skill-tree:use:1:5:b
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionLast revisionBoth sides next revision | ||
skill-tree:use:1:5:b [2020/06/07 18:51] – [Background] luciana | skill-tree:use:1:5:b [2020/06/25 19:56] – [Outcomes] kai_h | ||
---|---|---|---|
Line 2: | Line 2: | ||
# Background | # Background | ||
- | An HPC system is accessed remotely and has its own file systems that contain data and programs to execute. | + | An HPC system is accessed remotely and has its particular |
Learning the ways of general interaction with the remote system and the tools involved is essential for newcomers. | Learning the ways of general interaction with the remote system and the tools involved is essential for newcomers. | ||
Line 8: | Line 8: | ||
When the user disconnects, | When the user disconnects, | ||
A server-sided session that persists after disconnection enables the user to execute long-running programs remotely and allows the continuation of a previous session seamlessly. | A server-sided session that persists after disconnection enables the user to execute long-running programs remotely and allows the continuation of a previous session seamlessly. | ||
- | Data transfer between a local user system (e.g., desktop or laptop) and a remote system requires special tools and even allows interactive | + | Data transfer between a local user system (e.g., desktop or laptop) and a remote system requires special tools. Interactive |
- | The tools discussed here are generally valid for systems using Linux, Mac, and Windows, and also mobile devices. | + | The tools discussed here are generally valid for systems using Linux, Mac, Windows, and also mobile devices. |
# Aim | # Aim | ||
Line 18: | Line 18: | ||
* Describe how SSH-authentication works | * Describe how SSH-authentication works | ||
- Password authentication | - Password authentication | ||
- | - Public-Key authentication | + | - Public-key authentication |
- The role of an authentication agent and the security implications | - The role of an authentication agent and the security implications | ||
* Generate an SSH public/ | * Generate an SSH public/ | ||
* Register a key for public-key authentication using ssh-copy-id | * Register a key for public-key authentication using ssh-copy-id | ||
* Perform a remote login from Linux using SSH | * Perform a remote login from Linux using SSH | ||
+ | * Use SSH-agent or Windows equivalents | ||
+ | * Use Agent forwarding to connect to a third HPC system from an HPC system that you logged into with ssh from your computer | ||
* Know when to use and how to create a config file | * Know when to use and how to create a config file | ||
- | * Utilize tools to transfer data between local and remote system | + | * Utilize tools to transfer data between |
- scp | - scp | ||
- sftp | - sftp | ||
- rsync (-avz) | - rsync (-avz) | ||
- | * Describe how SSHFS allows | + | * Describe how SSHFS allows |
* Utilize screen and tmux to preserve a session between logins | * Utilize screen and tmux to preserve a session between logins | ||
- Creation of a session | - Creation of a session |
skill-tree/use/1/5/b.txt · Last modified: 2020/07/19 21:27 by lucy