User Tools

Site Tools


skill-tree:use:1:5:b

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
skill-tree:use:1:5:b [2020/06/07 18:51] – [Background] lucianaskill-tree:use:1:5:b [2020/07/19 21:27] (current) lucy
Line 2: Line 2:
 # Background # Background
  
-An HPC system is accessed remotely and has its own file systems that contain data and programs to execute.+An HPC system is accessed remotely and has its particular file systems that contain data and programs to execute.
 Learning the ways of general interaction with the remote system and the tools involved is essential for newcomers. Learning the ways of general interaction with the remote system and the tools involved is essential for newcomers.
  
Line 8: Line 8:
 When the user disconnects, such a session is terminated. When the user disconnects, such a session is terminated.
 A server-sided session that persists after disconnection enables the user to execute long-running programs remotely and allows the continuation of a previous session seamlessly. A server-sided session that persists after disconnection enables the user to execute long-running programs remotely and allows the continuation of a previous session seamlessly.
-Data transfer between a local user system (e.g., desktop or laptop) and a remote system requires special tools and even allows interactive access.+Data transfer between a local user system (e.g., desktop or laptop) and a remote system requires special tools.  
 +Interactive access is also allowed.
  
-The tools discussed here are generally valid for systems using Linux, Mac, and Windows, and also mobile devices.+The tools discussed here are generally valid for systems using Linux, Mac, Windows, and also mobile devices.
  
 # Aim # Aim
Line 16: Line 17:
  
 # Outcomes # Outcomes
-  * Describe how SSH-authentication works +  * Describe how SSH-authentication works: 
-    Password authentication +    Password authentication. 
-    Public-Key authentication +    Public-key authentication. 
-    The role of an authentication agent and the security implications +    The role of an authentication agent and the security implications. 
-  * Generate an SSH public/private key under Linux +  * Generate an SSH public/private key under Linux. 
-  * Register a key for public-key authentication using ssh-copy-id +  * Register a key for public-key authentication using ssh-copy-id. 
-  * Perform a remote login from Linux using SSH +  * Perform a remote login from Linux using SSH
-  * Know when to use and how to create a config file +  * Use SSH-agent or Windows equivalents. 
-  * Utilize tools to transfer data between local and remote system +  * Use Agent forwarding to connect to a third HPC system from an HPC system that you logged into with ssh from your computer. 
-    scp +  * Know when to use and how to create a config file. 
-    sftp +  * Utilize tools to transfer data between the local and remote system: 
-    rsync (-avz) +    scp 
-  * Describe how SSHFS allows to mount a remote directory to a local directory for interactive usage (Mac/Linux only) +    sftp 
-  * Utilize screen and tmux to preserve a session between logins +    rsync (-avz) 
-    Creation of a session +  * Describe how SSHFS allows mounting a remote directory to a local directory for interactive usage (Mac/Linux only), e.g. for copying files or to transparently use your favourite graphical text editor on the local computer for editing files on the remote cluster. 
-    Detaching from the current session +  * Utilize screen and tmux to preserve a session between logins: 
-    Resuming a previous session+    Creation of a session. 
 +    Detaching from the current session. 
 +    Resuming a previous session.
  
 # Subskills # Subskills
 +  * [[skill-tree:sd:1:2:5:1:1:3:1:b]]
skill-tree/use/1/5/b.1591548709.txt.gz · Last modified: 2020/06/07 18:51 by luciana