csc8512 Assignment 2

    Need Solution - Download from here



    Question 2 (marks 25)
    One of your users has purchased an 8.0TB OWC Mercury Elite Pro ex-
    ternal drive. The OWC drive contains 4×2.0TB Toshiba disks and has
    hardware RAID 1, 5, or 10. The plan is to use it as a RAID 5 backup
    storage. The RAID array will be connected to the work machine using
    a USB3 cable.
    Instead of using the normal backup levels the user would prefer to have
    a current snapshot of his home directory while retaining differences
    between snapshots. So when a backup is performed the user would like
    the following to occur:
    a. The snapshot on the backup disk be updated to exactly reflect
    the current home directory. The backup disk will then contain a
    current mirror of the home directory.
    b. Before any of the files on the RAID array’s backup snapshot of
    the home directory are deleted or overwritten, the files are copied
    sideways (preserving the directory tree) into a backup directory
    on the RAID array.
    c. The backup directory should be converted to a single timestamped
    file using TAR/GZIP. The filename should be of the form YYYYM-
    MDDmmmm.tgz . This means the files can be easily sorted from
    oldest to newest using the filename.
    d. Only 30 days of TAR/GZIPed backup files should be kept.
    The user expects to run the script at the end of each working day to
    perform the current day’s snapshot as the user only wants to powerup
    the RAID array while snapshots are performed. This will help protect
    the data on the array from power failures (unless one occures during a
    snapshot/backup).
    The user wants to run just one script which will be stored on the RAID
    array. The procedure at the end of the day will be:
    a. Powerup the RAID array.
    b. Mount the RAID array.
    c. Run the script stored on the array.
    d. Check for error messages.
    e. Un-mount and power down the array.
    Your task is to write the script to perform the backup scenario outlined
    above.
    The only tools you will be using are:
    date :
    Used to create the TAR/GZIPed filename and check if files are
    older than 30 days.
    5tar :
    rsync :
    Used to archive all the files that would have been deleted or changed
    when the current snapshot is made.
    Used to create the current snapshot and copy deleted or changed
    files sideways before the snapshot is created.
    For the assignment, the following tasks need to be done:
    a. (4 marks) Explain and demonstrate how date is to be used to
    create the filename. Any options used must be explained. Exam-
    ple runs must be presented to show that date works as expected
    for the task.
    b. (4 marks) Explain how from the list of backup filenames those
    that are older than 30 days can be extracted.
    c. (6 marks) Explain and demonstrate how rsync is to be used
    to create the snapshot and backup. Any options used must be
    explained. Example runs must be presented to show that rsync
    works as expected for the task.
    d. (11 marks) Put all of the above together into a script, with appro-
    priate comments and error checking.
    Notes:
    a. The scenario layed out above is exactly what I required when I
    purchased the OWC external drive. The tools I used for the script
    are exactly the ones listed above.
    b. The reason filenames of the form YYYYMMDDmmmm is they natu-
    raly sort from oldest to youngest!
    c. The utility rsync can sync directories across a network or on the
    same machine. It has many options and subtle responses depend-
    ing on how the directory path is completed. These will have to be
    experimented with from the command line before deciding which
    are appropriate for this problem.
    d. When placing commands in a script, you must always check to
    see if they have worked correctly. On the command-line you
    know if a command has failed, but in a script you must check—
    because it may be run as a CRON job!
    All processes when they exit—exit with a status code. Check the
    process status code in the script — the shell special variable ?
    (yes, that is a question-mark) contains the return value of the last
    run process:
    mkdir Backup
    if [ $? -ne 0 ]
    then
    echo “failed to create backup directory”
    exit 1
    6fi
    Remember an exit value of zero means success, anything else is
    failure.
    Question 3 (marks 25)
    a. (12 marks) In about a page explain in your own words what a
    Logical Volume Manager is, its purpose and why it is useful.
    b. (7 marks) Illustrate your explanation by using the Linux Logical
    Volume Manager to combine the two spare 200MB disks available
    on the Virtual Debian distribution. Combine the disks into one
    logical volume of 400MB. Format the new logical disk and modify
    the /etc/fstab file to mount the new disk at boot.
    c. (6 marks) Document and explain in your own words the purpose
    of every command you use (plus any command line options) and
    any configuration files or scripts you modify or create.
    Notes:
    a. Be certain to explain the meaning of any tehnical terms you may
    use—for example, “physical volume”, “volume group”, &c.
    b. Make use of the utilities pvdisplay , vgdisplay , &c. to show
    the results of commands and that they have worked.
    c. You must use the supplied virtual machine to answer this ques-
    tion.
    Question 4 (marks 25)
    A user comes to you and explains that she needs some form of encrypted
    file system to store sensitive information on a Flash drive. The Flash
    drive will be used to transport the sensitive data between work and
    home and she is worried about losing the drive and having the data
    stolen. Both machines, the one at home and the one at work, use the
    same Linux OS.
    She has the following requirements:
    • She does not want to encrypt individual files as she has to deal
    with a large number of small text files.
    • She wants it to be as transparent as possible.
    • She thinks she will only need about 1GB at most.
    • She wants to also use the flash disk for transporting unencrypted
    files. Files that can be read on machines apart from her work and
    home machines.
    A 1GB file that contains an encrypted file system, stored on the Flash
    drive would appear to be ideal—
    7a. (8 marks) Create a 1GB encrypted file system in a file on a Flash
    drive so that it can be used with the cryptmount command.
    Document and explain in your own words every command you
    use (plus any command line options) and any configuration files
    you modify or create. Your descriptions of each operation need
    to show you understand the purpose of the operation.
    b. Things you must also address and explain:
    • (4 marks) how to ensure that the Flash drive has exactly the
    same mount point each time it is used on different machines.
    If it does not have the same mount point then how do you
    configure the hardwired cryptmount paths?
    Hint: Experiment with “labelled” file-systems or UUIDs
    in conjunction with the file /etc/fstab
    • (5 marks) how to securely manage the file-system encryp-
    tion keys.
    c. (8 marks) Write an instruction sheet for the user so that she can
    make the modifications to her home machine and be able to access
    the file on the flash drive containing the encrypted file system that
    you have given her. You have to setup her work machine and then
    instruct her how to setup her home machine.
    Also explain how she would use the filesystem in her day-to-day
    work.
    You may assume that she has root access to be able to configure
    her home machine but does not have root access to her work ma-
    chine.
    Notes:
    a. This must be done on the Virtual machine supplied. This is as-
    sumed to be the work machine you must setup.
    b. Do not use the tool cryptmount-setup or the tool installed
    by the package cryptsetup .
    c. Manually create files and configuration files.
    d. Follow the steps outlined in the cryptmount man page— ex-
    plaining the purpose of every step!
    e. You have root access to her work machine, so you will be setting-
    up her work machine and the flash drive. The instructions are
    for her to setup her home machine only based on how you have
    configured the work machine.
    f. List all resources used in answering the question.
    8g. Do not explain how you installed the cryptmount package—it
    should already be installed on the Virtual Debian.

    By |2017-05-01T19:18:13+00:00May 1st, 2017|Categories: computer science, linux|0 Comments

    Leave A Comment