wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Traditional Unix System

profile
Srushti Sanghani
Jul 11, 2023
0 Likes
0 Discussions
126 Reads

                                                                                                ASSIGNMENT- 2                                                                                                                                                                                                                                                                                                     Srushti Sanghani

                                                                                                                                                                                                      53003220007                                                                      

Traditional Unix System

Introduction to Unix 

Unix - trademarked as UNIX is a multiuser, multitasking operating system (OS) designed for flexibility and adaptability. Originally developed in the 1970s, Unix was one of the first OSes to be written in the C programming language. 

History of Unix

  • It was developed in the 1970s by Ken Thompson, Dennis Ritchie, and others in the AT&T Laboratories. It was originally meant for programmers developing software rather than non-programmers. 
  • Unix and the C were found by AT&T and distributed to government and academic institutions, which led to both being ported to a wider variety of machine families than any other operating system. The main focus that was brought by the developers in this operating system was the Kernel. Unix was considered to be the heart of the operating System. 

Unix Architecture

The Unix architecture has 4 layers. 

  1. Hardware - Hardware is the most simple and least powerful layer in the Unix Architecture. Hardware is the components that are humanly visible. 
  2. Kernel - This is the most powerful layer of the Unix architecture. The kernel is responsible for acting as an interface between the user and the hardware for the effective utilization of the hardware. The main 2 features of the kernel are process management and file management. 
  1. Process Management: The processes that execute within the operating system require a lot of management in terms of memory being allocated to them, the resource allocation to the process, process synchronization, etc. All this is done by the Kernel in Unix OS. 
  2. File Management: File management involves managing the data stored in the files. This also includes the transmission of data stored in these files to the processes as and when they request it.
  1. Shell - Since the kernel is such an important program of the Unix Operating System, its direct access to the users can be dangerous. Hence, the Shell comes into the picture. Shell is an interpreter program that interprets the commands entered by the user and then sends the requests to the kernel to execute those commands.There are 3 types of shells in the Unix Operating system.
    1. Bourne Shell (sh) - It is the most widely available shell on Unix OS devices across the world. This was the first shell available in the Unix OS. It is simply called a shell.
    2. C Shell (csh) - The University of California (Berkeley) developed C Shell is another Unix shell that removes some of the obsolete features or problems from the Bourne Shell. So, it enhances the performance of the Bourne Shell.
    3. Korn Shell (ksh) - The name of the Korn Shell is based on its creator, David Korn. This shell enhances the C shell further by removing the shortcomings of the C shell and also enhancing the user interaction of the Bourne Shell.
  2. Application layer - It is the outermost layer that executes the given external applications. UNIX distributions typically come with several useful applications programs as standard. For Example:- emacs editor, StarOffice, xv image viewer, g++ compiler etc.

 

 









Comments ()


Sign in

Read Next

Dangers of Using Public WiFis

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Online Education

Blog banner

Modern operating system

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

How Does SSO Works

Blog banner

Modern operating system

Blog banner

The IT Service Lifecycle

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Hash password! Is it really secured?

Blog banner

Platonic Solids

Blog banner

Some web vulnerabilities

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Threading

Blog banner

Virtual Memory

Blog banner

Gamer life

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Twisted world

Blog banner

Dancing Classes In Mumbai

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Multicore and Multithreading

Blog banner

Scala - a programming tool

Blog banner

'Positivity in life'

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Constrained Management in IT

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

DISK SCHEDULING

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

TRELLO

Blog banner

Short note on Microsoft office

Blog banner

INTERNET

Blog banner

Precision-Recall in Data Science

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Rain

Blog banner

Memory heirachy (Operating system)

Blog banner

The Laws of Karma

Blog banner

Uniprocessor scheduling

Blog banner

Mail merge

Blog banner

How return on investment is defined in IT services

Blog banner

A Journey By Train

Blog banner