configured, it is told what types of hardware devices toexpect. Init will search for and attempt to initialize eachphysically attached device. Any device that does notinitialize or that is missing will be marked asnonexistent and the driver disabled. Even if the deviceis later reconnected, it will be unusable until the systemis rebooted.When all is ready, the kernel verifies the integrity ofthe root filesystem and then mounts it. Init does the restof the work that is needed in preparing the system forusers. This includes mounting the remaining local diskpartitions (those found in the file /etc/checklist);performing some filesystem cleanup operations (fsck);turning on the major UNIX subsystems, such asaccounting and the print service; starting the network;mounting remote file systems; and enabling user logins.SYSTEM MODES.— There are two primarymodes of system operation: single-user and multi-user.Single-user is a system state designed for administrativeand maintenance activities which require complete andunshared control of the system. Single-user mode issometimes called the maintenance mode. Single-usermode is entered via manual intervention during the bootprocess. Sometimes, however, the system will entersingle-user mode if there are problems in the bootprocess that the system cannot handle on its own.Multi-user allows many users to all log onto the sameCPU. Users can access different applicationssimultaneously or even the same applicationsimultaneously. The kernel manages the different usersby scheduling the use of the processing time as well asswapping programs and data in and out of memorythrough virtual memory to disk. The most importantfact to remember is that the number of concurrent usersdepends on the amount of memory installed in thecomputer. Each user has a certain amount of memoryset aside for his or her work, unless everyone is willingto tolerate slow response time from the network.System ShutdownWhile there are many occasions when shuttingdown or rebooting the system is appropriate, neitheroperation should be performed indiscriminantly. Whileit is generally not something to worry about, there is adegree of hardware fatigue associated with turning acomputer system off and on again, and it is often betterto let it run 24 hours a day than to shut it down at night.REBOOTING.— There are only four commonsituations in which rebooting the system is called for:If you make changes to any of the systemsoftware or configuration files that are examinedor executed only when the system is booted, youmust reboot for these changes to take effect.Some devices, especially printer and modemports, can become confused enough thatresetting them is only accomplished by re-initializing the system.If the system has been up and running constantlyfor over a week, it is wise to bring the systemdown to single-user mode and run fsck. If anyfixes are made to the root partition, the systemmust be rebooted.If the system console becomes irretrievablyhung, the system must be rebooted.SHUTTING THE SYSTEM DOWN.— There aretwo proper ways to shut down the operating system:shutdown and reboot. As a last resort, the system can beshut down by turning off the power to the CPU. Thismethod is recommended only under emergencyconditions because of its detrimental impact on systemfiles and certain types of hard disk drives. These diskdrives expect their floating heads to be parked prior toshutdown. Powering off the system could cause theheads to crash and cause irreparable damage to the disk.Shutdown.— This command is the most often usedmethod of initiating a orderly system shutdown. It is thesafest, most considerate, and most thorough to initiate ahalt, reboot, or return to single-user mode. Thecommand will send messages to each user’s terminal atprogressively shorter intervals as the time for shutdownapproaches. The messages tell the time of theshutdown.Reboot.— This command terminates all currentlyexecuting processes except those essential to thesystem, then halts or reboots the system. When invokedwithout arguments, reboot syncs all disks beforerebooting the system. The command does not send amessage out to the users, unless you use the messageoption.MONITORSome people would ask, “Why do I have to expendenergy on monitoring the network when I could bedoing something more productive, like file server orworkstation maintenance?” There are several reasonswhy you should monitor your network:1-3
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business