Computation for Physics ******

advertisement
Computation for Physics
計算物理概論
Introduction to Linux
Domain Name
• A domain name is an identification string that defines a
realm of administrative autonomy, authority, or control on
the Internet. Domain names are formed by the rules and
procedures of the Domain Name System (DNS). Technically,
any name registered in the DNS is a domain name.
• Domain names are used in various networking contexts and
application-specific naming and addressing purposes. In
general, a domain name represents an Internet Protocol (IP)
resource, such as a personal computer used to access the
Internet, a server computer hosting a web site, or the web
site itself or any other service communicated via the
Internet. (From Wikipedia)
Domain Name
• google.com
– mail.google.com
– drive.google.com
• nthu.edu.tw
– www.nthu.edu.tw
– www.phys.nthu.edu.tw
– qubit.phys.nthu.edu.tw
IP Address
• An Internet Protocol address (IP address) is a numerical label
assigned to each device (e.g., computer, printer) participating in a
computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host
or network interface identification and location addressing. Its role
has been characterized as follows: "A name indicates what we seek.
An address indicates where it is. A route indicates how to get
there."
• The designers of the Internet Protocol defined an IP address as a 32bit number and this system, known as Internet Protocol Version 4
(IPv4), is still in use today. However, due to the enormous growth of
the Internet and the predicted depletion of available addresses, a
new version of IP (IPv6), using 128 bits for the address, was
developed in 1995.[3] IPv6 was standardized as RFC 2460 in 1998,[4]
and its deployment has been ongoing since the mid-2000s. (From
Wikipedia)
Linux Server “qubit”
• domain name=qubit.phys.nthu.edu.tw
• ip=140.114.80.117
• How do I access a remote linux server?
How Do I Login to a Remote Linux Server?
TCP=Transmission Control Protocol
• The Transmission Control Protocol (TCP) is one of the two original core
protocols of the Internet protocol suite (IP), and is so common that the
entire suite is often called TCP/IP. TCP provides reliable, ordered, errorchecked delivery of a stream of octets between programs running on
computers connected to an intranet or the public Internet. (Wikipedia)
Telnet
• Telnet is a network protocol used on the Internet or local area networks to
provide a bidirectional interactive text-oriented communication facility
using a virtual terminal connection. User data is interspersed in-band with
Telnet control information in an 8-bit byte oriented data connection over
the Transmission Control Protocol (TCP). (From Wikipedia)
• telnet ptt.cc
SSH=Secure Shell
• Secure Shell (SSH) is a cryptographic network protocol for secure data
communication, remote shell services or command execution and other
secure network services between two networked computers that
connects, via a secure channel over an insecure network, a server and a
client (running SSH server and SSH client programs, respectively). The
protocol specification distinguishes between two major versions that are
referred to as SSH-1 and SSH-2. (From Wikipedia)
PuTTY: A Free Telnet/SSH Client
• http://www.chiark.greenend.org.uk/~sgtatham/putty/
login to qubit.phys.nthu.edu.tw
Unix Shell
• A shell is software that provides an interface for users of an
operating system to access the services of a kernel. (From
Wikipedia)
• A Unix shell is a command-line interpreter or shell that provides a
traditional user interface for the Unix operating system and for
Unix-like systems. Users direct the operation of the computer by
entering commands as text for a command line interpreter to
execute or by creating text scripts of one or more such commands.
(From Wikipedia)
• Text shells = Command Line Interface (CLI)
– Bourne shell
• bash (the Bourne-Again shell)
– C shell (csh)
• tcsh
Your Login and Password
•
•
•
•
Assume your student id is 100123456
Your login is "u"+id="u100123456"
Your password is "p"+reverse_id="p654321001"
Change your password after your first login!!
Shell command: passwd
$paswd
Changing password for user pcchen.
Changing password for pcchen.
(current) UNIX password: (type your old password)
New password: (type your new password)
Retype new password: (type your new password again)
passwd: all authentication tokens updated successfully.
$
How Do I Transfer My Program to Server?
FTP: File Transfer Protocol
• File Transfer Protocol (FTP) is a standard network protocol used to transfer
files from one host to another host over a TCP-based network, such as the
Internet.
• FTP is built on a client-server architecture and uses separate control and
data connections between the client and the server. FTP users may
authenticate themselves using a clear-text sign-in protocol, normally in the
form of a username and password, but can connect anonymously if the
server is configured to allow it. For secure transmission that hides
(encrypts) the username and password, and encrypts the content, FTP is
often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is
sometimes also used instead, but is technologically different. (From
Wikipedia)
SFTP: SSH File Transfer Protocol
• SSH File Transfer Protocol (also Secure File Transfer Protocol, or
SFTP) is a network protocol that provides file access, file transfer,
and file management functionalities over any reliable data stream.
It was designed by the Internet Engineering Task Force (IETF) as an
extension of the Secure Shell protocol (SSH) version 2.0 to provide
secure file transfer capability, but is also intended to be usable with
other protocols. The IETF Internet Draft states that even though this
protocol is described in the context of the SSH-2 protocol, it could
be used in a number of different applications, such as secure file
transfer over Transport Layer Security (TLS) and transfer of
management information in VPN applications.
• This protocol assumes that it is run over a secure channel, such as
SSH, that the server has already authenticated the client, and that
the identity of the client user is available to the protocol. (From
Wikipedia)
WinSCP :: Free SFTP and FTP client for Windows
WinSCP
How Do I "Run" My Program on Server?
Download