wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Traditional Unix System

profile
Srushti Sanghani
Jul 11, 2023
0 Likes
0 Discussions
125 Reads

                                                                                                ASSIGNMENT- 2                                                                                                                                                                                                                                                                                                     Srushti Sanghani

                                                                                                                                                                                                      53003220007                                                                      

Traditional Unix System

Introduction to Unix 

Unix - trademarked as UNIX is a multiuser, multitasking operating system (OS) designed for flexibility and adaptability. Originally developed in the 1970s, Unix was one of the first OSes to be written in the C programming language. 

History of Unix

  • It was developed in the 1970s by Ken Thompson, Dennis Ritchie, and others in the AT&T Laboratories. It was originally meant for programmers developing software rather than non-programmers. 
  • Unix and the C were found by AT&T and distributed to government and academic institutions, which led to both being ported to a wider variety of machine families than any other operating system. The main focus that was brought by the developers in this operating system was the Kernel. Unix was considered to be the heart of the operating System. 

Unix Architecture

The Unix architecture has 4 layers. 

  1. Hardware - Hardware is the most simple and least powerful layer in the Unix Architecture. Hardware is the components that are humanly visible. 
  2. Kernel - This is the most powerful layer of the Unix architecture. The kernel is responsible for acting as an interface between the user and the hardware for the effective utilization of the hardware. The main 2 features of the kernel are process management and file management. 
  1. Process Management: The processes that execute within the operating system require a lot of management in terms of memory being allocated to them, the resource allocation to the process, process synchronization, etc. All this is done by the Kernel in Unix OS. 
  2. File Management: File management involves managing the data stored in the files. This also includes the transmission of data stored in these files to the processes as and when they request it.
  1. Shell - Since the kernel is such an important program of the Unix Operating System, its direct access to the users can be dangerous. Hence, the Shell comes into the picture. Shell is an interpreter program that interprets the commands entered by the user and then sends the requests to the kernel to execute those commands.There are 3 types of shells in the Unix Operating system.
    1. Bourne Shell (sh) - It is the most widely available shell on Unix OS devices across the world. This was the first shell available in the Unix OS. It is simply called a shell.
    2. C Shell (csh) - The University of California (Berkeley) developed C Shell is another Unix shell that removes some of the obsolete features or problems from the Bourne Shell. So, it enhances the performance of the Bourne Shell.
    3. Korn Shell (ksh) - The name of the Korn Shell is based on its creator, David Korn. This shell enhances the C shell further by removing the shortcomings of the C shell and also enhancing the user interaction of the Bourne Shell.
  2. Application layer - It is the outermost layer that executes the given external applications. UNIX distributions typically come with several useful applications programs as standard. For Example:- emacs editor, StarOffice, xv image viewer, g++ compiler etc.

 

 









Comments ()


Sign in

Read Next

MOBILE DEVICE FORENSIC

Blog banner

File management

Blog banner

IOT Hacking Techniques

Blog banner

Threads and concurrency

Blog banner

Uniprocessor scheduling

Blog banner

Puri Jagannath temple

Blog banner

Network Forensics

Blog banner

Article on Team Work

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

LinkedIn

Blog banner

EdTech (Education Technology)

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Article on Fresh Book

Blog banner

virtual memory

Blog banner

Memory Management in Operating System

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Virtual machine and virtualizing

Blog banner

OS Assignment 1

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

OS ASSIGNMENT

Blog banner

Deadlock

Blog banner

Music

Blog banner

IOT- Internet Of Things

Blog banner

Cyber Security in Data Breaching

Blog banner

IT service level agreement

Blog banner

CyberSecurity Color Wheel

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

differentiate thinking humanly and rationally

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

Service Operations in ITSM

Blog banner

Short note on Microsoft office

Blog banner

Semaphores

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

MUTUAL EXCLUSION

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

ONLINE NEWSROOMS

Blog banner

Platonic Solids

Blog banner

SPAM

Blog banner

File system implementation

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner