OSY Report
OSY Report
OSY Report
On
Submitted by
5th Semester of
Diploma in
(Computer Engineering)
Of
Guided By
Prof. S. S. Bhosale
2024-25
Operating System tools
Mumbai
CERTIFICATE
This is to certify that, Miss. Sanika Jadhav, Arya Kadam, Chaitrali Bhosale, Dhanashri
Pawar Roll no.23359, 23361, 23362, 23363 of Fifth Semester of Diploma in Computer
Engineering of Government Residence Women Polytechnic, Tasgaon has completed the
Micro project satisfactorily in Operating System (22516) for the academic year 2024-2025
as prescribed in the curriculum.
Title of Micro Project: “Create a Report on different operating system tools used
to perform various functions”
Group No.: 19
Marks:
Signature
MICRO PROJECT
Operating System tools
Name of the Project: “Create a Report on different operating system tools used to
perform various functions”
ACKNOWLEDGEMENT
Operating System tools
Thank You!
Name of Students:-
Title of Micro Project: “Create a Report on different operating system tools used to
perform various functions”
Course: Operating System (22516)
6. Action Plan
PART B
1. Rationale
2. Aim
3. Course Outcomes
4. Literature Review
5. Actual Methodology
Followed
6. Actual Resources Used
7. Output
8. Skill Developed
9. Application of Project
10. Conclusion
PART A
1
Different OS tools
MICRO PROJECT
3. Proposed Methodology:
• First, we can select the topics are suitable in our syllabus and select the Micro Project.
• Next, we discuss in Group Member and search the information according to the Micro
Project.
• Collect the Basic information about the Micro Project.
• Next, we discuss the micro project with our guidance. They help for making project.
• Then some corrections are required and again Softcopy of report checked by the teacher.
• Prepare hard copy of the micro project Report
2
Different OS tools
5. Resources Required:
3
Different OS tools
1. Internet www.google.com 1
PART B
MICRO PROJECT
4
Different OS tools
1. Rationale:
Operating system (OS) tools are essential utilities that help users and administrators manage,
maintain, and troubleshoot various functions of a computer system. They are designed to
simplify tasks related to system performance, security, resource management, and software
updates.
These tools ensure the efficient functioning of an operating system by offering control over
system resources and maintenance.
5
Different OS tools
4. Theory:
Operating system tools are special system programs that are used to manage the overall functions of
an operating system.
(e) Security
1. User Management:
User management is one of the important tools that OS has to provide. Operating system can be
multiuser or single user.
In case of multiple users, the levels of rights and privileges can be different. So operating system
needs to keep log of everything related to the user. It could be even login and logout times.
OS provides tools to create users, modify them or even delete them from the system.
Managing users is nothing but managing different user accounts. In case multiuser system, it is a
complicated task. OS provides basic security to the organization with the help of this service.
It even ensures required and limited access to the system
User management includes everything from creating a user to deleting a user on your system.
User management can be done in three ways on a Linux system.
6
Different OS tools
Command line tools include commands like useradd, userdel, usermod, passwd, etc.
These are mostly used by the server administrators.
-c”<username>”<username>
Example: useradd -m -d /home/xyz -c "xyz" xyz File /etc/default/useradd contains some user default
options. The command useradd -D can be used to display this file.
Syntax: useradd -D
Usermod: The command usermod is used to modify the properties of an existing user.
Passwd: A user can set the password with the command passwd. Old password has to be typed twice
before entering the new one.
Syntax: passwd
2.Security Policy:
There is variety of operating systems available in market. Every OS has standard security
policies. Implementation of most of the security policies depends on the organization.
Security policies are used by OS to ensure that it maintains availability, integrity and
confidentiality.
OS security policy helps in protecting systems from various threats to the system, malware,
spyware, ransomware, viruses, worms, malware, backdoor intrusions, and many more.
Security policies provide all possible preventative measures and techniques to keep operating
system safe. It also protects OS from activities like data theft, unwanted modification to data,
deletion of data etc.
7
Different OS tools
There are wide operations performed by OS security policies. Some of the major areas are
listed below:
a) System updating or patching system regularly.
b) Software installation or updation of various antiviruses.
c) Firewall installation and management of incoming and outgoing traffic on networks.
d) Provide security to users account.
e) Deciding what kind of data, users and hardware is vital in the system.
3.Device Management:
Device management is needed for smooth functioning of computer system. One of the most
vital operations of device management is resource allocation. Here resource means devices.
In multiuser environment input, output and network devices and processors need to be
allocated to the required users. And this allocation is not very easy.
Operating system is capable of device communication. It communicates and does
coordination among devices.
Managing all the hardware or virtual devices of computer system.
Allow interaction with hardware devices through device driver.
Used to install device and component-level drivers as well as associated software.
Allocate devices to the process as per process requirement and priority.
Deallocate devices either temporarily or permanently depending on condition.
Keeping track of all device’s data and location.
Monitoring device status like printers, storage drivers and other devices.
Used to enforce the predetermined policies and decides which process receives the device
when and for how long.
4.Performance Monitor:
8
Different OS tools
It is very tough job for every system or network administrator to monitor and debug Linux
System Performance problems every day.
Monitor various activities on a computer such as CPU or memory usage.
Used to examine how programs running on their computer affect computer’s performance
It is used to identify performance problems or bottleneck that affect operating system or
installed applications.
Used to observe the effect of system configuration changes.
The commands discussed below are some of the most fundamental commands when it comes
to system analysis and debugging Linux server issues such as:
1) vmstat: Virtual memory statistics The vmstat command reports information about
processes, memory, paging, block IO, traps, and cpu activity. $ vmstat 3
top command display Linux processes. It provides a dynamic real-time view of a running
system i.e. actual process activity. By default, it displays the most CPU-intensive tasks
running on the server and updates the list every five seconds. $ top
3) free: Show Linux server memory usage free command shows the total amount of free and
used physical and swap memory in the system, as well as the buffers used by the kernel. #
free
4) iostat: Montor Linux average CPU load and disk activity iostat command report Central
Processing Unit (CPU) statistics and input/output statistics for devices, partitions and network
filesystems (NFS). # iostat
5) netstat: Linux network and statistics monitoring tool netstat command displays network
connections, routing tables, interface statistics, masquerade connections, and multicast
memberships. # netstat –tulpn
5.Task Scheduler
Task scheduler can be called as CPU scheduler. Throughout the lifetime of process it migrates or
travels to the various scheduling queues.
An operating system should select processes for scheduling purposes from these queues in some
manner or style. The selection procedure is done by schedulers.
In a batch system there can be many processes which can be executed immediately.
In batch systems if processes are more then they are spooled to the mass storage devices like
disks in which they are kept for the later execution.
The scheduler which picks up job from this pool and loads into main memory for execution is
called as long term scheduler or job scheduler.
9
Different OS tools
There is another scheduler which selects the jobs or processes which are ready to execute from
this pool and allocates the CPU to one of them is called short term scheduler or CPU scheduler.
1. Internet www.google.com 1
10
Different OS tools
2.10 GHz,
8.00 GB RAM,
64-bit operating
system
4 Reference Book Concepts of 1
Operating System
By: -
7. Skill Developed:
1. Time management.
2. Communication skill developed.
3. Leadership experience.
4. Programming
5. Error Handling.
6. Problem solving
7. Critical thinking
9. Conclusion:
11
Different OS tools
In conclusion, Linux system tools play a crucial role in efficiently managing user accounts,
enforcing security policies, controlling hardware devices, monitoring performance, and
managing system tasks. These tools, such as `useradd`, `iptables`, `lsblk`, `top`, and
`systemctl`, provide administrators with the ability to maintain security, optimize resource
usage, troubleshoot issues, and ensure smooth operation of both small-scale and large-scale
Linux environments.
10.References:
https://www.geeksforgeeks.org/operating-systems/
https://www.studocu.com/row/document/jomo
12