A Layered Approach in the Linux Operating System

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

The Linux operating system resembles a structure where several layers are stacked on top of each other. The interface with the devices is at the core of the system. It cannot be completed unless the operational framework interacts with the equipment. The working framework is the component of a computer system that is most frequently used. Since it requires direct access to the hardware, this component of the OS is arguably the most competent and the most destructive (Patel & Shah, 2021). The equipments connection is a collection of capacities included inside the operating system called device drivers. If a device driver is not working properly, it has the potential of erasing data on the hard drive (Zhang et al., 2017). Since a device driver is responsible for ensuring that the task is completed properly, it cannot terminate until the task is complete.

When addressing the administrative capacities of an operating system, it is customary to begin at the device driver level. The device driver is where decisions about what processes to execute and when to run them are determined as which assets to allocate to certain processes. The operating systems actual processes are managed at a higher level. The first layer is often reserved for applications that communicate directly with the OS, such as the different shells (Tomsho, 2016; Zhang et al., 2017). These instructions are interpreted and sent to the OS for implementation. Typically, packages like word processors, compilers, or databases are launched inside the shell.

The following layers compose the design of a Linux System. First, it has the hardware layer containing all peripheral devices such as Random Access Memory (RAM), hard disk drive (HDD), and central processing unit (CPU). Secondly, there is the kernel, which is the central component of the Operating System. It communicates directly with the equipment and provides low-level operations to the higher-layer parts (Zhang et al., 2017). Thirdly, the shell serves as an interface to the component, obscuring the complexity of the components capacities from the client. The shell accepts commands from the client and performs the capacities of the component (Zhang et al., 2017). Finally, Linux has utilities that provide a significant percentage of the functionality of a functioning framework to the client.

I would recommend the CNT network make use of dynamic internet protocol (IP) addresses instead of the static internet protocol. Static internet protocol addresses are ideal for internet servers and email platforms since they never change, ensuring that clients are never rerouted due to an IP address alteration. Static IP address-based devices may host sites that hold data available to other devices over the Internet. It is simpler to establish a static internet protocol address and keep a connection while managing several devices. A static internet protocol address may be the best option for businesses with remote staff or vendors of connected devices for large-scale installations (Tomsho, 2016). Dynamic IP addresses are often installed to deliver network services to many connected customers or end nodes and are thus more cost-effective to utilize (Tomsho, 2016). Dynamic IP addresses are typically considered more secure since they vary with each new session or login (Du et al., 2019). It becomes more challenging for a hacker to trace down and access an individuals data (Du et al., 2019). A cybercriminal may experience challenges while accessing networked gadgets when using a dynamic IP address.

Although dynamic IP addresses are safe, they are associated with security risks. Nonetheless, security flaws in dynamic IP addresses may be overcome by using a security suite, router firewall, or virtual private network (VPN). With a virtual private network, a users network address may be obscured, making it difficult to determine the actual location on the network. However, although these safeguards cannot ensure that all information will be secure at all times, they may significantly improve the situation, making it useful to install additive security methods.

References

Du, F., Zhang, Y., Bao, X., & Liu, B. (2019, March). Fenet: Roles classification of ip addresses using connection patterns. In 2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT), 158-164, IEEE.

Patel, B., & Shah, P. (2021). Operating system support, protocol stack with key concerns and testbed facilities for IoT: A case study perspective. Journal of King Saud University-Computer and Information Sciences. Web.

Tomsho, G. (2016). Guide to networking essentials. Australia: Cengage learning.

Zhang, J., Lu, Y., Shu, J., & Qin, X. (2017). FlashKV: Accelerating KV performance with open-channel SSDs. ACM Transactions on Embedded Computing Systems (TECS), 16(5s), 1-19. Web.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now