak.
Integrating HADOOP with Eclipse on a Virtual Machine Moheeb Alwarsh January 26, 2012 Kent State University.
Chapter One The Essence of UNIX and Linux Guide To UNIX Using Linux Third Edition.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
LING 408/508: Programming for Linguists Lecture 3 August 31 st.
Overview of Linux CS3530 Spring 2014 Dr. José M. Garrido Department of Computer Science.
VirtualBox: How to create a Linux Virtual Machine.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
Cap 333 Network Administration. Grades 20 marks distributed on Assignments / Project Activities Individual Pairs 1 or 2 tutorial quizzes.
Using MPI on Dept. Clusters Min LI Sep Outline Run MPI programs on single machine Run mpi programs on multiple machines Assignment 1.
Creating Programs on UNIX This term you can create programs on UNIX or you can create programs using a C++ compiler on your PC. This set of slides steps.
Setting Up a Local WordPress Development Environment By Gregory Young Alternative Hosting https://www.alternativehosting.com
1 Intro to Linux - getting around HPC systems Himanshu Chhetri.
AN INTRO TO UNIX/LINUX COMMANDS BY: JIAYANG WANG.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents Section A: Operating System Basics.
N ETWORKED & D ISTRIBUTED COMPUTING S YSTEMS L AB Programming Assignments EE323 Computer Networks.
© 2017 SlidePlayer.com Inc. All rights reserved.