SlideShare a Scribd company logo
1 of 6
OPERATING SYSTEMS
BSc it semester 2
Name:Muhama Mark
BT0070
1210000081
Explain single Partition Allocation and Multiple Partition Allocation.
Partition is the division of physical memory into fixed sized regions and this allows address
space to be distinct.
Single partition allocation
The operating system always resides in the lower memory and user process execute in the
higher memory. Here limit and relocation register are used to protect user processes from each
other and from changing operating system code and data.The relocation register contains value
of the smallest physical address that can be accessed and the limit register contains a range of
logical addresses where by each logical address must be less than the limit register. This is the
simplest form of memory management. This type of memory management is used by hardware
diagnostics, by system boot code, real time / dedicated systems for easy management of their
memory.
Multiple partition allocation
In multiple partition allocation we deal with many processes and this leads to multi
programming. Multiprogramming requires that there are many processes residing in memory so
that the CPU can switch between processes. Here the user memory has to be divided into several
partitions. Each partition is dedicated to one process and here number of processes that can run is
equal to the number of partitions. A process from the ready queue comes in and loaded into one
of the partitions for execution and after the execution the memory is released for another process
to utilize it. This type of allocation has a disadvantage that partitions are of fixed sizes and if a
size is too small then large programs cannot be run and also when the memory is too big for the
data then main memory space in each partition goes wasted.
2. What is PCB? What useful information is available in PCB?
PCB refers to process control block and this contains information associated with every process
in the system such as state of the process. A process is a program in execution. The information
contained in the PCB makes a process an active process.
There’s useful information available in the PCB and this includes the following
Program counter. This is the memory where the address of the next instruction to be executed
is held.
Input and output status information.
In this information we have a list of input output devices that are allocated for that process or I/O
devices that the process is using for its execution.
Process state.
This shows the state in which the process is currently in and we have process
states like ready state, waiting state is one state where the process is waiting for an input / output
event to occur, running indicates that the process is in the central processing unit and being
worked upon, new implying that the process has just been created and halted which indicates
completion of a process or termination of a process
Accounting information
Real time and amount of CPU used,time limits,and process number are some of the information
kept in the PCB.
CPU registers
These registers may differ in number and type. We have registers such as accumulators for
storing processed data, indexing register, general purpose registers and stack pointers.
Memory management information
Information such as the base and limit registers, page tables is what is included in the memory
management information.
CPU scheduling information.
This information includes a process priority indicate the priority of the process whether it is of
high priority or low priority, pointer pointing at which process and other scheduling parameters
3. Explain Preemptive and Non-preemptive scheduling approaches.
Preemptive scheduling;Processes are usually prioritized. Sometimes it necessary to run a given
process that has higher priority before another process although it is running. In this scenario the
running processes that has lower priority is running but gets interrupted and stopped for some
time because a higher priority process has come in and needs to be executed, it is later resumed
when the priority process has finished its execution.
This is called preemptive scheduling and example is the Round Robin that uses time slice
between processes. Windows operating system is a preemptive operating system.
Non-preemptive scheduling; in non-preemptive scheduling, a process is executed till
completion. It cannot be interrupted although a process of higher priority comes in. an example
is first come first served that uses first in first out. Linux uses this to carry out its tasks
4. Explain process state with diagram.
A process is a program in execution or a program running in the computer system. There
are basically five states of a process namely new, ready, terminated, running and waiting.In a
multitaskingcomputer system, processes may occupy a variety of states
The diagram below represents the process state of a process in the computer system.
Process state diagram
Admitted Exit
Interrupt
Dispatch
Input/output or event completion Input/output or event waits
Explanation of the five states of a process starting with
New state
It’s basically the first step of a program turning into a process. This is when the process is being
created or when a computer user clicks on a program so as it runs hence creating a new process.
Ready state. A "ready" or "waiting" process has been loaded into main memory and is awaiting
execution on a CPU (to be context switched onto the CPU by the dispatcher, or short-term
scheduler). There may be many "ready" processes at any one point of the system's execution,
Terminated
Waiting
RunningReady
New
for example, in a one-processor system, only one process can be executing at any one time, and
all other "concurrently executing" processes will be waiting for execution.
Running state
A process moves into the running state when it is chosen for execution. The process's
instructions are executed by one of the CPUs (or cores) of the system. There is at most one
running process per CPU or core.
Waiting state
In the waiting state, the process has not yet visited the CPU but it is already created and waiting
for the CPU or it has been worked by the CPU for some time but waiting for data from
input/output device. More so if the operating system is preemptive. Priority processes will
always make lower priority process to go into waiting state as higher priority processes are
worked on.
Termination state
This is the final process state in the process. A process may be terminated, either from the
"running" state by completing its execution or by explicitly being killed. In either of these cases,
the process moves to the "terminated" state. If a process is not removed from memory after
entering this state, it may become a Zombie process.
5. Explain all the four functions of network operating system.
An operating system is an interface between the computer user and the machine. It’s
system software that enables application software to coordinate with the hardware of a computer
so as to complete a task.
A network operating system is a computer operating system basically designed to support
workstation, personal computers that are connected on the local area network. Examples are
Novell’s NetWare, Windows NT, and Microsoft windows server
The functions of a network operating system are as follows.
Communication management
This is one of the functions of a network operating system. This communication
management software is in built into the network as part of it, so it’s in both the clients and
server. The software is also made up of modules corresponding to the OSI layers.
It’s responsible for communication management and sees that massages are transmitted error free
from source to destination.
File/printer services. A network operating system is multitasking a way that request s for
shared resources are queued up, scheduled and then run as separate tasks. The software that
controls file and printer services is run only on the server.
Redirection software. This software resides on both server and client. And it does its work in
the following way; an interrupt is executed by a system call generated from an Input /Output.
during the time of execution of the interrupt, the software comes between to check if the I/O is
local or remote. If it’s local, it continues to process but if remote, the software has to generate a
request to the server but conversion is required if the operating system running on the server may
be different from the local machine that generated the request.
Network management software. This is responsible for monitoring the network and all its
devices like computers modems lines repeaters multiplexers. The network management software
resides at the top of the existing operating system in ordinary operating system but in the
network operating system environment it is part of the network operating system. The software
monitors the entire network and maintains a list of hardware equipment along with its location
and status. This list is updated whenever there is an addition of a device on the network or when
equipment is down for repair. Another important part that it plays is helping routing algorithms
to route data on appropriate paths
6. Explain any five types of attacks on security.
Security is an important aspect of any operating system. This keeps the code and data secure in a
computer system. The open systems interconnection defines the elements of security in terms of
integrity, availability and confidentiality. The following are the types of attacks on security hat
do cause harm.
Invalid parameters. Passing of invalid parameters of failure to validate them properly can lead
to serious security violations
Dos (denial of services).Here users are denied services by possibly a hacker trying to access
some information from the server. Here a hacker sends several packets from his machine to his
victim mainly the server or DNS. This is called flooding of packets such as ARP flooding,Ping
flooding, TCP SYN flooding
Virus.This is a threat to a computer and causes the computer to malfunction. A virus is a
program that reproduces by introducing a copy of it in other programs. A virus corrupts code as
well as data. Examples are memory resident infectors, general purpose infectors, file specific
infectors, boot sector infectors.
Trojan horse. This is a program that looks like it is genuine yet it is not genuine at all and
normally waits to be activate or clicked upon and can crush your system ,open a back door en
your data is stolen. This is an example of a rogue software.
Worm. A worm is a program that creates copies of itself on other machines on the network.
Worms do not need to be activated so as to multiply they do it by themselves. Worms do
consume network resources to a very large extent and can easily bring the network to a halt. A
computer worm is a complete program by itself not as the case with a virus.
Ddos(distributed denial of services).This is similar to denial of services but here lots of packets
are sent from many nodes or hosts to a specific victim host on the network.
Sniffing.This is tracking or listening to an encrypted data over the network most especially
wireless networks. This a security attacks because one can acquire the data and use it wrongly.
Line tapping. Here a communication line is tapped and confidential data is easily accessed and
can be modified. This data can easily be used to blackmail the company or the owner of the data.
This is a mechanism mostly used by government agencies for intercepting phone calls of
suspicion people in the country.

More Related Content

What's hot

Operating System-Concepts of Process
Operating System-Concepts of ProcessOperating System-Concepts of Process
Operating System-Concepts of ProcessShipra Swati
 
Process concept
Process conceptProcess concept
Process conceptjangezkhan
 
Unix Process management
Unix Process managementUnix Process management
Unix Process managementWave Digitech
 
CSI-503 - 2. Processor Management
CSI-503 - 2. Processor ManagementCSI-503 - 2. Processor Management
CSI-503 - 2. Processor Managementghayour abbas
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture NotesFellowBuddy.com
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...vtunotesbysree
 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paperAnkit Bhatnagar
 
CHAPTER READING TASK OPERATING SYSTEM
CHAPTER READING TASK OPERATING SYSTEMCHAPTER READING TASK OPERATING SYSTEM
CHAPTER READING TASK OPERATING SYSTEMNur Atiqah Mohd Rosli
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
operating system question bank
operating system question bankoperating system question bank
operating system question bankrajatdeep kaur
 
Operating system interview question
Operating system interview questionOperating system interview question
Operating system interview questionsriram saravanan
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)Sohaib Danish
 

What's hot (18)

Process management
Process managementProcess management
Process management
 
Operating System-Concepts of Process
Operating System-Concepts of ProcessOperating System-Concepts of Process
Operating System-Concepts of Process
 
Process concept
Process conceptProcess concept
Process concept
 
Complete Operating System notes
Complete Operating System notesComplete Operating System notes
Complete Operating System notes
 
Unix Process management
Unix Process managementUnix Process management
Unix Process management
 
Operating System
Operating SystemOperating System
Operating System
 
operating system lecture notes
operating system lecture notesoperating system lecture notes
operating system lecture notes
 
Os Question Bank
Os Question BankOs Question Bank
Os Question Bank
 
CSI-503 - 2. Processor Management
CSI-503 - 2. Processor ManagementCSI-503 - 2. Processor Management
CSI-503 - 2. Processor Management
 
Operating System Lecture Notes
Operating System Lecture NotesOperating System Lecture Notes
Operating System Lecture Notes
 
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
SOLUTION MANUAL OF OPERATING SYSTEM CONCEPTS BY ABRAHAM SILBERSCHATZ, PETER B...
 
Os solved question paper
Os solved question paperOs solved question paper
Os solved question paper
 
CHAPTER READING TASK OPERATING SYSTEM
CHAPTER READING TASK OPERATING SYSTEMCHAPTER READING TASK OPERATING SYSTEM
CHAPTER READING TASK OPERATING SYSTEM
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
operating system question bank
operating system question bankoperating system question bank
operating system question bank
 
Firo
FiroFiro
Firo
 
Operating system interview question
Operating system interview questionOperating system interview question
Operating system interview question
 
Operating system concepts (notes)
Operating system concepts (notes)Operating system concepts (notes)
Operating system concepts (notes)
 

Viewers also liked

Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2Aura Palermo
 
iPad Settings Project
iPad Settings ProjectiPad Settings Project
iPad Settings Projectvinsonlp
 
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi ImportacionesGaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi ImportacionesAura Palermo
 
ZenPM Big Data Analytics for Telecoms
ZenPM Big Data Analytics for TelecomsZenPM Big Data Analytics for Telecoms
ZenPM Big Data Analytics for TelecomsSysMech
 
New features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platformNew features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platformSysMech
 
An introduction to Zen 6 - integrated network and customer experience analytics
An introduction to Zen 6 - integrated network and customer experience analyticsAn introduction to Zen 6 - integrated network and customer experience analytics
An introduction to Zen 6 - integrated network and customer experience analyticsSysMech
 
Technical communication
Technical communicationTechnical communication
Technical communicationMark Muhama
 
Cencoex Estadisticas Liquidaciones ene abril 2014
Cencoex Estadisticas Liquidaciones ene abril 2014Cencoex Estadisticas Liquidaciones ene abril 2014
Cencoex Estadisticas Liquidaciones ene abril 2014Aura Palermo
 
External Sources of Finance
External Sources  of  FinanceExternal Sources  of  Finance
External Sources of Financeayushbhadra
 

Viewers also liked (16)

Udl
UdlUdl
Udl
 
Network
NetworkNetwork
Network
 
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
Gaceta Oficial 40.368 Convenio Cambiario 27 SICAD 2
 
Pp abby
Pp abbyPp abby
Pp abby
 
iPad Settings Project
iPad Settings ProjectiPad Settings Project
iPad Settings Project
 
áLbum de fotografías
áLbum de fotografíasáLbum de fotografías
áLbum de fotografías
 
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi ImportacionesGaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
Gaceta oficial 40259 Modificacion Providencia 108 Cadivi Importaciones
 
Architecture
ArchitectureArchitecture
Architecture
 
ZenPM Big Data Analytics for Telecoms
ZenPM Big Data Analytics for TelecomsZenPM Big Data Analytics for Telecoms
ZenPM Big Data Analytics for Telecoms
 
New features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platformNew features in Zen 5.3 end-to-end network analytics platform
New features in Zen 5.3 end-to-end network analytics platform
 
An introduction to Zen 6 - integrated network and customer experience analytics
An introduction to Zen 6 - integrated network and customer experience analyticsAn introduction to Zen 6 - integrated network and customer experience analytics
An introduction to Zen 6 - integrated network and customer experience analytics
 
Technical communication
Technical communicationTechnical communication
Technical communication
 
¿Por qué?/ porque...
¿Por qué?/ porque...¿Por qué?/ porque...
¿Por qué?/ porque...
 
Cencoex Estadisticas Liquidaciones ene abril 2014
Cencoex Estadisticas Liquidaciones ene abril 2014Cencoex Estadisticas Liquidaciones ene abril 2014
Cencoex Estadisticas Liquidaciones ene abril 2014
 
External Sources of Finance
External Sources  of  FinanceExternal Sources  of  Finance
External Sources of Finance
 
lifestyle diseases
lifestyle diseaseslifestyle diseases
lifestyle diseases
 

Similar to Operating system

Similar to Operating system (20)

Operating Systems Unit Two - Fourth Semester - Engineering
Operating Systems Unit Two - Fourth Semester - EngineeringOperating Systems Unit Two - Fourth Semester - Engineering
Operating Systems Unit Two - Fourth Semester - Engineering
 
OS-Process.pdf
OS-Process.pdfOS-Process.pdf
OS-Process.pdf
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Os
OsOs
Os
 
Os
OsOs
Os
 
UNIT - 3 PPT(Part- 1)_.pdf
UNIT - 3 PPT(Part- 1)_.pdfUNIT - 3 PPT(Part- 1)_.pdf
UNIT - 3 PPT(Part- 1)_.pdf
 
Operating System and related questions
Operating System and related questionsOperating System and related questions
Operating System and related questions
 
Operating system
Operating systemOperating system
Operating system
 
Software concepts
Software concepts Software concepts
Software concepts
 
Ch03- PROCESSES.ppt
Ch03- PROCESSES.pptCh03- PROCESSES.ppt
Ch03- PROCESSES.ppt
 
CSI-503 - 3. Process Scheduling
CSI-503 - 3. Process SchedulingCSI-503 - 3. Process Scheduling
CSI-503 - 3. Process Scheduling
 
Processing management
Processing managementProcessing management
Processing management
 
Process
ProcessProcess
Process
 
PROJECT 3.pptx
PROJECT 3.pptxPROJECT 3.pptx
PROJECT 3.pptx
 
Compyter system softwere
Compyter system softwereCompyter system softwere
Compyter system softwere
 
OPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESOPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTES
 
Operating system Concepts
Operating system Concepts Operating system Concepts
Operating system Concepts
 
OS - Process Concepts
OS - Process ConceptsOS - Process Concepts
OS - Process Concepts
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Chapter two process.pptx
Chapter two process.pptxChapter two process.pptx
Chapter two process.pptx
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Operating system

  • 1. OPERATING SYSTEMS BSc it semester 2 Name:Muhama Mark BT0070 1210000081 Explain single Partition Allocation and Multiple Partition Allocation. Partition is the division of physical memory into fixed sized regions and this allows address space to be distinct. Single partition allocation The operating system always resides in the lower memory and user process execute in the higher memory. Here limit and relocation register are used to protect user processes from each other and from changing operating system code and data.The relocation register contains value of the smallest physical address that can be accessed and the limit register contains a range of logical addresses where by each logical address must be less than the limit register. This is the simplest form of memory management. This type of memory management is used by hardware diagnostics, by system boot code, real time / dedicated systems for easy management of their memory. Multiple partition allocation In multiple partition allocation we deal with many processes and this leads to multi programming. Multiprogramming requires that there are many processes residing in memory so that the CPU can switch between processes. Here the user memory has to be divided into several partitions. Each partition is dedicated to one process and here number of processes that can run is equal to the number of partitions. A process from the ready queue comes in and loaded into one of the partitions for execution and after the execution the memory is released for another process to utilize it. This type of allocation has a disadvantage that partitions are of fixed sizes and if a size is too small then large programs cannot be run and also when the memory is too big for the data then main memory space in each partition goes wasted. 2. What is PCB? What useful information is available in PCB? PCB refers to process control block and this contains information associated with every process in the system such as state of the process. A process is a program in execution. The information contained in the PCB makes a process an active process. There’s useful information available in the PCB and this includes the following Program counter. This is the memory where the address of the next instruction to be executed is held.
  • 2. Input and output status information. In this information we have a list of input output devices that are allocated for that process or I/O devices that the process is using for its execution. Process state. This shows the state in which the process is currently in and we have process states like ready state, waiting state is one state where the process is waiting for an input / output event to occur, running indicates that the process is in the central processing unit and being worked upon, new implying that the process has just been created and halted which indicates completion of a process or termination of a process Accounting information Real time and amount of CPU used,time limits,and process number are some of the information kept in the PCB. CPU registers These registers may differ in number and type. We have registers such as accumulators for storing processed data, indexing register, general purpose registers and stack pointers. Memory management information Information such as the base and limit registers, page tables is what is included in the memory management information. CPU scheduling information. This information includes a process priority indicate the priority of the process whether it is of high priority or low priority, pointer pointing at which process and other scheduling parameters 3. Explain Preemptive and Non-preemptive scheduling approaches. Preemptive scheduling;Processes are usually prioritized. Sometimes it necessary to run a given process that has higher priority before another process although it is running. In this scenario the running processes that has lower priority is running but gets interrupted and stopped for some time because a higher priority process has come in and needs to be executed, it is later resumed when the priority process has finished its execution. This is called preemptive scheduling and example is the Round Robin that uses time slice between processes. Windows operating system is a preemptive operating system.
  • 3. Non-preemptive scheduling; in non-preemptive scheduling, a process is executed till completion. It cannot be interrupted although a process of higher priority comes in. an example is first come first served that uses first in first out. Linux uses this to carry out its tasks 4. Explain process state with diagram. A process is a program in execution or a program running in the computer system. There are basically five states of a process namely new, ready, terminated, running and waiting.In a multitaskingcomputer system, processes may occupy a variety of states The diagram below represents the process state of a process in the computer system. Process state diagram Admitted Exit Interrupt Dispatch Input/output or event completion Input/output or event waits Explanation of the five states of a process starting with New state It’s basically the first step of a program turning into a process. This is when the process is being created or when a computer user clicks on a program so as it runs hence creating a new process. Ready state. A "ready" or "waiting" process has been loaded into main memory and is awaiting execution on a CPU (to be context switched onto the CPU by the dispatcher, or short-term scheduler). There may be many "ready" processes at any one point of the system's execution, Terminated Waiting RunningReady New
  • 4. for example, in a one-processor system, only one process can be executing at any one time, and all other "concurrently executing" processes will be waiting for execution. Running state A process moves into the running state when it is chosen for execution. The process's instructions are executed by one of the CPUs (or cores) of the system. There is at most one running process per CPU or core. Waiting state In the waiting state, the process has not yet visited the CPU but it is already created and waiting for the CPU or it has been worked by the CPU for some time but waiting for data from input/output device. More so if the operating system is preemptive. Priority processes will always make lower priority process to go into waiting state as higher priority processes are worked on. Termination state This is the final process state in the process. A process may be terminated, either from the "running" state by completing its execution or by explicitly being killed. In either of these cases, the process moves to the "terminated" state. If a process is not removed from memory after entering this state, it may become a Zombie process. 5. Explain all the four functions of network operating system. An operating system is an interface between the computer user and the machine. It’s system software that enables application software to coordinate with the hardware of a computer so as to complete a task. A network operating system is a computer operating system basically designed to support workstation, personal computers that are connected on the local area network. Examples are Novell’s NetWare, Windows NT, and Microsoft windows server The functions of a network operating system are as follows. Communication management This is one of the functions of a network operating system. This communication management software is in built into the network as part of it, so it’s in both the clients and server. The software is also made up of modules corresponding to the OSI layers. It’s responsible for communication management and sees that massages are transmitted error free from source to destination.
  • 5. File/printer services. A network operating system is multitasking a way that request s for shared resources are queued up, scheduled and then run as separate tasks. The software that controls file and printer services is run only on the server. Redirection software. This software resides on both server and client. And it does its work in the following way; an interrupt is executed by a system call generated from an Input /Output. during the time of execution of the interrupt, the software comes between to check if the I/O is local or remote. If it’s local, it continues to process but if remote, the software has to generate a request to the server but conversion is required if the operating system running on the server may be different from the local machine that generated the request. Network management software. This is responsible for monitoring the network and all its devices like computers modems lines repeaters multiplexers. The network management software resides at the top of the existing operating system in ordinary operating system but in the network operating system environment it is part of the network operating system. The software monitors the entire network and maintains a list of hardware equipment along with its location and status. This list is updated whenever there is an addition of a device on the network or when equipment is down for repair. Another important part that it plays is helping routing algorithms to route data on appropriate paths 6. Explain any five types of attacks on security. Security is an important aspect of any operating system. This keeps the code and data secure in a computer system. The open systems interconnection defines the elements of security in terms of integrity, availability and confidentiality. The following are the types of attacks on security hat do cause harm. Invalid parameters. Passing of invalid parameters of failure to validate them properly can lead to serious security violations Dos (denial of services).Here users are denied services by possibly a hacker trying to access some information from the server. Here a hacker sends several packets from his machine to his victim mainly the server or DNS. This is called flooding of packets such as ARP flooding,Ping flooding, TCP SYN flooding Virus.This is a threat to a computer and causes the computer to malfunction. A virus is a program that reproduces by introducing a copy of it in other programs. A virus corrupts code as well as data. Examples are memory resident infectors, general purpose infectors, file specific infectors, boot sector infectors. Trojan horse. This is a program that looks like it is genuine yet it is not genuine at all and normally waits to be activate or clicked upon and can crush your system ,open a back door en your data is stolen. This is an example of a rogue software.
  • 6. Worm. A worm is a program that creates copies of itself on other machines on the network. Worms do not need to be activated so as to multiply they do it by themselves. Worms do consume network resources to a very large extent and can easily bring the network to a halt. A computer worm is a complete program by itself not as the case with a virus. Ddos(distributed denial of services).This is similar to denial of services but here lots of packets are sent from many nodes or hosts to a specific victim host on the network. Sniffing.This is tracking or listening to an encrypted data over the network most especially wireless networks. This a security attacks because one can acquire the data and use it wrongly. Line tapping. Here a communication line is tapped and confidential data is easily accessed and can be modified. This data can easily be used to blackmail the company or the owner of the data. This is a mechanism mostly used by government agencies for intercepting phone calls of suspicion people in the country.