Changing the runlevel of system from 5 to 3 on startup, Operating System

Assignment Help:

Front page

We need to continue or customization and documentation of our system. Currently our system boots into runlevel 5 and we need it to boot into runlevel 3. For future reference please prepare documentation for changing the runlevel from 5 to 3 on startup. You also need to document all SERVICES that are started in runlevel 3 and what order they start it.

Please include a short 1 to 3-sentence description of the service. Investigate the current services that are starting at runlevel 3 and recommend those services that may be terminated. I need verification of the changes so please give me screen shots and explanations showing the system running at runlevel 3, the configuration changes showing that it is set to run in runlevel 3 by default.

Project requirements:

Part a

For your weekly report please include a detailed description of all the work performed this week and the requested documentation for system configuration and disaster recovery documentation (detailed instructions on how to make the changes that you made this week.

Part b

Provide documentation showing that your work has been completed. Include screen shots of the files changed, system running in runlevel 3 and the correct startup files. This project is time critical so complete it on time.

Back page

Create the required disaster recovery documentation for the projects and a lab report. The lab report should follow APA Style and contain no spelling or grammar errors. The lab report should also have a cover page and reference page.

Project requirements:

Our system is now configured to start and operate at runlevel 3. We now need to configure the systems network connectivity. Network connectivity is a key requirement for our system.

Since we have upgraded our operating system we need to also update our disaster recovery documentation. Currently our disaster recovery documentation is on page 82 under the section headingEx. 2-1 Configure the Network Connection Manually and needs to be updated.

We have decided to setup a new intranet for the company and in preparation for this we need to setup a few virtual ip addresses. Since this is a new process we will need new disaster recovery documentation.

IT Projects for this week

1. Take the instructions beginning on page 82 in Exercise 2-1 and update all sections for our current operating system, OpenSuSE 11.4. Highlight all changes in RED.

a.  Exercise 1. Note the current network configuration

b.  Exercise 2 delete the current network setup with yast

c.  Exercise 3 configure the network manually

d.  Exercise 4 save the network connection to interface and hardware configuration files.

2. Create documentation similar to the above project for creating virtual ip addresses for our system. Use the guidelines for Discovery Exercise Configuring IP Aliases on page 89 to complete this project. You should set the virtual ip addresses to be addresses on your current network.

A. you may also use ifconfig and ip commands to configure an additional ip address on a network device. Log into tty 1 as the root user and perform the following action in order using ifconfig command. use the manual pages to research  the appropriate options required. For each action, write down the commands that you used when finished, log out tty1 .

B. configure an IP alias for your first Ethernet adapter such that your first virtual IP address is 10.10.10.X(where x is unique student number assigned by your instructor.

C .View your IP configuration.

d. Use the ping command to verify both virtual IP addresses

e .Deactivate and reactivate your first  Ethernet adapter

3. Write a project report describing your work performed this week and any obstacles you had in performing this week's task. Include the following in the project report: date, time started, time stopped and project worked on. Include a screen shot at the end showing the project was completed.

Your system may not match exactly. For example, you may use a different device than eth0 or look in a different directory.


Related Discussions:- Changing the runlevel of system from 5 to 3 on startup

Explain lru approximation page replacement in detail, LRU approximation pag...

LRU approximation page replacement In this we utilize the reference bit associated with the page entry to choose a page to be removed. The various algorithms used for the imp

Explain the demand paging system, Question : (a) In the demand paging ...

Question : (a) In the demand paging system, when a process tries to access a page that was not brought into memory, a page fault occurs that involves a series of actions. The

Execution without entering a deadlock state, Q. Presume that a system is in...

Q. Presume that a system is in an unsafe state. Illustrate that it is possible for the processes to complete their execution without entering a deadlock state. Answer: An unsaf

Define enforcing modularity for c, Define Enforcing Modularity for C Ad...

Define Enforcing Modularity for C Additionally, in C it is sometimes necessary to create modularity of design. C++  is very natural model for component based application design

Explain relative file organization, Relative file organization A rela...

Relative file organization A relative file is an array of fixed-length slots and the records can be inserted in the first free slot found from the beginning of the file and

Define the dosexecpgm function used in the os/2, Define the DosExecPgm Func...

Define the DosExecPgm Functions used in the OS/2 DosExecPgm (objBuffer, objLen, flags, cmdLine, env, &resultCode, execName) DosExecPgm function is designed to load an execut

Paging, what is the use of valid invalid bits in paging

what is the use of valid invalid bits in paging

Merits of device controller in the kernel, Q. State three merits of placing...

Q. State three merits of placing functionality in a device controller rather than in the kernel and State three disadvantages. Answer: Three advantages: Bugs are less probabl

Explain additional-reference-bits algorithm, Additional-reference-bits algo...

Additional-reference-bits algorithm We can keep an 8-bit byte for every page in a table in memory. The operating system shifts the reference bits right 1 bit, discarding the lo

Explain the scheduleworktodo function used in netware, Explain the Schedule...

Explain the ScheduleWorkToDo Function used in Netware ScheduleWorkToDo(MyThread Function, arg, workToDo) The ScheduleWorkToDo ( ) function is specific to NetWare 4.0. This c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd