wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Traditional Unix System

profile
Srushti Sanghani
Jul 11, 2023
0 Likes
0 Discussions
125 Reads

                                                                                                ASSIGNMENT- 2                                                                                                                                                                                                                                                                                                     Srushti Sanghani

                                                                                                                                                                                                      53003220007                                                                      

Traditional Unix System

Introduction to Unix 

Unix - trademarked as UNIX is a multiuser, multitasking operating system (OS) designed for flexibility and adaptability. Originally developed in the 1970s, Unix was one of the first OSes to be written in the C programming language. 

History of Unix

  • It was developed in the 1970s by Ken Thompson, Dennis Ritchie, and others in the AT&T Laboratories. It was originally meant for programmers developing software rather than non-programmers. 
  • Unix and the C were found by AT&T and distributed to government and academic institutions, which led to both being ported to a wider variety of machine families than any other operating system. The main focus that was brought by the developers in this operating system was the Kernel. Unix was considered to be the heart of the operating System. 

Unix Architecture

The Unix architecture has 4 layers. 

  1. Hardware - Hardware is the most simple and least powerful layer in the Unix Architecture. Hardware is the components that are humanly visible. 
  2. Kernel - This is the most powerful layer of the Unix architecture. The kernel is responsible for acting as an interface between the user and the hardware for the effective utilization of the hardware. The main 2 features of the kernel are process management and file management. 
  1. Process Management: The processes that execute within the operating system require a lot of management in terms of memory being allocated to them, the resource allocation to the process, process synchronization, etc. All this is done by the Kernel in Unix OS. 
  2. File Management: File management involves managing the data stored in the files. This also includes the transmission of data stored in these files to the processes as and when they request it.
  1. Shell - Since the kernel is such an important program of the Unix Operating System, its direct access to the users can be dangerous. Hence, the Shell comes into the picture. Shell is an interpreter program that interprets the commands entered by the user and then sends the requests to the kernel to execute those commands.There are 3 types of shells in the Unix Operating system.
    1. Bourne Shell (sh) - It is the most widely available shell on Unix OS devices across the world. This was the first shell available in the Unix OS. It is simply called a shell.
    2. C Shell (csh) - The University of California (Berkeley) developed C Shell is another Unix shell that removes some of the obsolete features or problems from the Bourne Shell. So, it enhances the performance of the Bourne Shell.
    3. Korn Shell (ksh) - The name of the Korn Shell is based on its creator, David Korn. This shell enhances the C shell further by removing the shortcomings of the C shell and also enhancing the user interaction of the Bourne Shell.
  2. Application layer - It is the outermost layer that executes the given external applications. UNIX distributions typically come with several useful applications programs as standard. For Example:- emacs editor, StarOffice, xv image viewer, g++ compiler etc.

 

 









Comments ()


Sign in

Read Next

A-B-C of Networking: Part-1 (Basics)

Blog banner

Impact of social media on the human life

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Short note on Microsoft office

Blog banner

Modern operating system

Blog banner

Hypothesis Testing in Data Science

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Virtual memory

Blog banner

What is Spyware?

Blog banner

Memory management

Blog banner

Data Mining

Blog banner

APACHE KAFKA

Blog banner

Computer Security

Blog banner

virtual machine

Blog banner

Race condition

Blog banner

The Five Steps of Data Science

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Real Time Scheduling

Blog banner

Evolution of Operating system.

Blog banner

File Allocation Methods

Blog banner

Types of Malware in Cyber Security

Blog banner

Odoo

Blog banner

Some facts about Technology

Blog banner

Senseless Teeths

Blog banner

What is OS and its overview

Blog banner

Message Passing in OS

Blog banner

Honeypot in cyber security

Blog banner

Deadlock and Starvation

Blog banner

Fault Tolerance in an Operating System

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

How to feel Happy everyday day

Blog banner

Predictive Analysis - Ek Overview

Blog banner

Types of Big Data

Blog banner

The most common internet security threats

Blog banner

Buffer overflow

Blog banner

What is service level Agreement?

Blog banner

Depression

Blog banner

Hey Aryan here

Blog banner

Trello ( management software)

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner