SlideShare a Scribd company logo
1 of 32
Understanding Operating System
Yasir Hussain
Yasir Hussain
BCA , MCA/ NIT SRINAGAR (Gold Medalist)
Operating System
• An operating system (OS) is system software that manages computer hardware, software
resources, and provides common services for computer programs. ... Other specialized
classes of operating systems, such as embedded and real-time systems, exist for many
applications.
• An operating system (OS) is the program that, after being initially loaded into the computer
by a boot program, manages all of the other application programs in a computer.The
application programs make use of the operating system by making requests for services
through a defined application program interface (API). In addition, users can interact directly
with the operating system through a user interface such as a command line or a graphical
user interface (GUI).
Computer system can be divided into four components
Hardware – provides basic computingresources
CPU, memory, I/O devices
• An operating system or OS is a software program that enables the computer hardware to
communicate and operate with the computer software.Without a computer operating
system, a computer and software programs would be useless.
• An operating system is a software which acts as an interface between the end user and
computer hardware. Every computer must have at least one OS to run other programs. An
application likeChrome, MSWord, Games, etc needs some environment in which it will run
and perform its task.
Need of an Operating System
• Operating system goals:
• Execute user programs and make solving user problems
easier
• Make the computer system convenient to use
• Use the computer hardware in an efficient manner
Loading of an operating system
(Booting)
Booting
• Booting of a computer refers to the process of powering on the computer
and starting the operating system. The operating system is the program that
makes all your software applications and hardware work together, so once
you hit the power button, it's all automatic from there. The boot process
loads the operating system into main memory or the random access memory
(RAM) installed on your computer
Boot Process
• When you push the power button, power is sent to a small bootloader program, which
loads the computer's operating system.The bootloader is located in the cache memory.
The cache memory is a portion of your RAM that is directly attached to the central
processing unit (CPU).
• Once the bootloader program gets power, it starts the process of activating the
operating system. If you were to see this happening, it would show a black screen with
the text of the boot up processes.
How operating system Load
• Bootstrapping is the process of loading a set of instructions when a computer is first turned on or
booted. During the startup process, diagnostic tests are performed, such as the power-on self-
test (POST), that set or check configurations for devices and implement routine testing for the
connection of peripherals, hardware and external memory devices.The bootloader or bootstrap
program is then loaded to initialize the OS.
• bootstrapping, bootloader, or boot program, a bootstrap loader is a program that resides in
the computer's ROM, or another non-volatile memory. It is automatically executed by the
processor when turning on the computer.The bootstrap loader reads the hard drives boot
sector to continue the process of loading the computer's operating system.
• When the computer is turned on or restarted, the bootstrap loader first performs the power-on
self-test, also known as POST. If the POST is successful and no issues are found, the bootstrap
loader will load the operating system for the computer into memory.The computer will then
be able to quickly access, load, and run the operating system.
History Of OS
•Operating systems were first developed in the late 1950s to manage tape storage
•The General Motors Research Lab implemented the first OS in the early 1950s for their IBM 701
•In the mid-1960s, operating systems started to use disks
•In the late 1960s, the first version of the Unix OS was developed
•The first OS built by Microsoft was DOS. It was built in 1981 by purchasing the 86-DOS software
from a Seattle company
•The present-day popularOSWindows first came to existence in 1985 when a GUI was created and
paired with MS-DOS.
What is a Kernel?
The kernel is the central component of a computer operating systems. The only job
is to the manage the communication between the software and the hardware. A Kernel is at
computer. It makes the communication between the hardware and software possible. While
innermost part of an operating system, a shell is the outermost one.
•A Mobile / computer Operating System
•An Embedded operating system
•A Network operating system (NOS)
•A Real-time operating system (RTOS)
Types of Operating System
A Mobile / computer Operating System
• A mobile OS allows smartphones, tablet PCs and other mobile devices to run applications
and programs. Mobile operating systems include Apple iOS, GoogleAndroid, BlackBerry
OS andWindows 10 Mobile.
An Embedded operating system
• An embedded operating system is specialized for use in the computers built into
larger systems, such as cars, traffic lights, digital televisions,ATMs, airplane
controls, point of sale (POS) terminals, digital cameras, GPS navigation systems,
elevators, digital media receivers and smart meters.
A Network operating system (NOS)
• A network operating system (NOS) is a computer operating system that is designed
primarily to support workstation, personal computer, and, in some instances,
older terminals that are connected on a local area network (LAN).
Examples of Operating System with Market
Share
A real-time operating system (RTOS)
• A real-time operating system (RTOS) is an operating system that guarantees a certain
capability within a specified time constraint. For example, an operating system might be
designed to ensure that a certain object was available for a robot on an assembly line.
Objectives of Operating System
• The objectives of the operating system are −
• To make the computer system convenient to use in an efficient manner.
• To hide the details of the hardware resources from the users.
• To provide users a convenient interface to use the computer system.
• To act as an intermediary between the hardware and its users, making it easier for the users to access and use
other resources.
• To manage the resources of a computer system.
• To keep track of who is using which resource, granting resource requests, and mediating conflicting requests
from different programs and users.
• To provide efficient and fair sharing of resources among users and programs.
Functions of an Operating System
•Memory Management
The operating system manages the Primary Memory or Main Memory. Main memory is made up of
•a large array of bytes or words where each byte or word is assigned a certain address.
•Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be
executed,
•it should be first loaded in the main memory. An Operating System performs the following activities for
•memory management:
It keeps tracks of primary memory, i.e.,
which bytes of memory are used by which user program.
The memory addresses that have already been allocated and the memory addresses
of the memory that has not yet been used. In multi programming, the OS decides the
order in which process are granted access to memory, and for how long. It Allocates
the memory to a process when the process requests it and deallocates the memory
when the process has terminated or is performing an I/O operation.
Memory Management
Virtual Memory:
This is a technique used by the operating systems which allow the user can load the programs which are larger than the
main memory of the computer. In this technique the program is executed even if the complete program can not be
loaded inside the main memory leading to efficient memory utilization.
Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of
main memory.
Swapping
Swapping is a mechanism in which a process can be swapped temporarily out of main memory (or
move) to secondary storage (disk) and make that memory available to other processes. At some
later time, the system swaps back the process from the secondary storage to main memory.
Though performance is usually affected by swapping process but it helps in running multiple and big
processes in parallel and that's the reason Swapping is also known as a technique for memory
compaction.
Pagingis a method of writing data to, and reading it from, secondary storage for use in
primary storage, also known as main memory. ... In a memory management system that takes
advantage of paging, the OS reads data from secondary storage in blocks called pages, all of
which have identical size.
In a memory management system that takes advantage of paging, the OS reads data from
secondary storage in blocks called pages, all of which have identical size.The physical region of
memory containing a single page is called a frame.
Processor Management
In a multi programming environment, the OS decides the order in which processes have access to the
processor,
•and how much processing time each process has.This function of OS is called process scheduling. An
Operating
•System performs the following activities for processor management.
Keeps tracks of the status of processes.The program which perform this task is known as traffic
controller.
Allocates the CPU that is processor to a process. De-allocates processor when a process is no more
required.
• Multitasking: Operating System manages memory and allow multiple programs to run in
their own space and even communicate with each other through shared memory.
Multitasking gives users a good experience as they can perform several tasks on a
computer at a time
this deals with management of the Central ProcessingUnit (CPU).The operating system takes care of the
allotment of CPU time to different processes.When a process finishes its CPU processing after executing
for the allotted time period, this is called scheduling.There are various type of scheduling techniques that
are used by the operating systems:
1.Shortest Job First(SJF): Process which need the shortest CPU time are
scheduled first.
2.Round Robin Scheduling: Each process is assigned a fixed CPU
execution time in cyclic way.
3.Priority Based scheduling (Non Preemptive): In this scheduling,
processes are scheduled according to their priorities, i.e., highest priority
process is schedule first. If priorities of two processes match, then schedule
according to arrival time
Device Management
An OS manages device communication via their respective drivers. It performs the following
activities for device management. Keeps tracks of all devices connected to system. designates a
program responsible for every device known as the Input/output controller. Decides which
process gets access to a certain device and for how long.Allocates devices in an effective and
efficient way. Deallocates devices when they are no longer required.
Buffering:
In this technique, input and output data is temporarily stored in Input Buffer and Output Buffer. Once the
signal for input or output is sent to or from the CPU respectively, the operating system through the device
controller moves the data from the input device to the input buffer and for the output device to the output
buffer. In case of input, if the buffer is full, the operating system sends a signal to the program which
processes the data stored in the buffer.When the buffer becomes empty, the program informs the operating
system which reloads the buffer and the input operation continues.
File management is one of the basic and important features of operating system. Operating
system is used to manage files of computer system.All the files with different extensions are
managed by operating system.
• File Management
A file system is organized into directories for efficient or easy navigation and usage.These directories
may contain other directories and other files.An Operating System carries out the following file
management activities. It keeps track of where information is stored, user access settings and status
of every file and more…These facilities are collectively known as the file system.
The following are some of the tasks performed by file management of operating
system of any computer system:
1.It helps to create new files in computer system and placing them at the specific
locations.
2.It helps in easily and quickly locating these files in computer system.
3.It makes the process of sharing of the files among different users very easy and user
friendly.
4.It helps to stores the files in separate folders known as directories.These directories
help users to search file quickly or to manage the files according to their types or uses.
5.It helps the user to modify the data of files or to modify the name of the file in the
directories.
System Security Plan
A system security plan is a formal plan that defines the plan of action to secure a
computer or information system.
It provides a systematic approach and techniques for protecting a computer from
being used by unauthorized users, guards against worms and viruses as well as any
other incident/event/process that can jeopardize the underlying system’s security.
A system security plan is primarily implemented in organizational IT environments. It
can be a proposed plan to protect and control an information system, or a plan that is
already in implementation
Typically a system security plan includes:
•List of authorized personnel/users that can access the system
•Level of access/tiered access, or what each user is allowed and not
allowed to do on the system
•Access control methods, or how users will access the system (user
ID/password, digital card, biometrics)
•Strengths and weaknesses of the system and how weaknesses are
handled
•May also include system backup/restoration procedures
• OS security refers to specified steps or measures used to protect the OS from threats, viruses,
worms, malware or remote hacker intrusions. OS security encompasses all preventive-control
techniques, which safeguard any computer assets capable of being stolen, edited or deleted if
OS security is compromised.
Operating System Security
OS security encompasses many different techniques and methods which ensure safety from
threats and attacks. OS security allows different applications and programs to perform
required tasks and stop unauthorized interference.
OS security may be approached in many ways, including adherence to the following:
•Performing regular OS patch updates
•Installing updated antivirus engines and software
•Scrutinizing all incoming and outgoing network traffic through a firewall
•Creating secure accounts with required privileges only (i.e., user management)
Authentication
Authentication refers to identifying each user of the system and associating the executing programs with
those users. It is the responsibility of the Operating System to create a protection system which ensures
that a user who is running a particular program is authentic. Operating Systems generally
identifies/authenticates users using following three ways −
•Username / Password − User need to enter a registered username and password with Operating system
to login into the system.
•User card/key − User need to punch card in card slot, or enter key generated by key generator in option
provided by operating system to login into the system.
•User attribute - fingerprint/ eye retina pattern/ signature − User need to pass his/her attribute via
designated input device used by operating system to login into the system.
User Accounts
•Limit the number of user accounts on the server computers.Unnecessary and legacy
user accounts increase system complexity and may present system vulnerabilities.
•Fewer user accounts reduces the amount of time administrators spend on account
administration.
•Ensure that only a few trusted users have administrative access to the server
computers.Fewer administrators make it easier to maintain accountability.The
administrators must be competent.
•Assign the minimum required access permissions for the account that runs the
application.If attackers obtain access to the application, they have the permissions of the
user who runs the application.
System Patches
•Run the latest, vendor-recommended patches for the operating system.The
patches may be core OS patches, or patches required by additional
applications.
•Schedule regular maintenance of security patches.Logging and Monitoring
•Log security-related events, including successful and failed logons, logoffs, and changes to user
permissions.
•Monitor system log files.
•Use a time server to correlate time for forensics.
•Secure the system log files by restricting access permissions to them.Logs are important for daily
maintenance and as a disaster recovery tool. Therefore, they must be protected from system failures
and user tampering.
•Use IPF logging to build a more sophisticated logging system.To increase the security of the log file
system, you can
• place all log files in one location, on one serverThis simplifies the administration of log files.
• set up multiple logging servers for redundancy
• use a remote server for loggingThis protects the logs if the system is compromised and, for
example, the hard drive is destroyed.
• Because an IPF server is accessed through the network, it can be located anywhere in the
world.
•Secure the logging configuration file.The configuration file contains settings that, if changed, can
compromise the reliability of the log system. For example, setting the log level incorrectly may cause
some failures not to be logged.
Hardening of the OS is the act of configuring an OS securely, updating it, creating rules and policies to
help govern the system in a secure manner, and removing unnecessary applications and services.This
is done to minimize a computer OS's exposure to threats and to mitigate possible risk.
Hardening
Six OS Hardening Tips
1 Programs clean-up – Remove unnecessary programs. Every program is another
potential entrance point for a hacker. Cleaning these out helps you limit the number of
ways in. If the program is not something the company has vetted and "locked down," it
shouldn’t be allowed. Attackers look for backdoors and security holes when attempting
to compromise networks. Minimize their chances of getting through.
2 Use of service packs – Keep up-to-date and install the latest versions. It’s
that simple. No one thing ensures protection, especially from zero-day attacks, but
this is an easy rule to follow.
3 Patches and patch management – Planning, testing, implementing and auditing patch management
software should be part of a regular security regimen. Make sure the OS is patched regularly, as well as
the individual programs on the client's computer.
4. Group policies – Define what groups can or can’t access and maintain these rules. Sometimes,
it’s simply user error that leads to a successful cyber attack. Establish or update user policies and
ensure all users are aware and comply with these procedures. For example, everyone should
be implementing strong passwords, securing their credentials and changing them regularly.
5. Security templates – Groups of policies that can be loaded in one procedure; they are commonly used
in corporate environments.
6. Configuration baselines – Baselining is the process of measuring changes in networking, hardware,
software, etc.To create a baseline, select something to measure and measure it consistently for a period
of time. Establish baselines and measure on a schedule that is acceptable to both your standard for
maintaining security and meeting your clients' needs.

More Related Content

What's hot

What's hot (20)

Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Types of operating system
Types of operating systemTypes of operating system
Types of operating system
 
Types Of Operating Systems
Types Of Operating SystemsTypes Of Operating Systems
Types Of Operating Systems
 
Computer
ComputerComputer
Computer
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
 
Operating system || Chapter 1: Introduction
Operating system || Chapter 1: IntroductionOperating system || Chapter 1: Introduction
Operating system || Chapter 1: Introduction
 
SYSTEM SOFTWARE
SYSTEM SOFTWARESYSTEM SOFTWARE
SYSTEM SOFTWARE
 
Operating system and its functions
Operating system and its functionsOperating system and its functions
Operating system and its functions
 
operating system
operating systemoperating system
operating system
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Operating system
Operating systemOperating system
Operating system
 
Os ppt
Os pptOs ppt
Os ppt
 
Introduction to operating syatem
Introduction to operating syatemIntroduction to operating syatem
Introduction to operating syatem
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Operating systems system structures
Operating systems   system structuresOperating systems   system structures
Operating systems system structures
 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
 
Main memory of computer .ppt
Main memory of computer .pptMain memory of computer .ppt
Main memory of computer .ppt
 
Operating system presentation
Operating system presentationOperating system presentation
Operating system presentation
 
Process management os concept
Process management os conceptProcess management os concept
Process management os concept
 

Similar to OS - Operating System

What is operating system
What is operating systemWhat is operating system
What is operating systemSuvithak
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Project Student
 
Windows 1Fundaments.ppt
Windows 1Fundaments.pptWindows 1Fundaments.ppt
Windows 1Fundaments.pptkarthikvcyber
 
OS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptOS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptnaghamallella
 
Module 1 Introduction.ppt
Module 1 Introduction.pptModule 1 Introduction.ppt
Module 1 Introduction.pptshreesha16
 
Introduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.pptIntroduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.pptminaltmv
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating SystemsMukesh Chinta
 
SYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdfSYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdfAbhinov Shukla
 
LM1 - Computer System Overview, system calls
LM1 - Computer System Overview, system callsLM1 - Computer System Overview, system calls
LM1 - Computer System Overview, system callsmanideepakc
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdfGanesh198271
 
Lecture - 1.pdf
Lecture - 1.pdfLecture - 1.pdf
Lecture - 1.pdfruhama12
 
os unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsos unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsssuser6aef00
 

Similar to OS - Operating System (20)

What is operating system
What is operating systemWhat is operating system
What is operating system
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
 
OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
OS full chapter.ppt
OS full chapter.pptOS full chapter.ppt
OS full chapter.ppt
 
Windows 1Fundaments.ppt
Windows 1Fundaments.pptWindows 1Fundaments.ppt
Windows 1Fundaments.ppt
 
OS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.pptOS-20210426203801 introduction to os.ppt
OS-20210426203801 introduction to os.ppt
 
OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
Module 1 Introduction.ppt
Module 1 Introduction.pptModule 1 Introduction.ppt
Module 1 Introduction.ppt
 
Introduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.pptIntroduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.ppt
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
LEC 1.pptx
LEC 1.pptxLEC 1.pptx
LEC 1.pptx
 
SYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdfSYCS OS PPT INTRODUCTION LECTURE-01.pdf
SYCS OS PPT INTRODUCTION LECTURE-01.pdf
 
LM1 - Computer System Overview, system calls
LM1 - Computer System Overview, system callsLM1 - Computer System Overview, system calls
LM1 - Computer System Overview, system calls
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdf
 
Lecture - 1.pdf
Lecture - 1.pdfLecture - 1.pdf
Lecture - 1.pdf
 
os unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systemsos unit 1 (2).pptx. introduction to operating systems
os unit 1 (2).pptx. introduction to operating systems
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

OS - Operating System

  • 1. Understanding Operating System Yasir Hussain Yasir Hussain BCA , MCA/ NIT SRINAGAR (Gold Medalist)
  • 2. Operating System • An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. ... Other specialized classes of operating systems, such as embedded and real-time systems, exist for many applications. • An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.The application programs make use of the operating system by making requests for services through a defined application program interface (API). In addition, users can interact directly with the operating system through a user interface such as a command line or a graphical user interface (GUI).
  • 3. Computer system can be divided into four components Hardware – provides basic computingresources CPU, memory, I/O devices
  • 4. • An operating system or OS is a software program that enables the computer hardware to communicate and operate with the computer software.Without a computer operating system, a computer and software programs would be useless. • An operating system is a software which acts as an interface between the end user and computer hardware. Every computer must have at least one OS to run other programs. An application likeChrome, MSWord, Games, etc needs some environment in which it will run and perform its task. Need of an Operating System • Operating system goals: • Execute user programs and make solving user problems easier • Make the computer system convenient to use • Use the computer hardware in an efficient manner
  • 5. Loading of an operating system (Booting)
  • 6. Booting • Booting of a computer refers to the process of powering on the computer and starting the operating system. The operating system is the program that makes all your software applications and hardware work together, so once you hit the power button, it's all automatic from there. The boot process loads the operating system into main memory or the random access memory (RAM) installed on your computer
  • 7. Boot Process • When you push the power button, power is sent to a small bootloader program, which loads the computer's operating system.The bootloader is located in the cache memory. The cache memory is a portion of your RAM that is directly attached to the central processing unit (CPU). • Once the bootloader program gets power, it starts the process of activating the operating system. If you were to see this happening, it would show a black screen with the text of the boot up processes.
  • 8. How operating system Load • Bootstrapping is the process of loading a set of instructions when a computer is first turned on or booted. During the startup process, diagnostic tests are performed, such as the power-on self- test (POST), that set or check configurations for devices and implement routine testing for the connection of peripherals, hardware and external memory devices.The bootloader or bootstrap program is then loaded to initialize the OS. • bootstrapping, bootloader, or boot program, a bootstrap loader is a program that resides in the computer's ROM, or another non-volatile memory. It is automatically executed by the processor when turning on the computer.The bootstrap loader reads the hard drives boot sector to continue the process of loading the computer's operating system. • When the computer is turned on or restarted, the bootstrap loader first performs the power-on self-test, also known as POST. If the POST is successful and no issues are found, the bootstrap loader will load the operating system for the computer into memory.The computer will then be able to quickly access, load, and run the operating system.
  • 9. History Of OS •Operating systems were first developed in the late 1950s to manage tape storage •The General Motors Research Lab implemented the first OS in the early 1950s for their IBM 701 •In the mid-1960s, operating systems started to use disks •In the late 1960s, the first version of the Unix OS was developed •The first OS built by Microsoft was DOS. It was built in 1981 by purchasing the 86-DOS software from a Seattle company •The present-day popularOSWindows first came to existence in 1985 when a GUI was created and paired with MS-DOS. What is a Kernel? The kernel is the central component of a computer operating systems. The only job is to the manage the communication between the software and the hardware. A Kernel is at computer. It makes the communication between the hardware and software possible. While innermost part of an operating system, a shell is the outermost one.
  • 10. •A Mobile / computer Operating System •An Embedded operating system •A Network operating system (NOS) •A Real-time operating system (RTOS) Types of Operating System
  • 11. A Mobile / computer Operating System • A mobile OS allows smartphones, tablet PCs and other mobile devices to run applications and programs. Mobile operating systems include Apple iOS, GoogleAndroid, BlackBerry OS andWindows 10 Mobile.
  • 12. An Embedded operating system • An embedded operating system is specialized for use in the computers built into larger systems, such as cars, traffic lights, digital televisions,ATMs, airplane controls, point of sale (POS) terminals, digital cameras, GPS navigation systems, elevators, digital media receivers and smart meters.
  • 13. A Network operating system (NOS) • A network operating system (NOS) is a computer operating system that is designed primarily to support workstation, personal computer, and, in some instances, older terminals that are connected on a local area network (LAN).
  • 14. Examples of Operating System with Market Share
  • 15. A real-time operating system (RTOS) • A real-time operating system (RTOS) is an operating system that guarantees a certain capability within a specified time constraint. For example, an operating system might be designed to ensure that a certain object was available for a robot on an assembly line.
  • 16. Objectives of Operating System • The objectives of the operating system are − • To make the computer system convenient to use in an efficient manner. • To hide the details of the hardware resources from the users. • To provide users a convenient interface to use the computer system. • To act as an intermediary between the hardware and its users, making it easier for the users to access and use other resources. • To manage the resources of a computer system. • To keep track of who is using which resource, granting resource requests, and mediating conflicting requests from different programs and users. • To provide efficient and fair sharing of resources among users and programs.
  • 17. Functions of an Operating System
  • 18. •Memory Management The operating system manages the Primary Memory or Main Memory. Main memory is made up of •a large array of bytes or words where each byte or word is assigned a certain address. •Main memory is a fast storage and it can be accessed directly by the CPU. For a program to be executed, •it should be first loaded in the main memory. An Operating System performs the following activities for •memory management: It keeps tracks of primary memory, i.e., which bytes of memory are used by which user program. The memory addresses that have already been allocated and the memory addresses of the memory that has not yet been used. In multi programming, the OS decides the order in which process are granted access to memory, and for how long. It Allocates the memory to a process when the process requests it and deallocates the memory when the process has terminated or is performing an I/O operation.
  • 19. Memory Management Virtual Memory: This is a technique used by the operating systems which allow the user can load the programs which are larger than the main memory of the computer. In this technique the program is executed even if the complete program can not be loaded inside the main memory leading to efficient memory utilization. Virtual Memory is a storage allocation scheme in which secondary memory can be addressed as though it were part of main memory.
  • 20. Swapping Swapping is a mechanism in which a process can be swapped temporarily out of main memory (or move) to secondary storage (disk) and make that memory available to other processes. At some later time, the system swaps back the process from the secondary storage to main memory. Though performance is usually affected by swapping process but it helps in running multiple and big processes in parallel and that's the reason Swapping is also known as a technique for memory compaction.
  • 21. Pagingis a method of writing data to, and reading it from, secondary storage for use in primary storage, also known as main memory. ... In a memory management system that takes advantage of paging, the OS reads data from secondary storage in blocks called pages, all of which have identical size. In a memory management system that takes advantage of paging, the OS reads data from secondary storage in blocks called pages, all of which have identical size.The physical region of memory containing a single page is called a frame.
  • 22. Processor Management In a multi programming environment, the OS decides the order in which processes have access to the processor, •and how much processing time each process has.This function of OS is called process scheduling. An Operating •System performs the following activities for processor management. Keeps tracks of the status of processes.The program which perform this task is known as traffic controller. Allocates the CPU that is processor to a process. De-allocates processor when a process is no more required.
  • 23. • Multitasking: Operating System manages memory and allow multiple programs to run in their own space and even communicate with each other through shared memory. Multitasking gives users a good experience as they can perform several tasks on a computer at a time this deals with management of the Central ProcessingUnit (CPU).The operating system takes care of the allotment of CPU time to different processes.When a process finishes its CPU processing after executing for the allotted time period, this is called scheduling.There are various type of scheduling techniques that are used by the operating systems: 1.Shortest Job First(SJF): Process which need the shortest CPU time are scheduled first. 2.Round Robin Scheduling: Each process is assigned a fixed CPU execution time in cyclic way. 3.Priority Based scheduling (Non Preemptive): In this scheduling, processes are scheduled according to their priorities, i.e., highest priority process is schedule first. If priorities of two processes match, then schedule according to arrival time
  • 24. Device Management An OS manages device communication via their respective drivers. It performs the following activities for device management. Keeps tracks of all devices connected to system. designates a program responsible for every device known as the Input/output controller. Decides which process gets access to a certain device and for how long.Allocates devices in an effective and efficient way. Deallocates devices when they are no longer required. Buffering: In this technique, input and output data is temporarily stored in Input Buffer and Output Buffer. Once the signal for input or output is sent to or from the CPU respectively, the operating system through the device controller moves the data from the input device to the input buffer and for the output device to the output buffer. In case of input, if the buffer is full, the operating system sends a signal to the program which processes the data stored in the buffer.When the buffer becomes empty, the program informs the operating system which reloads the buffer and the input operation continues.
  • 25. File management is one of the basic and important features of operating system. Operating system is used to manage files of computer system.All the files with different extensions are managed by operating system. • File Management A file system is organized into directories for efficient or easy navigation and usage.These directories may contain other directories and other files.An Operating System carries out the following file management activities. It keeps track of where information is stored, user access settings and status of every file and more…These facilities are collectively known as the file system. The following are some of the tasks performed by file management of operating system of any computer system: 1.It helps to create new files in computer system and placing them at the specific locations. 2.It helps in easily and quickly locating these files in computer system. 3.It makes the process of sharing of the files among different users very easy and user friendly. 4.It helps to stores the files in separate folders known as directories.These directories help users to search file quickly or to manage the files according to their types or uses. 5.It helps the user to modify the data of files or to modify the name of the file in the directories.
  • 26. System Security Plan A system security plan is a formal plan that defines the plan of action to secure a computer or information system. It provides a systematic approach and techniques for protecting a computer from being used by unauthorized users, guards against worms and viruses as well as any other incident/event/process that can jeopardize the underlying system’s security. A system security plan is primarily implemented in organizational IT environments. It can be a proposed plan to protect and control an information system, or a plan that is already in implementation Typically a system security plan includes: •List of authorized personnel/users that can access the system •Level of access/tiered access, or what each user is allowed and not allowed to do on the system •Access control methods, or how users will access the system (user ID/password, digital card, biometrics) •Strengths and weaknesses of the system and how weaknesses are handled •May also include system backup/restoration procedures
  • 27. • OS security refers to specified steps or measures used to protect the OS from threats, viruses, worms, malware or remote hacker intrusions. OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised. Operating System Security OS security encompasses many different techniques and methods which ensure safety from threats and attacks. OS security allows different applications and programs to perform required tasks and stop unauthorized interference. OS security may be approached in many ways, including adherence to the following: •Performing regular OS patch updates •Installing updated antivirus engines and software •Scrutinizing all incoming and outgoing network traffic through a firewall •Creating secure accounts with required privileges only (i.e., user management)
  • 28. Authentication Authentication refers to identifying each user of the system and associating the executing programs with those users. It is the responsibility of the Operating System to create a protection system which ensures that a user who is running a particular program is authentic. Operating Systems generally identifies/authenticates users using following three ways − •Username / Password − User need to enter a registered username and password with Operating system to login into the system. •User card/key − User need to punch card in card slot, or enter key generated by key generator in option provided by operating system to login into the system. •User attribute - fingerprint/ eye retina pattern/ signature − User need to pass his/her attribute via designated input device used by operating system to login into the system.
  • 29. User Accounts •Limit the number of user accounts on the server computers.Unnecessary and legacy user accounts increase system complexity and may present system vulnerabilities. •Fewer user accounts reduces the amount of time administrators spend on account administration. •Ensure that only a few trusted users have administrative access to the server computers.Fewer administrators make it easier to maintain accountability.The administrators must be competent. •Assign the minimum required access permissions for the account that runs the application.If attackers obtain access to the application, they have the permissions of the user who runs the application.
  • 30. System Patches •Run the latest, vendor-recommended patches for the operating system.The patches may be core OS patches, or patches required by additional applications. •Schedule regular maintenance of security patches.Logging and Monitoring •Log security-related events, including successful and failed logons, logoffs, and changes to user permissions. •Monitor system log files. •Use a time server to correlate time for forensics. •Secure the system log files by restricting access permissions to them.Logs are important for daily maintenance and as a disaster recovery tool. Therefore, they must be protected from system failures and user tampering. •Use IPF logging to build a more sophisticated logging system.To increase the security of the log file system, you can • place all log files in one location, on one serverThis simplifies the administration of log files. • set up multiple logging servers for redundancy • use a remote server for loggingThis protects the logs if the system is compromised and, for example, the hard drive is destroyed. • Because an IPF server is accessed through the network, it can be located anywhere in the world. •Secure the logging configuration file.The configuration file contains settings that, if changed, can compromise the reliability of the log system. For example, setting the log level incorrectly may cause some failures not to be logged.
  • 31. Hardening of the OS is the act of configuring an OS securely, updating it, creating rules and policies to help govern the system in a secure manner, and removing unnecessary applications and services.This is done to minimize a computer OS's exposure to threats and to mitigate possible risk. Hardening Six OS Hardening Tips 1 Programs clean-up – Remove unnecessary programs. Every program is another potential entrance point for a hacker. Cleaning these out helps you limit the number of ways in. If the program is not something the company has vetted and "locked down," it shouldn’t be allowed. Attackers look for backdoors and security holes when attempting to compromise networks. Minimize their chances of getting through. 2 Use of service packs – Keep up-to-date and install the latest versions. It’s that simple. No one thing ensures protection, especially from zero-day attacks, but this is an easy rule to follow.
  • 32. 3 Patches and patch management – Planning, testing, implementing and auditing patch management software should be part of a regular security regimen. Make sure the OS is patched regularly, as well as the individual programs on the client's computer. 4. Group policies – Define what groups can or can’t access and maintain these rules. Sometimes, it’s simply user error that leads to a successful cyber attack. Establish or update user policies and ensure all users are aware and comply with these procedures. For example, everyone should be implementing strong passwords, securing their credentials and changing them regularly. 5. Security templates – Groups of policies that can be loaded in one procedure; they are commonly used in corporate environments. 6. Configuration baselines – Baselining is the process of measuring changes in networking, hardware, software, etc.To create a baseline, select something to measure and measure it consistently for a period of time. Establish baselines and measure on a schedule that is acceptable to both your standard for maintaining security and meeting your clients' needs.