Beruflich Dokumente
Kultur Dokumente
Module Title & Code Operating Systems (AICT004-3-2) Intake Code: DF10A1ICT Hand Out Date: 4-November-2010 Submission Date: 3-January-2010 Lecturer: Mr. Kolitha Gunarathna Operating System: Kubuntu Version: 9.10 Submitted By: Birendra Herath (CB004140) Viraj De Silva (CB004078) Malith Waniganayke (CB004144)
KUBUNTU
Page 1
1 2 3
No
KUBUNTU
Birendra Herath Malith Waniganayake Viraj De silva Research Investigation (30) Installation (20) Documentation (10) Referencing (10) Group Marks (70) Analysis (15) Presentation (15) Ind. Marks (30) Total (100) and
Page 2
TOWERDS HUMANITY
Abstract
The operating system which we have used in this assignment is Kubuntu 9.10. This is an open source operating system based on Linux, and it is free of charge with lot of community help available to the user, which is the main object of this operating system. Kubuntu requires low memory and space. The main advantage in this operating system is it is less vulnerable to virus compared to Microsoft Windows.
Kubuntu releases a new version every 6 months with all their bugs fixed, and also they provide updates to the user to make the operating system efficient.
Kubuntu operating system is freely available in the Kubuntu website any user can download and its free of charge plus Kubuntu deliver their CD to your door step free of charge worldwide. Kubuntu has provide every possible state free of charge to the user.
KUBUNTU
Page 3
TOWERDS HUMANITY
Acknowledgement
We would like to thank Ms. Kolitha Gunarathna, our lecture for his valuable support, advices and guidance during the project. Without his supervision I we will not be able to finish this project during this time period. Without his supervision this project would not have been a success and we will not be able to finish this project during this time period. We would also like to thank APIIT (Asia Pacific Institute of Information Technology) who helped us during the thesis. We would like to dedicate this study to them as an indication of their significance in this study as well as in our lives.
KUBUNTU
Page 4
TOWERDS HUMANITY
Table of Contents
Abstract .................................................................................................................................................. 3 Acknowledgement ................................................................................................................................. 4 Kubuntu, making your PC friendly ..................................................................................................... 7 1.0 Research and Investigation .................................................................................................. 7
Philosophies of Kubuntu. ............................................................................................................... 8 2.2.5 Process scheduling algorithm...................................................................................................... 19 2.3 Deadlock Management .................................................................................................................. 21 2.3.1 What is a Deadlock? .................................................................................................................21 2.3.2 Conditions for Deadlock. ..........................................................................................................22 2.3.3 Methods for Handling Deadlocks.............................................................................................22 2.3.4 Deadlock handling in Kubuntu .................................................................................................24 2.3.5 Ostrich Algorithm .....................................................................................................................24 2.4 Memory Management .................................................................................................................... 25 2.4.1 Memory management in Kubuntu ..........................................................................................25 2.4.3 Physical Memory Management in Kubuntu ............................................................................25 2.4.4 Algorithm used in memory management in Kubuntu .............................................................26 2.5 Virtual Memory Management ....................................................................................................... 27 2.5.2 Virtual memory Management of Kubuntu ..............................................................................28 2.5.2.1 Paging of Kubuntu .................................................................................................................28 2.5.2.2 Swapping of Kubuntu ............................................................................................................29 2.6 Secondary Disk Scheduling Management ...................................................................................... 30 2.6.1 Why is a Secondary Disk Scheduling Management necessary?...............................................30 2.6.2 How can the efficiency of how the hardware is used be improved? ......................................30 2.6.3 The Completely Fair Queuing (CFQ).........................................................................................31 2.6.4 Analyzing Completely Fair Queuing .........................................................................................31 2.7 System Administration and support .............................................................................................. 32 2.7.1 Logs and Scheduling .................................................................................................................32 2.7.2 Systems Logs ............................................................................................................................... 33 2.7.3 GRUB 2 (Grand Unified Bootloader) ........................................................................................35 2.7.4 Systems Maintenance ..............................................................................................................35 KUBUNTU Page 5
TOWERDS HUMANITY
2.7.5 Data Back Up .............................................................................................................................. 35 2.7.6 Software Management ............................................................................................................36 2.8 Recovery strategies ........................................................................................................................ 36 2.8. 1 Tools used by Kubuntu for their backup .................................................................................37 2.9 Security Strategies ......................................................................................................................... 38 2.9.1 User Management ...................................................................................................................39 2.10 Standard Support ......................................................................................................................... 43 2.10.1 Access Free Documentation ..................................................................................................43 2.10.2 Community Help ....................................................................................................................43 2.10.3 Buy Professional Support Services .........................................................................................43 2.10.4 Technical Answer System.......................................................................................................44 3.0 Installation ..................................................................................................................................... 45 4.0 Limitations/Extensions ................................................................................................................... 50 4.1 Extensions ...................................................................................................................................50 4.2 Limitations...................................................................................................................................50 5.0 Conclusion ...................................................................................................................................... 51 6.0 Work Load Matrix .......................................................................................................................... 52 6.0 Gantt Chart..................................................................................................................................... 54
KUBUNTU
Page 6
TOWERDS HUMANITY
1.0
1.1 Introduction
Kubuntu ("towards humanity) is a user-friendly Linux based operating system, which started with Linux 2.6.222 and utilizes the KDE, which was first released in April 2008. Kubuntu is an official project of Ubuntua complete implementation of the Ubuntu OS led by Jonathan Riddell (an employee of Canonical Ltd.) and an army of developers.A new release is made every 6th months, releases is supported for 18 months. However, Kubuntu uses KDE instead of GNOME for Ubuntu. The main goal of Kubuntu is to be a great integrated Linux distribution with all of the great features of Ubuntu, but based on KDE. (The official Ubuntu Book. 2008)
KUBUNTU Page 7
TOWERDS HUMANITY Kubuntu is built on the solid and advanced base of Ubuntu, the Kubuntu team aims to create a distribution that provides an up-to-date and coherent GNU/Linux system for desktop and server computing. Kubuntu includes a number of selected packages from Ubuntu and is based on Debian's powerful APT package management system. APT allows easy installation and clean removal of programs, as well as automatic download of extra packages to satisfy dependencies. (About Kubuntu. 2010)
Philosophies of Kubuntu.
Make the very best work available to everyone on the same free terms and conditions without charging any extra fee.
Includes the very best translations and accessibility infrastructure that the Free Software community has to offer and to make Kubuntu usable by as many people as possible.
Free software and open source development and which encourage people to improve the operating system and pass it on.
Application development with Quickly Quicky makes it easy for developers to make new applications for Kbuntu. (ubuntu.com)
KUBUNTU
Page 8
TOWERDS HUMANITY
Ubuntu One Can use it to back up, store, synchronize and share your data with other Kbuntu One users.(ubuntu.com)
Linux kernel 2.6.31 Kbuntu 9.10 RC includes the 2.6.31-14.48 kernel based on 2.6.31.1. (ubuntu.com) GRUB 2 by default
iSCSI installation The iSCSI installation process has been improved, and no longer requires iscsi=true as a boot parameter. (ubuntu.com) AppArmor AppArmor in Kbuntu 9.10 RC features an improved parser that uses cache files, greatly speeding up AppArmor initialisation on boot. (ubuntu.com)
(Nicks.J . 2010)
TOWERDS HUMANITY
Using the hardware mention below kubuntus performance would be better, but it requires the futures such as visual effects.
Pentium 300-megahertz (MHZ) processor 8 GB of hard disk space 256 MB of RAM Video card that supports a resolution of 640 x 480 Motherboard architectures can be Intel x86 and AMD64
(Nicks.J. 2010)
1.2 GHz x86 processor 384 MB of system memory (RAM) Supported graphics card
(Nicks.J. 2010)
KUBUNTU
Page 10
TOWERDS HUMANITY
2.0 Analysis
2.1 User Interface 2.1.1 User interface
A user interface describes any mechanism by which a human interacts with a machine or computer. (McGee, 2010) Generally, the term refers to the method by which a person interacts with a computer. In this area, a user interface may not simply refer to the mechanism of interaction, but the program that allows it as well. (McGee, 2010) Mainly there are three types of user interfaces in a computer. Command line Interface (CLI) Graphical user Interface (GUI) Menu Driven Interface (MDI)
These three interfaces in general use several components of the computer to get the inputs and to display the output. The keyboard and the mouse are mainly used to get the information in to the computer. The primary output device would be the monitor. In some rare cases it would a device like a projector. Command Line Interface (CLI) A means of communication between a program and its user, based solely on textual input and output. Commands are input with the help of a keyboard or similar device and are interpreted and executed by the program. Results are output as text or graphics to the terminal. (Juergen, n.d) In this interface the users are only given a terminal. The main input device would be the keyboard. Users are expected to input commands through the keyboard. The commands that has executed or entered are shown in the terminal through the main output device the monitor. This user interface is not user friendly. Due to that reason users prefer a graphical user interface.
KUBUNTU
Page 11
TOWERDS HUMANITY Graphical user Interface (GUI) This user interface is far more user friendly than the command line interface. This user interface is made in a way such that a child would easily learn how to use the computer. This interface creates and presents a graphical environment to the user though the monitor. To be able to use this interface the computer must have good graphic generating capabilities. In a graphical user interface there is mainly five characteristic features that helps to define the interface. They are: Menus: gives users choices of tasks and operations listed accordingly. Users can pick the task from the list and click on that. The chosen task will be then executed. Windows: The main area which is viewed by the user. In this window all the other features are shown. This screen can be edited or can be divided into different areas accordingly to the users needs. In the window users can run different programs or the user can perform various multimedia applications. Pointer: pointers can take different shapes. Normally its the arrow pointer which is used as the default. The pointer helps user to move around the window or the screen and select objects (icons) and give commands which perform specific tasks. Icons: These are used to represent the files or programs in a graphical way. Normally small pictures are used for icons. By clicking on the icons users can perform multiple tasks. Desktop: This is the default output or the screen the users can see when they log in to their operating system. (The Linux Information Project, 2005)
Menu Driven Interface (MDI) Menus are presented with a choice on the menu. MDI presents a menu to the user with different alternatives on the screen. User can select the desired choice of one of the alternatives on the menu either by using a mouse or a keyboard. By using the mouse the user should click on the choice. If the user uses the keyboard he or she have to type the number or have to press the corresponding function key (Kolitha. 2010)
KUBUNTU Page 12
TOWERDS HUMANITY Advantages of this MDI are that it easy to use. Also prior knowledge of the commands are not needed when using this. As the disadvantages we can point out that menus have restrictions. Depending on the programmer the layout of the menu will be different. So it can sometimes hard to understand. (Kolitha. 2010)
KUBUNTU
Page 13
TOWERDS HUMANITY
The default desktop environment for Kubuntu is KDE, a powerful Free Software graphical desktop environment for GNU/Linux and Unix workstations. It combines ease of use, contemporary functionality, and outstanding graphical design with the technological superiority of the Unix operating system. (About Kubuntu, 2010) KDE is a open source software which is made by the KDE organization worldwide. KDE is a Windowing Manager and Graphical User Interface for the UNIX operating system, not just Linux (but was made on Linux machines). (Anon, n.d) KDE is the most widely spread and used environment and it is older environment if it compared to other desktop environments. KDE uses C++ as its based programming language. And also it uses Qt(the Q-toolkit) to generate graphical environment. KDE is easy to use but it is a very powerful desktop environment which supports highly graphical application for all ages in both work and home environment. (About Kubuntu, 2010)
Strong points of KDE The user can customize the KDE so that it would look whatever way the user requires. Has an excellent file handling system which is also able to handle files which is foreign to the operating system. KDE has lots of applications, games and utilities available through internet and Linux communities. KDE is user friendly even children could learn it by themselves. Also Linux communities provide help almost all the time without any hesitation. KDE has a excellent control panel which is simple and configurable. KDE provides a fully featured GUI which is customizable according to the users needs. KDE easily supports multimedia capabilities such as watching a movie, listening to a song and capturing sound and data. Default KDE comes to the user with loads of great applications such as Kmail, KOffice, Konqueror.
KUBUNTU Page 14
GNOME (GNU Network Object Model Environment, pronounced gah-NOHM) is a graphical user interface (GUI) and set of computer desktop applications for users of the Linux computer operating system. It's intended to make a Linux operating system easy to use for non-programmers and generally corresponds to the Windows desktop interface and its most common set of applications. In fact, GNOME allows the user to select one of several desktop appearances. (Johansson. 2000)
KUBUNTU
Page 15
TOWERDS HUMANITY
2.1.5 XFCE
"XFCE is a lightweight desktop environment for various *NIX systems. Designed for productivity, it loads and executes applications fast, while conserving system resources." (Fourdan, 1996)
KUBUNTU
Page 16
TOWERDS HUMANITY A process needs resources like memory, CPU time and files to complete its execution and finish the tasks it is commanded to. Resources like memory and files are allocated when a process is in execution. The operating system creates the processes of the user and the system. Details of the processes that executed in the system are kept in a process table by the operating system. (kolitha. 2010)
TASK_RUNNING The process which is currently being executing on the CPU or waiting to be executed after the current process is executed.
KUBUNTU Page 17
- 2. 2007)
TASK_UNINTERRUPTIBLE Like TASK_INTERRUPTIBLE, except that delivering a signal to the sleeping process leaves its state unchanged. This process state is seldom used. It is valuable, however, under certain specific conditions in which a process must wait until a given event occurs without being interrupted. (anon - 2. 2007) TASK_STOPPED Process execution has been stopped; the process enters this state after receiving a SIGSTOP, SIGTSTP, SIGTTIN, or SIGTTOU signal. (anon - 2. 2007) TASK_TRACED Process execution has been stopped by a debugger. When a process is being monitored by another (such as when a debugger executes a PTRACE ( ) system call to monitor a test program), each signal may put the process in the TASK_TRACED state. (anon - 2. 2007) EXIT_ZOMBIE Anonymous (2) (2007) stated that: Process execution is terminated, but the parent process has not yet issued a WAIT4 ( ) or WAITPID( ) system call to return information about the dead process. Before the wait( )like call is issued, the kernel cannot discard the data contained in the dead process descriptor because the parent might need it. EXIT_DEAD Anonymous (2) (2007) stated that:
KUBUNTU
Page 18
TOWERDS HUMANITY The final state: the process is being removed by the system because the parent process has just issued a WAIT4 ( ) or WAITPID ( ) system call for it. Changing its state
from EXIT_ZOMBIE to EXIT_DEAD avoids race conditions due to other threads of execution that execute wait( )-like calls on the same process.
KUBUNTU
Page 19
TOWERDS HUMANITY Real-Time Algorithm Timesharing algorithm Real-Time Algorithm is used for processes that should execute in a timely fashion. The Round Robin and FIFO scheduling algorithms are used to switch between Real-Time Processes. (Levinson. n.d) All the processes which does not go through Real-Time algorithm are controlled by the Timesharing Algorithm. Timesharing algorithm is prioritized and credit-based. (Levinson. n.d) Anonymous (3) (n.d) stated that: For the conventional time shared processes, Linux uses a prioritized, credit-based algorithm. Each process possesses a certain number of scheduling credits; when a new task must be chosen to run, the process with most credits is selected. Every time that a timer interrupt occurs, the currently running process loses one credit; when its credits reaches zero, it is suspended and another process is chosen.
KUBUNTU
Page 20
TOWERDS HUMANITY
A B
Deadlock Situation
PRINTER
DVD Drive
KUBUNTU
Page 21
TOWERDS HUMANITY
KUBUNTU
Page 22
TOWERDS HUMANITY They are: Deadlock Prevention. Deadlock Avoidance. Deadlock Detection. Deadlock Recovery.
Deadlock Prevention Deadlock prevention is a set of methods for ensuring that at least one of the necessary conditions does not hold in the system by restraining how requests are made for resources. (Kolitha. 2010) Deadlock Avoidance Kolitha (2010) stated that: Deadlock avoidance requires additional information on how resources will be requested. With the knowledge of complete sequence of requests and releases the operating system can now decide on which processes should wait or proceed. Algorithms are used for each process to declare the maximum number of resources needed. Deadlock Detection An algorithm is used to examine the state of the system to determine if a deadlock has occurred. detection and recovery incurs overheads for executing the detection algorithm with possible losses from recovering from a deadlock. (Kolitha. 2010) Deadlock Recovery When the deadlock recovery algorithm detects deadlock the operating system activates the deadlock recovery methods. These methods are
The operating system notifies the user that there is a deadlock occurred in the system. So the user or the operator has to handle the deadlock manually.
KUBUNTU
Page 23
TOWERDS HUMANITY Sometimes the operating system lets the system itself to recover from the deadlock situation automatically. (Kolitha. 2010)
When a deadlock occurs the operating system tries to break the deadlock by two ways.
o
Process termination Deadlock is occurred due to various processes conflicts. When this happens the operating system terminate all the processes that was the reasons for the deadlock or the operating system terminate one process at a time until the deadlock is terminated. (Kolitha. 2010)
Resource preemption Preempt some resources from processes and give these resources to other processes until the deadlock cycle is broken. (Kolitha. 2010)
KUBUNTU
Page 24
TOWERDS HUMANITY
Memory management can be divided into three areas: Memory management hardware (MMUs, RAM, etc.); Operating system memory management (virtual memory, protection); Application memory management (allocation, de-allocation, garbage collection). (Ravenbrook Limited.2001)
KUBUNTU
Page 25
TOWERDS HUMANITY
Kubuntu used the algorithm Buddy Heap in its memory management. In a buddy system, the allocator will only allocate blocks of certain sizes, and has many free lists, one for each permitted size. The allowed sizes are usually either powers of two, or form a Fibonacci series such that any block apart from the smallest can be divided into two smaller blocks of permitted sizes. When the allocator receives a request for memory, it rounds the requested size up to a permitted size, and returns the first block from that size's free list. If the free list for that size is empty, the allocator splits a block from a larger size and returns one of the pieces, adding the other to the appropriate free list. (memorymanagement.org) Following diagram will explain it further.
Figure 5
KUBUNTU
Page 26
TOWERDS HUMANITY
Virtual memory systems separate the user logical memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the effectively available amount of physical memory using disk swapping. The quality of the virtual memory management in a computer system can have a big impact on overall system performance.
Efficient use of Virtual Memory Management offers some advantages: Program would no longer be constrained by the amount of physical memory that is available. With the available physical memory, more programs can be run at the same time. Less I/O would be needed to Swap user program into memory therefore program runs faster.
(Rajapaksha.S 2010)
KUBUNTU
Page 27
TOWERDS HUMANITY
Virtual memory can be implemented using one of the following methods: Demand paging Demand segmentation
When paging is used in Kubuntu, the processor divides the linear address space into fixed-size pages (of 4KBytes, 2 MBytes, or 4 MBytes in length) that can be mapped into physical memory and/or disk storage. When a program (or task) references a logical address in memory, the processor translates the address into a linear address and then uses its paging mechanism to translate the linear address into a corresponding physical address. (viralpatel.net.2001)
KUBUNTU
Page 28
TOWERDS HUMANITY
(viralpatel.net). (2001),
If the page containing the linear address is not currently in physical memory, the processor generates a pagefault exception (#14). The exception handler for the page-fault exception typically directs the operating system to load the page from disk storage into physical memory. When the page has been loaded in physical memory, a return from the exception handler causes the instruction that generated the exception to be restarted. The information that the processor uses to map linear addresses into the physical address space and to generate page-fault exceptions (when necessary) is contained in page directories and page tables stored in memory. (viralpatel.net.2001)
KUBUNTU
Page 29
TOWERDS HUMANITY
Operating System can admit newly created process (OR) operating system can activate suspended process from the swap memory. (blog.sudobits.com . 2010)
Figure 8
2.6.2 How can the efficiency of how the hardware is used be improved?
Access time should be faster. The access time can be made faster by To reduce seek time (seek time is the time taken for the header to move from the current position to the desired position). To reduce the Rotational latency (is the additional time taken for the disk to rotate the desired sector to the header)
KUBUNTU Page 30
TOWERDS HUMANITY Increase the disk bandwidth Disk bandwidth is the total no. of bytes that have been transferred divided by the time between submission of request and complete transfer of data.
Using an algorithm the I/O will decide and request to access the storage device and it is the same algorithm which is used in Ubuntu 9.1 to Kubuntu.
KUBUNTU
Page 31
TOWERDS HUMANITY
KUbuntu system provides vital information using various system log files. These log files are typically plain ASCII text in a standard log file format, and most of them sit in the traditional system log subdirectory. Many are generated by the system log daemon, on behalf of the system and certain applications, while some applications generate their own logs by writing directly to files in. (help.ubuntu.com)
Logs and Scheduling can be broken down into three (3) main components: Systems Log Application Logs Non-Human Readable Logs
KUBUNTU
Page 32
TOWERDS HUMANITY
Authorization Log
The Authorization Log tracks usage of authorization systems, the mechanisms for authorizing users which prompt for user passwords, such as the Pluggable Authentication Module (PAM) system. The Authorization Log file may be accessed. This log is useful for learning about user logins and usage of the sudo command. (help.ubuntu.com)
Daemon Log
A daemon is a program that runs in the background, generally without human intervention, performing some operation important to the proper running of your system. The daemon log contains information about running systemand application daemons such as the Gnome Display Manager daemon, the Bluetooth HCI daemon hcid, or the MySQLdatabase daemon mysqld. This can help you trouble-shoot problems with a particular daemon. (help.ubuntu.com)
Debug Log
The debug log and provides detailed debug messages from the Kubuntu system and applications which log at the DEBUG level. (help.ubuntu.com)
TOWERDS HUMANITY The kernel log provides a detailed log of messages from the Kubuntu Linux kernel. These messages may prove useful for trouble-shooting a new or custom-built kernel. (help.ubuntu.com)
The kernel ring buffer is not really a log file, but rather an area in the running kernel you can query for kernel boot up messages via the dmesg utility. (help.ubuntu.com)
Messages Log
The messages log contains informational messages from applications and system facilities. This log is useful for examining message output from applications, and system facilities which log to the syslog / sysklog daemon at the INFO level. (help.ubuntu.com)
System Log
The system log typically contains the greatest deal of information by default about our Kubuntu system. It is located at /var/log/syslog, and may contain information other logs do not. Consult the System Log when you can't locate the desired log information in another log. (help.ubuntu.com)
Application Logs The application log records information about activities in application instances. This log is used primarily for debugging and also it contains information about the user too. (Adobe help. 2010)
Non-Human Readable Logs Some log files found in the subdirectory are designed to be readable by applications, not necessarily by humans. Non-Human readable logs contain All the Login Failures, Last logging of the users And all the logging records
KUBUNTU Page 34
Systems Configurations Many GUI configuration utilities work by modifying config files. They should tell the users what files they modify and the modifications they make because sometimes it's easier, faster, or necessary to edit configuration files for functionality the GUI tool does not support, but figuring out what files are involved can be more difficult than actually making the changes. Even if users don't intend to edit the configuration files, knowing which files are modified and how will help users to build accurate mental models about the tools they use, which will help them to effectively use those tools to accomplish their goals.
(ubuntu.com)
When it comes to system Maintenance Kubuntu mainly forces on two aspects they are: Data Backup Software Management
TOWERDS HUMANITY Folder Synchronization For kubuntu file-synchronization tool is unison. It allows two replicas of a collection of files and directories to be stored on different hosts is usually modified by certain rules, and then brought up to date by propagating the changes in each replica to the other. (ubuntu.com)
Creation of archive For operating systems creating an archive is used mainly for long-term storage purposes usually storing configuration files and documents. (Battiston, 2010)
TestDisk questions from OS or BIOS to find the Hard Disks or their characteristics specially LBA size and CHS geometry. Then the TestDisk does a quick check to find out the structure of our disk & compares it with our partition table to figure out entry errors. If the Partition Table has entry errors,
KUBUNTU Page 36
TOWERDS HUMANITY TestDisk is able to repair them. TestDisk can search for partitions and create a new Table or even a new MBR if necessary when we have missing partitions or a completely empty Partition Table in our system.
User has the chance to select any desirable partition from just before the drive failed to boot or the partition(s) were lost. Test Disk may show partition data which is simply from the small portions of a partition that had been deleted and overwritten long ago especially after initiating a detailed search for lost partitions.
Test Disk can be used to collect detailed information about a non-booting drive for further analysis. This has the features for work with both novice & expert users. Also expert users may find Test Disk as a handy tool for performing onsite recovery.
(ubuntu-version-8.blogspot.com. 2006) In Kubuntu they have given data backup systems for recovery as listed below, Folder synchronization Creating an archive Drive imaging Incremental backup (ubuntu-version-8.blogspot.com. 2006)
Shell scripts This is one of the simplest ways to backup. The directories (Folders in windows) which are needed to backup can be selected through a shell script. Those directories can be used as arguments to the tar utility creating an achieve file. This file can be either copied or moved to another location. To create the achieve file tar utility is used.
KUBUNTU
Page 37
TOWERDS HUMANITY
(Kolitha.2010)
File roller (achieve manager) This is Kubuntus default tool for all file archiving purposes. This supports a lot of file formats. Since this comes with a graphical user interface it is much more user friendly. (Kolitha.2010)
KUBUNTU
Page 38
TOWERDS HUMANITY
ROOT
ADD/REMOVE USERS
PASSWORD
User management is a critical part of maintaining a secure system. Ineffective user and privilege management often lead many systems into being compromised. Therefore, it is important that you understand how you can protect your server through simple and effective user account management techniques. (Ubuntu Help 2010) Root Kubuntu developers used same techniques which have being used by the Ubuntu developers. In Ubuntu administrative Root account is disabled by default system settings. It is give a password that cannot be matched by any encrypted value. Because of that the system cannot log in directly as the root. Instead of Root users are adviced to make use of the tool called SUDO to work with system administrative duties. SUDO temporarily elevate user privileges for authorized users who logs in from their current password. This gives the system administrator to control over which actions a one user can use with elevated privileges. (Ubuntu Help 2010)
Add/remove users
KUBUNTU
Page 39
TOWERDS HUMANITY The process for managing local users and groups is straight forward and differs very little from most other GNU/Linux operating systems. Ubuntu and other Debian based distributions, encourage the use of the "add user" package for account management. (Ubuntu Help 2010)
User profile security This security option mainly interacts with servers. In a single server there can be hundreds of users. System administrator should pay close attention to the user home directory permissions to ensure confidentially. By default, user home directories in Ubuntu are created with world read/execute permissions. This means that all users can browse and access the contents of other users home directories (Ubuntu Help 2010) Just by editing one file the system administrator can modify user home directories so that appropriate users can only visit some places. This secures the server from potential threats.
PASSWORD Many security mechanisms in most operating systems use this option as the main user protection strategy. Passwords are mainly used to protect valuable information. Choosing a strong password in any application or program is very important. Kubuntu like Ubuntu keeps a strong password policy in the operating system. By default, Ubuntu requires a minimum password length of 4 characters, as well as some basic entropy checks. If you would like to adjust the minimum length to 6 characters, change the appropriate variable to min=6. (Ubuntu Help 2010) this can be done using a simple command line. It is better to have long and strong passwords, it shouldnt be based on common knowledge such as a famous word or else attackers (crackers) can use Brute-force or Dictionary attack and find users password.
TOWERDS HUMANITY determined one, so it is still advisable to perform basic precautions with regard to console security. (Ubuntu Help 2010)
2.9.3 Firewall
The Linux kernel includes the Netfilter subsystem, which is used to manipulate or decide the fate of network traffic headed into or through your server. All modern Linux firewall solutions use this system for packet filtering. (Ubuntu Help 2010) In Kubuntu same as in Ubuntu, the operating system uses UFW (Uncomplicated Firewall) as the default firewall configuration tool. UFW is a user friendly configuration tool which allows the user to create IPv4 or IPv6 host-based Firewall making it easy to configure iptables firewall configuration. (Ubuntu Help 2010)
2.9.4 AppArmor
AppArmor is a Linux Security Module implementation of name-based mandatory access controls. AppArmor confines individual programs to a set of listed files and posix 1003.1e draft capabilities. (Ubuntu Help 2010) AppArmor is installed and loaded by default. It uses profiles of an application to determine what files and permissions the application requires. Some packages will install their own profiles, and additional profiles can be found in the apparmor-profiles package. (Ubuntu Help 2010)
2.9.5 Certificates
A Certificate is a method used to distribute a public key and other information about a server and the organization who is responsible for it. Certificates can be digitally signed by a Certificate Authority or
KUBUNTU
Page 41
TOWERDS HUMANITY CA. A CA is a trusted third party that has confirmed that the information contained in the certificate is accurate. (Ubuntu Help 2010) One of the most common forms of cryptography today is public-key cryptography. Public-key cryptography utilizes a public key and a private key. The system works by encrypting information using the public key. The information can then only be decrypted using the private key. (Ubuntu Help 2010)
2.9.7 Antivirus
Kubuntu is a Linux distribution. So Kubuntu have some features of Linux. Linux is developed in a manner that viruses cannot run in the system. So that theoretically Linux does not need a antivirus. But when you connect to another machine over a network you should be able to scan the files you receive from the other machine. Not all the other machines have are Linux based Operating systems. So the user will need a Antivirus to scan the files you receive from another computer which has another operating system. (Ubuntu Help 2010)
KUBUNTU
Page 42
TOWERDS HUMANITY
KUBUNTU
Page 43
TOWERDS HUMANITY
KUBUNTU
Page 44
TOWERDS HUMANITY
3.0 Installation
This is the first step of the installation. After booting up from the CD youll get this screen. From this screen you will have to choose your language. Then click next to go for the next step of the installation.
From the next screen youll have to select your region and your city. Then youll have select your time Zone. Then youll have click next to forward in the installation.
KUBUNTU
Page 45
TOWERDS HUMANITY From this screen youll have select the layout of your keyboard. Click next to go the next step of the installation.
In this step youll have to select the way you want to install Kubuntu. You can either install Kubuntu side by side with your other operating system. Or you can create a new partition and you can install Kubuntu to that Partition. We installed it side by side with windows. Then click next to go to the next step of the installation process.
KUBUNTU
Page 46
TOWERDS HUMANITY In this screen well have to enter our details and information to go forward in the installation. User must enter a password with at least six characters for security reasons. This is to prevent unauthorized access. Then youll have to click next to go to the next step of the installation.
This screen shows the selections you have selected during the process. From here you can go backward by pressing the button back and change whatever you want to change. Select install to to start the installation.
KUBUNTU
Page 47
TOWERDS HUMANITY Installation is nearly over. In a matter of minutes youll be able to use Kubuntu 9.1.
Youll have to log in to the system from this page. After entering the details you entered in the installation you can log in.
KUBUNTU
Page 48
TOWERDS HUMANITY This is how the default desktop looks like. Now you can enjoy the Kubuntu Operating system.
KUBUNTU
Page 49
TOWERDS HUMANITY
4.0 Limitations/Extensions
4.1 Extensions
Kubuntu started with Kubuntu-KDE4 Hardy Alpha version. This was pre-alpha version and was encouraged to use within system testers. After major developments and designings Kubuntu released Kubuntu 9.10. Which the developers called as a Stable, Social and a Beautiful operating system. From the released date Kubuntu 9.10 was the most spread among all the Kubuntu versions. (Kubuntu org. 2009) Kubuntu 9.10 has some new changes that boosted up its popularity. For instance Kubuntu 9.10 uses the Linux kernel version 2.6.31. Because of this kernel graphics and the security factor of the Kubuntu 9.10 increased remarkably. Also Kubutu 9.10 uses KDE 4.3 as the default desktop environment. Due to the KDE 4.3 GUI of the Kubuntu 9.10 is very attractive and fast. (Kubuntu org. 2009) Kubuntu 9.10 includes KPackageKit which has lots of various applications by default. As the Kuser which comes with the Kubuntu 9.10 helps the user to manage users. (Kubuntu org. 2009)
4.2 Limitations
Kubuntu 9.10 is based on ubuntu and Linux. So Kubuntu also have some of the mistakes or restrictions those two have. Most of the users worldwide is used to windows operating system. When those users move from windows to Kubuntu they will have some problems because most of the windows executable files do not work in Kubuntu. So the users have to go through some other softwares to get those executables to run. Kubuntu 9.10 does not have most wanted softwares like Visio, Pagemaker, Framemaker, Photoshop, Pdf viewer, etc.
KUBUNTU
Page 50
TOWERDS HUMANITY
5.0 Conclusion
Conclusion of our research on Kubuntu 9.10 operating system. Kubuntu 9.10 is build on a solid Ubuntu 9.10 core and is developed using Linux. Kubuntu 9.10 is free open source operating system. Open source means that the source code of the operating system is given to user who requests it free of charge. And any user can develop the source code and make a new operating system and sell it without any legal issues. Kubuntu depends on its community to help the users when needed. All the help and details can be gathered from the kubuntu organization. When compared to other operating systems like Windows, Macintosh and Solaris Kubuntu is a light weighted operating system. That means it only consumes less hard disk space, low processor and requires low Random Access Memory when compared to the other operating systems. Due to those reasons Kubuntu 9.10 can be installed and worked even in a old computer. Kubuntu 9.10 uses Linux kernel version 2.6.31 which helps the operating system to be more secure. Because of that Kubuntu is less vulnerable to viruses. And also this kernel helps to boost up the system. Kubuntu is non-profit oriented organization which relies on the community to develop and design application software for Kubuntu. So in Kubuntu users wont get much applications compared to other operating systems because community based developed software comes out in much slower pace. Also Kubuntu relies on the community to point out the weaknesses of the operating system. Then the development team will look into the matter and will fix the issue and later on will release updated version with improvements. But a new improved version normally comes out around in six month time. In conclusion Kubuntu 9.10 is unique operating system with improved graphics reaches out to users who are in different ages helping them to do their day to day work, to improve their skills and to communicate with the world in a free open source environment.
KUBUNTU
Page 51
TOWERDS HUMANITY
Birendra Herath
Viraj De Silva
(CB004140) (CB004078) 1.0 Research and Investigation 1.1 Introduction To the OS 1.2 System Software Requirements 1.3 System hardware Requirements 2.0 Analysis 2.1 User Interface 2.2 Processes Control Management 2.3 Deadlock Management 2.4 Memory Management 2.5 Virtual Memory Management 2.6 Secondary Disk Scheduling Management 2.7 System Administration and Support 2.8 Recovery Strategies 2.9 Security Strategies 2.10 Standard Support
KUBUNTU
Page 52
TOWERDS HUMANITY 3.0 Installation 4.0 Limitations/Extensions 5.0 Conclusion 6.0 Gantt Chart
KUBUNTU
Page 53
TOWERDS HUMANITY
KUBUNTU
Page 54
TOWERDS HUMANITY
References
McGee. M. (2010). What Is a User Interface? [Online] 09 September 2010. Available from: wisegeek.com http://www.wisegeek.com/what-is-a-user-interface.htm . [Accessed: 28 December 2010]
1. Juergen. H. (n.d). CLI (command line interface) [Online]. Available from: linux.about.com http://linux.about.com/cs/linux101/g/clilparcommandl.htm . [Accessed: 28th December 2010]
Anonymous (the Linux information project). (2004). GUI Definition. [Online] 01 October 2004. Available from: linfo.org http://www.linfo.org/gui.html . [Accessed: 28th December 2010]
Anonymous (About Kubuntu). (2010). About Kubuntu. [Online] 2010. Available from: kubuntu.org http://www.kubuntu.org/docs/about-kubuntu/C/index.html [Accessed: 28th December 2010]
3. Anonymous (n.d) Chapter 7: What is KDE? [Online]. 2010. Available from: linuxnewbieguide.org http://www.linuxnewbieguide.org/content/chapter-7-what-kde [Accessed 28th December 2010]
4. Johansson .M (2000). GNOME [Online]. Available from: techtarget.com http://searchenterpriselinux.techtarget.com/definition/GNOME [Accessed 28th December 2010]
5. Fourdan. O (1996) About XFCE [Online] Available from: xfce.org http://www.xfce.org/ . [Accessed 28th December 2010] 6. Nagar, A. (n.d). Process Scheduling. [online]. Available: http://s3.amazonaws.com/pptdownload/process-scheduling-1196587916168883-
KUBUNTU
Page 55
7. Kolitha. (2010). user interface. APIIT Slides [Accessed 29th December 2010]
8. Kolitha. (2010). Process Control Management. APIIT Slides [Accessed 29th December 2010]
9. Anonymous (2). (2007) OpenSourceProject. [Online]. 2007. Available from: Opensourceproject.com_http://book.opensourceproject.org.cn/kernel/kernel3rd/opensource/0 596005652/understandlk-chp-3-sect-2.html [Accessed 29th December 2010]
10. Levinson.S.G. (n.d) Process Scheduling in Windows XP, Linux, and UNIX. [Online] Available from: cs,gsu.edu http://www.google.lk/url?sa=t&source=web&cd=26&ved=0CDgQFjAFOBQ&url=http%3A %2F%2Fwww.cs.gsu.edu%2F~cscbecx%2FCSC4320_6320%2520projects%2Fprocess_sche duling.ppt&rct=j&q=process%20scheduling%20algorithms%20in%20linux&ei=fmofTfq8D 8bsrQeq1MHACw&usg=AFQjCNEdwd_duDZ0I0UTisqqTUYbjfDBeg [Accessed 29th December 2010]
11. Anonymous (3). (n.d) Compare Linux credit based algorithm with other scheduling algorithms? [Online]. Available from: geekinterview.com http://www.geekinterview.com/question_details/3178 . [Accessed 29th December 2010]
12. Kolitha. (2010). Deadlock-1 APIIT Slides [Accessed 29th December 2010]
13. Anonymous (4). (2004) The Ostrich Algorithm [Online]. 2004. Available from: Cankaya.edu.trhttp://siber.cankaya.edu.tr/OperatingSystems/summer2004/ceng328/node64.ht ml [Accessed 29th December 2010]
KUBUNTU
Page 56
TOWERDS HUMANITY 14. Anonymous (5). (2010) Ostrich Algorithm [Online]. 2010. Available from: en.academic.ru http://en.academic.ru/dic.nsf/enwiki/770000 [Accessed 29th December 2010]
15. Anonymous(Ubuntu help). (2010) Chapter 8. Security [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/security.html [Accessed 30th December 2010] 16. Anonymous(Ubuntu help). (2010) User Management [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/user-management.html [Accessed 30th December 2010] 17. Anonymous(Ubuntu help). (2010) StrongPasswords [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/community/StrongPasswords [Accessed 30th December 2010]
18. Anonymous(Ubuntu help). Console Security (2010) [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/console-security.html [Accessed 30th December 2010] 19. Anonymous(Ubuntu help). (2010) Firewall [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/firewall.html [Accessed 30th December 2010]
20. Anonymous(Ubuntu help). (2010) AppArmor [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/apparmor.html [Accessed 30th December 2010]
21. Anonymous(Ubuntu help). (2010) Certificates [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/certificates-and-security.html [Accessed 30th December 2010] 22. Kevin. (2007) Schedule automatic updates on Ubuntu [Online]. 16th July 2007. Available from: vanzonneveld.net
http://kevin.vanzonneveld.net/techblog/article/schedule_automatic_updates_on_ubuntu/
KUBUNTU
Page 57
TOWERDS HUMANITY 23. Anonymous (Ubuntu help). (2010) Antivirus [Online]. 2010. Available from: Help.ubuntu.com https://help.ubuntu.com/community/Antivirus [Accessed 30th December 2010] 24. Anonymous (Kubuntu org). (2009) Kubuntu 9.10: Stable, Social and Beautiful [Online]. 30th October 2009 Available from: kubuntu.org http://www.kubuntu.org/news/9.10-release [Accessed 30th December 2010]
Anonymous (The official Ubuntu Book). (2008). Introduction and history of kubuntu. [Online] 14th August
2008. Available from: computingtech.blogspot. http://computingtech.blogspot.com/2008/08/introductionand-history-of-kubuntu.html [Accessed 27th 2010] Anonymous (kde.org). (2004). Home page . [Online]. Available from: kde.org kde.org. [Accessed: 27th December 2010] Anonymous (kde.org). (2010). Home page . [Online]. Available from: ubuntu.com www.ubunu.com [Accessed: 28th December 2010]
Nicks.J (2010). Kubuntu System Requirements [Online]. Available from: buzzle.com http://www.buzzle.com/articles/kubuntu-system-requirements.html [Accessed: 28th December 2010] Lawrence.A.P (2010). Linux 2.6 [Online]. Available from: aplawrence.com http://aplawrence.com/Linux/linux26_features.html [Accessed: 29th December 2010]
Anonymous (Adobe help). (2010). Application logs. [Online]. Available from: adobe.comhttp://help.adobe.com/en_US/FlashMediaServer/3.5_AdminGuide/WS5b3ccc516d4fbf351
KUBUNTU
Page 58
TOWERDS HUMANITY 26. Anonymous Ravenbrook Limited. (2001), The Memory Management Reference .[online] available from memorymanagement.org
http://www.memorymanagement.org/glossary/m.html#memory.management
27. Anonymous (viralpatel.net). (2001), Paging Tutorial | TAJ Operating System .[online]
30. Rajapakse.S(SLIIT.2010) Foundation of Computer Science Operating SystemPrincipalsSri Lanka Institute of Information Technology (SLIIT)
31.
Image Referencing
1. Figure 1: farm1.static.flickr.com 2010. [Online]. Available From: http://farm1.static.flickr.com/49/150312877_5a20b7be83.jpg [Accessed 28th December 2010] 2. Figure 2: geeks.com 2010. [Online]. Available From: http://www.geeks.com/techtips/2007/Images/mhp2_gnome_logo-01.gif [Accessed 28th December 2010] 3. Figure 3: xubuntix.com 2010. [Online]. Available from: http://www.xubuntix.org/media/images/blog/BIG_XFce_logo.png [Accessed 28th December 2010]
KUBUNTU
Page 59
TOWERDS HUMANITY 4. Figure 4: boisestate.edu 2010. [Online]. Available from: http://cs.boisestate.edu/~amit/teaching/552/slides/ch6.pdf [Accessed 28th December 2010] 5. Figure 5,6,7,8,9,10,11,12,13: howtoforge.co 2010. [Online]. Available from: http://www.howtoforge.com/the-perfect-desktop-kubuntu-9.10 [Accessed 30th December 2010]
KUBUNTU
Page 60