Article Preview
Top1. Introduction
Now increasing the complex business, applications, clients, users, resources over a multiple business domain of the multiple locations of business, computer & communications system by IT industries has increased the uncertainty, un-order and th risk of theft to proprietary information. The real time operating system control & audit is a primary method of protecting system resources (Processor, Memory & Encryption Key, File & Shell). The preventive system control is probably the most important aspect of communications network security and becoming increasingly important as basic building block for information system security. The control is inversely proportional to the risk & mean while control is directly proportional to the quality of standard. The preventive control provides accountability for individuals who are accessing sensitive information on application, system software, server and network. We have to develop the algebraic system model for risk mitigation on large scale unix operating system (MIMD) (Kai, 2008) based on available technology, business & resources. We have to prevent our data and service from business, technology & resources over a complex operating system (Stalling, 2006; Shon 2002).
The real time operating system (central server) is a large scale has even greater processing, responsibilities and high powers for the multiple business and multiple products & clients like web based and mobile computing. It is just like a traffic management system, it makes sure that different tools, application, programs and software packages, the users and clients running at the same time do not interfere with each other (see Figure 1) (Kai, 2008; Tanenbaum, 2010).
Figure 1. Business, resource and technology preventing data and info
The multi programming, time shearing, parallel programming is solving our objective in right time and right way over a multiple Relation, Function, Operation & Services on heterogeneous complex infrastructure. The complex operating system is also responsible for risk and security ensuring that unauthorized users do not access the system. The all major computer platforms (hardware and software) require and sometimes include an operating system. HP_UX, Sun solaria, AIX, LINUX, WINDOW, NT, WIN2000, VME, OS/400, Z/OS all examples of large scale (MIMD) operating systems (Kai. 2008).
The Internal Structure of the Operating system can be seen in Figure 2 (O’ Reilly, 1995; Sumitabh 2009; Sun Microsystems 2002).
Figure 2. Internal architecture of RTOS preventing data