AIX Reference for Sun Solaris Administrators

An IBM Redbooks publication

Note: This is publication is now archived. For reference only.

thumbnail 

Published on September 19, 2002, updated October 14, 2002

  1. .PDF (5.0 MB)


Share this page:   

ISBN-10: 073842708X
ISBN-13: 9780738427089
IBM Form #: SG24-6584-00


Authors: KyeongWon (Alex) Jeong and Arkadiusz Rybakowski Juan Murguia Sivaramakrishna Perubotla Terje Tonnessen

    menu icon

    Abstract

    In today's heterogeneous computer environments, especially UNIX servers and workstations, it is essential that the system administrator have basic knowledge of different operating systems. This IBM Redbooks publication is written for Sun Solaris administrators who wants to transfer their knowledge of Solaris UNIX skills to the AIX 5L operating system. This book will basically compare system administration tasks in Solaris 8 to AIX 5L Version 5.1. This book shows the reader similarities and differences between each operating system.

    This book will also introduce Solaris administrators to IBM eServer pSeries architecture. It is assumed that the reader of this book already has Solaris 8 system administration skills, and are familiar with Sun hardware. In the first section on each chapter, we will briefly mention how the Solaris tasks are carried out. In the last section on each chapter, we will provide a quick reference that will be in handy to use. This book is a valuable tool for system administrators and other technical support personnel who deal with AIX 5L and Solaris operating systems.

    Table of Contents

    Chapter 1. Overview

    Chapter 2. Software packaging

    Chapter 3. Installing and upgrading tasks

    Chapter 4. System startup and shutdown

    Chapter 5. Device management

    Chapter 6. Logical Volume Manager and disk management

    Chapter 7. File system management

    Chapter 8. Backup and restore

    Chapter 9. Network management

    Chapter 10. User management

    Chapter 11. Process management

    Chapter 12. Printer management

    Chapter 13. Security

    Chapter 14. Performance management

    Chapter 15. Troubleshooting

     

    Others who read this also read