Changing the runlevel of system from 5 to 3 on startup, Operating System

Assignment Help:

Front page

We need to continue or customization and documentation of our system. Currently our system boots into runlevel 5 and we need it to boot into runlevel 3. For future reference please prepare documentation for changing the runlevel from 5 to 3 on startup. You also need to document all SERVICES that are started in runlevel 3 and what order they start it.

Please include a short 1 to 3-sentence description of the service. Investigate the current services that are starting at runlevel 3 and recommend those services that may be terminated. I need verification of the changes so please give me screen shots and explanations showing the system running at runlevel 3, the configuration changes showing that it is set to run in runlevel 3 by default.

Project requirements:

Part a

For your weekly report please include a detailed description of all the work performed this week and the requested documentation for system configuration and disaster recovery documentation (detailed instructions on how to make the changes that you made this week.

Part b

Provide documentation showing that your work has been completed. Include screen shots of the files changed, system running in runlevel 3 and the correct startup files. This project is time critical so complete it on time.

Back page

Create the required disaster recovery documentation for the projects and a lab report. The lab report should follow APA Style and contain no spelling or grammar errors. The lab report should also have a cover page and reference page.

Project requirements:

Our system is now configured to start and operate at runlevel 3. We now need to configure the systems network connectivity. Network connectivity is a key requirement for our system.

Since we have upgraded our operating system we need to also update our disaster recovery documentation. Currently our disaster recovery documentation is on page 82 under the section headingEx. 2-1 Configure the Network Connection Manually and needs to be updated.

We have decided to setup a new intranet for the company and in preparation for this we need to setup a few virtual ip addresses. Since this is a new process we will need new disaster recovery documentation.

IT Projects for this week

1. Take the instructions beginning on page 82 in Exercise 2-1 and update all sections for our current operating system, OpenSuSE 11.4. Highlight all changes in RED.

a.  Exercise 1. Note the current network configuration

b.  Exercise 2 delete the current network setup with yast

c.  Exercise 3 configure the network manually

d.  Exercise 4 save the network connection to interface and hardware configuration files.

2. Create documentation similar to the above project for creating virtual ip addresses for our system. Use the guidelines for Discovery Exercise Configuring IP Aliases on page 89 to complete this project. You should set the virtual ip addresses to be addresses on your current network.

A. you may also use ifconfig and ip commands to configure an additional ip address on a network device. Log into tty 1 as the root user and perform the following action in order using ifconfig command. use the manual pages to research  the appropriate options required. For each action, write down the commands that you used when finished, log out tty1 .

B. configure an IP alias for your first Ethernet adapter such that your first virtual IP address is 10.10.10.X(where x is unique student number assigned by your instructor.

C .View your IP configuration.

d. Use the ping command to verify both virtual IP addresses

e .Deactivate and reactivate your first  Ethernet adapter

3. Write a project report describing your work performed this week and any obstacles you had in performing this week's task. Include the following in the project report: date, time started, time stopped and project worked on. Include a screen shot at the end showing the project was completed.

Your system may not match exactly. For example, you may use a different device than eth0 or look in a different directory.


Related Discussions:- Changing the runlevel of system from 5 to 3 on startup

List the four steps that are essential to run a program, List the four step...

List the four steps that are essential to run a program on a completely dedicated machine. a. Reserve machine time. b. Manually load program into memory. c. Load starting

What do you understand by “line balancing”? What happens if , What do you u...

What do you understand by “line balancing”? What happens if balance doesn’t exist?

Semispace, Semispace works by maintaining two disjoint areas from which mem...

Semispace works by maintaining two disjoint areas from which memory can be allocated. These areas are called the from-space and the to-space. At ?rst, the algorithm allocates memor

Performance of job scheduling strategies, Performance of Job Scheduling  St...

Performance of Job Scheduling  Strategies In this project you will investigate the performance of Job Scheduling strategies, Memory Allocation strategies and a CPU Scheduling s

Mechanism for code and data sharing, Q. Consider a system in which a progr...

Q. Consider a system in which a program is able to be separated into two parts: code and data. The CPU recognizes whether it wants an instruction (instruction fetch) or data (data

Packets and time division multiplexing (tdm), Broken data into small packet...

Broken data into small packets allow time division multiplexing. In TDM every packet leaves the sender and is switched on the shared interaction channel through a multiplexer. At t

Address operator and pointers, We are use to using variables within C witho...

We are use to using variables within C without thinking about where they are stored. Most variables are dynamic i.e. can change, therefore they are stored in Ram, unlike a program

Computer number systems, Binary number based systems   Binary is a  ' base...

Binary number based systems   Binary is a  ' base 2' number system, only two numbers exist namely '0' and '1'. Conversion from binary to base 10 is easy if the number column techn

Which of the subsequent instructions should be privileged, Q. Which of the ...

Q. Which of the subsequent instructions should be privileged? a) Read the clock b) Clear memory c) Set value of timer d) Issue a trap instruction e) Turn off interr

What are the different accessing methods of a file, What are the different ...

What are the different accessing methods of a file? The different types of accessing a file are: Sequential access: Information in the file is accessed sequentially

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd