Sie sind auf Seite 1von 60

TOWERDS HUMANITY

Module Title & Code Operating Systems (AICT004-3-2) Intake Code: DF10A1ICT Hand Out Date: 4-November-2010 Submission Date: 3-January-2010 Lecturer: Mr. Kolitha Gunarathna Operating System: Kubuntu Version: 9.10 Submitted By: Birendra Herath (CB004140) Viraj De Silva (CB004078) Malith Waniganayke (CB004144)

KUBUNTU

Page 1

1 2 3

No

KUBUNTU

Birendra Herath Malith Waniganayake Viraj De silva Research Investigation (30) Installation (20) Documentation (10) Referencing (10) Group Marks (70) Analysis (15) Presentation (15) Ind. Marks (30) Total (100) and

Team Member Names TOWERDS HUMANITY

Page 2

TOWERDS HUMANITY

Abstract
The operating system which we have used in this assignment is Kubuntu 9.10. This is an open source operating system based on Linux, and it is free of charge with lot of community help available to the user, which is the main object of this operating system. Kubuntu requires low memory and space. The main advantage in this operating system is it is less vulnerable to virus compared to Microsoft Windows.

Kubuntu releases a new version every 6 months with all their bugs fixed, and also they provide updates to the user to make the operating system efficient.

Kubuntu operating system is freely available in the Kubuntu website any user can download and its free of charge plus Kubuntu deliver their CD to your door step free of charge worldwide. Kubuntu has provide every possible state free of charge to the user.

KUBUNTU

Page 3

TOWERDS HUMANITY

Acknowledgement

We would like to thank Ms. Kolitha Gunarathna, our lecture for his valuable support, advices and guidance during the project. Without his supervision I we will not be able to finish this project during this time period. Without his supervision this project would not have been a success and we will not be able to finish this project during this time period. We would also like to thank APIIT (Asia Pacific Institute of Information Technology) who helped us during the thesis. We would like to dedicate this study to them as an indication of their significance in this study as well as in our lives.

KUBUNTU

Page 4

TOWERDS HUMANITY

Table of Contents
Abstract .................................................................................................................................................. 3 Acknowledgement ................................................................................................................................. 4 Kubuntu, making your PC friendly ..................................................................................................... 7 1.0 Research and Investigation .................................................................................................. 7

Philosophies of Kubuntu. ............................................................................................................... 8 2.2.5 Process scheduling algorithm...................................................................................................... 19 2.3 Deadlock Management .................................................................................................................. 21 2.3.1 What is a Deadlock? .................................................................................................................21 2.3.2 Conditions for Deadlock. ..........................................................................................................22 2.3.3 Methods for Handling Deadlocks.............................................................................................22 2.3.4 Deadlock handling in Kubuntu .................................................................................................24 2.3.5 Ostrich Algorithm .....................................................................................................................24 2.4 Memory Management .................................................................................................................... 25 2.4.1 Memory management in Kubuntu ..........................................................................................25 2.4.3 Physical Memory Management in Kubuntu ............................................................................25 2.4.4 Algorithm used in memory management in Kubuntu .............................................................26 2.5 Virtual Memory Management ....................................................................................................... 27 2.5.2 Virtual memory Management of Kubuntu ..............................................................................28 2.5.2.1 Paging of Kubuntu .................................................................................................................28 2.5.2.2 Swapping of Kubuntu ............................................................................................................29 2.6 Secondary Disk Scheduling Management ...................................................................................... 30 2.6.1 Why is a Secondary Disk Scheduling Management necessary?...............................................30 2.6.2 How can the efficiency of how the hardware is used be improved? ......................................30 2.6.3 The Completely Fair Queuing (CFQ).........................................................................................31 2.6.4 Analyzing Completely Fair Queuing .........................................................................................31 2.7 System Administration and support .............................................................................................. 32 2.7.1 Logs and Scheduling .................................................................................................................32 2.7.2 Systems Logs ............................................................................................................................... 33 2.7.3 GRUB 2 (Grand Unified Bootloader) ........................................................................................35 2.7.4 Systems Maintenance ..............................................................................................................35 KUBUNTU Page 5

TOWERDS HUMANITY
2.7.5 Data Back Up .............................................................................................................................. 35 2.7.6 Software Management ............................................................................................................36 2.8 Recovery strategies ........................................................................................................................ 36 2.8. 1 Tools used by Kubuntu for their backup .................................................................................37 2.9 Security Strategies ......................................................................................................................... 38 2.9.1 User Management ...................................................................................................................39 2.10 Standard Support ......................................................................................................................... 43 2.10.1 Access Free Documentation ..................................................................................................43 2.10.2 Community Help ....................................................................................................................43 2.10.3 Buy Professional Support Services .........................................................................................43 2.10.4 Technical Answer System.......................................................................................................44 3.0 Installation ..................................................................................................................................... 45 4.0 Limitations/Extensions ................................................................................................................... 50 4.1 Extensions ...................................................................................................................................50 4.2 Limitations...................................................................................................................................50 5.0 Conclusion ...................................................................................................................................... 51 6.0 Work Load Matrix .......................................................................................................................... 52 6.0 Gantt Chart..................................................................................................................................... 54

KUBUNTU

Page 6

TOWERDS HUMANITY

Kubuntu, making your PC friendly

1.0

Research and Investigation

1.1 Introduction

Kubuntu ("towards humanity) is a user-friendly Linux based operating system, which started with Linux 2.6.222 and utilizes the KDE, which was first released in April 2008. Kubuntu is an official project of Ubuntua complete implementation of the Ubuntu OS led by Jonathan Riddell (an employee of Canonical Ltd.) and an army of developers.A new release is made every 6th months, releases is supported for 18 months. However, Kubuntu uses KDE instead of GNOME for Ubuntu. The main goal of Kubuntu is to be a great integrated Linux distribution with all of the great features of Ubuntu, but based on KDE. (The official Ubuntu Book. 2008)
KUBUNTU Page 7

TOWERDS HUMANITY Kubuntu is built on the solid and advanced base of Ubuntu, the Kubuntu team aims to create a distribution that provides an up-to-date and coherent GNU/Linux system for desktop and server computing. Kubuntu includes a number of selected packages from Ubuntu and is based on Debian's powerful APT package management system. APT allows easy installation and clean removal of programs, as well as automatic download of extra packages to satisfy dependencies. (About Kubuntu. 2010)

Philosophies of Kubuntu.
Make the very best work available to everyone on the same free terms and conditions without charging any extra fee.

Includes the very best translations and accessibility infrastructure that the Free Software community has to offer and to make Kubuntu usable by as many people as possible.

Free software and open source development and which encourage people to improve the operating system and pass it on.

1.2 Software Requirements


Kubuntu contain same software requriments as ubuntu, there is only one software that differs from ubuntu that the KDE, Ubuntu does not contain KDE it uses a different software instead o KDE
KDE Kubuntu 9.10 includes the latest KD 4.5 which creates an user friendly environment and some for additional requirements. (ked.org)

Application development with Quickly Quicky makes it easy for developers to make new applications for Kbuntu. (ubuntu.com)

KUBUNTU

Page 8

TOWERDS HUMANITY
Ubuntu One Can use it to back up, store, synchronize and share your data with other Kbuntu One users.(ubuntu.com)

Linux kernel 2.6.31 Kbuntu 9.10 RC includes the 2.6.31-14.48 kernel based on 2.6.31.1. (ubuntu.com) GRUB 2 by default

iSCSI installation The iSCSI installation process has been improved, and no longer requires iscsi=true as a boot parameter. (ubuntu.com) AppArmor AppArmor in Kbuntu 9.10 RC features an improved parser that uses cache files, greatly speeding up AppArmor initialisation on boot. (ubuntu.com)

1.3 Hardware requirements


Minimum System Requirements for Kubuntu This requirements will be lowest hardware requirements that the operating system will be able to run, but with this minimum requirements the performance of the os will not be guaranteed and the os want be able to give its best performance to the user
Pentium 233 - megahertz (MHZ) processor 4GB of hard disk space 128 MB of RAM Video adapter and monitor with Super VGA (640 x 480)

(Nicks.J . 2010)

Recommended Kubuntu system requirements


KUBUNTU Page 9

TOWERDS HUMANITY
Using the hardware mention below kubuntus performance would be better, but it requires the futures such as visual effects.
Pentium 300-megahertz (MHZ) processor 8 GB of hard disk space 256 MB of RAM Video card that supports a resolution of 640 x 480 Motherboard architectures can be Intel x86 and AMD64

(Nicks.J. 2010)

Recommended for visual effects


With the following requirement it will be easy or the user and the performance will be also go & without any interruption user will be able to enjoy and work in Kubuntu GUI environment.

1.2 GHz x86 processor 384 MB of system memory (RAM) Supported graphics card

(Nicks.J. 2010)

KUBUNTU

Page 10

TOWERDS HUMANITY

2.0 Analysis
2.1 User Interface 2.1.1 User interface
A user interface describes any mechanism by which a human interacts with a machine or computer. (McGee, 2010) Generally, the term refers to the method by which a person interacts with a computer. In this area, a user interface may not simply refer to the mechanism of interaction, but the program that allows it as well. (McGee, 2010) Mainly there are three types of user interfaces in a computer. Command line Interface (CLI) Graphical user Interface (GUI) Menu Driven Interface (MDI)

These three interfaces in general use several components of the computer to get the inputs and to display the output. The keyboard and the mouse are mainly used to get the information in to the computer. The primary output device would be the monitor. In some rare cases it would a device like a projector. Command Line Interface (CLI) A means of communication between a program and its user, based solely on textual input and output. Commands are input with the help of a keyboard or similar device and are interpreted and executed by the program. Results are output as text or graphics to the terminal. (Juergen, n.d) In this interface the users are only given a terminal. The main input device would be the keyboard. Users are expected to input commands through the keyboard. The commands that has executed or entered are shown in the terminal through the main output device the monitor. This user interface is not user friendly. Due to that reason users prefer a graphical user interface.

KUBUNTU

Page 11

TOWERDS HUMANITY Graphical user Interface (GUI) This user interface is far more user friendly than the command line interface. This user interface is made in a way such that a child would easily learn how to use the computer. This interface creates and presents a graphical environment to the user though the monitor. To be able to use this interface the computer must have good graphic generating capabilities. In a graphical user interface there is mainly five characteristic features that helps to define the interface. They are: Menus: gives users choices of tasks and operations listed accordingly. Users can pick the task from the list and click on that. The chosen task will be then executed. Windows: The main area which is viewed by the user. In this window all the other features are shown. This screen can be edited or can be divided into different areas accordingly to the users needs. In the window users can run different programs or the user can perform various multimedia applications. Pointer: pointers can take different shapes. Normally its the arrow pointer which is used as the default. The pointer helps user to move around the window or the screen and select objects (icons) and give commands which perform specific tasks. Icons: These are used to represent the files or programs in a graphical way. Normally small pictures are used for icons. By clicking on the icons users can perform multiple tasks. Desktop: This is the default output or the screen the users can see when they log in to their operating system. (The Linux Information Project, 2005)

Menu Driven Interface (MDI) Menus are presented with a choice on the menu. MDI presents a menu to the user with different alternatives on the screen. User can select the desired choice of one of the alternatives on the menu either by using a mouse or a keyboard. By using the mouse the user should click on the choice. If the user uses the keyboard he or she have to type the number or have to press the corresponding function key (Kolitha. 2010)
KUBUNTU Page 12

TOWERDS HUMANITY Advantages of this MDI are that it easy to use. Also prior knowledge of the commands are not needed when using this. As the disadvantages we can point out that menus have restrictions. Depending on the programmer the layout of the menu will be different. So it can sometimes hard to understand. (Kolitha. 2010)

2.1.2 What is an Interface?


An interface is a shared boundary or connection between two dissimilar objects, devices or a system through which information is passed. The connection can be either physical or logical (The Linux Information Project, 2005). Kubuntu 9.1 has three desktop environments, KDE, XFCE and GNOME. In Kubuntu the programmers has used KDE as the default desktop environment. Users can download GNOME, XFCE and install in Kubuntu so that all three environments can run alongside. But the new KDE environment is upgraded so that it would run the applications that worked only in other environments.

2.1.3 KDE (K Desktop Environment)

Figure 1: KDE logo

KUBUNTU

Page 13

TOWERDS HUMANITY

The default desktop environment for Kubuntu is KDE, a powerful Free Software graphical desktop environment for GNU/Linux and Unix workstations. It combines ease of use, contemporary functionality, and outstanding graphical design with the technological superiority of the Unix operating system. (About Kubuntu, 2010) KDE is a open source software which is made by the KDE organization worldwide. KDE is a Windowing Manager and Graphical User Interface for the UNIX operating system, not just Linux (but was made on Linux machines). (Anon, n.d) KDE is the most widely spread and used environment and it is older environment if it compared to other desktop environments. KDE uses C++ as its based programming language. And also it uses Qt(the Q-toolkit) to generate graphical environment. KDE is easy to use but it is a very powerful desktop environment which supports highly graphical application for all ages in both work and home environment. (About Kubuntu, 2010)

Strong points of KDE The user can customize the KDE so that it would look whatever way the user requires. Has an excellent file handling system which is also able to handle files which is foreign to the operating system. KDE has lots of applications, games and utilities available through internet and Linux communities. KDE is user friendly even children could learn it by themselves. Also Linux communities provide help almost all the time without any hesitation. KDE has a excellent control panel which is simple and configurable. KDE provides a fully featured GUI which is customizable according to the users needs. KDE easily supports multimedia capabilities such as watching a movie, listening to a song and capturing sound and data. Default KDE comes to the user with loads of great applications such as Kmail, KOffice, Konqueror.
KUBUNTU Page 14

TOWERDS HUMANITY (Anon. n.d)

2.1.4 GNOME (The GNU Network Object Model Environment)

Figure 2 : GNOME logo

GNOME (GNU Network Object Model Environment, pronounced gah-NOHM) is a graphical user interface (GUI) and set of computer desktop applications for users of the Linux computer operating system. It's intended to make a Linux operating system easy to use for non-programmers and generally corresponds to the Windows desktop interface and its most common set of applications. In fact, GNOME allows the user to select one of several desktop appearances. (Johansson. 2000)

KUBUNTU

Page 15

TOWERDS HUMANITY

2.1.5 XFCE

Figure 3: XFCE logo

"XFCE is a lightweight desktop environment for various *NIX systems. Designed for productivity, it loads and executes applications fast, while conserving system resources." (Fourdan, 1996)

2.2 Process Control Management


2.2.1 Process control management
When a user is using a computer there can be instances where user tries to do two things at once. The operating system will try to execute two processes at once on the same processor. When this occurs operating system should decide which one of the two processes should execute next on the processor. Scheduler which is a component of the operating system will handle the decision using a scheduling algorithm. (Nagar. n.d)

2.2.2 What is a process?


It is a program in execution which progresses in sequential manner. It is a unit of work with unique process identification. (Kolitha. 2010)

KUBUNTU

Page 16

TOWERDS HUMANITY A process needs resources like memory, CPU time and files to complete its execution and finish the tasks it is commanded to. Resources like memory and files are allocated when a process is in execution. The operating system creates the processes of the user and the system. Details of the processes that executed in the system are kept in a process table by the operating system. (kolitha. 2010)

2.2.3 Process Descriptor


Anonymous (2) (2007) stated that: To manage processes, the kernel must have a clear picture of what each process is doing. It must know, for instance, the process's priority, whether it is running on a CPU or blocked on an event, what address space has been assigned to it, which files it is allowed to address, and so on. This is the role of the process descriptor a task_struct type structure whose fields contain all the information related to a single process.

2.2.4 Process State


As its name implies, the state field of the process descriptor describes what is currently happening to the process (anon - 2. 2007) The process state have an array of flags which explains about the state of the process. In Linux there are currently six process states. (anon - 2. 2007)

TASK_RUNNING The process which is currently being executing on the CPU or waiting to be executed after the current process is executed.
KUBUNTU Page 17

TOWERDS HUMANITY TASK_INTERRUPTIBLE


The process is suspended (sleeping) until some condition becomes true. Raising a hardware interr upt, releasing a system resource the process is waiting for, or delivering a signal are examples of conditions that might wake up the process. (anon

- 2. 2007)

TASK_UNINTERRUPTIBLE Like TASK_INTERRUPTIBLE, except that delivering a signal to the sleeping process leaves its state unchanged. This process state is seldom used. It is valuable, however, under certain specific conditions in which a process must wait until a given event occurs without being interrupted. (anon - 2. 2007) TASK_STOPPED Process execution has been stopped; the process enters this state after receiving a SIGSTOP, SIGTSTP, SIGTTIN, or SIGTTOU signal. (anon - 2. 2007) TASK_TRACED Process execution has been stopped by a debugger. When a process is being monitored by another (such as when a debugger executes a PTRACE ( ) system call to monitor a test program), each signal may put the process in the TASK_TRACED state. (anon - 2. 2007) EXIT_ZOMBIE Anonymous (2) (2007) stated that: Process execution is terminated, but the parent process has not yet issued a WAIT4 ( ) or WAITPID( ) system call to return information about the dead process. Before the wait( )like call is issued, the kernel cannot discard the data contained in the dead process descriptor because the parent might need it. EXIT_DEAD Anonymous (2) (2007) stated that:

KUBUNTU

Page 18

TOWERDS HUMANITY The final state: the process is being removed by the system because the parent process has just issued a WAIT4 ( ) or WAITPID ( ) system call for it. Changing its state

from EXIT_ZOMBIE to EXIT_DEAD avoids race conditions due to other threads of execution that execute wait( )-like calls on the same process.

Figure 4: The Process States

2.2.5 Process scheduling algorithm


A scheduling algorithm is used to choose the next process. Scheduling is a fundamental function of an operating system. Scheduling is done to ensure that the CPU is not idle (Kolitha. 2010) In Kubuntu the Linux kernel is used. Linux kernel uses two process scheduling algorithms.

KUBUNTU

Page 19

TOWERDS HUMANITY Real-Time Algorithm Timesharing algorithm Real-Time Algorithm is used for processes that should execute in a timely fashion. The Round Robin and FIFO scheduling algorithms are used to switch between Real-Time Processes. (Levinson. n.d) All the processes which does not go through Real-Time algorithm are controlled by the Timesharing Algorithm. Timesharing algorithm is prioritized and credit-based. (Levinson. n.d) Anonymous (3) (n.d) stated that: For the conventional time shared processes, Linux uses a prioritized, credit-based algorithm. Each process possesses a certain number of scheduling credits; when a new task must be chosen to run, the process with most credits is selected. Every time that a timer interrupt occurs, the currently running process loses one credit; when its credits reaches zero, it is suspended and another process is chosen.

KUBUNTU

Page 20

TOWERDS HUMANITY

2.3 Deadlock Management


2.3.1 What is a Deadlock?
A computer system is a multiprogramming environment. In a multiprogramming environment several processes run at the same time. Some of these processes would compete for the same resources because available numbers of resources are limited. If two processes try to access the same nonpreemptable resources at the same time both processes will be blocked and will remain so forever. This situation is usually called a deadlock. (Kolitha. 2010)

A B
Deadlock Situation

PRINTER

DVD Drive

KUBUNTU

Page 21

TOWERDS HUMANITY

2.3.2 Conditions for Deadlock.


Normally in a computer system Deadlocks occur due to several conditions. If the following conditions are held continuously in the system deadlocks can occur. Deadlock will only occur if all the conditions exist together in the system. Separately each one of the conditions cant make a deadlock occur in the system. (Kolitha. 2010) The conditions are: Mutual Exclusion Resources are limited. At least one resource is in a non -shareable mode and Only one process can use the resource at a time (Kolitha. 2010) Hold and Wait A process must exist where it is holding at least one resource and is waiting to acquire additional resources that are currently being held by another process (Kolitha. 2010) No-preemption Resources cannot be preempted, a process can only release a resource after the process has completed. (Kolitha. 2010) Circular Wait A set of waiting processes exist, where each process is waiting for a resource that is held by another process within the set. (Kolitha. 2010)

2.3.3 Methods for Handling Deadlocks


When a deadlock occurs in a system the operating system try to overcome the deadlock using different methods. Normally operating systems uses some protocols to ensure that the computer or the system wont enter a Deadlock situation. Sometimes operating systems allows the system to get in to a deadlock situation and then the operating system tries to recover from it. Some operating systems ignore the deadlocks that occurred in the system and shows that the deadlock never happened in the system. (Kolitha. 2010) In Operating systems there are four ways to overcome the deadlock problem.

KUBUNTU

Page 22

TOWERDS HUMANITY They are: Deadlock Prevention. Deadlock Avoidance. Deadlock Detection. Deadlock Recovery.

Deadlock Prevention Deadlock prevention is a set of methods for ensuring that at least one of the necessary conditions does not hold in the system by restraining how requests are made for resources. (Kolitha. 2010) Deadlock Avoidance Kolitha (2010) stated that: Deadlock avoidance requires additional information on how resources will be requested. With the knowledge of complete sequence of requests and releases the operating system can now decide on which processes should wait or proceed. Algorithms are used for each process to declare the maximum number of resources needed. Deadlock Detection An algorithm is used to examine the state of the system to determine if a deadlock has occurred. detection and recovery incurs overheads for executing the detection algorithm with possible losses from recovering from a deadlock. (Kolitha. 2010) Deadlock Recovery When the deadlock recovery algorithm detects deadlock the operating system activates the deadlock recovery methods. These methods are

The operating system notifies the user that there is a deadlock occurred in the system. So the user or the operator has to handle the deadlock manually.

KUBUNTU

Page 23

TOWERDS HUMANITY Sometimes the operating system lets the system itself to recover from the deadlock situation automatically. (Kolitha. 2010)

When a deadlock occurs the operating system tries to break the deadlock by two ways.
o

Process termination Deadlock is occurred due to various processes conflicts. When this happens the operating system terminate all the processes that was the reasons for the deadlock or the operating system terminate one process at a time until the deadlock is terminated. (Kolitha. 2010)

Resource preemption Preempt some resources from processes and give these resources to other processes until the deadlock cycle is broken. (Kolitha. 2010)

2.3.4 Deadlock handling in Kubuntu


Kubuntu operating system uses the same deadlock management techniques of Ubuntu Operating system. Ubuntu Operating system is based on the Linux kernel uses the UNIX deadlock management algorithm named as Ostrich Algorithm. (Anon- 4. 2004.)

2.3.5 Ostrich Algorithm


Ostrich Algorithm is a method of ignoring potential problems. In deadlock management UNIX and all the Linux distributions use Ostrich Algorithm due to the factor of low percentage of deadlock occurring.
The Ostrich Algorithm is a strategy of ignoring potential problems on the basis that they may be exceedingly rare - to stick your head in the sand and pretend that there is no problem. This assumes that it is more costeffective to allow the problem to occur than to attempt its prevention. (Anon- 5. 2010) In this approach deadlocks are just ignored on the assumption that most of the computer operators would prefer an occasional deadlock. But there will be a rule restricting the computer operator accessing resources. Only one resource at a time will be allowed to be accessed. (Anon- 4. 2004.)

KUBUNTU

Page 24

TOWERDS HUMANITY

2.4 Memory Management


To improve the utilization of the CPU and to increase the speed of the computer, we must keep several processes in memory; that is, we must share memory. For this purpose the use of memory, should be managed. Therefore, Memory Management (process of managing the memory) can be defined as an art of coordinating and controlling the use of memory in a computer system.

Memory management can be divided into three areas: Memory management hardware (MMUs, RAM, etc.); Operating system memory management (virtual memory, protection); Application memory management (allocation, de-allocation, garbage collection). (Ravenbrook Limited.2001)

2.4.1 Memory management in Kubuntu


When it comes to Memory Management of Kubuntu, it is almost same as memory management system of Ubuntu. (Main difference between operating systems Ubuntu and Kubuntu is typically only user interface and tools used.) Kubuntu Memory Management mechanism has two components as Ubuntu and they are as follows: 1. Allocating and freeing physical memory.
2. Handling virtual memory.

2.4.3 Physical Memory Management in Kubuntu


Physical memory is managed globally in Kubuntu via a central free pool and a system daemon to manage the use of physical memory. Kubuntu uses the systems RAM (Random Access Memory) as a central pool of physical memory for different computer programs which executes in the system. Physical memory is distributed through the central pool at allocation time and returned to the pool when it is no longer needed. A system daemon (the page scanner) pro actively manages memory allocation when there is a system wide shortage of memory. (Kokitha.2010)

KUBUNTU

Page 25

TOWERDS HUMANITY

2.4.4 Algorithm used in memory management in Kubuntu

Kubuntu used the algorithm Buddy Heap in its memory management. In a buddy system, the allocator will only allocate blocks of certain sizes, and has many free lists, one for each permitted size. The allowed sizes are usually either powers of two, or form a Fibonacci series such that any block apart from the smallest can be divided into two smaller blocks of permitted sizes. When the allocator receives a request for memory, it rounds the requested size up to a permitted size, and returns the first block from that size's free list. If the free list for that size is empty, the allocator splits a block from a larger size and returns one of the pieces, adding the other to the appropriate free list. (memorymanagement.org) Following diagram will explain it further.

Figure 5

KUBUNTU

Page 26

TOWERDS HUMANITY

2.5 Virtual Memory Management


Size of the most of computer Programs is larger than the physical memory size. Hence, to execute a program, we could not load all the processes of required programs into physical memory at the same time. Because of this constraint, it requires another memory location which is larger than the physical memory, and that is called Virtual Memory. See the figure (figure 5)

Virtual memory systems separate the user logical memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of physical memory using disk swapping. The quality of the virtual memory management in a computer system can have a big impact on overall system performance.

Efficient use of Virtual Memory Management offers some advantages: Program would no longer be constrained by the amount of physical memory that is available. With the available physical memory, more programs can be run at the same time. Less I/O would be needed to Swap user program into memory therefore program runs faster.

Figure 6 : Virtual Memory is larger than the Physical Memory

(Rajapaksha.S 2010)

KUBUNTU

Page 27

TOWERDS HUMANITY
Virtual memory can be implemented using one of the following methods: Demand paging Demand segmentation

2.5.2 Virtual memory Management of Kubuntu


As in the other Operating Systems, virtual memory of Kubuntu, all of the addresses are virtual addresses and not physical addresses. These virtual addresses are converted into physical addresses by the processor based on information held in a set of tables maintained by the Kubuntu (operating system). To make this conversion easier, virtual and physical memory are divided into sections called pages and this process is called as Paging. These pages are all the same size. However, its not required to be in same size, but if so, the system would be very hard to administer. Each of these pages is given a unique number; the page frame number

2.5.2.1 Paging of Kubuntu


Paging is a memory management technique which widely uses virtual memory concept.

When paging is used in Kubuntu, the processor divides the linear address space into fixed-size pages (of 4KBytes, 2 MBytes, or 4 MBytes in length) that can be mapped into physical memory and/or disk storage. When a program (or task) references a logical address in memory, the processor translates the address into a linear address and then uses its paging mechanism to translate the linear address into a corresponding physical address. (viralpatel.net.2001)

KUBUNTU

Page 28

TOWERDS HUMANITY

Figure 7: Linear Page Translation during Paging

(viralpatel.net). (2001),

If the page containing the linear address is not currently in physical memory, the processor generates a pagefault exception (#14). The exception handler for the page-fault exception typically directs the operating system to load the page from disk storage into physical memory. When the page has been loaded in physical memory, a return from the exception handler causes the instruction that generated the exception to be restarted. The information that the processor uses to map linear addresses into the physical address space and to generate page-fault exceptions (when necessary) is contained in page directories and page tables stored in memory. (viralpatel.net.2001)

2.5.2.2 Swapping of Kubuntu


Swapping is a simple memory/process management technique used by the operating system(os) to increase the utilization of the processor by moving some blocked process from the main memory to the secondary memory(hard disk); thus forming a queue of temporarily suspended process and the execution continues with the newly arrived process. After performing the swapping process, the operating system has two options in selecting a process for execution:

KUBUNTU

Page 29

TOWERDS HUMANITY
Operating System can admit newly created process (OR) operating system can activate suspended process from the swap memory. (blog.sudobits.com . 2010)

Figure 8

2.6 Secondary Disk Scheduling Management


It is the part of the Linux kernel which plans on which I/O operation can access the storage device (the memory disk) so as to get the best throughput time to maximize the number of jobs completed in a given time. They are similar to the algorithms used in elevators, and therefore are sometime known as elevators. The operations that are allowed to access the storage are in such a way as to reduce the movement of the disk header.

2.6.1 Why is a Secondary Disk Scheduling Management necessary?


Secondary disk management is necessary for the hardware of a computer to be fast enough to serve the user requirements.

2.6.2 How can the efficiency of how the hardware is used be improved?
Access time should be faster. The access time can be made faster by To reduce seek time (seek time is the time taken for the header to move from the current position to the desired position). To reduce the Rotational latency (is the additional time taken for the disk to rotate the desired sector to the header)
KUBUNTU Page 30

TOWERDS HUMANITY Increase the disk bandwidth Disk bandwidth is the total no. of bytes that have been transferred divided by the time between submission of request and complete transfer of data.

Using an algorithm the I/O will decide and request to access the storage device and it is the same algorithm which is used in Ubuntu 9.1 to Kubuntu.

2.6.3 The Completely Fair Queuing (CFQ)


The Completely Fair Queuing (CFQ) I/O scheduler can be considered as representing an extension to the better known stochastic fair queuing (SFQ) scheduler implementation. The focus of both implementations is on the concept of fair allocation of I/O bandwidth among all the initiators of I/O requests. A SFQ based scheduler design was initially proposed for some network subsystems. The goal to be accomplished is to distribute the available I/O bandwidth as equally as possible among the I/O requests. (Lawrence.A.P. 2010)

2.6.4 Analyzing Completely Fair Queuing


It has great support It is fair and is aligned with disk hogging Prioritization is allowed to the user Takes necessary steps to prevent starvation Its very much complex (Appleton, 2003)

KUBUNTU

Page 31

TOWERDS HUMANITY

2.7 System Administration and support


Same as Ubuntu operating system kubuntu also mainly focuses on 4 functionalities both the OS contains same functionalities, for systems administration and support which take care of the operating system and they are : Desktop configurations Logs and scheduling Systems maintenance Systems and configuration User and permissions

2.7.1 Logs and Scheduling

KUbuntu system provides vital information using various system log files. These log files are typically plain ASCII text in a standard log file format, and most of them sit in the traditional system log subdirectory. Many are generated by the system log daemon, on behalf of the system and certain applications, while some applications generate their own logs by writing directly to files in. (help.ubuntu.com)

Logs and Scheduling can be broken down into three (3) main components: Systems Log Application Logs Non-Human Readable Logs

KUBUNTU

Page 32

TOWERDS HUMANITY

2.7.2 Systems Logs


System logs deal primarily with the functioning of the Ubuntu system, not necessarily with additional applications added by users. Examples include authorization mechanisms, system daemons, system messages, and the all-encompassing system log itself. (help.ubuntu.com)

Authorization Log

The Authorization Log tracks usage of authorization systems, the mechanisms for authorizing users which prompt for user passwords, such as the Pluggable Authentication Module (PAM) system. The Authorization Log file may be accessed. This log is useful for learning about user logins and usage of the sudo command. (help.ubuntu.com)

Daemon Log

A daemon is a program that runs in the background, generally without human intervention, performing some operation important to the proper running of your system. The daemon log contains information about running systemand application daemons such as the Gnome Display Manager daemon, the Bluetooth HCI daemon hcid, or the MySQLdatabase daemon mysqld. This can help you trouble-shoot problems with a particular daemon. (help.ubuntu.com)

Debug Log

The debug log and provides detailed debug messages from the Kubuntu system and applications which log at the DEBUG level. (help.ubuntu.com)

Kernel Log KUBUNTU Page 33

TOWERDS HUMANITY The kernel log provides a detailed log of messages from the Kubuntu Linux kernel. These messages may prove useful for trouble-shooting a new or custom-built kernel. (help.ubuntu.com)

Kernel Ring Buffer

The kernel ring buffer is not really a log file, but rather an area in the running kernel you can query for kernel boot up messages via the dmesg utility. (help.ubuntu.com)

Messages Log

The messages log contains informational messages from applications and system facilities. This log is useful for examining message output from applications, and system facilities which log to the syslog / sysklog daemon at the INFO level. (help.ubuntu.com)

System Log

The system log typically contains the greatest deal of information by default about our Kubuntu system. It is located at /var/log/syslog, and may contain information other logs do not. Consult the System Log when you can't locate the desired log information in another log. (help.ubuntu.com)

Application Logs The application log records information about activities in application instances. This log is used primarily for debugging and also it contains information about the user too. (Adobe help. 2010)

Non-Human Readable Logs Some log files found in the subdirectory are designed to be readable by applications, not necessarily by humans. Non-Human readable logs contain All the Login Failures, Last logging of the users And all the logging records
KUBUNTU Page 34

TOWERDS HUMANITY (help.ubuntu.com)

Systems Configurations Many GUI configuration utilities work by modifying config files. They should tell the users what files they modify and the modifications they make because sometimes it's easier, faster, or necessary to edit configuration files for functionality the GUI tool does not support, but figuring out what files are involved can be more difficult than actually making the changes. Even if users don't intend to edit the configuration files, knowing which files are modified and how will help users to build accurate mental models about the tools they use, which will help them to effectively use those tools to accomplish their goals.
(ubuntu.com)

2.7.3 GRUB 2 (Grand Unified Bootloader)


GRUB 2 is the next generation of GNU GRUB, using version numbers 1.90 and above. GRUB 2 is a complete rewrite and is at a developmental phase. The most important goal is to make GNU GRUB cleaner, safer, more robust, more portable and more powerful. Once the system is on GRUB2 it will either present a menu and awaits user input or automatically transfers control to an operating system kernel. GRUB 2 is the new update version of the GRUB, and with this updated version it has been performance are faster and more flexible. (engrub.org 2010)

2.7.4 Systems Maintenance

When it comes to system Maintenance Kubuntu mainly forces on two aspects they are: Data Backup Software Management

2.7.5 Data Back Up


For operating systems there are different types of backup, But Ubuntu their are two primary means as follows:
KUBUNTU Page 35

TOWERDS HUMANITY Folder Synchronization For kubuntu file-synchronization tool is unison. It allows two replicas of a collection of files and directories to be stored on different hosts is usually modified by certain rules, and then brought up to date by propagating the changes in each replica to the other. (ubuntu.com)

Creation of archive For operating systems creating an archive is used mainly for long-term storage purposes usually storing configuration files and documents. (Battiston, 2010)

2.7.6 Software Management


In Operating systems software management is about organizing softwares such as updating fil es, adding and removing and it happens automatically wherever and whenever necessary.. (Gadolinio, 2010)

2.8 Recovery strategies


Kubuntu, just as its sister OS Ubuntu, uses software called TestDisk to recover its lost partitions. This is licensed under GNU Public License & consider as open source software. TestDisk utility is not designed only to recover lost partitions, but also to make non-booting disks bootable, when the disk is infected by faulty software or by human errors such as fortuitously erasing the Partition Table.

TestDisk questions from OS or BIOS to find the Hard Disks or their characteristics specially LBA size and CHS geometry. Then the TestDisk does a quick check to find out the structure of our disk & compares it with our partition table to figure out entry errors. If the Partition Table has entry errors,
KUBUNTU Page 36

TOWERDS HUMANITY TestDisk is able to repair them. TestDisk can search for partitions and create a new Table or even a new MBR if necessary when we have missing partitions or a completely empty Partition Table in our system.

User has the chance to select any desirable partition from just before the drive failed to boot or the partition(s) were lost. Test Disk may show partition data which is simply from the small portions of a partition that had been deleted and overwritten long ago especially after initiating a detailed search for lost partitions.
Test Disk can be used to collect detailed information about a non-booting drive for further analysis. This has the features for work with both novice & expert users. Also expert users may find Test Disk as a handy tool for performing onsite recovery.

(ubuntu-version-8.blogspot.com. 2006) In Kubuntu they have given data backup systems for recovery as listed below, Folder synchronization Creating an archive Drive imaging Incremental backup (ubuntu-version-8.blogspot.com. 2006)

2.8. 1 Tools used by Kubuntu for their backup

Shell scripts This is one of the simplest ways to backup. The directories (Folders in windows) which are needed to backup can be selected through a shell script. Those directories can be used as arguments to the tar utility creating an achieve file. This file can be either copied or moved to another location. To create the achieve file tar utility is used.

KUBUNTU

Page 37

TOWERDS HUMANITY
(Kolitha.2010)

File roller (achieve manager) This is Kubuntus default tool for all file archiving purposes. This supports a lot of file formats. Since this comes with a graphical user interface it is much more user friendly. (Kolitha.2010)

2.9 Security Strategies


In Kubuntu Operating system the system developers used the same security strategies that Ubuntu Operating system consists. We get the same security measures and security options that are in Ubuntu Operating System. In Ubuntu operating system mainly developers categorized seven security factors for the user. They are: User Management Console Security Firewall AppArmor Certificates Automatic security Updates Antivirus (Ubuntu Help 2010)

KUBUNTU

Page 38

TOWERDS HUMANITY

2.9.1 User Management


USER MANAGEMENT

ROOT
ADD/REMOVE USERS

USER PROFILE SECURITY

PASSWORD

User management is a critical part of maintaining a secure system. Ineffective user and privilege management often lead many systems into being compromised. Therefore, it is important that you understand how you can protect your server through simple and effective user account management techniques. (Ubuntu Help 2010) Root Kubuntu developers used same techniques which have being used by the Ubuntu developers. In Ubuntu administrative Root account is disabled by default system settings. It is give a password that cannot be matched by any encrypted value. Because of that the system cannot log in directly as the root. Instead of Root users are adviced to make use of the tool called SUDO to work with system administrative duties. SUDO temporarily elevate user privileges for authorized users who logs in from their current password. This gives the system administrator to control over which actions a one user can use with elevated privileges. (Ubuntu Help 2010)

Add/remove users

KUBUNTU

Page 39

TOWERDS HUMANITY The process for managing local users and groups is straight forward and differs very little from most other GNU/Linux operating systems. Ubuntu and other Debian based distributions, encourage the use of the "add user" package for account management. (Ubuntu Help 2010)

User profile security This security option mainly interacts with servers. In a single server there can be hundreds of users. System administrator should pay close attention to the user home directory permissions to ensure confidentially. By default, user home directories in Ubuntu are created with world read/execute permissions. This means that all users can browse and access the contents of other users home directories (Ubuntu Help 2010) Just by editing one file the system administrator can modify user home directories so that appropriate users can only visit some places. This secures the server from potential threats.

PASSWORD Many security mechanisms in most operating systems use this option as the main user protection strategy. Passwords are mainly used to protect valuable information. Choosing a strong password in any application or program is very important. Kubuntu like Ubuntu keeps a strong password policy in the operating system. By default, Ubuntu requires a minimum password length of 4 characters, as well as some basic entropy checks. If you would like to adjust the minimum length to 6 characters, change the appropriate variable to min=6. (Ubuntu Help 2010) this can be done using a simple command line. It is better to have long and strong passwords, it shouldnt be based on common knowledge such as a famous word or else attackers (crackers) can use Brute-force or Dictionary attack and find users password.

2.9.2 Console Security


It is pretty tough to defend against untold damage caused by someone with physical access to your environment, for example, theft of hard drives, power or service disruption and so on. Therefore, console security should be addressed merely as one component of your overall physical security strategy. A locked "screen door" may deter a casual criminal, or at the very least slow down a
KUBUNTU Page 40

TOWERDS HUMANITY determined one, so it is still advisable to perform basic precautions with regard to console security. (Ubuntu Help 2010)

2.9.3 Firewall
The Linux kernel includes the Netfilter subsystem, which is used to manipulate or decide the fate of network traffic headed into or through your server. All modern Linux firewall solutions use this system for packet filtering. (Ubuntu Help 2010) In Kubuntu same as in Ubuntu, the operating system uses UFW (Uncomplicated Firewall) as the default firewall configuration tool. UFW is a user friendly configuration tool which allows the user to create IPv4 or IPv6 host-based Firewall making it easy to configure iptables firewall configuration. (Ubuntu Help 2010)

2.9.4 AppArmor
AppArmor is a Linux Security Module implementation of name-based mandatory access controls. AppArmor confines individual programs to a set of listed files and posix 1003.1e draft capabilities. (Ubuntu Help 2010) AppArmor is installed and loaded by default. It uses profiles of an application to determine what files and permissions the application requires. Some packages will install their own profiles, and additional profiles can be found in the apparmor-profiles package. (Ubuntu Help 2010)

2.9.5 Certificates
A Certificate is a method used to distribute a public key and other information about a server and the organization who is responsible for it. Certificates can be digitally signed by a Certificate Authority or

KUBUNTU

Page 41

TOWERDS HUMANITY CA. A CA is a trusted third party that has confirmed that the information contained in the certificate is accurate. (Ubuntu Help 2010) One of the most common forms of cryptography today is public-key cryptography. Public-key cryptography utilizes a public key and a private key. The system works by encrypting information using the public key. The information can then only be decrypted using the private key. (Ubuntu Help 2010)

2.9.6 Automatic security Updates


Making sure your system is up to date is a key attribute to its security. (Kevin. 2007) Most of the operating systems releases updates pretty often and you probably don't want to miss out on added stability and features. You could run updated manually, but why not schedule the updates in the background to make sure you are always running the latest stable versions, without ever having to worry about it. (Kevin. 2007)

2.9.7 Antivirus
Kubuntu is a Linux distribution. So Kubuntu have some features of Linux. Linux is developed in a manner that viruses cannot run in the system. So that theoretically Linux does not need a antivirus. But when you connect to another machine over a network you should be able to scan the files you receive from the other machine. Not all the other machines have are Linux based Operating systems. So the user will need a Antivirus to scan the files you receive from another computer which has another operating system. (Ubuntu Help 2010)

KUBUNTU

Page 42

TOWERDS HUMANITY

2.10 Standard Support


Kubuntu has provided their Help & Support services under four categories: Access Free Documentation Community Help Buy Professional Support Services Technical Answers System (Help and Support.2010)

2.10.1 Access Free Documentation


Kubuntu does not provide a separate documentation solely for its issues and simply forward to the official documentation developed and maintained by the Ubuntu Documentation Team.
(Help and Support.2010)

2.10.2 Community Help


A range of free support options are also available from the Kubuntu Community, including forums, IRC channel and mailing list. There is also multi-language community support. Kubuntu provides community help via: Live Chat Web Forums Mailing List
(Help and Support.2010)

2.10.3 Buy Professional Support Services


Kubuntu users can get the help form the Canonical Global Support Services team which is an experienced and well knowledge team of Kubuntu developers. Also professional support is available from companies listed as Canonical Partners.
(Help and Support.2010)

KUBUNTU

Page 43

TOWERDS HUMANITY

2.10.4 Technical Answer System


Users can also add their support question in Kubuntu tech answers system which is a part of the Launchpad system. Here users can keep their queries active until a community member offers an answer which solves their problems. They can also search through all of the other questions which have been asked and answered. (Help and Support.2010)

KUBUNTU

Page 44

TOWERDS HUMANITY

3.0 Installation

This is the first step of the installation. After booting up from the CD youll get this screen. From this screen you will have to choose your language. Then click next to go for the next step of the installation.

Figure 9 : installation pictures

From the next screen youll have to select your region and your city. Then youll have select your time Zone. Then youll have click next to forward in the installation.

Figure 10: Installation Pictures

KUBUNTU

Page 45

TOWERDS HUMANITY From this screen youll have select the layout of your keyboard. Click next to go the next step of the installation.

Figure 11 : Installation Pictures

In this step youll have to select the way you want to install Kubuntu. You can either install Kubuntu side by side with your other operating system. Or you can create a new partition and you can install Kubuntu to that Partition. We installed it side by side with windows. Then click next to go to the next step of the installation process.

Figure 12: Installation Pictures

KUBUNTU

Page 46

TOWERDS HUMANITY In this screen well have to enter our details and information to go forward in the installation. User must enter a password with at least six characters for security reasons. This is to prevent unauthorized access. Then youll have to click next to go to the next step of the installation.

Figure 13: Installation Pictures

This screen shows the selections you have selected during the process. From here you can go backward by pressing the button back and change whatever you want to change. Select install to to start the installation.

Figure 14: Installation Pictures

KUBUNTU

Page 47

TOWERDS HUMANITY Installation is nearly over. In a matter of minutes youll be able to use Kubuntu 9.1.

Figure 15: Installation Pictures

Youll have to log in to the system from this page. After entering the details you entered in the installation you can log in.

Figure 16: Installation Pictures

KUBUNTU

Page 48

TOWERDS HUMANITY This is how the default desktop looks like. Now you can enjoy the Kubuntu Operating system.

Figure 17: Installation Pictures

KUBUNTU

Page 49

TOWERDS HUMANITY

4.0 Limitations/Extensions

4.1 Extensions
Kubuntu started with Kubuntu-KDE4 Hardy Alpha version. This was pre-alpha version and was encouraged to use within system testers. After major developments and designings Kubuntu released Kubuntu 9.10. Which the developers called as a Stable, Social and a Beautiful operating system. From the released date Kubuntu 9.10 was the most spread among all the Kubuntu versions. (Kubuntu org. 2009) Kubuntu 9.10 has some new changes that boosted up its popularity. For instance Kubuntu 9.10 uses the Linux kernel version 2.6.31. Because of this kernel graphics and the security factor of the Kubuntu 9.10 increased remarkably. Also Kubutu 9.10 uses KDE 4.3 as the default desktop environment. Due to the KDE 4.3 GUI of the Kubuntu 9.10 is very attractive and fast. (Kubuntu org. 2009) Kubuntu 9.10 includes KPackageKit which has lots of various applications by default. As the Kuser which comes with the Kubuntu 9.10 helps the user to manage users. (Kubuntu org. 2009)

4.2 Limitations
Kubuntu 9.10 is based on ubuntu and Linux. So Kubuntu also have some of the mistakes or restrictions those two have. Most of the users worldwide is used to windows operating system. When those users move from windows to Kubuntu they will have some problems because most of the windows executable files do not work in Kubuntu. So the users have to go through some other softwares to get those executables to run. Kubuntu 9.10 does not have most wanted softwares like Visio, Pagemaker, Framemaker, Photoshop, Pdf viewer, etc.

KUBUNTU

Page 50

TOWERDS HUMANITY

5.0 Conclusion
Conclusion of our research on Kubuntu 9.10 operating system. Kubuntu 9.10 is build on a solid Ubuntu 9.10 core and is developed using Linux. Kubuntu 9.10 is free open source operating system. Open source means that the source code of the operating system is given to user who requests it free of charge. And any user can develop the source code and make a new operating system and sell it without any legal issues. Kubuntu depends on its community to help the users when needed. All the help and details can be gathered from the kubuntu organization. When compared to other operating systems like Windows, Macintosh and Solaris Kubuntu is a light weighted operating system. That means it only consumes less hard disk space, low processor and requires low Random Access Memory when compared to the other operating systems. Due to those reasons Kubuntu 9.10 can be installed and worked even in a old computer. Kubuntu 9.10 uses Linux kernel version 2.6.31 which helps the operating system to be more secure. Because of that Kubuntu is less vulnerable to viruses. And also this kernel helps to boost up the system. Kubuntu is non-profit oriented organization which relies on the community to develop and design application software for Kubuntu. So in Kubuntu users wont get much applications compared to other operating systems because community based developed software comes out in much slower pace. Also Kubuntu relies on the community to point out the weaknesses of the operating system. Then the development team will look into the matter and will fix the issue and later on will release updated version with improvements. But a new improved version normally comes out around in six month time. In conclusion Kubuntu 9.10 is unique operating system with improved graphics reaches out to users who are in different ages helping them to do their day to day work, to improve their skills and to communicate with the world in a free open source environment.

KUBUNTU

Page 51

TOWERDS HUMANITY

6.0 Work Load Matrix

Activities and Tasks

Birendra Herath

Viraj De Silva

Malith Waniganayake (CB004144)

(CB004140) (CB004078) 1.0 Research and Investigation 1.1 Introduction To the OS 1.2 System Software Requirements 1.3 System hardware Requirements 2.0 Analysis 2.1 User Interface 2.2 Processes Control Management 2.3 Deadlock Management 2.4 Memory Management 2.5 Virtual Memory Management 2.6 Secondary Disk Scheduling Management 2.7 System Administration and Support 2.8 Recovery Strategies 2.9 Security Strategies 2.10 Standard Support
KUBUNTU


Page 52

TOWERDS HUMANITY 3.0 Installation 4.0 Limitations/Extensions 5.0 Conclusion 6.0 Gantt Chart

KUBUNTU

Page 53

TOWERDS HUMANITY

6.0 Gantt Chart

KUBUNTU

Page 54

TOWERDS HUMANITY

References
McGee. M. (2010). What Is a User Interface? [Online] 09 September 2010. Available from: wisegeek.com http://www.wisegeek.com/what-is-a-user-interface.htm . [Accessed: 28 December 2010]

1. Juergen. H. (n.d). CLI (command line interface) [Online]. Available from: linux.about.com http://linux.about.com/cs/linux101/g/clilparcommandl.htm . [Accessed: 28th December 2010]
Anonymous (the Linux information project). (2004). GUI Definition. [Online] 01 October 2004. Available from: linfo.org http://www.linfo.org/gui.html . [Accessed: 28th December 2010]

2. Anonymous (The Linux Information Project) (2005), [Online],Available: http://www.linfo.org/user_interface.html 2010]

User interface definition. [Accessed: 28th December

Anonymous (About Kubuntu). (2010). About Kubuntu. [Online] 2010. Available from: kubuntu.org http://www.kubuntu.org/docs/about-kubuntu/C/index.html [Accessed: 28th December 2010]

3. Anonymous (n.d) Chapter 7: What is KDE? [Online]. 2010. Available from: linuxnewbieguide.org http://www.linuxnewbieguide.org/content/chapter-7-what-kde [Accessed 28th December 2010]

4. Johansson .M (2000). GNOME [Online]. Available from: techtarget.com http://searchenterpriselinux.techtarget.com/definition/GNOME [Accessed 28th December 2010]

5. Fourdan. O (1996) About XFCE [Online] Available from: xfce.org http://www.xfce.org/ . [Accessed 28th December 2010] 6. Nagar, A. (n.d). Process Scheduling. [online]. Available: http://s3.amazonaws.com/pptdownload/process-scheduling-1196587916168883-

KUBUNTU

Page 55

TOWERDS HUMANITY 3.pdf?Signature=wPEvNrTPksyTgaDkV6H12OxoWvA%3D&Expires=1272894157&AWS AccessKeyId=AKIAJLJT267DEGKZDHEQ [Accessed: 29th December 2010]

7. Kolitha. (2010). user interface. APIIT Slides [Accessed 29th December 2010]

8. Kolitha. (2010). Process Control Management. APIIT Slides [Accessed 29th December 2010]

9. Anonymous (2). (2007) OpenSourceProject. [Online]. 2007. Available from: Opensourceproject.com_http://book.opensourceproject.org.cn/kernel/kernel3rd/opensource/0 596005652/understandlk-chp-3-sect-2.html [Accessed 29th December 2010]

10. Levinson.S.G. (n.d) Process Scheduling in Windows XP, Linux, and UNIX. [Online] Available from: cs,gsu.edu http://www.google.lk/url?sa=t&source=web&cd=26&ved=0CDgQFjAFOBQ&url=http%3A %2F%2Fwww.cs.gsu.edu%2F~cscbecx%2FCSC4320_6320%2520projects%2Fprocess_sche duling.ppt&rct=j&q=process%20scheduling%20algorithms%20in%20linux&ei=fmofTfq8D 8bsrQeq1MHACw&usg=AFQjCNEdwd_duDZ0I0UTisqqTUYbjfDBeg [Accessed 29th December 2010]

11. Anonymous (3). (n.d) Compare Linux credit based algorithm with other scheduling algorithms? [Online]. Available from: geekinterview.com http://www.geekinterview.com/question_details/3178 . [Accessed 29th December 2010]

12. Kolitha. (2010). Deadlock-1 APIIT Slides [Accessed 29th December 2010]

13. Anonymous (4). (2004) The Ostrich Algorithm [Online]. 2004. Available from: Cankaya.edu.trhttp://siber.cankaya.edu.tr/OperatingSystems/summer2004/ceng328/node64.ht ml [Accessed 29th December 2010]

KUBUNTU

Page 56

TOWERDS HUMANITY 14. Anonymous (5). (2010) Ostrich Algorithm [Online]. 2010. Available from: en.academic.ru http://en.academic.ru/dic.nsf/enwiki/770000 [Accessed 29th December 2010]

15. Anonymous(Ubuntu help). (2010) Chapter 8. Security [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/security.html [Accessed 30th December 2010] 16. Anonymous(Ubuntu help). (2010) User Management [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/user-management.html [Accessed 30th December 2010] 17. Anonymous(Ubuntu help). (2010) StrongPasswords [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/community/StrongPasswords [Accessed 30th December 2010]

18. Anonymous(Ubuntu help). Console Security (2010) [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/console-security.html [Accessed 30th December 2010] 19. Anonymous(Ubuntu help). (2010) Firewall [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/firewall.html [Accessed 30th December 2010]

20. Anonymous(Ubuntu help). (2010) AppArmor [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/apparmor.html [Accessed 30th December 2010]

21. Anonymous(Ubuntu help). (2010) Certificates [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/certificates-and-security.html [Accessed 30th December 2010] 22. Kevin. (2007) Schedule automatic updates on Ubuntu [Online]. 16th July 2007. Available from: vanzonneveld.net
http://kevin.vanzonneveld.net/techblog/article/schedule_automatic_updates_on_ubuntu/

[Accessed 30th December 2010]

KUBUNTU

Page 57

TOWERDS HUMANITY 23. Anonymous (Ubuntu help). (2010) Antivirus [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/community/Antivirus [Accessed 30th December 2010] 24. Anonymous (Kubuntu org). (2009) Kubuntu 9.10: Stable, Social and Beautiful [Online]. 30th October 2009 Available from: kubuntu.org http://www.kubuntu.org/news/9.10-release [Accessed 30th December 2010]
Anonymous (The official Ubuntu Book). (2008). Introduction and history of kubuntu. [Online] 14th August

2008. Available from: computingtech.blogspot. http://computingtech.blogspot.com/2008/08/introductionand-history-of-kubuntu.html [Accessed 27th 2010] Anonymous (kde.org). (2004). Home page . [Online]. Available from: kde.org kde.org. [Accessed: 27th December 2010] Anonymous (kde.org). (2010). Home page . [Online]. Available from: ubuntu.com www.ubunu.com [Accessed: 28th December 2010]

Nicks.J (2010). Kubuntu System Requirements [Online]. Available from: buzzle.com http://www.buzzle.com/articles/kubuntu-system-requirements.html [Accessed: 28th December 2010] Lawrence.A.P (2010). Linux 2.6 [Online]. Available from: aplawrence.com http://aplawrence.com/Linux/linux26_features.html [Accessed: 29th December 2010]
Anonymous (Adobe help). (2010). Application logs. [Online]. Available from: adobe.comhttp://help.adobe.com/en_US/FlashMediaServer/3.5_AdminGuide/WS5b3ccc516d4fbf351

e63e3d119f2926bcf-79d0.html [Accessed: 29th December 2010]


Anonymous (ubuntu.com). (2008). Rationale. [Online]. Available from: ubuntu.com http://brainstorm.ubuntu.com/idea/334/ [Accessed: 30th December 2010] Anonymous (engrub.org). (2010). GNU GRUB Wiki [Online]. Available from: enbug.org http://grub.enbug.org/ [Accessed: 31th December 2010] Anonymous (ubuntu.com). (2008). unison. [Online]. Available from: ubuntu.com http://linux.about.com/cs/linux101/g/unison.htm [Accessed: 30th December 2010] 25. Anonymous (Ravenbrook Limited). (2001), The Memory Management Glossary.[online]

available from memorymanagement.org


http://www.memorymanagement.org/glossary/m.html#memory.management

KUBUNTU

Page 58

TOWERDS HUMANITY 26. Anonymous Ravenbrook Limited. (2001), The Memory Management Reference .[online] available from memorymanagement.org
http://www.memorymanagement.org/glossary/m.html#memory.management

27. Anonymous (viralpatel.net). (2001), Paging Tutorial | TAJ Operating System .[online]

available from viralpatel.net http://viralpatel.net/taj/tutorial/paging.php

28. Rkjha (blog.sudobits.com ) 10 of August 2010 what is swapping in operating system?

.[online] available from blog.sudobits.com http://blog.sudobits.com/2010/08/10/what-isswapping-in-operating-system/

29. Anonymous (ubuntu-version-8.blogspot.com)11 July 2006 Recovery Strategies.[online] http://ubuntu-version-8.blogspot.com/2009/05/8-recovery-strategies.html

30. Rajapakse.S(SLIIT.2010) Foundation of Computer Science Operating SystemPrincipalsSri Lanka Institute of Information Technology (SLIIT)

31.

Image Referencing

1. Figure 1: farm1.static.flickr.com 2010. [Online]. Available From: http://farm1.static.flickr.com/49/150312877_5a20b7be83.jpg [Accessed 28th December 2010] 2. Figure 2: geeks.com 2010. [Online]. Available From: http://www.geeks.com/techtips/2007/Images/mhp2_gnome_logo-01.gif [Accessed 28th December 2010] 3. Figure 3: xubuntix.com 2010. [Online]. Available from: http://www.xubuntix.org/media/images/blog/BIG_XFce_logo.png [Accessed 28th December 2010]

KUBUNTU

Page 59

TOWERDS HUMANITY 4. Figure 4: boisestate.edu 2010. [Online]. Available from: http://cs.boisestate.edu/~amit/teaching/552/slides/ch6.pdf [Accessed 28th December 2010] 5. Figure 5,6,7,8,9,10,11,12,13: howtoforge.co 2010. [Online]. Available from: http://www.howtoforge.com/the-perfect-desktop-kubuntu-9.10 [Accessed 30th December 2010]

KUBUNTU

Page 60

Das könnte Ihnen auch gefallen