Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Unit objectives
Outline the key features of the Linux
Course ILT
operating system
List the advantages of using Linux
Describe the history of the Linux
operating system
Explain the common uses of Linux in
the industry today
Topic A
Topic A: Linux as an operating system
Topic B: Advantages of Linux
Course ILT
Software
– Instructions that understand how to use
the hardware
Role of the operating system
The operating system carries out
tasks by interacting with users,
Course ILT
the OS
New versions add capabilities or fix
bugs
Identifying kernel versions
Major number
Minor number
Course ILT
Understanding Linux
Licensing Linux
Open Source Software (OSS)
– The source code making up the program
Course ILT
Freeware
– Distributed free of charge
Course ILT
hardware
Upgrades force changes beyond the
customer’s actual need
Maintenance provided through
expensive service contracts by limited
number of persons
Discontinuation of support
Failure and disappearance of the
vendor
Meeting business needs
Common software available for Linux
includes:
Course ILT
fix bugs
Waiting for a hot fix may take weeks
or months
Bugs in OSS programs can be
identified and fixed very quickly
Security loopholes are quickly
identified and fixed
Flexibility with hardware platforms
Partial list of hardware platforms on which
Linux can run:
Course ILT
– Intel
– Itanium
– Mainframe (S/390)
– Cirrus Logic ARM
– DEC Alpha
– MIPS
– M68K
– PA-RISC
– SPARC
– Ultra-SPARC
– PowerPC (Macintosh)
Ease of customization
The ability to control the inner
workings of an operating system
Course ILT
Application servers
Supercomputers
Scientific/engineering computations
Desktop operating systems
Internet servers
Mail services
Routing
Course ILT
FTP services
Firewalls and proxy services
Web services
News services
DNS services
Mail services
Mail Transfer Agent (MTA)
– An e-mail server
Course ILT
Internet to function
– Linux provides support for routing and is
easily customizable
Firewalls
Firewalls protect companies from
outside intruders
Course ILT
Computers communicating on a
network need to be uniquely identified
Course ILT
– Security
– Sharing
– Portability
Course ILT Exercise D-2