The Ultimate Linux Box 2001: How to Design Your Dream Machine
Editor's Note: The following article is the unabridged version of an article by the same title that appears in the November 2001 issue of Linux Journal.
Five years ago, in a Linux Journal article I wrote during 1996, I developed a recipe for an elegant and economical Linux box. I used this as motivation for a discussion of what makes a good balanced system design. The article became one of the most popular in LJ's history, so the editors have invited me back for a second round.
This time, however, we're going to involve more people than just me. LJ recruited Rick Moen, author of some well-known FAQs on modems and other hardware topics, to assist with this article. Daryll Strauss, the man behind the famous all-Linux rendering farm used in the movie “Titanic”, also contributed sage advice coming from his background in graphics and extreme data crunching.
Also, we're going to examine system architecture from a different perspective. Instead of going for economy we're going to go for the balls-out maximum crunching power. This time, we're going to ask not what the most cost-effective plan is, but how to get the absolute highest performance out of hardware we can live with.
“Hardware you can live with” means a machine that is stable, easy to troubleshoot and inexpensive to maintain after the original money-is-no-object build phase. It should be small and low-maintainance enough enough to live beside your desk, as opposed to (say) some liquid-cooled monstrosity that needs to be nursed by a full-time technician. It should be, in short, a PC—an extraordinary gold-plated hand-tuned hotrod of a PC but a PC nevertheless. Another important aspect of liveability is level of emitted acoustic noise and heat; we'll be paying attention to minimizing both as we design.
We'll stick with Intel hardware. Alphas are fast and have that wonderful sexy 64-bit architecture with enough symmetrical registers to make an old compiler jock like me drool copiously, but the line has just been sold to Intel and seems all too likely to be end-of-lifed in favor of the Itanium before long. The PowerPC has earned its fans, too—considered in isolation, I like that chip a lot better than any Intel architecture. But PC hardware has all the advantages of the biggest market; it's the easiest to get serviced and least expensive to upgrade, and thus scores high on the hardware-you-can-live-with scale.
The “ultimate Linux box” that we showcase as a result will, of course, inevitably fall behind the leading edge within months. But walking through the process of developing the ULB should will teach you things about system design and troubleshooting that you can continue applying long after the hardware in this article has become obsolete.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- The Qt Company's Qt Start-Up
- Devuan Beta Release
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- The Humble Hacker?
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide