SlideShare a Scribd company logo
1 of 29
www.oeclib.in
Submitted By:
Odisha Electronic Control Library
Seminar
On
UNIX Operating
System
Contents
1. History of UNIX
2. What is UNIX
3. Commands
4. File System
5. Memory Management
6. Interrupts
7. Why Use UNIX?
8. Applications
continued
(Brief) History
1970s
In the 1970s Brian Kernighan coined the project name Unics as
a play on Multics, (Multiplexed Information and Computing
Service). Unics could eventually support multiple
simultaneous users, and it was renamed Unix
(Brief) History
1980s
AT&T licensed UNIX System III, based largely on Version 7,
for commercial use, the first version launching in 1982. This
also included support for the VAX. AT&T continued to issue
licenses for older Unix versions. To end the confusion between
all its differing internal versions, AT&T combined them into
UNIX System V Release 1. This introduced a few features such
as the vi editor and curses from the Berkeley Software
Distribution of Unix developed at the University of California,
Berkeley. This also included support for the Western Electric
3B series of machines.
(Brief) History
1990s
In 1990, the Open Software Foundation released OSF/1, their
standard Unix implementation, based on Mach and BSD. The
Foundation was started in 1988 and was funded by several
Unix-related companies that wished to counteract the
collaboration of AT&T and Sun on SVR4. Subsequently, AT&T
and another group of licensees formed the group "UNIX
International" in order to counteract OSF. This escalation of
conflict between competing vendors gave rise again to the
phrase "Unix wars".
(Brief) History
2000s
In 2000, SCO sold its entire UNIX business and assets to
Caldera Systems, which later on changed its name to The SCO
Group.
The dot-com bubble (2001–2003) led to significant
consolidation of versions of Unix. Of the many commercial
variants of Unix that were born in the 1980s, only Solaris, HP-
UX, and AIX were still doing relatively well in the market,
though SGI's IRIX persisted for quite some time. Of these,
Solaris had the largest market share in 2005
What is UNIX?
 The UNIX Operating System (OS) is a large program
(mostly coded in C) that turns the computer into a
useable machine.
 It provides a number of facilities:
 management of hardware resources
 directory and file system
 loading / execution / suspension of programs
Commands
Directory commands
cd Change the working directory
find Find a file by name or by other characteristics
mkdir Make a directory
rmdir Remove a directory
File manipulation
commandscat Concatenate and display a file
cp Copy a file
grep Search a file for a specific text string
mv Move or rename a file
rm Remove a file
Commands
Display commands
date Print the date and time
ls List the contents of a directory
pwd Display the working directory pathname
tail Display the end of a file
Process commands
exit Terminate a process
kill Terminate or send a signal to a process
passwd Create or change a password
ps Display the status of a process
telnet Connect to a remote system using the Telnet protocol
The UNIX File System
1. An upside-down Tree
2. Some System Directories
3. Pathnames
4 Commands and Pathnames
1.An upside-down Tree A simplified UNIX directory/file system:
/
etc bin export
home
user
ad s3910120
dev tmp
exam.txt work hobby.c
proj1
date
cal. . .
. . . . . . .
. . .
. . .
. . .
. . .
. . .
2.Some System Directories
 / root directory
 /bin commands
 /etc system data files
(e.g. /etc/passwd)
 /dev files representing I/O devices
3.Pathnames
 A pathname is a sequence of directory names (separated by
/’s) which identifies the location of a directory.
 There are two sorts of pathnames
 absolute pathnames
 relative pathname
3.1Absolute Pathnames
 The sequence of directory names between the top of the
tree (the root) and the directory of interest.
 For example:
/bin
/etc/terminfo
/export/user/home/ad
/export/user/home/s3910120/proj1
3.2Relative Pathnames The sequence of directory names below the directory
where you are now to the directory of interest.
 If you are interested in the directory proj1:
proj1 if you are in s3910120
s3910120/proj1 if you are in home
home/s3910120/proj1 if you are in user
4.Commands and Pathnames
 Commands often use pathnames.
 For example:
/usr/games/fortune
cat /etc/passwd List the password file
Memory Management
Memory
*Primary memory is a precious resource that frequently
cannot contain all active processes in the system
*The memory management system decides which
processes should reside (at least partially) in main
memory
*It monitors the amount of available primary memory
and may periodically write processes to a secondary
device called the swap device to provide more space in
primary memory
*At a later time, the kernel reads the data from swap
device back to main memory
Memory Management
UNIX Memory Management Policies
 Swapping
 Easy to implement
 Less system overhead
 Demand Paging
 Greater flexibility
Memory Management
Swapping
 The swap device is a block device in a configurable section
of a disk
 Kernel allocates contiguous space on the swap device
without fragmentation
 It maintains free space of the swap device in an in-core
table, called map
 The kernel treats each unit of the swap map as group of
disk blocks
 As kernel allocates and frees resources, it updates the map
accordingly
Memory Management
Demand Paging
 Not all page of process resides in memory
 Locality
 When a process accesses a page that is not part of its
working set, it incurs a page fault.
 The kernel suspends the execution of the process until it
reads the page into memory and makes it accessible to the
process
Interrupts
Interrupt
When a process terminates abnormally it usually tries
to send a signal indicating what went wrong. C
programs (and UNIX) can trap these for diagnostics.
Also user specified communication can take place in
this way.
Interrupts
Signals are software generated interrupts that are sent to a
process when a event happens. Each signal has a default
action which is one of the following:
1 The signal is discarded after being received
2 The process is terminated after the signal is received
3 A core file is written, then the process is terminated
4 Stop the process after the signal is received
Interrupts
Each signal defined by the system falls into one of five
classes:
1 Hardware conditions
2 Software conditions
3 Input/output notification
4 Process control
5 Resource control
Why Use UNIX?
 multi-tasking / multi-user
 lots of software
 networking capability
 graphical (with command line)
 easy to program
 portable (PCs, mainframes,
super-computers)
continued
Applications
Storage Consultancy
 Expert advice on all forms of storage technologies.
 Storage management software.
 Solutions that can grow and evolve as your business does.
 Experienced fully trained and accredited consultants.
 Independent recommendations on storage technologies.
 Full project management to implement storage
technologies.
Applications
Backup & Recovery Consulting
 Identify inefficiencies with your current backup
and recovery environment that may be costing you
time and money.
 Ensure your backup and recovery architecture
meets your changing production environment and
SLAs.
 Configure and optimize all aspects of your backup
and recovery environment.
Applications
Middleware & Database Administration
 Installation and configuration of WebLogic and Websphere
application servers in highly available clustering
environment.
 Understanding the complexities of infrastructure design
and maintenance, analyze architecture and security issues
Hardening productions environments.
 Assisting clients in aspects of deploying J2EE applications
and connecting to back end resources.
 Providing development and production environments.
Finding performance bottlenecks and tuning of existing
Websphere or WebLogic applications servers.
References
 www.google.com
 www.wikipedia.com
Thanks

More Related Content

What's hot

What's hot (20)

An Introduction To Linux
An Introduction To LinuxAn Introduction To Linux
An Introduction To Linux
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Shell and its types in LINUX
Shell and its types in LINUXShell and its types in LINUX
Shell and its types in LINUX
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Linux.ppt
Linux.ppt Linux.ppt
Linux.ppt
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
 
Know the UNIX Commands
Know the UNIX CommandsKnow the UNIX Commands
Know the UNIX Commands
 
Linux standard file system
Linux standard file systemLinux standard file system
Linux standard file system
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
 
Vi editor
Vi editorVi editor
Vi editor
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Linux basic commands with examples
Linux basic commands with examplesLinux basic commands with examples
Linux basic commands with examples
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scripting
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 

Similar to UNIX Operating System ppt

1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands
Gautam Raja
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2
New Era University
 
Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)
hildenjohannes
 

Similar to UNIX Operating System ppt (20)

Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
App A
App AApp A
App A
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands1_Introduction_To_Unix_and_Basic_Unix_Commands
1_Introduction_To_Unix_and_Basic_Unix_Commands
 
Ch02
Ch02Ch02
Ch02
 
Studies
StudiesStudies
Studies
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-I
 
84640411 study-of-unix-os
84640411 study-of-unix-os84640411 study-of-unix-os
84640411 study-of-unix-os
 
Visual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & VirtualisationVisual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & Virtualisation
 
A beginners introduction to unix
A beginners introduction to unixA beginners introduction to unix
A beginners introduction to unix
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | Blocks
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2
 
Presentation1.pdf
Presentation1.pdfPresentation1.pdf
Presentation1.pdf
 
Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
 
Unix case-study
Unix case-studyUnix case-study
Unix case-study
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
Linux
LinuxLinux
Linux
 
CHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptxCHAPTER 1 INTRODUCTION TO UNIX.pptx
CHAPTER 1 INTRODUCTION TO UNIX.pptx
 

More from OECLIB Odisha Electronics Control Library

More from OECLIB Odisha Electronics Control Library (20)

5G technology-ppt
5G technology-ppt5G technology-ppt
5G technology-ppt
 
Futex ppt
Futex  pptFutex  ppt
Futex ppt
 
Distributed Computing ppt
Distributed Computing pptDistributed Computing ppt
Distributed Computing ppt
 
Autonomic Computing PPT
Autonomic Computing PPTAutonomic Computing PPT
Autonomic Computing PPT
 
Asynchronous Chips ppt
Asynchronous Chips pptAsynchronous Chips ppt
Asynchronous Chips ppt
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
Agent Oriented Programming PPT
Agent Oriented Programming PPTAgent Oriented Programming PPT
Agent Oriented Programming PPT
 
Wireless application protocol ppt
Wireless application protocol  pptWireless application protocol  ppt
Wireless application protocol ppt
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
4G Wireless Systems ppt
4G Wireless Systems ppt4G Wireless Systems ppt
4G Wireless Systems ppt
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Sixth sense technology ppt
Sixth sense technology pptSixth sense technology ppt
Sixth sense technology ppt
 
Soa ppt
Soa pptSoa ppt
Soa ppt
 
Software developement life cycle ppt
Software developement life cycle pptSoftware developement life cycle ppt
Software developement life cycle ppt
 
Voice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) pptVoice-over-Internet Protocol (VoIP) ppt
Voice-over-Internet Protocol (VoIP) ppt
 
ZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY pptZIGBEE TECHNOLOGY ppt
ZIGBEE TECHNOLOGY ppt
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Wibree ppt
Wibree pptWibree ppt
Wibree ppt
 
Wearable Computing
Wearable ComputingWearable Computing
Wearable Computing
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 

Recently uploaded

CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 

UNIX Operating System ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronic Control Library Seminar On UNIX Operating System
  • 2. Contents 1. History of UNIX 2. What is UNIX 3. Commands 4. File System 5. Memory Management 6. Interrupts 7. Why Use UNIX? 8. Applications continued
  • 3. (Brief) History 1970s In the 1970s Brian Kernighan coined the project name Unics as a play on Multics, (Multiplexed Information and Computing Service). Unics could eventually support multiple simultaneous users, and it was renamed Unix
  • 4. (Brief) History 1980s AT&T licensed UNIX System III, based largely on Version 7, for commercial use, the first version launching in 1982. This also included support for the VAX. AT&T continued to issue licenses for older Unix versions. To end the confusion between all its differing internal versions, AT&T combined them into UNIX System V Release 1. This introduced a few features such as the vi editor and curses from the Berkeley Software Distribution of Unix developed at the University of California, Berkeley. This also included support for the Western Electric 3B series of machines.
  • 5. (Brief) History 1990s In 1990, the Open Software Foundation released OSF/1, their standard Unix implementation, based on Mach and BSD. The Foundation was started in 1988 and was funded by several Unix-related companies that wished to counteract the collaboration of AT&T and Sun on SVR4. Subsequently, AT&T and another group of licensees formed the group "UNIX International" in order to counteract OSF. This escalation of conflict between competing vendors gave rise again to the phrase "Unix wars".
  • 6. (Brief) History 2000s In 2000, SCO sold its entire UNIX business and assets to Caldera Systems, which later on changed its name to The SCO Group. The dot-com bubble (2001–2003) led to significant consolidation of versions of Unix. Of the many commercial variants of Unix that were born in the 1980s, only Solaris, HP- UX, and AIX were still doing relatively well in the market, though SGI's IRIX persisted for quite some time. Of these, Solaris had the largest market share in 2005
  • 7. What is UNIX?  The UNIX Operating System (OS) is a large program (mostly coded in C) that turns the computer into a useable machine.  It provides a number of facilities:  management of hardware resources  directory and file system  loading / execution / suspension of programs
  • 8. Commands Directory commands cd Change the working directory find Find a file by name or by other characteristics mkdir Make a directory rmdir Remove a directory File manipulation commandscat Concatenate and display a file cp Copy a file grep Search a file for a specific text string mv Move or rename a file rm Remove a file
  • 9. Commands Display commands date Print the date and time ls List the contents of a directory pwd Display the working directory pathname tail Display the end of a file Process commands exit Terminate a process kill Terminate or send a signal to a process passwd Create or change a password ps Display the status of a process telnet Connect to a remote system using the Telnet protocol
  • 10. The UNIX File System 1. An upside-down Tree 2. Some System Directories 3. Pathnames 4 Commands and Pathnames
  • 11. 1.An upside-down Tree A simplified UNIX directory/file system: / etc bin export home user ad s3910120 dev tmp exam.txt work hobby.c proj1 date cal. . . . . . . . . . . . . . . . . . . . . . . . .
  • 12. 2.Some System Directories  / root directory  /bin commands  /etc system data files (e.g. /etc/passwd)  /dev files representing I/O devices
  • 13. 3.Pathnames  A pathname is a sequence of directory names (separated by /’s) which identifies the location of a directory.  There are two sorts of pathnames  absolute pathnames  relative pathname
  • 14. 3.1Absolute Pathnames  The sequence of directory names between the top of the tree (the root) and the directory of interest.  For example: /bin /etc/terminfo /export/user/home/ad /export/user/home/s3910120/proj1
  • 15. 3.2Relative Pathnames The sequence of directory names below the directory where you are now to the directory of interest.  If you are interested in the directory proj1: proj1 if you are in s3910120 s3910120/proj1 if you are in home home/s3910120/proj1 if you are in user
  • 16. 4.Commands and Pathnames  Commands often use pathnames.  For example: /usr/games/fortune cat /etc/passwd List the password file
  • 17. Memory Management Memory *Primary memory is a precious resource that frequently cannot contain all active processes in the system *The memory management system decides which processes should reside (at least partially) in main memory *It monitors the amount of available primary memory and may periodically write processes to a secondary device called the swap device to provide more space in primary memory *At a later time, the kernel reads the data from swap device back to main memory
  • 18. Memory Management UNIX Memory Management Policies  Swapping  Easy to implement  Less system overhead  Demand Paging  Greater flexibility
  • 19. Memory Management Swapping  The swap device is a block device in a configurable section of a disk  Kernel allocates contiguous space on the swap device without fragmentation  It maintains free space of the swap device in an in-core table, called map  The kernel treats each unit of the swap map as group of disk blocks  As kernel allocates and frees resources, it updates the map accordingly
  • 20. Memory Management Demand Paging  Not all page of process resides in memory  Locality  When a process accesses a page that is not part of its working set, it incurs a page fault.  The kernel suspends the execution of the process until it reads the page into memory and makes it accessible to the process
  • 21. Interrupts Interrupt When a process terminates abnormally it usually tries to send a signal indicating what went wrong. C programs (and UNIX) can trap these for diagnostics. Also user specified communication can take place in this way.
  • 22. Interrupts Signals are software generated interrupts that are sent to a process when a event happens. Each signal has a default action which is one of the following: 1 The signal is discarded after being received 2 The process is terminated after the signal is received 3 A core file is written, then the process is terminated 4 Stop the process after the signal is received
  • 23. Interrupts Each signal defined by the system falls into one of five classes: 1 Hardware conditions 2 Software conditions 3 Input/output notification 4 Process control 5 Resource control
  • 24. Why Use UNIX?  multi-tasking / multi-user  lots of software  networking capability  graphical (with command line)  easy to program  portable (PCs, mainframes, super-computers) continued
  • 25. Applications Storage Consultancy  Expert advice on all forms of storage technologies.  Storage management software.  Solutions that can grow and evolve as your business does.  Experienced fully trained and accredited consultants.  Independent recommendations on storage technologies.  Full project management to implement storage technologies.
  • 26. Applications Backup & Recovery Consulting  Identify inefficiencies with your current backup and recovery environment that may be costing you time and money.  Ensure your backup and recovery architecture meets your changing production environment and SLAs.  Configure and optimize all aspects of your backup and recovery environment.
  • 27. Applications Middleware & Database Administration  Installation and configuration of WebLogic and Websphere application servers in highly available clustering environment.  Understanding the complexities of infrastructure design and maintenance, analyze architecture and security issues Hardening productions environments.  Assisting clients in aspects of deploying J2EE applications and connecting to back end resources.  Providing development and production environments. Finding performance bottlenecks and tuning of existing Websphere or WebLogic applications servers.