Comparative Analysis of Linux and UNIX Operating Systems - Report

Verified

Added on  2022/11/17

|4
|720
|91
Report
AI Summary
This report provides a comparative analysis of the Linux and UNIX operating systems. It delves into the concept of Information Flow Control within operating systems, emphasizing its importance for data tracking and security. The report highlights the implementation of information flow control in Linux using Linux Security Modules (LSM) and discusses its verification. It also examines the architectural differences, including file systems and process management. The report touches upon the stability, multi-tasking capabilities, and user interfaces of UNIX. Furthermore, it describes the role of the shell and kernel in the UNIX operating system, emphasizing their functions in command execution and system management. The references include works analyzing operating systems using virtual information, verifying the reliability of information flow control systems, and studying networks within the Linux environment.
Document Page
Running head: OPERATING SYSTEMS
OPERATING SYSTEMS
Name of Student
Name of University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1OPERATING SYSTEMS
The operating systems that had been chosen for this particular assignment includes Linux
operating system and UNIX operating system.
The articles discuss regarding the Information Flow Control which is present within
the operating system tends to level numerous properties that are interesting and are vital
concept of research since a long time. This article further provides evidence regarding the
fact that any implementation cannot be carried out in an effective manner if there is no
strategy for appropriately and correctly track the data flow that occurs within the system. The
present implementation for Linux are carried out on the basis of the framework of Linux
Security Modules, this particular framework helps in implementing hooks at certain areas
within the code where a specific security mechanism might interpose a particular decision for
execution. works that had been performed previously, provide data regarding the fact that
verification of LSM usually contribute in addressing the access control and work does not
rise any question regarding the reliability of the data flow control systems which is built
within LSM (Georget, Jaume & Tronel, 2017). It has been further found that for Linux
Operating System along with its modularized components in it, out degree tends to follow a
certain distribution, the in degree tends to follow a certain law distribution. The article tends
to couple the correlations of numerous components within LOS from numerous aspects of
function and topology. The components that are used for process management represents
contrary phenomenon. In the trial of investigating the impacts of the systems failures on
numerous networks (Wang, Chen & Xiao, 2016). That had been traced from normal failure
status of the Linux Operating System.
Compared to Linux Operating System, the Unix Operating System provides a filing
system helps in supporting objects that are character arrays, these arrays have different size.
Besides this particular abstraction, a certain database management system would provide high
level of objects that it needs. Compared to Linux, UNIX is a more stable operating system,
Document Page
2OPERATING SYSTEMS
multi-tasking, multi-user for numerous servers, laptops and desktops. UNIX system has
graphical user interface which is similar to the Windows that helps in proving an environment
that is suitable for using. The shell tends to act in the form of an interface among the kernel as
well as the user. When a particular user tends to login program contributes in checking
usernames as well as password and hence start a different program which is known as shell.
The kernel in the UNIX operating system is considered as the hub of operating system
(Brooks, Deleon & Combs, 2018). This is because, it tends to allocate time as well as
memory to programs and hence handles numerous file stores as well as communication in the
response to numerous calls of systems. Shell tends to keep a particular list of commands that
a certain user has typed. In case the user needs to repeat a certain command, he could make
use of the cursor keys for the purpose of scrolling down as well as up the list.
Document Page
3OPERATING SYSTEMS
References
Brooks, D., Deleon, A., & Combs, A. (2018). Analyzing Operating Systems Using Virtual
Information. Recent advances in software engineering and computer science, 6(1).
Georget, L., Jaume, M., Tronel, F., Piolle, G., & Tong, V. V. T. (2017, May). Verifying the
reliability of operating system-level information flow control systems in linux.
In 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in
Software Engineering (FormaliSE) (pp. 10-16). IEEE.
Wang, H., Chen, Z., Xiao, G., & Zheng, Z. (2016). Network of networks in Linux operating
system. Physica A: Statistical Mechanics and its Applications, 447, 520-526.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]