SlideShare ist ein Scribd-Unternehmen logo
1 von 32
UNIX OPERATING
SYSTEM
SUBMITTED BY
TEAM MEMBERS CLASS ROLL. NUMBER
NISHANT MISHRA IT 2A 1803013059
PIYUSH BANSAL IT 2A 1803013059
MAYANK BANSAL IT 2A 1803013059
ISHA GOEL IT 2A 1803013059
In-order to introduce
concept of UNIX O.S we should go
through certain topics :
1 > COMPONENTS OF COMPUTER SYSTEM.
2 > WHAT IS AN OPERATING SYSTEM ?
End
User
Programmer
Operating-
System
Designer
Computer Hardware
Operating-System
Utilities
Application
Programs
Hardware – provides basic computing resources (CPU, memory, I/O
devices).
Operating system – controls and coordinates the use of the hardware
among the various application programs for the various users.
Utilities – Programs that assist in system management and software
development.
Applications programs – define the ways in which the system
resources are used to solve the computing problems of the users
(compilers, database systems, video games, business programs).
An Operating System is a program that acts as an
interface between the user of a computer and the
computer hardware.
Operating system goals:
* Control/execute application programs.
* Make the computer system convenient to use.
* Make solving user problems easier.
* Use the computer hardware in an efficient manner.
The Unix operating system found its beginnings in MULTICS
which stands for Multiplexed Operating and Computing
system.
The MULTICS project began in the mid 1960s as a joint effort
by General Electric, Massachusetts Institute for
Technology and Bell Laboratories.
In 1969 Bell Laboratories pulled out of the project.
One of Bell Laboratories people
involved in the project
was “Ken Thompson”.
He liked the potential MULTICS had, but felt it was too
complex and that the same thing could be done in simpler
way.
IN 1969 he wrote first version of UNIX called as UNIC.
UNICS stood for “UNI-PLEXED” operating system
And eventually shortened to UNIX.
Kernel: The kernel is the heart of the operating system. It interacts
with hardware and most of the tasks .
Shell: The shell is the utility that processes your requests. When you
type in a command at your terminal, the shell interprets the command
and calls the program that you want.
Commands and Utilities: There are various command and
utilities which you would use in your day to day activities. cp,
mv, cat and grep.
Files and Directories: All data in UNIX is organized into files. All
files are organized into directories. These directories are organized
into a tree-like structure called the file system.
1. Multi-user system : Multi-user capability of UNIX allows several usersto
use the same computer to perform theirtasks.
2.Multi-tasking : Multitasking is the capability of the operating systemto
perform various task simultaneously, i.e. a user can run multiple tasks
concurrently.
3.Programming Facility : UNIX is highly programmable, the UNIX shell
has all the necessary ingredients like conditional and control structures, etc.
4. Security : UNIX allows sharing of data; every user must have a single
login name and password. So, accessing another user’s data is impossible
without his permission.
5. Portability : UNIX is portable because it is written in a high level
language. So , UNIX can be run on different computers.
RAM – 256 MB .
HARD DRIVE – 10 minimum and maximum depends on the user
requirement.
VIDEO– Minimum 800X600.
MOUSE –Any.
REMOVAL MEDIA – Most SCSI.
PRINTER – Almost any parallel or serial port.
MODEM– Most serial, if DOS can use it, Unix can too……..
NIC – 3Com, Novell, HP, Intel - Clones are NOT recommended.
 UNIX is a multitasking system.
 Multiple programs can be executed at the same time.
 Ultimately, a program needs to be executed by a CPU.
 If there is only one CPU, how multiple programs can be executed
at the same time?
By time sharing
 That is, all programs are claimed to be executing. In fact, most of
them are waiting for the CPU.
 A program that is claimed to be executing is called aprocess.
 For a multitasking system, a process has at least the following three
states:
 Ready state
 All processes that are ready to execute but without the CPU are
at the ready state
 If there is only 1 CPU in the system, all processes except one
are at the ready state
 Running state
 The process that actually possesses the CPU is at the running
state
 If there is only 1 CPU in the system, at most there is only one
process is at the running state
 Sleeping state
 The process that is waiting for other resources, e.g. I/O, is at the
sleeping state
 Processes will alternatively get into the CPU one after the other
(called the round robin scheme)
 A process will be “in” a CPU for a very short time (quantum)
 For Linux, each quantum is about 100msec
 At the time that a process is selected to be “in” the CPU
 It goes from ready state to running state
 After that, it will be swapped out
 It goes from running state back to ready state
 Or it may due to the waiting of an I/O device, e.g. mouse
 It goes from running state to sleeping state
 When obtaining the required resource
 It goes from sleeping state to ready state
WHAT IS MEMORY ?
Primary memory is a precious resource that frequently cannot contain all
active processes in the system.
WHAT IS MEMORY MANAGEMENT ?
The memory management system decides which processes should reside
(at least partially) in main memory
It monitors the amount of available primary memory and may periodically
write processes to a secondary device called the swap device to provide
more space in primary memory.
FIG : Typical internal memory layout for single user-
memory part UNIX
MEMORY MANAGEMENT CONCEPTS OF UNIX
1.SWAPPING .
The swap device is a block device in a configurable section of a disk
Kernel allocates contiguous space on the swap device without
fragmentation
It maintains free space of the swap device in an in-core table, called
map
The kernel treats each unit of the swap map as group of disk blocks
As kernel allocates and frees resources, it updates the map
accordingly
2. DEMAND PAGING.
Not all page of process resides in memory locality.
When a process accesses a page that is not part of its working set, it incurs a page
fault.
The kernel suspends the execution of the process until it reads the page into memory
and makes it accessible to the process.
OTHER TECHNIQUES USED ARE AS FOLLOWS
1.Allocating swap space .
2.Free space swap.
3.Page table entry.
4.Disk block description..
A file system is a logical collection of files on a partition or disk.
A partition is a container for information and can span an entire hard drive if desired.
Everything in Unix is considered to be a file, including physical devices such as DVD-ROMs,
USB devices, floppy drives, and so forth.
Unix uses a hierarchical file system structure, much like an upside-
down tree, with root (/) at the base of the file system
and all other directories spreading from there.
It has a root directory (/) that contains other files and directories.
Each file or directory is uniquely identified by its name, the
directory in which it resides, and a unique identifier ,typically called
an inode.
It is self contained. There are no dependencies between one file
system and any other.
The directories have specific purposes and generally hold the
same types of information for easily locating files.
Following are the directories that exist on the major versions of
Unix:
 The directories have specific purposes and generally
hold the same types of information for easily locating
files.
 It has a root directory (/) that contains other files and
directories.
 The inode type field distinguishes between plain files and
directories
 Directory entries are of variable length; each entry
contains first the length of the entry, then the file name
and the inode number
(/mnt) Used to mount other temporary file systems, such as cd rom and
floppy for the CD-ROM drive and floppy disks
(/proc) Contains all processes marked as a file by process number or
other information that is dynamic tot he system.
(/tmp)
(/usr)
(/var )
(/sbin)
Holds temporary files used between system boots.
Used for miscellaneous purposes, or can be used by many users.
Includes administrative commands, shared files , library files.
Typically contains variable-length files such as log and print
files any other type of file that may contain a variable amount of
Contains binary (executable) files, usually for system
administration. For example f-disk and if-config utilities.
(/kernel)Contains kernel files
Being a multi-user system - UNIX have a tremendous amount of
security to offer; many being open source, which can be validated and
modified to meet anyone’s needs.
UNIX system security can be divided into three main areas of concern.
Two of these areas, account security , file system security,
Network security.
Before , any advanced system we should provide physical security to system by keeping it ina
secure and protected area to avoid unauthorizedaccess.
ACCOUNT SECRITY:
using authorized (UID) & UNIX user community haves no. of user who are given acces to system
(GID).
 The access codes (passwords) to (UID) & (GID) are stored in system
as stored in encrypted format SALTED PASSWORDS to avoid cracking
of pswd.
EX:
UID : syslog 56
Password :**********
The same information is stored in system files in followingformat:
UID:SaltID:Saltedhash:EncrypedPassword:UserID:GroupID:Complete_Name:home_dir:shell_bin
FILE SYSTEM SECURITY.
 File system security is about making sure your users can only do what you want them
to be able to do. This means that you want system programs to be secure and users
to only be able to write where you want them to be able to.
 To impliment this uses tecn. OF ACLs PERMISSIONS.
only Almost modern files systems, include ACLs to give unprivileged access to
certain users.

 Permissions are separated by owner, group, and others. On UNIX systems
permissions are displayed as rwxrwxrwx
 With a few more special settings, Desktop environments also provide GUI settings for
easy modifying
NETWORK SECURITY
 Once you put a computer on a network, you allow many more people
potential access to the machine. The key to network security is to allow only
those functions that the users actually need. By disabling non-used
functions, you have much less monitoring/securing.
 Telnet Security:
Using SSH (secure shell). SSH provides encrypted traffic to prevent
snooping.
 FTP Security:
As with other services, if you do not need this functionality, turn it off.
You can turn off incoming FTP or simply certain users. If you need
full FTP functionality, be certain to enable logging and monitor
syslog.
TO GET A CONCLUSION TO OUR PRESENTATION WEARE PUTTING
FORWARD A COMAPRISON OF WINDOWS OS & UNIX OS.
1.As far as operating systems go, to some it would seem as if UNIX has a
clear advantage over Windows. UNIX offers greater flexibility than Windows
operating systems and it is more stable .
FEW AREAS OF COMPARISON :-
 BETTER MULTIUSERAPPROACH.
 BETTER PROCESS HEIRARCHY.
 USE OF DAEMONS.
 BETTER PROGRAMMING ENVIORMENT.
OTHER PRACTICAL COMPARISON WOULD BE :
 Cost
 User
 Security
 Processors
 Multiprocessing
 Open source
 File system supported
So we can say UNIX far more better
Than WINDOWS .
Unix case-study

Weitere ähnliche Inhalte

Was ist angesagt?

Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
Vaibhav Bajaj
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
Wayne Jones Jnr
 

Was ist angesagt? (20)

System calls
System callsSystem calls
System calls
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Computer system architecture
Computer system architectureComputer system architecture
Computer system architecture
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
Process creation and termination In Operating System
Process creation and termination In Operating SystemProcess creation and termination In Operating System
Process creation and termination In Operating System
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Operating System Unit 1
Operating System Unit 1Operating System Unit 1
Operating System Unit 1
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Linux file system
Linux file systemLinux file system
Linux file system
 
DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
 
UNIX Operating System
UNIX Operating SystemUNIX Operating System
UNIX Operating System
 
Operating system.ppt (1)
Operating system.ppt (1)Operating system.ppt (1)
Operating system.ppt (1)
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Unix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaUnix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | Edureka
 
Memory management
Memory managementMemory management
Memory management
 
Ch1-Operating System Concept
Ch1-Operating System ConceptCh1-Operating System Concept
Ch1-Operating System Concept
 

Ähnlich wie Unix case-study

16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2
New Era University
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
dejenehundaol91
 
operatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxoperatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptx
krishnajoshi70
 
1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands
Gautam Raja
 

Ähnlich wie Unix case-study (20)

LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).ppt
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2
 
introduce computer .pptx
introduce computer .pptxintroduce computer .pptx
introduce computer .pptx
 
Bba203 unit 2 operating system concepts
Bba203   unit 2 operating system conceptsBba203   unit 2 operating system concepts
Bba203 unit 2 operating system concepts
 
Operating system
Operating systemOperating system
Operating system
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | Blocks
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
operatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxoperatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptx
 
Operating system notes pdf
Operating system notes pdfOperating system notes pdf
Operating system notes pdf
 
1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands
 
Unix1
Unix1Unix1
Unix1
 
Section02-Structures.ppt
Section02-Structures.pptSection02-Structures.ppt
Section02-Structures.ppt
 

Kürzlich hochgeladen

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 

Unix case-study

  • 2. SUBMITTED BY TEAM MEMBERS CLASS ROLL. NUMBER NISHANT MISHRA IT 2A 1803013059 PIYUSH BANSAL IT 2A 1803013059 MAYANK BANSAL IT 2A 1803013059 ISHA GOEL IT 2A 1803013059
  • 3. In-order to introduce concept of UNIX O.S we should go through certain topics : 1 > COMPONENTS OF COMPUTER SYSTEM. 2 > WHAT IS AN OPERATING SYSTEM ?
  • 5. Hardware – provides basic computing resources (CPU, memory, I/O devices). Operating system – controls and coordinates the use of the hardware among the various application programs for the various users. Utilities – Programs that assist in system management and software development. Applications programs – define the ways in which the system resources are used to solve the computing problems of the users (compilers, database systems, video games, business programs).
  • 6. An Operating System is a program that acts as an interface between the user of a computer and the computer hardware. Operating system goals: * Control/execute application programs. * Make the computer system convenient to use. * Make solving user problems easier. * Use the computer hardware in an efficient manner.
  • 7. The Unix operating system found its beginnings in MULTICS which stands for Multiplexed Operating and Computing system. The MULTICS project began in the mid 1960s as a joint effort by General Electric, Massachusetts Institute for Technology and Bell Laboratories. In 1969 Bell Laboratories pulled out of the project.
  • 8. One of Bell Laboratories people involved in the project was “Ken Thompson”. He liked the potential MULTICS had, but felt it was too complex and that the same thing could be done in simpler way. IN 1969 he wrote first version of UNIX called as UNIC. UNICS stood for “UNI-PLEXED” operating system And eventually shortened to UNIX.
  • 9.
  • 10. Kernel: The kernel is the heart of the operating system. It interacts with hardware and most of the tasks . Shell: The shell is the utility that processes your requests. When you type in a command at your terminal, the shell interprets the command and calls the program that you want. Commands and Utilities: There are various command and utilities which you would use in your day to day activities. cp, mv, cat and grep. Files and Directories: All data in UNIX is organized into files. All files are organized into directories. These directories are organized into a tree-like structure called the file system.
  • 11. 1. Multi-user system : Multi-user capability of UNIX allows several usersto use the same computer to perform theirtasks. 2.Multi-tasking : Multitasking is the capability of the operating systemto perform various task simultaneously, i.e. a user can run multiple tasks concurrently. 3.Programming Facility : UNIX is highly programmable, the UNIX shell has all the necessary ingredients like conditional and control structures, etc.
  • 12. 4. Security : UNIX allows sharing of data; every user must have a single login name and password. So, accessing another user’s data is impossible without his permission. 5. Portability : UNIX is portable because it is written in a high level language. So , UNIX can be run on different computers.
  • 13. RAM – 256 MB . HARD DRIVE – 10 minimum and maximum depends on the user requirement. VIDEO– Minimum 800X600. MOUSE –Any. REMOVAL MEDIA – Most SCSI. PRINTER – Almost any parallel or serial port. MODEM– Most serial, if DOS can use it, Unix can too…….. NIC – 3Com, Novell, HP, Intel - Clones are NOT recommended.
  • 14.  UNIX is a multitasking system.  Multiple programs can be executed at the same time.  Ultimately, a program needs to be executed by a CPU.  If there is only one CPU, how multiple programs can be executed at the same time? By time sharing  That is, all programs are claimed to be executing. In fact, most of them are waiting for the CPU.
  • 15.  A program that is claimed to be executing is called aprocess.  For a multitasking system, a process has at least the following three states:
  • 16.  Ready state  All processes that are ready to execute but without the CPU are at the ready state  If there is only 1 CPU in the system, all processes except one are at the ready state  Running state  The process that actually possesses the CPU is at the running state  If there is only 1 CPU in the system, at most there is only one process is at the running state  Sleeping state  The process that is waiting for other resources, e.g. I/O, is at the sleeping state
  • 17.  Processes will alternatively get into the CPU one after the other (called the round robin scheme)  A process will be “in” a CPU for a very short time (quantum)  For Linux, each quantum is about 100msec  At the time that a process is selected to be “in” the CPU  It goes from ready state to running state  After that, it will be swapped out  It goes from running state back to ready state  Or it may due to the waiting of an I/O device, e.g. mouse  It goes from running state to sleeping state  When obtaining the required resource  It goes from sleeping state to ready state
  • 18. WHAT IS MEMORY ? Primary memory is a precious resource that frequently cannot contain all active processes in the system. WHAT IS MEMORY MANAGEMENT ? The memory management system decides which processes should reside (at least partially) in main memory It monitors the amount of available primary memory and may periodically write processes to a secondary device called the swap device to provide more space in primary memory.
  • 19. FIG : Typical internal memory layout for single user- memory part UNIX
  • 20. MEMORY MANAGEMENT CONCEPTS OF UNIX 1.SWAPPING . The swap device is a block device in a configurable section of a disk Kernel allocates contiguous space on the swap device without fragmentation It maintains free space of the swap device in an in-core table, called map The kernel treats each unit of the swap map as group of disk blocks As kernel allocates and frees resources, it updates the map accordingly
  • 21. 2. DEMAND PAGING. Not all page of process resides in memory locality. When a process accesses a page that is not part of its working set, it incurs a page fault. The kernel suspends the execution of the process until it reads the page into memory and makes it accessible to the process. OTHER TECHNIQUES USED ARE AS FOLLOWS 1.Allocating swap space . 2.Free space swap. 3.Page table entry. 4.Disk block description..
  • 22. A file system is a logical collection of files on a partition or disk. A partition is a container for information and can span an entire hard drive if desired. Everything in Unix is considered to be a file, including physical devices such as DVD-ROMs, USB devices, floppy drives, and so forth.
  • 23. Unix uses a hierarchical file system structure, much like an upside- down tree, with root (/) at the base of the file system and all other directories spreading from there. It has a root directory (/) that contains other files and directories. Each file or directory is uniquely identified by its name, the directory in which it resides, and a unique identifier ,typically called an inode. It is self contained. There are no dependencies between one file system and any other. The directories have specific purposes and generally hold the same types of information for easily locating files. Following are the directories that exist on the major versions of Unix:
  • 24.  The directories have specific purposes and generally hold the same types of information for easily locating files.  It has a root directory (/) that contains other files and directories.  The inode type field distinguishes between plain files and directories  Directory entries are of variable length; each entry contains first the length of the entry, then the file name and the inode number
  • 25. (/mnt) Used to mount other temporary file systems, such as cd rom and floppy for the CD-ROM drive and floppy disks (/proc) Contains all processes marked as a file by process number or other information that is dynamic tot he system. (/tmp) (/usr) (/var ) (/sbin) Holds temporary files used between system boots. Used for miscellaneous purposes, or can be used by many users. Includes administrative commands, shared files , library files. Typically contains variable-length files such as log and print files any other type of file that may contain a variable amount of Contains binary (executable) files, usually for system administration. For example f-disk and if-config utilities. (/kernel)Contains kernel files
  • 26. Being a multi-user system - UNIX have a tremendous amount of security to offer; many being open source, which can be validated and modified to meet anyone’s needs. UNIX system security can be divided into three main areas of concern. Two of these areas, account security , file system security, Network security.
  • 27. Before , any advanced system we should provide physical security to system by keeping it ina secure and protected area to avoid unauthorizedaccess. ACCOUNT SECRITY: using authorized (UID) & UNIX user community haves no. of user who are given acces to system (GID).  The access codes (passwords) to (UID) & (GID) are stored in system as stored in encrypted format SALTED PASSWORDS to avoid cracking of pswd. EX: UID : syslog 56 Password :********** The same information is stored in system files in followingformat: UID:SaltID:Saltedhash:EncrypedPassword:UserID:GroupID:Complete_Name:home_dir:shell_bin
  • 28. FILE SYSTEM SECURITY.  File system security is about making sure your users can only do what you want them to be able to do. This means that you want system programs to be secure and users to only be able to write where you want them to be able to.  To impliment this uses tecn. OF ACLs PERMISSIONS. only Almost modern files systems, include ACLs to give unprivileged access to certain users.   Permissions are separated by owner, group, and others. On UNIX systems permissions are displayed as rwxrwxrwx  With a few more special settings, Desktop environments also provide GUI settings for easy modifying
  • 29. NETWORK SECURITY  Once you put a computer on a network, you allow many more people potential access to the machine. The key to network security is to allow only those functions that the users actually need. By disabling non-used functions, you have much less monitoring/securing.  Telnet Security: Using SSH (secure shell). SSH provides encrypted traffic to prevent snooping.  FTP Security: As with other services, if you do not need this functionality, turn it off. You can turn off incoming FTP or simply certain users. If you need full FTP functionality, be certain to enable logging and monitor syslog.
  • 30. TO GET A CONCLUSION TO OUR PRESENTATION WEARE PUTTING FORWARD A COMAPRISON OF WINDOWS OS & UNIX OS. 1.As far as operating systems go, to some it would seem as if UNIX has a clear advantage over Windows. UNIX offers greater flexibility than Windows operating systems and it is more stable . FEW AREAS OF COMPARISON :-  BETTER MULTIUSERAPPROACH.  BETTER PROCESS HEIRARCHY.  USE OF DAEMONS.  BETTER PROGRAMMING ENVIORMENT.
  • 31. OTHER PRACTICAL COMPARISON WOULD BE :  Cost  User  Security  Processors  Multiprocessing  Open source  File system supported So we can say UNIX far more better Than WINDOWS .