SlideShare a Scribd company logo
1 of 27
SWENG3106
Operating Systems
Software Engineering Department
AASTU
2
Chapter One
Introduction
Objectives
īŽAt the end of this chapter you should be able to:
īŽ Define operating system
īŽ Explain services provided by operating system
īŽ Describe evolution of operating system
īŽ Describe various types of operating systems and their services
īŽ Understand the structure of operating system
3
Outline
īŽDefinition of an Operating System
īŽHistory of Operating Systems
īŽOperating System Services
īŽTypes of Operating Systems
īŽOperating System Structure
4
What is an Operating System?
īŽ A program that acts as an intermediary between a user of
a computer and the computer hardware.
īŽ It is an extended machine
īŽ Hides the messy details which must be performed
īŽ Presents user with a virtual machine, easier to use
īŽ It is a resource manager
īŽ Each program gets time with the resource
īŽ Each program gets space on the resource
5
Computer System Components
īŽ1. Hardware – provides basic computing resources
(CPU, memory, I/O devices).
īŽ2. Operating system – controls and coordinates the
use of the hardware among the various application
programs for the various users.
īŽ3. Applications programs – define the ways in which
the system resources are used to solve the computing
problems of the users (database systems, video
games, business programs).
īŽ4. Users (people, machines, other computers).
6
Computer System Components(cont’d)
7
Operating System Objectives
īŽ Convenience – Top Down View – Virtual Machine
īŽ Extending the real hardware and acting as a Virtual Machine
īŽ Hiding the truth about the hardware from the user
īŽ Providing the user a convenient interface which is easier to program
īŽ Efficiency – Bottom Up View – Resource Manager
īŽ Providing an orderly and controlled allocation of resources
īŽ Improving resource utilization
īŽ Ability to Evolve
īŽ Permit effective development, testing, and introduction of new system
functions without interfering with existing services
īŽ Protection
īŽ allow only authorised access to data, computation, services, etc.
8
Operating System Services
īŽA) Process Management
īŽ A process is a program in execution. A process needs certain
resources, including CPU time, memory, files, and I/O devices,
to accomplish its task.
īŽ Process is active entity, while program is passive entity
īŽ The operating system is responsible for the following activities
in connection with process management:
īŽ Process creation and deletion.
īŽ process suspension and resumption.
īŽ Provision of mechanisms for:
īŽ process synchronization
īŽ process communication
9
Operating System Services(cont’d)
īŽB) Memory Management
īŽ The operating system is responsible for the following activities
in connections with memory management:
īŽ Keep track of which parts of memory are currently being used and
by whom.
īŽ Decide which processes to load when memory space becomes
available.
īŽ Allocate and deallocate memory space as needed.
īŽC) File Management
īŽ A file is a collection of related information defined by its
creator.
īŽ Responsibility of operating system includes:
īŽ File creation and deletion.
īŽ Directory creation and deletion.
īŽ Mapping files onto secondary storage.
īŽ File backup on stable (nonvolatile) storage media. 10
Operating System Services(cont’d)
īŽ D) Secondary-Storage Management
īŽ The operating system is responsible for the following activities in
connection with disk management:
īŽ Free space management
īŽ Storage allocation
īŽ Disk scheduling
īŽ E) I/O Management
īŽ since user programs cannot execute I/O operations directly, the
operating system must provide some means to perform I/O.
īŽ F) Protection System
īŽ Protection refers to a mechanism for controlling access by programs,
processes, or users to both system and user resources.
īŽ The protection mechanism must:
īŽ distinguish between authorized and unauthorized usage.
īŽ specify the controls to be imposed.
īŽ provide a means of enforcement.
11
A View of Operating System Services
12
Modes of Operation
īŽ Dual-mode operation allows OS to protect itself and other system components
īŽ User mode: when the computer system is executing on behalf of a user application.
īŽ Kernel/privileged/supervisor/system mode: OS gains control of the computer.
īŽ At system boot time, the hardware starts in kernel mode. The operating system is
then loaded and starts user applications in user mode.
īŽ Dual mode provides protection. How?
īŽ The hardware allows privileged instructions- instructions that causes harm
(E.g. instruction to switch to kernel mode, I/O control, timer management) to
be executed only in kernel mode.
13
System Calls
īŽ System calls provide an interface to the services made available by an
operating system
īŽ System calls mostly accessed by programs via a high-level Application
Programming Interface (API) rather than direct system call use
īŽ E.g. how system calls are used: a program to read data from one file and
copy them to another file
14
System Calls(cont’d)
īŽ Three most common APIs available to application programmers are:
īŽ Windows API for Windows,
īŽ POSIX API(for UNIX, Linux, and Mac OS X), and
īŽ Java API for the Java virtual machine
īŽ API – System Call – OS Relationship
15
Standard C Library Example
īŽ C program invoking printf() statement, the C library intercepts this call and
invokes write() system call. The C library takes the value returned by write() and
passes it back to the user program.
16
Read about system call parameter passing
Examples of Windows and Unix
System Calls
17
Operating System Structure
īŽGeneral-purpose OS is very large program, therefore
need to be structured well.
īŽ Partition the task into small components, or modules.
īŽVarious ways:
īŽ Simple structure (monolithic)
īŽ Layered
īŽ Microkernel
īŽ Module
īŽ Hybrid
18
Monolithic/Simple Structure -- MS-DOS
īŽ Do not have well-defined structures
īŽ has no distinction between user and kernel modes,
allowing all programs direct access to the underlying
hardware
īŽ Advantage
īŽ Having the operating system in a single address space
provides very efficient performance
īŽ Disadvantage
īŽ Difficult to maintain
īŽ Base hardware is accessible by application programs:
vulnerable to malicious programs.
īŽ MS-DOS is one example
īŽ written to provide the most functionality in the least
space
īŽ Although MS-DOS has some structure, its interfaces
and levels of functionality are not well separated
19
Layered Approach
īŽ The operating system is divided into a
number of layers (levels), each built on top
of lower layers.
īŽ The bottom layer (layer 0), is the hardware;
the highest (layer N) is the user interface.
īŽ Each layer provides a different type of
functionality.
īŽ With modularity, layers are selected such
that each uses functions (operations) and
services of only lower-level layers
īŽ Advantage
īŽ Easy for debugging
īŽ Disadvantage
īŽ Difficult to define the various layers
īŽ Layer can use only lower-level layers, careful planning is
necessary.
īŽ Less efficient than other types
īŽ Each layer adds overhead to the system call
20
Microkernel System Structure
īŽ Structures the operating system by removing all nonessential
components from the kernel and implementing them in user space.
īŽ Communication takes place between user modules using message
passing
īŽ E.g. Mac OS X kernel (Darwin) partly based on Mach
īŽ Benefits:
īŽ Easier to extend a microkernel
īŽ new services are added to user space, do not require modification of the
kernel
īŽ Easier to port the operating system to new architectures
īŽ Requires fewer modification
īŽ More reliable and secure (less code is running in kernel mode)
īŽ Detriments:
īŽ Performance overhead of user space to kernel space communication
21
Microkernel System Structure
Application
Program
File
System
Device
Driver
Interprocess
Communication
memory
managment
CPU
scheduling
messages
messages
microkernel
hardware
user
mode
kernel
mode
22
Modules
īŽ Many modern operating systems implement loadable kernel
modules: the kernel has a set of core components and links in
additional services via modules
īŽ Each core component is separate
īŽ Each talks to the others over known interfaces
īŽ Each is loadable as needed within the kernel
īŽ Overall, similar to layers but with more flexible- because any module
can call any other module
īŽ Linux, Solaris, etc.
īŽ Advantage and Disadvantage?
23
Solaris Modular Approach
24
Hybrid Systems
īŽ Most modern operating systems are actually not one pure model
īŽ Hybrid combines multiple approaches to address performance, security,
and usability issues
īŽ Linux and Solaris are monolithic(for performance reasons) in kernel
address space, plus modular for dynamic loading of functionality
īŽ Windows mostly monolithic, has behavior of microkernel, and also
provide support for dynamically loadable kernel modules
īŽ Apple Mac OS X uses hybrid structure, a layered system :
īŽ Top layer: Aqua- GUI; Cocoa programming environment
īŽ Below is kernel consisting of:
īŽ Mach microkernel: for memory management, RPCs and IPC
īŽ BSD Unix component: for networking and file systems
īŽ I/O kit: for development of device drivers
īŽ dynamically loadable modules (called kernel extensions)
25
Mac OS X Structure
graphical user interface
Aqua
application environments and services
kernel environment
Java Cocoa Quicktime BSD
Mach
I/O kit kernel extensions
BSD
26
Reading Assignments
īŽ A. History of operating systems
īŽ B. Types of operating systems.
īŽ Mainframe operating systems
īŽ Distributed operating systems
īŽ Personal computer operating systems
īŽ Real-time operating systems
īŽ Embedded operating systems
27

More Related Content

Similar to Chapter 1- Introduction.ppt

CS403: Operating System : Unit I _merged.pdf
CS403: Operating System :  Unit I _merged.pdfCS403: Operating System :  Unit I _merged.pdf
CS403: Operating System : Unit I _merged.pdfAsst.prof M.Gokilavani
 
Operating System
Operating SystemOperating System
Operating SystemSubhasis Dash
 
Operating system- AARAMBH PANDEY
Operating system- AARAMBH PANDEYOperating system- AARAMBH PANDEY
Operating system- AARAMBH PANDEYAARAMBH PANDEY
 
MC 7204 OS Question Bank with Answer
MC 7204 OS Question Bank with AnswerMC 7204 OS Question Bank with Answer
MC 7204 OS Question Bank with Answersellappasiva
 
chapter 1 introduction to operating system
chapter 1 introduction to operating systemchapter 1 introduction to operating system
chapter 1 introduction to operating systemAisyah Rafiuddin
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Amit Gupta
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its ComponentsMahmuda Rahman
 
Introduction to OS 1.ppt
Introduction to OS 1.pptIntroduction to OS 1.ppt
Introduction to OS 1.pptShannykumarSingh
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdfcVan3
 
Operating-System Structures
Operating-System StructuresOperating-System Structures
Operating-System StructuresCloudbells.com
 
Introduction of operating system
Introduction of operating systemIntroduction of operating system
Introduction of operating systemJitendrakumar Upadhyay
 
Operting system
Operting systemOperting system
Operting systemKAnurag2
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItMichele Thomas
 
OS.pptx
OS.pptxOS.pptx
OS.pptxabclara
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptKirti Verma
 

Similar to Chapter 1- Introduction.ppt (20)

CS403: Operating System : Unit I _merged.pdf
CS403: Operating System :  Unit I _merged.pdfCS403: Operating System :  Unit I _merged.pdf
CS403: Operating System : Unit I _merged.pdf
 
Operating System
Operating SystemOperating System
Operating System
 
Operating system- AARAMBH PANDEY
Operating system- AARAMBH PANDEYOperating system- AARAMBH PANDEY
Operating system- AARAMBH PANDEY
 
Unit 1 q&a
Unit  1 q&aUnit  1 q&a
Unit 1 q&a
 
operating systems
operating systemsoperating systems
operating systems
 
MC 7204 OS Question Bank with Answer
MC 7204 OS Question Bank with AnswerMC 7204 OS Question Bank with Answer
MC 7204 OS Question Bank with Answer
 
chapter 1 introduction to operating system
chapter 1 introduction to operating systemchapter 1 introduction to operating system
chapter 1 introduction to operating system
 
Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]Ch1kiit [compatibility mode]
Ch1kiit [compatibility mode]
 
Demo.pptx
Demo.pptxDemo.pptx
Demo.pptx
 
Presentation on Operating System & its Components
Presentation on Operating System & its ComponentsPresentation on Operating System & its Components
Presentation on Operating System & its Components
 
Introduction to OS 1.ppt
Introduction to OS 1.pptIntroduction to OS 1.ppt
Introduction to OS 1.ppt
 
R20CSE2202-OPERATING-SYSTEMS .pdf
R20CSE2202-OPERATING-SYSTEMS        .pdfR20CSE2202-OPERATING-SYSTEMS        .pdf
R20CSE2202-OPERATING-SYSTEMS .pdf
 
Operating-System Structures
Operating-System StructuresOperating-System Structures
Operating-System Structures
 
Introduction of operating system
Introduction of operating systemIntroduction of operating system
Introduction of operating system
 
Csc 2313 (lecture 2)
Csc 2313 (lecture 2)Csc 2313 (lecture 2)
Csc 2313 (lecture 2)
 
Csc 2313 (lecture 2)
Csc 2313 (lecture 2)Csc 2313 (lecture 2)
Csc 2313 (lecture 2)
 
Operting system
Operting systemOperting system
Operting system
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
 
OS.pptx
OS.pptxOS.pptx
OS.pptx
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 

More from miki304759

Advanced Programming, Java Programming, Applets.ppt
Advanced Programming, Java Programming, Applets.pptAdvanced Programming, Java Programming, Applets.ppt
Advanced Programming, Java Programming, Applets.pptmiki304759
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.pptmiki304759
 
Elements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptxElements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptxmiki304759
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.pptmiki304759
 
Chapter 3 SE 2015.pptx
Chapter 3 SE 2015.pptxChapter 3 SE 2015.pptx
Chapter 3 SE 2015.pptxmiki304759
 
Chapter One Function.pptx
Chapter One Function.pptxChapter One Function.pptx
Chapter One Function.pptxmiki304759
 
4_5809869271378954936.pptx
4_5809869271378954936.pptx4_5809869271378954936.pptx
4_5809869271378954936.pptxmiki304759
 

More from miki304759 (7)

Advanced Programming, Java Programming, Applets.ppt
Advanced Programming, Java Programming, Applets.pptAdvanced Programming, Java Programming, Applets.ppt
Advanced Programming, Java Programming, Applets.ppt
 
Chapter Last.ppt
Chapter Last.pptChapter Last.ppt
Chapter Last.ppt
 
Elements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptxElements of Graph Theory for IS.pptx
Elements of Graph Theory for IS.pptx
 
Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Chapter 3 SE 2015.pptx
Chapter 3 SE 2015.pptxChapter 3 SE 2015.pptx
Chapter 3 SE 2015.pptx
 
Chapter One Function.pptx
Chapter One Function.pptxChapter One Function.pptx
Chapter One Function.pptx
 
4_5809869271378954936.pptx
4_5809869271378954936.pptx4_5809869271378954936.pptx
4_5809869271378954936.pptx
 

Recently uploaded

The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.Bharathi sakthi
 
Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...
Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...
Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...Macromator Inc.
 
Passive Income System 2.0 Digital: Effortless Earnings
Passive Income System 2.0 Digital: Effortless EarningsPassive Income System 2.0 Digital: Effortless Earnings
Passive Income System 2.0 Digital: Effortless Earningsabdullahspz0428
 
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...ahmedjiabur940
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesMathuraa
 
Taprank - Boost your Google reviews with personalized NFC cards
Taprank - Boost your Google reviews with personalized NFC cardsTaprank - Boost your Google reviews with personalized NFC cards
Taprank - Boost your Google reviews with personalized NFC cardsJuan Pablo Ponce
 
Niche Analysis for Client Outreach Outside Marketplace.pptx
Niche Analysis for Client Outreach Outside Marketplace.pptxNiche Analysis for Client Outreach Outside Marketplace.pptx
Niche Analysis for Client Outreach Outside Marketplace.pptxAhnaf Tahmid Haque
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendayMaharshBenday
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfSocial Samosa
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxelizabethella096
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx23397013
 
Iranian Strikes on Israel Assessing the Impact and Implications.pptx
Iranian Strikes on Israel  Assessing the Impact and Implications.pptxIranian Strikes on Israel  Assessing the Impact and Implications.pptx
Iranian Strikes on Israel Assessing the Impact and Implications.pptxelizabethella096
 
Killer Packaging__Published in PrintAction
Killer Packaging__Published in PrintActionKiller Packaging__Published in PrintAction
Killer Packaging__Published in PrintActionVictoria Gaitskell
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfPauleneNicoleLapira
 
SEO: A Beginner's Guide to Ranking Higher
SEO: A Beginner's Guide to Ranking HigherSEO: A Beginner's Guide to Ranking Higher
SEO: A Beginner's Guide to Ranking Highervkvacker
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniSurya Prasath
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMaiizennxqc
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendayMaharshBenday
 
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptxPersonal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptxIngridSelk
 

Recently uploaded (20)

The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.
 
Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...
Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...
Macro PDF - How a Global Partner Marketing Concierge Team Can Drive Channel R...
 
Passive Income System 2.0 Digital: Effortless Earnings
Passive Income System 2.0 Digital: Effortless EarningsPassive Income System 2.0 Digital: Effortless Earnings
Passive Income System 2.0 Digital: Effortless Earnings
 
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
Top Abortion Clinic in Muscat +918761049707!!!!!!!!!!! Get Cytotec kit availa...
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
Taprank - Boost your Google reviews with personalized NFC cards
Taprank - Boost your Google reviews with personalized NFC cardsTaprank - Boost your Google reviews with personalized NFC cards
Taprank - Boost your Google reviews with personalized NFC cards
 
Niche Analysis for Client Outreach Outside Marketplace.pptx
Niche Analysis for Client Outreach Outside Marketplace.pptxNiche Analysis for Client Outreach Outside Marketplace.pptx
Niche Analysis for Client Outreach Outside Marketplace.pptx
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
 
The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
Iranian Strikes on Israel Assessing the Impact and Implications.pptx
Iranian Strikes on Israel  Assessing the Impact and Implications.pptxIranian Strikes on Israel  Assessing the Impact and Implications.pptx
Iranian Strikes on Israel Assessing the Impact and Implications.pptx
 
Killer Packaging__Published in PrintAction
Killer Packaging__Published in PrintActionKiller Packaging__Published in PrintAction
Killer Packaging__Published in PrintAction
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
SEO: A Beginner's Guide to Ranking Higher
SEO: A Beginner's Guide to Ranking HigherSEO: A Beginner's Guide to Ranking Higher
SEO: A Beginner's Guide to Ranking Higher
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert Cialdini
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMM
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptxPersonal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
 

Chapter 1- Introduction.ppt

  • 3. Objectives īŽAt the end of this chapter you should be able to: īŽ Define operating system īŽ Explain services provided by operating system īŽ Describe evolution of operating system īŽ Describe various types of operating systems and their services īŽ Understand the structure of operating system 3
  • 4. Outline īŽDefinition of an Operating System īŽHistory of Operating Systems īŽOperating System Services īŽTypes of Operating Systems īŽOperating System Structure 4
  • 5. What is an Operating System? īŽ A program that acts as an intermediary between a user of a computer and the computer hardware. īŽ It is an extended machine īŽ Hides the messy details which must be performed īŽ Presents user with a virtual machine, easier to use īŽ It is a resource manager īŽ Each program gets time with the resource īŽ Each program gets space on the resource 5
  • 6. Computer System Components īŽ1. Hardware – provides basic computing resources (CPU, memory, I/O devices). īŽ2. Operating system – controls and coordinates the use of the hardware among the various application programs for the various users. īŽ3. Applications programs – define the ways in which the system resources are used to solve the computing problems of the users (database systems, video games, business programs). īŽ4. Users (people, machines, other computers). 6
  • 8. Operating System Objectives īŽ Convenience – Top Down View – Virtual Machine īŽ Extending the real hardware and acting as a Virtual Machine īŽ Hiding the truth about the hardware from the user īŽ Providing the user a convenient interface which is easier to program īŽ Efficiency – Bottom Up View – Resource Manager īŽ Providing an orderly and controlled allocation of resources īŽ Improving resource utilization īŽ Ability to Evolve īŽ Permit effective development, testing, and introduction of new system functions without interfering with existing services īŽ Protection īŽ allow only authorised access to data, computation, services, etc. 8
  • 9. Operating System Services īŽA) Process Management īŽ A process is a program in execution. A process needs certain resources, including CPU time, memory, files, and I/O devices, to accomplish its task. īŽ Process is active entity, while program is passive entity īŽ The operating system is responsible for the following activities in connection with process management: īŽ Process creation and deletion. īŽ process suspension and resumption. īŽ Provision of mechanisms for: īŽ process synchronization īŽ process communication 9
  • 10. Operating System Services(cont’d) īŽB) Memory Management īŽ The operating system is responsible for the following activities in connections with memory management: īŽ Keep track of which parts of memory are currently being used and by whom. īŽ Decide which processes to load when memory space becomes available. īŽ Allocate and deallocate memory space as needed. īŽC) File Management īŽ A file is a collection of related information defined by its creator. īŽ Responsibility of operating system includes: īŽ File creation and deletion. īŽ Directory creation and deletion. īŽ Mapping files onto secondary storage. īŽ File backup on stable (nonvolatile) storage media. 10
  • 11. Operating System Services(cont’d) īŽ D) Secondary-Storage Management īŽ The operating system is responsible for the following activities in connection with disk management: īŽ Free space management īŽ Storage allocation īŽ Disk scheduling īŽ E) I/O Management īŽ since user programs cannot execute I/O operations directly, the operating system must provide some means to perform I/O. īŽ F) Protection System īŽ Protection refers to a mechanism for controlling access by programs, processes, or users to both system and user resources. īŽ The protection mechanism must: īŽ distinguish between authorized and unauthorized usage. īŽ specify the controls to be imposed. īŽ provide a means of enforcement. 11
  • 12. A View of Operating System Services 12
  • 13. Modes of Operation īŽ Dual-mode operation allows OS to protect itself and other system components īŽ User mode: when the computer system is executing on behalf of a user application. īŽ Kernel/privileged/supervisor/system mode: OS gains control of the computer. īŽ At system boot time, the hardware starts in kernel mode. The operating system is then loaded and starts user applications in user mode. īŽ Dual mode provides protection. How? īŽ The hardware allows privileged instructions- instructions that causes harm (E.g. instruction to switch to kernel mode, I/O control, timer management) to be executed only in kernel mode. 13
  • 14. System Calls īŽ System calls provide an interface to the services made available by an operating system īŽ System calls mostly accessed by programs via a high-level Application Programming Interface (API) rather than direct system call use īŽ E.g. how system calls are used: a program to read data from one file and copy them to another file 14
  • 15. System Calls(cont’d) īŽ Three most common APIs available to application programmers are: īŽ Windows API for Windows, īŽ POSIX API(for UNIX, Linux, and Mac OS X), and īŽ Java API for the Java virtual machine īŽ API – System Call – OS Relationship 15
  • 16. Standard C Library Example īŽ C program invoking printf() statement, the C library intercepts this call and invokes write() system call. The C library takes the value returned by write() and passes it back to the user program. 16 Read about system call parameter passing
  • 17. Examples of Windows and Unix System Calls 17
  • 18. Operating System Structure īŽGeneral-purpose OS is very large program, therefore need to be structured well. īŽ Partition the task into small components, or modules. īŽVarious ways: īŽ Simple structure (monolithic) īŽ Layered īŽ Microkernel īŽ Module īŽ Hybrid 18
  • 19. Monolithic/Simple Structure -- MS-DOS īŽ Do not have well-defined structures īŽ has no distinction between user and kernel modes, allowing all programs direct access to the underlying hardware īŽ Advantage īŽ Having the operating system in a single address space provides very efficient performance īŽ Disadvantage īŽ Difficult to maintain īŽ Base hardware is accessible by application programs: vulnerable to malicious programs. īŽ MS-DOS is one example īŽ written to provide the most functionality in the least space īŽ Although MS-DOS has some structure, its interfaces and levels of functionality are not well separated 19
  • 20. Layered Approach īŽ The operating system is divided into a number of layers (levels), each built on top of lower layers. īŽ The bottom layer (layer 0), is the hardware; the highest (layer N) is the user interface. īŽ Each layer provides a different type of functionality. īŽ With modularity, layers are selected such that each uses functions (operations) and services of only lower-level layers īŽ Advantage īŽ Easy for debugging īŽ Disadvantage īŽ Difficult to define the various layers īŽ Layer can use only lower-level layers, careful planning is necessary. īŽ Less efficient than other types īŽ Each layer adds overhead to the system call 20
  • 21. Microkernel System Structure īŽ Structures the operating system by removing all nonessential components from the kernel and implementing them in user space. īŽ Communication takes place between user modules using message passing īŽ E.g. Mac OS X kernel (Darwin) partly based on Mach īŽ Benefits: īŽ Easier to extend a microkernel īŽ new services are added to user space, do not require modification of the kernel īŽ Easier to port the operating system to new architectures īŽ Requires fewer modification īŽ More reliable and secure (less code is running in kernel mode) īŽ Detriments: īŽ Performance overhead of user space to kernel space communication 21
  • 23. Modules īŽ Many modern operating systems implement loadable kernel modules: the kernel has a set of core components and links in additional services via modules īŽ Each core component is separate īŽ Each talks to the others over known interfaces īŽ Each is loadable as needed within the kernel īŽ Overall, similar to layers but with more flexible- because any module can call any other module īŽ Linux, Solaris, etc. īŽ Advantage and Disadvantage? 23
  • 25. Hybrid Systems īŽ Most modern operating systems are actually not one pure model īŽ Hybrid combines multiple approaches to address performance, security, and usability issues īŽ Linux and Solaris are monolithic(for performance reasons) in kernel address space, plus modular for dynamic loading of functionality īŽ Windows mostly monolithic, has behavior of microkernel, and also provide support for dynamically loadable kernel modules īŽ Apple Mac OS X uses hybrid structure, a layered system : īŽ Top layer: Aqua- GUI; Cocoa programming environment īŽ Below is kernel consisting of: īŽ Mach microkernel: for memory management, RPCs and IPC īŽ BSD Unix component: for networking and file systems īŽ I/O kit: for development of device drivers īŽ dynamically loadable modules (called kernel extensions) 25
  • 26. Mac OS X Structure graphical user interface Aqua application environments and services kernel environment Java Cocoa Quicktime BSD Mach I/O kit kernel extensions BSD 26
  • 27. Reading Assignments īŽ A. History of operating systems īŽ B. Types of operating systems. īŽ Mainframe operating systems īŽ Distributed operating systems īŽ Personal computer operating systems īŽ Real-time operating systems īŽ Embedded operating systems 27