Changing the runlevel of system from 5 to 3 on startup, Operating System

Assignment Help:

Front page

We need to continue or customization and documentation of our system. Currently our system boots into runlevel 5 and we need it to boot into runlevel 3. For future reference please prepare documentation for changing the runlevel from 5 to 3 on startup. You also need to document all SERVICES that are started in runlevel 3 and what order they start it.

Please include a short 1 to 3-sentence description of the service. Investigate the current services that are starting at runlevel 3 and recommend those services that may be terminated. I need verification of the changes so please give me screen shots and explanations showing the system running at runlevel 3, the configuration changes showing that it is set to run in runlevel 3 by default.

Project requirements:

Part a

For your weekly report please include a detailed description of all the work performed this week and the requested documentation for system configuration and disaster recovery documentation (detailed instructions on how to make the changes that you made this week.

Part b

Provide documentation showing that your work has been completed. Include screen shots of the files changed, system running in runlevel 3 and the correct startup files. This project is time critical so complete it on time.

Back page

Create the required disaster recovery documentation for the projects and a lab report. The lab report should follow APA Style and contain no spelling or grammar errors. The lab report should also have a cover page and reference page.

Project requirements:

Our system is now configured to start and operate at runlevel 3. We now need to configure the systems network connectivity. Network connectivity is a key requirement for our system.

Since we have upgraded our operating system we need to also update our disaster recovery documentation. Currently our disaster recovery documentation is on page 82 under the section headingEx. 2-1 Configure the Network Connection Manually and needs to be updated.

We have decided to setup a new intranet for the company and in preparation for this we need to setup a few virtual ip addresses. Since this is a new process we will need new disaster recovery documentation.

IT Projects for this week

1. Take the instructions beginning on page 82 in Exercise 2-1 and update all sections for our current operating system, OpenSuSE 11.4. Highlight all changes in RED.

a.  Exercise 1. Note the current network configuration

b.  Exercise 2 delete the current network setup with yast

c.  Exercise 3 configure the network manually

d.  Exercise 4 save the network connection to interface and hardware configuration files.

2. Create documentation similar to the above project for creating virtual ip addresses for our system. Use the guidelines for Discovery Exercise Configuring IP Aliases on page 89 to complete this project. You should set the virtual ip addresses to be addresses on your current network.

A. you may also use ifconfig and ip commands to configure an additional ip address on a network device. Log into tty 1 as the root user and perform the following action in order using ifconfig command. use the manual pages to research  the appropriate options required. For each action, write down the commands that you used when finished, log out tty1 .

B. configure an IP alias for your first Ethernet adapter such that your first virtual IP address is 10.10.10.X(where x is unique student number assigned by your instructor.

C .View your IP configuration.

d. Use the ping command to verify both virtual IP addresses

e .Deactivate and reactivate your first  Ethernet adapter

3. Write a project report describing your work performed this week and any obstacles you had in performing this week's task. Include the following in the project report: date, time started, time stopped and project worked on. Include a screen shot at the end showing the project was completed.

Your system may not match exactly. For example, you may use a different device than eth0 or look in a different directory.


Related Discussions:- Changing the runlevel of system from 5 to 3 on startup

Define input - output operations, Q. Define Input - Output operations? ...

Q. Define Input - Output operations? Serial lines, Disks, tapes and other devices should be communicated with at a very low level. The user require only specify the device and

Create a gantt chart for scheduling algorithms, Question: (a) The follo...

Question: (a) The following table (table 1.0) gives the length of the CPU burst time in milliseconds of processes P 1 to P 4 . Assume the processes arrived in the order P 1 ,

Drawbacks of least-recently used algorithm, The question of fairness, regar...

The question of fairness, regarding page eviction, is a hard one. How do we decide what is fair? Many operating systems use global LRU, where pages from all processes are managed t

What is paging? , What is paging? Paging is a memory management schem...

What is paging? Paging is a memory management scheme that authorizes the physical-address space of a process to be noncontiguous. Paging evades the considerable problem of fi

Communications technique - application interaction protocols, Define the Co...

Define the Communications Techniques - Application interaction protocols    Communications techniques are well defined. They give developer the programmatic mechanism to transf

Problem, whats the problem in two state model ?

whats the problem in two state model ?

User threads control dispatching, Consider a particular system that does no...

Consider a particular system that does not have an interrupting clock.  The only way a thread can lose the processor is to voluntarily surrender it.  Additionally, the operating sy

Principles of informtiona tecnologu, i need to complete project on lan arch...

i need to complete project on lan architceture RAIDs etc

Briefly explain the process management in unix., Briefly explain the proces...

Briefly explain the process management in UNIX. UNIX makes use of the easy but powerful process facility that is visible to the user. UNIX follows the model in which the majori

Explain the application interaction protocols, Explain the Application Inte...

Explain the Application Interaction Protocols Application interaction protocols are uniquely defined for each program and are used to logically describe the data being passed b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd