Multics

In: Computers and Technology

Submitted By dr03
Words 1053
Pages 5
Multics ("Multiplexed Information and Computing Service") was an influential early time-sharing operating system. The project was started in 1964 in Cambridge, Massachusetts. The last known running Multics installation was shut down on October 30, 2000, at the Canadian Department of National Defence in Halifax, Nova Scotia, Canada.
Initial planning and development for Multics started in 1964. Originally it was a cooperative project led by MIT (Project MAC withFernando Corbató) along with General Electric and Bell Labs. Bell Labs pulled out in 1969, and in 1970 GE's computer business including Multics was taken over by Honeywell.
Multics was conceived as a commercial product for GE, and became one for Honeywell, but not a very successful one. Due to its many novel and valuable ideas, Multics had a significant impact in the computer field even though it was derided by some critics at the time.[5]
Multics had numerous features intended to result in high availability so that it would support a computing utility similar to the telephone and electricity services. Modular hardware structure and software architecture were used to achieve this. The system could grow in size by simply adding more of the appropriate resource—computing power, main memory, disk storage, etc. Separate access control lists on every file provided flexible information sharing, but complete privacy when needed. Multics had a number of standard mechanisms to allow engineers to analyze the performance of the system, as well as a number of adaptive performance optimization mechanisms.
Multics implemented a single level store for data access, discarding the clear distinction between files (called segments in Multics) and process memory. The memory of a process consisted solely of segments which were mapped into its address space. To read or write to them, the process simply used normal CPU…...

Similar Documents

The History of Unix

...would soon be able to time-share by switching back and forth between multiple users quickly. Fernando Corbato at the Massachusetts Institute of Technology (MIT) Computation Center led a team that created one of the first multi-user operating systems called the Compatible Time-Sharing System (CTSS) which was highly influential to the development of UNIX. (Diaz, Christopher, © 2007 ) In the 1960’s, AT&T Bell Labs, General Electric, and MIT conducted a joint research effort to build a next generation multi-user operating system called the Multiplexed Information and Computing System (MULTICS). The Bell Labs staff involved with MULTICS, including Ken Thompson, Dennis Ritchie, Joe Ossanna, and M. D. McIlroy, saw great potential in a communal environment enabled by a multi-user computer system, and they started looking for a way to preserve capability. In 1969, Thompson wrote a game on MULTICS called Space Travel that allowed users to pilot a spaceship around a simulation of the solar system and land on the planets and moons. Later that year, when it became too expensive to maintain the GE-645 computer that they were using, Bell Labs pulled out of the project. Since Bell Labs pulled out, the access to the computer that had Space Travel on it, wound down. Ken Thompson translated the game into FORTRAN on the GECOS operating system on a GE-635 computer. However, the display movement was jerky, and access to the GECOS cost $75 an hour. This led Thompson to find a little-used......

Words: 1468 - Pages: 6

Compare and Contrast the Windows 7 and Ubuntu (Linux) Operating Sysytem

...2007 to the general public January 30, 2007. 2009 Microsoft releases Windows 7 October 22, 2009. 2012 Microsoft releases Windows 8 October 26, 2012. Year Event 1957 Bell Labs found they needed an operating system for their computer center that at the time was running various batch jobs. The BESYS operating system was created at Bell Labs to deal with these needs. 1965 Bell Labs was adopting third generation computer equipment and decided to join forces with General Electric and MIT to create Multics (Multiplexed Information and Computing Service). 1969 By April 1969, AT&T made a decision to withdraw Multics and go with GECOS. When Multics was withdrawn Ken Thompson and Dennis Ritchie needed to rewrite an operating system in order to play space travel on another smaller machine (a DEC PDP-7 [Programmed Data Processor 4K memory for user programs). The result was a system that a punning colleague called UNICS (UNiplexed Information and Computing Service)--an 'emasculated Multics'. 1969 Summer 1969 Unix was developed. 1969 Linus Torvalds is born. 1971 First edition of Unix released 11/03/1971. The first edition of the "Unix PROGRAMMER'S MANUAL [by] K. Thompson [and] D. M. Ritchie." It includes over 60 commands like: b (compile B program); boot (reboot system); cat (concatenate files); chdir (change working directory); chmod (change access mode); chown (change owner); cp (copy file); ls (list directory contents); mv (move or rename file); roff (run off text); wc......

Words: 1502 - Pages: 7

An Introduction to the Computer Security Problem

...project during the late 1960s and early 1970s to develop the Multiplexed Information and Computing Service (Multics). This time-sharing system incorporated hardware and operating system software “designed with security in mind” and was widely touted as the most secure operating system of its time. An Air Force tiger team was evaluating Multics [KARG74] as a candidate for use in a Pentagon application where the computer itself would be required to protect sensitive information from authorized system users who were not “cleared” to see all the information in the computer. Only the Multics operating system would stand between classified information and users without the clearances to see it. In examining the Multics operating system programs, the tiger team found one place where an ordinary user program could branch to any location in a supervisory (executive mode) program. Such instances were forbidden by the Multics design concepts, but the implementation had made this program directly accessible for reasons of efficiency. The tiger team examined the program listings and found two instructions that would store a word at any location they specified, then return to their program. The privileges of the supervisory program were such that the store instruction could operate even on the programs or data used by the operating system itself. The tiger team also found a place where Multics first checked a user’s authorization for access to a file and, when the request proved valid,......

Words: 13185 - Pages: 53

Cloud Computing

...and risk complicating our assessment of security issues due to out-of-date mental models. These historical approaches also offer us starting points to consider for current cloud security research, as we then develop in Section 5. 4.1 Multics Multics introduced the “computing utility” concept as early as 1965 [17], in the same sense that cloud computing has taken off as providing today’s computing utilities. Security considerations permeated all aspects of Multics design [33], and its security mechanisms influenced those of subsequent systems. Consequently, Multics was the first system to receive a Class B2 certification per the Orange Book [39]. A striking aspect of Multics was its security design principles [33], which deserve re-emphasis today. First, Multics used permissionbased protection mechanisms, rather than exclusion-based. Every access to every object checked current authority. Second, Multics embodied a form of Kerckhoffs’ principle, maintaining open design for its mechanisms, with only the protection keys secret. Third, the system always operated at least privilege. Finally, the design explicitly recognized the importance of human usability—especially relevant today with the proliferation of social engineering attacks. Multics security design also framed the importance of preventing system administrators from becoming decision bottlenecks. Otherwise, users will bypass administrators by habit (in modern terminology, a form of “satisficing”) and compromise......

Words: 5878 - Pages: 24

Chapter 1-Introduction to Information Security: Principles of Information Security

...in the project. 14. How does the practice of information security qualify as both an art and a science? How does security as a social science influence its practice? Art because there are no hard and fast rules especially with users and policy. Security as a social science influences its practice because the software is developed by computer scientists and engineers. Faults are a precise interaction of hardware and software that can be fixed given enough time. 15. Who is ultimately responsible for the security of information in the organization? The Chief Information Security Officer (CISO) 16. What is the relationship between the MULTICS project and early development of computer society? It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX, which did not require the same level of security. 17. Who has computer security evolved into modern information security? In the early days before ARPANET machines were only physically secured. After ARPANET it was realized that this was just one component. 18. What was important about Rand Report R-609? RR609 was the first widely recognized published document to identify the role of management and policy issues in computer security. 19. Who decides how and when data in an organization will be used and or controlled? Who is responsible for seeing these wishes are carried out? Control...

Words: 965 - Pages: 4

Internet Security

...implemented or codes are not changed when an employee is released. Initial security measures. The roots of internet security can be traced back to the 1960’s where numerous companies partnered together to develop a system with the Department of Defense. The system was called Multics (Multiplexed Information and Computing Service) and it primary purpose was to allow computer access 24 hours a day, 365 days a year for the U.S. government. “Multics was designed to be a modular systems built from banks of high-speed processors, memory, and communications equipment (Garfinkel, Spafford, & Schwartz, 2003). The system was originally intended for military use, to block attacks from an external source and to store classified and unclassified material on one computer system. It was also designed to allow only a user access to the material for which they were cleared to view. If a person only had access to secret material, they could not view top secret material and above. In 1969, the Multics project was well behind schedule and AT&T dropped out of the program and pursued another approach to the network system, UNIX. UNIX was named as a pun for Multics and differed in the way it processed information. Where Multics preform numerous functions, UNIX did one; run programs and strong security was not a main concern. Analysis Invention. “The first recorded description of the social interactions that could be enabled through networking was a series of memos written by......

Words: 1424 - Pages: 6

Hacking

...technology that hackers get ideas for the next generation. No thanks, intellectual homeowners may say, we don't need any outside help. But they're wrong. The next generation of computer technology has often—perhaps more often than not—been developed by outsiders.In 1977 there was no doubt some group within IBM developing what they expected to be the next generation of business computer. They were mistaken. The next generation of business computer was being developed on entirely different lines by two long-haired guys called Steve in a garage in Los Altos. At about the same time, the powers that be were cooperating to develop the official next generation operating system, Multics. But two guys who thought Multics excessively complex went off and wrote their own. They gave it a name that was a joking reference to Multics: Unix. The latest intellectual property laws impose unprecedented restrictions on the sort of poking around that leads to new ideas. In the past, a competitor might use patents to prevent you from selling a copy of something they made, but they couldn't prevent you from taking one apart to see how it worked. The latest laws make this a crime. How are we to develop new technology if we can't study current technology to figure out how to improve it? Ironically, hackers have brought this on themselves. Computers are responsible for the problem. The control systems inside machines used to be physical: gears and levers and cams. Increasingly, the brains (and thus......

Words: 931 - Pages: 4

Principles of Information Security Ch. 1 Questions

... 10. Which paper is the foundation of all subsequent studies of computer security? 11. Why is the top-down approach to information security superior to the bottom-up approach? 12. Why is a methodology important in the implementation of information security? How does a methodology improve the process? 13. Which members of an organization are involved in the security system development life cycle? Who leads the process? 14. How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice? 15. Who is ultimately responsible for the security of information in the organization? 16. What is the relationship between the MULTICS project and the early development of computer security? 17. How has computer security evolved into modem information security? 18. What was important about Rand Report R-609? 19. Who decides how and when data is an organization will be used or controlled? Who is responsible for seeing that these wishes are carried out? 20. Who should lead a security team? Should the approach to security be more managerial or technical?...

Words: 326 - Pages: 2

Cp3303

...purpose Possession: Ownership 7. Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study? Software, Hardware, Data, People, Procedures, Feedback 8. What system is the father of almost all modern multiuser systems? MULTICS 9. Why is the top-down approach to information security superior to the bottom-up approach? Bottom up lacks a number of critical features such as participant support and organizational staying power, whereas top down has strong upper management support, dedicated funding, clear planning and the opportunity to influence organizations culture. 10. Which members of an organization are involved in the security system development life cycle? Who leads the process? Security professionals are involved in the SDLC. Senior management, security project team and data owners are leads in the project. 11. What is the relationship between the MULTICS project and early development of computer society? It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security. 12. How has computer security evolved into modern information security? In the early days before ARPANET machines were only physically secured. After ARPANET it was realized that this was just one component. 13. Who decides......

Words: 560 - Pages: 3

Chapter 1 Review Questions

...Management and security project team are the leaders in the project. 14. How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice? A. Art because you have to create it and be creative so it is hard to break and science because it requires software which is developed by computer science engineers. 15. Who is ultimately responsible for the security of information in the organization? A. The ultimately responsible for the security of information in the organization is the chief information security officer (CISO). 16. What is the relationship between the MULTICS project and the early development of computer security? A. It was the first and opening system created with security as is main goal. After the reconstruction of MULTICS, many engineers started to work on UNIX which did not require the same level of security. 17. How has computer security evolved into modern information security? A. In the early days before ARPANET machines were only physically secured. After ARPANET it was realized that this was just one component. 18. What was important about Rand Report R-609? A. It was important because it was first widely recognized document to identify the role of management and policy issues in computer security. 19. Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing what these wishes are carried......

Words: 855 - Pages: 4

Principles of Information Security 4th Ed Chapter 1 Review Questions

...are leads in the project. 14. How can the practice of information security be described as both an art and a science? How does security as a social science influence its practice? Information security is an art because there are no hard and fast rules especially with users and policy. It is also a science because the software is developed by computer scientists and engineers. Faults are a precise interaction of hardware and software that can be fixed given enough time. 15. Who is ultimately responsible for the security of information in the organization? The Chief Information Security Officer (CISO) 16. What is the relationship between the MULTICS project and the early development of computer security? It was the first and operating system created with security as its primary goal. Shortly after the restructuring of MULTICS, several key engineers started working on UNIX which did not require the same level of security. 17. How has computer security evolved into modern information security? In the early days before ARPANET machines were only physically secured. After ARPANET it was realized that this was just one component. 18. What was important about Rand Report R-609? R-609 was the first widely recognized published document to identify the role of management and policy issues in computer security. 19. Who decides how and when data in an organization will be used or controlled? Who is responsible for seeing that these wishes are carried......

Words: 801 - Pages: 4

Unix

...version of Multics which saw its inception August 15, 1979. The original creator was Richard Stallman, the software is a video-oriented text preparation and editing system it ran on Honeywell’s Multics system it was widely accepted at MIT and had a large user community. This acceptance led to the development of protocols for the ARPANET (Advanced Research Projects Agency Network) which is now known more commonly as the Internet. It was designed for the use of video-oriented software in a device independent fashion. ( Greenberg,1996) Emacs was later rewritten on a C platform by James Goslin in 1982. Which he then sold to Unipress and it was renamed Unipress Emacs. One of the major advantages of using Emacs would be the speed of the software. It has the ability to open large files edit them and save in the time it takes to load some programs in windows. The other editor I spoke of earlier would be Vi. The Vi editor was created in 1976 by Bill Joy at the University of California at Berkeley. Bill Joy later worked at Sun Microsystems as the Chief Scientist. Vi is not a GUI (graphic user interface) mode text editor, although it still remains popular. It holds the ability to run on many different formats from windows to MacOs.(NA,2005) It would be my recommendation to use the Vi editor as it is more user friendly and has the ability to run on different platforms, making it much more compatible with a user’s needs. Bibliography Greenberg, B. S. (1996). Multics Emacs: The...

Words: 368 - Pages: 2

Operating Systems

... or maybe not. Where did this so called UNIX come from? What exactly is an operating system you ask and what is it comprised of? Read on to find out more. Birth of a New Creation: UNIX is the creation and brain child of Bell Laboratory researchers Dennis Ritchie and Ken Thompson. Ken Thompson was working with Space Travel. Space Travel was a program that simulated the motion of the planets in our solar system. The Space Travel program was under the operating system called Multics (Multics is one of the first operating systems that provided a multiuser environment, and ran on a General Electric 6000 Electric Computer) (Afzal, 2008). Multics was a slow and very large and required a substantial amount of computer resources. Ken Thompson found a small little PDP-7 computer (created by the Digital Equipment Corporation) and transferred the Space Travel program on to it. On this computer is in which Ken Thompson created the new operating system that he deemed to be UNIX. Ken Thompson adapted Multics advanced concepts to the operating system. UNIX took advantage of the other operating systems by incorporating some of all of the other operating systems into its own, and combining some or the most of the desirable aspects from each of them. In 1970 Ken Thompson then transferred the UNIX operating system onto a PDP- 11/20, then to a PDP- 11/40, the PDP- 11/45, and then to a PDP- 11/70. Each of these were an upgrade from the last that added features of complexity to the......

Words: 1257 - Pages: 6

Evolution of Unix

...computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and MULTICS was not ready to use, it was clear that there was a lot more work to do, Bell Labs felt they had no choice than to opt out in 1969 (Ward 2009). Even though Bell Labs withdrew from the MULTICS project, two programmers from Bell Labs, Ken Thompson and Dennis Ritchie, decided to continue working to develop a usable operating system (Peek 2002). They saw great value in the communal environment enabled by a multi-user computer system and started looking for a way to preserve its capability. While working on the MULTICS project, Thompson wrote a game called Space Travel which simulated the motion of the planets in the solar system and allowed a player to cruise around the planets and......

Words: 1891 - Pages: 8

Evolution of Unix

...computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed and MULTICS was not ready to use, it was clear that there was a lot more work to do, Bell Labs felt they had no choice than to opt out in 1969 (Ward 2009). Even though Bell Labs withdrew from the MULTICS project, two programmers from Bell Labs, Ken Thompson and Dennis Ritchie, decided to continue working to develop a usable operating system (Peek 2002). They saw great value in the communal environment enabled by a multi-user computer system and started looking for a way to preserve its capability. While working on the MULTICS project, Thompson wrote a game called Space Travel which simulated the motion of the planets in the solar system and allowed a player to cruise around the planets and......

Words: 1891 - Pages: 8