Check out the new USENIX Web site.
Home  - At a Glance  - Register  - Tutorials  - Tech Sessions  - XFree86 Conf  - Exhibition  - Organizers  - Activities

Tutorial Descriptions   [Tutorial Overview]

Monday, November 5, 2001    

M1 Inside the Linux Kernel
Ted Ts'o, VA Linux Systems, and Stephen Tweedie, Red Hat, Inc.

Who should attend: Application programmers and kernel developers. You should be reasonably familiar with C programming in the UNIX environment, but no prior experience with the UNIX or Linux kernel code is assumed.

This tutorial will give you an introduction to the structure of the Linux kernel, the basic features it provides, and the most important algorithms it employs.

The Linux kernel aims to achieve conformance with existing standards and compatibility with existing operating systems; however, it is not a reworking of existing UNIX kernel code. The Linux kernel was written from scratch to provide both standard and novel features, and takes advantage of the best practice of existing UNIX kernel designs.

Although the material will focus on the release version of the Linux kernel, it will also address aspects of the development kernel codebase where its substance differs. It will not contain any detailed examination of the source code but will, rather, offer an overview and roadmap of the kernel's design and functionality.

Topics include:

  • How the Linux kernel is organized: scheduler, virtual memory system, filesystem layers, device driver layers, and networking stacks
  • The interface between each module and the rest of the kernel, and the functionality provided by that interface
  • The common kernel support functions and algorithms used by that module
  • How modules provide for multiple implementations of similar functionality (network protocols, filesystem types, device drivers, and architecture-specific machine interfaces)
  • Basic ground rules of kernel programming (dealing with issues such as races and deadlock conditions)
  • Implementation of the most important kernel algorithms and their general properties (aspects of portability, performance, and functionality)
  • The main similarities and differences between Linux and traditional UNIX kernels, with attention to places where Linux implements significantly different algorithms
  • Details of the Linux scheduler, its VM system, and the ext2fs file system—
  • The strict requirements for ensuring that kernel code is portable

Theodore Ts'o has been a Linux kernel developer since almost the very beginnings of Linux—he implemented POSIX job control in the 0.10 Linux kernel. He is the maintainer and author for the Linux COM serial port driver, and the Comtrol Rocketport driver. He architected and implemented Linux's tty layer. Outside of the kernel, he is also the maintainer of the e2fsck filesystem consistency checker. Theodore is currently employed by VA Linux Systems.

Stephen Tweedie works on Linux kernel internals and high availability for Red Hat, Inc. Before that he worked on VMS filesystem internals for Digital's Operating Systems Software Group. He has been contributing to Linux for a number of years, in particular designing some of the high-performance algorithms central to the ext2fs filesystem and the virtual memory code.

M2 Configuring and Administering Samba Servers
Gerald Carter, VA Linux Systems

Who should attend: System and network administrators who wish to integrate Samba running on a UNIX-based machine with Microsoft Windows clients. No familiarity with Windows networking concepts will be assumed.

Samba is a freely available suite of programs that allows UNIX-based machines to provide file and print services to Microsoft Windows PCs without installing any third-party software on the clients. This allows users to access necessary resources from both PC and UNIX workstations. As Samba makes its way into more and more network shops all over the world, it is common to see "configuring Samba servers" listed as a desired skill on many job descriptions for network administrators.

This tutorial will use real-world examples taken from daily administrative tasks.

Topics include:

  • Installing Samba from the ground up
  • The basic Microsoft networking protocols and concepts, such as NetBIOS, CIFS, and Windows NT domains (including Windows 2000)
  • Configuring a UNIX box to provide remote access to local files and printers from Microsoft Windows clients
  • Utilizing client tools to access files on Windows servers from a UNIX host
  • Configuring Samba as a member of a Windows NT domain in order to utilize the domain's PDC for user authentication
  • Using Samba as a domain controller
  • Configuring Samba to participate in network browsing
  • Automating daily management tasks

Gerald Carter has been a member of the Samba Team since 1998 and is employed by VA Linux Systems. He is currently working on a guide to LDAP for system administrators with O'Reilly Publishing. He holds a masters degree in computer science from Auburn University where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web based magazines such as Linuxworld, and has authored instructional courses for companies such as Linuxcare. In addition to this, he acted as the lead author of Teach Yourself Samba in 24 Hours by Sams Publishing.

M3 UNIX/Linux Network Administration
Joshua Jensen, Red Hat, Inc.

Who should attend: System administrators who are implementing network services and need some background in the configuration of those services as well as the basics of the protocols. Attendees should have used or have been clients of an IP network and should have a basic knowledge of system administration, but need not be experienced network administrators. Both beginning and intermediate-level network administrators will leave the tutorial having learned something.

Today, system administrators are being tasked with bringing their office environments on-line. Whether the goal is a stand-alone client attached to the Internet or a distributed network of Web servers, the prospect of configuring all the necessary network services can be daunting. Attendees will take away configuration examples, as well as brief overviews of the underlying protocols, which they can put to work after the conference.

Topics include (with a special emphasis on security):

  • Networking overview
  • Client networking
  • Serving networked clients
  • Network services
    • SSH: Secure Shell
    • FTP: File Transfer
    • HTTP: Web
    • SMTP: Mail
    • NFS: Network File Systems
    • DHCP: Dynamic Networking
  • Network troubleshooting
  • VPN: Virtual Private Networks
  • Firewalling and NAT with Netfilter

At the completion of the course, attendees should feel confident in their ability to set up and maintain secure network services. The tutorial will be conducted in an open manner that encourages question-and-answer interruptions.

Joshua Jensen was the first Red Hat instructor and examiner, and has been with Red Hat for 3 years. In that time he has written and maintained large parts of the Red Hat curriculum: Networking Services and Security, System Administration, and the Red Hat Certified Engineer course and exam. Joshua has worked with Linux for six years, and has been teaching Cisco Internetworking and Linux courses since the beginning of 1998.

Tuesday, November 6, 2001    

T1 Perl for System Administration—The Power and the Praxis Cancelled
David N. Blank-Edelman, Northeastern University College of Computer Science

Who should attend: People with system administration duties, advanced-beginner to intermediate Perl experience, and a desire to make their jobs easier and less stressful in times of sysadmin crises.

Perl was originally created to help with system administration, so it is a wonder that there isn't more instructional material devoted to helping people use Perl for this purpose. This tutorial hopes to begin to remedy this situation by giving you six solid hours of instruction geared towards putting your existing Perl knowledge to practice in the system administration realm. The morning section will concentrate on the power of Perl in this context.

Based on the instructor's O'Reilly book, we'll take a multi-platform look at using Perl in cutting-edge and old-standby system administration domains.

Topics include:

  • Secure Perl scripting
  • Dealing with files and file systems (including source control, XML, databases, and log files)
  • Dealing with SQL databases via DBI and ODBC
  • Email as a system administration tool (including spam analysis)
  • Network directory services (including NIS, DNS, LDAP, and ADSI)
  • Network management (including SNMP and WBEM)

In the afternoon, we will look at putting our Perl knowledge to work for us to solve time-critical system administration problems using short Perl programs. Centered around a set of "battle stories" and the Perl source code used to deal with them, we'll discuss different approaches to dealing with crises using Perl.

At the end of the day, you'll walk away from this class with Perl approaches and techniques that can help you solve your daily system administration problems. You'll have new ideas in hand for writing small Perl programs to get you out of big sysadmin pinches. On top of all this, you are also likely to deepen your knowledge of Perl.

David N. Blank-Edelman is the Director of Technology at the Northeastern University College of Computer Science and the author of the O'Reilly book Perl for System Administration. He has spent the last 15 years of his life as a system/network administrator in large multi-platform environments, including Brandeis University, Cambridge Technology Group, and the MIT Media Laboratory. He has served as Senior Technical Editor for the Perl Journal and has written many magazine articles on world music.

T2 Exploring the Potential of LDAP  NEW
Gerald Carter, VA Linux Systems

Who should attend: Administrators and programmers interested in the potential of the Lightweight Directory Access Protocol (LDAP) and in exploring issues related to deploying an LDAP infrastructure. This tutorial is not designed to be a how-to for a specific LDAP server, nor is it an LDAP developers' course. Rather, it is an evaluation of the potential of LDAP to allow the consolidation of existing deployed directories. No familiarity with LDAP or other Directory Access Protocols will be assumed.

System administrators today run many directory services, though they may be called by such names as DNS and NIS. LDAP, the up-and-coming successor to the X500 directory, promises to allow administrators to consolidate multiple existing directories into one. Vendors across operating system platforms are lending support.

Topics include:

  • The basics of LDAP
  • Current technologies employing LDAP services
  • Replacing NIS using LDAP
  • Integrating authentication mechanisms for other services (e.g. Apache, Sendmail, Samba) with LDAP
  • LDAP interoperability with other proprietary Directory Services, such as Novell's NDS and Microsoft's Active Directory
  • Programming tools and languages available for implementing LDAP support in applications

Gerald Carter has been a member of the Samba Team since 1998 and is employed by VA Linux Systems. He is currently working on a guide to LDAP for system administrators with O'Reilly Publishing. He holds a master's degree in computer science from Auburn University where he was also previously employed as a network and systems administrator. Gerald has published articles with various Web based magazines such as Linuxworld, and has authored instructional course for companies such as Linuxcare. In addition to this, he acted as the lead author of Teach Yourself Samba in 24 Hours by Sams Publishing.

T3 Linux System Administration
Joshua Jensen, Red Hat, Inc.

Who should attend: System administrators who are planning on implementing a Linux solution in a production environment. Course attendees should be familiar with the basics of system administration in a UNIX/Linux environment: user-level commands, administration commands, and TCP/IP networking. Novice and intermediate administrators should leave the tutorial having learned something.

From a single server to a network of workstations, the Linux environment can be a daunting management task for administrators knowledgeable in other platforms. Starting with a single server and finishing with a multi-server 1,000+ user environment, case studies will provide practical information for using Linux in the real world.

Topics include (with a special emphasis on security):

  • Installation features
  • Disk partitioning and RAID
  • Networking
  • User accounts
  • Services
  • NFS and NIS
  • Security through packet filtering and SSH
  • New developments (Journaling Filesystems, VPN, etc.)

At the completion of the course attendees should feel confident in their ability to set up and maintain a secure and useful Linux network. The tutorial will be conducted in an open manner that allows for question-and-answer interruptions.

Joshua Jensen was the first Red Hat instructor and examiner, and has been with Red Hat for 3 years. In that time he has written and maintained large parts of the Red Hat curriculum: Networking Services and Security, System Administration, and the Red Hat Certified Engineer course and exam. Joshua has worked with Linux for six years, and has been teaching Cisco Internetworking and Linux courses since the beginning of 1998.

Wednesday, November 7, 2001    

W1 Building and Using a Personal Beowulf  NEW
Willem A. (Vlakkies) Schreuder, University of Colorado, Boulder

Who should attend: The tutorial is designed for individuals or small groups who need a personal supercomputer but are restricted to a limited budget.

This tutorial, unlike most tutorials on Beowulfs, is aimed at small installations rather than, for example, national labs. The goal is to provide attendees with practical advice on how to put together the hardware, install the software, and use the system to actually speed up the tasks they want performed.

Topics include:

  • What is a Beowulf and what does it do?
    • Basic architecture
    • Flavors and distributions
    • How parallelism works
  • Putting together the hardware
    • An ad hoc system for the weekend
    • Hardware selection and trade-offs
    • CPU, memory, motherboard
    • Networking hardware, disks, etc.
    • Building a system from components
    • Networking and other infrastructure
  • Installing and configuring the software
    • Basic kernel and OS functions
    • Networking, name resolution, and routing
    • File systems
    • Libraries, X11, Perl
    • Utilities and applications
  • Solving problems
    • The basics of spawning and scheduling
    • Making parallelism work for you
    • Independent tasks (e.g., compressing files)
    • Parallel makefiles (e.g., compiling in parallel)
    • Parallel client-server (e.g., database manipulation)
    • Rewriting applications for the Beowulf
    • Problems for the audience

Tutorial materials include a CD-ROM for the Scyld Beowulf Distribution.

Vlakkies Schreuder holds a Ph.D. in Computational Fluid Mechanics and is currently working on a second Ph.D. in Parallel Systems. He has been solving practical problems in mathematical modeling in academia and private industry for about 20 years, and has been a UNIX sysadmin for more than 15 years. He uses his personal Beowulf to solve problems in software development, computational fluid dynamics, data analysis, scientific visualization and animation.

W2 Internet Security for UNIX & Linux System Administrators  NEW
Ed DeHart, Prism Servers, Inc.

Who should attend: UNIX and Linux system and network administrators and operations/support staff. After completing the tutorial, you should be able to establish and maintain a site that allows the benefits of Internet connectivity while protecting your organization's information.

You will learn strategies to reduce the threat of Internet intrusions and to improve the security of your UNIX and Linux systems connected to the Internet, as well as how to set up and manage Internet services appropriate to your site's mission.

Topics include:

  • Latest news on security problems
  • UNIX and Linux system security
  • TCP/IP network security
  • Site security policies

Ed DeHart is a former member of the CERT Coordination Center at Carnegie Mellon University which he helped found in 1988. Ed has also owned an ISP, Pittsburgh OnLine Inc, that operated several UNIX servers. Currently, Ed is President of Prism Servers, Inc., a manufacturer of Internet Firewalls and UNIX based Internet Servers.

W3 Advanced Topics in Perl Cancelled
Daniel Klein, Consultant

Who should attend: Experienced Perl programmers interested in honing their Perl skills for quick prototyping, system utilities, software tools, system management tasks, database access, and Web programming. Students should have used Perl for basic scripting for several months before taking this course.

Topics include:

  • References (strong and weak) and referents
  • Typeglobs, symbol tables, and aliasing
  • Localization, closures, pseudohashes
  • Function prototyping, overloading
  • Classes and objects New features in Perl 5.6
    • Autovivification, "our", vstrings
    • lvalue-able subroutines
    • Lexical warnings
    • BEGIN, CHECK, INIT, END
  • Object-oriented programming
  • Function prototyping, operator overloading
  • Extended regular expressions
  • Process management
    • fork, exec, backgrounding, daemonizing
    • Pipes, tees, bidirectional I/O
    • File locking
    • Signals and exceptions
  • Assorted tips and tricks to use Perl programming effectively

Upon completion of this course, students will understand many of the more esoteric, yet extremely powerful features available in Perl. Numerous code examples will be presented as a means of demonstrating advanced features of the Perl language.

Daniel Klein has been teaching a wide variety of Unix-related subjects since 1984, has been involved with Unix since 1976, and with Perl since 1995. His experience covers a broad range of disciplines, most recently involving dozens of high-performance Web sites, but also includes the Internals of almost every Unix kernel released in the past 24 years, real-time process control, compilers and interpreters, medical diagnostic systems, system security and administration, Web-related systems and servers, graphical user interface management systems, and a racetrack betting system. He contributes regularly to the proceedings of the USENIX Association, and is also their Tutorial Coordinator.

W4 Practical Wireless IP: Concepts, Administration, and Security NEW
Philip Cox and Brad C. Johnson, SystemExperts Corporation

Who should attend: Users, administrators, managers, and anyone who is interested in learning about some of the fundamental security and usage issues that we all must come to grips with in purchasing, setting up, and using wireless IP services. The primary focus is on wireless IP services for laptops, although we'll glance at some popular mobile devices, such as handheld systems and cell phones with Internet access. The tutorial is targeted at beginning to intermediate wireless users. It assumes some knowledge of TCP/IP networking and client/server computing, the ability or willingness to use administrative GUIs to setup a device, and a general knowledge of common laptop environments.

This course is focused on the practical understanding and usage of wireless technologies, and is not an in-depth analysis of Radio Frequencies or the various wireless protocols (e.g., Bluetooth, CDPD, GPRS).

Whether you like it or not, wireless services are popping up everywhere. As time goes on, more of your personal and corporate data communications will be done over various types of wireless devices. Just as in the wired world, we're faced with a proliferation of business and technical choices concerning security, hardware, software, protocols, and administration.

The good news is that generally somebody else will handle these complicated issues for users (of course, that "someone else" may be you!). However, since most wireless services users are carrying their devices everywhere they go, you and your organization will still be responsible for understanding and managing the devices you possess. Since the purpose of wireless is to share data when you aren't directly attached to a wired resource, you need to understand the fundamental security and usage options.

In this course we will cover a number of topics that affect you in implementing, managing and using wireless services. Some of the topics will be demonstrated live using popular wireless devices.

Topics include:

  • Cellular services basics
    • What's out there?
    • Who's using what?
    • What really matters?
  • Wireless LAN fundamentals
    • 802.11b
    • Antennas
    • Concepts: Channels, Roaming, Signals, etc.
  • Popular access points
    • Cisco Aironet
    • Apple Airport
    • Lucent ORiNOCO
    • Other popular APs
  • Configuration issues
    • Access Point configuration
    • Setting up your client
    • Building your own Access Point
  • Threats
    • Protocol issues
    • Eavesdropping
    • Bad configurations

Philip Cox is a consultant for SystemExperts Corporation, a consulting firm that specializes in system security and management. He is a well-known authority in the areas of system integration and security. He is the lead author of Windows 2000 Security Handbook and Technical Editor of Hacking Linux Exposed, both from Osborne McGraw-Hill. His experience includes Windows NT/2000, UNIX, and IP based networks integration, secure network design and implementation, and Information Security Policy development. Phil frequently writes and lectures on issues dealing with UNIX & NT integration and on Information Security. He holds a BS in Computer Science.

Brad C. Johnson is Vice President of SystemExperts Corporation. He has participated in seminal industry initiatives like the Open Software Foundation, X/Open, and the IETF, and has often published about open systems. Brad has served as a technical advisor to organizations such as Dateline NBC and CNN on security matters. He is a regular tutorial instructor and conference speaker on topics related to practical network security, penetration analysis, middleware, and distributed systems. Prior to joining SystemExperts, Brad was a member of the technical staffs at the Open Software Foundation, Digital Equipment Corporation, Data General Corporation, and Bell Telephone Laboratories. Brad holds a Bachelor of Arts degree in Computer Science from Rutgers University and a Master of Science degree in Applied Management from Lesley University.


Last changed: ml, Monday, 27-Aug-2001 20:47:32 EDT

Conference index