Changing the runlevel of system from 5 to 3 on startup, Operating System

Assignment Help:

Front page

We need to continue or customization and documentation of our system. Currently our system boots into runlevel 5 and we need it to boot into runlevel 3. For future reference please prepare documentation for changing the runlevel from 5 to 3 on startup. You also need to document all SERVICES that are started in runlevel 3 and what order they start it.

Please include a short 1 to 3-sentence description of the service. Investigate the current services that are starting at runlevel 3 and recommend those services that may be terminated. I need verification of the changes so please give me screen shots and explanations showing the system running at runlevel 3, the configuration changes showing that it is set to run in runlevel 3 by default.

Project requirements:

Part a

For your weekly report please include a detailed description of all the work performed this week and the requested documentation for system configuration and disaster recovery documentation (detailed instructions on how to make the changes that you made this week.

Part b

Provide documentation showing that your work has been completed. Include screen shots of the files changed, system running in runlevel 3 and the correct startup files. This project is time critical so complete it on time.

Back page

Create the required disaster recovery documentation for the projects and a lab report. The lab report should follow APA Style and contain no spelling or grammar errors. The lab report should also have a cover page and reference page.

Project requirements:

Our system is now configured to start and operate at runlevel 3. We now need to configure the systems network connectivity. Network connectivity is a key requirement for our system.

Since we have upgraded our operating system we need to also update our disaster recovery documentation. Currently our disaster recovery documentation is on page 82 under the section headingEx. 2-1 Configure the Network Connection Manually and needs to be updated.

We have decided to setup a new intranet for the company and in preparation for this we need to setup a few virtual ip addresses. Since this is a new process we will need new disaster recovery documentation.

IT Projects for this week

1. Take the instructions beginning on page 82 in Exercise 2-1 and update all sections for our current operating system, OpenSuSE 11.4. Highlight all changes in RED.

a.  Exercise 1. Note the current network configuration

b.  Exercise 2 delete the current network setup with yast

c.  Exercise 3 configure the network manually

d.  Exercise 4 save the network connection to interface and hardware configuration files.

2. Create documentation similar to the above project for creating virtual ip addresses for our system. Use the guidelines for Discovery Exercise Configuring IP Aliases on page 89 to complete this project. You should set the virtual ip addresses to be addresses on your current network.

A. you may also use ifconfig and ip commands to configure an additional ip address on a network device. Log into tty 1 as the root user and perform the following action in order using ifconfig command. use the manual pages to research  the appropriate options required. For each action, write down the commands that you used when finished, log out tty1 .

B. configure an IP alias for your first Ethernet adapter such that your first virtual IP address is 10.10.10.X(where x is unique student number assigned by your instructor.

C .View your IP configuration.

d. Use the ping command to verify both virtual IP addresses

e .Deactivate and reactivate your first  Ethernet adapter

3. Write a project report describing your work performed this week and any obstacles you had in performing this week's task. Include the following in the project report: date, time started, time stopped and project worked on. Include a screen shot at the end showing the project was completed.

Your system may not match exactly. For example, you may use a different device than eth0 or look in a different directory.


Related Discussions:- Changing the runlevel of system from 5 to 3 on startup

What are the advantages of linked allocation, What are the advantages of Li...

What are the advantages of Linked allocation? The benefits are a. No external fragmentation b. Size of the file does not require to be declared

Implement a network-transparent system, Q. What are two dreadful problems t...

Q. What are two dreadful problems that designers should solve to implement a network-transparent system? Answer: One such issue is making all the processors as well as storag

What is a process, What is a process? A process is a program in impleme...

What is a process? A process is a program in implementation. It is an active entity and it contains the process stack, having temporary data and the data section includes globa

Define logical address and physical address, Define logical address and phy...

Define logical address and physical address. An address formed by the CPU is referred as logical address. An address seen by the memory unit that is the single loaded into the

unix script command and echo command, Objectives 1.    Login to UNIX ...

Objectives 1.    Login to UNIX system and logout 2.    Learn features of the vi editor and to use online help (main pages).  Gain experience using them to create a document

Demand paging, Demand paging gives that pages could only be brought into ...

Demand paging gives that pages could only be brought into memory if the running process acts them. This is usually referred to as lazy evaluation as only those pages operated by

What is independent process, What is independent process? A process is ...

What is independent process? A process is independent it cannot influence or be affected by the other processes implementing in the system. Any process does not share data with

Explain root partition, Explain root partition The root partition,which...

Explain root partition The root partition,which have the operating-system kernel and potentially other system files, is mounted at boot time. In successful mount operation, ope

Explain enhanced second-chance algorithm, Enhanced second-chance algorithm....

Enhanced second-chance algorithm. When we increase the second-chance algorithm by considering both the reference bit and the modify bit as an order pair. We have the following

Difference between the vfork() and fork() system call, In the mean while th...

In the mean while the fork() system call the Kernel creates a copy of the parent process's address space and adds it to the child process. But the vfork() system call do no

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd