SlideShare a Scribd company logo
1 of 21
FreeBSD
Sindh Madressatul Islam University
Spring 2017
4th Semester
HISTORY
2
INTRODUCTION
• FreeBSD is an open source.
• It is Unix-like operating system.
• It provides all the features, such as
preemptive multitasking, memory
protection, virtual memory, multi-user
facilities etc.
3
USES
• It Uses many IT companies: IBM, Nokia
to build their product.
• Certain parts of Apple’s Mac OS operating
system are based on FreeBSD .
• PSP3 operating system also borrows
certain components from FreeBSD.
• Netflix, what’sapp are also examples of
big, successful companies which are
running FreeBSD 10.
4
TARGET
• Desktop
• Server
• Embedded Systems
5
DESIGN PRINCIPLE
There are several design principles of
FreeBSD:
• The design of the system should be as
simple as possible.
• Security mechanism should be open for
the public.
• All access to the system should be
carefully checked.
• The separation of logical and physical
environment is needed to reduce the
possible risks.
• It Should be user friendly.
6
KERNEL MODULE
• FreeBSD has a monolithic kernel.
7
KERNEL THREADING
• Kernel threading was first introduced in
FreeBSD 5.0, by using an M:N
threading model. It is also called hybrid
model.
8
KERNEL THREADING
Implementation of M:N kernel model
worked, but it did not perform well, so that
FreeBSD started using a 1:1 threading
model in version 7.0.
9
PROCESS MANAGEMENT
BSD supports a multitasking atmosphere.
Each task or thread of execution is termed a
process. The context of a BSD process
comprises of user-level state, with the
contents of its address space and the run-
time environment, and kernel-level state,
which includes scheduling limits, resource
controls, and identification information.
10
FILE SYSTEM
The file system forms a tree, the beginning of
which is the root directory, sometimes referred to
by the name slash, spelled with a single solidus
character (/). The root directory contains files, it
contains vmunix, a copy of the kernel-executable
object file. It also contains directories, it contains
the user directory. Within the user directory is
the bin directory, which mostly contains executable
object code of programs, such as the files Is and vi.
11
MEMORY MANAGEMENT
BSD uses a two-level approach to maintain available
resources.
1. If a modest amount of memory is available, the
system will take memory resources away from
processes if these resources have not been used
recently. Should there be a severe resource
shortage, the system will resort to swapping the
entire context of a process to secondary storage.
2. The demand paging and swapping done by the
system are effectively transparent to processes. The
support of large sparse address spaces, mapped
files, and shared memory was a requirement for
BSD. An interface was specified, called mmap, that
allowed unrelated processes to request a shared
mapping of a file into their address spaces
12
LANGUAGE CODE
In order to localize a FreeBSD system to a
specific language, the user needs to find out
the codes for the language. The following
are examples of language.
Language Code Description
en_US English - United States
ru_RU Russian for Russia
zh_TW Traditional Chinese for Taiwan
13
NETWORK COMMUNICATION
BSD could provide interoperability and resource
sharing among the diverse set of machines that
was available in the Berkeley environment.
Consequently, the network-communication layer
is designed to support multiple protocols. New
protocols are added to the kernel without the
support for older protocols being affected. Older
applications can continue to operate using the
old protocol over the same physical network as
is used by newer applications running with a
newer network protocol.
14
FILE SHARING PROCESS
• FreeBSD supports the Network File System
(NFS), which allows a server to share directories
and files with clients over a network.
• With NFS, users and programs can access files
on remote systems as if they were stored locally.
15
FILE SHARING PROCESS
NFS has many practical uses. Some of the common
uses are:
• Data that would otherwise be duplicated on
each client can be kept in a single location and
accessed by clients on the network.
• Several clients may need access to
the userdirectory. Sharing that directory allows
for quick access to the source files without
having to download them to each client.
16
SECURITY PROTOCOL
Free BSD uses Security Protocols are
• SSL (Secure Sockets Layer).
• TLS (Transport Layer Security).
These protocols provide a secure communications
layer over which other protocols can be utilized.
17
SECURITY PROTOCOL
• FreeBSD provides several security-related
features including access control lists (ACLs),
security event auditing and mandatory access
controls (MAC).
• These security enhancements were developed
by the Trusted BSD project. The project was
founded by Robert Watson with the goal of
implementing concepts from the Common
Criteria for Information Technology Security
Evaluation.
18
SECURITY PROTOCOL
The project is supported by a variety of
organizations, including the
• NSA, Network Associates Laboratories.
• Yahoo!.
• McAfee Research.
• Apple Computer.
• Google.
19
USER INTERFACE
20
THANK YOU
21

More Related Content

What's hot

IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and FilteringAisha Talat
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scriptingVIKAS TIWARI
 
Linux boot process – explained
Linux boot process – explainedLinux boot process – explained
Linux boot process – explainedLinuxConcept
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba serverVeeral Bhateja
 
History Of Linux
History Of LinuxHistory Of Linux
History Of Linuxanand09
 
Attacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk EncryptionAttacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk EncryptionIan Haken
 
Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeologyenigma0x3
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)udamale
 
An introduction to open source software
An introduction to open source softwareAn introduction to open source software
An introduction to open source softwareSanjuktaBanik
 
Operating systems linux
Operating systems linuxOperating systems linux
Operating systems linuxwilliam_morg
 
Android for Embedded Linux Developers
Android for Embedded Linux DevelopersAndroid for Embedded Linux Developers
Android for Embedded Linux DevelopersOpersys inc.
 

What's hot (20)

IP tables and Filtering
IP tables and FilteringIP tables and Filtering
IP tables and Filtering
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scripting
 
Boot process
Boot processBoot process
Boot process
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
Linux boot process – explained
Linux boot process – explainedLinux boot process – explained
Linux boot process – explained
 
Memory management in linux
Memory management in linuxMemory management in linux
Memory management in linux
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Presentation on samba server
Presentation on samba serverPresentation on samba server
Presentation on samba server
 
History Of Linux
History Of LinuxHistory Of Linux
History Of Linux
 
Linux
Linux Linux
Linux
 
Attacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk EncryptionAttacking Windows Authentication and BitLocker Full Disk Encryption
Attacking Windows Authentication and BitLocker Full Disk Encryption
 
IEEE Posix Standards
IEEE Posix StandardsIEEE Posix Standards
IEEE Posix Standards
 
Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeology
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
NFS(Network File System)
NFS(Network File System)NFS(Network File System)
NFS(Network File System)
 
Introduction to SELinux Part-I
Introduction to SELinux Part-IIntroduction to SELinux Part-I
Introduction to SELinux Part-I
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
An introduction to open source software
An introduction to open source softwareAn introduction to open source software
An introduction to open source software
 
Operating systems linux
Operating systems linuxOperating systems linux
Operating systems linux
 
Android for Embedded Linux Developers
Android for Embedded Linux DevelopersAndroid for Embedded Linux Developers
Android for Embedded Linux Developers
 

Similar to Bsd ppt

Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
PARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERSPARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERSRaheemUnnisa1
 
Network File System
Network File SystemNetwork File System
Network File SystemDivyang Oza
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment pptRama .
 
Case study operating systems
Case study operating systemsCase study operating systems
Case study operating systemsAkhil Bevara
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemMoeez Ahmad
 
Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and PropertiesSaadi Rahman
 
OSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio Manfred
OSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio ManfredOSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio Manfred
OSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio ManfredNETWAYS
 
Linux Memory Analysis with Volatility
Linux Memory Analysis with VolatilityLinux Memory Analysis with Volatility
Linux Memory Analysis with VolatilityAndrew Case
 
Lavigne bsdmag-jan2012
Lavigne bsdmag-jan2012Lavigne bsdmag-jan2012
Lavigne bsdmag-jan2012Dru Lavigne
 
Linux Environment- Linux Basics
Linux Environment- Linux BasicsLinux Environment- Linux Basics
Linux Environment- Linux BasicsTrinity Dwarka
 
Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linuxsureskal
 

Similar to Bsd ppt (20)

12. dfs
12. dfs12. dfs
12. dfs
 
Chapter-5-DFS.ppt
Chapter-5-DFS.pptChapter-5-DFS.ppt
Chapter-5-DFS.ppt
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Nfs
NfsNfs
Nfs
 
PARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERSPARALLEL FILE SYSTEM FOR LINUX CLUSTERS
PARALLEL FILE SYSTEM FOR LINUX CLUSTERS
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Module1
Module1Module1
Module1
 
Network File System
Network File SystemNetwork File System
Network File System
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
Case study operating systems
Case study operating systemsCase study operating systems
Case study operating systems
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
11. dfs
11. dfs11. dfs
11. dfs
 
Linux kernel Architecture and Properties
Linux kernel Architecture and PropertiesLinux kernel Architecture and Properties
Linux kernel Architecture and Properties
 
OSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio Manfred
OSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio ManfredOSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio Manfred
OSDC 2010 | Use Distributed Filesystem as a Storage Tier by Fabrizio Manfred
 
Linux Memory Analysis with Volatility
Linux Memory Analysis with VolatilityLinux Memory Analysis with Volatility
Linux Memory Analysis with Volatility
 
Lavigne bsdmag-jan2012
Lavigne bsdmag-jan2012Lavigne bsdmag-jan2012
Lavigne bsdmag-jan2012
 
Os concepts
Os conceptsOs concepts
Os concepts
 
Linux Environment- Linux Basics
Linux Environment- Linux BasicsLinux Environment- Linux Basics
Linux Environment- Linux Basics
 
Gt3112931298
Gt3112931298Gt3112931298
Gt3112931298
 
Introduction to Linux
Introduction to LinuxIntroduction to Linux
Introduction to Linux
 

Recently uploaded

WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )Pooja Nehwal
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSebastiano Panichella
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@vikas rana
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptxBasil Achie
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxmavinoikein
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSebastiano Panichella
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptssuser319dad
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)Basil Achie
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Pooja Nehwal
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringSebastiano Panichella
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Salam Al-Karadaghi
 

Recently uploaded (20)

WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
WhatsApp 📞 9892124323 ✅Call Girls In Juhu ( Mumbai )
 
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with AerialistSimulation-based Testing of Unmanned Aerial Vehicles with Aerialist
Simulation-based Testing of Unmanned Aerial Vehicles with Aerialist
 
call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@call girls in delhi malviya nagar @9811711561@
call girls in delhi malviya nagar @9811711561@
 
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
LANDMARKS  AND MONUMENTS IN NIGERIA.pptxLANDMARKS  AND MONUMENTS IN NIGERIA.pptx
LANDMARKS AND MONUMENTS IN NIGERIA.pptx
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
Work Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptxWork Remotely with Confluence ACE 2.pptx
Work Remotely with Confluence ACE 2.pptx
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
SBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation TrackSBFT Tool Competition 2024 -- Python Test Case Generation Track
SBFT Tool Competition 2024 -- Python Test Case Generation Track
 
Philippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.pptPhilippine History cavite Mutiny Report.ppt
Philippine History cavite Mutiny Report.ppt
 
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
NATIONAL ANTHEMS OF AFRICA (National Anthems of Africa)
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
Navi Mumbai Call Girls Service Pooja 9892124323 Real Russian Girls Looking Mo...
 
The 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software EngineeringThe 3rd Intl. Workshop on NL-based Software Engineering
The 3rd Intl. Workshop on NL-based Software Engineering
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
Exploring protein-protein interactions by Weak Affinity Chromatography (WAC) ...
 

Bsd ppt

  • 1. FreeBSD Sindh Madressatul Islam University Spring 2017 4th Semester
  • 3. INTRODUCTION • FreeBSD is an open source. • It is Unix-like operating system. • It provides all the features, such as preemptive multitasking, memory protection, virtual memory, multi-user facilities etc. 3
  • 4. USES • It Uses many IT companies: IBM, Nokia to build their product. • Certain parts of Apple’s Mac OS operating system are based on FreeBSD . • PSP3 operating system also borrows certain components from FreeBSD. • Netflix, what’sapp are also examples of big, successful companies which are running FreeBSD 10. 4
  • 6. DESIGN PRINCIPLE There are several design principles of FreeBSD: • The design of the system should be as simple as possible. • Security mechanism should be open for the public. • All access to the system should be carefully checked. • The separation of logical and physical environment is needed to reduce the possible risks. • It Should be user friendly. 6
  • 7. KERNEL MODULE • FreeBSD has a monolithic kernel. 7
  • 8. KERNEL THREADING • Kernel threading was first introduced in FreeBSD 5.0, by using an M:N threading model. It is also called hybrid model. 8
  • 9. KERNEL THREADING Implementation of M:N kernel model worked, but it did not perform well, so that FreeBSD started using a 1:1 threading model in version 7.0. 9
  • 10. PROCESS MANAGEMENT BSD supports a multitasking atmosphere. Each task or thread of execution is termed a process. The context of a BSD process comprises of user-level state, with the contents of its address space and the run- time environment, and kernel-level state, which includes scheduling limits, resource controls, and identification information. 10
  • 11. FILE SYSTEM The file system forms a tree, the beginning of which is the root directory, sometimes referred to by the name slash, spelled with a single solidus character (/). The root directory contains files, it contains vmunix, a copy of the kernel-executable object file. It also contains directories, it contains the user directory. Within the user directory is the bin directory, which mostly contains executable object code of programs, such as the files Is and vi. 11
  • 12. MEMORY MANAGEMENT BSD uses a two-level approach to maintain available resources. 1. If a modest amount of memory is available, the system will take memory resources away from processes if these resources have not been used recently. Should there be a severe resource shortage, the system will resort to swapping the entire context of a process to secondary storage. 2. The demand paging and swapping done by the system are effectively transparent to processes. The support of large sparse address spaces, mapped files, and shared memory was a requirement for BSD. An interface was specified, called mmap, that allowed unrelated processes to request a shared mapping of a file into their address spaces 12
  • 13. LANGUAGE CODE In order to localize a FreeBSD system to a specific language, the user needs to find out the codes for the language. The following are examples of language. Language Code Description en_US English - United States ru_RU Russian for Russia zh_TW Traditional Chinese for Taiwan 13
  • 14. NETWORK COMMUNICATION BSD could provide interoperability and resource sharing among the diverse set of machines that was available in the Berkeley environment. Consequently, the network-communication layer is designed to support multiple protocols. New protocols are added to the kernel without the support for older protocols being affected. Older applications can continue to operate using the old protocol over the same physical network as is used by newer applications running with a newer network protocol. 14
  • 15. FILE SHARING PROCESS • FreeBSD supports the Network File System (NFS), which allows a server to share directories and files with clients over a network. • With NFS, users and programs can access files on remote systems as if they were stored locally. 15
  • 16. FILE SHARING PROCESS NFS has many practical uses. Some of the common uses are: • Data that would otherwise be duplicated on each client can be kept in a single location and accessed by clients on the network. • Several clients may need access to the userdirectory. Sharing that directory allows for quick access to the source files without having to download them to each client. 16
  • 17. SECURITY PROTOCOL Free BSD uses Security Protocols are • SSL (Secure Sockets Layer). • TLS (Transport Layer Security). These protocols provide a secure communications layer over which other protocols can be utilized. 17
  • 18. SECURITY PROTOCOL • FreeBSD provides several security-related features including access control lists (ACLs), security event auditing and mandatory access controls (MAC). • These security enhancements were developed by the Trusted BSD project. The project was founded by Robert Watson with the goal of implementing concepts from the Common Criteria for Information Technology Security Evaluation. 18
  • 19. SECURITY PROTOCOL The project is supported by a variety of organizations, including the • NSA, Network Associates Laboratories. • Yahoo!. • McAfee Research. • Apple Computer. • Google. 19