Kubuntu OS Project
-
Upload
malith-waniganayake -
Category
Documents
-
view
80 -
download
0
description
Transcript of Kubuntu OS Project
“TOWERDS HUMANITY”
KUBUNTU Page 1
Module Title & Code
Operating Systems (AICT004-3-2)
Intake Code:
DF10A1ICT
“TOWERDS HUMANITY”
No Team Member Names
Res
earc
h
and
Inst
alla
tion
(20
)
Doc
umen
tati
on (
10)
Ref
eren
cing
(10
)
Pre
sent
atio
n (1
5)
Ind
. M
ark
s (3
0)
Tot
al (
100)
1 Birendra Herath
2 Malith Waniganayake
3 Viraj De silva
KUBUNTU Page 2
Submitted By:
Birendra Herath (CB004140)
Viraj De Silva (CB004078)
Malith Waniganayke (CB004144)
Operating System:
Kubuntu
Version: 9.10
Hand Out Date:
4-November-2010
Submission Date:
3-January-2010
Lecturer:
Mr. Kolitha Gunarathna
“TOWERDS HUMANITY”
Abstract
The operating system which we have used in this assignment is Kubuntu 9.10. This is an open
source operating system based on Linux, and it is free of charge with lot of community help available
to the user, which is the main object of this operating system. Kubuntu requires low memory and
space. The main advantage in this operating system is it is less vulnerable to virus compared to
Microsoft Windows.
KUBUNTU Page 3
“TOWERDS HUMANITY”Kubuntu releases a new version every 6 months with all their bugs fixed, and also they provide
updates to the user to make the operating system efficient.
Kubuntu operating system is freely available in the Kubuntu website any user can download and its
free of charge plus Kubuntu deliver their CD to your door step free of charge worldwide. Kubuntu has
provide every possible state free of charge to the user.
Acknowledgement
We would like to thank Ms. Kolitha Gunarathna, our lecture for his valuable support, advices and guidance during the project. Without his supervision I we will not be able to finish this project during this time period.
Without his supervision this project would not have been a success and we will not be able to finish this project during this time period.
KUBUNTU Page 4
“TOWERDS HUMANITY”We would also like to thank APIIT (Asia Pacific Institute of Information Technology) who helped us
during the thesis. We would like to dedicate this study to them as an indication of their significance in
this study as well as in our lives.
Table of ContentsAbstract................................................................................................................................................3
Acknowledgement................................................................................................................................4
Kubuntu, making your PC friendly...................................................................................................7
1.0 Research and Investigation.................................................................................................7
Philosophies of Kubuntu..............................................................................................................8
2.2.5 Process scheduling algorithm.....................................................................................................19
2.3 Deadlock Management.................................................................................................................21
2.3.1 What is a Deadlock?...............................................................................................................21
KUBUNTU Page 5
“TOWERDS HUMANITY”2.3.2 Conditions for Deadlock.........................................................................................................22
2.3.3 Methods for Handling Deadlocks...........................................................................................22
2.3.4 Deadlock handling in Kubuntu................................................................................................24
2.3.5 Ostrich Algorithm...................................................................................................................24
2.4 Memory Management...................................................................................................................25
2.4.1 Memory management in Kubuntu.........................................................................................25
2.4.3 Physical Memory Management in Kubuntu...........................................................................25
2.4.4 Algorithm used in memory management in Kubuntu............................................................26
2.5 Virtual Memory Management......................................................................................................27
2.5.2 Virtual memory Management of Kubuntu.............................................................................28
2.5.2.1 Paging of Kubuntu...............................................................................................................28
2.5.2.2 Swapping of Kubuntu..........................................................................................................29
2.6 Secondary Disk Scheduling Management.....................................................................................30
2.6.1 Why is a Secondary Disk Scheduling Management necessary?..............................................30
2.6.2 How can the efficiency of how the hardware is used be improved?......................................30
2.6.3 The Completely Fair Queuing (CFQ).......................................................................................31
2.6.4 Analyzing Completely Fair Queuing........................................................................................31
2.7 System Administration and support.............................................................................................32
2.7.1 Logs and Scheduling...............................................................................................................32
2.7.2 Systems Logs..............................................................................................................................33
2.7.3 GRUB 2 (Grand Unified Bootloader).......................................................................................35
2.7.4 Systems Maintenance............................................................................................................35
2.7.5 Data Back Up.............................................................................................................................35
2.7.6 Software Management...........................................................................................................36
2.8 Recovery strategies.......................................................................................................................36
2.8. 1 Tools used by Kubuntu for their backup................................................................................37
2.9 Security Strategies........................................................................................................................38
2.9.1 User Management..................................................................................................................39
2.10 Standard Support........................................................................................................................43
2.10.1 Access Free Documentation.................................................................................................43
2.10.2 Community Help...................................................................................................................43
2.10.3 Buy Professional Support Services........................................................................................43
2.10.4 Technical Answer System.....................................................................................................44
KUBUNTU Page 6
“TOWERDS HUMANITY”3.0 Installation....................................................................................................................................45
4.0 Limitations/Extensions..................................................................................................................50
4.1 Extensions.................................................................................................................................50
4.2 Limitations.................................................................................................................................50
5.0 Conclusion....................................................................................................................................51
6.0 Work Load Matrix.........................................................................................................................52
6.0 Gantt Chart...................................................................................................................................55
KUBUNTU Page 7
“TOWERDS HUMANITY”
Kubuntu, making your PC friendly
1.0 Research and Investigation
1.1 Introduction
Kubuntu ("towards humanity”) is a user-friendly Linux based operating system, which started with
Linux 2.6.222 and utilizes the KDE, which was first released in April 2008.
Kubuntu is an official project of Ubuntua complete implementation of the Ubuntu OS led by Jonathan
Riddell (an employee of Canonical Ltd.) and an army of developers.A new release is made every 6th
months, releases is supported for 18 months.
However, Kubuntu uses KDE instead of GNOME for Ubuntu. The main goal of Kubuntu is to be a
great integrated Linux distribution with all of the great features of Ubuntu, but based on KDE. (The
official Ubuntu Book. 2008)
KUBUNTU Page 8
“TOWERDS HUMANITY”Kubuntu is built on the solid and advanced base of Ubuntu, the Kubuntu team aims to create a
distribution that provides an up-to-date and coherent GNU/Linux system for desktop and server
computing. Kubuntu includes a number of selected packages from Ubuntu and is based on Debian's
powerful “APT” package management system. APT allows easy installation and clean removal of
programs, as well as automatic download of extra packages to satisfy dependencies. (About Kubuntu.
2010)
Philosophies of Kubuntu.
Make the very best work available to everyone on the same free terms and conditions without
charging any extra fee.
Includes the very best translations and accessibility infrastructure that the Free Software
community has to offer and to make Kubuntu usable by as many people as possible.
Free software and open source development and which encourage people to improve the
operating system and pass it on.
1.2 Software Requirements
Kubuntu contain same software requriments as ubuntu, there is only one software that differs from ubuntu that the KDE, Ubuntu does not contain KDE it uses a different software instead o KDE
KDE
Kubuntu 9.10 includes the latest KD 4.5 which creates an user friendly environment and some for additional requirements. (ked.org)
Application development with Quickly
Quicky makes it easy for developers to make new applications for Kbuntu. (ubuntu.com)
KUBUNTU Page 9
“TOWERDS HUMANITY”
Ubuntu One
Can use it to back up, store, synchronize and share your data with other Kbuntu One users.(ubuntu.com)
Linux kernel 2.6.31
Kbuntu 9.10 RC includes the 2.6.31-14.48 kernel based on 2.6.31.1. (ubuntu.com)
GRUB 2 by default
iSCSI installation
The iSCSI installation process has been improved, and no longer requires iscsi=true as a boot parameter.
(ubuntu.com)
AppArmor
AppArmor in Kbuntu 9.10 RC features an improved parser that uses cache files, greatly speeding up AppArmor
initialisation on boot. (ubuntu.com)
1.3 Hardware requirements
Minimum System Requirements for Kubuntu
This requirements will be lowest hardware requirements that the operating system will be able to run, but with this minimum requirements the performance of the os will not be guaranteed and the os want be able to give its best performance to the user
Pentium 233 - megahertz (MHZ) processor 4GB of hard disk space 128 MB of RAM Video adapter and monitor with Super VGA (640 x 480)
(Nicks.J . 2010)
Recommended Kubuntu system requirements
KUBUNTU Page 10
“TOWERDS HUMANITY”Using the hardware mention below kubuntus performance would be better, but it requires the futures such as visual effects.
Pentium 300-megahertz (MHZ) processor 8 GB of hard disk space 256 MB of RAM Video card that supports a resolution of 640 x 480 Motherboard architectures can be Intel x86 and AMD64
(Nicks.J. 2010)
Recommended for visual effects
With the following requirement it will be easy or the user and the performance will be also go & without any interruption user will be able to enjoy and work in Kubuntu GUI environment.
1.2 GHz x86 processor
384 MB of system memory (RAM)
Supported graphics card
(Nicks.J. 2010)
KUBUNTU Page 11
“TOWERDS HUMANITY”
2.0 Analysis
2.1 User Interface
2.1.1 User interface
“A user interface describes any mechanism by which a human interacts with a machine or computer.”
(McGee, 2010)
“Generally, the term refers to the method by which a person interacts with a computer. In this area, a
user interface may not simply refer to the mechanism of interaction, but the program that allows it as
well.” (McGee, 2010)
Mainly there are three types of user interfaces in a computer.
Command line Interface (CLI)
Graphical user Interface (GUI)
Menu Driven Interface (MDI)
These three interfaces in general use several components of the computer to get the inputs and to
display the output. The keyboard and the mouse are mainly used to get the information in to the
computer. The primary output device would be the monitor. In some rare cases it would a device like a
projector.
Command Line Interface (CLI)
“A means of communication between a program and its user, based solely on textual input and output.
Commands are input with the help of a keyboard or similar device and are interpreted and executed by
the program. Results are output as text or graphics to the terminal.” (Juergen, n.d)
In this interface the users are only given a terminal. The main input device would be the keyboard.
Users are expected to input commands through the keyboard. The commands that has executed or
entered are shown in the terminal through the main output device the monitor. This user interface is
not user friendly. Due to that reason users prefer a graphical user interface.
KUBUNTU Page 12
“TOWERDS HUMANITY”Graphical user Interface (GUI)
This user interface is far more user friendly than the command line interface. This user interface is
made in a way such that a child would easily learn how to use the computer. This interface creates and
presents a graphical environment to the user though the monitor. To be able to use this interface the
computer must have good graphic generating capabilities. In a graphical user interface there is mainly
five characteristic features that helps to define the interface.
They are:
Menus: gives users choices of tasks and operations listed accordingly. Users can pick the
task from the list and click on that. The chosen task will be then executed.
Windows: The main area which is viewed by the user. In this window all the other features
are shown. This screen can be edited or can be divided into different areas accordingly to the
user’s needs. In the window users can run different programs or the user can perform various
multimedia applications.
Pointer: pointers can take different shapes. Normally it’s the arrow pointer which is used as
the default. The pointer helps user to move around the window or the screen and select
objects (icons) and give commands which perform specific tasks.
Icons: These are used to represent the files or programs in a graphical way. Normally small
pictures are used for icons. By clicking on the icons users can perform multiple tasks.
Desktop: This is the default output or the screen the users can see when they log in to their
operating system.
(The Linux Information Project, 2005)
Menu Driven Interface (MDI)
Menus are presented with a choice on the menu. MDI presents a menu to the user with different
alternatives on the screen. User can select the desired choice of one of the alternatives on the menu
either by using a mouse or a keyboard. By using the mouse the user should click on the choice. If the
user uses the keyboard he or she have to type the number or have to press the corresponding function
key (Kolitha. 2010)
KUBUNTU Page 13
“TOWERDS HUMANITY”Advantages of this MDI are that it easy to use. Also prior knowledge of the commands are not needed
when using this. As the disadvantages we can point out that menus have restrictions. Depending on the
programmer the layout of the menu will be different. So it can sometimes hard to understand. (Kolitha.
2010)
2.1.2 What is an Interface?
“An interface is a shared boundary or connection between two dissimilar objects, devices or a system
through which information is passed. The connection can be either physical or logical” (The Linux
Information Project, 2005).
Kubuntu 9.1 has three desktop environments, KDE, XFCE and GNOME. In Kubuntu the programmers
has used KDE as the default desktop environment. Users can download GNOME, XFCE and install in
Kubuntu so that all three environments can run alongside. But the new KDE environment is upgraded
so that it would run the applications that worked only in other environments.
2.1.3 KDE (K Desktop Environment)
KUBUNTU Page 14
Figure 1: KDE logo
“TOWERDS HUMANITY”
“The default desktop environment for Kubuntu is KDE, a powerful Free Software graphical desktop
environment for GNU/Linux and Unix workstations. It combines ease of use, contemporary
functionality, and outstanding graphical design with the technological superiority of the Unix
operating system.” (About Kubuntu, 2010)
KDE is a open source software which is made by the KDE organization worldwide. “KDE is a
Windowing Manager and Graphical User Interface for the UNIX operating system, not just Linux (but
was made on Linux machines).” (Anon, n.d)
KDE is the most widely spread and used environment and it is older environment if it compared to
other desktop environments. KDE uses C++ as its based programming language. And also it uses
Qt(the Q-toolkit) to generate graphical environment. KDE is easy to use but it is a very powerful
desktop environment which supports highly graphical application for all ages in both work and home
environment. (About Kubuntu, 2010)
Strong points of KDE
The user can customize the KDE so that it would look whatever way the user requires.
Has an excellent file handling system which is also able to handle files which is foreign to the
operating system.
KDE has lots of applications, games and utilities available through internet and Linux
communities.
KDE is user friendly even children could learn it by themselves. Also Linux communities
provide help almost all the time without any hesitation.
KDE has a excellent control panel which is simple and configurable.
KDE provides a fully featured GUI which is customizable according to the users needs.
KDE easily supports multimedia capabilities such as watching a movie, listening to a song and
capturing sound and data.
KUBUNTU Page 15
“TOWERDS HUMANITY” Default KDE comes to the user with loads of great applications such as Kmail, KOffice,
Konqueror.
(Anon. n.d)
2.1.4 GNOME (The GNU Network Object Model Environment)
“GNOME (GNU Network Object Model Environment, pronounced gah-NOHM) is a graphical user
interface (GUI) and set of computer desktop applications for users of the Linux computer operating
system. It's intended to make a Linux operating system easy to use for non-programmers and generally
corresponds to the Windows desktop interface and its most common set of applications. In fact,
GNOME allows the user to select one of several desktop appearances.”
(Johansson. 2000)
KUBUNTU Page 16
Figure 2 : GNOME logo
“TOWERDS HUMANITY”
2.1.5 XFCE
"XFCE is a lightweight desktop environment for various *NIX systems. Designed for productivity, it
loads and executes applications fast, while conserving system resources." (Fourdan, 1996)
2.2 Process Control Management
2.2.1 Process control management
When a user is using a computer there can be instances where user tries to do two things at once. The
operating system will try to execute two processes at once on the same processor. When this occurs
operating system should decide which one of the two processes should execute next on the processor.
Scheduler which is a component of the operating system will handle the decision using a scheduling
algorithm. (Nagar. n.d)
2.2.2 What is a process?
KUBUNTU Page 17
Figure 3: XFCE logo
“TOWERDS HUMANITY”“It is a program in execution which progresses in sequential manner. It is a unit of work with unique
process identification”. (Kolitha. 2010)
A process needs resources like memory, CPU time and files to complete its execution and finish the
tasks it is commanded to. Resources like memory and files are allocated when a process is in
execution. The operating system creates the processes of the user and the system. Details of the
processes that executed in the system are kept in a process table by the operating system. (kolitha.
2010)
2.2.3 Process Descriptor
Anonymous (2) (2007) stated that:
To manage processes, the kernel must have a clear picture of what each process is doing. It must
know, for instance, the process's priority, whether it is running on a CPU or blocked on an event, what
address space has been assigned to it, which files it is allowed to address, and so on. This is the role of
the process descriptor a task_struct type structure whose fields contain all the information related to a
single process.
2.2.4 Process State
“As its name implies, the state field of the process descriptor describes what is currently happening to
the process” (anon - 2. 2007) The process state have an array of flags which explains about the state of
the process. In Linux there are currently six process states. (anon - 2. 2007)
TASK_RUNNING
KUBUNTU Page 18
“TOWERDS HUMANITY”The process which is currently being executing on the CPU or waiting to be executed after the
current process is executed.
TASK_INTERRUPTIBLE
“The process is suspended (sleeping) until some condition becomes true. Raising a hardware interrupt, releasing a
system resource the process is waiting for, or delivering a signal are examples of conditions that might wake up
the process.” (anon - 2. 2007)
TASK_UNINTERRUPTIBLE
“Like TASK_INTERRUPTIBLE, except that delivering a signal to the sleeping process leaves
its state unchanged. This process state is seldom used. It is valuable, however, under certain
specific conditions in which a process must wait until a given event occurs without being
interrupted.” (anon - 2. 2007)
TASK_STOPPED
“Process execution has been stopped; the process enters this state after receiving
a SIGSTOP, SIGTSTP, SIGTTIN, or SIGTTOU signal.” (anon - 2. 2007)
TASK_TRACED
“Process execution has been stopped by a debugger. When a process is being monitored by
another (such as when a debugger executes a PTRACE ( ) system call to monitor a test
program), each signal may put the process in the TASK_TRACED state.” (anon - 2. 2007)
EXIT_ZOMBIE
Anonymous (2) (2007) stated that:
Process execution is terminated, but the parent process has not yet issued a WAIT4
( ) or WAITPID( ) system call to return information about the dead process. Before the wait( )-
like call is issued, the kernel cannot discard the data contained in the dead process descriptor
because the parent might need it.
EXIT_DEAD
Anonymous (2) (2007) stated that:
KUBUNTU Page 19
“TOWERDS HUMANITY”The final state: the process is being removed by the system because the parent process has just
issued a WAIT4 ( ) or WAITPID ( ) system call for it. Changing its state
from EXIT_ZOMBIE to EXIT_DEAD avoids race conditions due to other threads of execution
that execute wait( )-like calls on the same process.
2.2.5 Process scheduling algorithm
“A scheduling algorithm is used to choose the next process. Scheduling is a fundamental function of
an operating system. Scheduling is done to ensure that the CPU is not idle” (Kolitha. 2010)
In Kubuntu the Linux kernel is used. Linux kernel uses two process scheduling algorithms.
KUBUNTU Page 20
“TOWERDS HUMANITY” Real-Time Algorithm
Timesharing algorithm
Real-Time Algorithm is used for processes that should execute in a timely fashion. “The Round Robin
and FIFO scheduling algorithms are used to switch between Real-Time Processes.” (Levinson. n.d)
All the processes which does not go through Real-Time algorithm are controlled by the Timesharing
Algorithm. ”Timesharing algorithm is prioritized and credit-based.” (Levinson. n.d)
Anonymous (3) (n.d) stated that:
For the conventional time –shared processes, Linux uses a prioritized, credit-based algorithm. Each
process possesses a certain number of scheduling credits; when a new task must be chosen to run, the
process with most credits is selected. Every time that a timer interrupt occurs, the currently running
process loses one credit; when its credits reaches zero, it is suspended and another process is chosen.
KUBUNTU Page 21
“TOWERDS HUMANITY”
2.3 Deadlock Management
2.3.1 What is a Deadlock?A computer system is a multiprogramming environment. In a multiprogramming environment several
processes run at the same time. Some of these processes would compete for the same resources
because available numbers of resources are limited. If two processes try to access the same non-
preemptable resources at the same time both processes will be blocked and will remain so forever.
This situation is usually called a deadlock. (Kolitha. 2010)
KUBUNTU Page 22
PRINTER
DVD Drive
A
B
Deadlock Situation
“TOWERDS HUMANITY”
2.3.2 Conditions for Deadlock.
Normally in a computer system Deadlocks occur due to several conditions. If the following
conditions are held continuously in the system deadlocks can occur. Deadlock will only occur if all the
conditions exist together in the system. Separately each one of the conditions can’t make a deadlock
occur in the system. (Kolitha. 2010)
The conditions are:
Mutual Exclusion
Resources are limited. “At least one resource is in a non-shareable mode and Only one process
can use the resource at a time” (Kolitha. 2010)
Hold and Wait
“A process must exist where it is holding at least one resource and is waiting to acquire
additional resources that are currently being held by another process” (Kolitha. 2010)
No-preemption
“Resources cannot be preempted, a process can only release a resource after the process has
completed.” (Kolitha. 2010)
Circular Wait
“A set of waiting processes exist, where each process is waiting for a resource that is held by
another process within the set.” (Kolitha. 2010)
2.3.3 Methods for Handling Deadlocks
When a deadlock occurs in a system the operating system try to overcome the deadlock using different
methods. Normally operating systems uses some protocols to ensure that the computer or the system
won’t enter a Deadlock situation. Sometimes operating systems allows the system to get in to a
deadlock situation and then the operating system tries to recover from it. Some operating systems
ignore the deadlocks that occurred in the system and shows that the deadlock never happened in the
system. (Kolitha. 2010)
In Operating systems there are four ways to overcome the deadlock problem.
KUBUNTU Page 23
“TOWERDS HUMANITY”They are:
Deadlock Prevention.
Deadlock Avoidance.
Deadlock Detection.
Deadlock Recovery.
Deadlock Prevention
“Deadlock prevention is a set of methods for ensuring that at least one of the necessary conditions
does not hold in the system by restraining how requests are made for resources.” (Kolitha. 2010)
Deadlock Avoidance
Kolitha (2010) stated that:
Deadlock avoidance requires additional information on how resources will be requested. With
the knowledge of complete sequence of requests and releases the operating system can now
decide on which processes should wait or proceed. Algorithms are used for each process to
declare the maximum number of resources needed.
Deadlock Detection
“An algorithm is used to examine the state of the system to determine if a deadlock has occurred.
detection and recovery incurs overheads for executing the detection algorithm with possible losses
from recovering from a deadlock.” (Kolitha. 2010)
Deadlock Recovery
When the deadlock recovery algorithm detects deadlock the operating system activates the deadlock
recovery methods. These methods are
The operating system notifies the user that there is a deadlock occurred in the system. So the
user or the operator has to handle the deadlock manually.
KUBUNTU Page 24
“TOWERDS HUMANITY” Sometimes the operating system lets the system itself to recover from the deadlock situation
automatically. (Kolitha. 2010)
When a deadlock occurs the operating system tries to break the deadlock by two ways.
o Process termination
Deadlock is occurred due to various processes conflicts. When this happens the
operating system terminate all the processes that was the reasons for the deadlock or the
operating system terminate one process at a time until the deadlock is terminated.
(Kolitha. 2010)
o Resource preemption
“Preempt some resources from processes and give these resources to other processes
until the deadlock cycle is broken.” (Kolitha. 2010)
2.3.4 Deadlock handling in Kubuntu
Kubuntu operating system uses the same deadlock management techniques of Ubuntu Operating
system. Ubuntu Operating system is based on the Linux kernel uses the UNIX deadlock management
algorithm named as “Ostrich Algorithm.” (Anon- 4. 2004.)
2.3.5 Ostrich Algorithm
Ostrich Algorithm is a method of ignoring potential problems. In deadlock management UNIX and all
the Linux distributions use Ostrich Algorithm due to the factor of low percentage of deadlock
occurring.
“The Ostrich Algorithm is a strategy of ignoring potential problems on the basis that they may be exceedingly
rare - to stick your head in the sand and pretend that there is no problem. This assumes that it is more cost-
effective to allow the problem to occur than to attempt its prevention.” (Anon- 5. 2010)
In this approach deadlocks are just ignored on the assumption that most of the computer operators would prefer
an occasional deadlock. But there will be a rule restricting the computer operator accessing resources. Only one
resource at a time will be allowed to be accessed. (Anon- 4. 2004.)
KUBUNTU Page 25
“TOWERDS HUMANITY”
2.4 Memory Management
To improve the utilization of the CPU and to increase the speed of the computer, we must keep several
processes in memory; that is, we must share memory. For this purpose the use of memory, should be managed.
Therefore, Memory Management (process of managing the memory) can be defined as an art of coordinating
and controlling the use of memory in a computer system.
Memory management can be divided into three areas:
Memory management hardware (MMUs, RAM, etc.);
Operating system memory management (virtual memory, protection);
Application memory management (allocation, de-allocation, garbage collection).
(Ravenbrook Limited.2001)
2.4.1 Memory management in Kubuntu
When it comes to Memory Management of Kubuntu, it is almost same as memory management
system of Ubuntu. (Main difference between operating systems Ubuntu and Kubuntu is typically only
user interface and tools used.)
Kubuntu Memory Management mechanism has two components as Ubuntu and they are as follows:
1. Allocating and freeing physical memory.
2. Handling virtual memory.
2.4.3 Physical Memory Management in Kubuntu
Physical memory is managed globally in Kubuntu via a central free pool and a system daemon to
manage the use of physical memory. Kubuntu uses the system’s RAM (Random Access Memory) as a
central pool of physical memory for different computer programs which executes in the system.
Physical memory is distributed through the central pool at allocation time and returned to the pool
when it is no longer needed. A system daemon (the page scanner) pro actively manages memory
allocation when there is a system wide shortage of memory. (Kokitha.2010)
KUBUNTU Page 26
“TOWERDS HUMANITY”
2.4.4 Algorithm used in memory management in Kubuntu
Kubuntu used the algorithm ‘Buddy Heap’ in its memory management.
In a buddy system, the allocator will only allocate blocks of certain sizes, and has many free lists, one
for each permitted size. The allowed sizes are usually either powers of two, or form a Fibonacci series
such that any block apart from the smallest can be divided into two smaller blocks of permitted sizes.
When the allocator receives a request for memory, it rounds the requested size up to a permitted size,
and returns the first block from that size's free list. If the free list for that size is empty, the allocator
splits a block from a larger size and returns one of the pieces, adding the other to the appropriate free
list. (memorymanagement.org)
Following diagram will explain it further.
Figure 5
KUBUNTU Page 27
“TOWERDS HUMANITY”
2.5 Virtual Memory Management
Size of the most of computer Programs is larger than the physical memory size. Hence, to execute a program,
we could not load all the processes of required programs into physical memory at the same time. Because of this
constraint, it requires another memory location which is larger than the physical memory, and that is called
Virtual Memory. See the figure (figure 5)
Virtual memory systems separate the user logical memory addresses used by a process from actual physical
addresses, allowing separation of processes and increasing the effectively available amount of physical memory
using disk swapping. The quality of the virtual memory management in a computer system can have a big
impact on overall system performance.
Efficient use of Virtual Memory Management offers some advantages:
Program would no longer be constrained by the amount of physical memory that is available.
With the available physical memory, more programs can be run at the same time.
Less I/O would be needed to Swap user program into memory therefore program runs faster.
(Rajapaksha.S 2010)
KUBUNTU Page 28
Figure 6 : Virtual Memory is larger than the Physical Memory
“TOWERDS HUMANITY”
Virtual memory can be implemented using one of the following methods:
Demand paging Demand segmentation
2.5.2 Virtual memory Management of KubuntuAs in the other Operating Systems, virtual memory of Kubuntu, all of the addresses are virtual
addresses and not physical addresses. These virtual addresses are converted into physical addresses by
the processor based on information held in a set of tables maintained by the Kubuntu (operating
system). To make this conversion easier, virtual and physical memory are divided into sections called
pages and this process is called as Paging. These pages are all the same size. However, it’s not
required to be in same size, but if so, the system would be very hard to administer. Each of these pages
is given a unique number; the page frame number
2.5.2.1 Paging of Kubuntu
Paging is a memory management technique which widely uses virtual memory concept.
When paging is used in Kubuntu, the processor divides the linear address space into fixed-size pages (of
4KBytes, 2 MBytes, or 4 MBytes in length) that can be mapped into physical memory and/or disk storage.
When a program (or task) references a logical address in memory, the processor translates the address into a
linear address and then uses its paging mechanism to translate the linear address into a corresponding physical
address.
(viralpatel.net.2001)
KUBUNTU Page 29
“TOWERDS HUMANITY”
Figure 7: Linear Page Translation during Paging
(viralpatel.net). (2001),
If the page containing the linear address is not currently in physical memory, the processor generates a page-
fault exception (#14). The exception handler for the page-fault exception typically directs the operating system
to load the page from disk storage into physical memory. When the page has been loaded in physical memory, a
return from the exception handler causes the instruction that generated the exception to be restarted. The
information that the processor uses to map linear addresses into the physical address space and to generate
page-fault exceptions (when necessary) is contained in page directories and page tables stored in memory.
(viralpatel.net.2001)
2.5.2.2 Swapping of Kubuntu
Swapping is a simple memory/process management technique used by the operating system(os) to increase the
utilization of the processor by moving some blocked process from the main memory to the secondary
memory(hard disk); thus forming a queue of temporarily suspended process and the execution continues with
the newly arrived process. After performing the swapping process, the operating system has two options in
selecting a process for execution:
KUBUNTU Page 30
“TOWERDS HUMANITY”Operating System can admit newly created process (OR) operating system can activate suspended
process from the swap memory.
(blog.sudobits.com . 2010)
Figure 8
2.6 Secondary Disk Scheduling Management
It is the part of the Linux kernel which plans on which I/O operation can access the storage device (the memory disk) so as to get the best throughput time to maximize the number of jobs completed in a given time. They are similar to the algorithms used in elevators, and therefore are sometime known as elevators. The operations that are allowed to access the storage are in such a way as to reduce the movement of the disk header.
2.6.1 Why is a Secondary Disk Scheduling Management necessary?Secondary disk management is necessary for the hardware of a computer to be fast enough to serve the user requirements.
2.6.2 How can the efficiency of how the hardware is used be improved? Access time should be faster. The access time can be made faster by
To reduce seek time (seek time is the time taken for the header to move from the current
position to the desired position).
To reduce the Rotational latency (is the additional time taken for the disk to rotate the desired
sector to the header)
KUBUNTU Page 31
“TOWERDS HUMANITY”Increase the disk bandwidth
Disk bandwidth – is the total no. of bytes that have been transferred divided by the time
between submission of request and complete transfer of data.
Using an algorithm the I/O will decide and request to access the storage device and it is the same
algorithm which is used in Ubuntu 9.1 to Kubuntu.
2.6.3 The Completely Fair Queuing (CFQ)
The Completely Fair Queuing (CFQ) I/O scheduler can be considered as representing an extension to the better
known stochastic fair queuing (SFQ) scheduler implementation. The focus of both implementations is on the
concept of fair allocation of I/O bandwidth among all the initiators of I/O requests. A SFQ based scheduler
design was initially proposed for some network subsystems. The goal to be accomplished is to distribute the
available I/O bandwidth as equally as possible among the I/O requests.
(Lawrence.A.P. 2010)
2.6.4 Analyzing Completely Fair Queuing It has great support
It is fair and is aligned with disk hogging
Prioritization is allowed to the user
Takes necessary steps to prevent starvation
It’s very much complex
(Appleton, 2003)
KUBUNTU Page 32
“TOWERDS HUMANITY”
2.7 System Administration and support
Same as Ubuntu operating system kubuntu also mainly focuses on 4 functionalities both the OS
contains same functionalities, for systems administration and support which take care of the
operating system and they are :-
Desktop configurations
Logs and scheduling
Systems maintenance
Systems and configuration
User and permissions
2.7.1 Logs and Scheduling
KUbuntu system provides vital information using various system log files. These log files are typically
plain ASCII text in a standard log file format, and most of them sit in the traditional system log
subdirectory. Many are generated by the system log daemon, on behalf of the system and certain
applications, while some applications generate their own logs by writing directly to files in.
(help.ubuntu.com)
Logs and Scheduling can be broken down into three (3) main components:
Systems Log
Application Logs
Non-Human Readable Logs
KUBUNTU Page 33
“TOWERDS HUMANITY”
2.7.2 Systems Logs System logs deal primarily with the functioning of the Ubuntu system, not necessarily with additional
applications added by users. Examples include authorization mechanisms, system daemons, system
messages, and the all-encompassing system log itself.
(help.ubuntu.com)
Authorization Log
The Authorization Log tracks usage of authorization systems, the mechanisms for authorizing users
which prompt for user passwords, such as the Pluggable Authentication Module (PAM) system. The
Authorization Log file may be accessed. This log is useful for learning about user logins and usage of
the sudo command. (help.ubuntu.com)
Daemon Log
A daemon is a program that runs in the background, generally without human intervention, performing
some operation important to the proper running of your system. The daemon log contains information
about running systemand application daemons such as the Gnome Display Manager daemon, the
Bluetooth HCI daemon hcid, or the MySQLdatabase daemon mysqld. This can help you trouble-shoot
problems with a particular daemon. (help.ubuntu.com)
Debug Log
The debug log and provides detailed debug messages from the Kubuntu system and applications which
log at the DEBUG level. (help.ubuntu.com)
Kernel Log
KUBUNTU Page 34
“TOWERDS HUMANITY”The kernel log provides a detailed log of messages from the Kubuntu Linux kernel. These messages
may prove useful for trouble-shooting a new or custom-built kernel. (help.ubuntu.com)
Kernel Ring Buffer
The kernel ring buffer is not really a log file, but rather an area in the running kernel you can query for
kernel boot up messages via the dmesg utility. (help.ubuntu.com)
Messages Log
The messages log contains informational messages from applications and system facilities. This log is
useful for examining message output from applications, and system facilities which log to the syslog /
sysklog daemon at the INFO level. (help.ubuntu.com)
System Log
The system log typically contains the greatest deal of information by default about our Kubuntu
system. It is located at /var/log/syslog, and may contain information other logs do not. Consult the
System Log when you can't locate the desired log information in another log. (help.ubuntu.com)
Application Logs
The application log records information about activities in application instances. This log is used primarily for debugging and also it contains information about the user too. (Adobe help. 2010)
Non-Human Readable Logs
Some log files found in the subdirectory are designed to be readable by applications, not necessarily by humans. Non-Human readable logs contain All the Login Failures, Last logging of the users And all the logging records
KUBUNTU Page 35
“TOWERDS HUMANITY”(help.ubuntu.com)
Systems Configurations
Many GUI configuration utilities work by modifying config files. They should tell the users what files they modify and the modifications they make because sometimes it's easier, faster, or necessary to edit configuration files for functionality the GUI tool does not support, but figuring out what files are involved can be more difficult than actually making the changes. Even if users don't intend to edit the configuration files, knowing which files are modified and how will help users to build accurate mental models about the tools they use, which will help them to effectively use those tools to accomplish their goals.
(ubuntu.com)
2.7.3 GRUB 2 (Grand Unified Bootloader)
GRUB 2 is the next generation of GNU GRUB, using version numbers 1.90 and above. GRUB 2 is a complete rewrite and is at a developmental phase. The most important goal is to make GNU GRUB cleaner, safer, more robust, more portable and more powerful. Once the system is on GRUB2 it will either present a menu and awaits user input or automatically transfers control to an operating system kernel. GRUB 2 is the new update version of the GRUB, and with this updated version it has been performance are faster and more flexible. (engrub.org 2010)
2.7.4 Systems Maintenance
When it comes to system Maintenance Kubuntu mainly forces on two aspects they are:
Data Backup
Software Management
2.7.5 Data Back UpFor operating systems there are different types of backup, But Ubuntu their are two primary means as
follows:
KUBUNTU Page 36
“TOWERDS HUMANITY” Folder Synchronization
For kubuntu file-synchronization tool is unison. It allows two replicas of a collection of files
and directories to be stored on different hosts is usually modified by certain rules, and then
brought up to date by propagating the changes in each replica to the other. (ubuntu.com)
Creation of archive
For operating systems creating an archive is used mainly for long-term storage purposes
usually storing configuration files and documents. (Battiston, 2010)
2.7.6 Software Management
In Operating systems software management is about organizing software’s such as updating files,
adding and removing and it happens automatically wherever and whenever necessary.. (Gadolinio,
2010)
2.8 Recovery strategies
Kubuntu, just as its sister OS Ubuntu, uses software called TestDisk to recover its lost partitions. This
is licensed under GNU Public License & consider as open source software. TestDisk utility is not
designed only to recover lost partitions, but also to make non-booting disks bootable, when the disk is
infected by faulty software or by human errors such as fortuitously erasing the Partition Table.
TestDisk questions from OS or BIOS to find the Hard Disks or their characteristics specially LBA size
and CHS geometry. Then the TestDisk does a quick check to find out the structure of our disk &
compares it with our partition table to figure out entry errors. If the Partition Table has entry errors,
KUBUNTU Page 37
“TOWERDS HUMANITY”TestDisk is able to repair them. TestDisk can search for partitions and create a new Table or even a
new MBR if necessary when we have missing partitions or a completely empty Partition Table in our
system.
User has the chance to select any desirable partition from just before the drive failed to boot or the
partition(s) were lost. Test Disk may show partition data which is simply from the small portions of a
partition that had been deleted and overwritten long ago especially after initiating a detailed search for
lost partitions.
Test Disk can be used to collect detailed information about a non-booting drive for further analysis. This has the
features for work with both novice & expert users. Also expert users may find Test Disk as a handy tool for
performing onsite recovery.
(ubuntu-version-8.blogspot.com. 2006)
In Kubuntu they have given data backup systems for recovery as listed below,
Folder synchronization Creating an archive Drive imaging Incremental backup
(ubuntu-version-8.blogspot.com. 2006)
2.8. 1 Tools used by Kubuntu for their backup
Shell scripts
This is one of the simplest ways to backup. The directories (Folders in windows) which are needed to backup can be selected through a shell script. Those directories can be used as arguments to the tar utility creating an achieve file. This file can be either copied or moved to another location. To create the achieve file tar utility is used.
(Kolitha.2010)
KUBUNTU Page 38
“TOWERDS HUMANITY”
File roller (achieve manager)
This is Kubuntu’s default tool for all file archiving purposes. This supports a lot of file formats. Since this comes with a graphical user interface it is much more user friendly. (Kolitha.2010)
2.9 Security Strategies
In Kubuntu Operating system the system developers used the same security strategies that Ubuntu
Operating system consists. We get the same security measures and security options that are in Ubuntu
Operating System. In Ubuntu operating system mainly developers categorized seven security factors
for the user. They are:
User Management
Console Security
Firewall
AppArmor
Certificates
Automatic security Updates
Antivirus
(Ubuntu Help 2010)
2.9.1 User Management
KUBUNTU Page 39
USER MANAGEMENT
“TOWERDS HUMANITY”
“User management is a critical part of maintaining a secure system. Ineffective user and privilege
management often lead many systems into being compromised. Therefore, it is important that you
understand how you can protect your server through simple and effective user account management
techniques.” (Ubuntu Help 2010)
Root
Kubuntu developers used same techniques which have being used by the Ubuntu developers.
In Ubuntu administrative Root account is disabled by default system settings. It is give a
password that cannot be matched by any encrypted value. Because of that the system cannot
log in directly as the root. Instead of Root users are adviced to make use of the tool called
SUDO to work with system administrative duties. SUDO temporarily elevate user privileges
for authorized users who logs in from their current password. This gives the system
administrator to control over which actions a one user can use with elevated privileges.
(Ubuntu Help 2010)
Add/remove users“The process for managing local users and groups is straight forward and differs very little
from most other GNU/Linux operating systems. Ubuntu and other Debian based distributions,
encourage the use of the "add user" package for account management.” (Ubuntu Help 2010)
User profile security
KUBUNTU Page 40
ROOT
ADD/REMOVE USERS
USER PROFILE SECURITY
PASSWORD
“TOWERDS HUMANITY”This security option mainly interacts with servers. In a single server there can be hundreds of
users. System administrator “should pay close attention to the user home directory permissions
to ensure confidentially. By default, user home directories in Ubuntu are created with world
read/execute permissions. This means that all users can browse and access the contents of other
users’ home directories” (Ubuntu Help 2010)
Just by editing one file the system administrator can modify user home directories so that
appropriate users can only visit some places. This secures the server from potential threats.
PASSWORDMany security mechanisms in most operating systems use this option as the main user
protection strategy. Passwords are mainly used to protect valuable information. Choosing a
strong password in any application or program is very important. Kubuntu like Ubuntu keeps a
strong password policy in the operating system. “By default, Ubuntu requires a minimum
password length of 4 characters, as well as some basic entropy checks. If you would like to
adjust the minimum length to 6 characters, change the appropriate variable to min=6.” (Ubuntu
Help 2010) this can be done using a simple command line.
It is better to have long and strong passwords, it shouldn’t be based on common knowledge
such as a famous word or else attackers (crackers) can use “Brute-force” or “Dictionary attack”
and find users password.
2.9.2 Console Security
“It is pretty tough to defend against untold damage caused by someone with physical access to your
environment, for example, theft of hard drives, power or service disruption and so on. Therefore,
console security should be addressed merely as one component of your overall physical security
strategy. A locked "screen door" may deter a casual criminal, or at the very least slow down a
determined one, so it is still advisable to perform basic precautions with regard to console security.”
(Ubuntu Help 2010)
KUBUNTU Page 41
“TOWERDS HUMANITY”
2.9.3 Firewall
“The Linux kernel includes the Netfilter subsystem, which is used to manipulate or decide the fate of
network traffic headed into or through your server. All modern Linux firewall solutions use this
system for packet filtering.” (Ubuntu Help 2010)
In Kubuntu same as in Ubuntu, the operating system uses UFW (Uncomplicated Firewall) as the
default firewall configuration tool. UFW is a user friendly configuration tool which allows the user to
create IPv4 or IPv6 host-based Firewall making it easy to configure iptables firewall configuration.
(Ubuntu Help 2010)
2.9.4 AppArmor
“AppArmor is a Linux Security Module implementation of name-based mandatory access controls.
AppArmor confines individual programs to a set of listed files and posix 1003.1e draft capabilities.”
(Ubuntu Help 2010)
“AppArmor is installed and loaded by default. It uses profiles of an application to determine what files
and permissions the application requires. Some packages will install their own profiles, and additional
profiles can be found in the apparmor-profiles package.” (Ubuntu Help 2010)
2.9.5 Certificates
“A Certificate is a method used to distribute a public key and other information about a server and the
organization who is responsible for it. Certificates can be digitally signed by a Certificate Authority or
CA. A CA is a trusted third party that has confirmed that the information contained in the certificate is
accurate.” (Ubuntu Help 2010)
“One of the most common forms of cryptography today is public-key cryptography. Public-key
cryptography utilizes a public key and a private key. The system works by encrypting information
KUBUNTU Page 42
“TOWERDS HUMANITY”using the public key. The information can then only be decrypted using the private key.” (Ubuntu Help
2010)
2.9.6 Automatic security Updates
“Making sure your system is up to date is a key attribute to its security”. (Kevin. 2007)
Most of the operating systems “releases updates pretty often and you probably don't want to miss out
on added stability and features. You could run updated manually, but why not schedule the updates in
the background to make sure you are always running the latest stable versions, without ever having to
worry about it.” (Kevin. 2007)
2.9.7 Antivirus
Kubuntu is a Linux distribution. So Kubuntu have some features of Linux. Linux is developed in a
manner that viruses cannot run in the system. So that theoretically Linux does not need a antivirus. But
when you connect to another machine over a network you should be able to scan the files you receive
from the other machine. Not all the other machines have are Linux based Operating systems. So the
user will need a Antivirus to scan the files you receive from another computer which has another
operating system. (Ubuntu Help 2010)
2.10 Standard SupportKubuntu has provided their Help & Support services under four categories:
Access Free Documentation Community Help Buy Professional Support Services Technical Answers System
(Help and Support.2010)
KUBUNTU Page 43
“TOWERDS HUMANITY”
2.10.1 Access Free Documentation
Kubuntu does not provide a separate documentation solely for its issues and simply forward to the
official documentation developed and maintained by the Ubuntu Documentation Team.
(Help and Support.2010)
2.10.2 Community Help
A range of free support options are also available from the Kubuntu Community, including forums,
IRC channel and mailing list. There is also multi-language community support. Kubuntu provides
community help via:
Live Chat
Web Forums
Mailing List
(Help and Support.2010)
2.10.3 Buy Professional Support Services
Kubuntu users can get the help form the Canonical Global Support Services team which is an
experienced and well knowledge team of Kubuntu developers. Also professional support is available
from companies listed as Canonical Partners.
(Help and Support.2010)
2.10.4 Technical Answer System
Users can also add their support question in Kubuntu tech answers system which is a part of the Launchpad
system. Here users can keep their queries active until a community member offers an answer which solves their
problems. They can also search through all of the other questions which have been asked and answered.
(Help and Support.2010)
KUBUNTU Page 44
“TOWERDS HUMANITY”
3.0 Installation
KUBUNTU Page 45
“TOWERDS HUMANITY”This is the first step of the installation. After booting up from the CD you’ll get this screen. From this
screen you will have to choose your language.
Then click next to go for the next step of the installation.
From the next screen you’ll have to select
your region and your city. Then you’ll have
select your time Zone. Then you’ll have
click next to forward in the installation.
From this screen you’ll have select the
layout of your keyboard.
Click next to go the next step of the
installation.
KUBUNTU Page 46
Figure 9 : installation pictures
Figure 10: Installation Pictures
“TOWERDS HUMANITY”
In this step you’ll have to select the way
you want to install Kubuntu. You can either
install Kubuntu side by side with your other
operating system. Or you can create a new
partition and you can install Kubuntu to
that Partition.
We installed it side by side with windows.
Then click next to go to the next step of the
installation process.
In this screen well have to enter our details
and information to go forward in the
installation. User must enter a password
with at least six characters for security
reasons. This is to prevent unauthorized
access.
KUBUNTU Page 47
Figure 11 : Installation Pictures
Figure 12: Installation Pictures
“TOWERDS HUMANITY”Then you’ll have to click next to go to the next step of the installation.
This screen shows the selections you
have selected during the process. From
here you can go backward by pressing
the button back and change whatever you
want to change. Select install to to start
the installation.
Installation is nearly over. In a matter of
minutes youll be able to use Kubuntu
9.1.
KUBUNTU Page 48
Figure 13: Installation Pictures
Figure 14: Installation Pictures
“TOWERDS HUMANITY”
You’ll have to log in to the system
from this page. After entering the
details you entered in the installation
you can log in.
This is how the default desktop looks
like. Now you can enjoy the Kubuntu
Operating system.
KUBUNTU Page 49
Figure 15: Installation Pictures
Figure 16: Installation Pictures
“TOWERDS HUMANITY”
4.0 Limitations/Extensions
4.1 Extensions
Kubuntu started with “Kubuntu-KDE4 Hardy Alpha” version. This was pre-alpha version and was
encouraged to use within system testers. After major developments and designing’s Kubuntu released
Kubuntu 9.10. Which the developers called as a Stable, Social and a Beautiful operating system. From
KUBUNTU Page 50
Figure 17: Installation Pictures
“TOWERDS HUMANITY”the released date Kubuntu 9.10 was the most spread among all the Kubuntu versions. (Kubuntu org.
2009)
Kubuntu 9.10 has some new changes that boosted up its popularity. For instance Kubuntu 9.10 uses
the Linux kernel version 2.6.31. Because of this kernel graphics and the security factor of the Kubuntu
9.10 increased remarkably. Also Kubutu 9.10 uses KDE 4.3 as the default desktop environment. Due
to the KDE 4.3 GUI of the Kubuntu 9.10 is very attractive and fast. (Kubuntu org. 2009)
Kubuntu 9.10 includes KPackageKit which has lots of various applications by default. As the Kuser
which comes with the Kubuntu 9.10 helps the user to manage users. (Kubuntu org. 2009)
4.2 Limitations
Kubuntu 9.10 is based on ubuntu and Linux. So Kubuntu also have some of the mistakes or
restrictions those two have. Most of the users worldwide is used to windows operating system. When
those users move from windows to Kubuntu they will have some problems because most of the
windows executable files do not work in Kubuntu. So the users have to go through some other
software’s to get those executables to run.
Kubuntu 9.10 does not have most wanted software’s like Visio, Pagemaker, Framemaker, Photoshop,
Pdf viewer, etc.
5.0 Conclusion
Conclusion of our research on Kubuntu 9.10 operating system.
Kubuntu 9.10 is build on a solid Ubuntu 9.10 core and is developed using Linux. Kubuntu 9.10 is free
open source operating system. Open source means that the source code of the operating system is
given to user who requests it free of charge. And any user can develop the source code and make a
KUBUNTU Page 51
“TOWERDS HUMANITY”new operating system and sell it without any legal issues. Kubuntu depends on its community to help
the users when needed. All the help and details can be gathered from the kubuntu organization.
When compared to other operating systems like Windows, Macintosh and Solaris Kubuntu is a light
weighted operating system. That means it only consumes less hard disk space, low processor and
requires low Random Access Memory when compared to the other operating systems. Due to those
reasons Kubuntu 9.10 can be installed and worked even in a old computer. Kubuntu 9.10 uses Linux
kernel version 2.6.31 which helps the operating system to be more secure. Because of that Kubuntu is
less vulnerable to viruses. And also this kernel helps to boost up the system.
Kubuntu is non-profit oriented organization which relies on the community to develop and design
application software for Kubuntu. So in Kubuntu users wont get much applications compared to other
operating systems because community based developed software comes out in much slower pace. Also
Kubuntu relies on the community to point out the weaknesses of the operating system. Then the
development team will look into the matter and will fix the issue and later on will release updated
version with improvements. But a new improved version normally comes out around in six month
time.
In conclusion Kubuntu 9.10 is unique operating system with improved graphics reaches out to users
who are in different ages helping them to do their day to day work, to improve their skills and to
communicate with the world in a free open source environment.
6.0 Work Load Matrix
Activities and Tasks Birendra
Herath
Viraj De
Silva
Malith
Waniganayake
KUBUNTU Page 52
“TOWERDS HUMANITY”
(CB004140) (CB004078) (CB004144)
1.0 Research and Investigation
1.1 Introduction To the OS
1.2 System Software Requirements
1.3 System hardware
Requirements
2.0 Analysis
2.1 User Interface
2.2 Processes Control Management
2.3 Deadlock Management
2.4 Memory Management
2.5 Virtual Memory Management
2.6 Secondary Disk Scheduling
Management
2.7 System Administration and
Support
2.8 Recovery Strategies
2.9 Security Strategies
2.10 Standard Support
3.0 Installation
4.0 Limitations/Extensions
5.0 Conclusion
KUBUNTU Page 53
“TOWERDS HUMANITY”
6.0 Gantt Chart
KUBUNTU Page 54
“TOWERDS HUMANITY”
6.0 Gantt Chart
KUBUNTU Page 55
“TOWERDS HUMANITY”
References
McGee. M. (2010). What Is a User Interface? [Online] 09 September 2010. Available from: wisegeek.com http://www.wisegeek.com/what-is-a-user-interface.htm . [Accessed: 28 December 2010]
1. Juergen . H. (n.d). CLI (command line interface) [Online]. Available from: linux.about.com
http://linux.about.com/cs/linux101/g/clilparcommandl.htm . [Accessed: 28th December
2010]
Anonymous (the Linux information project). (2004). GUI Definition. [Online] 01 October 2004. Available from: linfo.org http://www.linfo.org/gui.html . [Accessed: 28th December 2010]
2. Anonymous (The Linux Information Project) (2005), User interface definition.
[Online],Available: http://www.linfo.org/user_interface.html [Accessed: 28th December
2010]
Anonymous (About Kubuntu). (2010). About Kubuntu. [Online] 2010. Available from: kubuntu.org http://www.kubuntu.org/docs/about-kubuntu/C/index.html [Accessed: 28th December 2010]
3. Anonymous (n.d) Chapter 7: What is KDE? [Online]. 2010. Available from:
linuxnewbieguide.org http://www.linuxnewbieguide.org/content/chapter-7-what-kde
[Accessed 28th December 2010]
4. Johansson .M (2000). GNOME [Online]. Available from: techtarget.com
http://searchenterpriselinux.techtarget.com/definition/GNOME [Accessed 28th December
2010]
5. Fourdan. O (1996) About XFCE [Online] Available from: xfce.org http://www.xfce.org/ .
[Accessed 28th December 2010]
6. Nagar, A. (n.d). Process Scheduling. [online]. Available: http://s3.amazonaws.com/ppt-
download/process-scheduling-1196587916168883-3.pdf?
Signature=wPEvNrTPksyTgaDkV6H12OxoWvA
KUBUNTU Page 56
“TOWERDS HUMANITY”%3D & Expires=1272894157 & AWSAccessKeyId=AKIAJLJT267DEGKZDHEQ [Accessed:
29th December 2010]
7. Kolitha. (2010). user interface. APIIT Slides [Accessed 29th December 2010]
8. Kolitha. (2010). Process Control Management. APIIT Slides [Accessed 29th December
2010]
9. Anonymous (2). (2007) OpenSourceProject. [Online]. 2007. Available from:
Opensourceproject.com_http://book.opensourceproject.org.cn/kernel/kernel3rd/opensource/
0596005652/understandlk-chp-3-sect-2.html [Accessed 29th December 2010]
10. Levinson.S.G. (n.d) Process Scheduling in Windows XP, Linux, and UNIX. [Online]
Available from: cs,gsu.edu http://www.google.lk/url?
sa=t&source=web&cd=26&ved=0CDgQFjAFOBQ&url=http%3A%2F%2Fwww.cs.gsu.edu
%2F~cscbecx%2FCSC4320_6320%2520projects
%2Fprocess_scheduling.ppt&rct=j&q=process%20scheduling%20algorithms%20in
%20linux&ei=fmofTfq8D8bsrQeq1MHACw&usg=AFQjCNEdwd_duDZ0I0UTisqqTUYbjf
DBeg [Accessed 29th December 2010]
11. Anonymous (3). (n.d) Compare Linux credit based algorithm with other scheduling
algorithms? [Online]. Available from: geekinterview.com
http://www.geekinterview.com/question_details/3178 . [Accessed 29th December 2010]
12. Kolitha. (2010). Deadlock-1 APIIT Slides [Accessed 29th December 2010]
13. Anonymous (4). (2004) The Ostrich Algorithm [Online]. 2004. Available from:
Cankaya.edu.trhttp://siber.cankaya.edu.tr/OperatingSystems/summer2004/ceng328/
node64.html [Accessed 29th December 2010]
KUBUNTU Page 57
“TOWERDS HUMANITY”14. Anonymous (5). (2010) Ostrich Algorithm [Online]. 2010. Available from: en.academic.ru
http://en.academic.ru/dic.nsf/enwiki/770000 [Accessed 29th December 2010]
15. Anonymous(Ubuntu help). (2010) Chapter 8. Security [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/security.html [Accessed 30th December 2010]
16. Anonymous(Ubuntu help). (2010) User Management [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/user-management.html [Accessed 30th December 2010]
17. Anonymous(Ubuntu help). (2010) StrongPasswords [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/community/StrongPasswords [Accessed 30th
December 2010]
18. Anonymous(Ubuntu help). Console Security (2010) [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/console-security.html [Accessed 30th December 2010]
19. Anonymous(Ubuntu help). (2010) Firewall [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/firewall.html [Accessed 30th
December 2010]
20. Anonymous(Ubuntu help). (2010) AppArmor [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/apparmor.html [Accessed 30th
December 2010]
21. Anonymous(Ubuntu help). (2010) Certificates [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/certificates-and-security.html
[Accessed 30th December 2010]
22. Kevin. (2007) Schedule automatic updates on Ubuntu [Online]. 16th July 2007. Available from: vanzonneveld.net http://kevin.vanzonneveld.net/techblog/article/schedule_automatic_updates_on_ubuntu/ [Accessed 30th December 2010]
KUBUNTU Page 58
“TOWERDS HUMANITY”23. Anonymous (Ubuntu help). (2010) Antivirus [Online]. 2010. Available from:
Help.ubuntu.com https://help.ubuntu.com/community/Antivirus [Accessed 30th December
2010]
24. Anonymous (Kubuntu org). (2009) Kubuntu 9.10: Stable, Social and Beautiful [Online]. 30th
October 2009 Available from: kubuntu.org http://www.kubuntu.org/news/9.10-release
[Accessed 30th December 2010]
Anonymous (The official Ubuntu Book). (2008). Introduction and history of kubuntu. [Online] 14th August 2008. Available from: computingtech.blogspot. http://computingtech.blogspot.com/2008/08/introduction-and-history-of-kubuntu.html [Accessed 27th 2010]
Anonymous (kde.org). (2004). Home page . [Online]. Available from: kde.org kde.org. [Accessed: 27th December 2010]
Anonymous (kde.org). (2010). Home page . [Online]. Available from: ubuntu.com www.ubunu.com [Accessed: 28th December 2010]
Nicks.J (2010). Kubuntu System Requirements [Online]. Available from: buzzle.com http://www.buzzle.com/articles/kubuntu-system-requirements.html [Accessed: 28th December 2010]
Lawrence.A.P (2010). Linux 2.6 [Online]. Available from: aplawrence.com http://aplawrence.com/Linux/linux26_features.html [Accessed: 29th December 2010]
Anonymous (Adobe help). (2010). Application logs. [Online]. Available from: adobe.comhttp://help.adobe.com/en_US/FlashMediaServer/3.5_AdminGuide/WS5b3ccc516d4fbf351e63e3d119f2926bcf-79d0.html [Accessed: 29th December 2010]
Anonymous (ubuntu.com). (2008). Rationale. [Online]. Available from: ubuntu.com http://brainstorm.ubuntu.com/idea/334/ [Accessed: 30th December 2010]
Anonymous (engrub.org). (2010). GNU GRUB Wiki [Online]. Available from: enbug.org http://grub.enbug.org/ [Accessed: 31th December 2010]
Anonymous (ubuntu.com). (2008). unison. [Online]. Available from: ubuntu.com http://linux.about.com/cs/linux101/g/unison.htm [Accessed: 30th December 2010]
25. Anonymous (Ravenbrook Limited). (2001), The Memory Management Glossary.[online] available from memorymanagement.org http://www.memorymanagement.org/glossary/m.html#memory.management
KUBUNTU Page 59
“TOWERDS HUMANITY”26. Anonymous Ravenbrook Limited. (2001), The Memory Management Reference .[online]
available from memorymanagement.org http://www.memorymanagement.org/glossary/m.html#memory.management
27. Anonymous (viralpatel.net). (2001), Paging Tutorial | TAJ Operating System .[online]
available from viralpatel.net http://viralpatel.net/taj/tutorial/paging.php
28. Rkjha (blog.sudobits.com ) 10 of August 2010 what is swapping in operating system? .
[online] available from blog.sudobits.com http://blog.sudobits.com/2010/08/10/what-is-
swapping-in-operating-system/
29. Anonymous (ubuntu-version-8.blogspot.com)11 July 2006 Recovery Strategies.[online]
http://ubuntu-version-8.blogspot.com/2009/05/8-recovery-strategies.html
30. Rajapakse.S(SLIIT.2010) Foundation of Computer Science – Operating SystemPrincipalsSri Lanka Institute of Information Technology (SLIIT)
31.
Image Referencing
1. Figure 1: farm1.static.flickr.com 2010. [Online]. Available From:
http://farm1.static.flickr.com/49/150312877_5a20b7be83.jpg [Accessed 28th December 2010]
2. Figure 2: geeks.com 2010. [Online]. Available From:
http://www.geeks.com/techtips/2007/Images/mhp2_gnome_logo-01.gif [Accessed 28th
December 2010]
3. Figure 3: xubuntix.com 2010. [Online]. Available from:
http://www.xubuntix.org/media/images/blog/BIG_XFce_logo.png [Accessed 28th December
2010]
KUBUNTU Page 60
“TOWERDS HUMANITY”4. Figure 4: boisestate.edu 2010. [Online]. Available from:
http://cs.boisestate.edu/~amit/teaching/552/slides/ch6.pdf [Accessed 28th December 2010]
5. Figure 5,6,7,8,9,10,11,12,13: howtoforge.co 2010. [Online]. Available from:
http://www.howtoforge.com/the-perfect-desktop-kubuntu-9.10 [Accessed 30th December
2010]
KUBUNTU Page 61