MN404 Fundamentals Assignment: Operating Systems Role and CLI Analysis

Verified

Added on  2023/06/07

|12
|1944
|414
Homework Assignment
AI Summary
This assignment provides a comprehensive overview of operating systems and their interaction with the command line interface (CLI). It begins by defining the roles of operating systems in client, server, and mobile environments, highlighting the features of Windows, Linux, and Android, respectively. The assignment then demonstrates practical OS administration tasks using CLI commands, including checking remote host availability, monitoring CPU usage, assessing drive space, determining system architecture, and counting word occurrences. Several CLI commands are executed and explained with screenshots, showcasing their functionalities in managing and interacting with the operating system. Desklib offers a platform for students to access this and other solved assignments.
Document Page
Running head: OPERATING SYSTEM AND PROGRAMMING
Operating System and Programming
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1OPERATING SYSTEM AND PROGRAMMING
Table of Contents
Section 1: Operating System............................................................................................................................2
Client System:...............................................................................................................................................2
Server System:..............................................................................................................................................2
Mobile OS System:.......................................................................................................................................3
Section 2: OS Administration using Command Line Interface (CLI)..................................................................3
I.i Remote Host:............................................................................................................................................3
ii. CPU Usage:................................................................................................................................................4
iii. Drive Space Checking:..............................................................................................................................4
iv. Bit architecture checking:........................................................................................................................5
v. Counting Word Occurrence:.....................................................................................................................5
II. a. Executing “% cat /etc/hosts cat?” command:.......................................................................................6
b. Executing “% echo "Home Directory Is home" uppercase $HOME?” command:.....................................7
c. Executing “% who | wc” command:..........................................................................................................7
d. Executing “% who > logged.users” command:..........................................................................................8
e. Executing %date "+%m/%d/%y" command:.............................................................................................8
Executing %date "+%Y%m%d" Command:...................................................................................................9
Executing %date +'%-4.4h %2.1d %H:%M' Command:...............................................................................10
References:.....................................................................................................................................................11
Document Page
2OPERATING SYSTEM AND PROGRAMMING
Section 1: Operating System
Client System:
The client system is the group of client or can be an individual system also. By the meaning of group
it mainly indicates an organization, community or a business. The client system mainly used for
communicating with a server. To elaborate the client system further in this case the Microsoft Windows
operating system will be used because the Microsoft Windows has all the features which is required to be
proper client system. The features are discussed below:
A client system may need to serve many users. To serve many users in a single system different
accounts are needed and Microsoft Windows supports this multi-user feature [1].
Communicating with the server properly is the main task of any client system. Windows operating
system does this job petty well.
To meet all the requirement of the server the client OS need to handle all the resources within the
system properly. Windows OS is capable of this feature.
Microsoft Windows can exchange the messages and resources with the server system. This is a
basic feature of every client base OS system.
The Windows OS is capable to process the data without the help of server system.
Server System:
The server system works on the client-server architecture. The main aim of the server system is to
communicate with the client and handling the requests of the clients [2]. This type of system is designed to
communicate with the server. To describe the server system properly the Linux system is selected in this
case. The main features of the Linux system as a server are:
The Linux OS is capable to access the both command level interface and the graphical user level
inter face [3].
The Linux system is able to handle multiple clients at same time and can reply them with the proper
messages and resources.
The Linux can provide the centralized system which is a must have feature of the server system.
This system is used for managing client system, administrative processes and for the security
services [10].
The Linux can run on the solely on the commands. This can be useful for most of the cases for a
server system.
The security level of the Linux system is high and the internal configuration of the network,
hardware and software is also secure for a proper communication method.
Document Page
3OPERATING SYSTEM AND PROGRAMMING
Mobile OS System:
The mobile OS system is user friendly for most of the cases and designed to run on the low
configuration. Most popular mobile OS is the Android operating system. The main features of the android
is:
As the Android OS is specially designed for the general use purpose the security level of the
Android OS is much higher to protect the privacy of the users.
The android OS is stable in the sense because the owner of it, Google LLC is always working on it to
introduce new features and for fixing the bugs.
The Android OS is able to hide the inner implementation as it uses java for some core functions.
The java has the abstract class which can help to hide implementations [4].
The Android OS is portable in the sense that beside in the mobile the X86 version of the android is
able to run on the desktop systems.
The Android OS can manage the memory of the system itself because it is optimised for doing that.
Section 2: OS Administration using Command Line Interface (CLI)
I.i Remote Host:
To check the availability of a remote host the ping or telnet command can be used [5].
(Figure 1: Checking Remote Host)
(Source: Created by the Author)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4OPERATING SYSTEM AND PROGRAMMING
In the above screenshot it can be seen that the connection with the remote host is lost so, it is
showing network is unreachable. For this test Google public DNS server is used.
ii. CPU Usage:
To know the CPU usage of different processes “top” command is used [6].
(Figure 2: CPU Usage)
(Source: Created by the Author)
In the above screenshot it is shown that by using the top command all the process related
information is displayed. Also, the CPU utilization part is shown.
iii. Drive Space Checking:
The “df” command shows the total hard drive space used and also the available space [7].
Document Page
5OPERATING SYSTEM AND PROGRAMMING
(Figure 3: Drive Space Checking)
(Source: Created by the Author)
iv. Bit architecture checking:
To check whether the system is 32 bit or 64 bit, the “uname –m” command is used [8].
(Figure 4: Machine Architecture)
(Source: Created by the Author)
Document Page
6OPERATING SYSTEM AND PROGRAMMING
Analysing the above screenshot it can be stated that the above operating system is running on X64
architecture. It is showing X86_64 means it is capable to run both X86 and X64 application which is
designating that the above operating system is based on the X64 architecture.
v. Counting Word Occurrence:
To count the total occurrence of a particular word the “grep” command is used [9].
(Figure 5: Counting Word Occurrence)
(Source: Created by the Author)
The above screenshot is showing that the file is containing total 11 numbers of “UNIX” word in that
file. Here grep is code “UNIX” is that specified word and “file.txt” is the file on which code is executed.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7OPERATING SYSTEM AND PROGRAMMING
II. a. Executing “% cat /etc/hosts cat?” command:
(Figure 6: Executing “% cat /etc/hosts cat?” command)
(Source: Created by the Author)
b. Executing “% echo "Home Directory Is home" uppercase $HOME?” command:
(Figure 7: echo "Home Directory Is home" uppercase $HOME)
(Source: Created by the Author)
Document Page
8OPERATING SYSTEM AND PROGRAMMING
c. Executing “% who | wc” command:
(Figure 8: Executing who | wc command)
(Source: Created by the Author)
d. Executing “% who > logged.users” command:
(Figure 9: Executing “% who > logged.users” command)
(Source: Created by the Author)
Document Page
9OPERATING SYSTEM AND PROGRAMMING
e. Executing %date "+%m/%d/%y" command:
(Figure 10: Executing %date "+%m/%d/%y" command)
(Source: Created by the Author)
The above code is displaying the date of the system.
Executing %date "+%Y%m%d" Command:
(Figure 11: Executing %date "+%Y%m%d" Command)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10OPERATING SYSTEM AND PROGRAMMING
(Source: Created by the Author)
The above code is also showing the date of the system by in different format.
Executing %date +'%-4.4h %2.1d %H:%M' Command:
(Figure 12: Executing %date +'%-4.4h %2.1d %H:%M' Command)
(Source: Created by the Author)
The above command is showing the time of the system.
Document Page
11OPERATING SYSTEM AND PROGRAMMING
References:
1. Leigh, Jessica W., and David Bryant. "popart: full-feature software for haplotype network
construction." Methods in Ecology and Evolution 6, no. 9 (2015): 1110-1116.
2. Vokorokos, Liberios, Anton Baláž, and Norbert Ádám. "Secure web server system resources
utilization." Acta Polytechnica Hungarica 12, no. 2 (2015): 5-19.
3. Sobell, Mark G. A Practical Guide to Fedora and Red Hat Enterprise Linux. Pearson Education, 2014.
4. Arzt, Steven, Siegfried Rasthofer, and Eric Bodden. "Instrumenting android and java applications as
easy as abc." In International Conference on Runtime Verification, pp. 364-381. Springer, Berlin,
Heidelberg, 2013.
5. Yan, Hao, Jiguo Li, Jinguang Han, and Yichen Zhang. "A novel efficient remote data possession
checking protocol in cloud storage." IEEE Transactions on Information Forensics and Security 12,
no. 1 (2017): 78-88.
6. Felter, Wes, Alexandre Ferreira, Ram Rajamony, and Juan Rubio. "An updated performance
comparison of virtual machines and linux containers." In Performance Analysis of Systems and
Software (ISPASS), 2015 IEEE International Symposium On, pp. 171-172. IEEE, 2015.
7. Merkel, Dirk. "Docker: lightweight linux containers for consistent development and
deployment." Linux Journal 2014, no. 239 (2014): 2.
8. Bates, Adam M., Dave Tian, Kevin RB Butler, and Thomas Moyer. "Trustworthy Whole-System
Provenance for the Linux Kernel." In USENIX Security Symposium, pp. 319-334. 2015.
9. Barrett, Daniel J. Linux Pocket Guide: Essential Commands. " O'Reilly Media, Inc.", 2016.
10. Silberschatz, Abraham, Peter Baer Galvin, and Greg Gagne. Operating system concepts essentials.
John Wiley & Sons, Inc., 2014.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]