SlideShare a Scribd company logo
www.oeclib.in
Submitted By:
Odisha Electronic Control Library
Seminar
On
UNIX Operating
System
Contents
1. History of UNIX
2. What is UNIX
3. Commands
4. File System
5. Memory Management
6. Interrupts
7. Why Use UNIX?
8. Applications
continued
(Brief) History
1970s
In the 1970s Brian Kernighan coined the project name Unics as
a play on Multics, (Multiplexed Information and Computing
Service). Unics could eventually support multiple
simultaneous users, and it was renamed Unix
(Brief) History
1980s
AT&T licensed UNIX System III, based largely on Version 7,
for commercial use, the first version launching in 1982. This
also included support for the VAX. AT&T continued to issue
licenses for older Unix versions. To end the confusion between
all its differing internal versions, AT&T combined them into
UNIX System V Release 1. This introduced a few features such
as the vi editor and curses from the Berkeley Software
Distribution of Unix developed at the University of California,
Berkeley. This also included support for the Western Electric
3B series of machines.
(Brief) History
1990s
In 1990, the Open Software Foundation released OSF/1, their
standard Unix implementation, based on Mach and BSD. The
Foundation was started in 1988 and was funded by several
Unix-related companies that wished to counteract the
collaboration of AT&T and Sun on SVR4. Subsequently, AT&T
and another group of licensees formed the group "UNIX
International" in order to counteract OSF. This escalation of
conflict between competing vendors gave rise again to the
phrase "Unix wars".
(Brief) History
2000s
In 2000, SCO sold its entire UNIX business and assets to
Caldera Systems, which later on changed its name to The SCO
Group.
The dot-com bubble (2001–2003) led to significant
consolidation of versions of Unix. Of the many commercial
variants of Unix that were born in the 1980s, only Solaris, HP-
UX, and AIX were still doing relatively well in the market,
though SGI's IRIX persisted for quite some time. Of these,
Solaris had the largest market share in 2005
What is UNIX?
 The UNIX Operating System (OS) is a large program
(mostly coded in C) that turns the computer into a
useable machine.
 It provides a number of facilities:
 management of hardware resources
 directory and file system
 loading / execution / suspension of programs
Commands
Directory commands
cd Change the working directory
find Find a file by name or by other characteristics
mkdir Make a directory
rmdir Remove a directory
File manipulation
commandscat Concatenate and display a file
cp Copy a file
grep Search a file for a specific text string
mv Move or rename a file
rm Remove a file
Commands
Display commands
date Print the date and time
ls List the contents of a directory
pwd Display the working directory pathname
tail Display the end of a file
Process commands
exit Terminate a process
kill Terminate or send a signal to a process
passwd Create or change a password
ps Display the status of a process
telnet Connect to a remote system using the Telnet protocol
The UNIX File System
1. An upside-down Tree
2. Some System Directories
3. Pathnames
4 Commands and Pathnames
1.An upside-down Tree A simplified UNIX directory/file system:
/
etc bin export
home
user
ad s3910120
dev tmp
exam.txt work hobby.c
proj1
date
cal. . .
. . . . . . .
. . .
. . .
. . .
. . .
. . .
2.Some System Directories
 / root directory
 /bin commands
 /etc system data files
(e.g. /etc/passwd)
 /dev files representing I/O devices
3.Pathnames
 A pathname is a sequence of directory names (separated by
/’s) which identifies the location of a directory.
 There are two sorts of pathnames
 absolute pathnames
 relative pathname
3.1Absolute Pathnames
 The sequence of directory names between the top of the
tree (the root) and the directory of interest.
 For example:
/bin
/etc/terminfo
/export/user/home/ad
/export/user/home/s3910120/proj1
3.2Relative Pathnames The sequence of directory names below the directory
where you are now to the directory of interest.
 If you are interested in the directory proj1:
proj1 if you are in s3910120
s3910120/proj1 if you are in home
home/s3910120/proj1 if you are in user
4.Commands and Pathnames
 Commands often use pathnames.
 For example:
/usr/games/fortune
cat /etc/passwd List the password file
Memory Management
Memory
*Primary memory is a precious resource that frequently
cannot contain all active processes in the system
*The memory management system decides which
processes should reside (at least partially) in main
memory
*It monitors the amount of available primary memory
and may periodically write processes to a secondary
device called the swap device to provide more space in
primary memory
*At a later time, the kernel reads the data from swap
device back to main memory
Memory Management
UNIX Memory Management Policies
 Swapping
 Easy to implement
 Less system overhead
 Demand Paging
 Greater flexibility
Memory Management
Swapping
 The swap device is a block device in a configurable section
of a disk
 Kernel allocates contiguous space on the swap device
without fragmentation
 It maintains free space of the swap device in an in-core
table, called map
 The kernel treats each unit of the swap map as group of
disk blocks
 As kernel allocates and frees resources, it updates the map
accordingly
Memory Management
Demand Paging
 Not all page of process resides in memory
 Locality
 When a process accesses a page that is not part of its
working set, it incurs a page fault.
 The kernel suspends the execution of the process until it
reads the page into memory and makes it accessible to the
process
Interrupts
Interrupt
When a process terminates abnormally it usually tries
to send a signal indicating what went wrong. C
programs (and UNIX) can trap these for diagnostics.
Also user specified communication can take place in
this way.
Interrupts
Signals are software generated interrupts that are sent to a
process when a event happens. Each signal has a default
action which is one of the following:
1 The signal is discarded after being received
2 The process is terminated after the signal is received
3 A core file is written, then the process is terminated
4 Stop the process after the signal is received
Interrupts
Each signal defined by the system falls into one of five
classes:
1 Hardware conditions
2 Software conditions
3 Input/output notification
4 Process control
5 Resource control
Why Use UNIX?
 multi-tasking / multi-user
 lots of software
 networking capability
 graphical (with command line)
 easy to program
 portable (PCs, mainframes,
super-computers)
continued
Applications
Storage Consultancy
 Expert advice on all forms of storage technologies.
 Storage management software.
 Solutions that can grow and evolve as your business does.
 Experienced fully trained and accredited consultants.
 Independent recommendations on storage technologies.
 Full project management to implement storage
technologies.
Applications
Backup & Recovery Consulting
 Identify inefficiencies with your current backup
and recovery environment that may be costing you
time and money.
 Ensure your backup and recovery architecture
meets your changing production environment and
SLAs.
 Configure and optimize all aspects of your backup
and recovery environment.
Applications
Middleware & Database Administration
 Installation and configuration of WebLogic and Websphere
application servers in highly available clustering
environment.
 Understanding the complexities of infrastructure design
and maintenance, analyze architecture and security issues
Hardening productions environments.
 Assisting clients in aspects of deploying J2EE applications
and connecting to back end resources.
 Providing development and production environments.
Finding performance bottlenecks and tuning of existing
Websphere or WebLogic applications servers.
References
 www.google.com
 www.wikipedia.com
Thanks

More Related Content

PPTX
Voice over Internet Protocol (VoIP)
PPTX
Unix case-study
PPTX
History of Computer
PPTX
Unix Operating System
PPTX
Fusion
PPTX
Citrix adc technical overview
PPTX
Edge Computing and Cloud Computing
Voice over Internet Protocol (VoIP)
Unix case-study
History of Computer
Unix Operating System
Fusion
Citrix adc technical overview
Edge Computing and Cloud Computing

What's hot (20)

PPT
Linux command ppt
PPT
Basic command ppt
PPTX
IP tables and Filtering
PPTX
Introduction to Unix
PPTX
Unix
PPTX
Unix operating system
PDF
Shell scripting
PPTX
Introduction to linux
ODP
Introduction to Shell script
PPT
Case study windows
PDF
Presentation on linux
PPT
Linux basic commands
PPTX
Unix Operating System
PPTX
Operating system components
PPTX
Linux operating system - Overview
PPTX
Linux vs windows
PDF
Advance linux presentation_0702011
PPTX
Terminal Commands (Linux - ubuntu) (part-1)
Linux command ppt
Basic command ppt
IP tables and Filtering
Introduction to Unix
Unix
Unix operating system
Shell scripting
Introduction to linux
Introduction to Shell script
Case study windows
Presentation on linux
Linux basic commands
Unix Operating System
Operating system components
Linux operating system - Overview
Linux vs windows
Advance linux presentation_0702011
Terminal Commands (Linux - ubuntu) (part-1)
Ad

Similar to UNIX Operating System ppt (20)

DOC
Introduction to unix
PPT
PPT
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
PDF
1_Introduction_To_Unix_and_Basic_Unix_Commands
PPT
DOC
84640411 study-of-unix-os
ODP
Visual comparison of Unix-like systems & Virtualisation
PPTX
A beginners introduction to unix
PPTX
Unix and shell programming | Unix File System | Unix File Permission | Blocks
PPT
16. Computer Systems Basic Software 2
PDF
Presentation1.pdf
PPTX
Cha-2- Software Maintenance Part-2.gghgpptx
PDF
Introduction to Unix-like systems (Part I-IV)
PPT
Spsl unit1
PDF
cse-iv-unix-and-shell-programming-10cs44-notes.pdf
DOCX
UNIT II-Programming in Linux
PPTX
Unix operating system architecture with file structure
DOC
Introduction to unix
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
1_Introduction_To_Unix_and_Basic_Unix_Commands
84640411 study-of-unix-os
Visual comparison of Unix-like systems & Virtualisation
A beginners introduction to unix
Unix and shell programming | Unix File System | Unix File Permission | Blocks
16. Computer Systems Basic Software 2
Presentation1.pdf
Cha-2- Software Maintenance Part-2.gghgpptx
Introduction to Unix-like systems (Part I-IV)
Spsl unit1
cse-iv-unix-and-shell-programming-10cs44-notes.pdf
UNIT II-Programming in Linux
Unix operating system architecture with file structure
Ad

More from OECLIB Odisha Electronics Control Library (20)

PPTX
PPTX
PPTX
PPTX
Agent Oriented Programming PPT
PPTX
Wireless application protocol ppt
PPTX
Wireless Communication ppt
PPTX
PPTX
Sixth sense technology ppt
PPTX
Software developement life cycle ppt
PPTX
Voice-over-Internet Protocol (VoIP) ppt
PPTX
Virtual Private Networks (VPN) ppt

Recently uploaded (20)

PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
top salesforce developer skills in 2025.pdf
PPTX
Introduction to Artificial Intelligence
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Digital Strategies for Manufacturing Companies
PPTX
Transform Your Business with a Software ERP System
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
Upgrade and Innovation Strategies for SAP ERP Customers
Design an Analysis of Algorithms II-SECS-1021-03
How to Migrate SBCGlobal Email to Yahoo Easily
How Creative Agencies Leverage Project Management Software.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Design an Analysis of Algorithms I-SECS-1021-03
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
top salesforce developer skills in 2025.pdf
Introduction to Artificial Intelligence
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Online Work Permit System for Fast Permit Processing
Digital Strategies for Manufacturing Companies
Transform Your Business with a Software ERP System
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Softaken Excel to vCard Converter Software.pdf
Which alternative to Crystal Reports is best for small or large businesses.pdf
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
How to Choose the Right IT Partner for Your Business in Malaysia

UNIX Operating System ppt

  • 1. www.oeclib.in Submitted By: Odisha Electronic Control Library Seminar On UNIX Operating System
  • 2. Contents 1. History of UNIX 2. What is UNIX 3. Commands 4. File System 5. Memory Management 6. Interrupts 7. Why Use UNIX? 8. Applications continued
  • 3. (Brief) History 1970s In the 1970s Brian Kernighan coined the project name Unics as a play on Multics, (Multiplexed Information and Computing Service). Unics could eventually support multiple simultaneous users, and it was renamed Unix
  • 4. (Brief) History 1980s AT&T licensed UNIX System III, based largely on Version 7, for commercial use, the first version launching in 1982. This also included support for the VAX. AT&T continued to issue licenses for older Unix versions. To end the confusion between all its differing internal versions, AT&T combined them into UNIX System V Release 1. This introduced a few features such as the vi editor and curses from the Berkeley Software Distribution of Unix developed at the University of California, Berkeley. This also included support for the Western Electric 3B series of machines.
  • 5. (Brief) History 1990s In 1990, the Open Software Foundation released OSF/1, their standard Unix implementation, based on Mach and BSD. The Foundation was started in 1988 and was funded by several Unix-related companies that wished to counteract the collaboration of AT&T and Sun on SVR4. Subsequently, AT&T and another group of licensees formed the group "UNIX International" in order to counteract OSF. This escalation of conflict between competing vendors gave rise again to the phrase "Unix wars".
  • 6. (Brief) History 2000s In 2000, SCO sold its entire UNIX business and assets to Caldera Systems, which later on changed its name to The SCO Group. The dot-com bubble (2001–2003) led to significant consolidation of versions of Unix. Of the many commercial variants of Unix that were born in the 1980s, only Solaris, HP- UX, and AIX were still doing relatively well in the market, though SGI's IRIX persisted for quite some time. Of these, Solaris had the largest market share in 2005
  • 7. What is UNIX?  The UNIX Operating System (OS) is a large program (mostly coded in C) that turns the computer into a useable machine.  It provides a number of facilities:  management of hardware resources  directory and file system  loading / execution / suspension of programs
  • 8. Commands Directory commands cd Change the working directory find Find a file by name or by other characteristics mkdir Make a directory rmdir Remove a directory File manipulation commandscat Concatenate and display a file cp Copy a file grep Search a file for a specific text string mv Move or rename a file rm Remove a file
  • 9. Commands Display commands date Print the date and time ls List the contents of a directory pwd Display the working directory pathname tail Display the end of a file Process commands exit Terminate a process kill Terminate or send a signal to a process passwd Create or change a password ps Display the status of a process telnet Connect to a remote system using the Telnet protocol
  • 10. The UNIX File System 1. An upside-down Tree 2. Some System Directories 3. Pathnames 4 Commands and Pathnames
  • 11. 1.An upside-down Tree A simplified UNIX directory/file system: / etc bin export home user ad s3910120 dev tmp exam.txt work hobby.c proj1 date cal. . . . . . . . . . . . . . . . . . . . . . . . .
  • 12. 2.Some System Directories  / root directory  /bin commands  /etc system data files (e.g. /etc/passwd)  /dev files representing I/O devices
  • 13. 3.Pathnames  A pathname is a sequence of directory names (separated by /’s) which identifies the location of a directory.  There are two sorts of pathnames  absolute pathnames  relative pathname
  • 14. 3.1Absolute Pathnames  The sequence of directory names between the top of the tree (the root) and the directory of interest.  For example: /bin /etc/terminfo /export/user/home/ad /export/user/home/s3910120/proj1
  • 15. 3.2Relative Pathnames The sequence of directory names below the directory where you are now to the directory of interest.  If you are interested in the directory proj1: proj1 if you are in s3910120 s3910120/proj1 if you are in home home/s3910120/proj1 if you are in user
  • 16. 4.Commands and Pathnames  Commands often use pathnames.  For example: /usr/games/fortune cat /etc/passwd List the password file
  • 17. Memory Management Memory *Primary memory is a precious resource that frequently cannot contain all active processes in the system *The memory management system decides which processes should reside (at least partially) in main memory *It monitors the amount of available primary memory and may periodically write processes to a secondary device called the swap device to provide more space in primary memory *At a later time, the kernel reads the data from swap device back to main memory
  • 18. Memory Management UNIX Memory Management Policies  Swapping  Easy to implement  Less system overhead  Demand Paging  Greater flexibility
  • 19. Memory Management Swapping  The swap device is a block device in a configurable section of a disk  Kernel allocates contiguous space on the swap device without fragmentation  It maintains free space of the swap device in an in-core table, called map  The kernel treats each unit of the swap map as group of disk blocks  As kernel allocates and frees resources, it updates the map accordingly
  • 20. Memory Management Demand Paging  Not all page of process resides in memory  Locality  When a process accesses a page that is not part of its working set, it incurs a page fault.  The kernel suspends the execution of the process until it reads the page into memory and makes it accessible to the process
  • 21. Interrupts Interrupt When a process terminates abnormally it usually tries to send a signal indicating what went wrong. C programs (and UNIX) can trap these for diagnostics. Also user specified communication can take place in this way.
  • 22. Interrupts Signals are software generated interrupts that are sent to a process when a event happens. Each signal has a default action which is one of the following: 1 The signal is discarded after being received 2 The process is terminated after the signal is received 3 A core file is written, then the process is terminated 4 Stop the process after the signal is received
  • 23. Interrupts Each signal defined by the system falls into one of five classes: 1 Hardware conditions 2 Software conditions 3 Input/output notification 4 Process control 5 Resource control
  • 24. Why Use UNIX?  multi-tasking / multi-user  lots of software  networking capability  graphical (with command line)  easy to program  portable (PCs, mainframes, super-computers) continued
  • 25. Applications Storage Consultancy  Expert advice on all forms of storage technologies.  Storage management software.  Solutions that can grow and evolve as your business does.  Experienced fully trained and accredited consultants.  Independent recommendations on storage technologies.  Full project management to implement storage technologies.
  • 26. Applications Backup & Recovery Consulting  Identify inefficiencies with your current backup and recovery environment that may be costing you time and money.  Ensure your backup and recovery architecture meets your changing production environment and SLAs.  Configure and optimize all aspects of your backup and recovery environment.
  • 27. Applications Middleware & Database Administration  Installation and configuration of WebLogic and Websphere application servers in highly available clustering environment.  Understanding the complexities of infrastructure design and maintenance, analyze architecture and security issues Hardening productions environments.  Assisting clients in aspects of deploying J2EE applications and connecting to back end resources.  Providing development and production environments. Finding performance bottlenecks and tuning of existing Websphere or WebLogic applications servers.