Unit-I Basic Concepts: Course Code: BTCS9504 Course Name: Network Operating Systems
Unit-I Basic Concepts: Course Code: BTCS9504 Course Name: Network Operating Systems
Unit-I
Basic Concepts
Objective
Access Permissions
• There are three permissions for any file, directory or application program.
• The following lists the symbols used to denote each, along with a brief
description:
r — Indicates that a given category of user can read a file.
w — Indicates that a given category of user can write to a file.
x — Indicates that a given category of user can execute the file
Access Permissions
• Each of the three permissions are assigned to three defined categories of users.
• The categories are:
owner — The owner of the file or application.
group — The group that owns the file or application.
others — All users with access to the system.
• One can easily view the permissions for a file by invoking a long format listing
using the command ls -l.
• For instance, if the user juan creates an executable file named test, the output
of the command ls -l test would look like this: -rwxrwxr-x 1 juan student 0 Sep 26
12:25 test
Access Permissions
• The permissions for this file are listed are listed at the start of the line, starting
with rwx.
• This first set of symbols define owner access.
• The next set of rwx symbols define group access
• The last set of symbols defining access permitted for all other users.
Access Permissions
• This listing indicates that the file is readable, writable, and executable by
the user who owns the file (user juan) as well as the group owning the file
(which is a group named student).
• The file is also world-readable and world-executable, but not world-
writable.
Moving in Directories
Make Directory
Remove Directory
Copy File
Remove file
• The command rm filea removes the file a from the system If you use
wildcard. For example rm h*c you will remove all files beginning with h
and ending with c which are in working directory.
• If you write rm * you will erase all files from your working directory.
•Cisco™ Networking Academy Program: HP IT Essentials II: Network Operating Systems, Second Edition,
2004.
•Andrew S. Tanenbaum, ―Modern Operating Systems‖, Second Edition, Pearson Education, 2004
•Ramaz Elmasri, A. Gil Carrick, David Levine, ―Operating Systems – A Spiral Approach‖, Tata McGraw
Hill Edition, 2010