SlideShare uma empresa Scribd logo
1 de 26
Booting and Halting Chapter 4
Chapter Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
An Overview Of The Boot Sequence ,[object Object],[object Object],[object Object],[object Object]
An Overview Of The Boot Sequence ,[object Object],[object Object],[object Object]
An Overview Of The Boot Sequence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step 1: PROM Monitor ,[object Object],[object Object],[object Object],[object Object],[object Object]
PC PROM Monitors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sun PROM Monitor ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step 2: Boot Block ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step 3: Secondary Boot Loader ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux Loader (LILO) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GRUB  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Windows Multi-Boot Loader ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step 4: The OS Kernel ,[object Object],[object Object],[object Object],[object Object],[object Object]
Step 4: The OS Kernel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Step 4: The OS Kernel ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows Run Levels ,[object Object],[object Object],[object Object],[object Object],[object Object]
Step 4: The OS Kernel ,[object Object],[object Object],[object Object]
Step 4: The OS Kernel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
rc script problems ,[object Object],[object Object],[object Object],[object Object]
System V Scripts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
System V Scripts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of init Scripts ,[object Object],[object Object],[object Object]
Changing Run Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Emergency Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating system
Rafi Dar
 
Disabling windows file protection
Disabling windows file protectionDisabling windows file protection
Disabling windows file protection
Jhonathansmrt Smart
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
Wayne Jones Jnr
 
services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system
Saurabh Soni
 

Mais procurados (19)

The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
 
Ch02
Ch02Ch02
Ch02
 
boot
bootboot
boot
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating system
 
Booting of Computer System
Booting of Computer SystemBooting of Computer System
Booting of Computer System
 
Operating System Structure (documentation)
Operating System Structure (documentation)Operating System Structure (documentation)
Operating System Structure (documentation)
 
Disabling windows file protection
Disabling windows file protectionDisabling windows file protection
Disabling windows file protection
 
System calls
System callsSystem calls
System calls
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 
Windows post exploitation
Windows post exploitationWindows post exploitation
Windows post exploitation
 
App A
App AApp A
App A
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System Calls
 
Ch1 2
Ch1 2Ch1 2
Ch1 2
 
linux kernel overview 2013
linux kernel overview 2013linux kernel overview 2013
linux kernel overview 2013
 
services and system calls of operating system
services and system calls of operating system services and system calls of operating system
services and system calls of operating system
 
System call
System callSystem call
System call
 
CSC1100 - Chapter06 - Operating System & Utility Programs
CSC1100 - Chapter06 - Operating System & Utility ProgramsCSC1100 - Chapter06 - Operating System & Utility Programs
CSC1100 - Chapter06 - Operating System & Utility Programs
 

Destaque

Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
Raja Waseem Akhtar
 

Destaque (20)

Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Ch03
Ch03Ch03
Ch03
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
Ch05 system administration
Ch05 system administration Ch05 system administration
Ch05 system administration
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 
Ch16 system administration
Ch16 system administration Ch16 system administration
Ch16 system administration
 
Ch09 system administration
Ch09 system administration Ch09 system administration
Ch09 system administration
 
Ch24
Ch24Ch24
Ch24
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
 
Excel 2007 Unit P
Excel 2007 Unit PExcel 2007 Unit P
Excel 2007 Unit P
 
Drink Water To Your Health
Drink Water To Your HealthDrink Water To Your Health
Drink Water To Your Health
 
Ch08 system administration
Ch08 system administration Ch08 system administration
Ch08 system administration
 
Ch01
Ch01Ch01
Ch01
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 

Semelhante a Ch04

Bootloader and bootloading
Bootloader and bootloadingBootloader and bootloading
Bootloader and bootloading
Arpita Gupta
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
Dhaval Kaneria
 
Linuxdd[1]
Linuxdd[1]Linuxdd[1]
Linuxdd[1]
mcganesh
 

Semelhante a Ch04 (20)

Linux startup
Linux startupLinux startup
Linux startup
 
Linux Booting Process
Linux Booting ProcessLinux Booting Process
Linux Booting Process
 
Linux booting process!!
Linux booting process!!Linux booting process!!
Linux booting process!!
 
Bootloaders (U-Boot)
Bootloaders (U-Boot) Bootloaders (U-Boot)
Bootloaders (U-Boot)
 
Linux boot process – explained
Linux boot process – explainedLinux boot process – explained
Linux boot process – explained
 
Linux Booting Steps
Linux Booting StepsLinux Booting Steps
Linux Booting Steps
 
Boot prom basics
Boot prom basicsBoot prom basics
Boot prom basics
 
Unix Administration 2
Unix Administration 2Unix Administration 2
Unix Administration 2
 
An Insight into the Linux Booting Process
An Insight into the Linux Booting ProcessAn Insight into the Linux Booting Process
An Insight into the Linux Booting Process
 
Bootloader and bootloading
Bootloader and bootloadingBootloader and bootloading
Bootloader and bootloading
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Introduction to Operating Systems.pptx
Introduction to Operating Systems.pptxIntroduction to Operating Systems.pptx
Introduction to Operating Systems.pptx
 
101 1.2 boot the system
101 1.2 boot the system101 1.2 boot the system
101 1.2 boot the system
 
Basic Linux Internals
Basic Linux InternalsBasic Linux Internals
Basic Linux Internals
 
Unix Shell and System Boot Process
Unix Shell and System Boot ProcessUnix Shell and System Boot Process
Unix Shell and System Boot Process
 
1.2 boot the system v2
1.2 boot the system v21.2 boot the system v2
1.2 boot the system v2
 
101 1.2 boot the system
101 1.2 boot the system101 1.2 boot the system
101 1.2 boot the system
 
Linuxdd[1]
Linuxdd[1]Linuxdd[1]
Linuxdd[1]
 
Android crash debugging
Android crash debuggingAndroid crash debugging
Android crash debugging
 

Mais de Raja Waseem Akhtar

Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 

Mais de Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 
Chapter03 a - network media
Chapter03 a  - network mediaChapter03 a  - network media
Chapter03 a - network media
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Ch04

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.

Notas do Editor

  1. PC Bios is actually a multi-level “monitor” Each device may have it’s own BIOS that is run by the master BIOS. The device BIOS initializes the individual device, and reports the status to the master. The master collects the results and tabulates this information for the OS.
  2. The Apple Monitors Due to this limited functionality, many sysadmins do not consider that the Apple machines contain a viable a PROM monitor. In fact, there is a PROM monitor in the new Apple systems, albeit the user interface is still extremely limited! None of this mattered too much in the past, as the only OS that would run on an Apple computer was MacOS. Current- generation Apple computers can boot and run legacy MacOS, MacOS X (a UNIX-like OS), and Linux. In order to boot these alternate OS’s on an Apple required some form of a boot PROM. RS6000, SGI, and HP PROM monitors are functionally similar to the Sun monitor, but the user interface is very different. Refer to chapter 4 for more information on these monitors.
  3. The boot block is often contained in the system PROM. This program knows how to find the primary storage interface. It looks in a specific location on the storage media, and loads the next “N” blocks of data into the system memory. Once the data is loaded into memory, the system attempts to “run” the data as though it were a program. If things went well, the data is a program, the secondary boot loader.
  4. The secondary boot loader is usually tailored to specific operating systems. The boot loader knows how to find/load/start a specific OS kernel. Recently, secondary boot loaders have become more intelligent, and many now know how to locate/load/start several Operating System kernels. These loaders are possible, because the OS vendors have published information telling how their boot loaders work, and where they expect to find the information required to load the kernel, and boot the system. A good example of this type of boot loader is the GRand Unified Boot loader (GRUB).
  5. WARNING: Early versions of MacOS X contain a nasty security hole.; if a user holds down the Command and “s” keys during a reboot, the system will come up in single- user mode, without prompting the user for the root password.
  6. The easiest way to “add” a new service to a BSD box is to develop a rc.servicename script, and test it manually. Once the script seems to work manually, edit the master /etc/rc script, add the lines required to make the master script call the new script. Then reboot the system (when convenient) to test that the script works in automatic mode. At this point you may want to roll the new script into one of the existing scripts, but that will require further testing, and another downtime (or two) in order to ensure that things work the way that you expect them to.
  7. Sometimes OS level commands just won’t help. If thte system is completely hung, and ignoring keyboard input, sometimes you have to take drastic steps. SPARC hardware includes a special key sequence that is processed by the PROM monitor. If you hold down the STOP key, and press the A key at the same time, the system will revert to the control of the PROM monitor. At this point, you can use the “sync” command to cause the sytem to sync all memory to disk, and perform a controlled “crash and burn” reboot of the system. On PC systems, the CONTROL-ALT-DELETE will often accomplish the same result as the STOP-A will on a Sun.