Lezione 11 Processi Sistemi Operativi (9 CFU), Cdl Informatica, A

Total Page:16

File Type:pdf, Size:1020Kb

Lezione 11 Processi Sistemi Operativi (9 CFU), Cdl Informatica, A Lezione 11 Processi Sistemi Operativi (9 CFU), CdL Informatica, A. A. ! !" ! 1 Dipartimento di Scienze Fisic$e, Informatic$e e %atematic$e Universit& di %odena e Re((io )mi*ia $ttp+"",e-*a-.in(..nimo.it"peop*e"andreo*ini"didattica"sistemi/operativi 1 0.ote of t$e da1 (%editate, (ente, meditate...) “This is the UNIX philosophy: write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a niversal inter"ace.# #o.(*as McI*ro1 (192 -) %atematico, In(e(nere, Programmatore Inventore de**e pipe e de**e utilit1 U3I4 2 SOLUZIONI DEGLI ESERCIZI 3 Esercizio 1 (1 min.) 0.al 5 il PID del processo init (il (estore dei servizi U3I4)6 4 Identi7cazione esatta con pidof Il PID del processo init p.8 essere individ.ato a partire dal s.o nome esatto con i* comando pidof+ pidof init Si dovre--e ottenere il PID 1. 5 Esercizio 2 (2 min.) I processi del des9top :;3OM)< iniziano con la strin(a :(nome<. Come si possono individ.are i processi del des9top in esec.zione6 6 Individuazione tramite pgrep I processi de**=am-iente des9top ;3OME possono essere individ.ati cercando *=espressione re(olare ^gnome.*$ con il comando pgrep+ pgrep ^gnome.*$ Per stampare anc$e i nomi dei comandi si .sa *=opzione -l+ pgrep -l ^gnome.*$ 7 Esercizio 3 (2 min.) Elencate t.tti i processi (e relativi PID) ese(.iti per conto del vostro .sername. Le((ete la pa(ina di man.ale del comando opportuno per capire come fare. 8 Lett.ra pagina manuale pgrep Si apra la pagina di man.ale del comando pgrep+ man pgrep Scorrendo la pagina, si dovre--ero trovare le due opzioni -u e -U, c$e svolgono il compito ric$iesto. Si .si *=opzione -u. Il perc$> sar& c$iaro in .na *ezione s.ccessiva. 9 Individuazione tramite pgrep I processi de**=.tente studente possono essere individ.ati desktop con *=opzione -u del comando pgrep+ pgrep -l -u studente 10 Esercizio 4 (2 min.) Aprite .n terminale. Con (li str.menti Processo a vostra disposizione, individ.ate .n padre modo per creare .na (erarc$ia di processi come @.ella mostrata in Processo 7(.ra. 7(*io Processo nipote 11 Esec.zione di s$e** gnome-terminal È suBciente lanciare .n Avvio de* em.latore di terminale ed terminale ese(.ire per tre volte il processo bash bash+ bash La (erarc$ia bash richiesta bash bash Avvio de**e Si ottiene l'a*-ero dei processi bash s$e** riportato a 7anco. bash 12 Esercizio 5 (2 min.) %ostrate la catena di processi da init ad .no @[email protected] dei processi bash. 13 Individuazione processo con pgrep Si invidivua .na istanza di EASH con il comando pgrep+ pgrep bash 1234 2345 3456 Si sce(lie .no dei PID, ad esempio 1234. 14 Gis.alizzazione tramite pstree Per vis.alizzare i processi ric$iesti si p.8 .sare il comando pstree. Si .sano le opzioni se(.enti+ -a → stampa dei comandi -p → stampa dei PI# -H → evidenziazione di un processo specifico (e antenati) Il comando ric$iesto 5 il se(.ente+ pstree -a –p -H 1234 Per visua*izzare solo *a catena di processi, si può sostit.ire *=opzione -H con l=opzione -s+ pstree -a –p -s 1234 15 Esercizio 6 (1 min.) Avviate il comando top. Ierminate il processo appena creato, inviandogli .n se(nale opportuno. 16 Esec.zione de* comando top Si apra .n n.ovo terminale e si ese(.a il comando se(.ente+ top 17 Individuazione de* PID con pgrep Si individ.a il PID del processo top con il comando pgrep+ pgrep top 1234 18 Ierminazione con kill Si invia il se(nale di terminazione anomala SIGI)'% al PI#+ kill 1234 3on 5 necessario esplicitare i* se(nale in @.anto SIGT)'M 5 il se(nale di default inviato al processo. Se proprio lo si v.ole esplicitare+ kill -15 1234 19 Esercizio 7 (3 min.) Ese(.ite .n em.latore di terminale. Le((ete la pa(ina di man.ale di pkill e individ.ate .n modo per terminare *=istanza piK recente del processo bash. 20 Lett.ra pagina manuale pgrep Si apra la pagina di man.ale del comando pkill+ man pkill Scorrendo la pagina, si dovre--e trovare *=opzione -n, c$e svo*(e il compito ric$iesto. 21 Uccisione de* processo con pkill Si termina il processo con il comando pkill, .sando *=opzione -n+ pkill -n bash $TTENZION%( P.ò succedere c$e @.esto comando non funzioni. Ciò capita @.ando si prova ad .ccidere i* termina*e da c.i si sta digitando il comando. BASF ignora per motivi di sic.rezza tutti i se(na*i ricevuti dai processi 7(*i. Per (arantire *a c$iusura, si .si SI;KILL (non (estibile) a* posto di SI;I)'%+ pkill -KILL -n bash 22 Esercizio 8 (2 min.) Gisualizzate i trenta 7le piK (randi ne**=intero 7*e s1stem. 23 Stampa di fi*e e dimensioni con find Si stampano i 7le e le relative dimensioni con il comando find+ find / -printf “%s %p\n” 24 Ordinamento con sort L=outp.t del comando precedente viene dato in pasto al comando di ordinamento sort -nrk1, c$e ordina le ri($e ricevute da ST#I3 in modo n.merico e decrescente s.l primo campo+ find / -printf “%s %p\n” | sort -nrk1 25 Se*ezione prime ri(he con head L=outp.t del comando precedente viene dato in pasto al comando di head -n 30, c$e seleziona le prime trenta ri($e (ovvero i primi trenta 7le)+ find / -printf “%s %p\n” | sort -nrk1 | head -n 30 26 Esercizio 9 (3 min.) Il comando se(.ente estrae le colonne :.sername< e :.ser ID< di /etc/passwd e stampa il valore delle .ltime dieci ri($e+ cut -f1,4 /etc/passwd | head -10 Geri7cate la correttezza del comando. 27 #e-.( de* comando con tee Si log(a o(ni outp.t intermedio a((i.n(endo .na istanza di tee dopo o(ni pipe+ cut -f1,4 /etc/passwd | tee cut.txt | head -10 | tee head.txt 28 Analisi o.tp.t cut L=outp.t di cut mostra tutti i campi di /etc/passwd, non solo il primo e il @.arto. Il separatore non 5 stato impostato; lo si imposta con *=opzione -d: di cut+ cut -d: -f1,4 /etc/passwd 29 #e-.( de* comando con tee Si log(a o(ni outp.t intermedio a((i.n(endo .na istanza di tee dopo o(ni pipe+ cut -f1,4 /etc/passwd | tee cut.txt | head -10 | tee head.txt 30 Analisi de**=outp.t di cut L=outp.t di cut mostra .no .ser ID pari a 65534. Ci8 5 molto sospetto, poic$> (li .ser I# dei primi .tenti sono solitamente vicini allo zero. Il @.arto campo del record di /etc/passwd 5 i* (ro.p ID, non lo .ser ID. Si imposta il terzo campo, ovvero lo .ser ID+ cut -d: -f1,3 /etc/passwd 31 #e-.( de* comando con tee Si log(a o(ni outp.t intermedio a((i.n(endo .na istanza di tee dopo o(ni pipe+ cut -f1,4 /etc/passwd | tee cut.txt | head -10 | tee head.txt 32 Analisi de**=outp.t di cut L=outp.t di cut 5 corretto. Si passa al comando s.ccessivo. 33 Analisi de**=o.tp.t di head L=outp.t di head mostra la stampa dei primi dieci .tenti in /etc/passwd. In realtà, si vo(liono (li .ltimi dieci .tenti. Si corre((e il comando .sando tail al posto di head+ tail 34 #e-.( de* comando con tee Si log(a o(ni outp.t intermedio a((i.n(endo .na istanza di tee dopo o(ni pipe+ cut -f1,4 /etc/passwd | tee cut.txt | tail | tee tail.txt 35 Analisi de**=o.tp.t di tail L=outp.t di tail 5 corretto. In de7nitiva, il comando corretto 5+ cut -f1,4 /etc/passwd | tail 36 Esercizio 1! (2 min.) Gisualizzate i trenta 7le piK (randi ne**=intero 7*e s1stem. Usate le named pipe per la com.nicazione tra processi. Spie(ate il -locco dei vari processi coinvolti. 37 Creazione named pipe con mkfifo Il comando 7nale ric$iede la colla-orazione di tre processi distinti. Pertanto, sono necessarie d.e named pipe per la com.nicazione. Si creano le named pipe con il comando mkfifo+ mkfifo fifo1 fifo2 38 Stampa di fi*e e dimensioni con find Si riversa ne**a named pipe fifo1 lo ST#OUI del comando se(.ente -asato su find, c$e stampa i 7le e le relative dimensioni+ find / -printf “%s %p\n” > fifo1 Il processo c$e ese(.e il comando si -locca al momento della scritt.ra, poic$> non esiste ancora .n lettore disponi-ile a cons.mare *=outp.t prodotto. 39 Ordinamento con sort Si ese(.e il comando di ordinamento sort -nrk1, le((endo le ri($e dalla named pipe fifo1 e scrivendo *=outp.t sulla named pipe fifo2+ sort -nrk1 < fifo1 > fifo2 Il processo c$e ese(.e il comando si -locca al momento della scritt.ra, poic$> non esiste ancora .n lettore disponi-ile a cons.mare *=outp.t prodotto. Il -locco di sort implica ancora il -locco di find, p.rtroppo. 40 Ordinamento con sort Si ese(.e il comando di ordinamento sort -nrk1, le((endo le ri($e dalla named pipe fifo1 e scrivendo *=outp.t sulla named pipe fifo2+ sort -nrk1 < fifo1 > fifo2 3on appena si ese(.e @.esto comando, find si sblocca e comincia a riversare il suo output.
Recommended publications
  • Introduction to Computer System
    Chapter 1 INTRODUCTION TO COMPUTER SYSTEM 1.0 Objectives 1.1 Introduction –Computer? 1.2 Evolution of Computers 1.3 Classification of Computers 1.4 Applications of Computers 1.5 Advantages and Disadvantages of Computers 1.6 Similarities Difference between computer and Human 1.7 A Computer System 1.8 Components of a Computer System 1.9 Summary 1.10 Check your Progress - Answers 1.11 Questions for Self – Study 1.12 Suggested Readings 1.0 OBJECTIVES After studying this chapter you will be able to: Learn the concept of a system in general and the computer system in specific. Learn and understand how the computers have evolved dramatically within a very short span, from very huge machines of the past, to very compact designs of the present with tremendous advances in technology. Understand the general classifications of computers. Study computer applications. Understand the typical characteristics of computers which are speed, accuracy, efficiency, storage capacity, versatility. Understand limitations of the computer. Discuss the similarities and differences between the human and the computer. Understand the Component of the computer. 1.1 INTRODUCTION- Computer Today, almost all of us in the world make use of computers in one way or the other. It finds applications in various fields of engineering, medicine, commercial, research and others. Not only in these sophisticated areas, but also in our daily lives, computers have become indispensable. They are present everywhere, in all the dev ices that we use daily like cars, games, washing machines, microwaves etc. and in day to day computations like banking, reservations, electronic mails, internet and many more.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
    The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum
    The Strange Birth and Long Life of Unix - IEEE Spectrum http://spectrum.ieee.org/computing/software/the-strange-birth-and-long-li... COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time-sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e-mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • Squinting at Power Series
    Squinting at Power Series M. Douglas McIlroy AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT Data streams are an ideal vehicle for handling power series. Stream implementations can be read off directly from simple recursive equations that de®ne operations such as multiplication, substitution, exponentiation, and reversion of series. The bookkeeping that bedevils these algorithms when they are expressed in traditional languages is completely hidden when they are expressed in stream terms. Communicating processes are the key to the simplicity of the algorithms. Working versions are presented in newsqueak, the language of Pike's ``squint'' system; their effectiveness depends critically on the stream protocol. Series and streams Power series are natural objects for stream processing. Pertinent computations are neatly describable by recursive equations. CSP (communicating sequential process) languages1, 2 are good vehicles for implementation. This paper develops the algorithmic ideas and reduces them to practice in a working CSP language,3 not coincidentally illustrating the utility of concurrent programming notions in untangling the logic of some intricate computations on sequences. This elegant approach to power series computation, ®rst demonstrated but never published by Kahn and MacQueen as an application of their data stream system, is still little known.4 Power series are represented as streams of coef®cients, the exponents being given implicitly by ordinal position. (This is an in®nite analogue of the familiar representation of a polynomial as an array of coef®cients.) Thus the power series for the exponential function ∞ 1 1 1 e x = Σ x n / n! = 1 + x + __ x 2 + __ x 3 + ___ x 4 + .
    [Show full text]
  • Uma Introdução À Computação: História E Ciência Editora Ixtlan - São Paulo – 2016
    São Paulo – 2016 Copyright © Autores diversos Projeto gráfico: Editora Ixtlan Revisão: Eduardo Telmo Fonseca Santos Milena Montenegro Pereira Diagramação: Márcia Todeschini Capa: Gabriel Polizello Uma introdução à computação: história e ciência Editora Ixtlan - São Paulo – 2016 ISBN: 978-85-8197-510-8 1.Ciência da computação 2.história CDD 000 Editora Ixtlan - CNPJ 11.042.574/0001-49 - I.E. 456166992117 [email protected] – www.editoraixtlan.com DIREITOS PRESERVADOS – É proibida a reprodução total ou parcial, de qualquer forma ou por qualquer meio. A violação dos direitos de autor (Lei Federal 9.610/1998) é crime previsto no art. 184 do Código Penal. Sumário 1. Início da computação - 3 2. Software - 19 3. Representação da Informação - 27 4. Ciência da Computação é Ciência? - 35 5. Rede de Computadores - 37 6. Exercícios Complementares - 49 7. Bibliografia - 53 Cap´ıtulo 1 Início da computação Para entender os fundamentos da computação atual é preciso olhar para o passado e ver como essa disciplina/área foi fundada e como vem se desenvolvendo até a atualidade [5]. Uma das bases da computação é a Matemática. Desde os primórdios o ser humano percebeu a necessidade de desenvolver algo para auxiliá-lo nas mais diversas operações. Essa necessidade é a responsável pelo surgimento desde as máquinas de calcular até as mais diversas máquinas utilizadas no mundo todo. Em torno de 2600 anos a.C., surgiu um dos primeiros instrumentos manuais voltados para ajudar o homem a calcular quantias numéricas. Esse instrumento usado para representação dos números era o ábaco chinês, que apesar do tempo em que surgiu, ainda é comumente utilizado em certas localidades.
    [Show full text]
  • Universidad Nacional Autónoma De México, Por Permitirme El Honor De Formar Parte De Ella
    Universidad Nacional Autónoma de México FACULTAD DE INGENIERÍA “SISTEMA DE MONITOREO DE SERVIDORES UNIX” T E S I S Que para obtener el Título de: INGENIERO EN COMPUTACIÓN P r e s e n t a: EDGAR CRISTÓBAL RAMÍREZ MIRANDA Director de Tesis: Ing. Noé Cruz Marín Agradecimientos Más que gracias, mi eterno amor a mi padre, mi madre y a mis hermanos a los cuales les debo lo que soy. Papá te admiro y respeto profundamente por la rectitud y honradez con la que te conduces a cada paso de tu vida, por el apoyo y dirección que siempre de ti he recibido, por todas las enseñanzas que desde chico recibí de ti y espero seguir recibiendo. Mamá te amo por todos los años de dedicación que me has dado, por los desvelos, por las lágrimas, por los cariños, por tu inmensa ternura y compasión, por que no encuentro ni encontraré jamás la forma de pagarte todo lo que me has dado, gracias. A mi hermano Emilio por ser mi amigo, por enseñarme a defenderme, por ser mi ídolo, por ensañarme a no desistir nunca hasta alcanzar las metas, porque a tu lado siempre me sentí protegido, por alentarme a ser ingeniero. A mi hermano Joaquín, por que de ti aprendí a ser más sereno a pensar antes de actuar, por siempre protegerme de todos sin importarte nada, por estar conmigo en las buenas y en las malas, por tu tolerancia, por ser mi amigo en los tiempos difíciles. Gracias por aguantarme, soportarme, cuidarme y quererme de la forma en la que lo hacen, estoy y siempre estaré orgulloso de pertenecer a la familia Ramírez Miranda.
    [Show full text]
  • Praktikum Iz Softverskih Alata U Elektronici
    PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2017/2018 Predrag Pejović 31. decembar 2017 Linkovi na primere: I OS I LATEX 1 I LATEX 2 I LATEX 3 I GNU Octave I gnuplot I Maxima I Python 1 I Python 2 I PyLab I SymPy PRAKTIKUM IZ SOFTVERSKIH ALATA U ELEKTRONICI 2017 Lica (i ostali podaci o predmetu): I Predrag Pejović, [email protected], 102 levo, http://tnt.etf.rs/~peja I Strahinja Janković I sajt: http://tnt.etf.rs/~oe4sae I cilj: savladavanje niza programa koji se koriste za svakodnevne poslove u elektronici (i ne samo elektronici . ) I svi programi koji će biti obrađivani su slobodan softver (free software), legalno možete da ih koristite (i ne samo to) gde hoćete, kako hoćete, za šta hoćete, koliko hoćete, na kom računaru hoćete . I literatura . sve sa www, legalno, besplatno! I zašto svake godine (pomalo) updated slajdovi? Prezentacije predmeta I engleski I srpski, kraća verzija I engleski, prezentacija i animacije I srpski, prezentacija i animacije A šta se tačno radi u predmetu, koji programi? 1. uvod (upravo slušate): organizacija nastave + (FS: tehnička, ekonomska i pravna pitanja, kako to uopšte postoji?) (≈ 1 w) 2. operativni sistem (GNU/Linux, Ubuntu), komandna linija (!), shell scripts, . (≈ 1 w) 3. nastavak OS, snalaženje, neki IDE kao ilustracija i vežba, jedan Python i jedan C program . (≈ 1 w) 4.L ATEX i LATEX 2" (≈ 3 w) 5. XCircuit (≈ 1 w) 6. probni kolokvijum . (= 1 w) 7. prvi kolokvijum . 8. GNU Octave (≈ 1 w) 9. gnuplot (≈ (1 + ) w) 10. wxMaxima (≈ 1 w) 11. drugi kolokvijum . 12. Python, IPython, PyLab, SymPy (≈ 3 w) 13.
    [Show full text]
  • Language Technology for Cultural Heritage Data (Latech 2007), Pages 41–48, Prague, Czech Republic, June
    The Workshop Programme 9:30- 9:35 Introduction 9:35-10:00 Penny Labropoulou, Harris Papageorgiou, Byron Georgantopoulos, Dimitra Tsagogeorga, Iason Demiros and Vassilios Antonopoulos: "Integrating Language Technology in a web-enabled Cultural Heritage system" 10:00-10:30 Oto Vale, Arnaldo Candido Junior, Marcelo Muniz, Clarissa Bengtson, Lívia Cucatto, Gladis Almeida, Abner Batista, Maria Cristina Parreira da Silva, Maria Tereza Biderman and Sandra Aluísio: "Building a large dictionary of abbreviations for named entity recognition in Portuguese historical corpora" 11:00-11:30 Eiríkur Rögnvaldsson and Sigrún Helgadóttir: "Morphological tagging of Old Norse texts and its use in studying syntactic variation and change" 11:30-12:00 Lars Borin and Markus Forsberg: "Something Old, Something New: A Computational Morphological Description of Old Swedish" 12:00-12:30 Dag Trygve Truslew Haug and Marius Larsen Jøhndal: "Creating a Parallel Treebank of the Old Indo-European Bible Translations" 12:30-12:55 Elena Grishina: "Non-Standard Russian in Russian National Corpus (RNC)" 12:55-13:20 Dana Dannélls: "Generating tailored texts for museum exhibits" 14:30-15:00 David Bamman and Gregory Crane: "The Logic and Discovery of Textual Allusion" 15:00-15:30 Dimitrios Vogiatzis, Galanis Dimitrios, Vangelis Karkaletsis and Ion Androutsopoulos: "A Conversant Robotic Guide to Art Collections" 15:30-16:00 René Witte, Thomas Gitzinger, Thomas Kappler and Ralf Krestel: "A Semantic Wiki Approach to Cultural Heritage Data Management" 16:30-17:15 Christoph Ringlstetter: "Error Correction in OCR-ed Data"- Invited Talk 17:15-17:30 Closing i Workshop Organisers Caroline Sporleder (Co-Chair), Saarland University, Germany Kiril Ribarov (Co-Chair), Charles University, Czech Republic Antal van den Bosch, Tilburg University, The Netherlands Milena P.
    [Show full text]
  • The History of Unix in the History of Software Haigh Thomas
    The History of Unix in the History of Software Haigh Thomas To cite this version: Haigh Thomas. The History of Unix in the History of Software. Cahiers d’histoire du Cnam, Cnam, 2017, La recherche sur les systèmes : des pivots dans l’histoire de l’informatique – II/II, 7-8 (7-8), pp77-90. hal-03027081 HAL Id: hal-03027081 https://hal.archives-ouvertes.fr/hal-03027081 Submitted on 9 Dec 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 77 The History of Unix in the History of Software Thomas Haigh University of Wisconsin - Milwaukee & Siegen University. You might wonder what I am doing The “software crisis” and here, at an event on this history of Unix. the 1968 NATO Conference As I have not researched or written about on Software Engineering the history of Unix I had the same question myself. But I have looked at many other The topic of the “software crisis” things around the history of software and has been written about a lot by profes- this morning will be talking about how sional historians, more than anything some of those topics, including the 1968 else in the entire history of software2.
    [Show full text]
  • UNIX Security
    UNIX Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger UNIX System • Originated in the late 60’s, early 70’s – Bell Labs: Ken Thompson, Dennis Ritchie, Douglas McIlroy • Multiuser Operating System – Enables protection from other users – Enables protection of system services from users • Simpler, faster approach than Multics CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 2 UNIX Security • Each user owns a set of files – Simple way to express who else can access – All user processes run as that user • The system owns a set of files – Root user is defined for system principal – Root can access anything • Users can invoke system services – Need to switch to root user (setuid) • Q: Does UNIX enable configuration of “secure” systems? CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page 3 UNIX Challenges • More about protection than security – Implicitly assumes non-malicious user and trusted system processes • Discretionary Access Control (DAC) – User or their processes may update permission assignments • Each program has all user’s rights • Must trust their processes to be non-malicious • File permission assignments – Assignment based on what is necessary for things to work • All your processes have all your rights • System services have full access – Users invoke setuid (root) procs that have all
    [Show full text]
  • Concept Learning
    Unit 3 Milestones and Giants in IT Industry Concept Learning The Birth of Unix Kenneth "Ken" Thompson (born February 4, 1943), commonly referred to as Ken in hacker circles, is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems. Since 2006, Thompson has worked at Google, where he co-invented the Go programming language. In 1983, Thompson and Ritchie jointly received the Turing Award "for their development of generic operating systems theory and specifically for the implementation of the UNIX operating system." C Ken Ken Thompson and Dennis Ritchie (standing) at Bell Labs, 1972 In the end of 1960s, the young engineer at AT&T Bell Labs Kenneth (Ken) Thompson worked on the project of Multics operating system. Multics (Multiplexing Information and Computer Services) was an experimental operating system for GE-645 mainframe, developed in 1960s by Massachusetts Institute of Technology, Bell Labs, and General Electric. It introduced many innovations, but had many problems. 1969 was that magic year in which mankind first went to the moon, ARPANET (the precursor to the Internet) was launched, UNIX was born, and a number of other interesting events occurred. It was also the year that Thompson wrote the game Space Travel. In 1969, frustrated by the slow progress and difficulties, Bell Labs withdrew from the MULTICS project and Thompson decided to write his own operating system, in large part because he wanted a decent system on which to run his game, Space Travel, on the PDP-7.
    [Show full text]
  • Domain Computing: the Next Generation of Computing
    Domain Computing: The Next Generation of Computing A Thesis Submitted to the College of Graduate Studies and Research in Partial Fulfillment of the Requirements for the degree of Master of Science in the Department of Computer Science University of Saskatchewan Saskatoon By Yi Xue c Yi Xue, 05/2017. All rights reserved. Permission to Use In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree from the University of Saskatchewan, I agree that the Libraries of this University may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purposes may be granted by the professor or professors who supervised my thesis work or, in their absence, by the Head of the Department or the Dean of the College in which my thesis work was done. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to the University of Saskatchewan in any scholarly use which may be made of any material in my thesis. Requests for permission to copy or to make other use of material in this thesis in whole or part should be addressed to: Head of the Department of Computer Science 176 Thorvaldson Building 110 Science Place University of Saskatchewan Saskatoon, Saskatchewan Canada S7N 5C9 i Abstract Computers are indispensable in our daily lives. The first generation of computing started the era of human automation computing.
    [Show full text]