...Individual Paper Jose Castro Lopez POS355 March 27, 2014 Vinod Kandanchathanpilli Individual Paper Given that you need to support 5000 users, that means that it is most likely a big company or an enterprise you are working for, is doing very well or is well off that it has that many employees. Although most of the UNIX systems depend on the file access control (FAC) scheme that it was originally introduced with, each person who had a login name has a different user identification name or aka user id. Lets take the user name jrcas872 for example. This user name is a member of a primary group, and may also be associated with other groups within the operating system when a file is created within one of the users account, it stamps the users name on that file. So let us say that jrcas872 created a file named “Suicide Prevention”, and jrcas872 was the master account on this system. He only wants a certain 4,990 individuals to access the account, there are two ways someone can go about this. Lets say that jrcas872 has 5000 people in his system, and only wants all but ten to be able to access his file. Jrcas872 might want to begin by creating a list of names of the 4,990 people he want them to have access to his file. A name list is what it sounds like, a list of names that are authorized to enter and see that one file, make changes and save it. Sort of like a share drive. That is basically the same thing, you have a file that you place on a drive that anyone can access, but...
Words: 725 - Pages: 3
...Software development is an industry still in its infancy. Developing operating systems, the essential program for any computer system, is still evolving as the industry continues to grow. Software development has a unique attribute that sets it apart from other industries. Software can be developed once and then replicated for virtually no cost to be distributed to end users. All operating systems currently on the market have been created as a result of open- or closed-source software development. The major difference between the two development philosophies is the privacy of the source code, particularly whether or not it is available to the public for evaluation, modification, and redistribution. Closed-source operating systems like Microsoft’s Windows and Apple’s Mac OS are more widely used in homes and businesses desktop and laptop computers. Although not as readily adopted, open-source operating systems offer viable alternatives to closed-source. Each has its own advantages and disadvantages associated with them. Closed-source software development more closely resembles the business philosophy used by other industries. Closed-source operating systems are developed by an individual, or team, and made available for purchase to the public. The source-code, however, is never revealed to the public. The product purchased is merely an executable file. The final product cannot legally be modified, sold, or distributed without permission from the copyright owner. In essence, purchasing...
Words: 1197 - Pages: 5
...File Management POS355 May 30, 2012 File Management When implementing a networked information system that will support thousands of users, it is important to consider which files will need restricted access, and which will be open to all users. The purpose of this essay will explore how a Unix system configured to support five thousand users is able to allow only four thousand nine hundred ninety of those users access to a single file. Unix File Access Control Although Unix has evolved over the years, even the most up to date system relies quite heavily upon the originally introduced file access scheme found in the very early versions of Unix. The core of this functionality essentially states that there are three possible permissions any user can have with a single file: read, write, and execute. Permissions for each of these actions are stored with the file’s inode and granted for three groups: the file owner, member’s of the file’s group; and everyone else. All of these permissions are identified in the first nine bits of the file’s twelve protection bits. The last three bits of the file’s protection bits indicate special behavior. The first two bits tell Unix whether to duplicate the permissions granted for the file owner, or file group, upon execution, respectively. The third bit represents a sticky bit that was originally used in early versions of Unix, but has since been decommissioned. This permission essentially told the operating system whether to keep...
Words: 580 - Pages: 3
...Huffman Trucking Robert Bennett POS/355 July 2, 2012 Ashok Rao Huffman Trucking Huffman Trucking is a company founded in Cleveland, OH in 1936 with only a single truck. The company’s growth came as a direct result of World War II as it became a carrier for factories from the Midwest to the East Coast ports. Now Huffman Trucking employs over 1350 people and has facilities in Ohio, California, Missouri and New Jersey. Within the offices and plants in each state the company uses computers running both Mac OS X and Windows OS which varies from Windows 3.X and 98 through XP and XP Pro. The only computers that are using Mac OS X are ones used by the marketing department are most likely used for photo/video editing and artwork for company advertising. I believe that windows operating systems were chosen because of the ease of use and compatibility with windows corporate servers. The implications of using mostly Windows computers are that you have a variety of communication options between clients. Windows computers have features such as peer-to-peer networking support for users to be able to share resources such as folders, printers, and peripherals, strong security with built in Kerberos support which allows fast and secure single logon to Windows 2000 and future servers. The last major advantage of Windows computers is in regards to mobility, computers running Windows OS offer an amazing remote desktop capability for users traveling without...
Words: 647 - Pages: 3
...Personal Computers v Mainframes James Ratti POS355 April 9, 2012 John Stewart Abstract The world of Information Technology covers many variations of computers, from smart phones to supercomputers like IBM’s Watson. While smart phones and tablets have are becoming more popular, there are two venerable machines that are at the heart of computing, the Personal Computer and the Mainframe. With advances in technology the lines between the two are fading, but will never disappear completely. Personal Computers v Mainframes The information systems backbone of many companies is their mainframe computer. The mainframe computer is a large centrally located machine capable of processing multiple very large transactions at the same time. Users access these large computers by workstations that can resemble a personal computer, but are often a dumb terminal. What is a Mainframe and how would you define what it is? It really comes down to centralization and distribution rather than computing power (Oman, n.d.). With ever increasing technologies, the actual computing power of Personal Computers is rivaling that of Mainframes, however, the Personal Computer becomes limited when it comes to how many users can log on to it and how many jobs can run. The huge amounts of data that can be processed by many more users than can be logged into a personal computer and the ability of the mainframes users to be located around the globe and stay secure are all things that define a...
Words: 752 - Pages: 4
...Week 2 File Management Paper POS/355 Joey Turner JR Professor Alicia Pearlman Most UNIX systems that you will come across are usually based on the control scheme of file access associate with early versions of the UNIX system. In UNIX, every individual user is assigned their own unique user ID that they may use to access files saved in memory. Users are identified by being a part of a private group or various groups which can be identified then by their group ID. When a file is created in LINUS it is identified as being owned by a particular user and marked with the user that created the file’s user id. The file also belongs to whatever group the user is associated with as well or else the group of its parent directory but only if that parent directory has SetGID permission configured. SetGID (SetGIUD) are access rights flags that allow users to run executable (.exe) files with the permission of user ids or group id. Protection bits in sets of twelve are associated with each file as well. The owner ID, group ID, and protection bits are part of the file’s index node-which are a data-structure used to represent a file-system object which can be a file or file directory. There are 9 of the 12 protection bits that are advocated to the user and group ids owners of the files which control reading, writing, and execute permissions. These nine protection bits then form a system of hierarchy of user id, group id, and all others. The hierarchy is also coupled with the...
Words: 884 - Pages: 4
...Unix Access Heather Flores POS355 Sept 8, 2014 Alicia Pearlman Unix Access In the Unix system it is “very simple to set permissions via groups or users at the administrative level” (Finch, 2014). This allows the system administrator the ability to control access to files, folders even whole directories based on the needs of the company and the appropriate tier of access for the user. Given the scenario presented: “a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX®?” There are a couple of options available to the system administrator. The first option is to allow access to all users and then create a group of the users that do not need access and deny them access to the directory that contains the file. For this, though, the best practice in Windows is always to create permissions at a directory and group level. “When you start putting permissions on individual files and giving permission to individual users things can get dicey in a large environment”. (Finch, 2014) Another option, depending on where those users are located in your environment is that it might be easier to deny access to that file on the network level by making it so they can not even see the directory the file is in. There are a couple of different ways to accomplish that. Denying access at the network level...
Words: 338 - Pages: 2
...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing protection...
Words: 526 - Pages: 3
...The Five State Processor Model Michael K. Shannon POS355 October 15th, 2014 Gary Teed The Five State Processor Model Our lives have become very dependent on computers. We use them for EVERYTHING from playing games, being the brains behind our phones to running our automobiles. As complicated as these have all become they all still depend on a microprocessor to make the decisions happen and all microprocessors have the same five state model used to make decisions on what runs when. These five states are new, running, ready, blocked, and exit (Sinapova, 2001). This paper will cover provide a brief explanation of each of these states. The first state we will cover is the “new” state. The “new” state can simply be described as what a process becomes when it is first accessed by the user. You can think of this as when you double click an icon on your desktop. When the user double clicks the icon the processors receives a request to start up a new process and depending on what the processor is already doing will depend on how quickly it answers the request to start that application. The second state we will cover is the “running” state. The “running” state can be thought of as a process that is currently being attended to by the processor. A simple example of this would be using the calculator function of the operating system and having it execute a simple math function. The third state we will cover is the “ready” state. The “ready” state can simply be thought...
Words: 509 - Pages: 3
...Memory Management Paper Edward Mellon POS355 6/10/13 BHUPINDER SINGH There are several policies associated with memory management, and in order for it to function properly, there are several requirements that need to be met. First is relocation. When a source code program is translated into object code by a translator or interpreter or assembler, it does not know by itself where the code will be loaded when the program is run. It may actually occupy a different area of memory each time the program is run. A program can be swept in and out of memory; it may occupy different address locations at different times. This is because the translator cannot assign absolute physical addresses to instructions and data values in programs, but once the program is run, the CPU and OS must be able to reference those physical addresses. With relocation, the logical referenced addresses are converted to a physical address so that the code and values can be seen. Next is protection. Program access space includes process control information, program code, data segment and stack or heap space. The operating system must protect the address space of a process from that of another process. It must be able to block unauthorized access...
Words: 643 - Pages: 3
...Running head: CLIENT SERVER PROS AND CONS 1 Client Server Pros and Cons Henry Ford POS355 October 6, 2014 Mr. Kernan CLIENT SERVER PROS AND CONS 2 Client Server Pros and Cons Computer Networking has a vast amount of attributes. These attributes allow a system to not only function in a specific way but they also add definition to the system which in turn creates a specific identity. One of the identities of a Network is a Client/Server Network. The term "client server" defines a network system where computers known as servers are used. The Servers create central management. This form of management is used to access the network. Each network has a plethora of segments that are used for resources and data storage. These Network applications are used in Commercial applications more so than anywhere else. Since there are a variety of Network configurations, the end user has to determine which one of the specific Network features they want and also to consider the advantages and disadvantages of each system. Even though the Client/ Network architecture is the most desirable for most commercial businesses, there are certain disadvantages in this system. “The reason that client/server computing is still growing in popularity is because top management believes that it will save them money, and end-users believe that it will solve many of their computing problems.” (Windsor, 2011) Client/Server Definition: This type of computing provides the necessary comingling of personal computers...
Words: 854 - Pages: 4
...Faults within Windows OS POS355 August 24, 2015 Dr. Boyd Faults within Windows OS The security within an operating system is vital to the overall operation of your operating system, and in this case even more important to Windows OS because of how it is used across various platforms. The security within Windows is provided to protect your operating system from any unwanted visitors whether it be accidental or not (Stallings, 2015), but not all security is perfect. Sometimes security contains flaws and some flaws are bigger than others and some flaws can destroy your system from the inside out. These faults can be patched and some are so minute that they can be resolved with something as little as switching the settings. Switching the settings sounds like something that would never be a fault, but what happens when the fault that was created was man made. The fault that lies within Windows was a nuisance but the real issued lied with how many users decided to handle that nuisance. There are three different types of hackers trying to gain access to your system. These three hackers are called the Masquerader, the Misfeasor and the clandestine user. A Masquerader is someone who is not authorized but gains access and infiltrates your systems access controls to exploit your account ("Windows 7 Known Security Flaws", 2009). A Misfeasor is a person who has been granted access to data and resources but misuses and takes advantage of the information he has received ("Windows 7...
Words: 984 - Pages: 4
...UNIX/Linux versus Mac versus Windows Rough Draft Annette Freshwater, POS355 November 4, 2013 Alicia Pearlman UNIX/Linux versus Mac versus Windows Final In today’s world of technology creation, development, and enhancement there are key factors to take into consideration. The choice of operating systems can determine the software and hardware utilized, the applications of the devices or programs, and determines the demographic, which will use the products. However the ever-changing field of technology has become more user-friendly, compatible, and more accepted in main stream than before. The main operating systems employed today are as follows: UNIX/Linux, Mac, and Windows. We will explore the various aspects of key components in these operating systems, memory, process, and file management along with the security of each system. The comparison of each system will determine the operating system best suited for the needs of our creations, projects, and improvements to the technology of the past, present, and future. MEMORY MANAGEMENT Memory management in multiprocessor systems is essential in executing several processes simultaneously. The multitasking of a system aids the user in accomplishing his or her task more efficiently than with a single processor system, which is important in the current climate of today’s multifaceted mix of professional and personal world. Why choose UNIX/Linux, Mac, or Windows to develop a device, product, or program? The...
Words: 2557 - Pages: 11
...NAME: David Sauerbrei POS355 Week 5 Final Exam This is an open-book, open-notes exam. You may consult the textbook, lectures and PowerPoint slides, but no other source. This exam must be an individual effort. Each question is worth one-half point. The total point value of this exam is 20 points. Please post your completed exam in the Assignments area by 11:59 p.m. Monday, May 14. 1. The operating system serves as an intermediary between the user and the computer hardware. (True / False) ANSWER: True 2. The operating system serves as an intermediary between a process and the computer hardware. (True / False) ANSWER: False 3. This is the brain of a computer. a. smart card b. artificial intelligence c. logical address d. read-only memory e. central processing unit ANSWER: e 4. When a single user runs two copies of the same program concurrently (for example, two instances of NotePad), two processes are created. (True / False) ANSWER: True 5. The following operating systems were developed by Microsoft: a. Mac OS b. Linux c. Solaris d. all of the above e. b and c only f. none of the above ANSWER: f 6. A _______________ operating system supports a system that has rigid time requirements on the CPU and data flows. ANSWER: Real-time 7. Time-sharing requires the following. a. process scheduling b. process protection c. deadlock...
Words: 1596 - Pages: 7
...Introduction The most commonly known Operating Systems (OS) today are UNIX, Linux, MacOS, and Windows. These operating systems all behave in their own way and similar in others. This paper will discuss this comparison of how these operating systems utilize memory, process handling, file management, and security. Memory Management Each operating system is required to allocate a certain amount of memory for the operating system itself for the processes that are being used or executed. There are two places memory exists: physically on the motherboard of the computer and within the operating system itself. When the operating system dynamically divides the memory usage between these two areas, this is called memory management. Each operating system manages memory different from the others; however they all follow some basic rules of memory management. All of the operating system’s memory management in general follows these requirements: relocation, protection, sharing, logical organization, and physical organization (Stallings, 2015). Relocation of memory is the process that allows the operating system to move a process or file from physical memory to virtual memory and back again, depending on the need for that data. Virtual memory exists within the operating system which uses the hard drive to store temporary information and physical memory is located on the motherboard of the computer. While the process is in memory, protection of that area needs to be enabled to...
Words: 2918 - Pages: 12