|1. Description - |
|Introduction to basic system administration of Linux and UNIX systems. Overview of basic PC hardware, system boot process, administration utilities, and management of user accounts, file systems, basic networking, printing, security, accounting and logging. Software install and removal using source code and package managers. Kernel updating and boot managers|
|Advisory: C S 30A and 30B.|
|2. Course Objectives - |
|The student will be able to: |
- understand and discuss basic system administration responsibilities
- understand basic PC hardware and setup with respect to administration
- understand and explain the system boot process
- use various system administration utilities
- setup and manage user accounts and groups
- perform file system setup, maintenance, check/repair, mounting, and backup/restore
- configure basic networking
- load and unload dynamic kernel drivers
- understand basic security issues, setup and procedures
- understand basic accounting and log files
- setup and manage basic print services
- understand basic Linux and UNIX installation and configuration
|3. Special Facilities and/or Equipment - |
- Access to a computer laboratory Unix or Linux operating systems.
- A website or course management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on-campus (i.e., face-to-face) offerings.
- When taught via Foothill Global Access on the Internet, the college will provide a fully functional and maintained course management system through which the instructor and students can interact.
- When taught via Foothill Global Access on the Internet, students must have currently existing e-mail accounts and ongoing access to computers with internet capabilities.
|4. Course Content (Body of knowledge) - |
- Overview of systems administration
- Roles (service provider vs. corporate cop)
- Regular operations
- Hardware and software management
- Planning and administration
- System monitoring
- Overview of Linux and UNIX
- The kernel
- Hardware overview
- Disk controllers (IDE/SCSI)
- Serial ports
- Startup and Shutdown
- Boot loaders
- The UNIX boot process
- Initialization files and startup scripts
- Single vs. multi-user
- Shutting down a Unix system
- System crashes
- The Root Account (superuser)
- Overview of root and its privileges
- Security issues
- Useful commands (su, sudo)
- Managing processes and understanding signals
- Fork, exec & threads
- Parent and child processes
- Process ids and information
- Commands for managing processes
- Common system daemons
- Cron and crontabs
- Managing Filesystems
- File types
- Disk I/O performance issues
- Formatting and partitions
- Mounting and un-mounting file systems
- Sharing system files - rdist, rsync
- Managing Software
- Acquiring source or packages
- Package managers
- Source code configuration, building, and installation
- Using ldconfig/ldd vs. static libraries
- Managing kernels
- Acquiring new kernels
- Patching kernel source code
- Managing modules
- Building kernel images
- Kernel installation
- Managing the boot loader
- Managing Users and Groups
- Unix users and groups
- Managing user accounts
- Enabling disk quotas
- Editing user information files
- Administrative tools
- Backup and Restore
- Commands to backup and restore
- Backup policies
- Backup procedures
- Backup devices
- Recovering from system disaster
- Repairing a damaged filesystem
- Restoring from boot disk or backup tapes
- Configuring Printers and Print Spoolers
- Components of the print system
- Printer types
- Printer protocols
- Printing utilities: BSD and System V
- Other printing software
- Managing Network Services
- Networking hardware
- Setup TCP/IP networking
- Basic TCP/IP administrative commands
- Networking devices and drivers
- Configuration files
- Other useful network utilities
- System Monitoring and Accounting
- BSD-style accounting files
- Printing accounting
- Monitoring and managing disk space usage
- Monitoring memory usage
- Security overview
- Protecting files and the file system
- Role-based access control
- Network security
- Hardening Unix and Linux systems
- Detecting problems
- Repeatability - Moved to header area.
|5. Repeatability - Moved to header area.|
|6. Methods of Evaluation - |
- Examinations (quizzes, mid-term)
- Homework assignments, projects, and hands-on exercises
- Laboratory skill demonstrations
- Comprehensive final examination
|7. Representative Text(s) - |
|Nemath, et. al., UNIX and Linux System Administration Handbook ,4th Edition, Pearson 2011. |
Shah, Steve and Soyinka Steve, Linux Administration, a Beginner's Guide, Fourth Edition, McGraw Hill/Osborne, 2005. ISBN 0072262591
|8. Disciplines - |
|Computer Science |
|9. Method of Instruction - |
- Lectures which include motivation for syntax and use of the Unix Operating System shell programming, example programs, and analysis of these programs.
- On-line labs (for all sections, including those meeting face-to-face/on campus) consisting of
- A programming assignment web-page located on a college-hosted course management system or other department-approved Internet environment. Here, the students will review the specification of each programming assignment and submit their completed lab work.
- A discussion web-page located on a college hosted course management system or other department-approved Internet environment. Here, students can request assistance from the instructor and interact publicly with other class members.
- Detailed review of written assignments which includes model solutions and specific comments on the student submissions.
- In person or on-line discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing and analyzing programs.
- When course is taught fully on-line:
- Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college hosted course management system or other department-approved Internet environment.
- Additional instructional guidelines for this course are listed in the attached addendum of CS department on-line practices.
|10. Lab Content - |
Transcribe an abstract algorithm into a concrete program that is written and tested using the IDE and submitted online for evaluation.
- Familiarization with the beginning-level online lab environment
- Modify and customize the settings of an Integrated Development Environment (IDE).
- Use the IDE to create a new programming project.
- Organize projects within an IDE to make submitting labs and switching project environments an orderly process.
- Gain experience with the steps needed to edit a simple program.
- Modify IDE settings to produce an industry standard code style.
- Finding and fixing errors in simple programs
- Demonstrate the complete edit-compile-run cycle of a simple program using IDE or command-line environment.
- Distinguish between compiler/syntax errors and logic errors.
- Develop strategies for dealing with each type of error.
- Debug code to produce a working program.
- Exploring the different data types using the compiler/IDE
- Gain experience in effectively using the IDE to create code with C# value types.
- Gain experience in effectively using the IDE to create code with C# reference types.
- Use the IDE to assist in defining and using compound data types.
- Solve syntax and logic problems that arise from typical incorrect formulation of data types.
- Demonstrating user interaction (I/O) through the IDE's console or GUI capabilities
- Play the role of user and programmer, alternately, to establish a user-interaction plan for a program.
- Evaluate and comment on other students' user-interaction plan.
- Change modes from source code design (editing mode) to end-user interaction (run mode) in your IDE in order to perform Q/A on the program.
- Fix poor interaction behavior by adjusting source code and rerunning program until a satisfactory result is achieved.
- Building a program that demonstrates “intelligence” though a combination of control statements
- Become familiar with selection, loop and nesting to imbue a program with correct logic behavior.
- Use structured programming to make control structures maintainable.
- Run the program multiple times to verify that its control statements produce the correct behavior or output under any scenario.
- Fix incorrect logic behavior by adjusting control structures and rerunning program until a satisfactory result is achieved.
- Incorporating functions and class methods in programming projects
- Gain experience in writing a function/method.
- Use a previously written function or method in a client program.
- Refine methods/functions by adding or changing their definitions and observe the result.
- Deduce the impact of a function's or method's design on the programs that invoke it.
- Building a program around object-oriented techniques
- Use previously written classes to instantiate objects in program.
- Use the IDE to assist in the creation of a programmer-defined class.
- Demonstrate the correct choice of class members and methods for each class used.
- Use the IDEs class view and object browser tools to navigate from one class to another within a program.
- Exploring Arrays
- Understand the proper use of Arrays.
- Incorporate an array into a program to facilitate the solution of an assigned problem.
- Investigate use of variable indices and loops to shorten and clarify the logic in programs.
- Use debugging techniques to solve problems that arise during the testing of a program.
- Devising and utilizing algorithms
- Write a program that uses a combination of techniques such as looping, arrays, logic and user I/O, all encapsulated in a coherent algorithm.
- Test the algorithm by running the program multiple times giving it different initial values or inputs.
- Implement a sorting or simple searching algorithm using arrays.
|11. Honors Description - No longer used. Integrated into main description section.|
|12. Types and/or Examples of Required Reading, Writing and Outside of Class Assignments - |
- Textbook assigned reading averaging 30 pages per week.
- Reading the supplied handouts and modules averaging 10 pages per week.
- Reading on-line resources as directed by instructor though links pertinent to programming.
- Reading library and reference material directed by instructor through course handouts.
- Writing technical prose documentation that supports and describes the programs that are submitted for grades.
|13. Need/Justification - |
|This course is a restricted support course for the AS degree in Computer Science. |