|
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command LineBog'liq Linux This Book Includes 4 Manuscripts The Underground BibleThe Concept Of Virtual Machines
In virtual machine systems programmatically create copies of the hardware
(emulation occurs). These copies (virtual machines ) run in parallel, each
running software that interacts with applications and users.
Architecture Features: UNIX and Linux
UNIX Basic Architecture
UNIX is an example of fairly simple OS architecture. Much of the
functionality of this system is contained in the kernel, the kernel
communicates with applications through system calls.
The system has three main components: the process management
subsystem, the file system, and the I / O subsystem. The process
management subsystem controls the creation and deletion of processes, the
allocation of system resources between them, inter-process interaction,
memory management .
The file subsystem provides a single interface for accessing data stored on
disk drives and peripherals. Such an interface is one of the most important
features of UNIX. They use the same system calls to either communicate
with the disk or output to a terminal or printer (the program works with the
printer just like a file). In this case, the file system forwards requests to the
relevant modules of the I / O subsystem, and those - directly to the
peripheral devices. In addition, the file subsystem controls file access rights,
which largely determine the privileges of the user on the system.
The I / O subsystem performs file system requests by interacting with
device drivers. In UNIX, two types of devices: character (eg, printer) and
block (eg, hard disk). The main difference between them is that the block
device allows direct access. To increase the productivity of block devices
using the buffer cache - plot memory which stores data last scanned from
the disc. Subsequent accesses to these data can be retrieved from the cache.
|
|
Bosh sahifa
Aloqalar
Bosh sahifa
Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line
|