Academia.eduAcademia.edu

Linux CentOS

description26 papers
group3,431 followers
lightbulbAbout this topic
Linux CentOS is a community-driven, open-source operating system based on the Red Hat Enterprise Linux (RHEL) distribution. It provides a stable, secure, and high-performance platform for servers and workstations, emphasizing long-term support and compatibility with RHEL, making it popular for enterprise environments.
lightbulbAbout this topic
Linux CentOS is a community-driven, open-source operating system based on the Red Hat Enterprise Linux (RHEL) distribution. It provides a stable, secure, and high-performance platform for servers and workstations, emphasizing long-term support and compatibility with RHEL, making it popular for enterprise environments.

Key research themes

1. How has Linux evolved in kernel design and resource management from early versions to modern CentOS systems?

This theme focuses on the technical evolution of Linux kernel capabilities, design principles, and resource control mechanisms over time. Studying this developmental trajectory is crucial for understanding how modern Linux distributions like CentOS address system performance, scalability, hardware support, and workload management, impacting both enterprise and academic applications.

Key finding: Analyzes Linux kernel progress from version 0.01 (1991) through 1.0 and beyond, highlighting increased TCP/IP networking support, modular kernel threads, SMP scalability, 64-bit memory support, and driver enhancements. It... Read more
Key finding: Through comparative installation and usage on the same high-capacity hardware, the study finds that Linux systems expanded from basic monolithic and hardware-limited designs (Red Hat Linux 5.1) to highly scalable, modular,... Read more
Key finding: Introduces Class-based Kernel Resource Management (CKRM), enhancing Linux’s ability to provide differentiated resource control (CPU, memory, I/O, network) based on workload classifications. This framework decouples workload... Read more
Key finding: Details creation of a Linux-based (Ubuntu) tool to monitor OS and process-level performance metrics, essential for debugging, resource management, and system optimization. This practical application underscores the evolution... Read more

2. What role do Linux-based distributions like CentOS play in educational and academic settings through customization and teaching tools?

This theme examines the development and deployment of Linux distributions tailored for educational contexts. These distributions provide customized environments that facilitate student learning and teaching of operating system concepts, reflecting the importance of CentOS and derivative OS for developing future computer science professionals.

Key finding: Describes the EOS Project, an Ubuntu-based Linux distribution customized specifically for undergraduate students, featuring pre-installed educational software and tailored GUIs. The design enhances the usability and learning... Read more
Key finding: Presents a computer science course leveraging the Raspberry Pi (running embedded Linux) and virtual machines to teach embedded operating system concepts. The course structure bridges hardware constraints with Linux kernel... Read more
Key finding: Although focusing on anonymity tools, this paper highlights how Linux distributions like Tails extend the fundamental Linux kernel capabilities to support privacy and security objectives important in academic and activist... Read more
Key finding: Details the Linux operating system's free, open-source nature and its benefits for educational use, emphasizing customizable source code and the community-driven development model. The narrative supports how Linux and its... Read more

3. How does Linux compare to other popular operating systems such as Windows in terms of security, usability, and performance?

This research area evaluates Linux (including CentOS variants) against competing OS platforms focusing on factors like system security, user experience, configurability, and resource efficiency. Understanding these comparative strengths supports rationale for adopting Linux in security-sensitive and performance-critical academic and enterprise environments.

Key finding: Employs a survey-based methodology analyzing attributes such as cost, security, configurability, and user-friendliness, concluding that Linux is preferred for security and customization while Windows is favored for ease of... Read more
Key finding: Reviews kernel architectures across multiple OS including Linux and Windows, highlighting Linux’s strengths in stability, compatibility, and reliability linked to its kernel design which underpins its security and performance... Read more
Key finding: Provides experiential insights into Linux’s suitability for home and office use, highlighting its ability to execute complex tasks efficiently and securely compared to traditional proprietary OS, supporting Linux’s growing... Read more

All papers in Linux CentOS

* setuid (Set User ID) → asignación a nivel de usuario Este bit es asignable a ficheros ejecutables, de manera que al ser ejecutado el fichero por un usuario este se ejecuta con los permisos del propietario, pero no del usuario que lo ha... more
Abstrak Dijaman modern seperti sekarang, banyak sekali perusahaan yang memanfaatkan teknologi informasi. Salah satunya adalah PT.Infomedia Nusantara, Server sebagai penyedia layanan pada jaringan komputer memiliki peranan penting... more
ABSTRAK iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS xiv LIST OF APPENDICES xv 1 vi 2.4 Data Layers 2.5 Device Files 2.6 Unused Disk Areas 2.7 Host Protected Area 2.8 The Extended File System 2.9... more
ABSTRAK iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF FIGURES ix LIST OF ABBREVIATIONS xiv LIST OF APPENDICES xv 1 vi 2.4 Data Layers 2.5 Device Files 2.6 Unused Disk Areas 2.7 Host Protected Area 2.8 The Extended File System 2.9... more
The number of internet users academics Faculty of Science and Mathematics University of Diponegoro via wireless is increasing, therefore it is necessary to Hotspot Billing can help network administrators to manage. Hotspot Billing is... more
The purpose of the Workshop on Creating Cloud Storage using OwnCloud X on Ubuntu Server is to increase insight and knowledge to participants who come from students of SMK Multi Karya Medan.Ubuntu Server and Cloud Computing is a discussion... more
There are several devices in a communication network: switches, routers, firewalls and servers; the latter ensuring the operation of network services. These services are installed by network administrators, using a large number of tools... more
En una red coexisten diversos dispositivos de comunicacion tales como switch (conmutadores), routers (enrutadores), firewall y los servidores; estos ultimos garantizan el funcionamiento de los servicios de una red que son instalados por... more
Snapshot makes a copy of current working system. Creating a snapshot with some processing and overheads is important to provide the reliable data service during backup. There are two types of snapshot techniques: volume-based approach and... more
el año 2011 trabajando para definir y mejorar un Proceso Unificado de Recuperación de Información (PURI)[1]. Éste trabajo inicial se extendió para adaptarlo y aplicarlo tanto a Smart-phones como a Sistemas Distribuidos. Durante el... more
La proliferacion de entornos distribuidos en la informatica ha generado un cambio de paradigma que influye practicamente en todas las actividades asociadas, incluso la informatica forense. El Grupo de Investigacion de Sistemas Operativos... more
Abstrak Dijaman modern seperti sekarang, banyak sekali perusahaan yang memanfaatkan teknologi informasi. Salah satunya adalah PT.Infomedia Nusantara, Server sebagai penyedia layanan pada jaringan komputer memiliki peranan penting... more
Cloud computing has emerged as a popular paradigm and an attractive model for providing a reliable distributed computing model.it is increasing attracting huge attention both in academic research and industrial initiatives. Cloud... more
Through this article which concerns the implementation of the Moodle e-learning platform in a server, we will first present an example of a Web server architecture, then we propose the adopted architecture which is based on Linux... more
Perkembangan teknologi yang Semakin hari semakin meningkat, kita di tuntut untuk meningkatkan system keamanan jaringan yang kita miliki, karena semakin mudahnya  orang bisa mengetahui tentang hacking dan cracking dan juga didukung oleh... more
Modern cloud services have complex architectures, often comprising many software components, and depend on hundreds of configurations parameters to function correctly, securely, and with high performance. Due to the prevalence of... more
En l'ambit bioinformatic, l'experimentacio es realitza a traves de sequencies d'execucions d'aplicacions, cada aplicacio utilitza com a arxiu d'entrada el generat per l'aplicacio anterior. Aquest proces... more
Penelitian ini bertujuan mengembangkan jaringan wireless pada area hotspot yang masih mempergunakan Wi-Fi Protected Access 2-Pre-Shared Key (WPA2-PSK) akan dikembangkan menjadi berbasis Remote Access Dial In User Service (RADIUS) sebagai... more
Snapshot makes a copy of current working system. Creating a snapshot with some processing andoverheads is important to provide the reliable data service during backup. There are two types of snapshottechniques: volume-based approach and... more
This paper provides evidence of a feature of Hard-Disk Drives (HDDs), that we call File System Genome. Such a feature is originated by the areas where (on the HDD) the file blocks are placed by the operating system during the installation... more
In this study, problems arise due to the use of WPA2-based user authentication. Constraints faced in using WPA2 are difficult to distinguish between users of wireless network services that are permitted and not permitted. The purpose of... more
Penelitian ini bertujuan mengembangkan jaringan wireless pada area hotspot yang masih mempergunakan Wi-Fi Protected Access 2-Pre-Shared Key (WPA2-PSK) akan dikembangkan menjadi berbasis Remote Access Dial In User Service (RADIUS) sebagai... more
Resumen. Con independencia del nombre que se le dé —informática como utility, informática autogestionable o informática autónoma—, la automatización será una de las constantes en cualquier gran estrategia TIC que se pretenda abordar en un... more
The growth of networking services has led to an increase of users using these services. Because of the limitation of network infrastructure, each physical server is typically used for deploying a networking service for a group of users.... more
The growth of networking services has led to an increase of users using these services. Because of the limitation of network infrastructure, each physical server is typically used for deploying a networking service for a group of users.... more
Original scientific paper This paper presents a performance evaluation of LVM (Logical Volume Manager) system under the Linux operating system. The presented work includes proposal of the mathematical modeling of file system access time... more
The growth of networking services has led to an increase of users using these services. Because of the limitation of network infrastructure, each physical server is typically used for deploying a networking service for a group of users.... more
Com o desenvolvimento de novas tecnologias e padrões, surgiram melhorias no que diz respeito à segurança de Redes. Este trabalho tem como proposta a análise e pesquisa da autenticação de usuários, com base em Servidores RADIUS, ainda na... more
BAB I PENDAHULUAN 2 dan melalui call center XL. XL juga menyediakan leased line dan pelayanan korporat yang termasuk Internet Service Provider (ISP) dan pelayanan Voice over Internet Protocol (VoIP). 1.1.2 Visi dan Misi Perusahaan Visi XL... more
The growth of networking services has led to an increase of users using these services. Because of the limitation of network infrastructure, each physical server is typically used for deploying a networking service for a group of users.... more
Banyaknya penggunaan hotspot mengakibatkan adanya masalah-masalah yang terjadi pada jaringan. Antara lain tidak ada monitoring. Solusinya antara lain dengan menggunakan system hotspot RADIUS. Instalasi dengan menggunakan server khusus... more
Dengan ini saya menyatakan bahwa skripsi ini adalah karya ilmiah saya sendiri, bukan plagiat dari karya ilmiah yang ditulis oleh orang lain atau lembaga lain, dan semua karya ilmiah orang lain atau lembaga lain yang dirujuk dalam skripsi... more
Los sistemas GNU/Linux han llegado a un grado de madurez importante, que los hacen válidos para integrarlos en cualquier ambiente de trabajo, ya sea desde el escritorio del PC personal, hasta el servidor de una gran empresa. El objetivo... more
Abstrak—Sistem absensi kehadiran dan jaringan internet merupakan dua hal yang berkaitan dengan teknologi yang umumnya pasti dibutuhkan pada tiap perusahan ataupun instansi. Umumnya pegawai setiap datang dan pulang diharuskan untuk... more
Data dan informasi yang dikirim dan diterima semakin banyak seiiring dengan semakin berkembangnya perangkat telekomunikasi. Data dan informasi tersebut harus dapat diakses dari mana saja dan kapan saja dan membutuhkan kapasitas media... more
Abstrak—Sistem absensi kehadiran dan jaringan internet merupakan dua hal yang berkaitan dengan teknologi yang umumnya pasti dibutuhkan pada tiap perusahan ataupun instansi. Umumnya pegawai setiap datang dan pulang diharuskan untuk... more
Technological developments have a positive effect on agencies and companies, one of which is the innovation of employee attendance registration using the internet network media. Employee attendance system model using internet network will... more
Penelitian dilakukan di STMIK Dumai dimana permasalahan yang dijadikan dasar dalam penulisan ini adalah Proses Penyimpanan dengan Cloud Storage Pada Jaringan Lokal Agar Perpindahan File Dapat Di Lakukan Tanpa  Media Penyimpanan Eksternal... more
Parallel I/O is a research area with growing importance in the world of High Performance Computing (HPC). For many years parallel I/O has been considered super computers "bottleneck" and this problem has increased, with the advent of... more
The network administrator is a person who is responsible for managing computer networks. One of the duties of a network administrator is network monitoring because errors on the server and services running on the server cannot be known... more
Laporan Praktikum ini diperuntukan untuk siswa - siswi SMK Jurusan Tehnik Komputer dan Jaringan Kelas 12.
Teknologi surat elektronik (e-mail) sudah menjadi suatu kebutuhan yang tidak bisa dipisahkan lagi bagi pengguna internet baik dalam ruang lingkup industri, pendidikan maupun instansi lainya. Untuk menjalankan surat elektronik dibutuhkan... more
A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a... more
Questo technical report costituisce una guida per la creazione e manutenzione della catena modellistica CHIMBO-2020 sviluppata da ISAC a partire dal 2017. Le corse operative attualmente attive e generate quotidianamente con la attuale... more
Download research papers for free!