Deogiri institute of engineering & management studies.
Aurangabad.
Academic year-2018-2019
Department of second year computer science engineering
Submitted by Krishna Kakade(26030)
Presentation topic:- Arch linux (Operating system)
Subject teacher:-
Prof :-P.Durole
Table Of Contents
• Introduction
• Operating System structure
• Process management
• Storage management
• Memory management(Heterogenous memory management )
• Protection & Security
Introduction
• Inspired by CRUX, another minimalist distribution, Judd Vinet started the Arch Linux project in March 2002.
Originally only for 32-bit x86 CPUs, the first x86_64 installation ISO was released in April 2006.Vinet led
Arch Linux until 1 October 2007, when he stepped down due to lack of time, transferring control of the project
to Aaron Griffin. The end of i686 support was announced in January 2017, with the February 2017 ISO being
the last one including i686 and making the architecture unsupported in November 2017.Arch Linux (or Arch )
is a Linux distribution for computers based on x86-64 architectures .
• Arch Linux is composed predominantly of free and open-source software, and supports community
involvement. The design approach of the development team follows the KISS principle ("keep it simple,
stupid") as the general guideline, and focuses on elegance, code correctness, minimalism and simplicity, and
expects the user to be willing to make some effort to understand the system's operation.
• Arch Linux has comprehensive documentation in the form of a community wiki known as the Arch Wiki.
• Arch linux is the most lightweight operating system in the operating system world it’s ISO(international
organization for standardization) it’s size around Light-weight: My whole system with Gnome 3 installed took a
little less than 200 mB of RAM (176 mB to be specific). On a full fledged server and workstation (with LAMP
installed), Arch takes around 400 mB of RAM. Compare this to latest versions of Ubuntu which takes > 300
mB of RAM for a default desktop. More RAM availible for the system means your system will be more fast
and stable and you will be able to do multitasking easily.
• Minimalist: You install things that you need, there is no software bloat. This means less memory, both of hard-
drive and RAM is wasted. And Arch linux is a stable operating system.
Operating System structure
Structure of Arch Linux
Operating System structure
• Unix and Linux has changed, evolved and matured. But there’s one thing that has not changed too much from
the very beginnings. And it is something that we probably all take for granted and don’t really think too much
about. I can admit, until recently I had not given it much thought.
• I am referring to the structure of the Unix/Linux file system. I mention Unix because ultimately, that’s where
our current filesystem structure originated. It’s a slightly long and complicated story about how we got to
where we did today when it comes to the filesystem structure that we today take for granted. It’s actually a
very intriguing historical path with many different standards, past and present.
• The developers at Arch Linux beg to differ. They’ve taken things in to their own hands and had a go at re-
inventing the filesystem structure. Or a small part of it.
• As of June 2013, the team at Arch Linux merged /bin and /users/bin in to /usr/bin.This is done through the
use of system linking current packages that reside and install to /sbin or /usr/sbin.
.
Process management
• In which process management of arch linux tell about how we can control CPU(central processing unit)and
memory management of the Arch linux and other resource utilization of individual processes, or all processes
run by a particular group.While many recent processors are powerful enough to play a dozen video or audio
streams simultaneously, it is still possible that another thread hijacks the processor for half a second to
complete another task.
• This results in short interrupts in audio or video streams. It is also possible that video/audio streams get out of
sync. While this is annoying for a casual music listener; for a content producer, composer or video editor this
issue is much more serious as it interrupts their work flow.
• This protects the normal user from underpowering processes which are essential to the system.
• This can be especially important on multi-user machine .By default, real-time prioritizing is enabled on Arch.
System, group and user wide configuration can be achieved using PAMThe Linux Pluggable Authentication
Modules (PAM) and system.
• Realtime is a synonym for a process which has the capability to run in time without being
interrupted by any other process. However, cycles can occasionally be dropped despite this. Low
power supply or a process with higher priority could be a potential cause. To solve this problem,
there is a scaling of realtime quality. This article deals with soft realtime.
• Hard realtime is usually not so much desired as it is needed. An example could be made for car's
ABS (anti-lock braking system). This can not be "rendered" and there is no second chance. Power
is nothing without control The realtime-lsm module granted the right to get higher capabilities to
users belonging to a certain UID. The rlimit way works similar, but it can be controlled graduated
finer. There is a new functionality in PAM which can be used to control the capabilities on a per
user or a per group level.
Storage Management
• let's say that I am running Windows and I have 1,5 GB RAM on the machine and am also running a greedily for
memory application called A, which uses in that moment 1 GB RAM. So, because Windows is always using virtual
memory I suppose that some of the allocated by process A memory is put in swap on the disk and some part is in
RAM, so let's suppose 800 MB are in RAM and 200 MB in swap.
• So from the total RAM (1,5 GB) we have 700 MB free . On other side in Linux we will NOT have any free memory
since Linux is putting everything in RAM(random acess memory) if there is free memory available.
• Anyway, I'm exploring the system and getting some services set up, and I took a look at the memory usage; I was
surprised to find that 'free -m' shows 422 of 494 M in use, and that is with virtually no services running.
• Then if I start nginx, mariadb, postfix, and php-fpm, all of which I am going to need, available RAM shrinks to
about 8MB. It is looking like I will not be able to do any real work with this server configuration..
Memory Management(Heterogeneous Memory management in Arch Linux)
• Provide infrastructure and helpers to integrate non-conventional memory (device memory like GPU on board memory) into
regular kernel path.
• HMM also provides optional helpers for SVM (Share Virtual Memory), i.e., allowing a device to transparently access
program address coherently with the CPU meaning that any valid pointer on the CPU is also a valid pointer for the device.
This is becoming mandatory to simplify the use of advanced heterogeneous computing where GPU, DSP, or FPGA are used
to perform various computations on behalf of a process.
• In the first section I expose the problems related to using device specific memory allocators. In the second section, I expose
the hardware limitations that are inherent to many platforms.
• device memory is represented inside the kernel. Finally, the last section presents a new migration helper that allows lever-
aging the device DMA engine.
Protection & Security
• Arch linux is one of the best free and Most compatible with every hardware and best light weight operating system
in today’s world it’s size around 400Mb.
• Every version of Linux is opensource and freely available to everyone except (Enterprise Linux) because no need to
pirate this OS(operating system)hence no such major virus attacks are not on any linux environment and it is most
secured OS(operating system) in this world.
• The arch linux is most secured versions of linux in in linux flavors and linux most secure Operating system in the
because it is opensource and it is 99% virus free many times
• Access control in which access control user having access to handle anonymity networks is very secure for
networking and browsing Anonymity networks
• Authentication is useful when user trying to unlock your system then security highly secure in linux operating system
• Cryptography is use to encrypt and decrypting passwords this technology not allowed to stolen any any kind Data of the user.
•
• Firewalls firewall security useful when your browsing any kind of content on internet the Arch linux firewall security detect
that malicious content it is very secure Intrusion detection is detecting any kind of problems in operating system.
•
• Password managers password manager manages passwords in operating system
• Proxy servers proxy servers are use for the internet connectivity and all about networking
Secure Shell
• Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured
network. Typical applications include remote command-line login and remote command execution, but any network
service can be secured with SSH.Examples of services that can use SSH are Git, resync and X11 forwarding Security
testing
• Surveillance
• Virtual Private Network
• Arch package security
• Arch Security Team etc are the Security features of arch linux.
THANKYOU

Arch linux and whole security concepts in linux explained

  • 1.
    Deogiri institute ofengineering & management studies. Aurangabad. Academic year-2018-2019 Department of second year computer science engineering Submitted by Krishna Kakade(26030) Presentation topic:- Arch linux (Operating system) Subject teacher:- Prof :-P.Durole
  • 2.
    Table Of Contents •Introduction • Operating System structure • Process management • Storage management • Memory management(Heterogenous memory management ) • Protection & Security
  • 3.
    Introduction • Inspired byCRUX, another minimalist distribution, Judd Vinet started the Arch Linux project in March 2002. Originally only for 32-bit x86 CPUs, the first x86_64 installation ISO was released in April 2006.Vinet led Arch Linux until 1 October 2007, when he stepped down due to lack of time, transferring control of the project to Aaron Griffin. The end of i686 support was announced in January 2017, with the February 2017 ISO being the last one including i686 and making the architecture unsupported in November 2017.Arch Linux (or Arch ) is a Linux distribution for computers based on x86-64 architectures . • Arch Linux is composed predominantly of free and open-source software, and supports community involvement. The design approach of the development team follows the KISS principle ("keep it simple, stupid") as the general guideline, and focuses on elegance, code correctness, minimalism and simplicity, and expects the user to be willing to make some effort to understand the system's operation. • Arch Linux has comprehensive documentation in the form of a community wiki known as the Arch Wiki. • Arch linux is the most lightweight operating system in the operating system world it’s ISO(international organization for standardization) it’s size around Light-weight: My whole system with Gnome 3 installed took a little less than 200 mB of RAM (176 mB to be specific). On a full fledged server and workstation (with LAMP installed), Arch takes around 400 mB of RAM. Compare this to latest versions of Ubuntu which takes > 300 mB of RAM for a default desktop. More RAM availible for the system means your system will be more fast and stable and you will be able to do multitasking easily. • Minimalist: You install things that you need, there is no software bloat. This means less memory, both of hard- drive and RAM is wasted. And Arch linux is a stable operating system.
  • 4.
  • 5.
    Operating System structure •Unix and Linux has changed, evolved and matured. But there’s one thing that has not changed too much from the very beginnings. And it is something that we probably all take for granted and don’t really think too much about. I can admit, until recently I had not given it much thought. • I am referring to the structure of the Unix/Linux file system. I mention Unix because ultimately, that’s where our current filesystem structure originated. It’s a slightly long and complicated story about how we got to where we did today when it comes to the filesystem structure that we today take for granted. It’s actually a very intriguing historical path with many different standards, past and present. • The developers at Arch Linux beg to differ. They’ve taken things in to their own hands and had a go at re- inventing the filesystem structure. Or a small part of it. • As of June 2013, the team at Arch Linux merged /bin and /users/bin in to /usr/bin.This is done through the use of system linking current packages that reside and install to /sbin or /usr/sbin. .
  • 6.
    Process management • Inwhich process management of arch linux tell about how we can control CPU(central processing unit)and memory management of the Arch linux and other resource utilization of individual processes, or all processes run by a particular group.While many recent processors are powerful enough to play a dozen video or audio streams simultaneously, it is still possible that another thread hijacks the processor for half a second to complete another task. • This results in short interrupts in audio or video streams. It is also possible that video/audio streams get out of sync. While this is annoying for a casual music listener; for a content producer, composer or video editor this issue is much more serious as it interrupts their work flow. • This protects the normal user from underpowering processes which are essential to the system. • This can be especially important on multi-user machine .By default, real-time prioritizing is enabled on Arch. System, group and user wide configuration can be achieved using PAMThe Linux Pluggable Authentication Modules (PAM) and system.
  • 7.
    • Realtime isa synonym for a process which has the capability to run in time without being interrupted by any other process. However, cycles can occasionally be dropped despite this. Low power supply or a process with higher priority could be a potential cause. To solve this problem, there is a scaling of realtime quality. This article deals with soft realtime. • Hard realtime is usually not so much desired as it is needed. An example could be made for car's ABS (anti-lock braking system). This can not be "rendered" and there is no second chance. Power is nothing without control The realtime-lsm module granted the right to get higher capabilities to users belonging to a certain UID. The rlimit way works similar, but it can be controlled graduated finer. There is a new functionality in PAM which can be used to control the capabilities on a per user or a per group level.
  • 8.
    Storage Management • let'ssay that I am running Windows and I have 1,5 GB RAM on the machine and am also running a greedily for memory application called A, which uses in that moment 1 GB RAM. So, because Windows is always using virtual memory I suppose that some of the allocated by process A memory is put in swap on the disk and some part is in RAM, so let's suppose 800 MB are in RAM and 200 MB in swap. • So from the total RAM (1,5 GB) we have 700 MB free . On other side in Linux we will NOT have any free memory since Linux is putting everything in RAM(random acess memory) if there is free memory available. • Anyway, I'm exploring the system and getting some services set up, and I took a look at the memory usage; I was surprised to find that 'free -m' shows 422 of 494 M in use, and that is with virtually no services running. • Then if I start nginx, mariadb, postfix, and php-fpm, all of which I am going to need, available RAM shrinks to about 8MB. It is looking like I will not be able to do any real work with this server configuration..
  • 9.
    Memory Management(Heterogeneous Memorymanagement in Arch Linux) • Provide infrastructure and helpers to integrate non-conventional memory (device memory like GPU on board memory) into regular kernel path. • HMM also provides optional helpers for SVM (Share Virtual Memory), i.e., allowing a device to transparently access program address coherently with the CPU meaning that any valid pointer on the CPU is also a valid pointer for the device. This is becoming mandatory to simplify the use of advanced heterogeneous computing where GPU, DSP, or FPGA are used to perform various computations on behalf of a process. • In the first section I expose the problems related to using device specific memory allocators. In the second section, I expose the hardware limitations that are inherent to many platforms. • device memory is represented inside the kernel. Finally, the last section presents a new migration helper that allows lever- aging the device DMA engine.
  • 10.
    Protection & Security •Arch linux is one of the best free and Most compatible with every hardware and best light weight operating system in today’s world it’s size around 400Mb. • Every version of Linux is opensource and freely available to everyone except (Enterprise Linux) because no need to pirate this OS(operating system)hence no such major virus attacks are not on any linux environment and it is most secured OS(operating system) in this world. • The arch linux is most secured versions of linux in in linux flavors and linux most secure Operating system in the because it is opensource and it is 99% virus free many times • Access control in which access control user having access to handle anonymity networks is very secure for networking and browsing Anonymity networks
  • 11.
    • Authentication isuseful when user trying to unlock your system then security highly secure in linux operating system • Cryptography is use to encrypt and decrypting passwords this technology not allowed to stolen any any kind Data of the user. • • Firewalls firewall security useful when your browsing any kind of content on internet the Arch linux firewall security detect that malicious content it is very secure Intrusion detection is detecting any kind of problems in operating system. • • Password managers password manager manages passwords in operating system • Proxy servers proxy servers are use for the internet connectivity and all about networking
  • 12.
    Secure Shell • SecureShell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Typical applications include remote command-line login and remote command execution, but any network service can be secured with SSH.Examples of services that can use SSH are Git, resync and X11 forwarding Security testing • Surveillance • Virtual Private Network • Arch package security • Arch Security Team etc are the Security features of arch linux. THANKYOU