MN404-Fundamentals of Operating Systems and Programming
Assignment 1A : Operating Systems (OS)
In first part of the Assignment 1, literature review of minimum of two journal/ conference papers (No blogs or Wikipedia to be considered) is required focussing on the following points:
1.Carry out literature review and develop a Taxonomy (classification) of Operating Systems (OS) from conventional to current systems. Use tree diagram to represent the taxonomy and explain the basis of classification. A minimum of 10 OS to be considered.
2.Provide two applications which can run on the operating systems mentioned in the taxonomy.
Provide the details of the resources used. References and in text citations in IEEE style are required.
Assignment 1B : Operating System and Unix Scripts
Section 1:
The second Part of the assignment shall explore the features of OS, such as security in particular and comparison of few features on different OS.
Answer the following questions:
1. Elaborate on the essential features of any one OS that you have researched in Assignment 1a.
2. Justify what makes Linux OS more secure than other OS?
3. Multiprogramming and time-sharing OS allow sharing the resources simultaneously with may users. This can result into various security challenges. What are two such challenges? However, some applications would prefer using time sharing than a single user workstation. List out two applications and justify why they prefer time sharing environment over single user workstation.
4. IoS and Android are two of the top operating systems available today in the mobile market. Research these two and compare them in terms of:
a) Battery Management
b) Process Management
c) Memory Management
d) Security Management
Section 2:
I. Security related command
On a Unix/Linux system, each file and directory are assigned access rights for the owner of the file, the members of a group of related users, and everybody else. Access rights can be assigned to read a file, to write a file, and to execute a file (i.e., run the file as a program).
Execute the following commands (1-5) and paste the screen shots.
1) Create a file and name it with your MITID?
2) What are the default file permissions assigned to the newly created file?
3) Change the default permissions to group, read & write access and verify the same
4) Reset the user password
5) Some files begin with a dot (.). These are called hidden files. How can you list them?
II. Unix networking Commands
Explore the following unix/linux commands. Provide its syntax and explain the purpose of each of the command. Provide references of the resources used.
1) Ping
2) Ifconfig
3) netstat
4) nslookup (Hint: You have an IP address in your network how will you find hostname and vice versa?)
5) ARP