kubuntu os project

82
TOWERDS HUMANITY” KUBUNTU Page 1 Module Title & Code Operating Systems

Upload: malith-waniganayake

Post on 04-Jan-2016

85 views

Category:

Documents


0 download

DESCRIPTION

Reserch on Kubuntu OS on university Student basis

TRANSCRIPT

Page 1: Kubuntu OS Project

“TOWERDS HUMANITY”

KUBUNTU Page 1

Module Title & Code

Operating Systems (AICT004-3-2)

Intake Code:

DF10A1ICT

Page 2: Kubuntu OS Project

“TOWERDS HUMANITY”

No Team Member Names

Res

earc

h

and

Inst

alla

tion

(20

)

Doc

umen

tati

on (

10)

Ref

eren

cing

(10

)

Pre

sent

atio

n (1

5)

Ind

. M

ark

s (3

0)

Tot

al (

100)

1 Birendra Herath

2 Malith Waniganayake

3 Viraj De silva

KUBUNTU Page 2

Submitted By:

Birendra Herath (CB004140)

Viraj De Silva (CB004078)

Malith Waniganayke (CB004144)

Operating System:

Kubuntu

Version: 9.10

Hand Out Date:

4-November-2010

Submission Date:

3-January-2010

Lecturer:

Mr. Kolitha Gunarathna

Page 3: Kubuntu OS Project

“TOWERDS HUMANITY”

Abstract

The operating system which we have used in this assignment is Kubuntu 9.10. This is an open

source operating system based on Linux, and it is free of charge with lot of community help available

to the user, which is the main object of this operating system. Kubuntu requires low memory and

space. The main advantage in this operating system is it is less vulnerable to virus compared to

Microsoft Windows.

KUBUNTU Page 3

Page 4: Kubuntu OS Project

“TOWERDS HUMANITY”Kubuntu releases a new version every 6 months with all their bugs fixed, and also they provide

updates to the user to make the operating system efficient.

Kubuntu operating system is freely available in the Kubuntu website any user can download and its

free of charge plus Kubuntu deliver their CD to your door step free of charge worldwide. Kubuntu has

provide every possible state free of charge to the user.

Acknowledgement

We would like to thank Ms. Kolitha Gunarathna, our lecture for his valuable support, advices and guidance during the project. Without his supervision I we will not be able to finish this project during this time period.

Without his supervision this project would not have been a success and we will not be able to finish this project during this time period.

KUBUNTU Page 4

Page 5: Kubuntu OS Project

“TOWERDS HUMANITY”We would also like to thank APIIT (Asia Pacific Institute of Information Technology) who helped us

during the thesis. We would like to dedicate this study to them as an indication of their significance in

this study as well as in our lives.

Table of ContentsAbstract................................................................................................................................................3

Acknowledgement................................................................................................................................4

Kubuntu, making your PC friendly...................................................................................................7

1.0 Research and Investigation.................................................................................................7

Philosophies of Kubuntu..............................................................................................................8

2.2.5 Process scheduling algorithm.....................................................................................................19

2.3 Deadlock Management.................................................................................................................21

2.3.1 What is a Deadlock?...............................................................................................................21

KUBUNTU Page 5

Page 6: Kubuntu OS Project

“TOWERDS HUMANITY”2.3.2 Conditions for Deadlock.........................................................................................................22

2.3.3 Methods for Handling Deadlocks...........................................................................................22

2.3.4 Deadlock handling in Kubuntu................................................................................................24

2.3.5 Ostrich Algorithm...................................................................................................................24

2.4 Memory Management...................................................................................................................25

2.4.1 Memory management in Kubuntu.........................................................................................25

2.4.3 Physical Memory Management in Kubuntu...........................................................................25

2.4.4 Algorithm used in memory management in Kubuntu............................................................26

2.5 Virtual Memory Management......................................................................................................27

2.5.2 Virtual memory Management of Kubuntu.............................................................................28

2.5.2.1 Paging of Kubuntu...............................................................................................................28

2.5.2.2 Swapping of Kubuntu..........................................................................................................29

2.6 Secondary Disk Scheduling Management.....................................................................................30

2.6.1 Why is a Secondary Disk Scheduling Management necessary?..............................................30

2.6.2 How can the efficiency of how the hardware is used be improved?......................................30

2.6.3 The Completely Fair Queuing (CFQ).......................................................................................31

2.6.4 Analyzing Completely Fair Queuing........................................................................................31

2.7 System Administration and support.............................................................................................32

2.7.1 Logs and Scheduling...............................................................................................................32

2.7.2 Systems Logs..............................................................................................................................33

2.7.3 GRUB 2 (Grand Unified Bootloader).......................................................................................35

2.7.4 Systems Maintenance............................................................................................................35

2.7.5 Data Back Up.............................................................................................................................35

2.7.6 Software Management...........................................................................................................36

2.8 Recovery strategies.......................................................................................................................36

2.8. 1 Tools used by Kubuntu for their backup................................................................................37

2.9 Security Strategies........................................................................................................................38

2.9.1 User Management..................................................................................................................39

2.10 Standard Support........................................................................................................................43

2.10.1 Access Free Documentation.................................................................................................43

2.10.2 Community Help...................................................................................................................43

2.10.3 Buy Professional Support Services........................................................................................43

2.10.4 Technical Answer System.....................................................................................................44

KUBUNTU Page 6

Page 7: Kubuntu OS Project

“TOWERDS HUMANITY”3.0 Installation....................................................................................................................................45

4.0 Limitations/Extensions..................................................................................................................50

4.1 Extensions.................................................................................................................................50

4.2 Limitations.................................................................................................................................50

5.0 Conclusion....................................................................................................................................51

6.0 Work Load Matrix.........................................................................................................................52

6.0 Gantt Chart...................................................................................................................................55

KUBUNTU Page 7

Page 8: Kubuntu OS Project

“TOWERDS HUMANITY”

Kubuntu, making your PC friendly

1.0 Research and Investigation

1.1 Introduction

Kubuntu ("towards humanity”) is a user-friendly Linux based operating system, which started with

Linux 2.6.222 and utilizes the KDE, which was first released in April 2008.

Kubuntu is an official project of Ubuntua complete implementation of the Ubuntu OS led by Jonathan

Riddell (an employee of Canonical Ltd.) and an army of developers.A new release is made every 6th

months, releases is supported for 18 months.

However, Kubuntu uses KDE instead of GNOME for Ubuntu. The main goal of Kubuntu is to be a

great integrated Linux distribution with all of the great features of Ubuntu, but based on KDE. (The

official Ubuntu Book. 2008)

KUBUNTU Page 8

Page 9: Kubuntu OS Project

“TOWERDS HUMANITY”Kubuntu is built on the solid and advanced base of Ubuntu, the Kubuntu team aims to create a

distribution that provides an up-to-date and coherent GNU/Linux system for desktop and server

computing. Kubuntu includes a number of selected packages from Ubuntu and is based on Debian's

powerful “APT” package management system. APT allows easy installation and clean removal of

programs, as well as automatic download of extra packages to satisfy dependencies. (About Kubuntu.

2010)

Philosophies of Kubuntu.

Make the very best work available to everyone on the same free terms and conditions without

charging any extra fee.

Includes the very best translations and accessibility infrastructure that the Free Software

community has to offer and to make Kubuntu usable by as many people as possible.

Free software and open source development and which encourage people to improve the

operating system and pass it on.

1.2 Software Requirements

Kubuntu contain same software requriments as ubuntu, there is only one software that differs from ubuntu that the KDE, Ubuntu does not contain KDE it uses a different software instead o KDE

KDE

Kubuntu 9.10 includes the latest KD 4.5 which creates an user friendly environment and some for additional requirements. (ked.org)

Application development with Quickly

Quicky makes it easy for developers to make new applications for Kbuntu. (ubuntu.com)

KUBUNTU Page 9

Page 10: Kubuntu OS Project

“TOWERDS HUMANITY”

Ubuntu One

Can use it to back up, store, synchronize and share your data with other Kbuntu One users.(ubuntu.com)  

 

Linux kernel 2.6.31

Kbuntu 9.10 RC includes the 2.6.31-14.48 kernel based on 2.6.31.1. (ubuntu.com)

GRUB 2 by default

iSCSI installation

The iSCSI installation process has been improved, and no longer requires iscsi=true as a boot parameter.

(ubuntu.com)

AppArmor

AppArmor in Kbuntu 9.10 RC features an improved parser that uses cache files, greatly speeding up AppArmor

initialisation on boot. (ubuntu.com)

1.3 Hardware requirements

Minimum System Requirements for Kubuntu

This requirements will be lowest hardware requirements that the operating system will be able to run, but with this minimum requirements the performance of the os will not be guaranteed and the os want be able to give its best performance to the user

Pentium 233 - megahertz (MHZ) processor 4GB of hard disk space 128 MB of RAM Video adapter and monitor with Super VGA (640 x 480)

(Nicks.J . 2010)

Recommended Kubuntu system requirements

KUBUNTU Page 10

Page 11: Kubuntu OS Project

“TOWERDS HUMANITY”Using the hardware mention below kubuntus performance would be better, but it requires the futures such as visual effects.

Pentium 300-megahertz (MHZ) processor 8 GB of hard disk space 256 MB of RAM Video card that supports a resolution of 640 x 480 Motherboard architectures can be Intel x86 and AMD64

(Nicks.J. 2010)

Recommended for visual effects

With the following requirement it will be easy or the user and the performance will be also go & without any interruption user will be able to enjoy and work in Kubuntu GUI environment.

1.2 GHz x86 processor

384 MB of system memory (RAM)

Supported graphics card

(Nicks.J. 2010)

KUBUNTU Page 11

Page 12: Kubuntu OS Project

“TOWERDS HUMANITY”

2.0 Analysis

2.1 User Interface

2.1.1 User interface

“A user interface describes any mechanism by which a human interacts with a machine or computer.”

(McGee, 2010)

“Generally, the term refers to the method by which a person interacts with a computer. In this area, a

user interface may not simply refer to the mechanism of interaction, but the program that allows it as

well.” (McGee, 2010)

Mainly there are three types of user interfaces in a computer.

Command line Interface (CLI)

Graphical user Interface (GUI)

Menu Driven Interface (MDI)

These three interfaces in general use several components of the computer to get the inputs and to

display the output. The keyboard and the mouse are mainly used to get the information in to the

computer. The primary output device would be the monitor. In some rare cases it would a device like a

projector.

Command Line Interface (CLI)

“A means of communication between a program and its user, based solely on textual input and output.

Commands are input with the help of a keyboard or similar device and are interpreted and executed by

the program. Results are output as text or graphics to the terminal.” (Juergen, n.d)

In this interface the users are only given a terminal. The main input device would be the keyboard.

Users are expected to input commands through the keyboard. The commands that has executed or

entered are shown in the terminal through the main output device the monitor. This user interface is

not user friendly. Due to that reason users prefer a graphical user interface.

KUBUNTU Page 12

Page 13: Kubuntu OS Project

“TOWERDS HUMANITY”Graphical user Interface (GUI)

This user interface is far more user friendly than the command line interface. This user interface is

made in a way such that a child would easily learn how to use the computer. This interface creates and

presents a graphical environment to the user though the monitor. To be able to use this interface the

computer must have good graphic generating capabilities. In a graphical user interface there is mainly

five characteristic features that helps to define the interface.

They are:

Menus: gives users choices of tasks and operations listed accordingly. Users can pick the

task from the list and click on that. The chosen task will be then executed.

Windows: The main area which is viewed by the user. In this window all the other features

are shown. This screen can be edited or can be divided into different areas accordingly to the

user’s needs. In the window users can run different programs or the user can perform various

multimedia applications.

Pointer: pointers can take different shapes. Normally it’s the arrow pointer which is used as

the default. The pointer helps user to move around the window or the screen and select

objects (icons) and give commands which perform specific tasks.

Icons: These are used to represent the files or programs in a graphical way. Normally small

pictures are used for icons. By clicking on the icons users can perform multiple tasks.

Desktop: This is the default output or the screen the users can see when they log in to their

operating system.

(The Linux Information Project, 2005)

Menu Driven Interface (MDI)

Menus are presented with a choice on the menu. MDI presents a menu to the user with different

alternatives on the screen. User can select the desired choice of one of the alternatives on the menu

either by using a mouse or a keyboard. By using the mouse the user should click on the choice. If the

user uses the keyboard he or she have to type the number or have to press the corresponding function

key (Kolitha. 2010)

KUBUNTU Page 13

Page 14: Kubuntu OS Project

“TOWERDS HUMANITY”Advantages of this MDI are that it easy to use. Also prior knowledge of the commands are not needed

when using this. As the disadvantages we can point out that menus have restrictions. Depending on the

programmer the layout of the menu will be different. So it can sometimes hard to understand. (Kolitha.

2010)

2.1.2 What is an Interface?

“An interface is a shared boundary or connection between two dissimilar objects, devices or a system

through which information is passed. The connection can be either physical or logical” (The Linux

Information Project, 2005).

Kubuntu 9.1 has three desktop environments, KDE, XFCE and GNOME. In Kubuntu the programmers

has used KDE as the default desktop environment. Users can download GNOME, XFCE and install in

Kubuntu so that all three environments can run alongside. But the new KDE environment is upgraded

so that it would run the applications that worked only in other environments.

2.1.3 KDE (K Desktop Environment)

KUBUNTU Page 14

Figure 1: KDE logo

Page 15: Kubuntu OS Project

“TOWERDS HUMANITY”

“The default desktop environment for Kubuntu is KDE, a powerful Free Software graphical desktop

environment for GNU/Linux and Unix workstations. It combines ease of use, contemporary

functionality, and outstanding graphical design with the technological superiority of the Unix

operating system.” (About Kubuntu, 2010)

KDE is a open source software which is made by the KDE organization worldwide. “KDE is a

Windowing Manager and Graphical User Interface for the UNIX operating system, not just Linux (but

was made on Linux machines).” (Anon, n.d)

KDE is the most widely spread and used environment and it is older environment if it compared to

other desktop environments. KDE uses C++ as its based programming language. And also it uses

Qt(the Q-toolkit) to generate graphical environment. KDE is easy to use but it is a very powerful

desktop environment which supports highly graphical application for all ages in both work and home

environment. (About Kubuntu, 2010)

Strong points of KDE

The user can customize the KDE so that it would look whatever way the user requires.

Has an excellent file handling system which is also able to handle files which is foreign to the

operating system.

KDE has lots of applications, games and utilities available through internet and Linux

communities.

KDE is user friendly even children could learn it by themselves. Also Linux communities

provide help almost all the time without any hesitation.

KDE has a excellent control panel which is simple and configurable.

KDE provides a fully featured GUI which is customizable according to the users needs.

KDE easily supports multimedia capabilities such as watching a movie, listening to a song and

capturing sound and data.

KUBUNTU Page 15

Page 16: Kubuntu OS Project

“TOWERDS HUMANITY” Default KDE comes to the user with loads of great applications such as Kmail, KOffice,

Konqueror.

(Anon. n.d)

2.1.4 GNOME (The GNU Network Object Model Environment)

“GNOME (GNU Network Object Model Environment, pronounced gah-NOHM) is a graphical user

interface (GUI) and set of computer desktop applications for users of the Linux computer operating

system. It's intended to make a Linux operating system easy to use for non-programmers and generally

corresponds to the Windows desktop interface and its most common set of applications. In fact,

GNOME allows the user to select one of several desktop appearances.”

(Johansson. 2000)

KUBUNTU Page 16

Figure 2 : GNOME logo

Page 17: Kubuntu OS Project

“TOWERDS HUMANITY”

2.1.5 XFCE

"XFCE is a lightweight desktop environment for various *NIX systems. Designed for productivity, it

loads and executes applications fast, while conserving system resources." (Fourdan, 1996)

2.2 Process Control Management

2.2.1 Process control management

When a user is using a computer there can be instances where user tries to do two things at once. The

operating system will try to execute two processes at once on the same processor. When this occurs

operating system should decide which one of the two processes should execute next on the processor.

Scheduler which is a component of the operating system will handle the decision using a scheduling

algorithm. (Nagar. n.d)

2.2.2 What is a process?

KUBUNTU Page 17

Figure 3: XFCE logo

Page 18: Kubuntu OS Project

“TOWERDS HUMANITY”“It is a program in execution which progresses in sequential manner. It is a unit of work with unique

process identification”. (Kolitha. 2010)

A process needs resources like memory, CPU time and files to complete its execution and finish the

tasks it is commanded to. Resources like memory and files are allocated when a process is in

execution. The operating system creates the processes of the user and the system. Details of the

processes that executed in the system are kept in a process table by the operating system. (kolitha.

2010)

2.2.3 Process Descriptor

Anonymous (2) (2007) stated that:

To manage processes, the kernel must have a clear picture of what each process is doing. It must

know, for instance, the process's priority, whether it is running on a CPU or blocked on an event, what

address space has been assigned to it, which files it is allowed to address, and so on. This is the role of

the process descriptor a task_struct type structure whose fields contain all the information related to a

single process.

2.2.4 Process State

“As its name implies, the state field of the process descriptor describes what is currently happening to

the process” (anon - 2. 2007) The process state have an array of flags which explains about the state of

the process. In Linux there are currently six process states. (anon - 2. 2007)

TASK_RUNNING

KUBUNTU Page 18

Page 19: Kubuntu OS Project

“TOWERDS HUMANITY”The process which is currently being executing on the CPU or waiting to be executed after the

current process is executed.

TASK_INTERRUPTIBLE

“The process is suspended (sleeping) until some condition becomes true. Raising a hardware interrupt, releasing a

system resource the process is waiting for, or delivering a signal are examples of conditions that might wake up

the process.” (anon - 2. 2007)

TASK_UNINTERRUPTIBLE

“Like TASK_INTERRUPTIBLE, except that delivering a signal to the sleeping process leaves

its state unchanged. This process state is seldom used. It is valuable, however, under certain

specific conditions in which a process must wait until a given event occurs without being

interrupted.” (anon - 2. 2007)

TASK_STOPPED

“Process execution has been stopped; the process enters this state after receiving

a SIGSTOP, SIGTSTP, SIGTTIN, or SIGTTOU signal.” (anon - 2. 2007)

TASK_TRACED

“Process execution has been stopped by a debugger. When a process is being monitored by

another (such as when a debugger executes a PTRACE ( ) system call to monitor a test

program), each signal may put the process in the TASK_TRACED state.” (anon - 2. 2007)

EXIT_ZOMBIE

Anonymous (2) (2007) stated that:

Process execution is terminated, but the parent process has not yet issued a WAIT4

( ) or WAITPID( ) system call to return information about the dead process. Before the wait( )-

like call is issued, the kernel cannot discard the data contained in the dead process descriptor

because the parent might need it.

EXIT_DEAD

Anonymous (2) (2007) stated that:

KUBUNTU Page 19

Page 20: Kubuntu OS Project

“TOWERDS HUMANITY”The final state: the process is being removed by the system because the parent process has just

issued a WAIT4 ( ) or WAITPID ( ) system call for it. Changing its state

from EXIT_ZOMBIE to EXIT_DEAD avoids race conditions due to other threads of execution

that execute wait( )-like calls on the same process.

2.2.5 Process scheduling algorithm

“A scheduling algorithm is used to choose the next process. Scheduling is a fundamental function of

an operating system. Scheduling is done to ensure that the CPU is not idle” (Kolitha. 2010)

In Kubuntu the Linux kernel is used. Linux kernel uses two process scheduling algorithms.

KUBUNTU Page 20

Page 21: Kubuntu OS Project

“TOWERDS HUMANITY” Real-Time Algorithm

Timesharing algorithm

Real-Time Algorithm is used for processes that should execute in a timely fashion. “The Round Robin

and FIFO scheduling algorithms are used to switch between Real-Time Processes.” (Levinson. n.d)

All the processes which does not go through Real-Time algorithm are controlled by the Timesharing

Algorithm. ”Timesharing algorithm is prioritized and credit-based.” (Levinson. n.d)

Anonymous (3) (n.d) stated that:

For the conventional time –shared processes, Linux uses a prioritized, credit-based algorithm. Each

process possesses a certain number of scheduling credits; when a new task must be chosen to run, the

process with most credits is selected. Every time that a timer interrupt occurs, the currently running

process loses one credit; when its credits reaches zero, it is suspended and another process is chosen.

KUBUNTU Page 21

Page 22: Kubuntu OS Project

“TOWERDS HUMANITY”

2.3 Deadlock Management

2.3.1 What is a Deadlock?A computer system is a multiprogramming environment. In a multiprogramming environment several

processes run at the same time. Some of these processes would compete for the same resources

because available numbers of resources are limited. If two processes try to access the same non-

preemptable resources at the same time both processes will be blocked and will remain so forever.

This situation is usually called a deadlock. (Kolitha. 2010)

KUBUNTU Page 22

PRINTER

DVD Drive

A

B

Deadlock Situation

Page 23: Kubuntu OS Project

“TOWERDS HUMANITY”

2.3.2 Conditions for Deadlock.

Normally in a computer system Deadlocks occur due to several conditions. If the following

conditions are held continuously in the system deadlocks can occur. Deadlock will only occur if all the

conditions exist together in the system. Separately each one of the conditions can’t make a deadlock

occur in the system. (Kolitha. 2010)

The conditions are:

Mutual Exclusion

Resources are limited. “At least one resource is in a non-shareable mode and Only one process

can use the resource at a time” (Kolitha. 2010)

Hold and Wait

“A process must exist where it is holding at least one resource and is waiting to acquire

additional resources that are currently being held by another process” (Kolitha. 2010)

No-preemption

“Resources cannot be preempted, a process can only release a resource after the process has

completed.” (Kolitha. 2010)

Circular Wait

“A set of waiting processes exist, where each process is waiting for a resource that is held by

another process within the set.” (Kolitha. 2010)

2.3.3 Methods for Handling Deadlocks

When a deadlock occurs in a system the operating system try to overcome the deadlock using different

methods. Normally operating systems uses some protocols to ensure that the computer or the system

won’t enter a Deadlock situation. Sometimes operating systems allows the system to get in to a

deadlock situation and then the operating system tries to recover from it. Some operating systems

ignore the deadlocks that occurred in the system and shows that the deadlock never happened in the

system. (Kolitha. 2010)

In Operating systems there are four ways to overcome the deadlock problem.

KUBUNTU Page 23

Page 24: Kubuntu OS Project

“TOWERDS HUMANITY”They are:

Deadlock Prevention.

Deadlock Avoidance.

Deadlock Detection.

Deadlock Recovery.

Deadlock Prevention

“Deadlock prevention is a set of methods for ensuring that at least one of the necessary conditions

does not hold in the system by restraining how requests are made for resources.” (Kolitha. 2010)

Deadlock Avoidance

Kolitha (2010) stated that:

Deadlock avoidance requires additional information on how resources will be requested. With

the knowledge of complete sequence of requests and releases the operating system can now

decide on which processes should wait or proceed. Algorithms are used for each process to

declare the maximum number of resources needed.

Deadlock Detection

“An algorithm is used to examine the state of the system to determine if a deadlock has occurred.

detection and recovery incurs overheads for executing the detection algorithm with possible losses

from recovering from a deadlock.” (Kolitha. 2010)

Deadlock Recovery

When the deadlock recovery algorithm detects deadlock the operating system activates the deadlock

recovery methods. These methods are

The operating system notifies the user that there is a deadlock occurred in the system. So the

user or the operator has to handle the deadlock manually.

KUBUNTU Page 24

Page 25: Kubuntu OS Project

“TOWERDS HUMANITY” Sometimes the operating system lets the system itself to recover from the deadlock situation

automatically. (Kolitha. 2010)

When a deadlock occurs the operating system tries to break the deadlock by two ways.

o Process termination

Deadlock is occurred due to various processes conflicts. When this happens the

operating system terminate all the processes that was the reasons for the deadlock or the

operating system terminate one process at a time until the deadlock is terminated.

(Kolitha. 2010)

o Resource preemption

“Preempt some resources from processes and give these resources to other processes

until the deadlock cycle is broken.” (Kolitha. 2010)

2.3.4 Deadlock handling in Kubuntu

Kubuntu operating system uses the same deadlock management techniques of Ubuntu Operating

system. Ubuntu Operating system is based on the Linux kernel uses the UNIX deadlock management

algorithm named as “Ostrich Algorithm.” (Anon- 4. 2004.)

2.3.5 Ostrich Algorithm

Ostrich Algorithm is a method of ignoring potential problems. In deadlock management UNIX and all

the Linux distributions use Ostrich Algorithm due to the factor of low percentage of deadlock

occurring.

“The Ostrich Algorithm is a strategy of ignoring potential problems on the basis that they may be exceedingly

rare - to stick your head in the sand and pretend that there is no problem. This assumes that it is more cost-

effective to allow the problem to occur than to attempt its prevention.” (Anon- 5. 2010)

In this approach deadlocks are just ignored on the assumption that most of the computer operators would prefer

an occasional deadlock. But there will be a rule restricting the computer operator accessing resources. Only one

resource at a time will be allowed to be accessed. (Anon- 4. 2004.)

KUBUNTU Page 25

Page 26: Kubuntu OS Project

“TOWERDS HUMANITY”

2.4 Memory Management

To improve the utilization of the CPU and to increase the speed of the computer, we must keep several

processes in memory; that is, we must share memory. For this purpose the use of memory, should be managed.

Therefore, Memory Management (process of managing the memory) can be defined as an art of coordinating

and controlling the use of memory in a computer system.

Memory management can be divided into three areas:

Memory management hardware (MMUs, RAM, etc.);

Operating system memory management (virtual memory, protection);

Application memory management (allocation, de-allocation, garbage collection).

(Ravenbrook Limited.2001)

2.4.1 Memory management in Kubuntu

When it comes to Memory Management of Kubuntu, it is almost same as memory management

system of Ubuntu. (Main difference between operating systems Ubuntu and Kubuntu is typically only

user interface and tools used.)

Kubuntu Memory Management mechanism has two components as Ubuntu and they are as follows:

1. Allocating and freeing physical memory.

2. Handling virtual memory.

2.4.3 Physical Memory Management in Kubuntu

Physical memory is managed globally in Kubuntu via a central free pool and a system daemon to

manage the use of physical memory. Kubuntu uses the system’s RAM (Random Access Memory) as a

central pool of physical memory for different computer programs which executes in the system.

Physical memory is distributed through the central pool at allocation time and returned to the pool

when it is no longer needed. A system daemon (the page scanner) pro actively manages memory

allocation when there is a system wide shortage of memory. (Kokitha.2010)

KUBUNTU Page 26

Page 27: Kubuntu OS Project

“TOWERDS HUMANITY”

2.4.4 Algorithm used in memory management in Kubuntu

Kubuntu used the algorithm ‘Buddy Heap’ in its memory management.

In a buddy system, the allocator will only allocate blocks of certain sizes, and has many free lists, one

for each permitted size. The allowed sizes are usually either powers of two, or form a Fibonacci series

such that any block apart from the smallest can be divided into two smaller blocks of permitted sizes.

When the allocator receives a request for memory, it rounds the requested size up to a permitted size,

and returns the first block from that size's free list. If the free list for that size is empty, the allocator

splits a block from a larger size and returns one of the pieces, adding the other to the appropriate free

list. (memorymanagement.org)

Following diagram will explain it further.

Figure 5

KUBUNTU Page 27

Page 28: Kubuntu OS Project

“TOWERDS HUMANITY”

2.5 Virtual Memory Management

Size of the most of computer Programs is larger than the physical memory size. Hence, to execute a program,

we could not load all the processes of required programs into physical memory at the same time. Because of this

constraint, it requires another memory location which is larger than the physical memory, and that is called

Virtual Memory. See the figure (figure 5)

Virtual memory systems separate the user logical memory addresses used by a process from actual physical

addresses, allowing separation of processes and increasing the effectively available amount of physical memory

using disk swapping. The quality of the virtual memory management in a computer system can have a big

impact on overall system performance.

Efficient use of Virtual Memory Management offers some advantages:

Program would no longer be constrained by the amount of physical memory that is available.

With the available physical memory, more programs can be run at the same time.

Less I/O would be needed to Swap user program into memory therefore program runs faster.

(Rajapaksha.S 2010)

KUBUNTU Page 28

Figure 6 : Virtual Memory is larger than the Physical Memory

Page 29: Kubuntu OS Project

“TOWERDS HUMANITY”

Virtual memory can be implemented using one of the following methods:

Demand paging Demand segmentation

2.5.2 Virtual memory Management of KubuntuAs in the other Operating Systems, virtual memory of Kubuntu, all of the addresses are virtual

addresses and not physical addresses. These virtual addresses are converted into physical addresses by

the processor based on information held in a set of tables maintained by the Kubuntu (operating

system). To make this conversion easier, virtual and physical memory are divided into sections called

pages and this process is called as Paging. These pages are all the same size. However, it’s not

required to be in same size, but if so, the system would be very hard to administer. Each of these pages

is given a unique number; the page frame number

2.5.2.1 Paging of Kubuntu

Paging is a memory management technique which widely uses virtual memory concept.

When paging is used in Kubuntu, the processor divides the linear address space into fixed-size pages (of

4KBytes, 2 MBytes, or 4 MBytes in length) that can be mapped into physical memory and/or disk storage.

When a program (or task) references a logical address in memory, the processor translates the address into a

linear address and then uses its paging mechanism to translate the linear address into a corresponding physical

address.

(viralpatel.net.2001)

KUBUNTU Page 29

Page 30: Kubuntu OS Project

“TOWERDS HUMANITY”

Figure 7: Linear Page Translation during Paging

(viralpatel.net). (2001),

If the page containing the linear address is not currently in physical memory, the processor generates a page-

fault exception (#14). The exception handler for the page-fault exception typically directs the operating system

to load the page from disk storage into physical memory. When the page has been loaded in physical memory, a

return from the exception handler causes the instruction that generated the exception to be restarted. The

information that the processor uses to map linear addresses into the physical address space and to generate

page-fault exceptions (when necessary) is contained in page directories and page tables stored in memory.

(viralpatel.net.2001)

2.5.2.2 Swapping of Kubuntu

Swapping is a simple memory/process management technique used by the operating system(os) to increase the

utilization of the processor by moving some blocked process from the main memory to the secondary

memory(hard disk); thus forming a queue of temporarily suspended process and the execution continues with

the newly arrived process. After performing the swapping process, the operating system has two options in

selecting a process for execution:

KUBUNTU Page 30

Page 31: Kubuntu OS Project

“TOWERDS HUMANITY”Operating System can admit newly created process (OR) operating system can activate suspended

process from the swap memory.

(blog.sudobits.com . 2010)

Figure 8

2.6 Secondary Disk Scheduling Management

It is the part of the Linux kernel which plans on which I/O operation can access the storage device (the memory disk) so as to get the best throughput time to maximize the number of jobs completed in a given time. They are similar to the algorithms used in elevators, and therefore are sometime known as elevators. The operations that are allowed to access the storage are in such a way as to reduce the movement of the disk header.

2.6.1 Why is a Secondary Disk Scheduling Management necessary?Secondary disk management is necessary for the hardware of a computer to be fast enough to serve the user requirements.

2.6.2 How can the efficiency of how the hardware is used be improved? Access time should be faster. The access time can be made faster by

To reduce seek time (seek time is the time taken for the header to move from the current

position to the desired position).

To reduce the Rotational latency (is the additional time taken for the disk to rotate the desired

sector to the header)

KUBUNTU Page 31

Page 32: Kubuntu OS Project

“TOWERDS HUMANITY”Increase the disk bandwidth

Disk bandwidth – is the total no. of bytes that have been transferred divided by the time

between submission of request and complete transfer of data.

Using an algorithm the I/O will decide and request to access the storage device and it is the same

algorithm which is used in Ubuntu 9.1 to Kubuntu.

2.6.3 The Completely Fair Queuing (CFQ)

The Completely Fair Queuing (CFQ) I/O scheduler can be considered as representing an extension to the better

known stochastic fair queuing (SFQ) scheduler implementation. The focus of both implementations is on the

concept of fair allocation of I/O bandwidth among all the initiators of I/O requests. A SFQ based scheduler

design was initially proposed for some network subsystems. The goal to be accomplished is to distribute the

available I/O bandwidth as equally as possible among the I/O requests.

(Lawrence.A.P. 2010)

2.6.4 Analyzing Completely Fair Queuing It has great support

It is fair and is aligned with disk hogging

Prioritization is allowed to the user

Takes necessary steps to prevent starvation

It’s very much complex

(Appleton, 2003)

KUBUNTU Page 32

Page 33: Kubuntu OS Project

“TOWERDS HUMANITY”

2.7 System Administration and support

Same as Ubuntu operating system kubuntu also mainly focuses on 4 functionalities both the OS

contains same functionalities, for systems administration and support which take care of the

operating system and they are :-

Desktop configurations

Logs and scheduling

Systems maintenance

Systems and configuration

User and permissions

2.7.1 Logs and Scheduling

KUbuntu system provides vital information using various system log files. These log files are typically

plain ASCII text in a standard log file format, and most of them sit in the traditional system log

subdirectory. Many are generated by the system log daemon, on behalf of the system and certain

applications, while some applications generate their own logs by writing directly to files in.

(help.ubuntu.com)

Logs and Scheduling can be broken down into three (3) main components:

Systems Log

Application Logs

Non-Human Readable Logs

KUBUNTU Page 33

Page 34: Kubuntu OS Project

“TOWERDS HUMANITY”

2.7.2 Systems Logs System logs deal primarily with the functioning of the Ubuntu system, not necessarily with additional

applications added by users. Examples include authorization mechanisms, system daemons, system

messages, and the all-encompassing system log itself.

(help.ubuntu.com)

Authorization Log

The Authorization Log tracks usage of authorization systems, the mechanisms for authorizing users

which prompt for user passwords, such as the Pluggable Authentication Module (PAM) system. The

Authorization Log file may be accessed. This log is useful for learning about user logins and usage of

the sudo command. (help.ubuntu.com)

Daemon Log

A daemon is a program that runs in the background, generally without human intervention, performing

some operation important to the proper running of your system. The daemon log contains information

about running systemand application daemons such as the Gnome Display Manager daemon, the

Bluetooth HCI daemon hcid, or the MySQLdatabase daemon mysqld. This can help you trouble-shoot

problems with a particular daemon. (help.ubuntu.com)

Debug Log

The debug log and provides detailed debug messages from the Kubuntu system and applications which

log at the DEBUG level. (help.ubuntu.com)

Kernel Log

KUBUNTU Page 34

Page 35: Kubuntu OS Project

“TOWERDS HUMANITY”The kernel log provides a detailed log of messages from the Kubuntu Linux kernel. These messages

may prove useful for trouble-shooting a new or custom-built kernel. (help.ubuntu.com)

Kernel Ring Buffer

The kernel ring buffer is not really a log file, but rather an area in the running kernel you can query for

kernel boot up messages via the dmesg utility. (help.ubuntu.com)

Messages Log

The messages log contains informational messages from applications and system facilities. This log is

useful for examining message output from applications, and system facilities which log to the syslog /

sysklog daemon at the INFO level. (help.ubuntu.com)

System Log

The system log typically contains the greatest deal of information by default about our Kubuntu

system. It is located at /var/log/syslog, and may contain information other logs do not. Consult the

System Log when you can't locate the desired log information in another log. (help.ubuntu.com)

Application Logs

The application log records information about activities in application instances. This log is used primarily for debugging and also it contains information about the user too. (Adobe help. 2010)

Non-Human Readable Logs

Some log files found in the subdirectory are designed to be readable by applications, not necessarily by humans. Non-Human readable logs contain All the Login Failures, Last logging of the users And all the logging records

KUBUNTU Page 35

Page 36: Kubuntu OS Project

“TOWERDS HUMANITY”(help.ubuntu.com)

Systems Configurations

Many GUI configuration utilities work by modifying config files. They should tell the users what files they modify and the modifications they make because sometimes it's easier, faster, or necessary to edit configuration files for functionality the GUI tool does not support, but figuring out what files are involved can be more difficult than actually making the changes. Even if users don't intend to edit the configuration files, knowing which files are modified and how will help users to build accurate mental models about the tools they use, which will help them to effectively use those tools to accomplish their goals.

(ubuntu.com)

2.7.3 GRUB 2 (Grand Unified Bootloader)

GRUB 2 is the next generation of GNU GRUB, using version numbers 1.90 and above. GRUB 2 is a complete rewrite and is at a developmental phase. The most important goal is to make GNU GRUB cleaner, safer, more robust, more portable and more powerful. Once the system is on GRUB2 it will either present a menu and awaits user input or automatically transfers control to an operating system kernel. GRUB 2 is the new update version of the GRUB, and with this updated version it has been performance are faster and more flexible. (engrub.org 2010)

2.7.4 Systems Maintenance

When it comes to system Maintenance Kubuntu mainly forces on two aspects they are:

Data Backup

Software Management

2.7.5 Data Back UpFor operating systems there are different types of backup, But Ubuntu their are two primary means as

follows:

KUBUNTU Page 36

Page 37: Kubuntu OS Project

“TOWERDS HUMANITY” Folder Synchronization

For kubuntu file-synchronization tool is unison. It allows two replicas of a collection of files

and directories to be stored on different hosts is usually modified by certain rules, and then

brought up to date by propagating the changes in each replica to the other. (ubuntu.com)

Creation of archive

For operating systems creating an archive is used mainly for long-term storage purposes

usually storing configuration files and documents. (Battiston, 2010)

2.7.6 Software Management

In Operating systems software management is about organizing software’s such as updating files,

adding and removing and it happens automatically wherever and whenever necessary.. (Gadolinio,

2010)

2.8 Recovery strategies

Kubuntu, just as its sister OS Ubuntu, uses software called TestDisk to recover its lost partitions. This

is licensed under GNU Public License & consider as open source software. TestDisk utility is not

designed only to recover lost partitions, but also to make non-booting disks bootable, when the disk is

infected by faulty software or by human errors such as fortuitously erasing the Partition Table.

TestDisk questions from OS or BIOS to find the Hard Disks or their characteristics specially LBA size

and CHS geometry. Then the TestDisk does a quick check to find out the structure of our disk &

compares it with our partition table to figure out entry errors. If the Partition Table has entry errors,

KUBUNTU Page 37

Page 38: Kubuntu OS Project

“TOWERDS HUMANITY”TestDisk is able to repair them. TestDisk can search for partitions and create a new Table or even a

new MBR if necessary when we have missing partitions or a completely empty Partition Table in our

system.

User has the chance to select any desirable partition from just before the drive failed to boot or the

partition(s) were lost. Test Disk may show partition data which is simply from the small portions of a

partition that had been deleted and overwritten long ago especially after initiating a detailed search for

lost partitions.

Test Disk can be used to collect detailed information about a non-booting drive for further analysis. This has the

features for work with both novice & expert users. Also expert users may find Test Disk as a handy tool for

performing onsite recovery.

(ubuntu-version-8.blogspot.com. 2006)

In Kubuntu they have given data backup systems for recovery as listed below,

Folder synchronization Creating an archive Drive imaging Incremental backup

(ubuntu-version-8.blogspot.com. 2006)

2.8. 1 Tools used by Kubuntu for their backup

Shell scripts

This is one of the simplest ways to backup. The directories (Folders in windows) which are needed to backup can be selected through a shell script. Those directories can be used as arguments to the tar utility creating an achieve file. This file can be either copied or moved to another location. To create the achieve file tar utility is used.

(Kolitha.2010)

KUBUNTU Page 38

Page 39: Kubuntu OS Project

“TOWERDS HUMANITY”

File roller (achieve manager)

This is Kubuntu’s default tool for all file archiving purposes. This supports a lot of file formats. Since this comes with a graphical user interface it is much more user friendly. (Kolitha.2010)

2.9 Security Strategies

In Kubuntu Operating system the system developers used the same security strategies that Ubuntu

Operating system consists. We get the same security measures and security options that are in Ubuntu

Operating System. In Ubuntu operating system mainly developers categorized seven security factors

for the user. They are:

User Management

Console Security

Firewall

AppArmor

Certificates

Automatic security Updates

Antivirus

(Ubuntu Help 2010)

2.9.1 User Management

KUBUNTU Page 39

USER MANAGEMENT

Page 40: Kubuntu OS Project

“TOWERDS HUMANITY”

“User management is a critical part of maintaining a secure system. Ineffective user and privilege

management often lead many systems into being compromised. Therefore, it is important that you

understand how you can protect your server through simple and effective user account management

techniques.” (Ubuntu Help 2010)

Root

Kubuntu developers used same techniques which have being used by the Ubuntu developers.

In Ubuntu administrative Root account is disabled by default system settings. It is give a

password that cannot be matched by any encrypted value. Because of that the system cannot

log in directly as the root. Instead of Root users are adviced to make use of the tool called

SUDO to work with system administrative duties. SUDO temporarily elevate user privileges

for authorized users who logs in from their current password. This gives the system

administrator to control over which actions a one user can use with elevated privileges.

(Ubuntu Help 2010)

Add/remove users“The process for managing local users and groups is straight forward and differs very little

from most other GNU/Linux operating systems. Ubuntu and other Debian based distributions,

encourage the use of the "add user" package for account management.” (Ubuntu Help 2010)

User profile security

KUBUNTU Page 40

ROOT

ADD/REMOVE USERS

USER PROFILE SECURITY

PASSWORD

Page 41: Kubuntu OS Project

“TOWERDS HUMANITY”This security option mainly interacts with servers. In a single server there can be hundreds of

users. System administrator “should pay close attention to the user home directory permissions

to ensure confidentially. By default, user home directories in Ubuntu are created with world

read/execute permissions. This means that all users can browse and access the contents of other

users’ home directories” (Ubuntu Help 2010)

Just by editing one file the system administrator can modify user home directories so that

appropriate users can only visit some places. This secures the server from potential threats.

PASSWORDMany security mechanisms in most operating systems use this option as the main user

protection strategy. Passwords are mainly used to protect valuable information. Choosing a

strong password in any application or program is very important. Kubuntu like Ubuntu keeps a

strong password policy in the operating system. “By default, Ubuntu requires a minimum

password length of 4 characters, as well as some basic entropy checks. If you would like to

adjust the minimum length to 6 characters, change the appropriate variable to min=6.” (Ubuntu

Help 2010) this can be done using a simple command line.

It is better to have long and strong passwords, it shouldn’t be based on common knowledge

such as a famous word or else attackers (crackers) can use “Brute-force” or “Dictionary attack”

and find users password.

2.9.2 Console Security

“It is pretty tough to defend against untold damage caused by someone with physical access to your

environment, for example, theft of hard drives, power or service disruption and so on. Therefore,

console security should be addressed merely as one component of your overall physical security

strategy. A locked "screen door" may deter a casual criminal, or at the very least slow down a

determined one, so it is still advisable to perform basic precautions with regard to console security.”

(Ubuntu Help 2010)

KUBUNTU Page 41

Page 42: Kubuntu OS Project

“TOWERDS HUMANITY”

2.9.3 Firewall

“The Linux kernel includes the Netfilter subsystem, which is used to manipulate or decide the fate of

network traffic headed into or through your server. All modern Linux firewall solutions use this

system for packet filtering.” (Ubuntu Help 2010)

In Kubuntu same as in Ubuntu, the operating system uses UFW (Uncomplicated Firewall) as the

default firewall configuration tool. UFW is a user friendly configuration tool which allows the user to

create IPv4 or IPv6 host-based Firewall making it easy to configure iptables firewall configuration.

(Ubuntu Help 2010)

2.9.4 AppArmor

“AppArmor is a Linux Security Module implementation of name-based mandatory access controls.

AppArmor confines individual programs to a set of listed files and posix 1003.1e draft capabilities.”

(Ubuntu Help 2010)

“AppArmor is installed and loaded by default. It uses profiles of an application to determine what files

and permissions the application requires. Some packages will install their own profiles, and additional

profiles can be found in the apparmor-profiles package.” (Ubuntu Help 2010)

2.9.5 Certificates

“A Certificate is a method used to distribute a public key and other information about a server and the

organization who is responsible for it. Certificates can be digitally signed by a Certificate Authority or

CA. A CA is a trusted third party that has confirmed that the information contained in the certificate is

accurate.” (Ubuntu Help 2010)

“One of the most common forms of cryptography today is public-key cryptography. Public-key

cryptography utilizes a public key and a private key. The system works by encrypting information

KUBUNTU Page 42

Page 43: Kubuntu OS Project

“TOWERDS HUMANITY”using the public key. The information can then only be decrypted using the private key.” (Ubuntu Help

2010)

2.9.6 Automatic security Updates

“Making sure your system is up to date is a key attribute to its security”. (Kevin. 2007)

Most of the operating systems “releases updates pretty often and you probably don't want to miss out

on added stability and features. You could run updated manually, but why not schedule the updates in

the background to make sure you are always running the latest stable versions, without ever having to

worry about it.” (Kevin. 2007)

2.9.7 Antivirus

Kubuntu is a Linux distribution. So Kubuntu have some features of Linux. Linux is developed in a

manner that viruses cannot run in the system. So that theoretically Linux does not need a antivirus. But

when you connect to another machine over a network you should be able to scan the files you receive

from the other machine. Not all the other machines have are Linux based Operating systems. So the

user will need a Antivirus to scan the files you receive from another computer which has another

operating system. (Ubuntu Help 2010)

2.10 Standard SupportKubuntu has provided their Help & Support services under four categories:

Access Free Documentation Community Help Buy Professional Support Services Technical Answers System

(Help and Support.2010)

KUBUNTU Page 43

Page 44: Kubuntu OS Project

“TOWERDS HUMANITY”

2.10.1 Access Free Documentation

Kubuntu does not provide a separate documentation solely for its issues and simply forward to the

official documentation developed and maintained by the Ubuntu Documentation Team.

(Help and Support.2010)

2.10.2 Community Help

A range of free support options are also available from the Kubuntu Community, including forums,

IRC channel and mailing list. There is also multi-language community support. Kubuntu provides

community help via:

Live Chat

Web Forums

Mailing List

(Help and Support.2010)

2.10.3 Buy Professional Support Services

Kubuntu users can get the help form the Canonical Global Support Services team which is an

experienced and well knowledge team of Kubuntu developers. Also professional support is available

from companies listed as Canonical Partners.

(Help and Support.2010)

2.10.4 Technical Answer System

Users can also add their support question in Kubuntu tech answers system which is a part of the Launchpad

system. Here users can keep their queries active until a community member offers an answer which solves their

problems. They can also search through all of the other questions which have been asked and answered.

(Help and Support.2010)

KUBUNTU Page 44

Page 45: Kubuntu OS Project

“TOWERDS HUMANITY”

3.0 Installation

KUBUNTU Page 45

Page 46: Kubuntu OS Project

“TOWERDS HUMANITY”This is the first step of the installation. After booting up from the CD you’ll get this screen. From this

screen you will have to choose your language.

Then click next to go for the next step of the installation.

From the next screen you’ll have to select

your region and your city. Then you’ll have

select your time Zone. Then you’ll have

click next to forward in the installation.

From this screen you’ll have select the

layout of your keyboard.

Click next to go the next step of the

installation.

KUBUNTU Page 46

Figure 9 : installation pictures

Figure 10: Installation Pictures

Page 47: Kubuntu OS Project

“TOWERDS HUMANITY”

In this step you’ll have to select the way

you want to install Kubuntu. You can either

install Kubuntu side by side with your other

operating system. Or you can create a new

partition and you can install Kubuntu to

that Partition.

We installed it side by side with windows.

Then click next to go to the next step of the

installation process.

In this screen well have to enter our details

and information to go forward in the

installation. User must enter a password

with at least six characters for security

reasons. This is to prevent unauthorized

access.

KUBUNTU Page 47

Figure 11 : Installation Pictures

Figure 12: Installation Pictures

Page 48: Kubuntu OS Project

“TOWERDS HUMANITY”Then you’ll have to click next to go to the next step of the installation.

This screen shows the selections you

have selected during the process. From

here you can go backward by pressing

the button back and change whatever you

want to change. Select install to to start

the installation.

Installation is nearly over. In a matter of

minutes youll be able to use Kubuntu

9.1.

KUBUNTU Page 48

Figure 13: Installation Pictures

Figure 14: Installation Pictures

Page 49: Kubuntu OS Project

“TOWERDS HUMANITY”

You’ll have to log in to the system

from this page. After entering the

details you entered in the installation

you can log in.

This is how the default desktop looks

like. Now you can enjoy the Kubuntu

Operating system.

KUBUNTU Page 49

Figure 15: Installation Pictures

Figure 16: Installation Pictures

Page 50: Kubuntu OS Project

“TOWERDS HUMANITY”

4.0 Limitations/Extensions

4.1 Extensions

Kubuntu started with “Kubuntu-KDE4 Hardy Alpha” version. This was pre-alpha version and was

encouraged to use within system testers. After major developments and designing’s Kubuntu released

Kubuntu 9.10. Which the developers called as a Stable, Social and a Beautiful operating system. From

KUBUNTU Page 50

Figure 17: Installation Pictures

Page 51: Kubuntu OS Project

“TOWERDS HUMANITY”the released date Kubuntu 9.10 was the most spread among all the Kubuntu versions. (Kubuntu org.

2009)

Kubuntu 9.10 has some new changes that boosted up its popularity. For instance Kubuntu 9.10 uses

the Linux kernel version 2.6.31. Because of this kernel graphics and the security factor of the Kubuntu

9.10 increased remarkably. Also Kubutu 9.10 uses KDE 4.3 as the default desktop environment. Due

to the KDE 4.3 GUI of the Kubuntu 9.10 is very attractive and fast. (Kubuntu org. 2009)

Kubuntu 9.10 includes KPackageKit which has lots of various applications by default. As the Kuser

which comes with the Kubuntu 9.10 helps the user to manage users. (Kubuntu org. 2009)

4.2 Limitations

Kubuntu 9.10 is based on ubuntu and Linux. So Kubuntu also have some of the mistakes or

restrictions those two have. Most of the users worldwide is used to windows operating system. When

those users move from windows to Kubuntu they will have some problems because most of the

windows executable files do not work in Kubuntu. So the users have to go through some other

software’s to get those executables to run.

Kubuntu 9.10 does not have most wanted software’s like Visio, Pagemaker, Framemaker, Photoshop,

Pdf viewer, etc.

5.0 Conclusion

Conclusion of our research on Kubuntu 9.10 operating system.

Kubuntu 9.10 is build on a solid Ubuntu 9.10 core and is developed using Linux. Kubuntu 9.10 is free

open source operating system. Open source means that the source code of the operating system is

given to user who requests it free of charge. And any user can develop the source code and make a

KUBUNTU Page 51

Page 52: Kubuntu OS Project

“TOWERDS HUMANITY”new operating system and sell it without any legal issues. Kubuntu depends on its community to help

the users when needed. All the help and details can be gathered from the kubuntu organization.

When compared to other operating systems like Windows, Macintosh and Solaris Kubuntu is a light

weighted operating system. That means it only consumes less hard disk space, low processor and

requires low Random Access Memory when compared to the other operating systems. Due to those

reasons Kubuntu 9.10 can be installed and worked even in a old computer. Kubuntu 9.10 uses Linux

kernel version 2.6.31 which helps the operating system to be more secure. Because of that Kubuntu is

less vulnerable to viruses. And also this kernel helps to boost up the system.

Kubuntu is non-profit oriented organization which relies on the community to develop and design

application software for Kubuntu. So in Kubuntu users wont get much applications compared to other

operating systems because community based developed software comes out in much slower pace. Also

Kubuntu relies on the community to point out the weaknesses of the operating system. Then the

development team will look into the matter and will fix the issue and later on will release updated

version with improvements. But a new improved version normally comes out around in six month

time.

In conclusion Kubuntu 9.10 is unique operating system with improved graphics reaches out to users

who are in different ages helping them to do their day to day work, to improve their skills and to

communicate with the world in a free open source environment.

6.0 Work Load Matrix

Activities and Tasks Birendra

Herath

Viraj De

Silva

Malith

Waniganayake

KUBUNTU Page 52

Page 53: Kubuntu OS Project

“TOWERDS HUMANITY”

(CB004140) (CB004078) (CB004144)

1.0 Research and Investigation

1.1 Introduction To the OS

1.2 System Software Requirements

1.3 System hardware

Requirements

2.0 Analysis

2.1 User Interface

2.2 Processes Control Management

2.3 Deadlock Management

2.4 Memory Management

2.5 Virtual Memory Management

2.6 Secondary Disk Scheduling

Management

2.7 System Administration and

Support

2.8 Recovery Strategies

2.9 Security Strategies

2.10 Standard Support

3.0 Installation

4.0 Limitations/Extensions

5.0 Conclusion

KUBUNTU Page 53

Page 54: Kubuntu OS Project

“TOWERDS HUMANITY”

6.0 Gantt Chart

KUBUNTU Page 54

Page 55: Kubuntu OS Project

“TOWERDS HUMANITY”

6.0 Gantt Chart

KUBUNTU Page 55

Page 56: Kubuntu OS Project

“TOWERDS HUMANITY”

References

McGee. M. (2010). What Is a User Interface? [Online] 09 September 2010. Available from: wisegeek.com http://www.wisegeek.com/what-is-a-user-interface.htm . [Accessed: 28 December 2010]

1. Juergen . H. (n.d). CLI (command line interface) [Online]. Available from: linux.about.com

http://linux.about.com/cs/linux101/g/clilparcommandl.htm . [Accessed: 28th December

2010]

Anonymous (the Linux information project). (2004). GUI Definition. [Online] 01 October 2004. Available from: linfo.org http://www.linfo.org/gui.html . [Accessed: 28th December 2010]

2. Anonymous (The Linux Information Project) (2005), User interface definition.

[Online],Available: http://www.linfo.org/user_interface.html [Accessed: 28th December

2010]

Anonymous (About Kubuntu). (2010). About Kubuntu. [Online] 2010. Available from: kubuntu.org http://www.kubuntu.org/docs/about-kubuntu/C/index.html [Accessed: 28th December 2010]

3. Anonymous (n.d) Chapter 7: What is KDE? [Online]. 2010. Available from:

linuxnewbieguide.org http://www.linuxnewbieguide.org/content/chapter-7-what-kde

[Accessed 28th December 2010]

4. Johansson .M (2000). GNOME [Online]. Available from: techtarget.com

http://searchenterpriselinux.techtarget.com/definition/GNOME [Accessed 28th December

2010]

5. Fourdan. O (1996) About XFCE [Online] Available from: xfce.org http://www.xfce.org/ .

[Accessed 28th December 2010]

6. Nagar, A. (n.d). Process Scheduling. [online]. Available: http://s3.amazonaws.com/ppt-

download/process-scheduling-1196587916168883-3.pdf?

Signature=wPEvNrTPksyTgaDkV6H12OxoWvA

KUBUNTU Page 56

Page 57: Kubuntu OS Project

“TOWERDS HUMANITY”%3D & Expires=1272894157 & AWSAccessKeyId=AKIAJLJT267DEGKZDHEQ [Accessed:

29th December 2010]

7. Kolitha. (2010). user interface. APIIT Slides [Accessed 29th December 2010]

8. Kolitha. (2010). Process Control Management. APIIT Slides [Accessed 29th December

2010]

9. Anonymous (2). (2007) OpenSourceProject. [Online]. 2007. Available from:

Opensourceproject.com_http://book.opensourceproject.org.cn/kernel/kernel3rd/opensource/

0596005652/understandlk-chp-3-sect-2.html [Accessed 29th December 2010]

10. Levinson.S.G. (n.d) Process Scheduling in Windows XP, Linux, and UNIX. [Online]

Available from: cs,gsu.edu http://www.google.lk/url?

sa=t&source=web&cd=26&ved=0CDgQFjAFOBQ&url=http%3A%2F%2Fwww.cs.gsu.edu

%2F~cscbecx%2FCSC4320_6320%2520projects

%2Fprocess_scheduling.ppt&rct=j&q=process%20scheduling%20algorithms%20in

%20linux&ei=fmofTfq8D8bsrQeq1MHACw&usg=AFQjCNEdwd_duDZ0I0UTisqqTUYbjf

DBeg [Accessed 29th December 2010]

11. Anonymous (3). (n.d) Compare Linux credit based algorithm with other scheduling

algorithms? [Online]. Available from: geekinterview.com

http://www.geekinterview.com/question_details/3178 . [Accessed 29th December 2010]

12. Kolitha. (2010). Deadlock-1 APIIT Slides [Accessed 29th December 2010]

13. Anonymous (4). (2004) The Ostrich Algorithm [Online]. 2004. Available from:

Cankaya.edu.trhttp://siber.cankaya.edu.tr/OperatingSystems/summer2004/ceng328/

node64.html [Accessed 29th December 2010]

KUBUNTU Page 57

Page 58: Kubuntu OS Project

“TOWERDS HUMANITY”14. Anonymous (5). (2010) Ostrich Algorithm [Online]. 2010. Available from: en.academic.ru

http://en.academic.ru/dic.nsf/enwiki/770000 [Accessed 29th December 2010]

15. Anonymous(Ubuntu help). (2010) Chapter 8. Security [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/security.html [Accessed 30th December 2010]

16. Anonymous(Ubuntu help). (2010) User Management [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/user-management.html [Accessed 30th December 2010]

17. Anonymous(Ubuntu help). (2010) StrongPasswords [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/community/StrongPasswords [Accessed 30th

December 2010]

18. Anonymous(Ubuntu help). Console Security (2010) [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/console-security.html [Accessed 30th December 2010]

19. Anonymous(Ubuntu help). (2010) Firewall [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/firewall.html [Accessed 30th

December 2010]

20. Anonymous(Ubuntu help). (2010) AppArmor [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/apparmor.html [Accessed 30th

December 2010]

21. Anonymous(Ubuntu help). (2010) Certificates [Online]. 2010. Available from:Help.ubuntu.com https://help.ubuntu.com/8.04/serverguide/C/certificates-and-security.html

[Accessed 30th December 2010]

22. Kevin. (2007) Schedule automatic updates on Ubuntu [Online]. 16th July 2007. Available from: vanzonneveld.net http://kevin.vanzonneveld.net/techblog/article/schedule_automatic_updates_on_ubuntu/ [Accessed 30th December 2010]

KUBUNTU Page 58

Page 59: Kubuntu OS Project

“TOWERDS HUMANITY”23. Anonymous (Ubuntu help). (2010) Antivirus [Online]. 2010. Available from:

Help.ubuntu.com https://help.ubuntu.com/community/Antivirus [Accessed 30th December

2010]

24. Anonymous (Kubuntu org). (2009) Kubuntu 9.10: Stable, Social and Beautiful [Online]. 30th

October 2009 Available from: kubuntu.org http://www.kubuntu.org/news/9.10-release

[Accessed 30th December 2010]

Anonymous (The official Ubuntu Book). (2008). Introduction and history of kubuntu. [Online] 14th August 2008. Available from: computingtech.blogspot. http://computingtech.blogspot.com/2008/08/introduction-and-history-of-kubuntu.html [Accessed 27th 2010]

Anonymous (kde.org). (2004). Home page . [Online]. Available from: kde.org kde.org. [Accessed: 27th December 2010]

Anonymous (kde.org). (2010). Home page . [Online]. Available from: ubuntu.com www.ubunu.com [Accessed: 28th December 2010]

Nicks.J (2010). Kubuntu System Requirements [Online]. Available from: buzzle.com http://www.buzzle.com/articles/kubuntu-system-requirements.html [Accessed: 28th December 2010]

Lawrence.A.P (2010). Linux 2.6 [Online]. Available from: aplawrence.com http://aplawrence.com/Linux/linux26_features.html [Accessed: 29th December 2010]

Anonymous (Adobe help). (2010). Application logs. [Online]. Available from: adobe.comhttp://help.adobe.com/en_US/FlashMediaServer/3.5_AdminGuide/WS5b3ccc516d4fbf351e63e3d119f2926bcf-79d0.html [Accessed: 29th December 2010]

Anonymous (ubuntu.com). (2008). Rationale. [Online]. Available from: ubuntu.com http://brainstorm.ubuntu.com/idea/334/ [Accessed: 30th December 2010]

Anonymous (engrub.org). (2010). GNU GRUB Wiki [Online]. Available from: enbug.org http://grub.enbug.org/ [Accessed: 31th December 2010]

Anonymous (ubuntu.com). (2008). unison. [Online]. Available from: ubuntu.com http://linux.about.com/cs/linux101/g/unison.htm [Accessed: 30th December 2010]

25. Anonymous (Ravenbrook Limited). (2001), The Memory Management Glossary.[online] available from memorymanagement.org http://www.memorymanagement.org/glossary/m.html#memory.management

KUBUNTU Page 59

Page 60: Kubuntu OS Project

“TOWERDS HUMANITY”26. Anonymous Ravenbrook Limited. (2001), The Memory Management Reference .[online]

available from memorymanagement.org http://www.memorymanagement.org/glossary/m.html#memory.management

27. Anonymous (viralpatel.net). (2001), Paging Tutorial | TAJ Operating System .[online]

available from viralpatel.net http://viralpatel.net/taj/tutorial/paging.php

28. Rkjha (blog.sudobits.com ) 10 of August 2010 what is swapping in operating system? .

[online] available from blog.sudobits.com http://blog.sudobits.com/2010/08/10/what-is-

swapping-in-operating-system/

29. Anonymous (ubuntu-version-8.blogspot.com)11 July 2006 Recovery Strategies.[online]

http://ubuntu-version-8.blogspot.com/2009/05/8-recovery-strategies.html

30. Rajapakse.S(SLIIT.2010) Foundation of Computer Science – Operating SystemPrincipalsSri Lanka Institute of Information Technology (SLIIT)

31.

Image Referencing

1. Figure 1: farm1.static.flickr.com 2010. [Online]. Available From:

http://farm1.static.flickr.com/49/150312877_5a20b7be83.jpg [Accessed 28th December 2010]

2. Figure 2: geeks.com 2010. [Online]. Available From:

http://www.geeks.com/techtips/2007/Images/mhp2_gnome_logo-01.gif [Accessed 28th

December 2010]

3. Figure 3: xubuntix.com 2010. [Online]. Available from:

http://www.xubuntix.org/media/images/blog/BIG_XFce_logo.png [Accessed 28th December

2010]

KUBUNTU Page 60

Page 61: Kubuntu OS Project

“TOWERDS HUMANITY”4. Figure 4: boisestate.edu 2010. [Online]. Available from:

http://cs.boisestate.edu/~amit/teaching/552/slides/ch6.pdf [Accessed 28th December 2010]

5. Figure 5,6,7,8,9,10,11,12,13: howtoforge.co 2010. [Online]. Available from:

http://www.howtoforge.com/the-perfect-desktop-kubuntu-9.10 [Accessed 30th December

2010]

KUBUNTU Page 61