Role Of Operating System As An Interface And Command Line Interface Usage

Role of Operating System as a Resource Manager and Extended Machine

Client System:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The client system is the group of client or can be an individual system also. By the meaning of group it mainly indicates an organization, community or a business. The client system mainly used for communicating with a server. To elaborate the client system further in this case the Microsoft Windows operating system will be used because the Microsoft Windows has all the features which is required to be proper client system. The features are discussed below:

  • A client system may need to serve many users. To serve many users in a single system different accounts are needed and Microsoft Windows supports this multi-user feature [1].
  • Communicating with the server properly is the main task of any client system. Windows operating system does this job petty well.
  • To meet all the requirement of the server the client OS need to handle all the resources within the system properly. Windows OS is capable of this feature.
  • Microsoft Windows can exchange the messages and resources with the server system. This is a basic feature of every client base OS system.
  • The Windows OS is capable to process the data without the help of server system.

The server system works on the client-server architecture. The main aim of the server system is to communicate with the client and handling the requests of the clients [2]. This type of system is designed to communicate with the server. To describe the server system properly the Linux system is selected in this case. The main features of the Linux system as a server are:

  • The Linux OS is capable to access the both command level interface and the graphical user level inter face [3].
  • The Linux system is able to handle multiple clients at same time and can reply them with the proper messages and resources.
  • The Linux can provide the centralized system which is a must have feature of the server system. This system is used for managing client system, administrative processes and for the security services [10].
  • The Linux can run on the solely on the commands. This can be useful for most of the cases for a server system.
  • The security level of the Linux system is high and the internal configuration of the network, hardware and software is also secure for a proper communication method.

The mobile OS system is user friendly for most of the cases and designed to run on the low configuration. Most popular mobile OS is the Android operating system. The main features of the android is:

  • As the Android OS is specially designed for the general use purpose the security level of the Android OS is much higher to protect the privacy of the users.
  • The android OS is stable in the sense because the owner of it, Google LLC is always working on it to introduce new features and for fixing the bugs.
  • The Android OS is able to hide the inner implementation as it uses java for some core functions. The java has the abstract class which can help to hide implementations [4].
  • The Android OS is portable in the sense that beside in the mobile the X86 version of the android is able to run on the desktop systems.
  • The Android OS can manage the memory of the system itself because it is optimised for doing that.

To check the availability of a remote host the ping or telnet command can be used [5].

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

(Figure 1: Checking Remote Host)

(Source: Created by the Author)

In the above screenshot it can be seen that the connection with the remote host is lost so, it is showing network is unreachable. For this test Google public DNS server is used.

To know the CPU usage of different processes “top” command is used [6].

(Figure 2: CPU Usage)

(Source: Created by the Author)

In the above screenshot it is shown that by using the top command all the process related information is displayed. Also, the CPU utilization part is shown.

The “df” command shows the total hard drive space used and also the available space [7].

(Figure 3: Drive Space Checking)

(Source: Created by the Author)

To check whether the system is 32 bit or 64 bit, the “uname –m” command is used [8].

(Figure 4: Machine Architecture)

(Source: Created by the Author)

Analysing the above screenshot it can be stated that the above operating system is running on X64 architecture. It is showing X86_64 means it is capable to run both X86 and X64 application which is designating that the above operating system is based on the X64 architecture.

To count the total occurrence of a particular word the “grep” command is used [9].

(Figure 5: Counting Word Occurrence)

(Source: Created by the Author)

The above screenshot is showing that the file is containing total 11 numbers of “UNIX” word in that file. Here grep is code “UNIX” is that specified word and “file.txt” is the file on which code is executed.

(Figure 6: Executing “% cat /etc/hosts cat?” command)

(Source: Created by the Author)

(Figure 7: echo “Home Directory Is home” uppercase $HOME)

(Source: Created by the Author)

(Figure 8: Executing who | wc command)

(Source: Created by the Author)

(Figure 9: Executing “% who > logged.users” command)

(Source: Created by the Author)

(Figure 10: Executing %date “+%m/%d/%y” command)

(Source: Created by the Author)

The above code is displaying the date of the system.

(Figure 11: Executing %date “+%Y%m%d” Command)

(Source: Created by the Author)

The above code is also showing the date of the system by in different format.

(Figure 12: Executing %date +’%-4.4h %2.1d %H:%M’ Command)

(Source: Created by the Author)

The above command is showing the time of the system.

References:

  1. Leigh, Jessica W., and David Bryant. “popart: full?feature software for haplotype network construction.” Methods in Ecology and Evolution6, no. 9 (2015): 1110-1116.
  2. Vokorokos, Liberios, Anton Baláž, and Norbert Ádám. “Secure web server system resources utilization.” Acta Polytechnica Hungarica12, no. 2 (2015): 5-19.
  3. Sobell, Mark G. A Practical Guide to Fedora and Red Hat Enterprise Linux. Pearson Education, 2014.
  4. Arzt, Steven, Siegfried Rasthofer, and Eric Bodden. “Instrumenting android and java applications as easy as abc.” In International Conference on Runtime Verification, pp. 364-381. Springer, Berlin, Heidelberg, 2013.
  5. Yan, Hao, Jiguo Li, Jinguang Han, and Yichen Zhang. “A novel efficient remote data possession checking protocol in cloud storage.” IEEE Transactions on Information Forensics and Security12, no. 1 (2017): 78-88.
  6. Felter, Wes, Alexandre Ferreira, Ram Rajamony, and Juan Rubio. “An updated performance comparison of virtual machines and linux containers.” In Performance Analysis of Systems and Software (ISPASS), 2015 IEEE International Symposium On, pp. 171-172. IEEE, 2015.
  7. Merkel, Dirk. “Docker: lightweight linux containers for consistent development and deployment.” Linux Journal2014, no. 239 (2014): 2.
  8. Bates, Adam M., Dave Tian, Kevin RB Butler, and Thomas Moyer. “Trustworthy Whole-System Provenance for the Linux Kernel.” In USENIX Security Symposium, pp. 319-334. 2015.
  9. Barrett, Daniel J. Linux Pocket Guide: Essential Commands. ” O’Reilly Media, Inc.”, 2016.
  10. Silberschatz, Abraham, Peter Baer Galvin, and Greg Gagne. Operating system concepts essentials. John Wiley & Sons, Inc., 2014.