Figure 1-1: Relationship among applications, operating system, and computer hardware
Figure 1-2: Structure of UNIX
Figure 1-3: Relationship among the commands, shells, and kernel
Figure 1-4: A very small part of the directory hierarchy created during Solaris installation (the directory jkerry is a fictitious directory name that you can create inside the home directory; it's not part of the directories automatically created)
Chapter 2: Installing Solaris 10 Software
Figure 2-1: Different software groups. Each group includes the functionality of the inner groups
Chapter 3: Performing System Boot and Shutdown
Figure 3-1: Steps in the boot process
Figure 3-2: Fields of an entry in the /etc/inittab file
Figure 3-3: Relationship between run levels and run control scripts
Chapter 5: Managing Disks
Figure 5-1: A disk platter with tracks and sectors
Figure 5-2: A disk with tracks, sectors, and cylinders
Figure 5-3: The structure of a logical device name for a device on a SPARC-based system
Figure 5-4: Structure of a logical device name for a disk with a direct controller, such as an IDE controller, on an x86-based system
Chapter 6: Performing User Administration
Figure 6-1: Entry in the /etc/passwd file corresponding to a user account
Figure 6-2: Entry in the /etc/shadow file corresponding to a user account
Figure 6-3: Entry in the group file corresponding to a group of users
Chapter 8: Managing Network Printers and System Processes
Figure 8-1: An example of an entry in the crontab file that specifies that the script diskchecker will be executed at 9—15 A.M. on each Sunday and Wednesday every week, every month
Figure 8-2: Overview of the Solaris print process
Chapter 9: Performing System Backups and Restores
Figure 9-1: A yearly backup strategy to meet the requirement of being able to restore files from the past four weeks
Figure 9-2: Relationship between direct backups, backups through snapshots, and restores
Chapter 10: Working with the Solaris Network Environment
Figure 10-1: The seven protocol layers of the OSI reference model
Figure 10-2: The five protocol layers of the TCP/IP layering model corresponding to the seven layers of the OSI model
Figure 10-3: The conceptual path taken by a message as it travels through the Internet from an application on a sender machine to an application on the recipient machine
Figure 10-4: Layout of the bus topology (all computers are attached to a single shared cable)
Figure 10-5: Layout of the ring topology (each computer is connected to its two immediate neighbors; the connection may be physical or logical)
Figure 10-6: Layout of the star topology (each computer is connected to a central device)
Figure 10-7: Flow of data across a shared Ethernet cable in the bus topology
Figure 10-8: Data encapsulation on the sender machine (a packet in a layer becomes the data part for the packet in the lower layer)
Figure 10-9: Data decapsulation at the recipient machine (a layer removes its header before passing the packet to the upper layer)
Chapter 11: Managing Naming Services
Figure 11-1: Conceptual view of DNS naming hierarchy representing a very small part of the Internet
Chapter 13: Managing Storage Volumes
Figure 13-1: Comparison of mirroring and duplexing
Figure 13-2: Disk striping writes stripes of data on multiple disks simultaneously
Chapter 14: Managing Access Control and System Messaging
Figure 14-1: Relationship between different elements of RBAC
Figure 14-2: An example showing the relationships between different RBAC databases
Chapter 15: Performing Advanced Installation
Figure 15-1: An example of how the JumpStart installation starts on a network
Figure 15-2: The process of starting JumpStart
Figure 15-3: Various zone states in the life cycle of a zone (the create and delete subcommands are used with the zonecfg command, and the other subcommands shown are used with the zoneadm command)