logo

Computer System and Network Assignment 2022

   

Added on  2022-10-11

10 Pages1850 Words8 Views
Running head: COMPUTER SYSTEM AND NETWORK
COMPUTER SYSTEM & NETWORK
Name of the Student
Name of the University
Authors note

COMPUTER SYSTEM AND NETWORK1
User instruction for executing the change logger script in Linux
Linux operating system is accounted profitable to bigger organizations as well as
individual users. Different kinds of computer frameworks can be done using Linux operating
system using its features that are really noteworthy. Linux operating system may be
favourable to many, however Linux like other operating systems has few vulnerabilities like
imperative breaches, deadlock issues and few more.
Certain commands are available in Linux operating system that requires user privilege
atop basic clients such as root privilege’s requirement for executing a command. Default root
level privileges in Linux distributions like Ubuntu and Fedora, are not present to the users in
most cases. Hence using ‘sudo’ is preferred for executing shell scripts which accompanies
and the health report is generated and the process’s surveillance in certain Linux server
whenever required.
Whenever a file or any directory is developed in Linux, it automatically gets allocated
default permissions based on umask value. The umask command sets the umask value.
Certain digits are present in the umask command which mention several details about the
permissions granted such as the command’s first digit provides permission to the user who
creates the file, the second digit for the command is the permission for the group from where
the user is from. The value for third digit for the command represents permission to other
users.
The script can be executed by the ‘chmod’ command. This command can be used by
some files that require particular access restrictions. This command can be used to alter the
flags for special mode.
A particular shell script’s permission can be changed by the following method:

COMPUTER SYSTEM AND NETWORK2
chmod + x mySysMonitor.sh
After the permission is changed, the script can be executed using the following command:
Sudo_/ mySysMonitor.sh
Analysis of designing health monitoring script:
For creating health monitoring script according to requirements of the project, the
script which is generated creates a log after collecting data which describes Linux related
system’s different allocations such as processor usage, memories and the resource’s
utilization. A script that keeps track of use of files, home directories uses and other processes.
The interfaces available for different networks, their status of availability and USB devices
list would be developed. The on-going process will also be checked by the script.
Listing for current processes:
The command which is used to list all processes in the Linux operating system is
psCommand. The ps or process status command is used to retrieve the process’s information
that is currently running in the system. This command includes few unique numbers specified
that are termed as PIDs. The program’s running instance that is a method present in the
system is termed as task.
List of top 5 RAM and CPU utilizing processes:
There are several commands available in Linux that can be used to list top 5 RAM
and CPU utilization processes such as:
ps -eo pid, ppid, cmd, %cpu, %mem --sort=-%mem | head
Any sort of data can be extracted about processes and arranging them by their memory
consumption’s status is obtained by using the above command.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
User Instructions for Execution of Change Logger Script for Linux
|10
|1401
|423

Linux Change Logger Script Execution Instructions and Design Considerations for Health Monitoring
|5
|1446
|410

IMAT5122 – Computer Systems and Networks Case Study 2022
|5
|902
|18

Linux Bash Scripting: Commands, Installation, and Outputs
|13
|2206
|488

Linux System Change Logger Script
|12
|2750
|201

Linux System Change Logger Script
|26
|4743
|96