Here are some sed commands to demonstrate its capabilities:
◦ sed 's/rain/snow/' easy_sed.txt; cat easy_sed.txt
◦ sed 's/plain/mountains/' easy_sed.txt; cat easy_sed.txt
◦ sed 's/Spain/France/' easy_sed.txt; cat easy_sed.txt
◦ sed 's/^The //' easy_sed.txt; cat easy_sed.txt
◦ sed 's/ $//' easy_sed.txt; cat easy_sed.txt
◦ sed 's/plain$/plains/' easy_sed.txt; cat easy_
2. We’ll start with a sign in sheet that include
questions about your Linux experience and
goals.
We’ll end with a class evaluation.
We’ll cover as much as we can in the time
allowed, starting with the easiest and most
important material. Don’t feel rushed; if we don’t
cover everything, you’ll pick it up as you continue
working with Linux.
This is a hands-on, lab class; ask questions at
any time.
Commands for you to type are in BOLD
We’ll take a break at the half-way point.
5. Linux is a Unix clone written from scratch by
Linus Torvalds with assistance from a
loosely-knit team of hackers across the Net.
Unix is a multitasking, multi-user computer
operating system originally developed in
1969 by a group of AT&T employees at Bell
Labs.
Linux and Unix strive to be POSIX compliant.
64% of the world’s servers run some variant
of Unix or Linux. The Android phone and the
Kindle run Linux.
6. (i) Make each program do one thing well. To do a new
job, build afresh rather than complicate old programs
by adding new features.
(ii) Expect the output of every program to become the
input to another, as yet unknown, program. Don't
clutter output with extraneous information. Avoid
stringently columnar or binary input formats. Don't
insist on interactive input.
(iii) Use tools in preference to unskilled help to lighten
a programming task, even if you have to detour to
build the tools and expect to throw some of them out
after you've finished using them.
The *Nix Philosophy of Doug McIlroy
8. BU uses CentOS in its Linux
cluster which is a free version
of RedHat Enterprise Linux with
the trademarks removed
9. Linux is an O/S core
written by Linus
Torvalds and others
AND
a set of small
programs written by
Richard Stallman and
others. They are the
GNU utilities.
http://www.gnu.org/
11. We will not cover the commands below in this class,
but you need to know them. See the man pages for
the process commands and the “sge” folder inside of
the “cheat sheets and tutorials” folder for the SGE
(Sun Grid Engine) command tutorials: qsh-
interactive.pdf, qsh-interactive-matlab.pdf, qsub-
batch.pdf, qsub-batch-matlab.pdf, and qstat-
qhost.pdf.
Process Management: ps, top, kill, killall, fg, bg
SGE Cluster: qsh, qstat, qsub, qhost
12. You need a “xterm” emulator: software that
emulates an “X” terminal and connects using the
“SSH” secure shell protocol.
You are sitting at the “client,” either a Windows,
Macintosh or even possibly a Linux machine.
You are connecting to a “server,” typically the
“head” or “gateway” node of a cluster of
computers. You will be working on the head
node or submitting jobs to execution nodes, all
of them, Linux machines.
You can also connect to a Linux machine by
using VNC to get a whole desktop if it’s
supported by the server.
13. You need a “xterm” emulation –
software that emulates an “X”
terminal and that connects using the
“SSH” Secure Shell protocol.
◦ Windows
If you don’t need windowing, “putty” is
good:
http://www.chiark.greenend.org.uk/~sgtat
ham/putty/download.html
If you need windowing, use StarNet “X-
Win32:”
http://www.bu.edu/tech/desktop/site-
licensed-software/xwindows/xwin32/
14. ◦ Mac OS X
“Terminal” is already installed
Why? Darwin, the system on which Apple's Mac OS X
is built, is a derivative of 4.4BSD-Lite2 and FreeBSD.
In other words, the Mac is a Unix system!
16. X-Win32/X-Config
◦ Wizard
Name: katana
Type: ssh
Host: katana.bu.edu (Off-campus, must include
domain “bu.edu” )
Login: <userID>
Password: <password>
Command: Linux
◦ Click “katana” then “Launch”
Accept the host server public key (first time only)
17. Terminal
◦ Type ssh –X katana.bu.edu or ssh –Y katana.bu.edu (less
secure)
18. When there are problems connecting to a login
host, try:
ping katana.bu.edu
telnet katana.bu.edu 22
19. Windows
◦ Using File Explorer, copy the directory “scv-
files.bu.eduSCVTrainingIntroduction to Linux”
to “My Documents” on your lab machine
Linux
◦ Connect to katana.bu.edu using X-Win32 and run
this command:
cp -Rv /project/ssrcsupp/linux_class ~/
20. Note: <CR> is short for “carriage return” and
equals the ASCII press the “Enter” or “Return”
key. It tells the shell that you finished sending
one line (see ascii-table.pdf).
Try
◦ telnet www.bu.edu
GET / HTTP/1.1
Host:www.bu.edu<CR>
<CR>
What happened?
24. A shell is a computer program that interprets the
commands you type and sends them to the operating
system. Secondly, it provide a programming environment
consisting of environment variables.
Most BU systems, including the BU Linux Cluster, support
at least two shells: TCSH and BASH. The default shell for
your account is TCSH. The most popular and powerful
Linux shell today is BASH.
To determine your shell type:
◦ echo $SHELL (shell prints contents of env
◦ echo “$SHELL” (shell still processes env. variable)
◦ echo ‘$SHELL’ (shell treats env. variable as simple literal)
The complete environment can be printed with set, setenv
(TCSH) and set (BASH).
To determine the path to the shell program, type:
◦ which bash
◦ which tcsh
Change the shell with “chsh /bin/bash” (provide path to
new shell as a “parameter,” meaning to be explained soon)
25. Output of the echo, which and chsh commands
The Shell
26. After you connect, type
◦ shazam
◦ whoami
◦ hostname
◦ date
◦ cal
◦ free
Commands have three parts; command, options and
parameters. Example: cal –j 3 1999. “cal” is the command,
“-j” is an option (or switch), “3” and “1999” are parameters.
Options have long and short forms. Example:
◦ date –u
◦ data --universal
What is the nature of the prompt?
What was the system’s response to the command?
27. Output of the whoami, hostname, date, cal and free
System Information
28. Try the history command
Try <Ctrl><r> (only works in BASH shell)
Choose from the command history by using
the up ↑ and down ↓ arrows
What do the left ← and right → arrow do on
the command line?
Try the <Del> and <Backspace> keys
29. Type
◦ hostname –-help
◦ man hostname
◦ info hostname (gives the same or most information,
but must be paged)
And “Yes,” you can always Google it
30. The pipe “|” feeds the OUTPUT of one
command into the INPUT of another command.
Our first example will use the pipe symbol to
filter the output of a command. Try:
◦ w
◦ w | grep ‘root’
◦ ps -e -o ruser,comm | grep 'tut‘
The ps command is using both “options (dash)”
and parameters
Try both “man grep” and “info grep”. See the
difference?
31. <Ctrl-a> go to beginning
<Ctrl-e> go to end
<Alt-f> forward one word
<Alt-b> back one word
<Ctrl-f> forward one character
<Ctrl-b> back one character
<Ctrl-d> delete character
<Alt-d> delete word
<Ctrl-u> delete from cursor to beginning of line
<Ctrl-k> delete from cursor to end of line
See emacs-editing-mode.pdf and emacs-editing-mode-short.pdf
Go to through command history in shell and practice editing.
32. The *Nix (Unix or Linux) file system is a hierarchical
directory structure
The structure resembles an upside down tree
Directories are collections of files and other
directories. The structure is recursive with many
levels.
Every directory has a parent except for the root
directory.
Many directories have children directories.
Unlike Windows, with multiple drives and multiple file
systems, a *Nix system only has ONE file system.
The Linux Standard Base (LSB) specifies the structure
of a Linux file system.
34. Try
◦ nautilus –-browser –-no-desktop
◦ tree –L 3 –d / | less
◦ tree –L 3 / | less
◦ file /bin/alsac then press <tab>
◦ cd ~; pwd (This is your home directory where application
settings are kept and where you have write privileges)
◦ ls
◦ mkdir myPics;mkdir myPics/work;mkdir
myPics/friends;mkdir myPics/friends/BU; mkdir
myPics/friends/MIT
◦ tree myPics
35. Output from the tree, file, pwd and ls commands
Demonstration of using the mkdir command
Examining the File System
36. There are two types of pathnames
◦ Absolute (Abs) – the full path to a directory or file;
begins with the root symbol /
◦ Relative (Rel) – a partial path that is relative to the
current working directory
Examples
◦ Abs cd /usr/local/lib
◦ echo $HOME (one of may environment variables
maintained by the shell)
◦ Abs cd `echo $HOME`
◦ pwd
◦ Rel cd ..
◦ Rel cd ..
◦ Abs cd /lib (location OS shared libraries)
◦ ls –d */ (a listing of only the directories in /lib)
37. Moving around the file system using the cd command
Navigating the File System
38. More useful commands
◦ cd (also takes you to your home directory like cd ~)
◦ mkdir test
◦ echo ‘Hello everyone’ > test/myfile.txt
◦ echo ‘Goodbye all’ >> test/myfile.txt
◦ less test/myfile.txt
◦ mkdir test/subdir1/subdir2 (FAILS)
◦ mkdir -p test/subdir1/subdir2 (Succeeds)
◦ mv test/myfile.txt test/subdir1/subdir2
◦ rmdir test (FAILS)
◦ rm –Rv test (Succeeds)
39. Demonstration of the mkdir, less, mv, rmdir and rm commands
Modifying the Linux File System
40. Useful options for the “ls” command:
◦ ls -a List all file including hidden file beginning with
a period “.”
◦ ls -ld * List details about a directory and not its
contents
◦ ls -F Put an indicator character at the end of each
name
◦ ls –l Simple long listing
◦ ls –lh Give human readable file sizes
◦ ls –lS Sort files by file size
◦ ls –lt Sort files by modification time
41. All files and directories have a individual and
a group ownership.
All files and directories have read (r), write
(w), and execute (x) permissions assigned as
octets to the individual owner (u), the group
(g) owner and all others (o) that are logged
into the system.
You can change permissions if you are the
individual owner or a member of the group.
Only root can change ownership.
43. Try
◦ cd
◦ touch myfile (create file)
◦ mkdir mydir (create directory)
◦ ls –l myfile (examine file)
◦ ls –ld mydir (examine directory)
◦ chmod g+w myfile (add group write permission)
◦ ls –l myfile
◦ chmod ugo+x myfile (add user, group and other execute
permission)
◦ ls –l myfile
◦ chmod ugo+w mydir (add user, group and other write
permission)
◦ ls –ld mydir
◦ chmod a-w (a=ALL, remove user, group and other write
permission)
44. Examining and changing file and directory permissions
File and Directory Ownership and Permissions
45. Syntax:
BEGIN { Actions}
{ACTION} # Action for every line in a file
END { Actions }
Try
◦ ls –l /usr
◦ ls –l /usr | awk ‘{print $9 “t” $5}’
◦ ls –l /usr > usr.txt
◦ awk ‘print $9 “t” $5}’ usr.txt (gives same results as 2nd
command line, but awk is acting on a file instead of saved
output)
◦ ls –lh /lib | awk ‘{printf “%20st%sn”,$9,$5}’
◦ ls –l /lib | awk ‘BEGIN {sum=0} {printf “%20st%sn”,$9,$5;
sum+=$5} END{sum/=1000000; printf “nTotal: %d
GBn”,sum}’
47. sed replaces one substring with another
sed operates on every line in a file or processes
every line piped into it
sed matches patterns using regular expressions
(See regular-expressions.pdf cheat sheet)
Common regular expression metacharacters:
◦ . – any character
◦ ? – quantified zero or one
◦ * - quantifier none or more
◦ + - quantifier one or more
◦ ^ - beginning of line
◦ $ - end of line
◦ [XxYy] – character class matching upper or lower case “X”
or “”Y”
48. Try
◦ echo “The rain in Spain stays mainly in the plain.” >
easy_sed.txt; cat easy_sed.txt
◦ sed –i.bak
‘s/rain/snow/;s/Spain/Sweden/;s/plain/mountains
/’ easy_sed.txt; cat easy_sed.txt
◦ ls -l /lib | awk 'BEGIN {sum=0} {printf
"%st%sn",$9,$5; sum+=$5} END{printf "nTotal:
%dn",sum}' | sed -e 's/.so(.[0-9]*)*//' | less
(challenge: get rid of soname extension)
◦ ls -l /lib | awk 'BEGIN {sum=0} {printf
"%st%sn",$9,$5; sum+=$5} END{printf "nTotal:
%d GBn",sum}' | sed -e 's/.so(.[0-9]*)*//' | awk
'{printf "%20st%sn",$1,$2}‘ | less (pretty print)
52. • Someone has corrupted Edgar Allen Poe’s poem, “The Raven.” Your
mission, should you decide to accept it, is to repair the damage with
emacs or vim and then confirm with the “diff” command. Hint: Also use
diff to find corruption.
• emacs –nw bad-the-raven.txt
or
• vim bad-the-raven.txt
• After editing and saving your file, confirm you work with:
• diff bad-the-raven.txt good-the-raven.txt
Mission Possible: Editing Files with Emacs and Vim
Operating systems graphic source: http://en.wikipedia.org/wiki/Operating_system
Einstein at computer source: http://www.freakingnews.com/Pictures/1/IBM-PC-turns-25.jpg
BU Rhett logo source: http://content.sportslogos.net/logos/30/619/full/71v3tk2fyob03vry9halsekcg.gif
What is Linux? source: http://www.kernel.org/pub/linux/kernel/README and http://en.wikipedia.org/wiki/Linux and http://en.wikipedia.org/wiki/Unix
POSIX an acronym for "Portable Operating System Interface", is a family of standards specified by the IEEE for maintaining compatibility between operating systems. POSIX defines the application programming interface (API), along with command line shells and utility interfaces, for software compatibility with variants of Unix and other operating systems (source: http://en.wikipedia.org/wiki/POSIX).
Richard Stallman source: http://www.stuffyouwillhate.com/wp-content/uploads/richard-stallman.jpg
Linux Torvalds source: https://netfiles.uiuc.edu/rhasan/linux/Linus_Torvalds.jpg
Windows logo source: http://www.whatthetech.com/blog/wp-content/uploads/2012/03/windows-logo.jpg
X-Win32 logo source: http://m.ts.vcu.edu/kb/images/software-images/X-Win32-12-Splash.JPG
Steve Jobs image source: http://blogs.computerworld.com/sites/computerworld.com/files/u23/steve-jobs.jpg
Apple logo source: http://coreldrawtips.com/images/applebig.jpg
Vim logo source: http://blog.tuxforge.com/wp-content/uploads/2011/08/vim-editor_logo.png
EMACS logo source: http://upload.wikimedia.org/wikipedia/commons/thumb/5/5f/Emacs-logo.svg/600px-Emacs-logo.svg.png