...Evolution of UNIX Evolution of UNIX Bill Stewart December 01, 2011 Marshall University CIS155: UNIX Operating System In the late 1960's computers worked entirely different than the ones that we do our work on every day. They did not talk to each other and programs written for use on one computer did not work on another. Today’s basic cell phone has more processing power and memory capabilities as computers from the 1960's. The few operating systems available at that time performed very limited tasks and were exclusive to the computer it was written on. In other words when one upgraded to a newer computer, the operating system and all data that you wanted transferred from the old computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and...
Words: 1891 - Pages: 8
...efforts on enterprise computing. Historically, in the server segment, HP had been the number one UNIX server vendor by revenue since 1993 with its HP-UX product line. But due to HP’s focus on developing IA-64 with Intel, Sun Microsystems (Sun) capitalized on the doubt regarding HP’s commitment to UNIX-based machines. By summer 1998, Sun had shipped more UNIX servers than any other vendor, including HP and IBM. Also HP as well as IBM had not joined Sun’s Solaris camp. It was clear that HP, and in turn ESG, no longer held a dominant position in the UNIX market. Need for Evolution to Maintain and Increase Market Share WINTEL systems were emerging in the field of enterprise computing. The growth rate of UNIX based machines was expected to slow to a CAGR of 5% from 1997 to 2001, as WINTEL systems were expected to become more powerful and reliable. Additionally, many industry experts believed that RISC was approaching its limit of technology on its S-curve of technology performance (Figure 1). Additionally, as WINTEL captured increasing volumes at low end of the workstation/server market, the brunt of competitive disadvantage on RISC-Unix computers was felt since manufacturing of RISC chips in lesser volumes and the need to port software to each UNIX version proved more costly. It was clear that evolution was the need of the hour. Merced and IA-64 The answer to the need of evolution came in the form of a chip code named Merced and its associated architecture IA-64, both of which...
Words: 647 - Pages: 3
...mobile devices. This operating system incorporates many of the latest developments in operating system technology. In addition, Windows is one of the first important commercial operating systems to rely heavily on object-oriented design principles. This book covers the technology used in the most recent versions of Windows, known as Windows 8. * Android: Android tailored for embedded devices, especially mobile phones. Focusing on the unique requirements of the embedded environment, the book provides details of Android internals. * UNIX: A multiuser operating system, originally intended for minicomputers, but implemented on a wide range of machines from powerful microcomputers to supercomputers. Several flavors of UNIX are included as examples. FreeBSD is a widely used system that incorporates many state-of-the-art features. Solaris is a widely used commercial version of UNIX. * Linux: An open-source version of UNIX that is now widely used. Web Sites for This Book Three Web sites provide additional resources for students and instructors. There is a Companion Web site for this book at http://williamstallings.com/OperatingSystems/. Chapter 1 Notes An operating system (OS) exploits the hardware resources of one or more processors to provide a set of services to system users. The OS also manages secondary memory and I/O (input/output) devices on behalf of its users. 1.1 BASIC ELEMENTS 1.1 Basic Elements At a top level, a computer consists of...
Words: 649 - Pages: 3
...ERP Timeline Michael Benitez CMGT / 556 October 03, 2011 Jeffery Doolin Abstract According to Systems-ERP, ERP (Enterprise Resource Planning) “is the evolution of Manufacturing Requirements Planning (MRP) II. From business perspective, ERP has expanded from coordination of manufacturing processes to the integration of enterprise-wide backend processes. From technological aspect, ERP has evolved from legacy implementation to more flexible tiered client-server architecture” (History and Evolution of ERP). MRP’s contributions greatly impacted the modern business world as its concepts have been utilized to developed tools that will aid companies to cope with success. Although MRP is considered costly and requires a lot of man power but its benefits outweighed its disadvantages. Since man’s instinct is to move forward finding new ways to evolve same scenario happened with MRP solutions as new solutions was made to mimic and yet provides more benefits and flexibility, thus the birth of the evolved version of MRP II is ERP. According to Systems-ERP.com… (History and Evolution of ERP). ERP Timeline As time passes so as man’s ingenuity and innovation…throughout the year’s businessman, entrepreneurs, traders, business analyst and etc. are often struggling to find new ways to cope with the change of economy and its needs and to stay competitive amongst other companies. Those innovations that are called tools of the trade are often enhanced and/or sometimes replaced by new and...
Words: 1801 - Pages: 8
...Introduction and Abstract Copyright(c), 1984, Fred Cohen - All Rights Reserved This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper. The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]...
Words: 8970 - Pages: 36
...be mostly free the examples of the open source are linux operating systems like Ubuntu,Free BSD.The contrary of the opensource os are the regular copyrighted os and software where source code is not entitiled to be realsed and the os is completely copyrighted with the publisher like the windows and macos. Developping an Operating systems. An operating system is a software that will interact with the hardware resources of the computer and effectively use them inorder to input from the user/interface and get the desired results. Developping the early OS began in early 1950’s where the initial code is written in assembly language but soon after the evolution of C language most of the design for early unix is done in C language and the evolution lead to the opensource linux kernel which may or may not have used the complete unix kernel But linux is the one of the successful opensource operating systems that is still current. It has a lot of versions and ditributions. The developing of the os is a large typical process where 1000’s of line of code is written inorder to acces the hardware resources, the typical and main constarints are to effectively use the process, memory and...
Words: 1051 - Pages: 5
...Operating Systems ? Well, right off the top, as a consumer you have to appreciate the variety. The American consumer enjoys having choices. However, from the technical perspective the advantages and disadvantages of the numerous types have to be considered. Operating Systems are designed to have different applications pertaining to how they will be used. Many can do the same thing but some are just better than others at what they do. The UNIX operating system allows a number of users to log on at the same time. It is said to be a multitasking/multiprogramming OS, meaning it can run several task at the same time. Also being a multiprocessing system, it can also run several programs at the same time. UNIX is very versatile and it can be set up to support Windows systems and a variety of other systems. It also supports a variety of programming languages, e.g. HTML, C, C++, Java and Java Script, just to name a few. UNIX would be classified as an Enterprise Corporate level OS, and can be run on a mainframe computer (Dean, 2006). UNIX uses a command prompt to interface and communicate with the user and has no GUI. 2. Although Dos is the original foundation for Windows it was a difficult language to use, requiring the user to learn and memorize at least 200 commands. It is also a very limited OS in that it is a single-user, single-task system. Windows is actually a layer over Dos, and is not a true Operating System itself. However, it’s creation was instrumental...
Words: 1058 - Pages: 5
...Running head: UNIX vs. MS vs. MAC 1 CIS-155 Final - UNIX vs. MS vs. MAC UNIX vs. MS vs. MAC 2 Abstract This paper will explore the history of UNIX, Microsoft (MS), and Macintosh (MAC) operating systems. Not only will I discuss the history of these systems, but I will also dive into the pros and cons of each. The benefits of each over its rivals will also be discussed. Keywords: open source, UNIX, Windows, UNIX vs. MS vs. MAC 3 The topic of what operating system is best has been a long and heated one. But, in the long run, UNIX will beat its rivals in most categories hands down. As the reader will see throughout this paper, undisputed evidence will be presented that will detail exactly how UNIX based operating systems are superior. Operating systems (OS‘s) are a means for users to communicate with the computer. Each OS provides a set of commands for directing the operation of the computer. Without these operating systems to help as interfaces, each user would have to learn the command syntax, which can be very difficult. These operating systems can be menu-driven, which provides a set of menus and lets users choose desired functions from then, or they can be icon-driven, known as a graphical user interface (GUI). GUIs are very common these days and with them, users can choose an icon, usually with a mouse, to activate...
Words: 1794 - Pages: 8
...Internet Security Embry-Riddle Aeronautical University Table of Contents Abstract 3 Discussion 4 Background 4 Analysis 5 Conclusion 7 References 8 Abstract This paper focuses on five major areas of security issues on the Internet. Security concerns relate useful information to the average web surfer at home. There are tips on safeguarding one’s security and privacy over a network connection, plus some definitions of typical security problems individuals will come into contact with. The second focus of this paper includes the initial internet security measures. It will discuss the early security protocols and how technology has increased the security of the internet numerous times. Invention of internet security is the third topic of this project and focuses the invention and its impact on the Internet. The forth topic deals with the legal measures which have taken place regarding internet security issues. Finally, the fifth topic deals with the consumer privacy concerns, for the most part, people are becoming aware of internet security as online activities continue to skyrocket. As the technology becomes more available and easy to use, people seem to accept security risks in exchange for the convenience. Internet Security Since the early 1990’s, the solitary thing most people knew about internet security that there was a colossal computer network that had been inundated by a computer virus. Today it is difficult for anyone, to remember the...
Words: 1424 - Pages: 6
...UNIX /Linux versus MAC versus Windows Paper POS/355 March 11, 2013 Bhupinder Singh UNIX/Linux versus MAC versus Windows Paper Introduction Today we live in a world where technology is the way to go. Even in this century there are people that are still clueless on the operating system. It is different, exciting when a new and advance system comes out. But some of us are so confused when it comes to the basics of new technology. Operating systems are programs which manages the computer’s hardware. The systems provide a basic for the applications programs between the computer user and its hardware. When looking, there are so many different types of operating systems that are available. The four main operating systems that are used are Windows, Mac, UNIX, and Linux. For every computer there are many different items that make the system a whole. When it comes to the different operating systems there are different features available, even though when you think of computers a person might think security will all be the same but there are difference between each one. As you read more you will understand the security and the difference between a MAC, UNIX/LINUX and Windows systems and how each one works. Access control goal is to protect a resource from unauthorized access while facilitating seamless and legitimate use of such resources. Presently, each day users hold the need to access to those resources through a broad line of devices...
Words: 2503 - Pages: 11
...created under the direction of the U.S. Advanced Research Projects Agency (ARPA). Initially, it was a network used by four universities to share information and resources with each other. The Arpanet was the first ever network to use packet switching, a digital networking communication method vital to the existence of the Internet. It also implemented TCP/IP into its architecture. Slowly but steadily, the network grew and improvements were made. Branching out from the Arpanet were other networks including academic networks used by universities and also military networks used by the American government. The NSFNET (National Science Foundation Network) was one of the more popular networks, especially among academic users. The rapid growth and evolution of networks was increased dramatically, exceeding expectations, and not long after that, modeled closely after the Arpanet, the Internet we know and love was created. 2. Different Types of Operating Systems There are many kinds of operating systems out there. We know that different kinds of operating systems meet the needs of different groups of people with different types of requirements. The most popular operating systems out there are the Windows, Linux, and Mac...
Words: 1128 - Pages: 5
...operating system as a set of independent system servers using the primitive, generic services of a microkernel. Compared with traditional operating systems, the micro-kernel approach adds two new aspects to the low-level kernel foundation: distribution and subsystem support. In other words, this technology adds to the traditional monolithic architectures the necessary modularity, key to their evolution, introducing the object oriented approach to operating system design. The micro-kernel provides a virtual machine for processor use, memory allocation and communication between operating system components. This approach has been used in several key projects such as CHORUS (researched at INRIA, France, then developed and commercialized by Chorus Systems), Amoeba (Free University and Center for Mathematics and Computer Science, Amsterdam), MOS (Hebrew University of Jerusalem), Topaz (DEC/SRC), the V-system (Stanford University). The CHORUS product line includes the CHORUS Nucleus, a micro-kernel for core operating system services, and CHORUS/MiX, a binary compatible, multi-server UNIX System V implementation. Some of the critical aspects of a distributed operating system for high end architectures − to support such important trends as distribution, multiprocessing, and open systems − illustrated by CHORUS include: * Efficient low-level real time foundations. * Optimized interprocess and interprocessor communications and user-transparent distribution of resources...
Words: 908 - Pages: 4
...Introduction to Programming Dr. Bass Programming Languages have become very much improved in the last few decades. When computers were first created, languages were very focused on getting the most effective response from the computers while being limited by the hardware designs. As hardware has gotten better and faster, programming languages have developed right alongside of them. In 1972 a programming language called C was developed by Dennis Ritchie of Bell Labs. The reason for developing this was to improve upon other languages such as B and Pascal. C uses a lot of the same forms and functions as Pascal and was developed to be faster and more powerful. The only issue was that it was hard to read. C was also developed to work well with Unix. (Ferguson, 2000). In 1983 Bjarne Stroustroup developed C++ which was also known as “C with classes”. This improved C and moved toward object oriented programming. C++ has been considered the most popular programming language ever and is currently used in programs such as Adobe PDF Reader, Mozilla Firefox (web browser), and MS Office. (Anthony, 2001). The 1990’s saw the development of several languages such as Python, PHP, and Java. Developer Guido Van Rossum developed Python (named for Monty Python) to fix problems in the ABC language and it is used by YouTube, Google Search, and NASA (Anthony, 2001). PHP (which stands for Personal Home Page) was developed by Rasmus Lerdof to replace Perl scripts that were being used to maintain his...
Words: 473 - Pages: 2
...The Evolution of Operating Systems – Per Brinch Hansen (2000) Overall I found the paper to be quite informative especially as I had not been formally introduced to the history of operating systems from as far back as the 1950s. Early on in the writing and references, it is easy to see the characteristics of the Open Shop systems and the Batch processing systems as a “one computer for all” type of architecture and of particular interest for me was the massive scale of the expense (dollars) in terms of wasted computer time even though each user had only around 15 minutes to execute their programs. I could then see how the Atlas Supervisor, being called the earliest operating system made sense, as it was the first of its kind to explore concepts such as spooling, demand paging and supervisor calls, which we can see clearly exhibited in the operation of modern operating systems today. Most of us are familiar with the term spooling most commonly used in terms of printing in general or with a few other output devices that are much slower than our modern computers today. The concept of Timesharing which was proposed by Mc-Carthy in 1962 was also key in leading to much of our modern execution of multi-tasking and it was interesting to see how this developed from the demonstration of CTSS into the larger Multics File System at MIT which although it was not a huge success in its entirety, gave rise to the first hierarchical file system for both private and shared files. Unix, having...
Words: 1021 - Pages: 5
...Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 1 of 16 Annexure No. SCAA Dated BHARATHIAR UNIVERSITY, COIMBATORE – 641 046 M. Sc COMPUTER SCIENCE For School of Distance Education (Effective from the academic Year 2007-2008) Scheme of Examinations 31 J 29.02.2008 Year Subject and Paper I Paper I Paper II Paper III Paper IV Practical I Paper V Paper VI Paper VII Practical II Project Advanced Computer Architecture Computer Graphics & Multimedia Software Engineering Computer Networks Computer Graphics and Multimedia Lab Advanced Operating System Internet programming and Web Design Data Mining and Warehousing Internet programming and Web Design Lab Project Work and Viva Voce Total University Examinations Durations Max in Hrs Marks 3 100 3 100 3 100 3 100 3 100 3 3 3 3 100 100 100 100 100 1000 II For project work and viva voce (External) Breakup: Project Evaluation : 75 Viva Voce : 25 1 Anx.31 J - M Sc CS (SDE) 2007-08 with MQP Page 2 of 16 YEAR – I PAPER I: ADVANCED COMPUTER ARCHITECTURE Subject Description: This paper presents the concept of parallel processing, solving problem in parallel processing, Parallel algorithms and different types of processors. Goal: To enable the students to learn the Architecture of the Computer. Objectives: On successful completion of the course the students should have: Understand the concept of Parallel Processing. Learnt the different types of Processors. Learnt the Parallel algorithms. Content: Unit I...
Words: 3613 - Pages: 15